Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • MPI Ethno. Forsch.  (46)
  • 2015-2019  (46)
  • 1960-1964
  • Calder, Alan  (26)
  • Parziale, Lydia  (20)
  • Electronic books ; local  (46)
Datenlieferant
  • MPI Ethno. Forsch.  (46)
Materialart
Sprache
Erscheinungszeitraum
Jahr
  • 1
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (270 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This IBM® Redbooks® publication provides information to help clients that have JES3 and want to migrate to JES2. It provides a comprehensive list of the differences between the two job entry subsystems and provides information to help you determine the migration effort and actions. This book considers the features of JES2 as available on releases of IBM z/OS® V2R3 and V2R4. It should be used with JES3 to JES2 Migration Considerations, SG24-8083. This publication is divided into three parts: Part 1, "Planning to migrate from JES3 to JES2" on page 1, gives you information to make the decision and plan your migration. Part 2, "Use case study" on page 111, provides a Use Case Study that is based on an actual customer experience in a successful migration. Part 3, "Appendixes" on page 193, provides an appendix with sample tools that can help the migration process and exploitation of some of the new JES2 functions. This book is aimed at operations personnel, system programmers, and application developers
    Anmerkung: Online resource; Title from title page (viewed November 6, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: First edition.
    Serie: IBM redbooks
    Schlagwort(e): Database management ; Client/server computing ; Application software ; Development ; Electronic books ; Electronic books ; local
    Kurzfassung: Abstract What is the difference between a virtual machine and a Docker container? A virtual machine (VM) is like a house. It is fully contained with its own plumbing and heating and cooling system. If you want another house, you build a new foundation, with new walls, new plumbing, and its own heating and cooling system. VMs are large. They start their own operating systems. Containers are like apartments in an apartment building. They share infrastructure. They can be many different sizes. You can have different sizes depending on the needs. Containers "live" in a Docker host. If you build a house, you need many resources. If you build an apartment building, each unit shares resources. Like an apartment, Docker is smaller and satisfies specific needs, is more agile, and more easily changed. This IBM® Redbooks® publication examines the installation and operation of Docker Enterprise Edition on the IBM Z® platform.
    Anmerkung: Number on resource description page: SG24842900. - "IBM Z.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 7, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Sprache: Englisch
    Seiten: 1 online resource (256 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments.
    Anmerkung: Online resource; Title from title page (viewed August 1, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (356 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This IBM® Redbooks® publication presents an overview of the IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) offerings and the roles they play in delivering a business IT resilience solution. The book begins with general concepts of business IT resilience and disaster recovery, along with issues related to high application availability, data integrity, and performance. These topics are considered within the framework of government regulation, increasing application and infrastructure complexity, and the competitive and rapidly changing modern business environment. Next, it describes the GDPS family of offerings with specific reference to how they can help you achieve your defined goals for disaster recovery and high availability. Also covered are the features that simplify and enhance data replication activities, the prerequisites for implementing each offering, and tips for planning for the future and immediate business requirements. Tables provide easy-to-use summaries and comparisons of the offerings. The extra planning and implementation services available from IBM also are explained. Then, several practical client scenarios and requirements are described, along with the most suitable GDPS solution for each case. The introductory chapters of this publication are intended for a broad technical audience, including IT System Architects, Availability Managers, Technical IT Managers, Operations Managers, System Programmers, and Disaster Recovery Planners. The subsequent chapters provide more technical details about the GDPS offerings, and each can be read independently for those readers who are interested in specific topics. Therefore, if you read all of the chapters, be aware that some information is intentionally repeated.
    Anmerkung: Online resource; Title from title page (viewed May 6, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (68 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This book was written by IBM® IT specialists who have experience implementing Linux solutions on IBM LinuxONE™ (LinuxONE). The contents of this book follow the guidelines from Linux regarding LinuxONE installations. The preferred practices that are described in this book are gathered from the experiences of those specialists in hundreds of projects at IBM and customer environments. This IBM Redbooks® publication provides you with the information needed in making a decision on scaling architecture when implementing Linux on LinuxONE. This book has the following goals: To inform you about x86 sprawl problems To inform you that x86 Vertical Scale out architectures are problematic going forward To provide solutions to x86 server sprawl problems To inform you about the LinuxONE solution for each x86 server sprawl problem To provide virtulization and security options for LinuxOne The scaling up and scaling out architectures enable you to scale the capacity of an existing system to accommodate sporadic application demands or application workloads. This provides some freedom to operate in the environment. However, if this activity is performed without correct planning and the correct architecture choice, it leads to server sprawl where your environment houses more servers than it should based on its current and predicted requirements. This can potentially cause your enterprise to both waste resources and increase costs. Although scaling out on x86 systems is a common form of growth because of inexpensive x86 systems, the scale out can easily become a problem in terms of total cost of ownership (TCO) when the environment starts to increase the number of physical servers and the resources needed to maintain them. LinuxONE servers solve the sprawl problem caused by the scaling out of x86 servers, and are an excellent choice for cloud, mobile, big data, blockchain, analytics, and other workloads that require a robust and flexible environment. This publication describes the advantages and disadvantages of the LinuxONE scaling option. The audience for this publication consists of the following groups: Customers, IBM Business Partners, IT architects and IT Specialists planning and installing Linux on LinuxONE System administrators managing the Linux Systems
    Anmerkung: Online resource; Title from title page (viewed July 17, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787781702
    Sprache: Englisch
    Seiten: 1 online resource (42 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles.
    Anmerkung: Online resource; Title from title page (viewed September 26, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (58 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This pocket guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource. It will teach you how to protect your customers' cardholder data with best practice from the Standard.
    Anmerkung: Online resource; Title from title page (viewed September 5, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (66 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: LinuxONE is a hardware system designed to support and exploit the Linux operating system based on the value of its unique underlying architecture. LinuxONE can be used within a private and multi-cloud environment to support a range of workloads and service a variety of needs. On LinuxONE, security is built into both the hardware and software. This IBM® Redpaper publication gives a broad understanding of how to leverage the various security features that exploit and complement the LinuxONE hardware security features, such as these: Hardware accelerated encryption of data, delivered with near-zero overhead by the on-chip Central Processor Assist for Cryptographic Function (CPACF) and a dedicated Crypto Express adapter. Virtualization and industry leading isolation capabilities with PR/SM, EAL 5+ LPARs, DPM, KVM, and IBM z/VM®. The IBM Secure Service Container technology, which provides workload isolation, restricted administrator access, and tamper protection against internal threats, including from systems administrators. Other technologies that exploit LinuxONE security capabilities and deeper dives into practical use cases for these technologies. This IBM Redpaper publication was written for IT executives, architects, specialists, security administrators, and others who consider security when using LinuxONE.
    Anmerkung: Online resource; Title from title page (viewed October 16, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (181 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits.
    Anmerkung: Online resource; Title from title page (viewed August 29, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780743
    Sprache: Englisch
    Seiten: 1 online resource (76 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This concise guide is essential reading for US organizations wanting an easy to follow overview of the GDPR and the compliance obligations for handling data of EU citizens, including guidance on the EU-U.S. Privacy Shield.
    Anmerkung: Online resource; Title from title page (viewed October 15, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    ISBN: 9780738458151
    Sprache: Englisch
    Seiten: 1 online resource (272 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: IBM® z/OS® Container Extensions (IBM zCX) is a new feature of the next version of the IBM z/OS Operating System (z/OS V2.4). It makes it possible to run Linux on IBM Z® applications that are packaged as Docker container images on z/OS. Application developers can develop, and data centers can operate, popular open source packages, Linux applications, IBM software, and third-party software together with z/OS applications and data. This IBM Redbooks® publication helps you to understand the concepts, business perspectives and reference architecture for installing, tailoring, and configuring zCX in your own environment.
