Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari, an O’Reilly Media Company.  (15)
  • Calder, Alan  (9)
  • Cooke, Jamie
  • Audiobooks ; local  (15)
  • Computer networks ; Security measures  (10)
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782396
    Language: English
    Pages: 1 online resource (4949 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: The NIST CSF is a framework for organizations to manage and mitigate cybersecurity risk based on existing standards, guidelines, and practices.
    Note: Online resource; Title from title page (viewed July 27, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (33201 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: You can base your Micro Frontends directly off the examples in the book! Barnaby Norman, Frontend Developer Browser-based software can quickly become complex and difficult to maintain, especially when it's implemented as a large single-page application. By adopting the micro frontends approach and designing your web apps as systems of features, you can deliver faster feature development, easier upgrades, and pick and choose the technology you use in your stack. Micro Frontends in Action is your guide to simplifying unwieldy frontends by composing them from small, well-defined units. about the technology Micro frontends deliver the same flexibility and maintainability to browser-based applications that microservices provide for backend systems. You design your project as a set of standalone components that include their own interfaces, logic, and storage. Then you develop these mini-applications independently and compose them in the browser. about the book Micro Frontends in Action teaches you to apply the microservices approach to the frontend. You’ll start with the core micro frontend design ideas. Then, you'll build an e-commerce application, working through practical issues like server-side and client-side composition, routing, and maintaining a consistent look and feel. Finally, you'll explore team workflow patterns that maximize the benefit of developing application components independently. what's inside Create a unified frontend from independent applications Combine JavaScript code from multiple frameworks Browser and server-side composition and routing Implement effective dev teams and project workflow about the audience For web developers, software architects, and team leaders. about the author Michael Geers is a software developer specializing in building user interfaces. An excellent starting point to understand how to introduce micro frontends in your projects. Potito Coluccelli Expert practical advice for robust frontend development. The final piece of the micro puzzle! Adail Retamal, Cubic Transportation Systems A very concise and logically structured introduction to implementing a micro frontends team infrastructure. Tanya Wilke, Sanlam A definitive guide for applying micro frontends architecture to any existing UI technology. Karthikeyarajan Rajendran, Johnson Controls India NARRATED BY SARAH DAWE
    Note: Online resource; Title from title page (viewed August 25, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (27302 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Whether you’re a Python novice or, like me, have been away from the language for a while, this book is a great way to build strength with Python. Mark Elston, Advantest America The only way to master a skill is to practice. In Python Workout , author Reuven M. Lerner guides you through 50 carefully selected exercises that invite you to flex your programming muscles. As you take on each new challenge, you'll build programming skill and confidence. The thorough explanations help you lock in what you've learned and apply it to your own projects. Along the way, Python Workout provides over four hours of screencasts walking you through the solutions to each exercise and dozens of additional exercises for you to try on your own. about the technology To become a champion Python programmer you need to work out, building mental muscle with your hands on the keyboard. Each carefully selected exercise in this unique book adds to your Python prowess—one important skill at a time. about the book Python Workout presents 50 exercises that focus on key Python 3 features. In it, expert Python coach Reuven M. Lerner guides you through a series of small projects, practicing the skills you need to tackle everyday tasks. You'll appreciate the clear explanations of each technique, and you can watch Reuven solve each exercise in the screencasts. what's inside 50 hands-on exercises and solutions Coverage of all Python data types Dozens more bonus exercises for extra practice about the audience Requires basic Python knowledge. about the author Reuven M. Lerner teaches Python and data science to companies around the world. A practical introduction to the Python programming language, built around fun and well-chosen exercises. Jens Christian Bredahl Madsen, Systematic The practical course you need to become fluent in Pythonic programming! Jean-François Morin, Laval University This book pulls back the layers and allows you to master Python. Jeff Smith, Agilify Automation NARRATED BY MARK THOMAS
    Note: Online resource; Title from title page (viewed July 2, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787782419
    Language: English
    Pages: 1 online resource (6322 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: This book will help managers and team members alike who are about to or have already started working remotely. It will enable managers to comprehend the challenges of managing remote workers and put strategies in place to overcome these, and will advise employees how to approach their work when doing so remotely.
