Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (110)
  • Spanish  (3)
  • Tate, Jon  (61)
  • Calder, Alan
  • Electronic books ; local  (111)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787783010
    Language: English
    Pages: 1 online resource (145 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: ISO 22301:2019 and business continuity management – Understand how to plan, implement and enhance a business continuity management system (BCMS) walks you through the requirements of ISO 22301, explaining what they mean and how your organisation can achieve compliance. It is an essential companion guide for those working in business continuity.
    Note: Online resource; Title from title page (viewed March 25, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782808
    Language: English
    Pages: 1 online resource (85 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation.
    Note: Online resource; Title from title page (viewed February 18, 2021) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782624
    Language: English
    Pages: 1 online resource (361 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape.
    Note: Online resource; Title from title page (viewed December 10, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780738459080
    Language: English
    Pages: 1 online resource (856 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Organizations of all sizes face the challenge of managing massive volumes of increasingly valuable data. But storing this data can be costly, and extracting value from the data is becoming more difficult. IT organizations have limited resources, but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. IBM® FlashSystem 5010 and FlashSystem 5030 systems provide a smarter solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. The IBM FlashSystem® 5010 and FlashSystem 5030 deliver efficient, entry-level configurations that are designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, the system offers advanced software capabilities that are found in more expensive systems. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. It applies to the IBM FlashSystem 5010 and FlashSystem 5030 and IBM Spectrum® Virtualize V8.3.1. This edition applies to IBM Spectrum Virtualize V8.3.1 and the associated hardware and software detailed within. Screen captures that are included within this book might differ from the generally available (GA) version because parts of this book were written with pre-GA code. On February 11, 2020, IBM announced that it was simplifying its portfolio. This book was written by using previous models of the product line before the simplification; however, most of the general principles apply. If you are in any doubt as to their applicability, work with your local IBM representative.
    Note: Online resource; Title from title page (viewed October 2, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782549
    Language: English
    Pages: 1 online resource (77 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Thrive under the GDPR (General Data Protection Regulation) wherever you are in the world. This pocket guide will help you understand the Regulation, the broader principles of data protection, and what the GDPR means for businesses in Europe and beyond.
    Note: Online resource; Title from title page (viewed October 15, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780738458915
    Language: English
    Pages: 1 online resource (942 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM FlashSystem® solution that is powered by IBM Spectrum® Virtualize V8.3.1. This innovative storage offering delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, which raises the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of an IBM Spectrum Virtualize V8.3.1 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture, how to implement it, and how to take advantage of its industry-leading functions and features. Applicability: This edition applies to IBM Spectrum Virtualize V8.3.1 and the associated hardware and software that is detailed within. The screen captures included within this book might differ from the generally available (GA) version because parts of this book were written with pre-GA code. On 11 February 2020, IBM announced that it was simplifying its portfolio. This book was written by using previous models of the product line before the simplification; however, most of the general principles apply. If you are in any doubt as to their applicability, contact your local IBM representative. IBM Knowledge Center: In this book we provide links to Knowledge Center and a description of the relevant section that provides more information. Our starting point is the IBM FlashSystem 9200 family page, and the reader may have to select the product that applies to their environment.
    Note: Online resource; Title from title page (viewed September 23, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782273 , 1787782271 , 9781787782297
    Language: English
    Pages: 1 online resource (38 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Understand the basics of business continuity and ISO 22301:2019 with this concise pocket guide, which will help you ensure your organisation can continue to operate in the event of a disruption.
    Note: Online resource; Title from title page (viewed June 30, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780738458175
    Language: English
    Pages: 1 online resource (514 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM System Storage® SAN Volume Controller and IBM Storwize® V7000 powered by IBM Spectrum Virtualize™ V8.2.1. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. Then it provides performance guidelines for SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting SAN Volume Controller and Storwize V7000. This book is intended for experienced storage, SAN, and SAN Volume Controller administrators and technicians. Understanding his book requires advanced knowledge of the SAN Volume Controller and Storwize V7000 and SAN environments. Important: On 11th February 2020 IBM announced the arrival of SAN Volume Controller SA2 and SV2, and IBM FlashSystem® 7200 to the family. This book was written specifically for prior versions of SVC and Storwize V7000; however, most of the general principles will apply. If you are in any doubt as to their applicability then you should work with your local IBM representative. This book will be updated to comprehensively include SAN Volume Controller SA2 and SV2 and FlashSystem 7200 in due course.
    Note: Online resource; Title from title page (viewed February 11, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780738458298
    Language: English
    Pages: 1 online resource (438 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM FlashSystem® 9100. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. It explains how you can optimize disk performance with the IBM System Storage® Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting. This book is intended for experienced storage, SAN, IBM FlashSystem, SAN Volume Controller and Storwize® administrators and technicians. Understanding his book requires advanced knowledge of these environments. Important, IBM FlashSystem 9200: On 11th February 2020 IBM announced the arrival of the IBM FlashSystem 9200 to the family. This book was written specifically for IBM FlashSystem 9100, however most of the general principles will apply to the IBM FlashSystem 9200. If you are in any doubt as to their applicability to the FlashSystem 9200 then you should work with your local IBM representative. This book will be updated to include FlashSystem 9200 in due course.
    Note: Online resource; Title from title page (viewed February 11, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (58 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This pocket guide is perfect as a quick reference for PCI professionals, or as a handy introduction for new staff. It explains the fundamental concepts of the latest iteration of the PCI DSS, v3.2.1, making it an ideal training resource. It will teach you how to protect your customers' cardholder data with best practice from the Standard.
    Note: Online resource; Title from title page (viewed September 5, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (52 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication provides an introduction and overview of the latest products in the IBM Storwize® V5000 Family, including their hardware and software features. Advanced topics that apply to the IBM Storwize and IBM Spectrum® Virtualize family can be found in other IBM Redbooks publications about Storwize and IBM Spectrum Virtualize.
    Note: Online resource; Title from title page (viewed September 9, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Language: English
    Pages: 1 online resource (840 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Organizations of all sizes face the challenge of managing massive volumes of increasingly valuable data. But storing this data can be costly, and extracting value from the data is becoming more difficult. IT organizations have limited resources but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V5000 Gen2 system provides a smarter solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. The Storwize V5000 Gen2 delivers efficient, entry-level configurations that are designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, the Storwize V5000 Gen2 offers advanced software capabilities that are found in more expensive systems. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. It applies to the Storwize V5030, V5020, and V5010, and to IBM Spectrum Virtualize™ V8.2.1.
    Note: Online resource; Title from title page (viewed August 1, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780743
    Language: English
    Pages: 1 online resource (76 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This concise guide is essential reading for US organizations wanting an easy to follow overview of the GDPR and the compliance obligations for handling data of EU citizens, including guidance on the EU-U.S. Privacy Shield.
    Note: Online resource; Title from title page (viewed October 15, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Language: English
    Pages: 1 online resource (36 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The use of N_Port ID Virtualization (NPIV) to provide host-only ports (NPIV target ports) and spare nodes improves the host failover characteristics by separating out host communications from communication tasks on the same port and providing standby hardware, which can be automatically introduced into the cluster to reintroduce redundancy. Because the host ports are not used for internode communications, they can freely move between nodes, and this includes spare nodes that are added to the cluster automatically. This IBM® Redpaper™ publication describes the use of the IBM Spectrum™ Virtualize Hot-Spare Node function to provide a high availability storage infrastructure. This paper focuses on the functional behavior of hot-spare node when subjected to various failure conditions. This paper does not provide the details necessary to implement the reference architectures (although some implementation detail is provided).
    Note: Online resource; Title from title page (viewed July 18, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (181 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits.
    Note: Online resource; Title from title page (viewed August 29, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Language: English
    Pages: 1 online resource (828 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller (SVC), which is powered by IBM Spectrum™ Virtualize V8.2.1. IBM SAN Volume Controller is a virtualization appliance solution that maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running by using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the block level in a network, which enables applications and servers to share storage devices on a network.
    Note: Online resource; Title from title page (viewed July 4, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787781702
    Language: English
    Pages: 1 online resource (42 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This useful pocket guide is an ideal introduction for those wanting to understand more about ISO 38500. It describes the scope, application and objectives of the Standard and outlines its six core principles.
    Note: Online resource; Title from title page (viewed September 26, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Language: English
    Pages: 1 online resource (792 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 solution powered by IBM Spectrum™ Virtualize. This innovative storage offering delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The IBM Storwize V7000 solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, which raises the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 and IBM Spectrum Virtualize™ V8.2.1 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture of the Storwize V7000, how to implement it, and how to take advantage of its industry-leading functions and features.
    Note: Online resource; Title from title page (viewed November 7, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fourth edition.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information storage and retrieval systems ; Business ; Electronic books ; Electronic books ; local
    Abstract: Abstract Organizations of all sizes face the challenge of managing massive volumes of increasingly valuable data. But storing this data can be costly, and extracting value from the data is becoming more difficult. IT organizations have limited resources but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V5000 Gen2 system provides a smarter solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. The Storwize V5000 Gen2 delivers efficient, entry-level configurations that are designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, the Storwize V5000 Gen2 offers advanced software capabilities that are found in more expensive systems. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. It applies to the Storwize V5030, V5020, and V5010, and to IBM Spectrum Virtualize™ V8.1.
    Note: Number on resource description page: SG24816203. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed March 28, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Sixth edition.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information retrieval ; Information storage and retrieval systems ; Business ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM System Storage® SAN Volume Controller and IBM Storwize® V7000 powered by IBM Spectrum Virtualize™ V8.1. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. Then it provides performance guidelines for SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting SAN Volume Controller and Storwize V7000. This book is intended for experienced storage, SAN, and SAN Volume Controller administrators and technicians. Understanding his book requires advanced knowledge of the SAN Volume Controller and Storwize V7000 and SAN environments.
    Note: Number on resource description page: SG24-7521-05. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 18, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Seventh edition (February 2018).
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Virtual storage (Computer science) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller, which is powered by IBM Spectrum™ Virtualize V8.1. IBM SAN Volume Controller is a virtualization appliance solution that maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running by using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the "block" level in a network, which enables applications and servers to share storage devices on a network.
    Note: Part number from back cover: SG24-7933-06. - "This edition applies to IBM Spectrum Virtualize V8.1 and the associated hardware and software detailed within. Note that the screen captures included within this book might differ from the generally available (GA) version, because parts of this book were written with pre-GA code"--Cover verso. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed March 13, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780705
    Language: English
    Pages: 1 online resource (87 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: This concise guide is essential reading for EU organisations wanting an easy to follow overview of the new regulation and the compliance obligations for handling data of EU citizens. The EU General Data Protection Regulation (GDPR) will unify data protection and simplify the use of personal data across the EU, and automatically supersedes member states domestic data protection laws. It will also apply to every organisation in the world that processes personal information of EU residents. The Regulation introduces a number of key changes for all organisations that process EU residents’ personal data. EU GDPR: A Pocket Guide provides an essential introduction to this new data protection law, explaining the Regulation and setting out the compliance obligations for EU organisations. This second edition has been updated with improved guidance around related laws such as the NIS Directive and the future ePrivacy Regulation. EU GDPR – A Pocket Guide sets out: A brief history of data protection and national data protection laws in the EU (such as the German BDSG, French LIL and UK DPA). The terms and definitions used in the GDPR, including explanations. The key requirements of the GDPR, including: Which fines apply to which Articles; The six principles that should be applied to any collection and processing of personal data; The Regulation’s applicability; Data subjects’ rights; Data protection impact assessments (DPIAs); The role of the data protection officer (DPO) and whether you need one; Data breaches, and the notification of supervisory authorities and data subjects; Obligations for international data transfers. How to comply with the Regulation, including: Understanding your data, and where and how it is used (e.g. Cloud suppliers, physical records); The documentation you need to maintain (such as statements of the information you collect and process, records of data subject consent, processes for protecting personal data); The “appropriate technical and organisational measures” you need to take to ensure your compliance with the Regulation. A full index of the Regulation, enabling you to find relevant Articles quickly and easily.
    Note: Online resource; Title from title page (viewed October 23, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (46 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® Product Guide describes the IBM Storage Networking SAN768C-6. IBM Storage Networking SAN768C-6 has the industry's highest port density for a storage area network (SAN) director and features 768 line-rate 32 gigabits per second (Gbps) or 16 Gbps Fibre Channel ports. Designed to support multiprotocol workloads, IBM Storage Networking SAN768C-6 enables SAN consolidation and collapsed-core solutions for large enterprises, which reduces the number of managed switches and leads to easy-to-manage deployments. IBM Storage Networking SAN768C-6 supports the 48-Port 32 Gbps Fibre Channel Switching Module, the 48-Port 16 Gbps Fibre Channel Switching Module, the 48-port 10 Gbps FCoE Switching Module, the 24-port 40 Gbps FCoE switching module, and the 24/10-port SAN Extension Module. By reducing the number of front-panel ports that are used on inter-switch links (ISLs), it also offers room for future growth. IBM Storage Networking SAN768C-6 addresses the mounting storage requirements of today's large virtualized data centers. As a director-class SAN switch, IBM Storage Networking SAN768C-6 uses the same operating system and management interface as other IBM data center switches. It brings intelligent capabilities to a high-performance, protocol-independent switch fabric, and delivers uncompromising availability, security, scalability, simplified management, and the flexibility to integrate new technologies. You can use IBM Storage Networking SAN768C-6 to transparently deploy unified fabrics with Fibre Channel and Fibre Channel over Ethernet (FCoE) connectivity to achieve low total cost of ownership (TCO). For mission-critical enterprise storage networks that require secure, robust, cost-effective business-continuance services, the FCIP extension module is designed to deliver outstanding SAN extension performance, reducing latency for disk and tape operations with FCIP acceleration features, including FCIP write acceleration and FCIP tape write and read acceleration.
