Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (62)
  • English  (62)
  • Calder, Alan  (33)
  • Dufrasne, Bert  (29)
  • Boston, MA : Safari  (62)
Datasource
  • MPI Ethno. Forsch.  (62)
Material
Language
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782808
    Language: English
    Pages: 1 online resource (85 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation.
    Note: Online resource; Title from title page (viewed February 18, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787783447
    Language: English
    Pages: 1 online resource (54 pages)
    Edition: 1st edition
    Keywords: Electronic books
    Abstract: The EU Data Protection Code of Conduct for Cloud Service Providers provides guidance on how to implement the Code within your organisation, exploring the objectives of the Code and how compliance can be achieved with or without a pre-existing ISMS (information security management system) within the organisation.
    Note: Online resource; Title from title page (viewed November 2, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787783478
    Language: English
    Pages: 1 online resource (1 video file, approximately 6 hr., 43 min.)
    Edition: 1st edition
    Keywords: Electronic videos
    Abstract: This fully accredited, practitioner-led course will equip you with the key skills involved in planning, implementing and maintaining an ISO 27001-compliant ISMS. It will teach you: • The nine key steps involved in planning, implementing and maintaining an ISO 27001-compliant ISMS; • Information security management best practices to ensure the confidentiality, integrity and availability of data; • How to structure and manage your ISO 27001 project; and • Typical pitfalls and challenges and how to deal with them. Exam If you would like to purchase the exam please use the following link - https://www.itgovernance.co.uk/shop/product/certified-iso-27001-isms-lead-implementer-cis-li-exam-voucher
    Note: Online resource; Title from title screen (viewed November 1, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787783010
    Language: English
    Pages: 1 online resource (145 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS) walks you through the requirements of ISO 22301, explaining what they mean and how your organisation can achieve compliance. It is an essential companion guide for those working in business continuity.
    Note: Online resource; Title from title page (viewed March 25, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780738459196
    Language: English
    Pages: 1 online resource (488 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery, replication, retention management, and reuse for virtual machines, databases, and applications backups in hybrid multicloud environments. IBM Knowledge Center for IBM Spectrum® Protect Plus provides extensive documentation for installation, deployment, and usage. In addition, build and size an IBM Spectrum Protect Plus solution. The goal of this IBM Redpaper® publication is to summarize and complement the available information by providing useful hints and tips that are based on the authors' practical experience in installing and supporting IBM Spectrum Protect Plus in customer environments. Over time, our aim is to compile a set of best practices that cover all aspects of the product, from planning and installation to tuning, maintenance, and troubleshooting.
    Note: Online resource; Title from title page (viewed March 31, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780738459677
    Language: English
    Pages: 1 online resource (140 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: RedHat OpenShift container platform is one of the leading enterprise-grade container orchestration platforms. It is designed for rapid deployment of web applications, databases, and microservices. Categorized as a container orchestration Platform as a Service (PaaS), it is based on open industry standards, such as the Container Runtime Interface - Open (CRI-O) and Kubernetes. OpenShift allow developers to focus on the code, while the platform manages the complex IT operations and processes. Although open-source, community-driven container orchestration platforms are available, such as OKD and Kubernetes, this IBM® Redpaper® publication focuses on Red Hat OpenShift. It describes the basic concepts of OpenShift persistent storage architecture and its integration into IBM Cloud® Paks. The deployment of the IBM block storage CSI driver also is discussed. This publication also describes the concepts, technology and current working practices for installing the Container Storage Interface (CSI) plug-in for Kubernetes to use IBM Enterprise Storage platforms for persistent storage coupled with Red Hat OpenShift Container Platform (OCP). This publication also provides an overview of containers, Kubernetes, and Openshift for context (it is expected that the reader has a working knowledge of these underlying technologies). It also includes architectural examples of the orchestration platform will be given. This paper serves as a guide about how to deploy the CSI driver for block storage by using the DS8000® and Spectrum Virtualize platforms as persistent storage in a Red Hat OpenShift platform. The publication is intended for storage administrators, IT architects, OpenShift technical specialists and anyone who wants to integrate IBM Enterprise storage on OpenShift V4.3/4.4/4.5 on IBM Power, IBM Z®, and x86 systems.
    Note: Online resource; Title from title page (viewed May 12, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782396
    Language: English
    Pages: 1 online resource (4949 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices.
    Note: Online resource; Title from title page (viewed July 27, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782273 , 1787782271 , 9781787782297
    Language: English
    Pages: 1 online resource (38 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Understand the basics of business continuity and ISO 22301:2019 with this concise pocket guide, which will help you ensure your organisation can continue to operate in the event of a disruption.
    Note: Online resource; Title from title page (viewed June 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Language: English
    Pages: 1 online resource (200 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® experts recognize the need for data protection, both from hardware or software failures, and from physical relocation of hardware, theft, and retasking of existing hardware. The IBM DS8000® supports encryption-capable hard disk drives (HDDs) and flash drives. These Full Disk Encryption (FDE) drive sets are used with key management services that are provided by IBM Security Key Lifecycle Manager software or Gemalto SafeNet KeySecure to allow encryption for data at rest. Use of encryption technology involves several considerations that are critical for you to understand to maintain the security and accessibility of encrypted data. Failure to follow the requirements that are described in the IBM Redpaper can result in an encryption deadlock. Starting with Release 8.5 code, the DS8000 also supports Transparent Cloud Tiering (TCT) data object encryption. With TCT encryption, data is encrypted before it is transmitted to the cloud. The data remains encrypted in cloud storage and is decrypted after it is transmitted back to the IBM DS8000. Starting with DS8000 Release 9.0, the DS8900F provides Fibre Channel Endpoint Security when communicating with an IBM z15™, which supports link authentication and the encryption of data that is in-flight. For more information, see IBM Fibre Channel Endpoint Security for IBM DS8900F and IBM Z, SG24-8455. This edition focuses on IBM Security Key Lifecycle Manager Version 3.0.1.3 or later, which enables support Key Management Interoperability Protocol (KMIP) with the DS8000 Release 9.0 code or later and updated DS GUI for encryption functions.
    Note: Online resource; Title from title page (viewed January 27, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (118 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication gives a broad understanding of storage clouds and the initial functionality that was introduced for mainframes to have Transparent Cloud Tiering. IBM DFSMS and the IBM DS8000 added functionality to provide elements of serverless data movement, and for IBM z/OS® to communicate with a storage cloud. The function is known as Transparent Cloud Tiering and is composed of the following key elements: A gateway in the DS8000, which allows the movement of data to and from Object Storage by using a network connection, with the option to encrypt data in the Cloud. DFSMShsm enhancements to support Migrate and Recall functions to and from the Object Storage. Other commands were enhanced to monitor and report on the new functionality. DFSMShsm uses the Web Enablement toolkit for z/OS to create and access the metadata for specific clouds, containers, and objects. DFSMSdss enhancements to provide some basic backup and restore functions to and from the cloud. The IBM TS7700 can also be set up to act as if it were cloud storage from the DS8000 perspective. This IBM Redbooks publication is divided into the following parts: Part 1 provides you with an introduction to clouds. Part 2 shows you how we set up the Transparent Cloud Tiering in a controlled laboratory and how the new functions work. We provide points to consider to help you set up your storage cloud and integrate it into your operational environment. Part 3 shows you how we used the new functionality to communicate with the cloud and to send data and retrieve data from it..
