Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Safari, an O’Reilly Media Company  (8)
  • Harich, Thomas W.  (4)
  • Electronic data processing personnel Certification  (7)
  • Computer security ; Management  (5)
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135783467 , 0135783461
    Sprache: Englisch
    Seiten: 1 online resource (84 pages)
    Ausgabe: 1st edition
    Serie: Cert guide
    Schlagwort(e): Amazon Web Services (Firm) Study guides Examinations ; Cloud computing Study guides Examinations ; Web services Study guides Examinations ; Electronic data processing personnel Certification ; Electronic books ; local ; Amazon Web Services (Firm) ; Infonuagique ; Examens ; Guides de l'étudiant ; Services Web ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Examinations ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Kurzfassung: The AWS Certified Sysops Administrator Associate certification demonstrates your expertise in deploying, managing, securing, optimizing, and automating solutions on the world's leading cloud platform, Amazon Web Services. AWS Certified Sysops Administrator Associate Cert Guide is the comprehensive self-study resource for Amazon's valuable new exam. Designed for all AWS Certified Sysops Administrator Associate candidates, this guide covers every exam objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find: Hands-on labs you can perform with a free AWS account Real-world examples throughout Pre-chapter quizzes to assess knowledge upfront, and efficiently focus your study Foundation topics sections that explain concepts and configurations, and link theory to practice Key topics sections calling attention to every figure, table, and list you must know Exam Preparation sections with additional chapter review features Final preparation chapter with tools and resources to help you craft review and test-taking strategies and optimize study time A customizable practice test library This guide offers comprehensive, up-to-date coverage of all AWS Certified Sysops Administrator Associate topics related to: Deploying, provisioning, managing, and operating AWS systems that scale, are highly available, and are fault tolerant Implementing and managing data storage, and data flows into and out of AWS Choosing the right AWS service for each requirement Selecting the right best practices for AWS operations Enforcing security and compliance Projecting usage costs and establishing operational cost controls Moving on-premises workloads into AWS Automating and optimizing AWS systems for maximum efficiency and value
    Anmerkung: Online resource; Title from title page (viewed December 24, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780135560891 , 0135560896
    Sprache: Englisch
    Seiten: 1 online resource (321 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Microsoft Windows (Computer file) Study guides Examination ; Microcomputers Study guides Maintenance and repair ; Examinations ; Electronic data processing personnel Certification ; Electronic books ; local ; Microsoft Windows (Computer file) ; Micro-ordinateurs ; Entretien et réparations ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Microcomputers ; Maintenance and repair ; Examinations ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Kurzfassung: Prepare for Microsoft Exam MD-101 –and help demonstrate your real-world mastery of skills and knowledge required to manage modern Windows 10 desktops. Designed for Windows administrators, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level. Focus on the expertise measured by these objectives: Deploy and update operating systems Manage policies and profiles Manage and protect devices Manage apps and data This Microsoft Exam Ref : Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have experience deploying, configuring, securing, managing, and monitoring devices and client applications in an enterprise environment About the Exam Exam MD-101 focuses on knowledge needed to plan and implement Windows 10 with dynamic deployment or Windows Autopilot; upgrade devices to Windows 10; manage updates and device authentication; plan and implement co-management; implement conditional access and compliance policies; configure device profiles; manage user profiles; manage Windows Defender; manage Intune device enrollment and inventory; monitor devices; deploy/update applications, and implement Mobile Application Management (MAM). About Microsoft Certification Passing this exam and Exam MD-100 Windows 10 fulfills your requirements for the Microsoft 365 Certified: Modern Desktop Administrator Associate certification credential, demonstrating your ability to install Windows 10 operating systems and deploy and manage modern desktops and devices in an enterprise environment. See full details at: microsoft.com/learn
    Anmerkung: Online resource; Title from title page (viewed August 5, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780137341658 , 0137341652 , 9780135938058
    Sprache: Englisch
    Seiten: 1 online resource (714 pages)
    Ausgabe: 1st edition
    DDC: 005.432076