    Note: Online resource; Title from title page (viewed December 18, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Packt Publishing | Boston, MA : Safari
    ISBN: 9781839214486 , 1839214481 , 9781839216992
    Language: English
    Pages: 1 online resource (330 pages)
    Edition: 1st edition
    DDC: 658.478
    Keywords: Cyberterrorism ; Business enterprises Computer networks ; Security measures ; Computer security ; Electronic books ; local ; Cyberterrorisme ; Sécurité informatique ; Cyberterrorism ; Computer security ; Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures
    Abstract: Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book Description The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is for This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.
    Note: Online resource; Title from title page (viewed February 25, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (32798 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Your team will change whether you like it or not. People will come and go. Your company might double in size or even be acquired. In this practical book, author Heidi Helfand shares techniques for reteaming effectively. Engineering leaders will learn how to catalyze team change to reduce the risk of attrition, learning and career stagnation, and the development of knowledge silos. Based on research into well-known software companies, the patterns in this book help CTOs and team managers effectively integrate new hires into an existing team, manage a team that has lost members, or deal with unexpected change. You’ll learn how to isolate teams for focused innovation, rotate team members for knowledge sharing, break through organizational apathy, and more. You’ll explore: Real-world examples that demonstrate why and how organizations reteam Five reteaming patterns: One by One, Grow and Split, Isolation, Merging, and Switching Tactics to help you master dynamic reteaming in your company Stories that demonstrate problems caused by reteaming anti-patterns
    Note: Online resource; Title from title page (viewed October 19, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (27755 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Talking to people about your designs might seem like a basic skill, but it can be difficult to do well. In many cases, how you communicate with stakeholders, clients, and other nondesigners may be more important than the designs themselves. Because if you can’t get their support, your work will never see the light of day—no matter how good it is. This practical guide focuses on principles, tactics, and actionable methods for presenting your designs. Whether you design apps, websites, or products, you’ll learn how to get support from people who have influence over the project with the goal of creating the best user experience. Walk through the process of preparing and presenting your designs Understand stakeholder perspectives and learn how to empathize with them Cultivate both implicit and explicit listening skills Learn tactics and strategies for expressing the most effective response to feedback Create the right documentation for your decisions to avoid repeated conversations Learn why following through is just as important as the meeting itself
    Note: Online resource; Title from title page (viewed October 6, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : O'Reilly Media, Inc. | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (28180 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Digital product research doesn’t have to be difficult, take a long time, or cost a lot of money. Nor should it be a job solely for scientists or expert researchers. In this practical book, C. Todd Lombardo and Aras Bilgen demonstrate how your entire team can conduct effective product research within a couple of weeks—easily, cheaply, and without compromising quality. Drawing from decades of experience in product development, the authors lay out nine simple rules that combine user research, market research, and product analytics to quickly discover insights and build products customers truly need. Recognize and avoid common research pitfalls Switch to the insight-making mindset that underlies all successful research efforts Find out how to look at data, formulate the right questions, and pick the right research method Learn interview techniques and research skills Analyze for insights collaboratively while avoiding bias Inspire action with your insights through powerful presentations and prototypes Learn how to involve a wide variety of stakeholders in research, from developers to executives Discover how you can make research a habit, not a one-off effort
    Note: Online resource; Title from title page (viewed December 7, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (48639 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Very practical approach to patterns and practices for DevOps! Foster Haines, J2 Interactive Operations Anti-Patterns, DevOps Solutions shows how to implement DevOps techniques in the kind of imperfect environments most developers work in. Part technology tutorial, part reference manual, and part psychology handbook, this practical guide shows you realistic ways to bring DevOps to your team when you don't have the flexibility to make sweeping changes in organizational structure. about the technology To some extent, all organizations—even yours—suffer from poor development practices, garbled communications, and outdated legacy systems. The good news is DevOps can help you improve your processes. First, however, you'll need to recognize the core issues holding you back. This book empowers you to deliver DevOps with limited resources while navigating the office politics and entrenched mindsets that are all too common in actual workplaces. about the book Operations Anti-Patterns, DevOps Solutions offers clear steps for transforming development and communication. Using jargon-free language, this book describes incremental techniques that pay off immediately. Streamline your workflow, manage unplanned time, and build