    Note: Online resource; Title from title page (viewed March 5, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Language: English
    Pages: 1 online resource (224 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Companies need to migrate data not only when technology needs to be replaced, but also for consolidation, load balancing, and disaster recovery (DR). Data migration is a critical operation, and this book explains the phases and steps to ensure a smooth migration. Topics range from planning and preparation to execution and validation. The book explains, from a generic standpoint, the appliance-based, storage-based, and host-based techniques that can be used to accomplish the migration. Each method is explained through practical migration scenarios and for various operating systems. This publication addresses the aspects of data migration efforts while focusing on fixed block storage systems in open environment with the IBM® FlashSystem 9100 as the target system. Therefore, the book also emphasizes various migration techniques using the Spectrum Virtualize built-in functions. This document targets storage administrators, storage network administrators, system designers, architects, and IT professionals who design, administer or plan data migrations in large data Centers. The aim is to ensure that you are aware of the current thinking, methods, and products that IBM can make available to you. These items are provided to ensure a data migration process that is as efficient and problem-free as possible. The material presented in this book was developed with versions of the referenced products as of February, 2020.
    Note: Online resource; Title from title page (viewed April 16, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738458403
    Language: English
    Pages: 1 online resource (46 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper publication presents and positions the DS8910F Model 993. The modular system can be integrated into 15U contiguous space of an IBM z14® Model ZR1 (z14 Model ZR1), IBM LinuxONE Rockhopper II (z14 Model LR1), or other standard 19-inch wide rack. The DS8910F Model 993 allows you to take advantage of the performance boost of all-flash systems and advanced features while limiting datacenter footprint and power infrastructure requirements.
    Note: Online resource; Title from title page (viewed February 16, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782549
    Language: English
    Pages: 1 online resource (77 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Thrive under the GDPR (General Data Protection Regulation) wherever you are in the world. This pocket guide will help you understand the Regulation, the broader principles of data protection, and what the GDPR means for businesses in Europe and beyond.
    Note: Online resource; Title from title page (viewed October 15, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    ISBN: 9780738459233
    Language: English
    Pages: 1 online resource (64 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM Redpaper publication presents and positions the DS8910F Model 993 storage system. This modular system can be integrated into a 16U contiguous space of an IBM z15™ model T02 or IBM z14® Model ZR1 with Feature Code 0937 and IBM LinuxONE III model LT2 or LinuxONE Rockhopper II model LR1 with Feature Code 0938. The DS8910F Model 993 allows you to take advantage of the performance boost of all-flash systems and advanced features while limiting data center footprint and power infrastructure requirements.
    Note: Online resource; Title from title page (viewed December 9, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782624
    Language: English
    Pages: 1 online resource (361 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
    Note: Online resource; Title from title page (viewed December 10, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Language: English
    Pages: 1 online resource (298 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery, replication, retention, and reuse for virtual machines, databases, and applications in hybrid multicloud environments. IBM Knowledge Center for IBM Spectrum® Protect Plus provides extensive documentation for installation, deployment, and usage. In addition, IBM Spectrum Protect Plus Blueprint (https://ibm.biz/IBMSpectrumProtectPlusBlueprints) provides guidance about how to build and size an IBM Spectrum Protect Plus solution. The goal of this IBM Redpaper publication is to summarize and complement the available information by providing useful hints and tips based on the authors' practical experience in installing and supporting IBM Spectrum Protect Plus in actual customer environments. Over time, our aim is to compile a set of best practices that cover all aspects of the product, from planning and installation to tuning, maintenance, and troubleshooting.
    Note: Online resource; Title from title page (viewed November 6, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780743
    Language: English
    Pages: 1 online resource (76 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This concise guide is essential reading for US organizations wanting an easy to follow overview of the GDPR and the compliance obligations for handling data of EU citizens, including guidance on the EU-U.S. Privacy Shield.
    Note: Online resource; Title from title page (viewed October 15, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Language: English
    Pages: 1 online resource (86 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication explains the IBM DS8880 Safeguarded Copy functionality. With Safeguarded Copy, organizations have the ability to improve their cyber resiliency by frequently creating protected point-in-time backups of their critical data, with minimum impact and effective resource utilization. The paper introduces Safeguarded Copy and discusses the need for logical corruption protection (LCP) and information about regulatory requirements. It presents the general concepts of LCP, and then explore various use cases for recovery. The paper is intended for IT security architects, who plan and design an organization's cyber security strategy, as well as the infrastructure technical specialists who implement them.
    Note: Online resource; Title from title page (viewed February 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This pocket guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource. It will teach you how to protect your customers' cardholder data with best practice from the Standard.
    Note: Online resource; Title from title page (viewed September 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Language: English
    Pages: 1 online resource (232 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides information for attaching the IBM FlashSystem® A9000, IBM FlashSystem A9000R, and IBM XIV® Storage System to various host operating system platforms, such as IBM AIX® and Microsoft Windows. This publication was last updated in May 2019 to cover the VLAN tagging and port trunking support available with software version 12.3.2 (see in particular section 2.4, "VLAN tagging" on page 67. The goal is to give an overview of the versatility and compatibility of the IBM Spectrum™ Accelerate family of storage systems with various platforms and environments. The information that is presented here is not meant as a replacement or substitute for the IBM Storage Host Attachment Kit publications or other product publications. It is meant as a complement and to provide usage guidance and practical illustrations. This publication does not address attachments to a secondary system used for Remote Mirroring or data migration. These topics are covered in IBM FlashSystem A9000 and IBM FlashSystem A9000 and A9000R Business Continuity Solutions, REDP-5401.
    Note: Online resource; Title from title page (viewed September 24, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Language: English
    Pages: 1 online resource (40 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® Product Guide is an overview of the main characteristics, features, and technology that are used in IBM FlashSystem® A9000R Model 415 and Model 425, with IBM FlashSystem A9000R Software V12.3.2. Software version 12.3.2, with Hyper-Scale Manager version 5.6 or later, introduces support for VLAN tagging and port trunking.. IBM FlashSystem A9000R is a grid-scale, all-flash storage platform designed for industry leaders with rapidly growing cloud storage and mixed workload environments to help drive your business into the cognitive era. FlashSystem A9000R provides consistent, extreme performance for dynamic data at scale, integrating the microsecond latency and high availability of IBM FlashCore® technology. The rack-based offering comes integrated with the world class software features that are built with IBM Spectrum™ Accelerate. For example, comprehensive data reduction, including inline pattern removal, data deduplication, and compression, helps lower total cost of ownership (TCO) while the grid architecture and IBM Hyper-Scale framework simplify and automate storage administration. The A9000R features always on data reduction and now offers intelligent capacity management for deduplication. Ready for the cloud and well-suited for large deployments, FlashSystem A9000R delivers predictable high performance and ultra-low latency, even under heavy workloads with full data reduction enabled. As a result, the grid-scale architecture maintains this performance by automatically self-optimizing workloads across all storage resources without manual intervention.