    Schlagwort(e): Red Hat, Inc ; Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Electronic data processing personnel Certification ; Systems engineering Study guides Examinations ; Electronic books ; local ; Red Hat, Inc ; Linux ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Ingénierie des systèmes ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Examinations ; Operating systems (Computers) ; Examinations ; Systems engineering ; Examinations ; Study guides ; Study guides
    Kurzfassung: Learn, prepare, and practice for Red Hat RHCSA 8 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master Red Hat RHCSA 8 EX200 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam-preparation tasks Practice with four unique practice tests Learn from two full hours of video training from the author’s Red Hat Certified System Administrator (RHCSA) Complete Video Course , 3rd Edition. Red Hat RHCSA 8 Cert Guide is a best-of-breed exam study guide. Leading Linux consultant, author, and instructor Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The companion website also contains two additional practice tests plus two full hours of personal video training from the author’s Red Hat Certified System Administrator (RHCSA) Complete Video Course , 3rd Edition. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, including Basic system management: Installation, tools, file management, text files, RHEL8 connections, user/group management, permissions, and network configuration Operating running systems: Managing software, processes, storage, and advanced storage; working with systemd; scheduling tasks; and configuring logging Advanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scripting Managing network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; and accessing network storage Companion Website The website contains two free, complete practice exams and two full hours of video training from the author’s Red Hat Certified System Ad...
    Anmerkung: Online resource; Title from title page (viewed December 13, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (1 video file, approximately 18 hr., 36 min.)
    Ausgabe: 2nd edition
    Serie: LiveLessons
    Schlagwort(e): Computer security Study guides Examinations ; Penetration testing (Computer security) Study guides Examinations ; Hacking Study guides Examinations ; Computer networks Study guides Security measures ; Examinations ; Electronic data processing personnel Certification ; Electronic videos ; local ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Tests d'intrusion ; Examens ; Guides de l'étudiant ; Piratage informatique ; Examens ; Guides de l'étudiant ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Examens ; Guides de l'étudiant ; Computer networks ; Security measures ; Examinations ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Kurzfassung: 18+ Hours of Video Instruction Learn everything you need to know to pass the Certified Ethical Hacker exam. Overview Certified Ethical Hacker (CEH) Complete Video Course provides a complete overview of the topics contained in the EC-Council Blueprint for the CEH exam. With 5 modules containing more than 18 hours of training, this course covers all concepts in the objectives so you can master the knowledge you need to pass the exam. Build your ethical hacking skills with the foundations of reconnaissance, footprinting, enumeration, and vulnerability analysis and dive into hacking web servers, applications, wireless networks, IoT devices, and mobile platforms. Veteran security experts Omar Santos, Nick Garner, and Bo Rothwell provide a thorough foundation through demos and best practices for security risk analysis, as well as hacking tools and methods. With this knowledge, you will be able to confidently mitigate and help guard your network from the multifaceted attacks that you will encounter while also preparing you to pass the CEH exam. Regardless of your level of experience, this video course explores all sides of a multi-pronged cybersecurity attack to ensure that you are prepared to combat attack threats. About the Instructors Omar Santos is an active member of the cybersecurity community, where he leads several industry-wide initiatives and standards bodies. He is a principal engineer of the Cisco Product Security Incident Response Team (PSIRT), where he mentors and leads engineers and incident managers during the investigation and resolution of cyber security vulnerabilities. He is the author of several cybersecurity books and video courses. You can obtain additional information about Omar’s projects at omarsantos.io and h4cker.org. Nick Garner , CCIE No. 17871, is a solutions integration architect for Cisco Systems. He has been in Cisco Advanced Services supporting customers in both transactional and subscription engagements for 8 years. In his primary role, he has deployed and supported large-scale data center designs for prominent clients in the San Francisco Bay area. His primary technical focus outside of data center routing and switching designs is security and multicast. William “Bo” Rothwell has a passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, and programming languages such as Perl, Python, Tcl, and BASH. H...