operational metrics. Whatever your issues, this book holds the keys to organizational success. what's inside Turn failure into opportunity Drive change through culture Break down knowledge silos Settle middle management turf wars about the audience For team leaders and managers. about the author Jeffery D. Smith has been in the technology industry for over 15 years. He has managed DevOps transformations at the ad-tech firm Centro and the online ordering platform Grubhub. A pragmatic guide to adopting DevOps practices progressively in every organization. Zhuo Hong Wei, Indeed A comprehensive guide to getting started with DevOps and integrating this culture in your company in the right manner. Roman Levchenko, Microsoft Azure MVP A truly inspiring book with real-world use cases and solutions. Really helpful for managers and technical leaders who want to drive change in their company. Michele Adduci, OpenLimit SignCubes GmbH NARRATED BY JULIE BRIERLEY
    Note: Online resource; Title from title page (viewed October 31, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780873
    Language: English
    Pages: 1 online resource (10735 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Aligned with the latest iteration of the Standard – ISO 27001:2013 – this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language
    Note: Online resource; Title from title page (viewed October 2, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780866
    Language: English
    Pages: 1 online resource (5943 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Information security means much more than a technology solution, and requires buy-in from senior managers and the collaboration of all staff in the organisation. By looking at ISO27001 and ISO27002 together, this pocket guide gives a wider view of what it means to implement an ISO27001 ISMS.
    Note: Online resource; Title from title page (viewed October 2, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Ascent Audio | Boston, MA : Safari
    ISBN: 9781469098050
    Language: English
    Pages: 1 online resource (27662 pages)
    Edition: 1st edition
    DDC: 658.4/78
    Keywords: Computer networks Security measures ; Computer security ; Computer Security ; Audiobooks ; Sécurité informatique ; BUSINESS & ECONOMICS ; General ; Computer networks ; Security measures ; Computer security ; Downloadable audio books ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Audiobooks ; Livres audio
    Abstract: Fascinating and highly readable, Digital Resilience opens with the infamous 2013 Target attack, which compromised the credit card information of 40 million customers. In hindsight, the hack (like most today) was preventable. This book helps businesses: - Understand the threats they face - Assess the resilience of their networks against attacks - Identify and address weaknesses - Respond to exploits swiftly and effectively Data theft. Downed servers. Malware. Even human error can trigger cyber events anytime from anywhere around the globe. This powerful guide provides the resilience-building strategies you need to prevail-no matter what strikes.
    Note: Online resource; Title from title page (viewed April 18, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Manning Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (66482 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local ; Audiobooks
    Abstract: "A comprehensive overview of the challenges teams face when moving to microservices, with industry-tested solutions to these problems." Tim Moore, Lightbend Microservices Patterns teaches enterprise developers and architects how to build applications with the microservice architecture. Rather than simply advocating for the use the microservice architecture, this clearly-written guide takes a balanced, pragmatic approach, exploring both the benefits and drawbacks. Successfully developing microservices-based applications requires mastering a new set of architectural insights and practices. In this unique book, microservice architecture pioneer and Java Champion Chris Richardson collects, catalogues, and explains 44 patterns that solve problems such as service decomposition, transaction management, querying, and inter-service communication. Microservices Patterns teaches you how to develop and deploy production-quality microservices-based applications. This invaluable set of design patterns builds on decades of distributed system experience, adding new patterns for writing services and composing them into systems that scale and perform reliably under real-world conditions. More than just a patterns catalog, this practical guide offers experience-driven advice to help you design, implement, test, and deploy your microservices-based application. Inside: How (and why!) to use the microservice architecture Service decomposition strategies Transaction management and querying patterns Effective testing strategies Deployment patterns This book/course is made for enterprise developers familiar with standard enterprise application architecture. Examples are in Java. Chris Richardson is a Java Champion, a JavaOne rock star, author of Manning’s POJOs in Action , and creator of the original CloudFoundry.com. Pragmatic treatment of an important new architectural landscape. Simeon Leyzerzon, Excelsior Software A solid compendium of information that will quicken your migration to this modern cloud-based architecture. John Guthrie, Dell/EMC How to understand the microservices approach, and how to use it in real life. Potito Coluccelli, Bizmatica Econocom NARRATED BY AIDEN HUMPHREYS AND LOU FERNANDEZ
    Note: Online resource; Title from title page (viewed October 27, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780842
    Language: English
    Pages: 1 online resource (8542 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: PRINCE2 Agile: An Implementation Pocket Guide is an official AXELOS-licensed guide that explains the PRINCE2 Agile framework in clear business language with practical guidance on how to implement this framework for any project in your organisation.