    Note: Online resource; Title from title page (viewed June 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780873
    Language: English
    Pages: 1 online resource (10735 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Aligned with the latest iteration of the Standard – ISO 27001:2013 – this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language
    Note: Online resource; Title from title page (viewed October 2, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (26 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication describes the IBM DS8880 High-Performance Enclosure (HPFE) Gen2 architecture and configuration, as of DS8900 Release 9.0. The IBM® DS8000® High-Performance Flash Enclosure Gen2 (HPFE Gen2) is a 2U storage enclosure that is installed in pairs in DS8900F and DS8880 models.. The flash enclosure and Flash RAID adapters are installed in pairs. Each storage enclosure pair can support 16, 32, or 48 encryption-capable flash drives (2.5-inch, 63.5 mm form factor).
    Note: Online resource; Title from title page (viewed December 20, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780738457444
    Language: English
    Pages: 1 online resource (214 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: IBM® HyperSwap® is the high availability (HA) solution that provides continuous data availability in case of hardware failure, power failure, connectivity failure, or disasters. The HyperSwap capability is available for IBM FlashSystem® A9000 and IBM FlashSystem A9000R, starting with software version 12.2.1. Version 12.3 introduces a function that combines HyperSwap and Asynchronous replication, which creates a solution that entails HA and Disaster Recovery (DR). One side of the HyperSwap pair has an active async link to the third system, and the other side has a standby link. Known as Multi-site HA/DR, this configuration provides HyperSwap active-active HA while keeping data mirrored to a third copy to ensure two levels of business continuity. This IBM Redpaper™ publication gives a broad understanding of the architecture, design, and implementation of HyperSwap and Multi-site HA/DR solution. It also discusses and illustrates various use cases pertaining to their use and functionality. This paper is intended for those users who want to deploy solutions that take advantage of HyperSwap and Multi-site HA/DR for FlashSystem A9000 and A9000R.
    Note: Online resource; Title from title page (viewed February 4, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Language: English
    Pages: 1 online resource (92 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication reviews the architecture and operations of the IBM DS8000® Global Mirror function. The document looks at different aspects of the solution in terms of performance, infrastructure requirements, data integrity, business continuity, and impact on production. Hints and tips are provided on how to best configure the overall Global Mirror environment, in terms of connectivity, storage configuration, and specific parameters tuning. The guidelines that are provided are in general related to performance, which ultimately ensures a better recovery point objective (RPO). Therefore, we encourage you to follow those guidelines.
    Note: Online resource; Title from title page (viewed January 11, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Language: English
    Pages: 1 online resource (224 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This edition applies to FlashSystem A9000 and A9000R, Model 415 and 425, with system software Version 12.3 IBM® FlashSystem A9000 and IBM FlashSystem® A9000R provide copy functions suited for various data protection scenarios that enable you to enhance your business continuance, disaster recovery, data migration, and backup solutions. These functions allow point-in-time copies, known as snapshots, and also include remote copy capabilities in either synchronous or asynchronous mode. Furthermore, support for IBM Hyper-Scale Mobility enables a seamless migration of IBM FlashSystem A9000 or A9000R volumes to another with no interference to the host. Starting with software level V12.1, the IBM HyperSwap® feature delivers always-on, high availability (HA) storage service for storage volumes in a production environment. Starting with version 12.2, asynchronous replication between the IBM XIV® Gen3 and FlashSystem A9000 or A9000R is supported. Starting with Version 12.2.1, Hyper-Scale Mobility is enabled between XIV Gen3 and FlashSystem A9000 or A9000R. Version 12.3 offers Multi-site replication solution that entails both High Availability (HA) and Disaster Recovery (DR)function by combining HyperSwap and Asynchronous replication to a third site. This IBM Redpaper™ publication is intended for anyone who needs a detailed and practical understanding of the IBM FlashSystem A9000 and IBM FlashSystem A9000R replication and business continuity functions.
    Note: Online resource; Title from title page (viewed March 8, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (130 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business. Encrypting data-at-rest is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. The IBM® Spectrum Accelerate family, which includes IBM XIV® Storage System, IBM FlashSystem® A9000, IBM FlashSystem A9000R system(s), and IBM Spectrum™ Accelerate Software provides data-at-rest encryption at no charge. Clients can take advantage of encryption and still benefit from the lower total cost of ownership (TCO) that the IBM Spectrum Accelerate™ family offers. For IBM FlashSystem A9000 and A9000R, clients now have a choice between an external key manager-based implementation or a local key based encryption implementation. The local key solution offers a simplified deployment of data-at-rest encryption. This IBM Redpaper™ publication explains the architecture and design of the XIV and IBM FlashSystem A9000 and A9000R encryption solutions. Details are provided for configuring and implementing both solutions.
    Note: Online resource; Title from title page (viewed April 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787781702
    Language: English
    Pages: 1 online resource (42 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles.
    Note: Online resource; Title from title page (viewed September 26, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Language: English
    Pages: 1 online resource (188 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication is a brief overview of synergistic aspects between various VMware offerings and the IBM Spectrum™ Accelerate family, including IBM XIV® and IBM FlashSystem® A9000 and IBM FlashSystem A9000R servers. After reviewing different integration concepts and explaining general implementation aspects for attaching the IBM Spectrum Accelerate™ family to VMware ESXi deployments, the paper focuses on components that are enabled by IBM Spectrum Connect v3.4. This paper is intended for planning to use or implementing the IBM Spectrum Accelerate family of storage systems in a VMware environment.
    Note: Online resource; Title from title page (viewed February 4, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Language: English
    Pages: 1 online resource (166 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes storage management functions and their configuration and use with the IBM Hyper-Scale Manager management graphical user interface (GUI) for IBM XIV® Gen3, IBM FlashSystem® A9000 and A9000R, and IBM Spectrum™ Accelerate software. The web-based GUI provides a revolutionary object-centered interface design that is aimed toward ease of use together with enhanced efficiency for storage administrators. The first chapter describes general features of the GUI and installation of the IBM Hyper-Scale Manager server. Subsequent chapters illustrate some typical GUI actions, among many other possibilities, to manage and configure the storage systems, to define security roles, and to set up multitenancy. For most of the GUI-based actions that are illustrated in this book, the corresponding XIV Storage System command-line interface (XCLI) commands are also shown. This edition applies to IBM Hyper-Scale Manager V5.4. IBM Hyper-Scale Manager based GUI information regarding host attachment and replication is covered in IBM FlashSystem A9000, IBM FlashSystem A9000R, and IBM XIV Storage System: Host Attachment and Interoperability, SG24-8368 and IBM FlashSystem A9000 and A9000R Business Continuity Solutions, REDP-5401. See also IBM HyperSwap and Multi-site HA/DR for IBM FlashSystem A9000 and A9000R, REDP-5434.