    Anmerkung: Online resource; Title from title page (viewed November 22, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780705
    Sprache: Englisch
    Seiten: 1 online resource (87 pages)
    Ausgabe: 2nd edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This concise guide is essential reading for EU organisations wanting an easy to follow overview of the new regulation and the compliance obligations for handling data of EU citizens. The EU General Data Protection Regulation (GDPR) will unify data protection and simplify the use of personal data across the EU, and automatically supersedes member states domestic data protection laws. It will also apply to every organisation in the world that processes personal information of EU residents. The Regulation introduces a number of key changes for all organisations that process EU residents’ personal data. EU GDPR: A Pocket Guide provides an essential introduction to this new data protection law, explaining the Regulation and setting out the compliance obligations for EU organisations. This second edition has been updated with improved guidance around related laws such as the NIS Directive and the future ePrivacy Regulation. EU GDPR – A Pocket Guide sets out: A brief history of data protection and national data protection laws in the EU (such as the German BDSG, French LIL and UK DPA). The terms and definitions used in the GDPR, including explanations. The key requirements of the GDPR, including: Which fines apply to which Articles; The six principles that should be applied to any collection and processing of personal data; The Regulation’s applicability; Data subjects’ rights; Data protection impact assessments (DPIAs); The role of the data protection officer (DPO) and whether you need one; Data breaches, and the notification of supervisory authorities and data subjects; Obligations for international data transfers. How to comply with the Regulation, including: Understanding your data, and where and how it is used (e.g. Cloud suppliers, physical records); The documentation you need to maintain (such as statements of the information you collect and process, records of data subject consent, processes for protecting personal data); The “appropriate technical and organisational measures” you need to take to ensure your compliance with the Regulation. A full index of the Regulation, enabling you to find relevant Articles quickly and easily.
    Anmerkung: Online resource; Title from title page (viewed October 23, 2018) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (102 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: With the pressures to drive transaction processing 24/7 because of online banking and other business demands, IBM® zHyperLink on the IBM DS8880 is making it easy to accelerate transaction processing for the mainframe. This IBM Redpaper™ publication helps you to understand the concepts, business perspectives, and reference architecture of installing, tailoring, and configuring zHyperLink in your own environment.
    Anmerkung: Online resource; Title from title page (viewed August 2, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780057
    Sprache: Englisch
    Seiten: 1 online resource (92 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: The EU General Data Protection Regulation (GDPR) unifies data protection and unifies data protection across the EU. It applies to every organisation in the world that handles EU residents’ personal data – which includes schools. The Regulation introduces a number of key changes for schools – and the change from compliance with the Data Protection Act 1998 (DPA) to GDPR compliance is a complex one. We have revised our popular EU GDPR – A Pocket Guide to include specific expectations of and requirements for schools, and provide an accessible overview of the changes you need to make to comply with the Regulation. GDPR – A Pocket Guide Schools’ Edition sets out: A brief history of data protection and national data protection laws in the EU, including as the UK’s DPA); Explanations of the terms and definitions used in the GDPR; The key requirements of the GDPR; The need to appoint a data protection officer (DPO); The lawful basis of processing data and when consent is needed; How to comply with the Regulation; and A full index of the Regulation, enabling you to find relevant articles quickly and easily. This pocket guide is the ideal resource for anyone wanting a clear, concise primer on the GDPR.
    Anmerkung: Online resource; Title from title page (viewed September 17, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (26 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: IBM LinuxONE™ is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It is designed to run more transactions faster and with more security and reliability specifically for the open community. It fully embraces open source-based technology. This IBM® Redbooks® publication provides a technical sample workbook for IT organizations that are considering a migration from their x86 distributed servers to IBM LinuxONE. This book provides you with checklists for each facet of your migration to IBM LinuxONE. This IBM Redbooks workbook assists you by providing the following information: Choosing workloads to migrate Analysis of how to size workloads for migration Financial benefits of a migration Project definition Planning checklists
    Anmerkung: Online resource; Title from title page (viewed April 16, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (164 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: The ABCs of IBM® z/OS® System Programming is an 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you would like to become more familiar with z/OS in your current environment, or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection will serve as a powerful technical tool. This IBM Redbooks® publication, Volume 10, provides an introduction to IBM z/Architecture®, IBM z14 processor design, IBM Z connectivity, LPAR concepts and Hardware Configuration Definition (HCD). The contents of all the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, IBM Language Environment® Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, z14 processor design, IBM Z connectivity, LPAR concepts, and HCD Volume 11: Capacity planning, performance management, WLM, IBM RMF™, and SMF Volume 12: WLM Volume 13: JES3, JES3 SDSF
    Anmerkung: Online resource; Title from title page (viewed May 4, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (61 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
    Anmerkung: Online resource; Title from title page (viewed November 1, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (78 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices.
    Anmerkung: Online resource; Title from title page (viewed September 28, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (64 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
    Anmerkung: Online resource; Title from title page (viewed November 1, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (57 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA’s Technical Guidelines and international standards can help DSPs achieve compliance
    Anmerkung: Online resource; Title from title page (viewed November 1, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849289511 , 1849289514
    Sprache: Englisch
    Seiten: 1 online resource (1 volume)
    Ausgabe: North American edition.
    Schlagwort(e): Computer security ; Management ; Computer security ; Standards ; Data protection ; Standards ; Electronic books ; Electronic books ; local
    Kurzfassung: Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard that sets out the requirements of an information security management system (ISMS) - a holistic approach to information security that encompasses people, processes, and technology. Accredited certification to the Standard is recognized worldwide as the hallmark of best-practice information security management. Achieving and maintaining accredited certification to ISO 27001 can be complicated, especially for those who are new to the Standard. Author of Nine Steps to Success - An ISO 27001 Implementation Overview, Alan Calder is the founder and executive chairman of IT Governance. He led the world's first implementation of a management system certified to BS 7799, the forerunner to ISO 27001, and has been working with the Standard ever since. Hundreds of organizations around the world have achieved accredited certification to ISO 27001 with IT Governance's guidance, which is distilled in this book. Successfully implement ISO 27001 with this must-have guide Aligned with the latest iteration of ISO 27001:2013, the North American edition of Nine Steps to Success - An ISO 27001 Implementation Overview is ideal for anyone tackling ISO 27001 for the first time. In nine critical steps, the guide covers each element of the ISO 27001 project in simple, non-technical language. There is a special focus on how US organizations can tackle this governance. This book offers guidance throughout implementation: Getting management support and keeping the board's attention. Creating a management framework and performing a gap analysis so that you can clearly understand the controls you already have in place, and identify where you need to focus. Structuring and resourcing your project, including advice on whether to use a consultant or do it yourself, and examining the tools and resources that will make your job easier. Conducting a five-step risk assessment, and creating a Statement of Applicability (SoA) and risk treatment plan (RTP). Guidance on integrating your ISO 27001 ISMS with an ISO 9001 quality management system (QMS) and other management systems. Addressing the documentation challenges you'll face as you create business policies, procedures, work instructions, and records - includin...
