Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Datasource
Material
Language
  • 1
    Article
    Article
    In:  Einheit und Vielfalt 9, Amsterdam 1998, S. 133-144.
    Language: English
    Titel der Quelle: Einheit und Vielfalt
    Angaben zur Quelle: 9, Amsterdam 1998, S. 133-144.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (73 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Is your information security system fit for purpose? Most businesses are now aware of the importance of information security. However, some organisations struggle to understand what an information security breach would mean from a business management point of view. This can lead to organisations investing in expensive solutions which may not necessarily address their requirements. This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused. This balanced view helps managers and business decision makers to form better assessments of their organisation's information security needs. It also gives readers the knowledge to fend off any security vendors who might try to make sales by spreading panic and exaggerating the consequences of a breach. With this book's help, you can make sure your information security system is right for your business.
    Note: Online resource; Title from title page (viewed July 16, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Dordrecht : Springer
    ISBN: 9789400950832
    Language: English
    Pages: Online-Ressource , digital
    Edition: Springer eBook Collection. Humanities, Social Sciences and Law
    Series Statement: Martinus Nijhoff Philosophy Library 6
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Philosophy (General) ; Science Philosophy ; Aesthetics ; Philosophy, Modern. ; Science—Philosophy.
    Abstract: The three domains of creativity -- Creativity in science -- Every horse has a mouth: a personal poetics -- Criteria of creativity -- The creative imagination -- The rationality of creativity -- Creative product and creative process in science and art -- Creativity as learning process -- Creating and becoming -- On the dialectical phenomenology of creativity -- Name index.
    Abstract: This third volume of American University Publications in Philos­ ophy continues the tradition of presenting books in the series shaping current frontiers and new directions in phi. osophical reflection. In a period emerging from the neglect of creativity by positivism, Professors Dutton and Krausz and their eminent colleagues included in the collection challenge modern philosophy to explore the concept of creativity in both scientific inquiry and artistic production. In view of the fact that Professor Krausz served at one time as Visiting Professor of Philosophy at The American University we are especially pleased to include this volume in the series. HAROLD A. DURFEE, for the editors of American University Publications in Philosophy EDITORS' PREFACE While the literature on the psychology of creativity is substantial, surprisingly little attention has been paid to the subject by philos­ ophers in recent years. This fact is no doubt owed in 'part to the legacy of positivism, whose tenets have included a sharp distinction between what Hans Reichenbach called the context of discovery and the context of justification. Philosophy in this view must address itself to the logic of justifying hypotheses; little of philo­ sophical importance can be said about the more creative business of discovering them. That, positivism has held, is no more than a merely psychological question: since there is no logic of discovery or creation, there can be no philosophical reconstruction of it.
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781498554749
    Language: English
    Pages: xi, 110 Seiten , 1 Porträt
    DDC: 128/.68
    RVK:
    RVK:
    Keywords: Krausz, Michael Congresses ; Relativity Congresses ; Identity (Philosophical concept) Congresses ; Interpretation (Philosophy) Congresses ; Identity (Philosophical concept) ; Interpretation (Philosophy) ; Relativity ; Krausz, Michael ; Konferenzschrift 2015 ; Krausz, Michael 1942- ; Person ; Ich-Identität ; Interpretation ; Relativismus
    Abstract: Introduction / Christine M. Koggel and Andreea Deciu Ritivoi -- Interpretation and the man / Mary Bittner Wiseman -- Multiple interpretations and singular selves / Garry L. Hagberg -- Identity and its narrative discontents : Krausz on self-understanding and self-transformation / Andreea Deciu Ritivoi -- Reflections on 'relativisms and their opposites' / Paul Snowdon -- Robust multiplism, or, new bearings in the theory of interpretation / Bernard Harrison -- Dialogues in the work of Michael Krausz / David B. Wong -- Replies and reflections / Michael Krausz
    Note: "This volume originates from a symposium "The Philosophical Works of Michael Krausz" at Bryn Mawr College in November 2015" -- Page viii
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    Wien : Ed. Steinbauer
    ISBN: 9783902494559
    Language: German
    Pages: 143 S. , 24 cm
    DDC: 303.4833
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Internet ; World Wide Web 2.0 ; Sozialer Wandel ; Demokratisierung ; Electronic Commerce ; Computerkriminalität ; Information warfare
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Ely, U.K. : IT Governance Pub.
    Language: English
    Pages: 1 online resource (1 v.)