    Note: Online resource; Title from title page (viewed April 12, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Language: English
    Pages: 1 online resource (34 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® Product Guide is an overview of the main characteristics, features, and technology that are used in IBM FlashSystem® A9000Model 425, with IBM FlashSystem A9000 Software V12.3.2. Software version 12.3.2, with Hyper-Scale Manager version 5.6 or later, introduces support for VLAN tagging and port trunking. IBM FlashSystem A9000 storage system uses the IBM FlashCore® technology to help realize higher capacity and improved response times over disk-based systems and other competing flash and solid-state drive (SSD)-based storage. The extreme performance of IBM FlashCore technology with a grid architecture and comprehensive data reduction creates one powerful solution. Whether you are a service provider who requires highly efficient management or an enterprise that is implementing cloud on a budget, FlashSystem A9000 provides consistent and predictable microsecond response times and the simplicity that you need. The A9000 features always on data reduction and now offers intelligent capacity management for deduplication. As a cloud optimized solution, FlashSystem A9000 suits the requirements of public and private cloud providers who require features, such as inline data deduplication, multi-tenancy, and quality of service. It also uses powerful software-defined storage capabilities from IBM Spectrum™ Accelerate, such as Hyper-Scale technology, VMware, and storage container integration.
    Note: Online resource; Title from title page (viewed June 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (48 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM Redbooks® Product Guide gives an overview of the features and functions that are available with the IBM DS8880 models running microcode Release 8.51 (DS8000 License Machine Code 8.8.51.xx.xx). The IBM DS8880 architecture relies on powerful IBM POWER8® processor-based servers that manage the cache to streamline disk input/output (I/O), maximizing performance and throughput. These capabilities are further enhanced with the availability of the second generation of high-performance flash enclosures (HPFE Gen-2). The IBM DS8888, DS8886, and DS8884 models excel at supporting the IBM Z Enterprise server and IBM Power server environments, offering many synergy features.
    Note: Online resource; Title from title page (viewed January 2, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (218 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: -update for Release 8.5 - IBM experts recognize the need for data protection, both from hardware or software failures, and also from physical relocation of hardware, theft, and retasking of existing hardware. The IBM DS8880 supports encryption-capable hard disk drives (HDDs) and flash drives. These Full Disk Encryption (FDE) drive sets are used with key management services that are provided by IBM Security Key Lifecycle Manager software or Gemalto SafeNet KeySecure to allow encryption for data at rest on a DS8880. Use of encryption technology involves several considerations that are critical for you to understand to maintain the security and accessibility of encrypted data. The IBM Security Key Lifecycle Manager software also supports Transparent Cloud Tiering (TCT) data object encryption, which is part of this publication. With TCT encryption, data is encrypted before it is transmitted to the Cloud. The data remains encrypted in cloud storage and is decrypted after it is transmitted back to the DS8000®. This IBM Redpaper™ publication contains information that can help storage administrators plan for disk and TCT data object encryption. It also explains how to install and manage the encrypted storage and how to comply with IBM requirements for using the IBM DS8000 encrypted disk storage system. This edition focuses on IBM Security Key Lifecycle Manager Version 3.0 which enables support Key Management Interoperability Protocol (KMIP) with the DS8000 Release 8.5 code or later and updated GUI for encryption functions. The publication also discusses support for data at rest encryption with Gemalto SafeNet KeySecure Version 8.3.2.
    Note: Online resource; Title from title page (viewed April 16, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Language: English
    Pages: 1 online resource (132 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Z has a close and unique relationship to its storage. Over the years, improvements to the Z processors and storage software, the disk storage systems, and their communication architecture consistently reinforced this synergy. This IBM Redpaper™ Redbooks publication summarizes and highlights the various aspects, advanced functions, and technologies that are often pioneered by IBM, and that make the IBM Z® and the IBM DS8880 products an ideal combination. This paper is intended for those users who have some familiarity with IBM Z and the IBM DS8000® series and want a condensed but comprehensive overview of the synergy items up to the IBM z14™ server and the IBM DS8880 Release 8.51 firmware.
    Note: Online resource; Title from title page (viewed April 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (181 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits.
    Note: Online resource; Title from title page (viewed August 29, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (57 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA’s Technical Guidelines and international standards can help DSPs achieve compliance
    Note: Online resource; Title from title page (viewed November 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (122 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication discusses on performance monitoring for IBM FlashSystem® storage products. The products reviewed are the IBM FlashSystem FS900, the IBM FlashSystem V9000, and the IBM FlashSystem A9000 and A9000R. For each of the FlashSystem devices, the paper reviews performance monitoring options. The first option is to use features available with the storage management software specific to the respective devices. The other option, which is the focus of this paper, is to use the IBM Spectrum™ Control solution. Using IBM Spectrum Control™ offers the advantage of having a common tool and unique interface to monitor most devices in your storage infrastructure. This paper explains how to take advantage of the many monitoring features and reporting options offered by IBM Spectrum Control. The paper also gives some guidance on how to set appropriate monitoring thresholds and alerts according to your environment.
    Note: Online resource; Title from title page (viewed May 3, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Language: English
    Pages: 1 online resource (112 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The IBM® DS8000® series includes the option to replace the locally based user ID and password authentication with a centralized directory-based approach. This IBM Redpaper™ publication helps DS8000 storage administrators understand the concepts and benefits of a centralized directory. It provides the information that is required for implementing a DS8000 authentication mechanism that is based on the Lightweight Directory Access Protocol (LDAP). Starting with DS8000 Release 7.5, directory-based authentication relies on IBM Copy Services Manager (CSM) that provides the interface (the CSM LDAP client) between the DS8000 and external LDAP servers.
    Note: Online resource; Title from title page (viewed March 16, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Language: English
    Pages: 1 online resource (62 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ publication provides an overview of containers and their framework. Container technology enables prepackaged and pre-configured software with the elements that are needed to run in any environment. Because they are meant to be portable, containers normally restrict applications from storing data on external storage. To overcome this limitation, IBM has developed a solution to provide persistent storage for containers on IBM storage systems, known as the IBM Storage Enabler for Containers. The Enabler tightly integrates with IBM Spectrum™ Connect (formerly IBM Spectrum Control™ Base Edition). IBM Storage Enabler for Containers v1.0 extends IBM Spectrum Connect to Kubernetes orchestrated container environments. The paper focuses on containers implementation, management, and control by using IBM Spectrum Connect and IBM Storage Enabler for Containers plug-in, with IBM FlashSystem® A9000 or A9000R.
    Note: Online resource; Title from title page (viewed April 10, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Language: English
    Pages: 1 online resource (64 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Ever-increasing storage demands have a negative effect on an organization's IT budget and complicate the overall storage infrastructure and management. Companies are looking at ways to use their storage resources more efficiently. Thin provisioning can help by reducing the amount of unused storage that is typically allocated to applications or users. Now available for the IBM® DS8880 for Fixed Block (FB) and Count Key Data (CKD) volumes, thin provisioning defers the allocation of actual space on the storage system until the time that the data must effectively be written to disk. This IBM Redpaper™ publication provides an overall understanding of how thin provisioning works on the IBM DS8880. It also provides insights into the functional design and its implementation on the DS8880 and includes illustrations for the configuration of thin-provisioned volumes from the DS GUI or the DS CLI. This edition applies to DS8880 Release 8.5 or later.