    Note: Online resource; Title from title page (viewed December 4, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Language: English
    Pages: 1 online resource (792 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Abstract Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 solution powered by IBM Spectrum™ Virtualize. This innovative storage offering delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The IBM Storwize V7000 solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, raising the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 and IBM Spectrum Virtualize™ V8.1 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture of the Storwize V7000, how to implement it, and how to take advantage of its industry-leading functions and features.
    Note: Online resource; Title from title page (viewed February 28, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition (November 2018).
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information storage and retrieval systems ; Business ; Electronic data processing ; Management ; Electronic books ; Electronic books ; local
    Abstract: Abstract Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces Data Reduction Pools (DRP) and Deduplication powered by IBM Spectrum™ Virtualize, which are innovative storage features that deliver essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a proven design. This book discusses Data Reduction Pools (DRP) and Deduplication and is intended for experienced storage administrators who are fully familiar with IBM Spectrum Virtualize, SAN Volume Controller, and the Storwize family of products.
    Note: Number on resource description page: SG24843000. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed February 7, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices.
    Note: Online resource; Title from title page (viewed September 28, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (64 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This pocket guide is a primer for any OES (operators of essential services) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
    Note: Online resource; Title from title page (viewed November 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (61 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This pocket guide is a primer for any DSPs (digital service providers) that needs to comply with the NIS Regulations, and explores who they are, and why the NIS Regulations are different for them.
    Note: Online resource; Title from title page (viewed November 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780057
    Language: English
    Pages: 1 online resource (92 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: The EU General Data Protection Regulation (GDPR) unifies data protection and unifies data protection across the EU. It applies to every organisation in the world that handles EU residents’ personal data – which includes schools. The Regulation introduces a number of key changes for schools – and the change from compliance with the Data Protection Act 1998 (DPA) to GDPR compliance is a complex one. We have revised our popular EU GDPR – A Pocket Guide to include specific expectations of and requirements for schools, and provide an accessible overview of the changes you need to make to comply with the Regulation. GDPR – A Pocket Guide Schools’ Edition sets out: A brief history of data protection and national data protection laws in the EU, including as the UK’s DPA); Explanations of the terms and definitions used in the GDPR; The key requirements of the GDPR; The need to appoint a data protection officer (DPO); The lawful basis of processing data and when consent is needed; How to comply with the Regulation; and A full index of the Regulation, enabling you to find relevant articles quickly and easily. This pocket guide is the ideal resource for anyone wanting a clear, concise primer on the GDPR.
    Note: Online resource; Title from title page (viewed September 17, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (84 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Storwize® HyperSwap® is a response to increasing demand for continuous application availability, minimizing downtime in the event of an outage, and non disruptive migrations. IT centers with IBM i can take full advantage of the HyperSwap solution. In this IBM Redpaper™ publication, we provide instructions to implement Storwize HyperSwap with IBM i. We also describe some business continuity scenarios in this area, including solutions with HyperSwap and IBM i Live Partition Mobility, and a solution with HyperSwap and IBM PowerHA® for IBM i.
    Note: Online resource; Title from title page (viewed May 23, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Language: English
    Pages: 1 online resource (140 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: IBM® Real-time Compression™ software that is embedded in IBM SAN Volume Controller (SVC) and IBM Storwize® V7000 solution addresses all the requirements of primary storage data reduction, including performance, by using a purpose-built technology called . This IBM Redpaper™ publication addresses the key requirements for primary storage data reduction and gives real world examples of savings that can be made by using compression. SVC and Storwize V7000 is designed to improve storage efficiency by compressing data by as much as 80% through supported real-time compression for block storage. This process enables up to five times as much data to be stored in the same physical disk space. Unlike other approaches to compression, IBM Real-time Compression is used with active primary data, such as production databases and email systems. This configuration dramatically expands the range of candidate data that can benefit from compression. As its name implies, IBM Real-time Compression operates as data is written to disk, avoiding the need to store data that is awaiting compression.
    Note: Online resource; Title from title page (viewed May 16, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (57 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This pocket guide is an introduction to the EU’s NIS Directive (Directive on security of network and information systems). It outlines the key requirements, details which digital service providers are within scope, and explains how the security objectives from ENISA’s Technical Guidelines and international standards can help DSPs achieve compliance
    Note: Online resource; Title from title page (viewed November 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fifth edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Computer storage devices ; Information storage and retrieval systems ; Business ; Virtual storage (Computer science) ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication captures several of the preferred practices and describes the performance gains that can be achieved by implementing the IBM System Storage® SAN Volume Controller and IBM Storwize® V7000 powered by IBM Spectrum™ Virtualize V7.8. These practices are based on field experience. This book highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. Then it provides performance guidelines for SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. It also provides preferred practices for monitoring, maintaining, and troubleshooting SAN Volume Controller and Storwize V7000. This book is intended for experienced storage, SAN, and SAN Volume Controller administrators and technicians. Understanding his book requires advanced knowledge of the SAN Volume Controller and Storwize V7000 and SAN environments.
    Note: Number on resource description page: SG24752104. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 10, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849289511 , 1849289514
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: North American edition.
    Keywords: Computer security ; Management ; Computer security ; Standards ; Data protection ; Standards ; Electronic books ; Electronic books ; local
    Abstract: Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard that sets out the requirements of an information security management system (ISMS) - a holistic approach to information security that encompasses people, processes, and technology. Accredited certification to the Standard is recognized worldwide as the hallmark of best-practice information security management. Achieving and maintaining accredited certification to ISO 27001 can be complicated, especially for those who are new to the Standard. Author of Nine Steps to Success - An ISO 27001 Implementation Overview, Alan Calder is the founder and executive chairman of IT Governance. He led the world's first implementation of a management system certified to BS 7799, the forerunner to ISO 27001, and has been working with the Standard ever since. Hundreds of organizations around the world have achieved accredited certification to ISO 27001 with IT Governance's guidance, which is distilled in this book. Successfully implement ISO 27001 with this must-have guide Aligned with the latest iteration of ISO 27001:2013, the North American edition of Nine Steps to Success - An ISO 27001 Implementation Overview is ideal for anyone tackling ISO 27001 for the first time. In nine critical steps, the guide covers each element of the ISO 27001 project in simple, non-technical language. There is a special focus on how US organizations can tackle this governance. This book offers guidance throughout implementation: Getting management support and keeping the board's attention. Creating a management framework and performing a gap analysis so that you can clearly understand the controls you already have in place, and identify where you need to focus. Structuring and resourcing your project, including advice on whether to use a consultant or do it yourself, and examining the tools and resources that will make your job easier. Conducting a five-step risk assessment, and creating a Statement of Applicability (SoA) and risk treatment plan (RTP). Guidance on integrating your ISO 27001 ISMS with an ISO 9001 quality management system (QMS) and other management systems. Addressing the documentation challenges you'll face as you create business policies, procedures, work instructions, and records - includin...
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Sixth edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Virtual storage (Computer science) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: Abstract This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller, which is powered by IBM Spectrum Virtualize™ Version 7.8. IBM SAN Volume Controller is a virtualization appliance solution, which maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running by using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the "block" level in a network, which enables applications and servers to share storage devices on a network.
    Note: "Storage"--Cover. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 10, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289221
    Language: English , French
    Pages: 1 online resource (139 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Guide étape par étape vers une mise en œuvre réussie de la norme ISO 27001 Rédigé dans un langage pratique et non technique, ce guide vous guidera au travers des étapes clés d'un projet ISO 27001 afin d'en assurer le succès - de la création à la certification: Mandat du projet Lancement du projet Lancement du SMSI Cadre de management Critères de sécurité de base Gestion du risque Mise en œuvre Mesures, surveillance et réexamen Certification Aujourd'hui dans sa troisième édition et conforme à l'ISO 27001:2013, ce guide est idéal pour toute personne qui aborderait cette norme pour la première fois. « C'est comme avoir un consultant à 300 $/heure sous la main lorsque vous abordez les différentes questions relatives à la planification, au domaine d'application, à la communication, à la façon d'obtenir l'appui de la direction, etc. » Thomas F. Witwicki Avec ce livre, vous découvrirez comment: Obtenir le soutien de la direction et garder l'attention du conseil d'administration; Créer un cadre de gestion et effectuer une analyse des manques, afin de pouvoir clairement comprendre les contrôles que vous avez déjà mis en place et identifier où concentrer vos efforts; Structurer et mettre en valeur votre projet - y compris des conseils pour faire appel à des consultants ou le faire vous-même, et un examen des outils et des ressources disponibles qui faciliteront votre travail; Mener une évaluation des risques en cinq étapes et établir une déclaration d'applicabilité ainsi qu'un plan de traitement des risques; Intégrer votre SMSI ISO 27001 à un SGQ ISO 9001 et à d'autres systèmes de gestion; Répondre aux défis que vous devrez relever en matière de documentation lorsque vous créez des politiques d'entreprise, des procédures, des instructions de travail et des enregistrements : dont des alternatives viables à une approche coûteuse par « essais et erreurs » ; Améliorer continuellement votre SMSI, y compris par des audits et des tests internes, et l'examen par la direction; Cet ouvrage vous offrira les conseils dont vous avez besoin pour comprendre les exigences de la norme et vous assurer que votre projet de mise en œuvre est un succès. Il comprend six secrets pour une certification réussie. Historique L'obtention et le maintien d'une certification accréditée selon la norme ISO 27001, la norme internationale qui établit les exigences d'un SMSI, peut s'avérer une tâche compliquée, en particulier pour les responsables de la mise en œuvre qui d...
    Note: Online resource; Title from title page (viewed April 20, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289184
    Language: English , Spanish
    Pages: 1 online resource (83 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Data protection Standards ; Data protection Evaluation ; Electronic books ; local ; Protection de l'information (Informatique) ; Normes ; Protection de l'information (Informatique) ; Évaluation ; COMPUTERS ; Security ; General ; Data protection ; Standards ; Electronic books ; Electronic books ; Electronic books
    Abstract: Proteja la información de su organización con la ISO27001:2013 La información es uno de los recursos más importantes de su organización y mantener esa información segura es vital para su negocio. Esta guía de bolsillo útil es una visión de conjunto esencial sobre las dos normas de la seguridad de la información clave que cubren los requisitos formales (ISO27001:2013) para crear un Sistema de Gestión de la Seguridad de la Información (SGSI) y las recomendaciones de mejores prácticas (ISO27002:2013) para aquellos responsables de iniciar, implementar o mantenerlo. Un SGSI basado en la ISO27001/ISO27002 ofrece un sinfín de beneficios: Eficacia mejorada implantando procedimientos y sistemas de seguridad de la información, que le permiten concentrarse en su actividad empresarial principal. Protege sus activos de información de un amplio abanico de ciberamenazas, actividad criminal, compromiso de información privilegiada y fallo del sistema. Gestione sus riesgos sistemáticamente y establezca planes para eliminar o reducir las ciberamenazas. Permite la detección temprana de amenazas o errores de procesamiento y una solicuón más rápida ¿Siguiente paso para la certificación? Puede organizar una auditoría independiente de su SGSI frente a las especificaciones de la ISO27001 y, si su SGSI se ajusta, finalmente logra la certificación acreditada. Publicamos una variedad de libros y herramientas de documentación del SGSI (como Nueve pasos para el éxito) para ayudarle a lograr esto. Índice La familia de normas de la seguridad de la información ISO-/IEC 27000; Historia de las Normas; Especificación frente al Código de Prácticas; Proceso de certificación; El SGSI y la ISO27001; Visión de conjunto de la ISO/IEC 27001:2013; Visión de conjunto de la ISO/IEC 27002:2013; Documentación y registros; Responsabilidad de la gestión; Enfoque del proceso y el ciclo PDCA; Contexto, política y alcance; Evaluación del riesgo; La declaración de aplicabilidad (SoA); Implementación; 15. Verificar y actuar; Revisión gerencial; ISO27001; Anexo A Acerca del autor Alan Calder es el fundador y presidente ejecutivo de IT Governance Ltd, una empresa de información, asesoramiento y consultoría que ayuda a los consejos de administración de empresas a abordar problemas de gobierno de TI, gestión del riesgo, cumplimiento y seguridad de la información. Tiene muchos años de experiencia en alta gerencia en los sectores públicos y privados. Una guía de bolsillo que proporciona una visi...