    Anmerkung: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 1, 2018)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849288651
    Sprache: Deutsch
    Seiten: 1 online resource (1 volume) , illustrations
    Schlagwort(e): Data protection ; Law and legislation ; European Union countries ; Privacy, Right of ; European Union countries ; Computer security ; Law and legislation ; Electronic books ; Electronic books ; local
    Kurzfassung: Eine klare, prägnante Einführung zur EU-Datenschutz-Grundverordnung (DSGVO) Die EU-Datenschutzrichtlinie wird den Datenschutz vereinheitlichen und den Datenverkehr in der gesamten EU vereinfachen, wenn sie im Mai 2018 in Kraft tritt und für jede Organisation auf der Welt, die mit EU-Bürgern geschäftlich zu tun hat, zur Anwendung gelangen. Die Verordnung hat eine Reihe wichtiger Änderungen für Organisationen eingeführt. EU-DSG-VO - Eine Kurzanleitung bietet eine Übersicht über die Änderungen, welche Sie in ihrer Organisation vorzunehmen haben, um den neuen Vorschriften zu entsprechen. Produktübersicht EU-DSG-VO - Eine Kurzanleitung, liefert: Eine kurze Geschichte des Datenschutzes und der nationalen Datenschutzgesetze in der EU (wie die britische DPA, deutsche BDSG und französische LIL). In der Datenschutz-Grundverordnung DSG-VO [General Data Proetection Regulation, GDPR] verwendeten Begriffe und Definitionen einschließlich Erklärungen. Die wichtigsten Anforderungen der DSG-VO, unter anderem: Welche Geldbußen gelten für welche Artikel; Die sechs Grundsätze, die für die Erhebung und Verarbeitung personenbezogener Daten gelten sollten; Die Anwendbarkeit der Verordnung; Rechte der betroffenen Personen; Datenschutz-Folgenabschätzung (DPIA); Die Aufgabe des Datenschutzbeauftragten (DPO) und ob Sie einen solchen benötigen; Datenschutzverletzungen und Benachrichtigung der Aufsichtsbehörden sowie betroffenen Personen; Verpflichtungen für internationale Datenübertragungen. Wie die Verordnungsvorschriften eingehalten werden können, einschließlich: - Verständnis Ihrer Daten sowie wo und wie diese verwendet werden (z.B. Cloud-Anbieter, physische Datensätze); Verständnis Ihrer Daten sowie wo und wie diese verwendet werden (z.B. Cloud-Anbieter, physische Datensätze); Die Dokumente, die Sie verwalten müssen (z. B. Aussagen über die gesammelten und verarbeiteten Informationen, Aufzeichnungen über die Zustimmung der betroffenen Personen, Verfahren für den Schutz personenbezogener Daten); Die "geeigneten technischen und organisatorischen Maßnahmen", die Sie ergreifen müssen, um die Einhaltung der Verordnung zu gewährleisten. Ein vollständiges Verzeichnis der Verordnung für ein einfaches Auffinden der entsprechenden Artikel. Über den Autor Alan Calder, Gründer und Vorstandsvorsitzender der IT Governance Ltd, ist ein international anerkannter Cyber-Security-Experte und führender Autor auf dem Gebiet Informationssicherheit und IT-Governance. Er schrieb den endg...
    Anmerkung: Includes bibliographical references. - Description based on online resource; title from title page (viewed March 16, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations
    Ausgabe: Fifth edition (November 2017).
    Serie: IBM redbooks
    Schlagwort(e): z/OS ; Operating systems (Computers) ; IBM computers ; Programming ; Electronic books ; Electronic books ; local
    Kurzfassung: Abstract The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. Whether you want to become more familiar with z/OS in your current environment, or you are evaluating platforms to consolidate your online business applications, the ABCs collection will serve as a powerful technical tool. Volume 1 provides an updated understanding of the software and IBM zSeries architecture, and explains how it is used together with the z/OS operating system. This includes the main components of z/OS needed to customize and install the z/OS operating system. This edition has been significantly updated and revised.
    Anmerkung: Number on back cover: SG24-6981-04. - Includes bibliographical references. - Description based on online resource; title from cover (viewed December 5, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849288699
    Sprache: Deutsch
    Seiten: 1 online resource (1 volume)
    Schlagwort(e): Data protection ; Standards ; Data protection ; Evaluation ; Electronic books ; Electronic books ; local
    Kurzfassung: Schritt-für-Schritt-Anleitung für eine erfolgreiche ISO 27001-Implementierung In sinnvoller, nicht technischer Sprache führt Sie dieser Leitfaden durch die wichtigsten Schritte eines ISO 27001-Projekts, um Ihnen den Erfolg desselben zu garantieren - von der Einführung bis hin zur Zertifizierung: Projektmandat Projektanbahnung Initiierung eines ISMS Management-Framework Grundlegende Sicherheitskriterien Risikomanagement Implementierung Maßnahme, Überwachung und Überprüfung Zertifizierung In dieser dritten Auflage und ausgerichtet auf ISO 27001: 2013 eignet sich das Handbuch ideal für alle jene, die sich zum ersten Mal mit der Norm beschäftigen. "Es ist als hätten Sie einen $ 300 / h-Berater an Ihrer Seite, wenn Sie die Aspekte der Gewinnung von Management-Unterstützung, Planung, Problembestimmung (Scoping), Kommunikation etc. betrachten." Thomas F. Witwicki Mit Hilfe dieses Buches erfahren Sie wie Sie: Unterstützung im Management und die Aufmerksamkeit des Vorstands erhalten; Erstellen Sie ein Management-Framework und eine Gap-Analyse, um klar zu verstehen, was Sie bereits unter Kontrolle haben und worauf ihre Bemühungen abzielen sollen; Strukturieren Sie Ihr Projekt und statten Sie es mit Ressourcen aus - einschließlich der Festlegung, ob Sie einen Berater verwenden werden oder die Tätigkeit selbst durchführen sowie der Überprüfung der vorhandenen Mittel und Ressourcen, die ihre Arbeit erleichtern werden; Führen Sie eine fünfstufige Risikobewertung durch und erstellen Sie eine Aussage zur Anwendbarkeit sowie einen Risikoplan; Integrieren Sie Ihr ISO 27001 ISMS mit einem ISO 9001 QMS und anderem Managementsystem; Adressieren Sie die Dokumentationsherausforderungen, denen Sie im Rahmen der Erstellung von Geschäftsgrundsätzen, Verfahren, Arbeitsanweisungen und Datensätzen begegnen - einschließlich realisierbarer Alternativen zum kostspieligen Trial- und Error Ansatz Kontinuierliche Verbesserung Ihres ISMS, einschließlich interner Prüfungen und Tests sowie Kontrollen durch das Management; Dieses Buch liefert Ihnen die nötige Anleitung zum Verständnis der Anforderungen der Norm und zur Gewährleistung, dass ihr Implementierungsprojekt ein Erfolg wird. Dabei werden sechs Geheimtipps für den Erfolg gegeben. Background Die Erlangung und Aufrechterhaltung der akkreditierten Zertifizierung nach der internationalen Norm für Informationssicherheit-Management - ISO 27001 - kann ein kompliziertes Vorhaben darstellen, besonders dann, wenn die Norm...
    Anmerkung: Includes bibliographical references. - Description based on online resource; title from title page (viewed March 16, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: First edition.