    Note: Online resource; Title from title page (viewed November 8, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780057
    Language: English
    Pages: 1 online resource (92 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The EU General Data Protection Regulation (GDPR) unifies data protection and unifies data protection across the EU. It applies to every organisation in the world that handles EU residents’ personal data – which includes schools. The Regulation introduces a number of key changes for schools – and the change from compliance with the Data Protection Act 1998 (DPA) to GDPR compliance is a complex one. We have revised our popular EU GDPR – A Pocket Guide to include specific expectations of and requirements for schools, and provide an accessible overview of the changes you need to make to comply with the Regulation. GDPR – A Pocket Guide Schools’ Edition sets out: A brief history of data protection and national data protection laws in the EU, including as the UK’s DPA); Explanations of the terms and definitions used in the GDPR; The key requirements of the GDPR; The need to appoint a data protection officer (DPO); The lawful basis of processing data and when consent is needed; How to comply with the Regulation; and A full index of the Regulation, enabling you to find relevant articles quickly and easily. This pocket guide is the ideal resource for anyone wanting a clear, concise primer on the GDPR.
    Note: Online resource; Title from title page (viewed September 17, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (64 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
    Note: Online resource; Title from title page (viewed November 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (54 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redpaper™ presents and positions the DS8882F. The DS8882F adds a modular rack-mountable enterprise storage system to the DS8880 family of all-flash enterprise storage systems. The modular system can be integrated into 16U contiguous space of an existing IBM z14™ Model ZR1 (z14 Model ZR1), IBM LinuxONE™ Rockhopper II (z14 Model LR1), or other standard 19-inch wide rack. The DS8882F allows you to take advantage of the performance boost of DS8880 all-flash enterprise systems and advanced features while limiting datacenter footprint and power infrastructure requirements.
    Note: Online resource; Title from title page (viewed December 6, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780705
    Language: English
    Pages: 1 online resource (87 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: This concise guide is essential reading for EU organisations wanting an easy to follow overview of the new regulation and the compliance obligations for handling data of EU citizens. The EU General Data Protection Regulation (GDPR) will unify data protection and simplify the use of personal data across the EU, and automatically supersedes member states domestic data protection laws. It will also apply to every organisation in the world that processes personal information of EU residents. The Regulation introduces a number of key changes for all organisations that process EU residents’ personal data. EU GDPR: A Pocket Guide provides an essential introduction to this new data protection law, explaining the Regulation and setting out the compliance obligations for EU organisations. This second edition has been updated with improved guidance around related laws such as the NIS Directive and the future ePrivacy Regulation. EU GDPR – A Pocket Guide sets out: A brief history of data protection and national data protection laws in the EU (such as the German BDSG, French LIL and UK DPA). The terms and definitions used in the GDPR, including explanations. The key requirements of the GDPR, including: Which fines apply to which Articles; The six principles that should be applied to any collection and processing of personal data; The Regulation’s applicability; Data subjects’ rights; Data protection impact assessments (DPIAs); The role of the data protection officer (DPO) and whether you need one; Data breaches, and the notification of supervisory authorities and data subjects; Obligations for international data transfers. How to comply with the Regulation, including: Understanding your data, and where and how it is used (e.g. Cloud suppliers, physical records); The documentation you need to maintain (such as statements of the information you collect and process, records of data subject consent, processes for protecting personal data); The “appropriate technical and organisational measures” you need to take to ensure your compliance with the Regulation. A full index of the Regulation, enabling you to find relevant Articles quickly and easily.
    Note: Online resource; Title from title page (viewed October 23, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices.
    Note: Online resource; Title from title page (viewed September 28, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (61 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
    Note: Online resource; Title from title page (viewed November 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780866
    Language: English
    Pages: 1 online resource (5943 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Information security means much more than a technology solution, and requires buy-in from senior managers and the collaboration of all staff in the organisation. By looking at ISO27001 and ISO27002 together, this pocket guide gives a wider view of what it means to implement an ISO27001 ISMS.
    Note: Online resource; Title from title page (viewed October 2, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780958
    Language: English
    Pages: 1 online resource (4427 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Cyber Essentials certification will provide numerous benefits, including the opportunity to tender for business where certification to the scheme may be a prerequisite.This pocket guide explains how to achieve certification to Cyber Essentials in a fast, effective and cost-effective manner.
    Note: Online resource; Title from title page (viewed October 18, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (36 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Copy Services Manager (CSM) is a replication management solution that is based on the IBM Tivoli® Productivity Center for Replication technology. CSM inherits all the Tivoli Productivity Center for Replication capabilities and continues to provide Copy Services solutions for most IBM storage offerings. The IBM DS8880, starting with firmware Release 8.1, Licensed Machine Code (LMC) 8.8.10.xx.xx, includes CSM for the IBM System Storage® DS8000®, which is pre-installed on the Hardware Management Console (HMC). If you ordered the CSM feature code as part of your IBM DS8000 system configuration, you only need to activate CSM. CSM as installed on the HMC, or acquired separately, includes a lightweight build of the IBM WebSphere® Liberty server code, to use to authenticate CSM users through a Lightweight Directory Access Protocol (LDAP). The same integrated LDAP support can be used for remote authentication of DS8000 users. Furthermore, if you simply want to take advantage of the CSM LDAP client for DS8000 LDAP authentication, the CSM license and CSM activation are not required. This IBM Redpaper™ publication describes the requirements for setup and usage of CSM on the DS8000 HMC, for both Copy Services management and LDAP authentication.
    Note: Online resource; Title from title page (viewed February 9, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289184
    Language: English , Spanish
    Pages: 1 online resource (83 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Data protection Standards ; Data protection Evaluation ; Electronic books ; local ; Protection de l'information (Informatique) ; Normes ; Protection de l'information (Informatique) ; Évaluation ; COMPUTERS ; Security ; General ; Data protection ; Standards ; Electronic books ; Electronic books ; Electronic books
    Abstract: Proteja la información de su organización con la ISO27001:2013 La información es uno de los recursos más importantes de su organización y mantener esa información segura es vital para su negocio. Esta guía de bolsillo útil es una visión de conjunto esencial sobre las dos normas de la seguridad de la información clave que cubren los requisitos formales (ISO27001:2013) para crear un Sistema de Gestión de la Seguridad de la Información (SGSI) y las recomendaciones de mejores prácticas (ISO27002:2013) para aquellos responsables de iniciar, implementar o mantenerlo. Un SGSI basado en la ISO27001/ISO27002 ofrece un sinfín de beneficios: Eficacia mejorada implantando procedimientos y sistemas de seguridad de la información, que le permiten concentrarse en su actividad empresarial principal. Protege sus activos de información de un amplio abanico de ciberamenazas, actividad criminal, compromiso de información privilegiada y fallo del sistema. Gestione sus riesgos sistemáticamente y establezca planes para eliminar o reducir las ciberamenazas. Permite la detección temprana de amenazas o errores de procesamiento y una solicuón más rápida ¿Siguiente paso para la certificación? Puede organizar una auditoría independiente de su SGSI frente a las especificaciones de la ISO27001 y, si su SGSI se ajusta, finalmente logra la certificación acreditada. Publicamos una variedad de libros y herramientas de documentación del SGSI (como Nueve pasos para el éxito) para ayudarle a lograr esto. Índice La familia de normas de la seguridad de la información ISO-/IEC 27000; Historia de las Normas; Especificación frente al Código de Prácticas; Proceso de certificación; El SGSI y la ISO27001; Visión de conjunto de la ISO/IEC 27001:2013; Visión de conjunto de la ISO/IEC 27002:2013; Documentación y registros; Responsabilidad de la gestión; Enfoque del proceso y el ciclo PDCA; Contexto, política y alcance; Evaluación del riesgo; La declaración de aplicabilidad (SoA); Implementación; 15. Verificar y actuar; Revisión gerencial; ISO27001; Anexo A Acerca del autor Alan Calder es el fundador y presidente ejecutivo de IT Governance Ltd, una empresa de información, asesoramiento y consultoría que ayuda a los consejos de administración de empresas a abordar problemas de gobierno de TI, gestión del riesgo, cumplimiento y seguridad de la información. Tiene muchos años de experiencia en alta gerencia en los sectores públicos y privados. Una guía de bolsillo que proporciona una visi...