    Note: Online resource; Title from title page (viewed October 2, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780958
    Language: English
    Pages: 1 online resource (4427 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Cyber Essentials certification will provide numerous benefits, including the opportunity to tender for business where certification to the scheme may be a prerequisite.This pocket guide explains how to achieve certification to Cyber Essentials in a fast, effective and cost-effective manner.
    Note: Online resource; Title from title page (viewed October 18, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780880
    Language: English
    Pages: 1 online resource (23068 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: This book will guide you through each step of your project, clearly defining the underlying principles that should be applied to every project, regardless of what is going on inside or outside the project environment.
    Note: Online resource; Title from title page (viewed October 2, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    ISBN: 9781787780859
    Language: English
    Pages: 1 online resource (17835 pages)
    Edition: 1st edition
    Keywords: Audiobooks ; local
    Abstract: Drawing on her extensive experience, Jamie proposes a new role for Agile projects: The Agile business analyst. She details 30 achievable ways that such a role will increase relevance, quality and overall business value, and provide business users with crucial support.
    Note: Online resource; Title from title page (viewed October 1, 2018) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781439845790 , 1439845794
    Language: English
    Pages: 1 online resource (388 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    Keywords: Transportation Security measures ; Terrorism Prevention ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local ; Homeland Security ; Computing & IT Security ; Supply Chain Management ; Transport ; Sécurité ; Mesures ; États-Unis ; Terrorism ; Prevention ; Transportation ; Security measures ; United States
    Abstract: Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks—and other attacks on surface transportation assets, including the bombings in Madrid, London, Moscow, and Mumbai—demonstrate the vulnerability of the open systems to disruption and the consequences of the attacks on people, property, and the economy. Now more than ever, it has become imperative for businesses operating in the transportation and transit sectors to develop comprehensive security programs accounting for both natural and man-made hazards and safeguarding people, places, and equipment—while at the same time ensuring operations continuity. Providing transportation managers with the knowledge, skills, and abilities to effectively manage the security of transportation assets, Introduction to Transportation Security examines: Basic theories of security and emergency management The integrated nature of the nation’s critical infrastructure and the threats to transportation in each surface mode Federal agencies working in emergency management and transportation security and their intelligence and response requirements and capabilities The types of disasters that have occurred in the U.S. and selected nations, and their significant economic impacts Cost-beneficial security strategies aimed at preventing catastrophic failures in each transportation mode Effective methods for organizing, testing, and evaluating transportation security across modes and professions The book covers all transportation modes and their interconnectivity—including highway, air cargo, freight and passenger rail, transit, and maritime. It presents learning objectives and discussion questions to test assimilation of the material and case studies to facilitate a practical understanding of the concepts. Introduction to Transportation Security provides essential information for students in transportation management programs and professionals charged with safeguarding the movement of assets within our interconnected transportation network.
    Note: Online resource; Title from title page (viewed April 19, 2016) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Fifth edition.