    Serie: IBM redbooks
    Schlagwort(e): Oracle (Computer file) ; Linux ; Information storage and retrieval systems ; Database management ; Open source software ; Electronic books ; Electronic books ; local
    Kurzfassung: Abstract Oracle Database 12c Release 1 running on Linux is available for deployment on IBM® LinuxONE. The enterprise-grade Linux on LinuxONE solution is designed to add value to Oracle Database solutions, including the new functions that are introduced in Oracle Database 12c. In this IBM Redbooks® publication, we explore the IBM and Oracle Alliance and describe how Oracle Database benefits from LinuxONE. We then explain how to set up Linux guests to install Oracle Database 12c. We also describe how to use the Oracle Enterprise Manager Cloud Control Agent to manage Oracle Database 12c Release 1. We also describe a successful consolidation project from sizing to migration, performance management topics, and high availability. Finally, we end with a chapter about surrounding Oracle with Open Source software. The audience for this publication includes database consultants, installers, administrators, and system programmers. This publication is not meant to replace Oracle documentation, but to supplement it with our experiences while installing and using Oracle products.
    Anmerkung: Number on resource description page: SG24838400. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 29, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: First edition.
    Serie: IBM redbooks
    Schlagwort(e): Oracle (Computer file) ; IBM Database 2 ; Linux ; Database management ; Electronic books ; Electronic books ; local
    Kurzfassung: Abstract Oracle Database 12c Release 1 running on Linux is available for deployment on IBM® z Systems®. The enterprise-grade Linux on IBM z Systems solution is designed to add value to Oracle Database solutions, including the new functions that are introduced in Oracle Database 12c. In this IBM Redbooks® publication, we explore the IBM and Oracle Alliance and describe how Oracle Database benefits from IBM z Systems®. We then explain how to set up Linux guests to install Oracle Database 12c. We also describe how to use the Oracle Enterprise Manager Cloud Control Agent to manage Oracle Database 12c Release 1. We also describe a successful consolidation project from sizing to migration, performance management topics, and high availability. Finally, we end with a chapter about surrounding Oracle with Open Source software. The audience for this publication includes database consultants, installers, administrators, and system programmers. This publication is not meant to replace Oracle documentation, but to supplement it with our experiences while installing and using Oracle products.
    Anmerkung: Number on resource description page: SG24839700. - "z Systems.". - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed June 30, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289221
    Sprache: Englisch , Französisch
    Seiten: 1 online resource (139 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Guide étape par étape vers une mise en œuvre réussie de la norme ISO 27001 Rédigé dans un langage pratique et non technique, ce guide vous guidera au travers des étapes clés d'un projet ISO 27001 afin d'en assurer le succès - de la création à la certification: Mandat du projet Lancement du projet Lancement du SMSI Cadre de management Critères de sécurité de base Gestion du risque Mise en œuvre Mesures, surveillance et réexamen Certification Aujourd'hui dans sa troisième édition et conforme à l'ISO 27001:2013, ce guide est idéal pour toute personne qui aborderait cette norme pour la première fois. « C'est comme avoir un consultant à 300 $/heure sous la main lorsque vous abordez les différentes questions relatives à la planification, au domaine d'application, à la communication, à la façon d'obtenir l'appui de la direction, etc. » Thomas F. Witwicki Avec ce livre, vous découvrirez comment: Obtenir le soutien de la direction et garder l'attention du conseil d'administration; Créer un cadre de gestion et effectuer une analyse des manques, afin de pouvoir clairement comprendre les contrôles que vous avez déjà mis en place et identifier où concentrer vos efforts; Structurer et mettre en valeur votre projet - y compris des conseils pour faire appel à des consultants ou le faire vous-même, et un examen des outils et des ressources disponibles qui faciliteront votre travail; Mener une évaluation des risques en cinq étapes et établir une déclaration d'applicabilité ainsi qu'un plan de traitement des risques; Intégrer votre SMSI ISO 27001 à un SGQ ISO 9001 et à d'autres systèmes de gestion; Répondre aux défis que vous devrez relever en matière de documentation lorsque vous créez des politiques d'entreprise, des procédures, des instructions de travail et des enregistrements : dont des alternatives viables à une approche coûteuse par « essais et erreurs » ; Améliorer continuellement votre SMSI, y compris par des audits et des tests internes, et l'examen par la direction; Cet ouvrage vous offrira les conseils dont vous avez besoin pour comprendre les exigences de la norme et vous assurer que votre projet de mise en œuvre est un succès. Il comprend six secrets pour une certification réussie. Historique L'obtention et le maintien d'une certification accréditée selon la norme ISO 27001, la norme internationale qui établit les exigences d'un SMSI, peut s'avérer une tâche compliquée, en particulier pour les responsables de la mise en œuvre qui d...
    Anmerkung: Online resource; Title from title page (viewed April 20, 2017) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289306
    Sprache: Englisch , Spanisch
    Seiten: 1 online resource (139 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Orientación paso a paso sobre la implementación de la ISO 27001 con éxito En lenguaje sencillo y nada técnico, esta guía le llevará por los pasos clave de un proyecto de la ISO 27001 para asegurar su éxito, desde el comienzo a la certificación: Encargo del proyecto Inicio del proyecto Inicio del SGSI Marco de la gestión Criterios de seguridad de referencia Gestión del riesgo Implementación Medición, monitorización y revisión Certificación Ahora en esta tercera edición y alineada con la ISO 27001:2013, esta guía es ideal para cualquiera que emprenda la norma por primera vez. "Es como tener un consultor de $300/h codo con codo mientras considera los aspectos de obtener apoyo de la gerencia, la planificación, el alcance, la comunicación, etc." Thomas F. Witwicki Con este libro, averiguará cómo: Conseguir apoyo de la gerencia y mantener la atención del consejo; Crear un marco de gestión y realizar un análisis de las deficiencias, para que pueda entender claramente los controles que ya tiene implantados e identificar dónde tiene que centrar sus esfuerzos; Estructurar y conseguir recursos para su proyecto, incluido le asesoramiento sobre si utilizar consultores o hacerlo usted mismo, y un examen de las herramientas y recursos disponibles que harán su trabajo más fácil; Llevar a cabo una evaluación del riesgo en cinco pasos, y crear una Declaración de aplicabilidad y un plan de tratamiento del riesgo; Integrar su SGSI de la ISO 27001 con un SGC de la ISO 9001 y otros sistemas de calidad; Abordar los retos de la documentación que afrontará cuando cree políticas empresariales, procedimientos, instrucciones de trabajo y registros, incluidas alternativas viables para un enfoque de prueba y error costoso; Mejorar continuamente su SGSI, incluida la auditoría y prueba internas, y la revisión gerencial; Este título le dará la orientación que necesita para entender los requisitos de la norma y asegurarse de que su proyecto de implementación sea un éxito, lo cual incluye los seis secretos para un éxito de certificación. Experiencia Lograr y mantener una certificación acreditada con la ISO 27001, la norma internacional que expone los requisitos de un SGSI, puede ser una tarea complicada, especialmente para los implementadores que sean nuevos con la norma. El autor, Alan Calder, conoce la ISO 27001 al derecho y al revés: es el fundador y presidente ejecutivo de IT Governance, y dirigió la implementación del primer sistema de gestión en lograr u...