    Note: Online resource; Title from title page (viewed June 1, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289108
    Language: English , German
    Pages: 1 online resource (88 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Schützen Sie die Informationen Ihrer Organisation mit ISO27001:2013 Informationen gehören zu den wichtigsten Ressourcen Ihrer Organisation und ihre Sicherheit ist überlebenswichtig für Ihr Geschäft. Dieser praktische Taschenführer bietet einen grundlegenden Überblick über die beiden wichtigsten Informationssicherheitsstandards mit den formalen Anforderungen (ISO27001:2013) zum Erstellen eines Informationssicherheit-Managementsystems (ISMS) sowie Empfehlungen zu besten Verfahren (ISO27002:2013) für alle jenen, die dieses Einführen, Umsetzen oder Verwalten müssen. Ein auf der Norm ISO27001/ISO27002 basierendes ISMS bietet zahlreiche Vorteile: Verbessern Sie Ihre Effizienz durch Informationssicherheitssysteme und vorgehensweisen, dank derer Sie sich auf ihr Kerngeschäft konzentrieren können Schützen Sie Ihre Informationswerte vor einer Reihe von Cyber-Bedrohungen, krimineller Aktivitäten, Gefährdungen durch Insider und Systemausfälle Managen Sie Ihre Risiken systematisch und erstellen Sie Pläne zum Beseitigen oder Verringern von Cyber-Bedrohungen Erkennen Sie Bedrohungen oder Prozessfehler eher und beheben Sie sie schneller Der nächste Schritt zur Zertifizierung? Sie können einen unabhängigen Audit Ihres ISMS anhand der Spezifikationen der Norm ISO27001 vornehmen lassen und, wenn dieser die Konformität Ihres ISMS bestätigt, unter Umständen einen akkreditierte Zertifizierung erhalten. Wir veröffentlichen eine Reihe von Toolkits und Büchern zum Thema ISMS (wie „Nine Steps to Success“), die Sie dabei unterstützen. Inhalt Die ISO/IEC 27000 Familie von Informationssicherheitsstandards; Hintergrund der Normen; Unterschied Spezifikation - Leitfaden; Zertifizierungsprozess; Die ISMS und ISO27001; Überblick über ISO/IEC 27001:2013; Überblick über ISO/IEC 27002:2013; Dokumente und Aufzeichnungen; Führungsverantwortung; Prozessansatz und PDCA-Zyklus; Kontext, Politik und Anwendungsbereich; Risikobeurteilung; Die Erklärung zur Anwendbarkeit; Umsetzung; Überprüfung und Handeln; Managementprüfung; ISO27001 Anhang A; Über den Autor Alan Calder ist Gründer und Vorstandsvorsitzender der IT Governance Ltd, ein Informations-, Analyse- und Beratungsunternehmen, das Unternehmen bei der Verwaltung von IT-Governance-, Risikomanagement-, Compliance- und Informationssicherheitsfragen unterstützt. Er verfügt über eine langjährige Erfahrung im Senior Management im privaten und öffentlichen Sektor. Dieser praktische Taschenführer bietet einen grundlegenden Übe...
    Note: Online resource; Title from title page (viewed April 11, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289306
    Language: English , Spanish
    Pages: 1 online resource (139 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Orientación paso a paso sobre la implementación de la ISO 27001 con éxito En lenguaje sencillo y nada técnico, esta guía le llevará por los pasos clave de un proyecto de la ISO 27001 para asegurar su éxito, desde el comienzo a la certificación: Encargo del proyecto Inicio del proyecto Inicio del SGSI Marco de la gestión Criterios de seguridad de referencia Gestión del riesgo Implementación Medición, monitorización y revisión Certificación Ahora en esta tercera edición y alineada con la ISO 27001:2013, esta guía es ideal para cualquiera que emprenda la norma por primera vez. "Es como tener un consultor de $300/h codo con codo mientras considera los aspectos de obtener apoyo de la gerencia, la planificación, el alcance, la comunicación, etc." Thomas F. Witwicki Con este libro, averiguará cómo: Conseguir apoyo de la gerencia y mantener la atención del consejo; Crear un marco de gestión y realizar un análisis de las deficiencias, para que pueda entender claramente los controles que ya tiene implantados e identificar dónde tiene que centrar sus esfuerzos; Estructurar y conseguir recursos para su proyecto, incluido le asesoramiento sobre si utilizar consultores o hacerlo usted mismo, y un examen de las herramientas y recursos disponibles que harán su trabajo más fácil; Llevar a cabo una evaluación del riesgo en cinco pasos, y crear una Declaración de aplicabilidad y un plan de tratamiento del riesgo; Integrar su SGSI de la ISO 27001 con un SGC de la ISO 9001 y otros sistemas de calidad; Abordar los retos de la documentación que afrontará cuando cree políticas empresariales, procedimientos, instrucciones de trabajo y registros, incluidas alternativas viables para un enfoque de prueba y error costoso; Mejorar continuamente su SGSI, incluida la auditoría y prueba internas, y la revisión gerencial; Este título le dará la orientación que necesita para entender los requisitos de la norma y asegurarse de que su proyecto de implementación sea un éxito, lo cual incluye los seis secretos para un éxito de certificación. Experiencia Lograr y mantener una certificación acreditada con la ISO 27001, la norma internacional que expone los requisitos de un SGSI, puede ser una tarea complicada, especialmente para los implementadores que sean nuevos con la norma. El autor, Alan Calder, conoce la ISO 27001 al derecho y al revés: es el fundador y presidente ejecutivo de IT Governance, y dirigió la implementación del primer sistema de gestión en lograr u...
    Note: Online resource; Title from title page (viewed June 8, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849289061
    Language: English , French
    Pages: 1 online resource (84 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Protégez l'information de votre organisation grâce à l'ISO27001 :2013 L'information est l'une des ressources les plus importantes de votre organisation, et la conservation de cette information est vitale pour votre entreprise Ce guide de poche pratique est un aperçu essentiel de deux normes clés en matière de sécurité de l'information, il couvre les exigences formelles (ISO27001:2013) pour la création d'un système de management de la sécurité de l'information (SMSI), ainsi que les recommandations des meilleures pratiques (ISO27002:2013) pour les responsables du lancement, de la mise en œuvre ou du suivi. Un SMSI se basant sur l'ISO27001/ISO27002 offre une foule d'avantages: Une amélioration de l'efficacité, en mettant en place des systèmes et des procédures de sécurité de l'information vous permettant de vous concentrer davantage sur votre activité principale. Il protège vos actifs d'information d'un large éventail de cyber-attaques, d'activités criminelles, de compromis internes et de défaillance du système. Gérez vos risques de façon systémique et établissez des plans pour éliminer ou réduire les menaces cybernétiques. Il permet une détection plus rapide des menaces ou des erreurs de traitement, et une résolution plus rapide. Prochaine étape vers la certification ? Vous pouvez organiser un audit indépendant de votre SMSI en fonction des spécifications de l'ISO27001 et, si votre SMSI est conforme, obtenir éventuellement une certification accréditée. Nous publions une série de boîtes à outils de documentations et des ouvrages sur le SMSI (tels que Neuf étapes vers le succès) pour vous aider à atteindre cet objectif. Sommaire La famille ISO/CEI 27000 des normes de sécurité de l'information ; Historique des normes ; Spécification ou Code de bonne pratique ; Procédure de certification ; Le SMSI et l'ISO27001 ; Aperçu de l'ISO/CEI 27001 :2013 ; Aperçu de l'ISO/CEI 27002 :2013 ; Documentation et enregistrements ; Responsabilités du management ; Approche procédurale et cycle PDCA ; Contexte, politique et domaine d'application ; Évaluation des risques ; La Déclaration d'Applicabilité ; Mise en œuvre ; Contrôler et agir ; Examen par le management ; ISO27001 Annexe A Concernant l'auteur Alan Calder est le fondateur et le président exécutif d'IT Governance Ltd, un cabinet d'information, d'avis et de conseils qui aide les conseils d'administration des entreprises à s'attaquer aux questions de gouvernance informatique, de gestion des risques,...
    Note: Online resource; Title from title page (viewed April 11, 2017) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Sixth edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Computer storage devices ; Information storage and retrieval systems ; Business ; Virtual storage (Computer science) ; Electronic books ; Electronic books ; local
    Abstract: Abstract Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 solution powered by IBM Spectrum Virtualize™, which is an innovative storage offering that delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The IBM Storwize V7000 solution incorporates some of the top IBM technologies that are typically found only in enterprise-class storage systems, raising the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 and IBM Spectrum Virtualize V7.8 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing and storage administrators. It helps you understand the architecture of the Storwize V7000, how to implement it, and how to take advantage of its industry-leading functions and features.
    Note: Number on resource description page: SG24793805. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed July 10, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    ISBN: 9780738442884
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Ninth edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Virtual storage (Computer science) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: Abstract The superabundance of data that is created by today's businesses is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, the following major initiatives emerge: Flatten and converge your network: IBM® takes an open, standards-based approach to implement the latest advances in the flat, converged data center network designs of today. IBM Storage solutions enable clients to deploy a high-speed, low-latency Unified Fabric Architecture. Optimize and automate virtualization: Advanced virtualization awareness reduces the cost and complexity of deploying physical and virtual data center infrastructure. Simplify management: IBM data center networks are easy to deploy, maintain, scale, and virtualize, delivering the foundation of consolidated operations for dynamic infrastructure management. Storage is no longer an afterthought. Too much is at stake. Companies are searching for more ways to efficiently manage expanding volumes of data, and to make that data accessible throughout the enterprise. This demand is propelling the move of storage into the network. Also, the increasing complexity of managing large numbers of storage devices and vast amounts of data is driving greater business value into software and services. With current estimates of the amount of data to be managed and made available increasing at 60% each year, this outlook is where a storage area network (SAN) enters the arena. SANs are the leading storage infrastructure for the global economy of today. SANs offer simplified storage management, scalability, flexibility, and availability; and improved data access, movement, and backup. Welcome to the cognitive era. The smarter data center with the improved economics of IT can be achieved by connecting servers and storage with a high-speed and intelligent network fabric. A smarter data center that hosts IBM Storage solutions can provide an environment that is smarter, faster, greener, open, and easy to manage. This IBM® Redbooks® publication provides an introduction to SAN and Ethernet networking, and how these networks help to achieve a smarter data center. This book is intended for people who are not very familiar with IT, or who are just starting out in the IT world.
    Note: "Part Number: SG24547008."--Resource description page. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed January 22, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781849288613
    Language: English , French
    Pages: 1 online resource (98 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Une amorce claire et concise sur le règlement général sur la protection des données Le règlement général sur la protection des données va unifier la protection des données et faciliter la circulation des données personnelles dans l'UE quand il entre en vigueur en mai 2018, et il sera applicable à toutes les organisations dans le monde qui font des affaires avec les résidents de l'UE. Le règlement introduit un certain nombre de changements importants pour les organisations. RGPD UE: Guide de poche donne un aperçu accessible des changements que vous devez faire dans votre organisation pour se conformer à la nouvelle loi. Product overview RGPD UE : Guide de poche énonce: Une brève histoire de la protection des données et les lois nationales sur la protection des données dans l'UE (tels que le DPA du Royaume-Uni, le BDSG allemand et la loi informatique et libertés française). Les termes et les définitions utilisées dans le règlement général sur la protection des données, y compris les explications. Les principales exigences du règlement général sur la protection des données, y compris: Quelles amendes appliquer à quels articles; Les six principes qui devraient être appliqués à toute collecte et le traitement des données personnelles; L'applicabilité du règlement; Les droits des personnes concernées; Les études d'impact sur la protection des données; Le rôle de l'agent de la protection des données DPO et si vous en avez besoin; Les violations de données, et la notification des autorités de contrôle et les personnes concernées; Les obligations pour les transferts internationaux de données. Comment se conformer au règlement, y compris: Comprendre vos données, et où et comment elles sont utilisées (par exemple, les fournisseurs de Cloud, disques physiques); La documentation que vous devez maintenir (comme les déclarations de l'information que vous recueillez et traitez, les dossiers de consentement des personnes concernées, les processus de la protection des données personnelles); Les "mesures techniques et organisationnelles appropriées" que vous devez prendre pour assurer votre conformité avec le règlement. Un index complet du Règlement général sur la protection des données, qui vous permette de trouver les articles pertinents rapidement et facilement. Alan Calder, le fondateur et président exécutif du IT Governance Ltd, est un expert de la cyber-sécurité reconnu internationalement et un auteur de premier plan sur la sécurité de l'information et...
    Note: Online resource; Title from title page (viewed January 17, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Ely, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Business enterprises ; Computer networks ; Security measures ; Selling ; Computer security ; Information technology ; Electronic books ; Electronic books ; local
    Abstract: This pocket guide will help you with the essential sales skills that, persuade company directors to commit money and resources to your information security initiatives.
    Note: Previous edition: 2010. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 20, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume)
    Keywords: Data protection ; Law and legislation ; European Union countries ; Privacy, Right of ; European Union countries ; Computer security ; Law and legislation ; Electronic books ; Electronic books ; local
    Abstract: EU GDPR - A Pocket Guide, second edition provides an accessible overview of the changes you need to make in your organisation to comply with the new law. The EU General Data Protection Regulation unifies data protection across the EU. It applies to every organisation in the world that does business with EU residents. The Regulation introduces a number of key changes for organisations - and the change from DPA compliance to GDPR compliance is a complex one. New for the second edition: Updated to take into account the latest guidance from WP29 and ICO. Improved guidance around related laws such as the NIS Directive and the future ePrivacy Regulation. This pocket guide also sets out: A brief history of data protection and national data protection laws in the EU (such as the UK DPA, German BDSG and French LIL). The terms and definitions used in the GDPR, including explanations. The key requirements of the GDPR How to comply with the Regulation A full index of the Regulation, enabling you to find relevant Articles quickly and easily. This guide is the ideal resource for anyone wanting a clear, concise primer on the EU GDPR.