    Keywords: Data protection ; Standards ; Electronic commerce ; Security measures ; Computer networks ; Security measures ; Liability for credit information ; Credit cards ; Electronic books ; Electronic books ; local
    Abstract: An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. All organisations that accept, store, transmit or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product overview Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.2, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation involved with payment card processing. Coverage includes: An overview of PCI DSS v3.2. A PCI self-assessment questionnaire (SAQ). Procedures and qualifications. An overview of the Payment Application Data Security Standard (PA-DSS). Contents What is the Payment Card Industry Data Security Standard (PCI DSS)? What is the scope of the PCI DSS? Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? Maintaining compliance PCI DSS - The Standard Aspects of PCI DSS compliance The PCI self-assessment questionnaire Procedures and qualifications The PCI DSS and ISO/IEC 27001 The Payment Application Data Security Standard (PA-DSS) PIN transaction security (PTS) About the authors Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. He leads the IT Governance CISSP Accelerated Training Programme, as well as the PCI Foundation and Implementer training courses. He has broad technical knowledge of security and IT infrastructure, including high performance computing and Cloud computing. His certifications include CISSP, PCI QSA, CREST Registered Tester, CEH and CHFI.
    Note: "Compliance series"--Cover. - Description based on online resource; title from title page (Safari, viewed August 26, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Ely, Cambridgeshire, United Kingdom : IT Governance Publishing
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Fourth edition.
    Keywords: Data protection ; Standards ; Electronic commerce ; Security measures ; Computer networks ; Security measures ; Liability for credit information ; Credit cards ; Electronic books ; Electronic books ; local
    Abstract: An ideal introduction and a quick reference to PCI DSS version 3.1 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. All organizations that accept, store, transmit, or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product overview Co-written by a PCI QSA (Qualified Security Assessor) and updated to cover PCI DSS version 3.1, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organization involved with payment card processing. Coverage includes: An overview of PCI DSS v3.1. A PCI self-assessment questionnaire (SAQ). Procedures and qualifications. An overview of the Payment Application Data Security Standard (PA-DSS). Contents What is the Payment Card Industry Data Security Standard (PCI DSS)? What is the scope of the PCI DSS? Compliance and compliance programmes Consequences of a breach How do you comply with the requirements of the Standard? Maintaining compliance PCI DSS - The Standard Aspects of PCI DSS compliance The PCI self-assessment questionnaire Procedures and qualifications The PCI DSS and ISO/IEC 27001 The Payment Application Data Security Standard (PA-DSS) PIN transaction security (PTS) About the authors Alan Calder is the founder and executive chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance, and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. He leads the IT Governance CISSP Accelerated Training Programme, as well as the PCI Foundation and Implementer training courses. He has broad technical knowledge of security and IT infrastructure, including high performance computing and Cloud computing. His certifications include CISSP, PCI QSA, CREST Registered Tester, CEH, and CHFI.
    Note: "Compliance series"--Cover. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed June 10, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Ely, Cambridgeshire, U.K. : IT Governance Pub.
    ISBN: 9781849285551 , 1849285551
    Language: English
    Pages: 1 online resource (1 v.)
    Edition: 3rd ed.
    Keywords: Data protection ; Standards ; Electronic commerce ; Security measures ; Computer networks ; Security measures ; Liability for credit information ; Credit cards ; Electronic books ; Electronic books ; local
    Abstract: Get started with PCI DSS Protect your customers' card data All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal payment card details and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. Failing to comply with the standard can have serious consequences for your ability to process card payments. An ideal introduction and a quick reference to PCI DSS, including version 3.0 Co-written by a PCI QSA (Qualified Security Assessor) and updated to also cover PCI DSS version 3.0, this handy pocket guide provides all the information you need to consider as you approach the PCI DSS. It is also an ideal training resource for anyone in your organisation who deals with payment card processing. Coverage includes: an overview of Payment Card Industry Data Security Standard V3.0 the consequences of a breach how to comply with the standard a PCI self-assessment questionnaire (SAQ) procedures and qualifications an overview of the Payment Application Data Security Standard Buy this pocket guide and get to grips with PCI DSS, including version 3.0 This title is part of The ITGP Compliance Series , a suite of essential guides to regulatory and legal compliance. Designed to help organisations in their efforts to address issues such as PCI DSS, anti-bribery policy management and data protection, this series is indispensable for anyone seeking to align their policies and procedures with laws and regulations. The guides also provide a quick, cost-effective way to raise awareness of key issues among staff, partners and external customers. About the Authors Alan Calder is the Founder and Executive Chairman of IT Governance Ltd, an information, advice and consultancy firm that helps company boards tackle IT governance, risk management, compliance and information security issues. He has many years of senior management experience in the private and public sectors. Geraint Williams is a knowledgeable and experienced senior information security consultant and PCI QSA, with a strong technical background and experience of the PCI DSS and security testing. Geraint has provided consultancy on implementation of the PCI DSS and conducted audits with a wide range of merchants and service providers. He has performed penetration testing and vulnerability assessments for various clients. Gera...