    Anmerkung: Online resource; Title from title page (viewed June 8, 2017) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289061
    Sprache: Englisch , Französisch
    Seiten: 1 online resource (84 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Protégez l'information de votre organisation grâce à l'ISO27001 :2013 L'information est l'une des ressources les plus importantes de votre organisation, et la conservation de cette information est vitale pour votre entreprise Ce guide de poche pratique est un aperçu essentiel de deux normes clés en matière de sécurité de l'information, il couvre les exigences formelles (ISO27001:2013) pour la création d'un système de management de la sécurité de l'information (SMSI), ainsi que les recommandations des meilleures pratiques (ISO27002:2013) pour les responsables du lancement, de la mise en œuvre ou du suivi. Un SMSI se basant sur l'ISO27001/ISO27002 offre une foule d'avantages: Une amélioration de l'efficacité, en mettant en place des systèmes et des procédures de sécurité de l'information vous permettant de vous concentrer davantage sur votre activité principale. Il protège vos actifs d'information d'un large éventail de cyber-attaques, d'activités criminelles, de compromis internes et de défaillance du système. Gérez vos risques de façon systémique et établissez des plans pour éliminer ou réduire les menaces cybernétiques. Il permet une détection plus rapide des menaces ou des erreurs de traitement, et une résolution plus rapide. Prochaine étape vers la certification ? Vous pouvez organiser un audit indépendant de votre SMSI en fonction des spécifications de l'ISO27001 et, si votre SMSI est conforme, obtenir éventuellement une certification accréditée. Nous publions une série de boîtes à outils de documentations et des ouvrages sur le SMSI (tels que Neuf étapes vers le succès) pour vous aider à atteindre cet objectif. Sommaire La famille ISO/CEI 27000 des normes de sécurité de l'information ; Historique des normes ; Spécification ou Code de bonne pratique ; Procédure de certification ; Le SMSI et l'ISO27001 ; Aperçu de l'ISO/CEI 27001 :2013 ; Aperçu de l'ISO/CEI 27002 :2013 ; Documentation et enregistrements ; Responsabilités du management ; Approche procédurale et cycle PDCA ; Contexte, politique et domaine d'application ; Évaluation des risques ; La Déclaration d'Applicabilité ; Mise en œuvre ; Contrôler et agir ; Examen par le management ; ISO27001 Annexe A Concernant l'auteur Alan Calder est le fondateur et le président exécutif d'IT Governance Ltd, un cabinet d'information, d'avis et de conseils qui aide les conseils d'administration des entreprises à s'attaquer aux questions de gouvernance informatique, de gestion des risques,...
    Anmerkung: Online resource; Title from title page (viewed April 11, 2017) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289108
    Sprache: Englisch , Deutsch
    Seiten: 1 online resource (88 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Schützen Sie die Informationen Ihrer Organisation mit ISO27001:2013 Informationen gehören zu den wichtigsten Ressourcen Ihrer Organisation und ihre Sicherheit ist überlebenswichtig für Ihr Geschäft. Dieser praktische Taschenführer bietet einen grundlegenden Überblick über die beiden wichtigsten Informationssicherheitsstandards mit den formalen Anforderungen (ISO27001:2013) zum Erstellen eines Informationssicherheit-Managementsystems (ISMS) sowie Empfehlungen zu besten Verfahren (ISO27002:2013) für alle jenen, die dieses Einführen, Umsetzen oder Verwalten müssen. Ein auf der Norm ISO27001/ISO27002 basierendes ISMS bietet zahlreiche Vorteile: Verbessern Sie Ihre Effizienz durch Informationssicherheitssysteme und vorgehensweisen, dank derer Sie sich auf ihr Kerngeschäft konzentrieren können Schützen Sie Ihre Informationswerte vor einer Reihe von Cyber-Bedrohungen, krimineller Aktivitäten, Gefährdungen durch Insider und Systemausfälle Managen Sie Ihre Risiken systematisch und erstellen Sie Pläne zum Beseitigen oder Verringern von Cyber-Bedrohungen Erkennen Sie Bedrohungen oder Prozessfehler eher und beheben Sie sie schneller Der nächste Schritt zur Zertifizierung? Sie können einen unabhängigen Audit Ihres ISMS anhand der Spezifikationen der Norm ISO27001 vornehmen lassen und, wenn dieser die Konformität Ihres ISMS bestätigt, unter Umständen einen akkreditierte Zertifizierung erhalten. Wir veröffentlichen eine Reihe von Toolkits und Büchern zum Thema ISMS (wie „Nine Steps to Success“), die Sie dabei unterstützen. Inhalt Die ISO/IEC 27000 Familie von Informationssicherheitsstandards; Hintergrund der Normen; Unterschied Spezifikation - Leitfaden; Zertifizierungsprozess; Die ISMS und ISO27001; Überblick über ISO/IEC 27001:2013; Überblick über ISO/IEC 27002:2013; Dokumente und Aufzeichnungen; Führungsverantwortung; Prozessansatz und PDCA-Zyklus; Kontext, Politik und Anwendungsbereich; Risikobeurteilung; Die Erklärung zur Anwendbarkeit; Umsetzung; Überprüfung und Handeln; Managementprüfung; ISO27001 Anhang A; Über den Autor Alan Calder ist Gründer und Vorstandsvorsitzender der IT Governance Ltd, ein Informations-, Analyse- und Beratungsunternehmen, das Unternehmen bei der Verwaltung von IT-Governance-, Risikomanagement-, Compliance- und Informationssicherheitsfragen unterstützt. Er verfügt über eine langjährige Erfahrung im Senior Management im privaten und öffentlichen Sektor. Dieser praktische Taschenführer bietet einen grundlegenden Übe...
    Anmerkung: Online resource; Title from title page (viewed April 11, 2017) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289184
    Sprache: Englisch , Spanisch
    Seiten: 1 online resource (83 pages)
    Ausgabe: 1st edition
    Paralleltitel: Erscheint auch als
    Schlagwort(e): Data protection Standards ; Data protection Evaluation ; Electronic books ; local ; Protection de l'information (Informatique) ; Normes ; Protection de l'information (Informatique) ; Évaluation ; COMPUTERS ; Security ; General ; Data protection ; Standards ; Electronic books ; Electronic books ; Electronic books
    Kurzfassung: Proteja la información de su organización con la ISO27001:2013 La información es uno de los recursos más importantes de su organización y mantener esa información segura es vital para su negocio. Esta guía de bolsillo útil es una visión de conjunto esencial sobre las dos normas de la seguridad de la información clave que cubren los requisitos formales (ISO27001:2013) para crear un Sistema de Gestión de la Seguridad de la Información (SGSI) y las recomendaciones de mejores prácticas (ISO27002:2013) para aquellos responsables de iniciar, implementar o mantenerlo. Un SGSI basado en la ISO27001/ISO27002 ofrece un sinfín de beneficios: Eficacia mejorada implantando procedimientos y sistemas de seguridad de la información, que le permiten concentrarse en su actividad empresarial principal. Protege sus activos de información de un amplio abanico de ciberamenazas, actividad criminal, compromiso de información privilegiada y fallo del sistema. Gestione sus riesgos sistemáticamente y establezca planes para eliminar o reducir las ciberamenazas. Permite la detección temprana de amenazas o errores de procesamiento y una solicuón más rápida ¿Siguiente paso para la certificación? Puede organizar una auditoría independiente de su SGSI frente a las especificaciones de la ISO27001 y, si su SGSI se ajusta, finalmente logra la certificación acreditada. Publicamos una variedad de libros y herramientas de documentación del SGSI (como Nueve pasos para el éxito) para ayudarle a lograr esto. Índice La familia de normas de la seguridad de la información ISO-/IEC 27000; Historia de las Normas; Especificación frente al Código de Prácticas; Proceso de certificación; El SGSI y la ISO27001; Visión de conjunto de la ISO/IEC 27001:2013; Visión de conjunto de la ISO/IEC 27002:2013; Documentación y registros; Responsabilidad de la gestión; Enfoque del proceso y el ciclo PDCA; Contexto, política y alcance; Evaluación del riesgo; La declaración de aplicabilidad (SoA); Implementación; 15. Verificar y actuar; Revisión gerencial; ISO27001; Anexo A Acerca del autor Alan Calder es el fundador y presidente ejecutivo de IT Governance Ltd, una empresa de información, asesoramiento y consultoría que ayuda a los consejos de administración de empresas a abordar problemas de gobierno de TI, gestión del riesgo, cumplimiento y seguridad de la información. Tiene muchos años de experiencia en alta gerencia en los sectores públicos y privados. Una guía de bolsillo que proporciona una visi...