    Note: Description based on online resource; title from title page (Safari, viewed August 26, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849288859
    Language: Spanish
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Data protection ; Law and legislation ; European Union countries ; Privacy, Right of ; European Union countries ; Computer security ; Law and legislation ; Electronic books ; Electronic books ; local
    Abstract: Una cartilla clara y concisa sobre el RGPD El Reglamento General de Protección de Datos de la UE (RGPD) unificará la protección de datos y facilitará el flujo de datos personales en toda la UE a partir del 25 de mayo de 2018, cuando sustituirá automáticamente a las leyes nacionales de protección de datos de los estados miembros de la UE. La ley también se aplicará a todas las organizaciones en el mundo que hacen negocios con residentes de la UE. El Reglamento introduce una serie de cambios clave para todas las organizaciones que procesan los datos personales de los residentes de la UE. Reglamento General de Protección de Datos (RGPD) de la UE Una guía de bolsillo proporciona una visión general accesible de los cambios que necesitas hacer en tu organización para cumplir la nueva ley. Reglamento General de Protección de Datos (RGPD) de la UE Una guía de bolsillo establece: Una introducción a la protección de datos y leyes nacionales de protección de datos en la UE (como el BDSG en Alemania, LIL en Francia y DPA en el Reino Unido). Los términos y definiciones utilizados en el RGPD Los principales requisitos del RGPD; Multas aplicadas a cada artículo Seis principios a seguir para cada recopilación y tratamiento de datos personales; Aplicabilidad del Reglamento; Derechos de los interesados; Evaluación del impacto de la protección de datos Papel del responsable del tratamiento Infracciones y notificación a las autoridades de supervisión y a los interesados Obligaciones para transferencias internacionales de datos Cómo cumplir el Reglamento: Entender los datos de la organización: dónde están y cómo se utilizan Documentación para completar Medidas técnicas a seguir para cumplir el Reglamento Índice del Reglamento Alan Calder, fundador y presidente ejecutivo de IT Governance Ltd, es un experto en seguridad cibernética reconocido internacionalmente y un autor en temas de seguridad de la información y gobernanza de TI. Alan es coautor de IT Governance: An International Guide to Data Security and ISO27001/ISO27002, el manual elegido por la Open University para el curso de posgrado en seguridad de la información. Ha participado en el desarrollo de una amplia gama de cursos de formación en gestión de la seguridad de la información, acreditados por la International Board for IT Governance Qualifications (IBITGQ). Alan ha consultado sobre seguridad de datos para numerosos clientes en el Reino Unido y en el extranjero.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (viewed March 16, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information storage and retrieval systems ; Business ; Electronic books ; Electronic books ; local
    Abstract: Organizations of all sizes face the challenge of managing massive volumes of increasingly valuable data. But storing this data can be costly, and extracting value from the data is becoming more difficult. IT organizations have limited resources but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V5000 Gen2 system provides a smarter solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. The Storwize V5000 Gen2 delivers efficient, entry-level configurations that are designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, the Storwize V5000 Gen2 offers advanced software capabilities that are found in more expensive systems. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. It applies to the Storwize V5030, V5020, and V5010. The concepts in this book also relate to the IBM Storwize V3700 where applicable.
    Note: Number on resource description page: SG24816202. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed October 28, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    ISBN: 9780738441436
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Seventh edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Handbooks, manuals, etc ; Electronic books ; Electronic books ; local
    Abstract: The superabundance of data that is created by today's businesses is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, the following major initiatives emerge: Flatten and converge your network: IBM® takes an open, standards-based approach to implement the latest advances in the flat, converged data center network designs of today. IBM Storage solutions enable clients to deploy a high-speed, low-latency Unified Fabric Architecture. Optimize and automate virtualization: Advanced virtualization awareness reduces the cost and complexity of deploying physical and virtual data center infrastructure. Simplify management: IBM data center networks are easy to deploy, maintain, scale, and virtualize, delivering the foundation of consolidated operations for dynamic infrastructure management. Storage is no longer an afterthought. Too much is at stake. Companies are searching for more ways to efficiently manage expanding volumes of data, and to make that data accessible throughout the enterprise. This demand is propelling the move of storage into the network. Also, the increasing complexity of managing large numbers of storage devices and vast amounts of data is driving greater business value into software and services. With current estimates of the amount of data to be managed and made available increasing at 60% each year, this outlook is where a storage area network (SAN) enters the arena. SANs are the leading storage infrastructure for the global economy of today. SANs offer simplified storage management, scalability, flexibility, and availability; and improved data access, movement, and backup. Welcome to the cognitive era. The smarter data center with the improved economics of IT can be achieved by connecting servers and storage with a high-speed and intelligent network fabric. A smarter data center that hosts IBM Storage solutions can provide an environment that is smarter, faster, greener, open, and easy to manage. This IBM® Redbooks® publication provides an introduction to SAN and Ethernet networking, and how these networks help to achieve a smarter data center. This book is intended for people who are not very familiar with IT, or who are just starting out in the IT world.
    Note: Number on resource description page: SG24547006. - Description based on online resource; title from cover page (viewed February 2, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fifth edition (June 2016).
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Virtual storage (Computer science) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller (SVC), powered by IBM Spectrum Virtualize™ Version 7.6. IBM SAN Volume Controller is a virtualization appliance solution, which maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running by using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the "block" level in a network, which enables applications and servers to share storage devices on a network.
    Note: "Storage"--Cover page. - Part number from back cover: SG24-7933-04. - "This edition applies to IBM SAN Volume Controller and IBM Spectrum Virtualize software Version 7.6 and the IBM SAN Volume Controller 2145-DH8"--Edition page. - Includes bibliographical references. - Description based on online resource; title from cover (viewed July 5, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: VMware ; IBM Spectrum Virtualize ; Virtual computer systems ; Electronic books ; Electronic books ; local
    Abstract: IBM® Spectrum Virtualize and VMware's Virtual Volumes (VVols) are paving the way toward a true IBM Software Defined Environment (SDE). IBM Spectrum™ Virtualize is at the core of software-defined storage. The addition of VVols enables a fundamentally more efficient operational model for storage in virtualized environments, centering it around the virtual machine (VM) rather than the physical infrastructure. This IBM Redbooks® publication provides an overview of the VVols management framework and its implementation on storage systems managed by IBM Spectrum Virtualize™..
    Note: "Storage.". - Description based on online resource; title from cover (viewed March 17, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    ISBN: 9781849288736
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Data protection ; Law and legislation ; European Union countries ; Privacy, Right of ; European Union countries ; Computer security ; Law and legislation ; European Union countries ; Electronic books ; Electronic books ; local
    Abstract: A concise introduction to EU GDPR and EU-US Privacy Shield The EU General Data Protection Regulation will unify data protection and simplify the use of personal data across the EU when it comes into force in May 2018. It will also apply to every organization in the world that processes personal information of EU residents. US organizations that process EU residents' personal data will be able to comply with the GDPR via the EU-US Privacy Shield (the successor to the Safe Harbor framework), which permits international data transfers of EU data to US organizations that self-certify that they have met a number of requirements. EU GDPR & EU-US Privacy Shield - A Pocket Guide provides an essential introduction to this new data protection law, explaining the Regulation and setting out the compliance obligations for US organizations in handling data of EU citizens, including guidance on the EU-US Privacy Shield. Product overview EU GDPR & EU-US Privacy Shield - A Pocket Guide sets out: A brief history of data protection and national data protection laws in the EU (such as the UK DPA, German BDSG and French LIL). The terms and definitions used in the GDPR, including explanations. The key requirements of the GDPR, including: Which fines apply to which Articles; The six principles that should be applied to any collection and processing of personal data; The Regulation's applicability; Data subjects' rights; Data protection impact assessments (DPIAs); The role of the data protection officer (DPO) and whether you need one; Data breaches, and the notification of supervisory authorities and data subjects; Obligations for international data transfers. How to comply with the Regulation, including: Understanding your data, and where and how it is used (e.g. Cloud suppliers, physical records); The documentation you need to maintain (such as statements of the information you collect and process, records of data subject consent, processes for protecting personal data); The "appropriate technical and organizational measures" you need to take to ensure your compliance with the Regulation. The history and principles of the EU-US Privacy Shield, and an overview of what organizations must do to comply. A full index of the Regulation, enabling you to find relevant Articles quickly and easily.
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed July 26, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    ISBN: 9780738442334
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Seventh edition (December 2016).
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Handbooks, manuals, etc ; Electronic books ; Electronic books ; local
    Abstract: The superabundance of data that is created by today's businesses is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, the following major initiatives emerge: Flatten and converge your network: IBM® takes an open, standards-based approach to implement the latest advances in the flat, converged data center network designs of today. IBM Storage solutions enable clients to deploy a high-speed, low-latency Unified Fabric Architecture. Optimize and automate virtualization: Advanced virtualization awareness reduces the cost and complexity of deploying physical and virtual data center infrastructure. Simplify management: IBM data center networks are easy to deploy, maintain, scale, and virtualize, delivering the foundation of consolidated operations for dynamic infrastructure management. Storage is no longer an afterthought. Too much is at stake. Companies are searching for more ways to efficiently manage expanding volumes of data, and to make that data accessible throughout the enterprise. This demand is propelling the move of storage into the network. Also, the increasing complexity of managing large numbers of storage devices and vast amounts of data is driving greater business value into software and services. With current estimates of the amount of data to be managed and made available increasing at 60% each year, this outlook is where a storage area network (SAN) enters the arena. SANs are the leading storage infrastructure for the global economy of today. SANs offer simplified storage management, scalability, flexibility, and availability; and improved data access, movement, and backup. Welcome to the cognitive era. The smarter data center with the improved economics of IT can be achieved by connecting servers and storage with a high-speed and intelligent network fabric. A smarter data center that hosts IBM Storage solutions can provide an environment that is smarter, faster, greener, open, and easy to manage. This IBM® Redbooks® publication provides an introduction to SAN and Ethernet networking, and how these networks help to achieve a smarter data center. This book is intended for people who are not very familiar with IT, or who are just starting out in the IT world.
    Note: Number on back cover: SG24-5470-07. - Includes bibliographical references. - Description based on online resource; title from cover (viewed January 20, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Information technology ; Management ; Database management ; Software ; Information retrieval ; Electronic books ; Electronic books ; local
    Abstract: Dynamic organizations want to accelerate growth while reducing costs. To do so, they must speed the deployment of business applications and adapt quickly to any changes in priorities. Organizations today require an IT infrastructure that is easy, efficient, and versatile. The VersaStack solution by Cisco and IBM® can help you accelerate the deployment of your data centers. It reduces costs by more efficiently managing information and resources while maintaining your ability to adapt to business change. The VersaStack solution combines the innovation of Cisco UCS Integrated Infrastructure with the efficiency of the IBM Storwize® storage system. The Cisco UCS Integrated Infrastructure includes the Cisco Unified Computing System (Cisco UCS), Cisco Nexus and Cisco MDS switches, and Cisco UCS Director. The IBM FlashSystem® V9000 enhances virtual environments with its Data Virtualization, IBM Real-time Compression™, and IBM Easy Tier® features. These features deliver extraordinary levels of performance and efficiency. The VersaStack solution is Cisco Application Centric Infrastructure (ACI) ready. Your IT team can build, deploy, secure, and maintain applications through a more agile framework. Cisco Intercloud Fabric capabilities help enable the creation of open and highly secure solutions for the hybrid cloud. These solutions accelerate your IT transformation while delivering dramatic improvements in operational efficiency and simplicity. Cisco and IBM are global leaders in the IT industry. The VersaStack solution gives you the opportunity to take advantage of integrated infrastructure solutions that are targeted at enterprise applications, analytics, and cloud solutions. The VersaStack solution is backed by Cisco Validated Designs (CVD) to provide faster delivery of applications, greater IT efficiency, and less risk. This IBM Redbooks® publication is aimed at experienced storage administrators who are tasked with deploying a VersaStack solution with Oracle Real Application Clusters (RAC) and IBM Spectrum™ Protect.
    Note: "Storage.". - Number on resource description page: SG24836400. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed October 31, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Language: English
    Pages: 1 online resource (476 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Dynamic organizations want to accelerate growth while reducing costs. To do so, they must speed the deployment of business applications and adapt quickly to any changes in priorities. Organizations require an IT infrastructure to be easy, efficient, and versatile. The VersaStack solution by Cisco and IBM® can help you accelerate the deployment of your datacenters. It reduces costs by more efficiently managing information and resources while maintaining your ability to adapt to business change. The VersaStack solution combines the innovation of Cisco Unified Computing System (Cisco UCS) Integrated Infrastructure with the efficiency of the IBM Storwize® storage system. The Cisco UCS Integrated Infrastructure includes the Cisco UCS, Cisco Nexus and Cisco MDS switches, and Cisco UCS Director. The IBM Storwize V7000 storage system enhances virtual environments with its Data Virtualization, IBM Real-time Compression™, and IBM Easy Tier® features. These features deliver extraordinary levels of performance and efficiency. The VersaStack solution is Cisco Application Centric Infrastructure (ACI) ready. Your IT team can build, deploy, secure, and maintain applications through a more agile framework. Cisco Intercloud Fabric capabilities help enable the creation of open and highly secure solutions for the hybrid cloud. These solutions accelerate your IT transformation while delivering dramatic improvements in operational efficiency and simplicity. Cisco and IBM are global leaders in the IT industry. The VersaStack solution gives you the opportunity to take advantage of integrated infrastructure solutions that are targeted at enterprise applications, analytics, and cloud solutions. The VersaStack solution is backed by Cisco Validated Designs (CVDs) to provide faster delivery of applications, greater IT efficiency, and less risk. This IBM Redbooks® publication is aimed at experienced storage administrators that are tasked with deploying a VersaStack solution with IBM DB2® High Availability (DB2 HA), IBM Spectrum™ Protect, and IBM Spectrum Control™.
    Note: Online resource; Title from title page (viewed February 2, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Third edition.
    Keywords: Data protection ; Computer security ; Business enterprises ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: In Nine Steps to Success - An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps.
    Note: Previous edition: 2013. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 18, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    ISBN: 9780738441214
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Sixth edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Business enterprises ; Computer networks ; Electronic books ; Electronic books ; local
    Abstract: The plethora of data that is created by the businesses of today is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, the following major initiatives emerge: - Flatten and converge your network - Optimize and automate virtualization - Simplify management Storage is no longer an afterthought. Too much is at stake. Companies are searching for more ways to efficiently manage expanding volumes of data, and to make that data accessible throughout the enterprise. This demand is propelling the move of storage into the network. Also, the increasing complexity of managing a large numbers of storage devices and vast amounts of data is driving greater business value into software and services. With current estimates of the amount of data to be managed and made available increasing at 60 percent each year, this outlook is where a storage area network (SAN) enters the arena. SANs are the leading storage infrastructure for the global economy of today. SANs offer simplified storage management, scalability, flexibility, and availability; and improved data access, movement, and backup. Welcome to the cognitive era. The smarter data center with improved economics of IT can be achieved by connecting servers and storage with a high-speed and intelligent network fabric. A smarter data center that hosts IBM Storage solutions can provide an environment that is smarter, faster, greener, open, and easy to manage. This IBM Redbooks publication provides an introduction to the SAN and Ethernet networking, and how these networks help to achieve a smarter data center. This book is intended for people who are not very familiar with IT, or who are just starting out in the IT world.