    Anmerkung: Online resource; Title from title screen (viewed July 10, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    ISBN: 9780135560624 , 0135560624 , 9780135560716 , 0135560713
    Sprache: Englisch
    Seiten: 1 online resource (400 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Microsoft Windows (Computer file) Study guides Examination ; Electronic data processing personnel Certification ; Electronic books ; local ; Microsoft Windows (Computer file) ; Electronic data processing personnel ; Certification ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Kurzfassung: Prepare for Microsoft Exam MD-100: Windows 10—and help demonstrate your real-world mastery of skills and knowledge required to deploy, configure, secure, manage, and monitor Windows devices and client applications. Designed for Windows administrators, Exam Ref MD-100: Windows 10 focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level. Focus on the expertise measured by these objectives: Deploy Windows Manage devices and data Configure connectivity Maintain Windows This Microsoft Exam Ref MD-100: Windows 10 : Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have some experience administering Windows 10 and non-Windows devices and technologies About the Exam Exam MD-100: Windows 10 focuses on knowledge needed to deploy Windows; perform post-installation configuration; manage local users, local groups, and devices; configure data access and protection; configure devices with local policies; manage Windows security; configure networking; configure remote connectivity; configure system and data recovery; manage updates; and monitor and manage Windows. About Microsoft Certification Passing this exam and Exam MD-101: Managing Modern Desktops fulfills your requirements for the Microsoft 365 Certified: Modern Desktop Administrator Associate certification credential, demonstrating your ability to install Windows 10 operating systems and deploy and manage modern desktops and devices in an enterprise environment. See full details at: microsoft.com/learn
    Anmerkung: Online resource; Title from title page (viewed July 5, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Microsoft Press | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (1 video file, approximately 8 hr., 12 min.)
    Ausgabe: 1st edition
    Schlagwort(e): Microsoft Windows (Computer file) Study guides Examination ; Electronic data processing personnel Certification ; Electronic videos ; local ; Microsoft Windows (Computer file) ; Electronic data processing personnel ; Certification ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Kurzfassung: More than 8 hours of video instruction to help you support your organization’s Windows 10 deployment and prepare for Exam MD-100 Windows 10, one of the exams required to achieve Microsoft 365 Certified: Modern Desktop Administrator Associate. Overview This engaging, self-paced instructional video course demonstrates various aspects of deploying, maintaining, and securing Windows 10 devices and data. You learn methods and technologies that help you install and configure Windows 10, develop device management policies, protect data, improve security, configure networking, and more. If you’re planning to take Exam MD-100 Windows 10, this video course covers the exam objective domains published by Microsoft in a logical way for learning the technology and preparing for the exam. Throughout each lesson, Microsoft certified trainer and technical author Andrew Warren describes key concepts and puts them into action with demonstrations and real-world scenarios. You can follow along by building a test lab using virtual machines. About the Instructor Andrew Warren has more than 30 years of experience in the IT industry, many of which he has spent teaching and writing. He is a Microsoft Certified Trainer and has been involved as a subject matter expert in many of the Windows Server 2016 courses and as the technical lead in many Windows 10 courses. He also has been involved in developing TechNet sessions about Microsoft Exchange Server. He is the co-author of Exam Ref MD-100 Windows 10 and Exam Ref MD-101 Managing Modern Desktops and the author of Exam Ref 70-741 Networking with Windows Server 2016 and Exam Ref 70-742 Identity with Windows Server 2016 , published by Microsoft Press. Andrew is based in the United Kingdom and lives in rural Somerset, where he runs his own IT training and education consultancy. Skill Level Intermediate Learn How To Deploy Windows Manage devices and data Configure connectivity Maintain Windows Who Should Take This Course IT professionals who deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment IT professionals who manage identity, access, policies, updates, and apps IT professionals who want to explore new and updated features in Windows 10 Windows 10 administrators preparing for Exam MD-100 Windows 10 Course Requirements Foundational IT skills Basic understanding of and experience with Windows networking
    Anmerkung: Online resource; Title from title screen (viewed September 12, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    [Frechen] : mitp Verlags GmbH & Co. KG
    ISBN: 9783958454422 , 3958454429
    Sprache: Deutsch
    Seiten: 1 online resource (1 volume) , illustrations
    Ausgabe: 2. Auflage.