    Anmerkung: Online resource; Title from title page (viewed June 1, 2017) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849288613
    Sprache: Englisch , Französisch
    Seiten: 1 online resource (98 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Une amorce claire et concise sur le règlement général sur la protection des données Le règlement général sur la protection des données va unifier la protection des données et faciliter la circulation des données personnelles dans l'UE quand il entre en vigueur en mai 2018, et il sera applicable à toutes les organisations dans le monde qui font des affaires avec les résidents de l'UE. Le règlement introduit un certain nombre de changements importants pour les organisations. RGPD UE: Guide de poche donne un aperçu accessible des changements que vous devez faire dans votre organisation pour se conformer à la nouvelle loi. Product overview RGPD UE : Guide de poche énonce: Une brève histoire de la protection des données et les lois nationales sur la protection des données dans l'UE (tels que le DPA du Royaume-Uni, le BDSG allemand et la loi informatique et libertés française). Les termes et les définitions utilisées dans le règlement général sur la protection des données, y compris les explications. Les principales exigences du règlement général sur la protection des données, y compris: Quelles amendes appliquer à quels articles; Les six principes qui devraient être appliqués à toute collecte et le traitement des données personnelles; L'applicabilité du règlement; Les droits des personnes concernées; Les études d'impact sur la protection des données; Le rôle de l'agent de la protection des données DPO et si vous en avez besoin; Les violations de données, et la notification des autorités de contrôle et les personnes concernées; Les obligations pour les transferts internationaux de données. Comment se conformer au règlement, y compris: Comprendre vos données, et où et comment elles sont utilisées (par exemple, les fournisseurs de Cloud, disques physiques); La documentation que vous devez maintenir (comme les déclarations de l'information que vous recueillez et traitez, les dossiers de consentement des personnes concernées, les processus de la protection des données personnelles); Les "mesures techniques et organisationnelles appropriées" que vous devez prendre pour assurer votre conformité avec le règlement. Un index complet du Règlement général sur la protection des données, qui vous permette de trouver les articles pertinents rapidement et facilement. Alan Calder, le fondateur et président exécutif du IT Governance Ltd, est un expert de la cyber-sécurité reconnu internationalement et un auteur de premier plan sur la sécurité de l'information et...
    Anmerkung: Online resource; Title from title page (viewed January 17, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Sprache: Englisch
    Seiten: 1 online resource (1 volume)
    Schlagwort(e): Data protection ; Law and legislation ; European Union countries ; Privacy, Right of ; European Union countries ; Computer security ; Law and legislation ; Electronic books ; Electronic books ; local
    Kurzfassung: EU GDPR - A Pocket Guide, second edition provides an accessible overview of the changes you need to make in your organisation to comply with the new law. The EU General Data Protection Regulation unifies data protection across the EU. It applies to every organisation in the world that does business with EU residents. The Regulation introduces a number of key changes for organisations - and the change from DPA compliance to GDPR compliance is a complex one. New for the second edition: Updated to take into account the latest guidance from WP29 and ICO. Improved guidance around related laws such as the NIS Directive and the future ePrivacy Regulation. This pocket guide also sets out: A brief history of data protection and national data protection laws in the EU (such as the UK DPA, German BDSG and French LIL). The terms and definitions used in the GDPR, including explanations. The key requirements of the GDPR How to comply with the Regulation A full index of the Regulation, enabling you to find relevant Articles quickly and easily. This guide is the ideal resource for anyone wanting a clear, concise primer on the EU GDPR.
    Anmerkung: Description based on online resource; title from title page (Safari, viewed August 26, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Online-Ressource
    Online-Ressource
    Ely, United Kingdom : IT Governance Publishing
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations
    Ausgabe: Second edition.
    Schlagwort(e): Business enterprises ; Computer networks ; Security measures ; Selling ; Computer security ; Information technology ; Electronic books ; Electronic books ; local
    Kurzfassung: This pocket guide will help you with the essential sales skills that, persuade company directors to commit money and resources to your information security initiatives.
    Anmerkung: Previous edition: 2010. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 20, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Sprache: Englisch
    Seiten: 1 online resource (1 volume)
    Ausgabe: Third edition.
    Schlagwort(e): Data protection ; Computer security ; Business enterprises ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Kurzfassung: In Nine Steps to Success - An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps.
    Anmerkung: Previous edition: 2013. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 18, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: First edition.
    Serie: IBM redbooks
    Schlagwort(e): z/VM ; Computer security ; Virtual computer systems ; Cloud computing ; Electronic books ; Electronic books ; local
    Kurzfassung: As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the components that are involved in a z Systems cloud infrastructure that uses IBM z/VM® and Linux on z Systems. The audience for this book is IT architects and those planning to use z Systems for their cloud environments.
    Anmerkung: Number on resource description page: SG24835300. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed November 1, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: First edition (August 2016).
    Serie: IBM redbooks
    Schlagwort(e): IBM Database 2 ; Commercial statistics ; Electronic books ; Electronic books ; local
    Kurzfassung: Regarding online transaction processing (OLTP) workloads, IBM® z Systems™ platform, with IBM DB2®, data sharing, Workload Manager (WLM), geoplex, and other high-end features, is the widely acknowledged leader. Most customers now integrate business analytics with OLTP by running, for example, scoring functions from transactional context for real-time analytics or by applying machine-learning algorithms on enterprise data that is kept on the mainframe. As a result, IBM adds investment so clients can keep the complete lifecycle for data analysis, modeling, and scoring on z Systems control in a cost-efficient way, keeping the qualities of services in availability, security, reliability that z Systems solutions offer. Because of the changed architecture and tighter integration, IBM has shown, in a customer proof-of-concept, that a particular client was able to achieve an orders-of-magnitude improvement in performance, allowing that client's data scientist to investigate the data in a more interactive process. Open technologies, such as Predictive Model Markup Language (PMML) can help customers update single components instead of being forced to replace everything at once. As a result, you have the possibility to combine your preferred tool for model generation (such as SAS Enterprise Miner or IBM SPSS® Modeler) with a different technology for model scoring (such as Zementis, a company focused on PMML scoring). IBM SPSS Modeler is a leading data mining workbench that can apply various algorithms in data preparation, cleansing, statistics, visualization, machine learning, and predictive analytics. It has over 20 years of experience and continued development, and is integrated with z Systems. With IBM DB2 Analytics Accelerator 5.1 and SPSS Modeler 17.1, the possibility exists to do the complete predictive model creation including data transformation within DB2 Analytics Accelerator. So, instead of moving the data to a distributed environment, algorithms can be pushed to the data, using cost-efficient DB2 Accelerator for the required resource-intensive operations. This IBM Redbooks® publication explains the overall z Systems architecture, how the components can be installed and customized, how the new IBM DB2 Analytics Accelerator loader can help efficient data loading for z Systems data and external data, how in-database transformation, in-database modeling, and in-transactional real-time scoring can be used, and what other related technologies are av...