    Note: Online resource; Title from title page (viewed June 1, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289108
    Language: English , German
    Pages: 1 online resource (88 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Schützen Sie die Informationen Ihrer Organisation mit ISO27001:2013 Informationen gehören zu den wichtigsten Ressourcen Ihrer Organisation und ihre Sicherheit ist überlebenswichtig für Ihr Geschäft. Dieser praktische Taschenführer bietet einen grundlegenden Überblick über die beiden wichtigsten Informationssicherheitsstandards mit den formalen Anforderungen (ISO27001:2013) zum Erstellen eines Informationssicherheit-Managementsystems (ISMS) sowie Empfehlungen zu besten Verfahren (ISO27002:2013) für alle jenen, die dieses Einführen, Umsetzen oder Verwalten müssen. Ein auf der Norm ISO27001/ISO27002 basierendes ISMS bietet zahlreiche Vorteile: Verbessern Sie Ihre Effizienz durch Informationssicherheitssysteme und vorgehensweisen, dank derer Sie sich auf ihr Kerngeschäft konzentrieren können Schützen Sie Ihre Informationswerte vor einer Reihe von Cyber-Bedrohungen, krimineller Aktivitäten, Gefährdungen durch Insider und Systemausfälle Managen Sie Ihre Risiken systematisch und erstellen Sie Pläne zum Beseitigen oder Verringern von Cyber-Bedrohungen Erkennen Sie Bedrohungen oder Prozessfehler eher und beheben Sie sie schneller Der nächste Schritt zur Zertifizierung? Sie können einen unabhängigen Audit Ihres ISMS anhand der Spezifikationen der Norm ISO27001 vornehmen lassen und, wenn dieser die Konformität Ihres ISMS bestätigt, unter Umständen einen akkreditierte Zertifizierung erhalten. Wir veröffentlichen eine Reihe von Toolkits und Büchern zum Thema ISMS (wie „Nine Steps to Success“), die Sie dabei unterstützen. Inhalt Die ISO/IEC 27000 Familie von Informationssicherheitsstandards; Hintergrund der Normen; Unterschied Spezifikation - Leitfaden; Zertifizierungsprozess; Die ISMS und ISO27001; Überblick über ISO/IEC 27001:2013; Überblick über ISO/IEC 27002:2013; Dokumente und Aufzeichnungen; Führungsverantwortung; Prozessansatz und PDCA-Zyklus; Kontext, Politik und Anwendungsbereich; Risikobeurteilung; Die Erklärung zur Anwendbarkeit; Umsetzung; Überprüfung und Handeln; Managementprüfung; ISO27001 Anhang A; Über den Autor Alan Calder ist Gründer und Vorstandsvorsitzender der IT Governance Ltd, ein Informations-, Analyse- und Beratungsunternehmen, das Unternehmen bei der Verwaltung von IT-Governance-, Risikomanagement-, Compliance- und Informationssicherheitsfragen unterstützt. Er verfügt über eine langjährige Erfahrung im Senior Management im privaten und öffentlichen Sektor. Dieser praktische Taschenführer bietet einen grundlegenden Übe...
    Note: Online resource; Title from title page (viewed April 11, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Language: English
    Pages: 1 online resource (30 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Data is the currency of the new economy, and organizations are increasingly tasked with finding better ways to protect, recover, access, share, and use it. IBM Spectrum™ Copy Data Management is aimed at using existing data in a manner that is efficient, automated, scalable. It helps you manage all of those snapshot and IBM FlashCopy® images made to support DevOps, data protection, disaster recovery, and Hybrid Cloud computing environments. This IBM® Redpaper™ publication specifically addresses IBM Spectrum Copy Data Management in combination with IBM FlashSystem® A9000 or A9000R when used for Automated Disaster Recovery of SAP HANA.
    Note: Online resource; Title from title page (viewed August 29, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849288613
    Language: English , French
    Pages: 1 online resource (98 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Une amorce claire et concise sur le règlement général sur la protection des données Le règlement général sur la protection des données va unifier la protection des données et faciliter la circulation des données personnelles dans l'UE quand il entre en vigueur en mai 2018, et il sera applicable à toutes les organisations dans le monde qui font des affaires avec les résidents de l'UE. Le règlement introduit un certain nombre de changements importants pour les organisations. RGPD UE: Guide de poche donne un aperçu accessible des changements que vous devez faire dans votre organisation pour se conformer à la nouvelle loi. Product overview RGPD UE : Guide de poche énonce: Une brève histoire de la protection des données et les lois nationales sur la protection des données dans l'UE (tels que le DPA du Royaume-Uni, le BDSG allemand et la loi informatique et libertés française). Les termes et les définitions utilisées dans le règlement général sur la protection des données, y compris les explications. Les principales exigences du règlement général sur la protection des données, y compris: Quelles amendes appliquer à quels articles; Les six principes qui devraient être appliqués à toute collecte et le traitement des données personnelles; L'applicabilité du règlement; Les droits des personnes concernées; Les études d'impact sur la protection des données; Le rôle de l'agent de la protection des données DPO et si vous en avez besoin; Les violations de données, et la notification des autorités de contrôle et les personnes concernées; Les obligations pour les transferts internationaux de données. Comment se conformer au règlement, y compris: Comprendre vos données, et où et comment elles sont utilisées (par exemple, les fournisseurs de Cloud, disques physiques); La documentation que vous devez maintenir (comme les déclarations de l'information que vous recueillez et traitez, les dossiers de consentement des personnes concernées, les processus de la protection des données personnelles); Les "mesures techniques et organisationnelles appropriées" que vous devez prendre pour assurer votre conformité avec le règlement. Un index complet du Règlement général sur la protection des données, qui vous permette de trouver les articles pertinents rapidement et facilement. Alan Calder, le fondateur et président exécutif du IT Governance Ltd, est un expert de la cyber-sécurité reconnu internationalement et un auteur de premier plan sur la sécurité de l'information et...
