Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Boca Raton, FL : CRC Press  (16)
  • Computer networks ; Security measures  (11)
  • New products
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Boca Raton, FL : CRC Press
    ISBN: 9781003225096 , 1003225098 , 9781000646221 , 100064622X , 9781000646344 , 1000646343
    Language: English
    Pages: 1 online resource (xxiii, 212 pages) , illustrations (some color)
    Edition: First edition.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks Security measures ; Business information services Security measures ; Computer security ; Computer Security ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Affaires ; Services d'information ; Sécurité ; Mesures ; Sécurité informatique ; COMPUTERS / Cryptography ; COMPUTERS / Networking / Security ; COMPUTERS / Security / General ; Computer networks ; Security measures ; Computer security
    Abstract: "Today's organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they're located. The zero trust idea has been gradually gaining momentum over the years, especially with the rise of SaaS and remote work. It has also become more practicable as technologies and tools built on its framework become mainstream. Zero Trust is rapidly becoming the security model of choice for many organizations; however, security leaders often struggle with the major shifts in strategy and architecture required to holistically implement Zero Trust. The book provides an end-to-end view of the Zero Trust approach across organizations' digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. Any organizations that embrace the key players' security products also require better guidance for reference and implementation"--
    Note: Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on August 15, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781000822328 , 100082232X , 9781003100300 , 1003100309 , 9781000822342 , 1000822346
    Language: English
    Pages: 1 online resource
    Edition: Fifth edition.
    Parallel Title: Erscheint auch als
    Keywords: Data protection Standards ; Computer networks Security measures ; Credit cards Security measures ; COMPUTERS / Networking / Security ; COMPUTERS / Cryptography ; Computer networks ; Security measures ; Data protection ; Standards
    Abstract: The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources. If you accept, process, transmit, or store payment card data branded by Visa, MasterCard, American Express, Discover, or JCB (or their affiliates and partners), you must comply with this lengthy standard. Personal data theft is at the top of the list of likely cybercrimes that modern-day corporations must defend against. In particular, credit or debit card data is preferred by cybercriminals as they can find ways to monetize it quickly from anywhere in the world. Is your payment processing secure and compliant? The new Fifth Edition of PCI Compliance has been revised to follow the new PCI DSS version 4.0, which is a complete overhaul to the standard. Also new to the Fifth Edition are: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as Kubernetes, cloud, near-field communication, point-to-point encryption, Mobile, Europay, MasterCard, and Visa. This is the first book to address the recent updates to PCI DSS and the only book you will need during your PCI DSS journey. The real-world scenarios and hands-on guidance will be extremely valuable, as well as the community of professionals you will join after buying this book. Each chapter has how-to guidance to walk you through implementing concepts and real-world scenarios to help you grasp how PCI DSS will affect your daily operations. This book provides the information that you need in order to understand the current PCI Data Security Standards and the ecosystem that surrounds them, how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally identifiable information. Our book puts security first as a way to enable compliance. Completely updated to follow the current PCI DSS version 4.0 Packed with tips to develop and implement an effective PCI DSS and cybersecurity strategy Includes coverage of new and emerging technologies such as Kubernetes, mobility, and 3D Secure 2.0 Both authors have broad information security backgrounds, including extensive PCI DSS experience
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780367808228 , 0367808226 , 9781000540567 , 1000540561 , 9781000540550 , 1000540553
    Language: English
    Pages: 1 online resource , illustrations.
    Edition: First edition.
    Series Statement: Internet of everything (IoE): security and privacy paradigm
    Parallel Title: Erscheint auch als
    Keywords: Computer networks Security measures ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; COMPUTERS / Data Processing / General ; COMPUTERS / Information Technology ; Computer networks ; Security measures ; Electronic books
    Abstract: "This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together in one resource Information security across multiple domains. Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts, serves as a manual for industry, while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through IoT ecosystem and implications to the real world and at the same time explains the concepts of IoT-related technologies, trends, and future directions. University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful"--
    Note: Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on March 11, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781003097198 , 1003097197 , 9781000511987 , 1000511987 , 9781000511918 , 100051191X
    Language: English
    Pages: 1 online resource , color illustrations.
    Edition: First edition.