    Note: "Storage.". - Number on resource description page: SG24547005. - Description based on online resource; title from cover page (Safari, viewed November 30, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: IBM® Spectrum Virtualize Software Version 7.5 provides software-defined storage capabilities across various platforms, including IBM SAN Volume Controller, IBM Storwize® V7000, Storwize V7000 (Unified), Storwize V5000, Storwize V3700, and Storwize V3500. These offerings help clients reduce the complexities and cost of managing their storage in the following ways: Centralizing management of storage volumes to enable administrators to manage storage volumes from a single point Improving utilization of storage capacity with virtual volumes to enable businesses to tap into previously unused disk capacity Avoiding downtime for backups, maintenance, and upgrades Performing data migration without disruption to applications Enabling all storage devices to be organized into storage pools from which virtual volumes, whether standard, compressed, or thin-provisioned, are created with the characteristics that you want Delivering automation of storage management with SmartCloud Virtual Storage Center, IBM Tivoli® Storage Productivity Center (as applicable by platform), and IBM Tivoli Storage FlashCopy® Manager (as applicable by platform) Increasing the performance efficiency of storage pools with IBM Easy Tier® Restoring data access quickly with near and remote copy capabilities across Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), and IP networks In this IBM Redbooks® publication, which is aimed at storage administrators and technical professionals, we describe the IBM HyperSwap® capability in IBM Spectrum™ Virtualize Software V7.5. HyperSwap delivers high availability (HA) and disaster recovery (DR) in one solution and reuses capital investments to achieve a range of recovery and management options that are transparent to host operations. This book describes how you can use HyperSwap with VMware to create an environment that can withstand robust workloads.
    Note: "Storage.". - Number on resource description page: SG24831700. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed December 7, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organiztion
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Cisco Systems, Inc ; Storage area networks (Computer networks) ; Information technology ; Management ; Electronic books ; Electronic books ; local
    Abstract: Dynamic organizations want to accelerate growth while reducing costs. To do so, they must speed the deployment of business applications and adapt quickly to any changes in priorities. Organizations today require an IT infrastructure to be easy, efficient, and versatile. The VersaStack solution by Cisco and IBM® can help you accelerate the deployment of your data centers. It reduces costs by more efficiently managing information and resources while maintaining your ability to adapt to business change. The VersaStack solution combines the innovation of Cisco UCS Integrated Infrastructure with the efficiency of the IBM Storwize® storage system. The Cisco UCS Integrated Infrastructure includes the Cisco Unified Computing System (Cisco UCS), Cisco Nexus and Cisco MDS switches, and Cisco UCS Director. The IBM Storwize V7000 enhances virtual environments with its Data Virtualization, IBM Real-time Compression™, and IBM Easy Tier® features. These features deliver extraordinary levels of performance and efficiency. The VersaStack solution is Cisco Application Centric Infrastructure (ACI) ready. Your IT team can build, deploy, secure, and maintain applications through a more agile framework. Cisco Intercloud Fabric capabilities help enable the creation of open and highly secure solutions for the hybrid cloud. These solutions accelerate your IT transformation while delivering dramatic improvements in operational efficiency and simplicity. Cisco and IBM are global leaders in the IT industry. The VersaStack solution gives you the opportunity to take advantage of integrated infrastructure solutions that are targeted at enterprise applications, analytics, and cloud solutions. The VersaStack solution is backed by Cisco Validated Designs (CVD) to provide faster delivery of applications, greater IT efficiency, and less risk. This IBM Redbooks® publication is aimed at experienced storage administrators that are tasked with deploying a VersaStack solution with Microsoft Sequel (SQL), IBM Spectrum™ Protect, and IBM Spectrum Control™.
    Note: "Storage.". - Number on resource description page: SG24830100. - Description based on online resource; title from cover page (Safari, viewed November 10, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fourth edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Virtual storage (Computer science) ; IBM computers ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller Version 7.4. The SAN Volume Controller (SVC) is a virtualization appliance solution, which maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running by using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the "block" level in a network, which enables applications and servers to share storage devices on a network. This book is intended for readers who want to implement the SVC at a 7.4 release level with minimal effort.
    Note: Part number from resource description page: SG24793303. - "Storage"--Cover page. - Description based on online resource; title from cover page (Safari, viewed May 11, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    ISBN: 9780738440477
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Fourth edition.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information retrieval ; Electronic books ; Electronic books ; local
    Abstract: Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 solution, an innovative storage offering that delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The IBM Storwize V7000 solution incorporates some of the top IBM technologies typically found only in enterprise-class storage systems, raising the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 system through several examples. This book is aimed at pre-sales and post-sales technical support and marketing, storage administrators, and will help you understand the architecture of the Storwize V7000, how to implement it, and take advantage of the industry-leading functions and features.
    Note: Part Number: SG24793803. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed April 10, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Language: English
    Pages: 1 online resource (192 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes the IBM storage area network (SAN) and IBM Spectrum™ Virtualize, and SAN Volume Controller Enhanced Stretched Cluster configuration when combined with VMware. It describe guidelines, settings, and implementation steps necessary to achieve a satisfactory implementation. Business continuity and continuous availability of applications are among the top requirements for many organizations today. Advances in virtualization, storage, and networking make enhanced business continuity possible. Information technology solutions can now be designed to manage both planned and unplanned outages, and to take advantage of the flexibility, efficient use of resources, and cost savings that cloud computing offers. The IBM Enhanced Stretched Cluster design offers significant functions for maintaining business continuity in a VMware environment. You can dynamically move applications across data centers without interruption to those applications. The live application mobility across data centers relies on these products and technologies: IBM Spectrum Virtualize and SAN Volume Controller Enhanced Stretched Cluster Solution VMware Metro vMotion for live migration of virtual machines A Layer 2 IP Network and storage networking infrastructure for high-performance traffic management Data center interconnection
    Note: Online resource; Title from title page (viewed October 27, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Fifth edition.
    Keywords: Data protection ; Standards ; Electronic commerce ; Security measures ; Computer networks ; Security measures ; Liability for credit information ; Credit cards ; Electronic books ; Electronic books ; local
    Abstract: An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. All organisations that accept, store, transmit or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product overview Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.2, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation involved with payment card processing. Coverage includes: An overview of PCI DSS v3.2. A PCI self-assessment questionnaire (SAQ). Procedures and qualifications. An overview of the Payment Application Data Security Standard (PA-DSS). Contents What is the Payment Card Industry Data Security Standard (PCI DSS)? What is the scope of the PCI DSS? Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? Maintaining compliance PCI DSS - The Standard Aspects of PCI DSS compliance The PCI self-assessment questionnaire Procedures and qualifications The PCI DSS and ISO/IEC 27001 The Payment Application Data Security Standard (PA-DSS) PIN transaction security (PTS) About the authors Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. He leads the IT Governance CISSP Accelerated Training Programme, as well as the PCI Foundation and Implementer training courses. He has broad technical knowledge of security and IT infrastructure, including high performance computing and Cloud computing. His certifications include CISSP, PCI QSA, CREST Registered Tester, CEH and CHFI.
    Note: "Compliance series"--Cover. - Description based on online resource; title from title page (Safari, viewed August 26, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Fourth edition.
    Keywords: Data protection ; Standards ; Electronic commerce ; Security measures ; Computer networks ; Security measures ; Liability for credit information ; Credit cards ; Electronic books ; Electronic books ; local
    Abstract: An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. All organizations that accept, store, transmit, or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product overview Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.1, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organization involved with payment card processing. Coverage includes: An overview of PCI DSS v3.1. A PCI self-assessment questionnaire (SAQ). Procedures and qualifications. An overview of the Payment Application Data Security Standard (PA-DSS). Contents What is the Payment Card Industry Data Security Standard (PCI DSS)? What is the scope of the PCI DSS? Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? Maintaining compliance PCI DSS - The Standard Aspects of PCI DSS compliance The PCI self-assessment questionnaire Procedures and qualifications The PCI DSS and ISO/IEC 27001 The Payment Application Data Security Standard (PA-DSS) PIN transaction security (PTS) About the authors Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance, and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. He leads the IT Governance CISSP Accelerated Training Programme, as well as the PCI Foundation and Implementer training courses. He has broad technical knowledge of security and IT infrastructure, including high performance computing and Cloud computing. His certifications include CISSP, PCI QSA, CREST Registered Tester, CEH, and CHFI.
    Note: "Compliance series"--Cover. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 10, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    ISBN: 073844037X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information storage and retrieval systems ; Business ; Electronic books ; Electronic books ; local
    Abstract: Organizations of all sizes are faced with the challenge of managing massive volumes of increasingly valuable data. But storing this data can be costly, and extracting value from the data is becoming more difficult. IT organizations have limited resources but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V5000 system provides a smarter solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. Storwize V5000 delivers efficient, entry-level configurations that are specifically designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, Storwize V5000 offers advanced software capabilities that are usually found in more expensive systems. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. The concepts in this book also relate to the IBM Storwize V3700. This book was written at a software level of Version 7 Release 4.
    Note: Number on resource description page: SG24-8162-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed February 26, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corporation, International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: First edition.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Computer storage devices ; Information storage and retrieval systems ; Business ; Electronic books ; Electronic books ; local
    Abstract: Data is the new currency of business, the most critical asset of the modern organization. In fact, enterprises that can gain business insights from their data are twice as likely to outperform their competitors. Nevertheless, 72% of them have not started, or are only planning, big data activities. In addition, organizations often spend too much money and time managing where their data is stored. The average firm purchases 24% more storage every year, but uses less than half of the capacity that it already has. The IBM® Storwize® family, including the IBM SAN Volume Controller Data Platform, is a storage virtualization system that enables a single point of control for storage resources. This functionality helps support improved business application availability and greater resource use. The following list describes the business objectives of this system: To manage storage resources in your information technology (IT) infrastructure To make sure that those resources are used to the advantage of your business To do it quickly, efficiently, and in real time, while avoiding increases in administrative costs Virtualizing storage with Storwize helps make new and existing storage more effective. Storwize includes many functions traditionally deployed separately in disk systems. By including these functions in a virtualization system, Storwize standardizes them across virtualized storage for greater flexibility and potentially lower costs. Storwize functions benefit all virtualized storage. For example, IBM Easy Tier® optimizes use of flash memory. In addition, IBM Real-time Compression™ enhances efficiency even further by enabling the storage of up to five times as much active primary data in the same physical disk space. Finally, high-performance thin provisioning helps automate provisioning. These benefits can help extend the useful life of existing storage assets, reducing costs. Integrating these functions into Storwize also means that they are designed to operate smoothly together, reducing management effort. This IBM Redbooks® publication provides information about the latest features and functions of the Storwize V7000 Gen2 and software version 7.3 implementation, architectural improvements, and Easy Tier.
    Note: Number on resource description page: SG24-8244-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed February 10, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp. International Technical Support Organization
    ISBN: 0738440361
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Third edition/(March 2015).
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Computer storage devices ; Information storage and retrieval systems ; Electronic books ; Electronic books ; Electronic books ; local
    Abstract: Organizations of all sizes are faced with the challenge of managing massive volumes of increasingly valuable data. However, storing this data can be costly, and extracting value from the data is becoming more and more difficult. IT organizations have limited resources, but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V3700 system provides a solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. Storwize V3700 delivers efficient, entry-level configurations that are specifically designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, Storwize V3700 offers advanced software capabilities that are usually found in more expensive systems. Built on innovative IBM technology, Storwize V3700 addresses the block storage requirements of small and midsize organizations, Storwize V3700 is designed to accommodate the most common storage network technologies. This design enables easy implementation and management. Storwize V3700 includes the following features: Web-based GUI provides point-and-click management capabilities. Internal disk storage virtualization enables rapid, flexible provisioning and simple configuration changes. Thin provisioning enables applications to grow dynamically, but only use space they actually need. Enables simple data migration from external storage to Storwize V3700 storage (one-way from another storage device). Remote Mirror creates copies of data at remote locations for disaster recovery. IBM FlashCopy® creates instant application copies for backup or application testing. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. The concepts in this book also relate to the IBM Storwize V3500. This book was written at a software level of version 7 release 4.
    Note: Number from resource description page: SG24810702. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed March 25, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: Packet switching (Data transmission) ; Handbooks, manuals, etc ; Fibre Channel (Standard) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: IBM® System Storage® Gen 5 fabric backbones are among the industry's most powerful Fibre Channel switching infrastructure offerings. They provide reliable, scalable, and high-performance foundations for mission-critical storage. These fabric backbones also deliver enterprise connectivity options to add support for IBM FICON® connectivity, offering a high-performing and reliable FICON infrastructure with fast and scalable IBM System z® servers. Designed to increase business agility while providing nonstop access to information and reducing infrastructure and administrative costs, Gen 5 Fibre Channel fabric backbones deliver a new level of scalability and advanced capabilities to this robust, reliable, and high-performance technology. Although every network type has unique management requirements, most organizations face similar challenges managing their network environments. These challenges can include minimizing network downtime, reducing operational expenses, managing application service level agreements (SLAs), and providing robust security. Until now, no single tool could address these needs across different network types. To address this issue, the IBM Network Advisor management tool provides comprehensive management for data, storage, and converged networks. This single application can deliver end-to-end visibility and insight across different network types by integrating with Fabric Vision technology; it supports Fibre Channel SANs, including Gen 5 Fibre Channel platforms, IBM FICON, and IBM b-type SAN FCoE networks. In addition, this tool supports comprehensive lifecycle management capabilities across different networks through a simple, seamless user experience. This IBM Redbooks® publication introduces the concepts, architecture, and basic implementation of Gen 5 and IBM Network Advisor. It is aimed at system administrators, and pre- and post-sales support staff.