    Note: Online resource; Title from title page (viewed January 17, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289306
    Language: English , Spanish
    Pages: 1 online resource (139 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Orientación paso a paso sobre la implementación de la ISO 27001 con éxito En lenguaje sencillo y nada técnico, esta guía le llevará por los pasos clave de un proyecto de la ISO 27001 para asegurar su éxito, desde el comienzo a la certificación: Encargo del proyecto Inicio del proyecto Inicio del SGSI Marco de la gestión Criterios de seguridad de referencia Gestión del riesgo Implementación Medición, monitorización y revisión Certificación Ahora en esta tercera edición y alineada con la ISO 27001:2013, esta guía es ideal para cualquiera que emprenda la norma por primera vez. "Es como tener un consultor de $300/h codo con codo mientras considera los aspectos de obtener apoyo de la gerencia, la planificación, el alcance, la comunicación, etc." Thomas F. Witwicki Con este libro, averiguará cómo: Conseguir apoyo de la gerencia y mantener la atención del consejo; Crear un marco de gestión y realizar un análisis de las deficiencias, para que pueda entender claramente los controles que ya tiene implantados e identificar dónde tiene que centrar sus esfuerzos; Estructurar y conseguir recursos para su proyecto, incluido le asesoramiento sobre si utilizar consultores o hacerlo usted mismo, y un examen de las herramientas y recursos disponibles que harán su trabajo más fácil; Llevar a cabo una evaluación del riesgo en cinco pasos, y crear una Declaración de aplicabilidad y un plan de tratamiento del riesgo; Integrar su SGSI de la ISO 27001 con un SGC de la ISO 9001 y otros sistemas de calidad; Abordar los retos de la documentación que afrontará cuando cree políticas empresariales, procedimientos, instrucciones de trabajo y registros, incluidas alternativas viables para un enfoque de prueba y error costoso; Mejorar continuamente su SGSI, incluida la auditoría y prueba internas, y la revisión gerencial; Este título le dará la orientación que necesita para entender los requisitos de la norma y asegurarse de que su proyecto de implementación sea un éxito, lo cual incluye los seis secretos para un éxito de certificación. Experiencia Lograr y mantener una certificación acreditada con la ISO 27001, la norma internacional que expone los requisitos de un SGSI, puede ser una tarea complicada, especialmente para los implementadores que sean nuevos con la norma. El autor, Alan Calder, conoce la ISO 27001 al derecho y al revés: es el fundador y presidente ejecutivo de IT Governance, y dirigió la implementación del primer sistema de gestión en lograr u...
    Note: Online resource; Title from title page (viewed June 8, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289221
    Language: English , French
    Pages: 1 online resource (139 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Guide étape par étape vers une mise en œuvre réussie de la norme ISO 27001 Rédigé dans un langage pratique et non technique, ce guide vous guidera au travers des étapes clés d'un projet ISO 27001 afin d'en assurer le succès - de la création à la certification: Mandat du projet Lancement du projet Lancement du SMSI Cadre de management Critères de sécurité de base Gestion du risque Mise en œuvre Mesures, surveillance et réexamen Certification Aujourd'hui dans sa troisième édition et conforme à l'ISO 27001:2013, ce guide est idéal pour toute personne qui aborderait cette norme pour la première fois. « C'est comme avoir un consultant à 300 $/heure sous la main lorsque vous abordez les différentes questions relatives à la planification, au domaine d'application, à la communication, à la façon d'obtenir l'appui de la direction, etc. » Thomas F. Witwicki Avec ce livre, vous découvrirez comment: Obtenir le soutien de la direction et garder l'attention du conseil d'administration; Créer un cadre de gestion et effectuer une analyse des manques, afin de pouvoir clairement comprendre les contrôles que vous avez déjà mis en place et identifier où concentrer vos efforts; Structurer et mettre en valeur votre projet - y compris des conseils pour faire appel à des consultants ou le faire vous-même, et un examen des outils et des ressources disponibles qui faciliteront votre travail; Mener une évaluation des risques en cinq étapes et établir une déclaration d'applicabilité ainsi qu'un plan de traitement des risques; Intégrer votre SMSI ISO 27001 à un SGQ ISO 9001 et à d'autres systèmes de gestion; Répondre aux défis que vous devrez relever en matière de documentation lorsque vous créez des politiques d'entreprise, des procédures, des instructions de travail et des enregistrements : dont des alternatives viables à une approche coûteuse par « essais et erreurs » ; Améliorer continuellement votre SMSI, y compris par des audits et des tests internes, et l'examen par la direction; Cet ouvrage vous offrira les conseils dont vous avez besoin pour comprendre les exigences de la norme et vous assurer que votre projet de mise en œuvre est un succès. Il comprend six secrets pour une certification réussie. Historique L'obtention et le maintien d'une certification accréditée selon la norme ISO 27001, la norme internationale qui établit les exigences d'un SMSI, peut s'avérer une tâche compliquée, en particulier pour les responsables de la mise en œuvre qui d...
    Note: Online resource; Title from title page (viewed April 20, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289061
    Language: English , French
    Pages: 1 online resource (84 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Protégez l'information de votre organisation grâce à l'ISO27001 :2013 L'information est l'une des ressources les plus importantes de votre organisation, et la conservation de cette information est vitale pour votre entreprise Ce guide de poche pratique est un aperçu essentiel de deux normes clés en matière de sécurité de l'information, il couvre les exigences formelles (ISO27001:2013) pour la création d'un système de management de la sécurité de l'information (SMSI), ainsi que les recommandations des meilleures pratiques (ISO27002:2013) pour les responsables du lancement, de la mise en œuvre ou du suivi. Un SMSI se basant sur l'ISO27001/ISO27002 offre une foule d'avantages: Une amélioration de l'efficacité, en mettant en place des systèmes et des procédures de sécurité de l'information vous permettant de vous concentrer davantage sur votre activité principale. Il protège vos actifs d'information d'un large éventail de cyber-attaques, d'activités criminelles, de compromis internes et de défaillance du système. Gérez vos risques de façon systémique et établissez des plans pour éliminer ou réduire les menaces cybernétiques. Il permet une détection plus rapide des menaces ou des erreurs de traitement, et une résolution plus rapide. Prochaine étape vers la certification ? Vous pouvez organiser un audit indépendant de votre SMSI en fonction des spécifications de l'ISO27001 et, si votre SMSI est conforme, obtenir éventuellement une certification accréditée. Nous publions une série de boîtes à outils de documentations et des ouvrages sur le SMSI (tels que Neuf étapes vers le succès) pour vous aider à atteindre cet objectif. Sommaire La famille ISO/CEI 27000 des normes de sécurité de l'information ; Historique des normes ; Spécification ou Code de bonne pratique ; Procédure de certification ; Le SMSI et l'ISO27001 ; Aperçu de l'ISO/CEI 27001 :2013 ; Aperçu de l'ISO/CEI 27002 :2013 ; Documentation et enregistrements ; Responsabilités du management ; Approche procédurale et cycle PDCA ; Contexte, politique et domaine d'application ; Évaluation des risques ; La Déclaration d'Applicabilité ; Mise en œuvre ; Contrôler et agir ; Examen par le management ; ISO27001 Annexe A Concernant l'auteur Alan Calder est le fondateur et le président exécutif d'IT Governance Ltd, un cabinet d'information, d'avis et de conseils qui aide les conseils d'administration des entreprises à s'attaquer aux questions de gouvernance informatique, de gestion des risques,...