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Data protection ; Computer security ; Case studies ; Data protection ; Case studies ; Computer crimes ; Case studies ; Electronic information resources ; Access control ; Electronic books ; Electronic books ; local
    Abstract: Even when organisations take precautions, they may still be at risk of a data breach. Information security incidents do not just affect small businesses; major companies and government departments suffer from them as well. A strategic framework Managing Information Security Breaches sets out a strategic framework for handling this kind of emergency . It focuses on the treatment of severe breaches and on how to re-establish safety and security once the breach has occurred. These recommendations support the controls for the treatment of breaches specified under ISO27001:2005. Top priorities The actions you take in response to a data breach can have a significant impact on your company's future. Michael Krausz explains what your top priorities should be the moment you realise a breach has occurred. This book is essential reading for security officers, IT managers and company directors. Read this guide and learn how to ... Avoid information security breaches The author uses cases he has investigated to illustrate the various causes of a breach, ranging from the chance theft of a laptop at an airport to more systematic forms of data theft by criminal networks. By analysing situations companies have experienced in real life, the case studies can give you a unique insight into the best way for your organisation to avoid a data breach. Plan your response If something did go wrong, how would you handle it? Even if you have done everything possible to prevent a data breach, you still need to know what to do, should one occur. This book offers advice on the strategies and tactics to apply in order to identify the source of the leak, keep the damage to a minimum, and recover as swiftly as possible. Preserve the trust of your customers If your company ever experiences an information security incident, then the way your customers see you will depend on how you react. This book tells you the key steps you need to take to hold on to the goodwill of your customers if a data breach occurs. The book also offers advice on what to do if you discover defamatory material about your business on YouTube or on forum sites. Improve management processes Information security breaches are committed, often by ambitious or embittered employees. This book looks at ways to reduce the risk of staff selling product designs or customer data to your competitors for personal gain. This book provides a general discussion of, and a source of learning about, what information security br...
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Ely, U.K. : IT Governance Pub.
    Language: English
    Pages: 1 online resource (56 p.)
    Keywords: Business enterprises ; Computer networks ; Security measures ; Computer security ; Management ; Standards ; Data protection ; Management ; Standards ; Electronic books ; local
    Abstract: There are lots of books that will tell you what to do to prevent an information security breach. This book is different. It tells you what you have to do if a security breach occurs.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Ely, Cambridgeshire, UK : IT Governance Press
    ISBN: 9781849285841 , 1849285845
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Keywords: Computer security ; Hacking ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: What if you suffer an information security breach? Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions. Information Security Breaches - Avoidance and treatment based on ISO27001:2013 helps you to manage this threat by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and decisive action. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly preserve customer confidence by quickly resolving service disruption secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. From reviews of the 1st edition: '...I recommend this pocket guide to anyone implementing ISO27001, and indeed to anyone who is concerned about the risks of security breaches, and who wants to know how best to prepare their organization for the unpleasant events that are bound to happen from time to time...' Willi Kraml, Global Information Security Officer '...Michael Krausz has created a valuable tool ... Written in plain English, this handbook is easy to follow even by a novice in the Information Technology Field. Therefore "Information Security Breaches" is a must within the 'tool box' of anyone who deals with IT issues on an every-day basis...' Werner Preining, Interpool Security Ltd About the author Michael Krausz is an IT expert and experienced professional investigator. He has investigated over a hundred cases of information security breaches. Many of these cases have concerned forms of white-collar crime. Michael Krausz studied physics, computer science and law at the University of Technology in Vienna, and at Vienna and Webster universities. He has delivered over 5000 hours of professional and academic training and has provided services in eleven countries to date.
    Note: Description based on online resource; title from title page (Safari, viewed Aug. 9, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Computer security ; Computer crimes ; Electronic information resources ; Access control ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: A comprehensive guide to managing an information security incident Even when organisations take precautions, they may still be at risk of a data breach. Information security incidents do not just affect small businesses: major companies and government departments suffer from them as well. Completely up to date with ISO/IEC 27001:2013, Managing Information Security Breaches sets out a strategic framework for handling this kind of emergency. The book provides a general discussion and education about information security breaches, how they can be treated and what ISO 27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches. These case studies enable an in-depth analysis of the situations companies face in real life, and contain valuable lessons that your organisation can learn from when putting appropriate measures in place to prevent a breach. Understand what your top information security priorities should be The author explains what your top priorities should be the moment you realise a breach has occurred, making this book essential reading for IT security managers, chief security officers, chief information officers and chief executive officers. It will also be of use to personnel in non-IT roles, in an effort to make this unwieldy subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents. About the author Michael Krausz studied physics, computer science and law at the Vienna University of Technology, Vienna University and Webster University. Over the last 20 years he has become an accomplished professional investigator, IT expert and ISO 27001 auditor, investigating over a hundred cases of information security breaches. He has delivered over 5,000 hours of professional and academic training, and has provided consulting or investigation services in 21 countries. Buy this book today and better understand how to manage information security breaches in your organisation.
    Note: Description based on online resource; title from title page (Safari, viewed November 6, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Dordrecht : Springer Netherlands
    ISBN: 9789400982307
    Language: English
    Pages: Online-Ressource (212 p) , online resource
    Edition: Springer eBook Collection. Humanities, Social Sciences and Law
    Series Statement: Martinus Nijhoff Philosophy Library 6
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    Keywords: Philosophy (General) ; Science Philosophy ; Philosophy, modern ; Phenomenology ; Science—Philosophy.
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...