    Schlagwort(e): Information technology ; Risk management ; Information technology ; Security measures ; Computer security ; Management ; Electronic books ; Electronic books ; local
    Kurzfassung: Das IT-Risikomanagement bildet den Überbau über den Gesamtkomplex IT-Security-Management. Es handelt sich dabei um keine abgegrenzte Einzelaufgabe, sondern um eine Methodik, die in vielen Prozessen immer wieder auftaucht. Der Einfluss und die Methoden des IT-Risikomanagements durchziehen alle Teilbereiche des IT-Security-Managements. Für das Business Continuity Management sowie für die tägliche Arbeit und die implementierten Sicherheitsprozesse stellt es zudem eine entscheidende Grundlage dar. Dieses mitp bit hilt Ihnen, die Antworten auf die folgenden Fragen zu finden: Existiert eine Richtlinie zum IT-Risikomanagement? Wurde die dort beschriebene Vorgehensweise mit den Methoden des Unternehmensrisikomanagements abgestimmt? Liegen Aufzeichnungen und Dokumentationen vor, die die wichtigsten IT-Risiken für den Geschäftsbetrieb darstellen? Ist das erforderliche Handwerkszeug für ein IT-Risikomanagement vorhanden? Liegt eine Klassifizierungsrichtlinie vor und sind die Mitarbeiter damit vertraut? Wurden Bedrohungslisten erstellt und entsprechende Maßnahmenvorschläge vorbereitet? Werden zumindest die wichtigsten Unternehmenswerte anhand der Klassifizierungsrichtlinie klassifiziert? Werden IT-Prozesse auch über den Faktor Risikomanagement gesteuert?
    Anmerkung: Place of publication from publisher's website. - Description based on online resource; title from title page (Safari, viewed January 21, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    [Frechen] : mitp Verlags GmbH & Co. KG
    ISBN: 9783958450882 , 3958450881
    Sprache: Deutsch
    Seiten: 1 online resource (1 volume) , illustrations
    Ausgabe: 2. Auflage.
    Schlagwort(e): Information technology ; Security measures ; Computer security ; Management ; Privacy, Right of ; Europe ; Electronic books ; Electronic books ; local
    Kurzfassung: Die IT-Compliance gibt vor, welche Tätigkeiten innerhalb der IT-Abteilung aufgrund gesetzlicher, normativer oder internen Vorschriften und Vorgaben durchzuführen sind. Das können z.B. Vorgaben zur Vorratsdatenspeicherung sein oder Vorschriften über die sichere, elektronische Ablage von Buchungsbelegen. Eine zu beachtende Vorschrift ist z.B. die neue EU-DSGVO, auf die der Autor explizit eingeht. Dieses mitp bit hilt Ihnen, die Antworten auf die folgenden Fragen zu finden: Liegt der Ausrichtung des IT-Security-Managements eine interne oder externe Vorgabe oder eine Norm zugrunde? Sind die internen und externen Vorgaben, die für das IT-Security-Management von Relevanz sind, identifiziert worden? Ist die Zusammenarbeit des Managers IT-Security mit dem Datenschutzbeauftragten abgestimmt? Ist geregelt, wie der Manager IT-Security in die Unternehmens-Compliance eingebunden ist?
    Anmerkung: Place of publication from publisher's website. - Description based on online resource; title from title page (Safari, viewed January 21, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    [Frechen] : mitp Verlags GmbH & Co. KG
    ISBN: 9783958454439 , 3958454437
    Sprache: Deutsch
    Seiten: 1 online resource (1 volume) , illustrations
    Ausgabe: 2. Auflage.