    Series Statement: Green Engineering and Technology Ser
    Parallel Title: Erscheint auch als
    Keywords: Computer networks Security measures ; Computer networks Environmental aspects ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Réseaux d'ordinateurs ; Aspect de l'environnement ; TECHNOLOGY / Manufacturing ; COMPUTERS / Networking / Security ; COMPUTERS / Computer Vision & Pattern Recognition ; Computer networks ; Security measures
    Abstract: "This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes"--
    Note: Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on March 04, 2022)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9781351170765 , 1351170767 , 9781351170741 , 1351170740
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Production control ; Lean manufacturing ; Card system in business ; New products ; Electronic books ; Electronic books ; local
    Abstract: POLCA ( P aired-cell O verlapping L oops of C ards with A uthorization) is a card-based visual control system that manages the flow of jobs through the shop floor: at each operation, it controls which job should be worked on next to meet delivery targets. POLCA ensures that upstream operations use their capacity effectively by working on jobs that are needed downstream, while at the same time preventing excessive work-in-process (WIP) build-ups when bottlenecks appear unexpectedly. POLCA is particularly suited to companies manufacturing high-mix, low-volume and customized products. Such companies struggle with long lead times, late deliveries, and daily expediting to meet delivery dates. ERP systems are not designed to deal with this highly variable environment, and add-on software such as Finite Capacity Scheduling systems can require complex installation. Also, the Kanban system does not work well with low-volume or custom production. POLCA has delivered impressive results in such environments. It does not require any complex software implementation: it can be used without an ERP system or it can seamlessly complement an existing ERP system. This book: Provides a step-by-step roadmap on how to implement POLCA; invaluable for both companies that wish to implement POLCA as well as consultants and academics advising such companies. Explains the concepts in practical and easy-to-understand terms by showing detailed shop-floor examples. Includes more than 100 illustrations for understanding how POLCA works as well as for elaborating on details of the implementation steps. Contains case studies written by company owners and executives documenting their POLCA implementation process and the results achieved in various industries in six countries.
    Note: "A Productivity Press book"--Cover. - Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9781498767897 , 1498767893
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9781498728706 , 1498728707
    Language: English
    Pages: 1 online resource (xxxv, 603 pages) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Quality assurance ; New products ; Electronic books ; local ; Electronic books
    Abstract: Although regularly introducing new products or services is the lifeblood of most industries, bringing them to market can be fraught with peril. Timing, cost, and quality all play important roles in a successful product launch and avoiding expensive- often in more than just dollars- recalls and redesigns. Quality Assurance: Applying Methodologies fo
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9781482209082 , 148220908X
    Language: English
    Pages: 1 online resource (xx, 395 pages) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Entrepreneurship ; New business enterprises ; New products ; Success in business ; Electronic books ; Electronic books ; local
    Abstract: Whether you work for an established company and want to trailblaze new products (intrapreneurship), or want to establish your own new venture (entrepreneurship), The Guide to Entrepreneurship: How to Create Wealth for Your Company and Stakeholders supplies invaluable guidance along with concrete action plans. In contrast to academic publications that merely emphasize accounting methods, this guide to intrapreneurship and entrepreneurship focuses squarely on the entrepreneur. Demystifying the process of starting a company from scratch, the book provides aspiring entrepreneurs with detailed guidance that is written in plain English. It explores what constitutes entrepreneurial timber and the leadership skills required to raise all the needed capital. If you are thinking of starting your own company or have already decided to take the plunge, this book will help you determine: If you have what it takes to become a successful entrepreneur The value of your idea before funding If you and your team possess the skills required to gain a market advantage How to raise capital effectively Explaining the critical importance of intellectual property to investors, the book covers the fundamentals of business valuations. It also explains how to write winning business proposals. While each chapter is designed to stand on its own, the book chapters are arranged in a manner that makes it easy for experienced entrepreneurs to jump from chapter to chapter as they please. Identifying the unique set of characteristics that are shared by successful entrepreneurs, this guide will be especially helpful to anyone looking to start new ventures that require a high degree of scientific knowledge.
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Boca Raton, FL : CRC Press
    ISBN: 9781466592629 , 1466592621
    Language: English
    Pages: 1 online resource (xxiii, 498 pages) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; World Wide Web ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: A White Hat Perspective presents a comprehensive g
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Boca Raton, FL : CRC Press
    ISBN: 9781482203615
    Language: English
    Pages: 1 online resource (xxv, 383 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: New products ; New products ; Marketing ; Marketing research ; Product design ; Electronic books ; Electronic books ; local
    Abstract: It's no secret that some of the most successful companies, such as 3M, Procter & Gamble, Microsoft, and Mercedes-Benz, are also known for their new product development strategies. Creating and Marketing New Products and Services teaches the key business and marketing principles needed to successfully design and launch new products and services in today's global market. It begins by providing the foundation required to understand the role of new product development in the innovating organization. The book emphasizes marketing research techniques that can help firms identify the voice of the customer and incorporate these findings into their new product development process. It addresses the role of sustainability in innovation, open innovation strategies, and international co-development efforts of new products and services. Explaining how to manage the development and marketing of new products and services, this book will teach you how to: Select a new product strategy that matches the needs of your organization Set up a disciplined process for new product development Define target market opportunities and search out high potential ideas Understand customer needs, structure them, and prioritize the needs to clearly define the benefits and values that your product will deliver Integrate marketing, engineering, R&D, and production resources to design a high-quality product that satisfies customer needs and delivers value Forecast sales before market launch based on testing of the product and the marketing plan The concepts discussed in the book can help to boost innovation and improve the performance of any type of organization. Some of the concepts presented are generic and others must be modified for each application. Together, they can lead to greater profitability and reduced risk in the new product development activities within your organization.