    Note: "Compliance series"--Cover. - Description based on online resource; title from title page (Safari, viewed Apr. 8, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Computer networks ; Security measures ; Risk management ; Electronic books ; Electronic books ; local
    Abstract: Plan and carry out a risk assessment to protect your business information. In the knowledge economy, organisations have to be able to protect their information assets. Information security management has, therefore, become a critical corporate discipline. The international code of practice for an information security management system (ISMS) is ISO27002. As the code of practice explains, information security management enables organisations to 'ensure business continuity, minimise business risk, and maximise return on investments and business opportunities'. Information Security Management System requirements The requirements for an ISMS are specified in ISO27001. Under ISO27001, a risk assessment has to be carried out before any controls can be selected and implemented, making risk assessment the core competence of information security management. This book provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO27001. International best practice Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software. Benefits of a risk assessment Stop the hacker . With a proper risk assessment, you can select appropriate controls to protect your organisation from hackers, worms and viruses, and other threats that could potentially cripple your business. Achieve optimum ROI. Failure to invest sufficiently in information security controls is 'penny wise, pound foolish', since, for a relatively low outlay, it is possible to minimise your organisation's exposure to potentially devastating losses. However, having too many safeguards in place will make information security system expensive and bureaucratic; so without accurate planning your investment in information security controls can become unproductive. With the aid of a methodical risk assessment, you can select and implement your information security controls to ensure that your resources will be allocated to countering the major risks to your organisation. In this way, you will optimise your return on investment. Build customer confidence. Protecting your information security ...
    Note: Publication information taken from resource description page (Safari, viewed August 19, 2013). - Includes bibliographical references. - Description based on online resource; title from cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Ely, U.K. : IT Governance Pub.
    Language: English
    Pages: 1 online resource (1 v.)
    Keywords: Information technology ; Security measures ; Computer networks ; Security measures ; Data protection ; Risk management ; Electronic books ; Electronic books ; local
    Abstract: Use ISO27001 to protect your organisation's information assets This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Read this pocket guide to learn about: The ISO/IEC 27000 Family of Information Security Standards Background to the Standards Certification process The ISMS and ISO27001 Overview of ISO/IEC 27001:2005 Specification vs Code of Practice Documentation Records Management Responsibility Policy Scope Risk Assessment Implementation. Confidentiality, Integrity and Availability In order to ensure the availability, confidentiality and integrity of your business information, you will need to put in place an information security management system (ISMS). ISO27001 is the international standard that offers a framework for an ISMS. If your organisation's ISMS conforms to the specification of ISO27001, you can arrange for an independent audit of the ISMS against that specification and eventually achieve certification. Why does ISO27001/27002 matter? Improve efficiency - An ISO27001 compliant ISMS will enable your organisation to move beyond the ad hoc approach to information security. An unsystematic approach to the subject tends to mean that a lot of people's time is wasted ""putting out bush fires"": fixing bugs in software and reacting to incidents as they arise. However, the structured, coherent approach of the ISMS will make your organisation less likely to be crippled by minor setbacks and will, therefore, enable it to function more effectively Protect your information assets - Information assets face a wide range of threats, ranging from criminal activity, such as fraud, to user error or system failure. Putting in place an ISMS, will enable you to improve the level of information security within your organisation Manage risk - The systematic approach to information security required under ISO27001, means your organisation needs to put in place a risk treatment plan. Once you have identified the main threats to your business information, and the most likely ways in which they could do damage to your company, you can work out how best to eliminate or reduce these risks. In addition, there are some risks you can manage by ensuring they remain at an acceptable level Prepare for the worst - Supposing that, in spite of the precautions you had taken, your company did suffer a major security breach. If something like that happened, how well prepared would your company th...
    Note: Description based on online resource; title from title page (Safari, viewed August 19, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...