Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • 2010-2014  (3)
  • 1995-1999
  • 1925-1929
  • 2010  (3)
  • Safari, an O’Reilly Media Company.  (3)
  • Grimm, Wilhelm
  • OECD
  • [Erscheinungsort nicht ermittelbar] : IT Governance Publishing  (3)
  • 1
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (117 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Buy the itSMF guide to service level management today! Service Level Management - a Practitioner's Guide, Second Edition ;offers a practical, experience-based approach to the subject matter. This guide shows you the best way to design a service level management (SLM) roadmap and implementation project plan, compile a service catalogue, put together service level agreements, and much more. Additionally, this book comes complete with a free CD packed with sample templates and supporting documents. You can tailor these ;templates to your specific needs using the advice and guidance in the book. No more reinventing the wheel. This second edition of the book has been reorganised in line with feedback from itSMF's SLM roadshows. The templates on the accompanying CD have been fully revised, the section on service catalogues has been extended. A new section on SLM small-scale implementation has added. Key Features © Benefits: Shows you ;best way to design a service level management (SLM) roadmap and implementation project plan. Providing you with a step-by-step approach. Comes with a CD that contains templates of various different SLM documents. These can be tailored to your own needs. Saving you both time and money Published by the itSMF - the representative body of the IT service management industry. Revised and updated with feedback incorporated from itSMF's SLM roadshows. Meaning this book is current and very up to date. Includes a new section on small-scale SLM ;implementation, meaning this book can help you implement SLM ;no matter the size of your organisation. Note: The ebook version does not provide access to the companion files
    Anmerkung: Online resource; Title from title page (viewed October 21, 2010) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (64 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Information technology plays a fundamental role in the operations of any modern business. While the confidentiality and integrity of your organisation's information have to be protected, a business still needs to have this information readily available in order to be able to function from day to day. If you are an information security practitioner, you need to be able to sell complex and often technical solutions to boards and management teams. Persuading the board to invest in information security measures requires sales skills. As an information security professional, you are a scientific and technical specialist; and yet you need to get your message across to people whose primary interests lie elsewhere, in turnover and overall performance. In other words, you need to develop sales and marketing skills. This pocket guide will help you with the essential sales skills that persuade company directors to commit money and resources to your information security initiatives. How this book can help information security professionals: Understand basic sales techniques Find out what to do to capture the attention of management and win them over Understand how to present yourself Present yourself so that management takes you seriously, and ensure your proposal receives a proper hearing. Find out how to earn management's trust This guide shows you how to persuade management that you are the kind of information security professional who is interested in supporting, rather than impeding, business success. Learn how to craft a successful proposal This guide offers you invaluable tips on how to write a proposal that will communicate your ideas effectively to senior executives. Improve your powers of persuasion with the board ... Buy this pocket guide today!
    Anmerkung: Online resource; Title from title page (viewed June 24, 2010) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : IT Governance Publishing | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (100 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic books ; local
    Kurzfassung: Make your organisation's email secure Your business relies on e-mail for its everyday dealings with partners, suppliers and customers. While e-mail is an invaluable form of communication, it also represents a potential threat to your information security. E-mail could become the means for criminals to install a virus or malicious software on your computer system and fraudsters will try to use e-mails to obtain sensitive information through phishing scams. Safeguard email security If you want to safeguard your company's ability to function, it is essential to have an effective e-mail security policy in place, and to ensure your staff understand the risks associated with e-mail. Email security best practice This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. Overcome email security threats The pocket guide covers the various types of threat to which e-mail may expose your organisation, and offers advice on how to counter social engineering by raising staff awareness. Choose the most secure email client The client is the computer programme that manages the user's e-mail. Malicious e-mails often operate through attachment files that infect computer systems with malware when downloaded. This pocket guide explains how you can enhance your information security by configuring the e-mail client to block attachments or to limit their size. Protect your company's information What kind of information should you include in an e-mail? How do you know that the e-mail will not be intercepted by a third party after you have sent it? This guide looks at countermeasures you can take to ensure that your e-mails only reach the intended recipient, and how to preserve confidentiality through the use of encryption. Protect your company's reputation ; Crude jokes, obscene language or sexist remarks will have an adverse effect on your organisation's reputation when they are found in e-mails sent out by your employees from their work account. This pocket guide offers advice on how to create an acceptable use policy to ensure that employee use of e-mail in the workplace does not end up embarrassing your organisation. The pocket guide provides a concise reference to the main security issues affecting those that deploy and use e-mail to s...
    Anmerkung: Online resource; Title from title page (viewed November 30, 2010) , Mode of access: World Wide Web.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...