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9781466564541 , 1466564547
    Language: English
    Pages: 1 online resource (xvii, 142 pages) , illustrations.
    Series Statement: What every engineer should know
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Computer security ; Computer crimes ; Investigation ; Electronic books ; Electronic books ; local
    Abstract: Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, What Every Engineer Should Know About Cyber Security and Digital Forensics is an overview of the field of cyber security. Exploring the cyber security topics that every engineer should understand, the book discusses: Network security Personal data security Cloud computing Mobile computing Preparing for an incident Incident response Evidence handling Internet usage Law and compliance Security and forensic certifications Application of the concepts is demonstrated through short case studies of real-world incidents chronologically delineating related events. The book also discusses certifications and reference manuals in the area of cyber security and digital forensics. By mastering the principles in this volume, engineering professionals will not only better understand how to mitigate the risk of security incidents and keep their data secure, but also understand how to break into this expanding profession.
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9781482206487 , 148220648X
    Language: English
    Pages: 1 online resource (xiii, 564 pages) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Penetration testing (Computer security) ; Electronic books ; local ; Electronic books
    Abstract: When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially avai
    Note: "An Auerbach book.". - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9781466592155 , 146659215X , 1466592141 , 9781466592148
    Language: English
    Pages: 1 online resource (xv, 340 pages) , illustrations
    Parallel Title: Erscheint auch als
    Keywords: Data protection Standards ; Information technology Security measures ; Computer security ; Computer networks Security measures ; Computer Security ; COMPUTERS ; Internet ; Security ; COMPUTERS ; Networking ; Security ; COMPUTERS ; Security ; General ; Electronic books ; Electronic books ; Computer networks ; Security measures ; Computer security ; Data protection ; Standards ; Information technology ; Security measures ; Protection de l'information (Informatique) ; Normes ; Technologie de l'information ; Sécurité ; Mesures ; Sécurité informatique ; Réseaux d'ordinateurs ; Sécurité ; Mesures ; Electronic books
    Abstract: "The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability, also known as the CIA of information security. As the field has become more complex, both novices and professionals with years of experience need a good reference book outlining the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, the book starts with the fundamentals to bridge the understanding gaps--approaching information security from the bedrock principles of CIA"--
    Note: Includes bibliographical references (pages 313-328). - Print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Boca Raton, FL : CRC Press
    ISBN: 9781466502277 , 1466502274 , 9781628707090 , 1628707097 , 9781482209402 , 1482209403 , 9781482209396 , 148220939X , 9781466502260
    Language: English
    Pages: 1 online resource (xxvii, 379 pages)
    Parallel Title: Erscheint auch als
    Keywords: Computer networks Security measures ; Computer security ; COMPUTERS ; Internet ; Security ; COMPUTERS ; Networking ; Security ; COMPUTERS ; Security ; General ; Computer networks ; Security measures ; Computer security ; Electronic books ; Electronic books
    Abstract: The availability and security of many services we rely upon-including water treatment, electricity, healthcare, transportation, and financial transactions-are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide. Divided into five sections, the book examines topics comprising functions within.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9781466575400 , 1466575409 , 9781466572140 , 1466572140
    Language: English
    Pages: 1 online resource (xlvi, 1324 pages) , illustrations.
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effective
    Note: Includes bibliographical references. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9781439879122 , 1439879125 , 9781466550117 , 1466550112 , 9781466559233 , 1466559233 , 1138434795 , 9781138434790
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    Keywords: New products ; Production management ; BUSINESS & ECONOMICS ; Production & Operations Management ; TECHNOLOGY & ENGINEERING ; Industrial Engineering ; TECHNOLOGY & ENGINEERING ; Industrial Technology ; New products ; Production management ; Kwaliteitsverbetering ; Kwaliteitszorg ; Productiemanagement ; Electronic books
    Note: Includes bibliographical references and index. - Print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...