    Note: Number on resource description page: SG24-8186-00. - Description based on online resource, title from cover page (Safari, viewed ..., 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Language: English
    Pages: 1 online resource (374 pages)
    Keywords: Electronic books ; local
    Abstract: Data is the new currency of business, the most critical asset of the modern organization. In fact, enterprises that can gain business insights from their data are twice as likely to outperform their competitors; yet, 72 percent of them have not started or are only planning big data activities. In addition, organizations often spend too much money and time managing where their data is stored. The average firm purchases 24% more storage every year, but uses less than half of the capacity it already has. A member of the IBM® Storwize® family, IBM SAN Volume Controller (SVC) Data Platform is a storage virtualization system that enables a single point of control for storage resources to help support improved business application availability and greater resource utilization. The objective is to manage storage resources in your IT infrastructure and to make sure they are used to the advantage of your business, and do it quickly, efficiently, and in real time, while avoiding increases in administrative costs. Virtualizing storage with SVC Data Platform helps make new and existing storage more effective. SVC Data Platform includes many functions traditionally deployed separately in disk systems. By including these in a virtualization system, SVC Data Platform standardizes functions across virtualized storage for greater flexibility and potentially lower costs. SVC Data Platform functions benefit all virtualized storage. For example, IBM Easy Tier® optimizes use of flash storage. And IBM Real-time Compression™ enhances efficiency even further by enabling the storage of up to five times as much active primary data in the same physical disk space. Finally, high-performance thin provisioning helps automate provisioning. These benefits can help extend the useful life of existing storage assets, reducing costs. Integrating these functions into SVC Data Platform also means that they are designed to operate smoothly together, reducing management effort. In this IBM Redbooks® publication, we discuss the latest features and functions of the SVC 2145-DH8 and software version 7.3, implementation, architectural improvements, and Easy Tier.
    Note: Online resource; Title from title page (viewed October 19, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Poughkeepsie, NY : IBM Corp., International Technical Support Organization]
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: Virtual computer systems ; Storage area networks (Computer networks) ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes the IBM storage area network (SAN) and IBM SAN Volume Controller enhanced stretched cluster configuration when combined with VMware. We describe guidelines, settings, and implementation steps necessary to achieve a satisfactory implementation. Business continuity and continuous availability of applications are among the top requirements for many organizations today. Advances in virtualization, storage, and networking make enhanced business continuity possible. Information technology solutions can now be designed to manage both planned and unplanned outages and to take advantage of the flexibility, efficient use of resources, and cost savings that cloud computing offers. The IBM enhanced stretched cluster design offers significant functions for maintaining business continuity in a VMware environment. You can dynamically move applications across data centers without interruption to those applications. The live application mobility across data centers relies on these products and technologies: IBM System Storage® SAN Volume Controller enhanced stretched cluster solution VMware Metro vMotion for live migration of virtual machines A Layer 2 IP Network and storage networking infrastructure for high-performance traffic management Data center interconnection
    Note: Number on resource description page: SG24-8211-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Mar. 4, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Second edition.
    Keywords: Computer security ; Standards ; Data protection ; Electronic books ; Electronic books ; local
    Abstract: Information is one of your organisation's most important resources and keeping that information secure is vital to your business. An information security management system (ISMS) based on ISO27001/ISO27002 offers a host of benefits: Improved efficiency by having information security systems and procedures in place, enabling you to focus more on your core business. Protects your information assets from a wide range of cyber threats, criminal activity, insider compromise and system failure. Manage your risks systematically and establish plans to eliminate or reduce cyber threats. Enables earlier detection of threats or processing errors, and faster resolution. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an information security management system (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it.
    Note: Previous edition: 2008. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 10, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Ely, Cambridgeshire, U.K. : IT Governance Pub.
    ISBN: 9781849285551 , 1849285551
    Language: English
    Pages: 1 online resource (1 v.)
    Edition: 3rd ed.
    Keywords: Data protection ; Standards ; Electronic commerce ; Security measures ; Computer networks ; Security measures ; Liability for credit information ; Credit cards ; Electronic books ; Electronic books ; local
    Abstract: Get started with PCI DSS Protect your customers' card data All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal payment card details and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. Failing to comply with the standard can have serious consequences for your ability to process card payments. An ideal introduction and a quick reference to PCI DSS, including version 3.0 Co-written by a PCI QSA (Qualified Security Assessor) and updated to also cover PCI DSS version 3.0, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation who deals with payment card processing. Coverage includes: an overview of Payment Card Industry Data Security Standard V3.0 the consequences of a breach how to comply with the standard a PCI self-assessment questionnaire (SAQ) procedures and qualifications an overview of the Payment Application Data Security Standard Buy this pocket guide and get to grips with PCI DSS, including version 3.0 This title is part of The ITGP Compliance Series , a suite of essential guides to regulatory and legal compliance. Designed to help organisations in their efforts to address issues such as PCI DSS, anti-bribery policy management and data protection, this series is indispensable for anyone seeking to align their policies and procedures with laws and regulations. The guides also provide a quick, cost-effective way to raise awareness of key issues among staff, partners and external customers. About the Authors Alan Calder is the Founder and Executive Chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. Geraint has provided consultancy on implementation of the PCI DSS and conducted audits with a wide range of merchants and service providers. He has performed penetration testing and vulnerability assessments for various clients. Gera...
    Note: "Compliance series"--Cover. - Description based on online resource; title from title page (Safari, viewed Apr. 8, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Language: English
    Pages: 1 online resource (648 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Organizations of all sizes are faced with the challenge of managing massive volumes of increasingly valuable data. But storing this data can be costly, and extracting value from the data is becoming more difficult. IT organizations have limited resources but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V5000 system provides a smarter solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. Storwize V5000 delivers efficient, entry-level configurations that are specifically designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, Storwize V5000 offers advanced software capabilities that are usually found in more expensive systems. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. The concepts in this book also relate to the IBM Storwize V3700. This book was written at a software level of Version 7 Release 1.
    Note: Online resource; Title from title page (viewed October 22, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 4th ed.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information retrieval ; Information storage and retrieval systems ; Business ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication captures several of the preferred practices that are based on field experience and describes the performance gains that can be achieved by implementing the IBM System Storage® SAN Volume Controller and Storwize® V7000 V7.2. This book begins with a look at the latest developments with SAN Volume Controller and Storwize V7000 and reviews the changes in the previous versions of the product. It highlights configuration guidelines and preferred practices for the storage area network (SAN) topology, clustered system, back-end storage, storage pools and managed disks, volumes, remote copy services, and hosts. Then, this book provides performance guidelines for SAN Volume Controller, back-end storage, and applications. It explains how you can optimize disk performance with the IBM System Storage Easy Tier® function. Next, it provides preferred practices for monitoring, maintaining, and troubleshooting SAN Volume Controller and Storwize V7000. Finally, this book highlights several scenarios that demonstrate the preferred practices and performance guidelines.
    Note: Number on resource description page: SG24-7521-03. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed Nov. 6, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Armonk, NY : IBM Corp. International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Computer storage devices ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: Organizations of all sizes are faced with the challenge of managing massive volumes of increasingly valuable data. But storing this data can be costly, and extracting value from the data is becoming more and more difficult. IT organizations have limited resources but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V3700 system provides a smarter solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. Storwize V3700 delivers efficient, entry-level configurations that are specifically designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, Storwize V3700 offers advanced software capabilities that are usually found in more expensive systems. Built upon innovative IBM technology, Storwize V3700 addresses the block storage requirements of small and midsize organizations. Providing up to 240 TB of capacity packaged in a compact 2U, Storwize V3700 is designed to accommodate the most common storage network technologies to enable easy implementation and management. This IBM Redbooks® publication is intended for pre- and post-sales technical support professionals and storage administrators. The concepts in this book also relate to the IBM Storwize V3500. This book was written at a software level of Version 7 Release 1.
    Note: Number from resource description page: SG24-8107-01. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 13, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    ISBN: 0738438154
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information retrieval ; Electronic books ; Electronic books ; local
    Abstract: Businesses of all sizes are faced with the challenge of managing huge volumes of data that are becoming increasingly valuable. But storing this data can be costly, and extracting value from the data is becoming more and more difficult. IT organizations have limited resources and cannot afford to make investment mistakes. The IBM® Storwize® V3500 system provides a smarter solution that is affordable, simple, and efficient, which enables businesses to overcome their storage challenges. IBM Storwize V3500 is the most recent addition to the IBM Storwize family of disk systems. It delivers easy-to-use, entry-level configurations that are specifically designed to meet the modest budgets of small and medium-sized businesses. IBM Storwize V3500 features the following highlights: - Consolidate and share data with low cost iSCSI storage networking. - Deploy storage in minutes and perform storage management tasks quickly and easily through a breakthrough graphical user interface. - Experience peace of mind with proven IBM Storwize family high-availability data protection with snapshot technology and IBM warranty support. - Optimize efficiency by allocating only the amount of disk space needed at the time it is required with high performance, thin-provisioning capabilities.
    Note: Number on resource description page: SG24-8125-00. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 19, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (98 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Take your first step with Nine Steps Completely up to date with ISO27001:2013, this is the new edition of the original no-nonsense guide to successful ISO27001 certification. Ideal for anyone tackling ISO27001 for the first time, Nine Steps to Success outlines the nine essential steps to an effective ISMS implementation. Nine critical steps that mean the difference between project success and abject failure. Step-by-step advice for ISO27001: 2013 project success Based on his many years of first-hand experience with ISO27001, Alan Calder covers every single element of the ISO27001 project in simple, non-technical language, including: how to get management and board buy-in how to get cross-organizational, cross functional buy-in the gap analysis: how much do you really need to do? how to integrate with ISO9001 and other management systems how to structure and resource your project use consultants or do it yourself? the timetable and project plan risk assessment methodologies and tools the documentation challenges how to choose a certification body Read this book and discover the secrets of successful ISO27001:2013 certification
    Note: Online resource; Title from title page (viewed October 3, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Series Statement: IBM redbooks
    Keywords: Computer networks ; Client/server computing ; Storage area networks (Computer networks) ; Electronic books ; Electronic books ; local
    Abstract: To meet today's complex and ever-changing business demands, you need a solid foundation of server, storage, networking and software resources that is simple to deploy and can quickly and automatically adapt to changing conditions. You also need access to, and the ability to take advantage of, broad expertise and proven best practices in systems management, applications, hardware maintenance and more. IBM® PureFlex™ System, which is a part of the IBM PureSystems™ family of expert integrated systems, combines advanced IBM hardware and software along with patterns of expertise and integrates them into three optimized configurations that are simple to acquire and deploy so you can achieve faster time to value. If you want a pre-configured, pre-integrated infrastructure with integrated management and cloud capabilities, factory tuned from IBM with x86 and Power hybrid solution, IBM PureFlex System is the answer. In this IBM Redbooks® publication, we use EX4500 core switches to demonstrate interoperability with the System Networking switches (RackSwitch™ G8264 top of rack switch and the Flex system fabric EN4093 10Gb scalable switch). We also describe a redundant environment using QFX3500 switches running IBM Virtual-Link Aggregation Group (MC-LAG/vLAG) and Juniper Multi- Chassis-Link Aggregation Group.
    Note: Number on resource description page: SG24-8094-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Sept. 30, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 3rd ed.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication describes the new features that have been added with the release of the IBM System Storage® SAN Volume Controller (SVC) and IBM System Storage Storwize® V7000 6.4.0 code, including Replication Family Services. Replication Family Services refers to the various copy services available on the SVC and Storwize V7000 including IBM FlashCopy®, Metro Mirror and Global Mirror, Global Mirror with Change Volumes, Volume Mirroring, and Stretched Cluster Volume Mirroring. The details behind the theory and practice of these services are examined, and SAN design suggestions and troubleshooting tips are provided. Planning requirements, automating copy services processed, and fabric design are explained. Multiple examples including implementation and server integration are included, along with a discussion of software solutions and services that are based on Replication Family Services. This book is intended for use by pre-sales and post-sales support, and storage administrators. Readers are expected to have an advanced knowledge of the SVC, Storwize V7000, and the SAN environment. The following publications are useful resources that provide background information: Implementing the IBM System Storage SAN Volume Controller V6.3, SG24-7933 Implementing the IBM Storwize V7000 V6.3, SG24-7938 IBM SAN Volume Controller and Brocade Disaster Recovery Solutions for VMware, REDP-4626[ IBM System Storage SAN Volume Controller Upgrade Path from Version 4.3.1 to 6.1, REDP-4716[ Real-time Compression in SAN Volume Controller and Storwize V7000, REDP-4859 SAN Volume Controller: Best Practices and Performance Guidelines, SG24-7521 Implementing the Storwize V7000 and the IBM System Storage SAN32B-E4 Encryption Switch, SG24-7977
    Note: Number on resource description page: SG24-7574-02. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Jan. 30, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: Computer networks ; Client/server computing ; Storage area networks (Computer networks) ; Electronic books ; Electronic books ; local
    Abstract: To meet today's complex and ever-changing business demands, you need a solid foundation of server, storage, networking, and software resources that are simple to deploy and can quickly and automatically adapt to changing conditions. You also need access to, and the ability to take advantage of, broad expertise and proven best practices in systems management, applications, hardware maintenance, and more. IBM® PureFlex™ System, which is a part of the IBM PureSystems™ family of expert integrated systems, combines advanced IBM hardware and software along with patterns of expertise and integrates them into three optimized configurations that are simple to acquire and deploy so that you can achieve faster time to value. If you want a preconfigured, preintegrated infrastructure with integrated management and cloud capabilities, factory tuned from IBM with x86 and Power Systems™ hybrid solution, IBM PureFlex System is the answer. In this IBM Redbooks® publication, which is aimed at system and network administrators, we show the design and architecture, how to configure hosts and switches, maintain, and troubleshoot using the IBM Flex System™ Ethernet I/O modules (EN2091 1Gb Ethernet Scalable Switch and EN4093R 10Gb Scalable Switch).
