Narrow your search

Library

AP (2)

KDG (2)

VUB (2)

EhB (1)

KU Leuven (1)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

More...

Resource type

book (3)

digital (2)


Language

English (5)


Year
From To Submit

2022 (2)

2010 (3)

Listing 1 - 5 of 5
Sort by

Book
IT security management : IT securiteers - setting up an it security function
Authors: ---
ISBN: 9048188814 9786613002648 1283002647 9048188822 Year: 2010 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies’ executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them “securiteers”. They will add value to the business, improving the information security stance of organisations.

Keywords

Computer security -- Management. --- Corporations -- Security measures -- Management. --- Industries -- Security measures -- Management. --- Security systems. --- Computer security --- Business enterprises --- Engineering & Applied Sciences --- Commerce --- Business & Economics --- Marketing & Sales --- Computer Science --- Management --- Computer networks --- Security measures --- Management. --- Security measures. --- Computer Communication Networks. --- Information theory. --- Computer science. --- Data protection. --- Telecommunication. --- Information Systems. --- Theory of Computation. --- Computer Science, general. --- Systems and Data Security. --- Communications Engineering, Networks. --- Management of Computing and Information Systems. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Informatics --- Science --- Communication theory --- Cybernetics --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Computer communication systems. --- Computers. --- Electrical engineering. --- Management information systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Electric engineering --- Engineering --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Communication systems --- Distributed processing


Digital
IT Security Management : IT Securiteers - Setting up an IT Security Function
Authors: ---
ISBN: 9789048188826 9789048188833 9789048188819 9789400732629 Year: 2010 Publisher: Dordrecht Springer Netherlands

Loading...
Export citation

Choose an application

Bookmark

Abstract

IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies’ executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them “securiteers”. They will add value to the business, improving the information security stance of organisations.


Book
IT Security Management : IT Securiteers - Setting up an IT Security Function
Authors: --- ---
ISBN: 9789048188826 9789048188833 9789048188819 9789400732629 Year: 2010 Publisher: Dordrecht Springer Netherlands Imprint Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them securiteers . They will add value to the business, improving the information security stance of organisations.


Digital
Blockchain and Applications : 3rd International Congress
Authors: --- --- ---
ISBN: 9783030861629 9783030861612 9783030861636 Year: 2022 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 1st International Congress on Blockchain and Applications 2021, BLOCKCHAIN'21, held in Salamanca, Spain, in October 2021. Among the scientific community, blockchain and artificial intelligence are a promising combination that will transform the production and manufacturing industry, media, finance, insurance, e-government, etc. Nevertheless, there is no consensus with schemes or best practices that would specify how blockchain and artificial intelligence should be used together. The 38 full papers presented were carefully reviewed and selected from over 44 submissions. They contain the latest advances on blockchain and artificial intelligence and on their application domains, exploring innovative ideas, guidelines, theories, models, technologies, and tools and identifying critical issues and challenges that researchers and practitioners must deal with in future research.


Book
Blockchain and Applications
Authors: --- --- --- ---
ISBN: 9783030861629 9783030861612 9783030861636 Year: 2022 Publisher: Cham Springer International Publishing :Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 5 of 5
Sort by