    Schlagwort(e): Information technology ; Management ; Information technology ; Security measures ; Penetration testing (Computer security) ; Computer security ; Management ; Cloud computing ; Electronic books ; Electronic books ; local
    Kurzfassung: IT-Security hat immer auch etwas mit IT-technischen Fragestellungen zu tun. Das trifft selbst dann zu, wenn die IT-Security-Organisation der Unternehmensleitung berichtet und wenn deren definierte Hauptaufgabe in der Richtlinienkompetenz und der Überprüfung von Vorgaben liegt. Wissen über die IT-Infrastruktur und die IT-Prozesse ist wichtig, um passende und praktikable Vorgaben festlegen zu können. Nur wenn der Manager IT-Security weiß, wie die Datenströme aussehen und welche IT-Systeme eine maßgebliche Rolle spielen, kann er Risiken zutreffend einschätzen und zielgerichtete Maßnahmen definieren. Dazu kommt, dass er in der Zusammenarbeit mit dem Datenschutzbeauftragten, der internen Revisionsabteilung und häufig auch mit dem IT-Leiter den Part einer beratenden Stelle einnimmt. Um diese Aufgabe adäquat leisten zu können, muss er sich intensiv mit der zugrunde liegenden Thematik auseinandergesetzt haben. Dieses mitp bit hilt Ihnen, die Antworten auf die folgenden Fragen zu finden: Werden Entscheidungen dokumentiert, die der Manager IT-Security im Rahmen seiner Aufgaben trifft? Dazu gehören alle Maßnahmen und Ausnahmeregelungen und die jeweiligen Randbedingungen. Ein Beispiel wäre die Akzeptanz einer Ausnahmeregelung bezüglich der Installation einer ansonsten durch Richtlinien untersagten Software auf einem Arbeitsplatzrechner oder die Freigabe eines ungesicherten Downloads aus dem Internet. Sind für die einzelnen technischen Aufgabenfelder entsprechende Richtlinien vorhanden? Ist der Umgang der Mitarbeiter mit den Medien E-Mail und Internet geregelt? Ist ein Prozess beschrieben, der dann greift, wenn ein Mitarbeiter ausscheidet und ein Zugriff auf seine E-Mail-Daten und anderen (persönlichen) Daten erforderlich wird? Werden exponierte IT-Systeme regelmäßig in Bezug auf sicheres Betriebssystem, sichere Software und sichere Schnittstellen geprüft? Das betrifft im Besonderen alle IT-Systeme in einer »Demilitarisierten Zone« (DMZ), also Systeme, auf die aus dem Internet heraus zugegriffen wird.
    Anmerkung: Place of publication from publisher's website. - Description based on online resource; title from title page (Safari, viewed January 21, 2019)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Sprache: Englisch
    Seiten: 1 online resource (447 pages)
    Ausgabe: 1st edition
    Schlagwort(e): Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Kurzfassung: Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity—including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the most effective methods for combating the invidious corruption that, if unchecked, puts all nations at risk. Maximilian Edelbacher will be appearing at three upcoming events: June 28, 2012: Roundtable in the House of the European Union in Vienna on the topic "Financial Crimes: A Threat to European Security?" October 8, 2012: Roundtable in Joannneum, Austria on the topic "Financial Crimes: A Threat to Global Security" October 9, 2012: Book presentation at the Hans Gross Museum in Graz, Austria
    Anmerkung: Online resource; Title from title page (viewed April 19, 2016)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Online-Ressource
    Online-Ressource
    [Germany] : mitp-Verlags
    ISBN: 9783958451285
    Sprache: Deutsch
    Seiten: 1 online resource (1 volume) , illustrations
    Ausgabe: 1. Auflage.