    Note: Number on resource description page: SG24-8089-00. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Dec. 17, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (78 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local
    Abstract: Protect your organisation's information assets using ISO27001:2013 Information is one of your organisation's most important resources. Keeping it secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it. Furthering the objectives of your organisation Information security means much more than a technology solution, and requires buy-in from senior managers and the collaboration of all staff in the organisation. For this reason, ISO27001 is not a one-size-fits solution, nor is it designed to be a static, fixed entity. By looking at ISO27001 and ISO27002 together, this pocket guide gives a wider view of what it means to implement an ISO27001 ISMS. Creating an ISMS based on ISO27001/ISO27002 will help you to: Improve efficiency by having systems and procedures in place that mean people spend less time 'fire-fighting' and reacting in an ad-hoc way to security incidents. Protect your information assets from a wide range of cyber threats, such as criminal activity and fraud, user errors, outside attack, insider compromise and system failure. Manage risk systematically and put in place a plan to eliminate or reduce cyber threats to your organisation. Prepare for the worst as ISO27001 requires you to monitor information security events, enabling earlier detection of threats or processing errors, and faster resolution. Completely up to date with the latest 2013 release of ISO27001, ISO27001/ISO27002: A Pocket Guide covers: The ISO/IEC 27000:2013 family of information security standards Background to the standards certification process The ISMS and ISO27001:2013 Specification vs. Code of Practice Documentation & Records Management Responsibility Policy & Scope Risk Assessment Implementation Continual Improvement Next step to certification? If your ISMS conforms to the specification of ISO27001, you can arrange for an independent audit of the ISMS against that specification and eventually achieve certification. We publish a range of ISMS documentation toolkits and books such as Nine Steps to Success, to help you do this. Buy this book and start securing your information assets today
    Note: Online resource; Title from title page (viewed October 3, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 1st ed.
    Series Statement: IBM redbooks
    Keywords: Virtual computer systems ; Client/server computing ; Web servers ; Electronic books ; Electronic books ; local
    Abstract: To meet today's complex and ever-changing business demands, you need a solid foundation of server, storage, networking, and software resources. It must be simple to deploy and able to quickly and automatically adapt to changing conditions. You also need access to, and the ability to take advantage of, broad expertise and proven best practices in systems management, applications, hardware maintenance, and more. IBM® PureFlex™ System is part of the IBM PureSystems™ family of expert integrated systems. It combines advanced IBM hardware and software along with patterns of expertise and integrates them into three optimized configurations that are simple to acquire and deploy. With the PureFlex System, you can achieve faster time to value. If you want a pre-configured, pre-integrated infrastructure with integrated management and cloud capabilities, factory tuned from IBM with x86 and Power hybrid solution, IBM PureFlex System is the answer. In this IBM Redbooks® publication, the examples use a Cisco Nexus 5000 Series Switch, although any configurations should also apply to the Cisco Nexus 7000 Series Switch too. However, it is wise to check as there might be minor differences. This book also covers the different variations for the implementation of these use cases when you use Cisco Catalyst Series Switches.
    Note: Number on resource description page: SG24-8092-00. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed Jan. 31, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    ISBN: 0738437131
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 5th ed.
    Series Statement: IBM Redbooks
    Keywords: Storage area networks (Computer networks) ; Computer networks ; Data warehousing ; Electronic books ; Electronic books ; local
    Abstract: The plethora of data that is created by the businesses of today is making storage a strategic investment priority for companies of all sizes. As storage takes precedence, three major initiatives emerge: Flatten and converge your network IBM takes an open, standards-based approach to implement the latest advances in the flat, converged data center network designs of today. IBM System Networking solutions enable clients to deploy a high-speed, low-latency Unified Fabric Architecture. Optimize and automate virtualization Advanced virtualization awareness reduces the cost and complexity of deploying physical and virtual data center infrastructure. Simplify management IBM data center networks are easy to deploy, maintain, scale, and virtualize, delivering the foundation of consolidated operations for dynamic infrastructure management. Storage is no longer an afterthought. Too much is at stake. Companies are searching for more ways to efficiently manage expanding volumes of data, and to make that data accessible throughout the enterprise. This demand is propelling the move of storage into the network. Also, the increasing complexity of managing a large numbers of storage devices and vast amounts of data is driving greater business value into software and services. With current estimates of the amount of data to be managed and made available increasing at 60 percent each year, this outlook is where a storage area network (SAN) enters the arena. SANs are the leading storage infrastructure for the global economy of today. SANs offer simplified storage management, scalability, flexibility, and availability; and improved data access, movement, and backup. Welcome to the era of Smarter Networking for Smarter Data Centers. The smarter data center with improved economics of IT can be achieved by connecting servers and storage with a high-speed and intelligent network fabric. A smarter data center that hosts IBM System Networking solutions can provide an environment that is smarter, faster, greener, open, and easy to manage. This IBM Redbooks® publication provides an introduction to the SAN and Ethernet networking, and how these networks help to achieve a smarter data center. This book is intended for people who are not very familiar with IT, or who are just starting out in the IT world. For more information, and a deeper dive into the SAN world, you might find the following Redbooks publications especially useful to expand your SAN knowledge: Implementing a...
    Note: Number on back cover: SG24-5470-04. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Jan. 30, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Armonk, NY : IBM Corp. International Technical Standards Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Computer storage devices ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 solution, an innovative new storage offering that delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. The IBM Storwize V7000 solution incorporates some of the top IBM technologies typically found only in enterprise-class storage systems, raising the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 system through several examples. This book is aimed at pre- and post-sales technical support and marketing, storage administrators, and will help you understand the architecture of the Storwize V7000, how to implement it, and take advantage of the industry leading functions and features.
    Note: Number on resource description page: SG24-7938-01. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 13, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: Storage area networks (Computer networks) ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller (SVC) Version 6.3.0. SAN Volume Controller is a virtualization appliance solution, which maps virtualized volumes that are visible to hosts and applications, to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the "block" level in a network, thus enabling applications and servers to share storage devices on a network. This book is intended for readers who need to implement the SVC at a 6.3.0 release level with a minimum of effort.
    Note: Number on resource description page: SG24-7933-01. - Includes bibliographical references. - Description based on online resource; title from cover (Safari, viewed Jan. 30, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 4th ed.
    Series Statement: IBM redbooks
    Keywords: Routers (Computer networks) ; Database management ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: The rapid spread and adoption of production storage area networks (SANs) has fueled the need for multiprotocol routers. The routers provide improved scalability, security, and manageability by enabling devices in separate SAN fabrics to communicate without merging fabrics into a single, large SAN fabric. This capability enables clients to initially deploy separate SAN solutions at the departmental and data center levels. Then, clients can consolidate these separate solutions into large enterprise SAN solutions as their experience and requirements grow and change. Alternatively, multiprotocol routers can help to connect existing enterprise SANs for a variety of reasons. For instance, the introduction of Small Computer System Interface over IP (iSCSI) provides for the connection of low-end, low-cost hosts to enterprise SANs. The use of an Internet Protocol (IP) in the Fibre Channel (FC) environment provides for resource consolidation and disaster recovery planning over long distances. And the use of FC-FC routing services provides connectivity between two or more fabrics without having to merge them into a single SAN. This IBM® Redbooks® publication targets storage network administrators, system designers, architects, and IT professionals who sell, design, or administer SANs. It introduces you to products, concepts, and technology in the IBM System Storage™ SAN Routing portfolio, which is based on Brocade products and technology. This book shows the features of these products and examples of how you can deploy and use them.
    Note: Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed Feb. 3, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Language: English
    Pages: 1 online resource (626 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000, an innovative new storage offering that delivers essential storage efficiency technologies and exceptional ease of use and performance, all integrated into a compact, modular design that is offered at a competitive, midrange price. IBM Storwize V7000 incorporates some of the top IBM technologies typically found only in enterprise-class storage systems, raising the standard for storage efficiency in midrange disk systems. This cutting-edge storage system extends the comprehensive storage portfolio from IBM and can help change the way organizations address the ongoing information explosion. This IBM Redbooks® publication introduces the features and functions of the IBM Storwize V7000 through several examples. This book is aimed at pre- and post-sales technical support and marketing, storage administrators, and will help you understand the architecture of the Storwize V7000, how to implement it, and take advantage of the industry leading functions and features.
    Note: Online resource; Title from title page (viewed May 31, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (218 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® document introduces the IBM Converged Switch B32. This switch supports Fibre Channel over Ethernet (FCoE), Fibre Channel, Converged Enhanced Ethernet (CEE), and traditional Ethernet protocol connectivity for servers and storage. FCoE is a new protocol that can expand Fibre Channel into the Ethernet environment, and it helps to combine and leverage the advantages of two technologies, Fibre Channel protocol and Ethernet. Features of the IBM Converged Switch B32 include: A 32-port multiprotocol switch for server I/O consolidation Enterprise-class availability for business continuance Improved return on investment and investment protection Fabric security for mission-critical information In the related publication An Introduction to Fibre Channel over Ethernet, and Fibre Channel over Convergence Enhanced Ethernet, REDP-4493 we introduce FCoE and CEE concepts.
    Note: Online resource; Title from title page (viewed April 23, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    ISBN: 0738435228
    Language: English
    Pages: 1 online resource (880 pages)
    Keywords: Electronic books ; local
    Abstract: This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage® SAN Volume Controller (SVC) Version 6.1.0. SAN Volume Controller is a virtualization appliance solution which maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the storage area network (SAN) has its own set of virtual storage addresses that are mapped to physical addresses. If the physical addresses change, the server continues running using the same virtual addresses that it had before. Therefore, volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the “block” level in a network, thus enabling applications and servers to share storage devices on a network. This book is intended for readers who need to implement the SVC at a 6.1.0 release level with a minimum of effort.
    Note: Online resource; Title from title page (viewed May 16, 2011) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Ely, Cambridgeshire, U.K. : IT Governance Pub.
    Language: English
    Pages: 1 online resource (1 v.)
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Dictionaries ; Computer security ; Terminology ; Business enterprises ; Computer networks ; Security measures ; Auditing ; Dictionaries ; Computer security ; Management ; Standards ; Dictionaries ; Data protection ; Management ; Standards ; Dictionaries ; Information technology ; Standards ; Dictionaries ; Confidential business information ; Dictionaries ; Electronic books ; Electronic books ; local
    Abstract: Get to grips with key ISO27000 and information security vocabulary with this indispensable, concise pocket guide! Information security is of crucial importance to your business. If you don't know the difference between a cookie and a worm, or between war-chalking and digital watermarking, you are sure to find this guide enlightening. The strength of the book is that it is a combined glossary, enabling you to find explanations of geek slang, procedural language and acronyms all in one place. The combined glossary is a revised edition of the popular A Dictionary of Information Security Terms , and this new edition has been able to draw on the definitions provided in ISO/IEC 27000:2009 - Security Techniques - Information security management systems - Overview and vocabulary . What's new? Further definitions are sourced from ISO/IEC Guide 73:2002 to provide you with authoritative explanations of those information security terms that are used across the ISO framework. The combined glossary has taken account of an important change on the information security scene, and contains some new acronyms and definitions from the Payment Card Industry Data Security Standard (PCI DSS). Benefits to business include: Understand what everyone else is talking about The fact that you're reading this suggests you take an interest in information security. Whether you work in business or in the public sector, it's an issue that's likely to come up. If you're given a position paper to read on information security, or have to attend a briefing, you will want to form your own opinion, particularly when the discussion directly affects your company. Meekly accepting arguments you don't understand is never a good idea, especially not when large sums of money are involved. With the clear, reliable definitions contained in this combined glossary, you can finally get to grips with the problem. Understand what you're talking about Any modern organisation relies on its IT systems. Although IT may not be your speciality, cybercrime affects all of us. So, wherever you work, if you are in a position of responsibility, then at some point, you will need to form a view on information security and put your point across. You can use this combined glossary to bring your arguments into sharper focus. The pocket guide will prove invaluable not only to business executives but also to civil servants and lawyers, as well as to people working in financial services and the media. Assist ISO im...
    Note: "First published in the United Kingdom in 2007 (as A Dictionary of Information Security Terms, Abbreviations and Acronyms)"--T.p. verso. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Computer networks ; Security measures ; Risk management ; Electronic books ; Electronic books ; local
    Abstract: Plan and carry out a risk assessment to protect your business information. In the knowledge economy, organisations have to be able to protect their information assets. Information security management has, therefore, become a critical corporate discipline. The international code of practice for an information security management system (ISMS) is ISO27002. As the code of practice explains, information security management enables organisations to 'ensure business continuity, minimise business risk, and maximise return on investments and business opportunities'. Information Security Management System requirements The requirements for an ISMS are specified in ISO27001. Under ISO27001, a risk assessment has to be carried out before any controls can be selected and implemented, making risk assessment the core competence of information security management. This book provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO27001. International best practice Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software. Benefits of a risk assessment Stop the hacker . With a proper risk assessment, you can select appropriate controls to protect your organisation from hackers, worms and viruses, and other threats that could potentially cripple your business. Achieve optimum ROI. Failure to invest sufficiently in information security controls is 'penny wise, pound foolish', since, for a relatively low outlay, it is possible to minimise your organisation's exposure to potentially devastating losses. However, having too many safeguards in place will make information security system expensive and bureaucratic; so without accurate planning your investment in information security controls can become unproductive. With the aid of a methodical risk assessment, you can select and implement your information security controls to ensure that your resources will be allocated to countering the major risks to your organisation. In this way, you will optimise your return on investment. Build customer confidence. Protecting your information security ...