    Anmerkung: "Analytics; z Systems.". - Number on back cover: SG24-8272-00. - Description based on online resource; title from cover (viewed August 26, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: First edition (September 2016).
    Serie: IBM redbooks
    Schlagwort(e): Ubuntu (Electronic resource) ; Virtual computer systems ; Client/server computing ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Kurzfassung: This IBM® Redbooks® publication is Volume 4 of a series of books entitled The Virtualization Cookbook for IBM z Systems. The other volumes in the series are: The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3, SG24-8147 The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers, SG24-8303 The Virtualization Cookbook for IBM z Systems Volume 3: SUSE Linux Enterprise Server 12, SG24-8890 It is advised that you start with Volume 1 of this series, because the IBM z/VM® Hypervisor is the foundation for installing Linux on IBM z™ Systems.
    Anmerkung: "z Systems.". - "This edition applies to Version 6, Release 3, of IBM z/VM and Ubuntu Server 16.04"--Prefatory material. - Number on resource description page: SG24-8354-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed October 10, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849288736
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations
    Schlagwort(e): Data protection ; Law and legislation ; European Union countries ; Privacy, Right of ; European Union countries ; Computer security ; Law and legislation ; European Union countries ; Electronic books ; Electronic books ; local
    Kurzfassung: A concise introduction to EU GDPR and EU-US Privacy Shield The EU General Data Protection Regulation will unify data protection and simplify the use of personal data across the EU when it comes into force in May 2018. It will also apply to every organization in the world that processes personal information of EU residents. US organizations that process EU residents' personal data will be able to comply with the GDPR via the EU-US Privacy Shield (the successor to the Safe Harbor framework), which permits international data transfers of EU data to US organizations that self-certify that they have met a number of requirements. EU GDPR & EU-US Privacy Shield - A Pocket Guide provides an essential introduction to this new data protection law, explaining the Regulation and setting out the compliance obligations for US organizations in handling data of EU citizens, including guidance on the EU-US Privacy Shield. Product overview EU GDPR & EU-US Privacy Shield - A Pocket Guide sets out: A brief history of data protection and national data protection laws in the EU (such as the UK DPA, German BDSG and French LIL). The terms and definitions used in the GDPR, including explanations. The key requirements of the GDPR, including: Which fines apply to which Articles; The six principles that should be applied to any collection and processing of personal data; The Regulation's applicability; Data subjects' rights; Data protection impact assessments (DPIAs); The role of the data protection officer (DPO) and whether you need one; Data breaches, and the notification of supervisory authorities and data subjects; Obligations for international data transfers. How to comply with the Regulation, including: Understanding your data, and where and how it is used (e.g. Cloud suppliers, physical records); The documentation you need to maintain (such as statements of the information you collect and process, records of data subject consent, processes for protecting personal data); The "appropriate technical and organizational measures" you need to take to ensure your compliance with the Regulation. The history and principles of the EU-US Privacy Shield, and an overview of what organizations must do to comply. A full index of the Regulation, enabling you to find relevant Articles quickly and easily.
    Anmerkung: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed July 26, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849288859
    Sprache: Spanisch
    Seiten: 1 online resource (1 volume) , illustrations
    Schlagwort(e): Data protection ; Law and legislation ; European Union countries ; Privacy, Right of ; European Union countries ; Computer security ; Law and legislation ; Electronic books ; Electronic books ; local
    Kurzfassung: Una cartilla clara y concisa sobre el RGPD El Reglamento General de Protección de Datos de la UE (RGPD) unificará la protección de datos y facilitará el flujo de datos personales en toda la UE a partir del 25 de mayo de 2018, cuando sustituirá automáticamente a las leyes nacionales de protección de datos de los estados miembros de la UE. La ley también se aplicará a todas las organizaciones en el mundo que hacen negocios con residentes de la UE. El Reglamento introduce una serie de cambios clave para todas las organizaciones que procesan los datos personales de los residentes de la UE. Reglamento General de Protección de Datos (RGPD) de la UE Una guía de bolsillo proporciona una visión general accesible de los cambios que necesitas hacer en tu organización para cumplir la nueva ley. Reglamento General de Protección de Datos (RGPD) de la UE Una guía de bolsillo establece: Una introducción a la protección de datos y leyes nacionales de protección de datos en la UE (como el BDSG en Alemania, LIL en Francia y DPA en el Reino Unido). Los términos y definiciones utilizados en el RGPD Los principales requisitos del RGPD; Multas aplicadas a cada artículo Seis principios a seguir para cada recopilación y tratamiento de datos personales; Aplicabilidad del Reglamento; Derechos de los interesados; Evaluación del impacto de la protección de datos Papel del responsable del tratamiento Infracciones y notificación a las autoridades de supervisión y a los interesados Obligaciones para transferencias internacionales de datos Cómo cumplir el Reglamento: Entender los datos de la organización: dónde están y cómo se utilizan Documentación para completar Medidas técnicas a seguir para cumplir el Reglamento Índice del Reglamento Alan Calder, fundador y presidente ejecutivo de IT Governance Ltd, es un experto en seguridad cibernética reconocido internacionalmente y un autor en temas de seguridad de la información y gobernanza de TI. Alan es coautor de IT Governance: An International Guide to Data Security and ISO27001/ISO27002, el manual elegido por la Open University para el curso de posgrado en seguridad de la información. Ha participado en el desarrollo de una amplia gama de cursos de formación en gestión de la seguridad de la información, acreditados por la International Board for IT Governance Qualifications (IBITGQ). Alan ha consultado sobre seguridad de datos para numerosos clientes en el Reino Unido y en el extranjero.
    Anmerkung: Includes bibliographical references. - Description based on online resource; title from title page (viewed March 16, 2017)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Sprache: Englisch
    Seiten: 1 online resource (1 volume)
    Ausgabe: Fourth edition.
    Schlagwort(e): Data protection ; Standards ; Electronic commerce ; Security measures ; Computer networks ; Security measures ; Liability for credit information ; Credit cards ; Electronic books ; Electronic books ; local
    Kurzfassung: An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. All organizations that accept, store, transmit, or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product overview Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.1, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organization involved with payment card processing. Coverage includes: An overview of PCI DSS v3.1. A PCI self-assessment questionnaire (SAQ). Procedures and qualifications. An overview of the Payment Application Data Security Standard (PA-DSS). Contents What is the Payment Card Industry Data Security Standard (PCI DSS)? What is the scope of the PCI DSS? Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? Maintaining compliance PCI DSS - The Standard Aspects of PCI DSS compliance The PCI self-assessment questionnaire Procedures and qualifications The PCI DSS and ISO/IEC 27001 The Payment Application Data Security Standard (PA-DSS) PIN transaction security (PTS) About the authors Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance, and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. He leads the IT Governance CISSP Accelerated Training Programme, as well as the PCI Foundation and Implementer training courses. He has broad technical knowledge of security and IT infrastructure, including high performance computing and Cloud computing. His certifications include CISSP, PCI QSA, CREST Registered Tester, CEH, and CHFI.
    Anmerkung: "Compliance series"--Cover. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 10, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Online-Ressource
    Online-Ressource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Sprache: Englisch
    Seiten: 1 online resource (1 volume)
    Ausgabe: Fifth edition.