    Schlagwort(e): Information technology ; Security measures ; Business enterprises ; Security measures ; Computer security ; Management ; Data protection ; Electronic books ; Electronic books ; local
    Kurzfassung: Mithilfe eines klar umrissenen Projekts ein akzeptables Sicherheitsniveau erreichen Die Nutzung international anerkannter Standards und deren Übersetzung in die Unternehmenswirklichkeit Strukturierte Vorgehensweise anhand konkreter Aufgaben: Transparenz schaffen, Regeln einführen und Audits durchführen Gerade in der heutigen vernetzten Welt ist IT-Sicherheit unverzichtbar: Kein Unternehmen arbeitet mehr autark, alle sind miteinander durch Netzwerke, regen Datenaustausch oder Mailverkehr verbunden. Das Thema ist komplex und insbesondere kleine und mittelständische Betriebe fürchten sich vor einer zu großen Herausforderung - zu Unrecht. Thomas W. Harich zeigt Ihnen, wie Sie mit den Mitteln und dem Vokabular alltäglicher Projekte auch die Sicherheit Ihrer IT erfolgreich angehen können - mit Ihren unternehmenseigenen »Bordmitteln«. Das IT-Sicherheitsprojekt hat dabei einen definierten Anfang und ein definiertes Ende - somit sind Aufwand und Nutzen gut kalkulierbar. Der Autor teilt das Projekt übersichtlich in die drei großen Bereiche »Transparenz schaffen«, »Regeln einführen« und »Audits durchführen«. Sie lernen die Grundbegriffe der IT-Sicherheit kennen und werden Schritt für Schritt durch das Projekt geführt. Detaillierte Aufgaben und Arbeitspakete zeigen Ihnen strukturiert, was wann wie zu tun ist. Dabei unterscheidet Thomas W. Harich immer zwischen den Zielen der »Basissicherheit« und der »Erweiterten IT-Sicherheit«. Grundlage sind international anerkannte Normen der ISO-2700x-Reihe, die Vorgaben des Bundesamtes für Sicherheit in der Informationstechnik (BSI) sowie Erfahrungen aus der Praxis. So können Sie mithilfe dieses Buches und der in der Praxis erprobten Vorgehensweise IT-Sicherheit in Ihrem Unternehmen flächendeckend umsetzen und ein hohes Sicherheitsniveau erreichen.
    Anmerkung: Description based on online resource; title from title page (Safari, viewed September 18, 2015)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780789740106
    Sprache: Englisch
    Seiten: 1 online resource (1 video file, approximately 35 hr., 13 min.)
    Ausgabe: 1st edition
    Schlagwort(e): Electronic data processing personnel Certification ; Computer security Study guides Examinations ; Electronic videos ; local ; Sécurité informatique ; Examens ; Guides de l'étudiant ; Computer security ; Examinations ; Electronic data processing personnel ; Certification ; Study guides
    Kurzfassung: The fast, powerful way to prepare for your CISSP exam! 30+ hours of personal video training from leading security expert Shon Harris Achieving the (ISC)2’s globally recognized CISSP can give your IT career a lift. In this DVD, the world’s #1 CISSP trainer brings her legendary five-day boot camp to your computer screen. Packed with over 30 hours of instruction adapted from Shon’s classes, this video course includes realistic labs, scenarios, case studies, and animations designed to build and test your knowledge in real-word settings. Preparing for the CISSP has never been this easy or convenient. Master the skills and concepts you need for all ten CISSP common body of knowledge domains: Access Control Application Security Business Continuity and Disaster Recovery Planning Cryptography Information Security and Risk Management Legal, Regulations, Compliance, and Investigations Operations Security Physical (Environmental) Security Security Architecture and Design Telecommunications and Network Security System Requirements OPERATING SYSTEM: Windows 2000, XP, or Vista; Mac OS X 10.4 (Tiger) or later MULTIMEDIA: DVD drive; 1024 x 768 or higher display; sound card with speakers COMPUTER: 500MHz or higher CPU; 128MB RAM or more
    Anmerkung: Online resource; Title from title screen (viewed May 1, 2009)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...