    Note: Publication information taken from resource description page (Safari, viewed August 19, 2013). - Includes bibliographical references. - Description based on online resource; title from cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    [Poughkeepsie, NY? : IBM Corporation, International Technical Support Organization?]
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 8th ed.
    Series Statement: IBM redbooks
    Keywords: Computer storage devices ; Information retrieval ; Information storage and retrieval systems ; Electronic books ; Electronic books ; local
    Abstract: This IBM® Redbooks® publication is a detailed technical guide to the IBM System Storage™ SAN Volume Controller (SVC), a virtualization appliance solution that maps virtualized volumes that are visible to hosts and applications to physical volumes on storage devices. Each server within the SAN has its own set of virtual storage addresses, which are mapped to physical addresses. If the physical addresses change, the server continues running using the same virtual addresses that it had before. This capability means that volumes or storage can be added or moved while the server is still running. The IBM virtualization technology improves the management of information at the "block" level in a network, enabling applications and servers to share storage devices on a network. This book is intended to allow you to implement the SVC at a 5.1.0 release level with a minimum of effort.
    Note: Number from resourAce description page: SG24-6423-07. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed Feb. 7, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Poughkeepsie, NY : IBM Corp., International Technical Support Organization
    ISBN: 0738435015
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Series Statement: IBM redbooks
    Keywords: Information storage and retrieval systems ; Data libraries ; Data processing service centers ; Electronic books ; Electronic books ; local
    Abstract: As organizations drive to transform and virtualize their IT infrastructures to reduce costs, and manage risk, networking is pivotal to success. Optimizing network performance, availability, adaptability, security, and cost is essential to achieving the maximum benefit from your infrastructure. In this IBM® Redbooks® publication, we address these requirements: Expertise to plan and design networks with holistic consideration of servers, storage, application performance, and manageability Networking solutions that enable investment protection with performance and cost options that match your environment Technology and expertise to design and implement and manage network security and resiliency Robust network management software for integrated, simplified management that lowers operating costs of complex networks IBM and Brocade have entered into an agreement to provide expanded network technology choices with the new IBM b-type Ethernet Switches and Routers, to provide an integrated end-to-end resiliency and security framework. Combined with the IBM vast data center design experience and the Brocade networking expertise, this portfolio represents the ideal convergence of strength and intelligence. For organizations striving to transform and virtualize their IT infrastructure, such a combination can help you reduce costs, manage risks, and prepare for the future. This book is meant to be used along with "IBM b-type Data Center Networking: Product Introduction and Initial Setup," SG24-7785.
    Note: Number on resource description page: SG24-7786-01. - Includes bibliographical references. - Description based on online resource; title from cover page (Safari, viewed Jan. 29, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (64 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams. Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills. This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives. How this book can help information security professionals: Understand basic sales techniques Find out what to do to capture the attention of management and win them over Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing. Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success. Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives. Improve your powers of persuasion with the board ... Buy this pocket guide today!
    Note: Online resource; Title from title page (viewed June 24, 2010) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Information technology ; Management ; Business enterprises ; Computer networks ; Information technology ; Evaluation ; Auditing ; Standards ; Electronic books ; Electronic books ; local
    Abstract: Use an IT Governance strategy to reduce risk An Introduction for Directors and IT professionals The modern organisation is increasingly working within the context of corporate governance. The subject dictates their day-to-day and strategic activities, especially corporate information asset risk management and investment, and the ICT infrastructure within which those information assets are collected, manipulated, stored and deployed. But what is corporate governance, and why is it important to the IT professional? Why is IT governance important to the company director, and what do directors of companies - both quoted and unquoted - need to know? The Calder-Moir Framework The book also explains how to integrate each standard and framework using The Calder-Moir Framework (download for free from www.itgovernance.co.uk/calder_moir.aspx ), which was developed specifically to help organisations manage and govern their IT operations more effectively, and to coordinate the sometimes wide range of overlapping and competing frameworks and standards. It also specifically supports implementation of ISO/IEC 38500, the international standard for best practice IT governance. Practical IT Governance guidance Board executives and IT professionals can learn to maximise their use of the numerous IT management and IT governance frameworks and standards - particularly ISO/IEC 38500 - to best corporate and commercial advantage. Build an IT Governance Framework Within a 'super framework', or 'meta -framework', you can integrate each of these standards and frameworks whilst making sure that each can deliver what it was designed to do. Developing an overarching framework will enable your organisation to design IT governance to meet your own needs.
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Pub.
    Language: English
    Pages: 1 online resource (1 v.)
    Parallel Title: Erscheint auch als
    Keywords: Information technology ; Environmental aspects ; Business enterprises ; Environmental aspects ; Social responsibility of business ; Business ethics ; Environmental protection ; Global warming ; Electronic books ; Electronic books ; local
    Abstract: Reap the rewards of a Green IT Strategy with this essential guide Climate change can be an emotive issue. This book takes a cool look at the subject and shows you what makes it relevant to your business. A big part of the answer is energy. Computers consume a lot of energy, and energy costs money. The cost of powering and cooling data servers over three years is currently 1.5 times the cost of purchasing the server hardware. Over the next two decades, global demand for energy is predicted to rise by 50%, which means that your long-term energy costs are also likely to increase. In the end, if your organisation's energy costs are high, it makes sense for you to focus on ways to reduce energy consumption. Improving the efficiency of data centre power supplies and reducing IT power requirements in the office are examples of how Green IT can yield a substantial return on investment. This business guide to Green IT was written to introduce, to a business audience, the opposing groups and the key climate change concepts, to provide an overview of a Green IT strategy and to set out a straightforward, bottom-line orientated Green IT action plan. Benefits to business of a Green IT strategy: Cut costs A Green IT strategy, including such measures as switching off PCs at night, or introducing Cloud Computing, will enable you to reduce the amount of energy that your organisation consumes and, therefore, to cut costs. Improve sales Products that can demonstrate their green credentials are more attractive to consumers. As organisations pursue more ambitious environmental objectives, they are putting their suppliers under increasing pressure to improve their own environmental record. Meanwhile, the public sector has adopted rigorous standards for Green procurement. With Green IT you can help your company to reach more customers and to win new business. Enhance your organisation's reputation The environment is an emotional issue, and environmental concerns affect the way your company is perceived by consumers. Green IT will support your company's Corporate Social Responsibility (CSR) strategy by reducing the environmental impact of your operations. The evidence suggests that the market rewards companies whose practices are environmentally responsible. Conform to regulations and standards New regulations, such as the Waste Electrical and Electronic Equipment (WEEE) Directive, aim to reduce the effects on the environment resulting from the use and disposal of I...
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (62 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: A Green office is a cost-effective office! Understand why with this handy reference guide!
    Note: Online resource; Title from title page (viewed March 5, 2009) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Cambridgeshire, UK : IT Governance Pub.
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Business planning ; Operational risk ; Emergency management ; Information technology ; Electronic books ; Electronic books ; local
    Abstract: The first glossary to present the full range of terms relating to business continuity BS25999 is the formal standard for business continuity management. This invaluable pocket guide will help you to understand the language of business continuity. It contains definitions both of the key words in BS25999 and of the relevant terms found in the information security standard, ISO27001. Other definitions provided in the glossary have been taken from the earlier glossaries published by the Business Continuity Institute and the DRI (Institute for Continuity Management), from the IT service management standard, ISO20000, and from the IT Infrastructure Library (ITILv3). Created to facilitate the adoption of BS25999, the combined glossary sets out the most common business continuity terms and offers an authoritative explanation of what they mean. It will therefore enable business continuity to be discussed clearly and consistently throughout the English-speaking world. Benefits to business include: Improve communication and cooperation Business continuity management requires commitment at boardroom level, and involves many different people within a given organisation. The purpose of this glossary is to facilitate communication and thereby make it easier for IT managers, business continuity professionals and senior executives to cooperate Find a glossary that is comprehensive Just as business continuity affects many different functions within the organisation, so it also touches upon other standards besides BS25999. This glossary combines definitions of words from BS25999 with terms both from other information security standards and from the IT Infrastructure Library. As the first truly comprehensive glossary of business continuity terms, this pocket guide is the only book where you can find an explanation of all the relevant business continuity terms in one place Stay in the loop If your organisation is setting up a business continuity management plan, you have a choice. Either you get involved in the process, or the key decisions will be taken without your input. If you want to be kept in the loop on business continuity planning, this guide can help you to understand what people are talking about and how it relates to your area of responsibility Help your staff to plan for an emergency Business continuity planning is a vital imperative for those public sector organisations that are responsible for frontline services. Under the UK Civil Contingencies Act...
    Note: Description based on online resource; title from title page (Safari, viewed Dec. 18, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Ely, U.K. : IT Governance Pub.
    Language: English
    Pages: 1 online resource (1 v.)
    Keywords: Information technology ; Security measures ; Computer networks ; Security measures ; Data protection ; Risk management ; Electronic books ; Electronic books ; local
    Abstract: Use ISO27001 to protect your organisation's information assets This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Read this pocket guide to learn about: The ISO/IEC 27000 Family of Information Security Standards Background to the Standards Certification process The ISMS and ISO27001 Overview of ISO/IEC 27001:2005 Specification vs Code of Practice Documentation Records Management Responsibility Policy Scope Risk Assessment Implementation. Confidentiality, Integrity and Availability In order to ensure the availability, confidentiality and integrity of your business information, you will need to put in place an information security management system (ISMS). ISO27001 is the international standard that offers a framework for an ISMS. If your organisation's ISMS conforms to the specification of ISO27001, you can arrange for an independent audit of the ISMS against that specification and eventually achieve certification. Why does ISO27001/27002 matter? Improve efficiency - An ISO27001 compliant ISMS will enable your organisation to move beyond the ad hoc approach to information security. An unsystematic approach to the subject tends to mean that a lot of people's time is wasted ""putting out bush fires"": fixing bugs in software and reacting to incidents as they arise. However, the structured, coherent approach of the ISMS will make your organisation less likely to be crippled by minor setbacks and will, therefore, enable it to function more effectively Protect your information assets - Information assets face a wide range of threats, ranging from criminal activity, such as fraud, to user error or system failure. Putting in place an ISMS, will enable you to improve the level of information security within your organisation Manage risk - The systematic approach to information security required under ISO27001, means your organisation needs to put in place a risk treatment plan. Once you have identified the main threats to your business information, and the most likely ways in which they could do damage to your company, you can work out how best to eliminate or reduce these risks. In addition, there are some risks you can manage by ensuring they remain at an acceptable level Prepare for the worst - Supposing that, in spite of the precautions you had taken, your company did suffer a major security breach. If something like that happened, how well prepared would your company th...
    Note: Description based on online resource; title from title page (Safari, viewed August 19, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    [United States?] : IBM, International Technical Support Organization | Boston, Mass. :Safari Books Online,
    ISBN: 0738485780 , 9780738485782
    Language: English
    Pages: xvi, 308 p , ill.
    DDC: 004.6
    Keywords: Storage area networks (Computer networks) ; Electronic data processing Backup processing alternatives ; Virtual storage (Computer science) ; Electronic books ; local ; Storage area networks (Computer networks) ; Virtual storage (Computer science) ; Electronic data processing ; Backup processing alternatives ; Electronic books ; Réseaux de stockage (Informatique) ; Sauvegarde (Informatique) ; Ordinateurs ; Mémoires virtuelles
    Abstract: This IBM® Redbook captures some of the best practices based on field experience and details the performance gains that can be achieved by implementing the IBM System Storage™ SAN Volume Controller. This book is intended for very experienced storage, SAN, and SVC administrators and technicians. Readers are expected to have an advanced knowledge of the SVC and SAN environment, and we recommend these books as background reading: IBM System Storage SAN Volume Controller, SG24-6423 Introduction to Storage Area Networks, SG24-5470 Using the SVC for Business Continuity, SG24-7371
    Note: "SG24-7521-00.". - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (95 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: Invaluable advice on information security in clear, accessible language! Are you making it too easy for online fraudsters to steal from your company? IT is opening up new opportunities for your business. It also offers rich pickings for the criminal. The new threat When legitimate business goes digital, organised crime cannot be far behind. So, once your business is connected to the Internet, you become vulnerable to a whole range of new threats. Hackers can break into your computer, using dictionary attacks or keystroke logging to seize the password to your email account. ; Criminals may send you emails in an attempt to trick you into downloading malicious software or to reveal your bank details. Online fraud may now be as valuable to organised crime as drug trafficking, and there are roughly 200,000 viruses, Trojans and worms circulating in cyberspace. All this means that in today's world, the bad guys are only a mouse-click away. What you can do Your business information is valuable, so it is in your interest to protect it. You also have a responsibility towards your customers. While information security breaches are costly in themselves, you also have to think about what exposing your customers to the danger of identity theft might do to your company's reputation. Sometimes these issues seem complex and bewildering. The good news is that you can take some simple steps that will help to secure your business's digital information. Common-sense precautions, like not leaving your laptop lying around in a public place, or protecting your wireless network with a firewall, make a real difference. Speaking your language If IT is not your speciality, and you are running a small business that is connected to the Internet, then this book is for you. The author steers clear of geek language, and offers you, in plain English, ten simple rules to keep you out of trouble online. The damage and losses that result from online fraud can run into thousands of pounds, so this could well be the most valuable books you ever buy! Benefits to business include: Retain customer confidence If you cannot protect your customer data, then you will leave it exposed to hackers and thieves. Breaches in your information security will not only alienate existing customers, but also scare other potential customers away. To protect the reputation of your company, you need to get up to speed on information security. Avoid fines and lawsuits If you are running a business, you ha...
    Note: Online resource; Title from title page (viewed July 1, 2008) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...