    Schlagwort(e): Data protection ; Standards ; Electronic commerce ; Security measures ; Computer networks ; Security measures ; Liability for credit information ; Credit cards ; Electronic books ; Electronic books ; local
    Kurzfassung: An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. All organisations that accept, store, transmit or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product overview Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.2, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation involved with payment card processing. Coverage includes: An overview of PCI DSS v3.2. A PCI self-assessment questionnaire (SAQ). Procedures and qualifications. An overview of the Payment Application Data Security Standard (PA-DSS). Contents What is the Payment Card Industry Data Security Standard (PCI DSS)? What is the scope of the PCI DSS? Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? Maintaining compliance PCI DSS - The Standard Aspects of PCI DSS compliance The PCI self-assessment questionnaire Procedures and qualifications The PCI DSS and ISO/IEC 27001 The Payment Application Data Security Standard (PA-DSS) PIN transaction security (PTS) About the authors Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. He leads the IT Governance CISSP Accelerated Training Programme, as well as the PCI Foundation and Implementer training courses. He has broad technical knowledge of security and IT infrastructure, including high performance computing and Cloud computing. His certifications include CISSP, PCI QSA, CREST Registered Tester, CEH and CHFI.
    Anmerkung: "Compliance series"--Cover. - Description based on online resource; title from title page (Safari, viewed August 26, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations
    Ausgabe: Second edition.
    Serie: IBM redbooks
    Schlagwort(e): z/VM ; Equipment and supplies ; Virtual computer systems ; Equipment and supplies ; Operating systems (Computers) ; Management ; Electronic books ; Electronic books ; local
    Kurzfassung: IBM® Wave for z/VM® (IBM Wave) is a virtualization management solution for IBM z/VM and Linux on z Systems™. This virtualization management software provides a simplified and cost-effective way for companies to harness the consolidation capabilities of the IBM z™ Systems platform and its ability to host the workloads of tens of thousands of commodity servers. IBM Wave is a complete management solution for z Systems based virtual server farms. This IBM Redbooks® publication provides a guide to understanding IBM Wave by providing information about the IBM Wave architecture and how it fits into the cloud. This publication also provides a planning and design guide that is based on common scenarios. This publication also provides installation and configuration task information and how to manage and operate the environment. The intended audience for this publication is IT Architects who are responsible for planning their IBM Wave environments and IT Specialists who are responsible for implementing them.
    Anmerkung: Number on resource description page: SG24819201. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed January 22, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: Second edition.
    Serie: IBM redbooks
    Schlagwort(e): z/VM ; Virtual computer systems ; Client/server computing ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Kurzfassung: This IBM® Redbooks® publication is Volume 2 of a series of three books that is called The Virtualization Cookbook for IBM z Systems. The other two volumes are listed: The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3, SG24-8147-01 The Virtualization Cookbook for IBM z Systems Volume 3: SUSE Linux Enterprise Server 12, SG24-8890 It is recommended that you start with Volume 1 of this series because IBM z/VM® is the base "layer" when you install Linux on IBM z Systems™. Volume 1 starts with an introduction, discusses planning, then describes z/VM installation into a two-node single system image (SSI) cluster, configuration, hardening, automation, and servicing. It adopts a cookbook format that provides a concise, repeatable set of procedures for installing and configuring z/VM by using the Single System Image (SSI) clustering feature. Volumes 2 and 3 describe how to customize your own Linux virtual servers on IBM z Systems hardware under IBM z/VM. The cookbook format continues with installing and customizing Linux. Volume 2 focuses on Red Hat Enterprise Linux (RHEL). It consists of the following key chapters: Chapter 1, "Install Red Hat Enterprise Linux on LNXADMIN" on page 3, describes how to install and configure RHEL onto the Linux Administration server, which performs the cloning and other tasks. Chapter 2, "Automated Red Hat Enterprise Linux installations by using kickstart" on page 27, describes how to use Red Hat's kickstart tool to create Linux systems. This tool is fundamentally different from cloning in that an automated installation is implemented. You can try kickstart and you can also try cloning. Understand that they try to accomplish the same goal of being able to quickly get Linux systems up and running, and that you do not need to use both. Chapter 3, "Service Red Hat Enterprise Linux with Red Hat Customer Portal" on page 37, describes how the Red Hat Network works. It provides centralized management and provisioning for multiple RHEL systems. Kickstart is an easy and fast way to provision your Linux guests in any supported Linux platform. It re-creates the operating system (OS) from the beginning by using the kickstart profile configuration file that installs the new OS unattended and sets up the new guest according to the definition that was previously set up in the kickstart file. Usually, Linux administration is performed by the same team that manages Linux on all platforms. By using kickstart, you can crea...
    Anmerkung: "z Systems.". - Number from resource description page: SG24814701. - Description based on online resource; title from cover page (Safari, viewed October 12, 2015)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: First edition.
    Serie: IBM redbooks
    Schlagwort(e): GDPS (Computer system) ; Parallel processing (Electronic computers) ; Electronic data processing ; Distributed processing ; Electronic books ; Electronic books ; local
    Kurzfassung: IBM® Geographically Dispersed Parallel Sysplex™ (GDPS®) is a collection of several offerings, each addressing a different set of IT resiliency goals. It can be tailored to meet the recovery point objective (RPO), which is how much data can you are willing to lose or recreate, and the recovery time objective (RTO), which identifies how long can you afford to be without your systems for your business from the initial outage to having your critical business processes available to users. Each offering uses a combination of server and storage hardware or software-based replication, and automation and clustering software technologies. This IBM Redbooks® publication presents an overview of the IBM GDPS active/active (GDPS/AA) offering and the role it plays in delivering a business IT resilience solution.
    Anmerkung: Number on resource description page: SG24824100. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed April 17, 2015)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Online-Ressource
    Online-Ressource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Sprache: Englisch
    Seiten: 1 online resource (1 volume) , illustrations.
    Ausgabe: First edition.
    Serie: IBM redbooks
    Schlagwort(e): Linux ; Virtual computer systems ; Client/server computing ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Kurzfassung: This IBM® Redbooks® publication is Volume 3 of a series of three books called The Virtualization Cookbook for IBM z Systems . The other two volumes are called: , SG24-8147 The Virtualization Cookbook for IBM z Systems Volume 1: IBM z/VM 6.3 , SG24-8303 The Virtualization Cookbook for IBM z Systems Volume 2: Red Hat Enterprise Linux 7.1 Servers It is suggested that you start with Volume 1 of this series, because IBM z/VM® is the base "layer" when installing Linux on IBM z Systems™. Volume 1 starts with an introduction, describes planning, and then describes z/VM installation into a two-node, single system image (SSI) cluster, configuration, hardening, automation, and servicing. It adopts a cookbook format that provides a concise, repeatable set of procedures for installing and configuring z/VM using the SSI clustering feature. Volumes 2 and 3 describe how to roll your own Linux virtual servers on z Systems hardware under z/VM. The cookbook format continues with installing and customizing Linux. Volume 3 focuses on SUSE Linux Enterprise Server 12. It describes how to install and configure SUSE Linux Enterprise Server 12 onto the Linux administration system , which does the cloning and other tasks. It also explains how to use AutoYaST2, which enables you to automatically install Linux using a configuration file, and explains how to create and use appliances and bootable images from configuration files. In addition, it provides information about common tasks and tools available to service SUSE Linux Enterprise Server.
    Anmerkung: "z Systems.". - Number on resource description page: SG24889000. - Description based on online resource; title from cover page (Safari, viewed November 2, 2015)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...