    Note: Online resource; Title from title page (viewed April 11, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Protect your organisation's information assets using ISO27001:2013 Information is one of your organisation's most important resources. Keeping it secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it. Furthering the objectives of your organisation Information security means much more than a technology solution, and requires buy-in from senior managers and the collaboration of all staff in the organisation. For this reason, ISO27001 is not a one-size-fits solution, nor is it designed to be a static, fixed entity. By looking at ISO27001 and ISO27002 together, this pocket guide gives a wider view of what it means to implement an ISO27001 ISMS. Creating an ISMS based on ISO27001/ISO27002 will help you to: Improve efficiency by having systems and procedures in place that mean people spend less time 'fire-fighting' and reacting in an ad-hoc way to security incidents. Protect your information assets from a wide range of cyber threats, such as criminal activity and fraud, user errors, outside attack, insider compromise and system failure. Manage risk systematically and put in place a plan to eliminate or reduce cyber threats to your organisation. Prepare for the worst as ISO27001 requires you to monitor information security events, enabling earlier detection of threats or processing errors, and faster resolution. Completely up to date with the latest 2013 release of ISO27001, ISO27001/ISO27002: A Pocket Guide covers: The ISO/IEC 27000:2013 family of information security standards Background to the standards certification process The ISMS and ISO27001:2013 Specification vs. Code of Practice Documentation & Records Management Responsibility Policy & Scope Risk Assessment Implementation Continual Improvement Next step to certification? If your ISMS conforms to the specification of ISO27001, you can arrange for an independent audit of the ISMS against that specification and eventually achieve certification. We publish a range of ISMS documentation toolkits and books such as Nine Steps to Success, to help you do this. Buy this book and start securing your information assets today
    Note: Online resource; Title from title page (viewed October 3, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (98 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Take your first step with Nine Steps Completely up to date with ISO27001:2013, this is the new edition of the original no-nonsense guide to successful ISO27001 certification. Ideal for anyone tackling ISO27001 for the first time, Nine Steps to Success outlines the nine essential steps to an effective ISMS implementation. Nine critical steps that mean the difference between project success and abject failure. Step-by-step advice for ISO27001: 2013 project success Based on his many years of first-hand experience with ISO27001, Alan Calder covers every single element of the ISO27001 project in simple, non-technical language, including: how to get management and board buy-in how to get cross-organizational, cross functional buy-in the gap analysis: how much do you really need to do? how to integrate with ISO9001 and other management systems how to structure and resource your project use consultants or do it yourself? the timetable and project plan risk assessment methodologies and tools the documentation challenges how to choose a certification body Read this book and discover the secrets of successful ISO27001:2013 certification
    Note: Online resource; Title from title page (viewed October 3, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (64 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams. Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills. This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives. How this book can help information security professionals: Understand basic sales techniques Find out what to do to capture the attention of management and win them over Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing. Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success. Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives. Improve your powers of persuasion with the board ... Buy this pocket guide today!
    Note: Online resource; Title from title page (viewed June 24, 2010) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (62 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: A Green office is a cost-effective office! Understand why with this handy reference guide!
    Note: Online resource; Title from title page (viewed March 5, 2009) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (95 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Invaluable advice on information security in clear, accessible language! Are you making it too easy for online fraudsters to steal from your company? IT is opening up new opportunities for your business. It also offers rich pickings for the criminal. The new threat When legitimate business goes digital, organised crime cannot be far behind. So, once your business is connected to the Internet, you become vulnerable to a whole range of new threats. Hackers can break into your computer, using dictionary attacks or keystroke logging to seize the password to your email account. ; Criminals may send you emails in an attempt to trick you into downloading malicious software or to reveal your bank details. Online fraud may now be as valuable to organised crime as drug trafficking, and there are roughly 200,000 viruses, Trojans and worms circulating in cyberspace. All this means that in today's world, the bad guys are only a mouse-click away. What you can do Your business information is valuable, so it is in your interest to protect it. You also have a responsibility towards your customers. While information security breaches are costly in themselves, you also have to think about what exposing your customers to the danger of identity theft might do to your company's reputation. Sometimes these issues seem complex and bewildering. The good news is that you can take some simple steps that will help to secure your business's digital information. Common-sense precautions, like not leaving your laptop lying around in a public place, or protecting your wireless network with a firewall, make a real difference. Speaking your language If IT is not your speciality, and you are running a small business that is connected to the Internet, then this book is for you. The author steers clear of geek language, and offers you, in plain English, ten simple rules to keep you out of trouble online. The damage and losses that result from online fraud can run into thousands of pounds, so this could well be the most valuable books you ever buy! Benefits to business include: Retain customer confidence If you cannot protect your customer data, then you will leave it exposed to hackers and thieves. Breaches in your information security will not only alienate existing customers, but also scare other potential customers away. To protect the reputation of your company, you need to get up to speed on information security. Avoid fines and lawsuits If you are running a business, you ha...
    Note: Online resource; Title from title page (viewed July 1, 2008) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (49 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Understand ISO 38500: the standard for the corporate governance of IT ISO/IEC38500 is the international standard for the corporate governance of information and communication technology. The purpose of the standard is to create a framework to ensure that the Board is appropriately involved in the governance of the organisation's IT. The standard sets out guiding principles for directors on how to ensure the effective, efficient and acceptable use of IT within their company. This useful pocket guide provides an account of the scope and objectives of the standard. It outlines the standard's six core principles, sets out the three major tasks that the standard assigns to directors regarding IT, and explains the interrelationship between the two. The guide also offers advice on how to set up and implement the IT governance framework. Business benefits of ISO/IEC 38500 (ISO38500) include: Manage the organisation's investment in IT responsibly The pocket guide shows how the standard can be used to ensure that your decision making about IT investment remains clear and transparent, and that the associated risks are clearly understood. Meet compliance requirements ISO/IEC38500 requires directors to verify that their IT systems are in compliance with all applicable regulations. As this pocket guide explains, following the procedures set out in ISO/IEC38500 will help company directors both to achieve and demonstrate compliance. Improve the performance of the organisation On average, investment in IT represents more than 50 per cent of every organisation's annual capital investment. Both private and public sector organisations need to maintain a high standard of service while at the same time keeping costs low. The pocket guide looks at how following the guidance contained in ISO/IEC38500 can enable directors to retain a grip on costs and obtain better value for money from IT equipment. Introduce effective project governance This pocket guide describes how ISO/IEC38500 can help company directors to identify problems in an IT project at an early stage. In this way, the standard promotes effective management of the risks associated with major IT projects, enables the board to keep a grip on budgets and militates against project failure. Implement ISO38500, the international standard for corporate governance of IT An IT governance framework serves to close the gap between the importance of IT and the understanding of IT. For this reason, you can use an IT go...
    Note: Online resource; Title from title page (viewed July 31, 2008) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...