Browse Results

Showing 28,376 through 28,400 of 53,781 results

IT Inventory and Resource Management with OCS Inventory NG 1.02

by Barzan Tony Antal

This book closely follows the style of a practical, hands-on "how to" guide on working with OCS Inventory NG. The step-by-step approach, coupled with the use of visual aids, clear instructions, and real-world examples, makes it a fast-paced book. Upon the completion of this book, you will have the necessary skill set, know-how, and confidence to implement OCS Inventory NG to meet the demanding asset management needs of any organization. Then you can carry on using the book as reference material. This book targets an audience of system administrators and IT professionals who are required to implement, configure, customize, and work with IT Inventory and Asset Management solutions. The book does not presume any prior knowledge of inventory management, just a solid grasp of the server/client model and familiarity with the chosen operating system along with the necessary web server and database server terminologies. Anyone with an interest in inventorying IT assets and solving real-world resource management dilemmas will enjoy this book.

IT-Investitionen verstehen und bewerten: Betriebswirtschaftliches und organisationspsychologisches Grundwissen für Kleinunternehmen

by Oliver Marz Mayte Baum Peter Schimitzek Eckart Kramer

Dieses Buch richtet sich an Klein- und Kleinstunternehmen, die die Einführung eines Warenwirtschafts- oder Enterprise-Resource-Planning-Systems planen und ihre Prozesse erfolgreich digitalisieren wollen. Es bietet Unterstützung bei der Erstellung einer wirtschaftlichen Bewertung, um den Nutzenbeitrag der Investition deutlich und selbstständig herausstellen zu können. Neben den wirtschaftlichen Grundlagen bietet das Buch Einblicke in die organisatorischen und psychologischen Herausforderungen, die den Prozess der Einführung und Nutzung begleiten. Zudem werden vor allem motivationspsychologische Grundlagen betrachtet, die gleichermaßen die Geschäftsführung und Mitarbeiter betreffen.

IT Investment: Making a Business Case (Computer Weekly Professional Ser.)

by Dan Remenyi Michael Sherwood-Smith

Frequently not enough attention is given to producing a comprehensive business case or to producing an economic justification for an information systems investment. In fact many organizations are not clear as to what constitutes a sound business case and how to go about producing one. This Professional level book for the Computer Weekly Professional Series will show how to go about justification for I.T. spend. This book is designed for all those who are involved in the decision to invest in information systems. This book is especially relevant to senior business executives, senior financial managers and IT executives. Business consultants, computer and corporate advisors will also find the ideas and material addressed in this text of particular benefit as will anyone involved in corporate and strategic planning.In addition, senior students such as those working towards their MBAs will find this book of use.A business case is a statement or a series of statements that demonstrate the economic value of a particular intervention, a course of action or a specific investment. A business case is not simply a financial forecast of the hardware and software costs and the expected benefits. A business case for an information systems investment involves a comprehensive understanding of both the likely resources as well as the business drivers which will assist business managers improve their performance and thereby obtain a stream of benefits from the investment.In general there are approximately six steps in producing a business case for an information systems investment.1. Determine the high-level business outcomes that will be clearly and comprehensively expressed as a set of opportunities the organization can take advantage of, or problems that need to be rectified.2. Identify the corporate critical success factors that will be supported or enhanced by the operation of the completed information systems project or investment.3. Create a list of specific and detailed outcomes or benefits, their appropriate metrics, measuring methods and responsibility points that are represented by the stakeholders.4. Quantify the contribution made by the outcomes, which requires associating numbers or benefit values with outcomes where this is possible.5. Highlight the risks associated with the project.Fundamental to this new approach to developing a business case for information systems investment is the fact that it incorporates much more than the financial numbers which are typically found in the standard approach to a feasibility study. This approach looks behind the financial numbers to the improvements in business performance which are facilitated by information systems and which are the real drivers of the benefits. Furthermore, this approach to developing a business case allows the organization to manage the process so that the required results are achieved.

IT-Lösungen auf Basis von SysML und UML: Anwendungsentwicklung mit Eclipse UML Designer und Eclipse Papyrus

by Eric A. Nyamsi

Das Buch fokussiert auf Eclipse UML Designer und Eclipse Papyrus in Bezug auf Erstellen und Visualisierung von UML- und SysML-Diagrammen im Bereich der Stromversorgung. Die visuellen Modellierungs-Entwicklungsumgebungen UML Designer (Obeo Designer) und Papyrus werden dargestellt

IT-Lösungen auf Basis von SysML und UML: Anwendungsentwicklung mit Eclipse UML Designer und Eclipse Papyrus

by Eric A. Nyamsi

Das Buch fokussiert auf Eclipse-UML-Designer und Eclipse Papyrus in Bezug auf Erstellen und Visualisierung von UML- und SysML-Diagrammen im Bereich der Energietechnik. Die visuellen Modellierungs-Entwicklungsumgebungen UML-Designer (Obeo-Designer) und Papyrus werden dargestellt. Neue Features von Java 16–19 und C++20 werden zum Ermöglichen der Programmierung der Anwendungen für die Energiebranche mittels des Konzepts „Modelling4Programming“ oder „M4P“ erläutert. Jakarta-EE-Platform (Version 9.1) wird zum Erstellen von Enterprise-Anwendungen mithilfe eines Applikationsservers wie Glassfish (Version 6.2.5) dargestellt.

IT Maintenance: Applied Project Management

by Michael F. Malinoski PMP

IT Maintenance: Applied Project Management modifies project management best practices to improve how IT system maintenance is managed. By taking a fresh look at increasing value and quality of system maintenance in a straightforward and practical way, this book helps readers understand how to apply modified project management best practices. From IT maintenance managers, project managers, and team members to CIOs, readers will: • Discover cost savings associated with reducing staff Improve reporting status and metrics •Build greater customer satisfaction Learn how to perform work consistently • Decrease staff stress level by stabilizing expectations •Streamline team operations •Decrease the manager's ongoing workload PLUS! This practical reference is organized by process groups similar to the PMBOK® — providing you with applied step-by-step guidance.

IT Management: The art of managing IT based on a solid framework leveraging the company´s political ecosystem

by Lionel Pilorget Thomas Schell

This book focuses on the art of managing IT. A simple and robust framework is proposed to describe and to structure the essential elements of IT management. The authors pay particular attention to didactic aspects in order to facilitate the retention of models presented as well as to promote reflection on the subjects introduced. Thanks to a concentrate of good practices, each company will rapidly be in a position to build their proper IT ecosystem.

IT-Management: Die Kunst des IT-Managements auf der Grundlage eines soliden Rahmens, der das politische Ökosystem des Unternehmens wirksam unterstützt

by Lionel Pilorget Thomas Schell

Dieses Buch befasst sich mit der Kunst des IT-Managements. Es wird ein einfacher und robuster Rahmen vorgeschlagen, um die wesentlichen Elemente des IT-Managements zu beschreiben und zu strukturieren. Die Autoren legen besonderes Augenmerk auf didaktische Aspekte, um das Behalten der vorgestellten Modelle zu erleichtern und das Nachdenken über die vorgestellten Themen zu fördern. Dank eines Konzentrats an bewährten Praktiken wird jedes Unternehmen schnell in der Lage sein, sein eigenes IT-Ökosystem aufzubauen.

IT Management in the Digital Age: A Roadmap For The It Department Of The Future (Management for Professionals)

by Nils Urbach Frederik Ahlemann

This book examines the massive changes currently taking place in the business world and commonly known under the label “digitalization.” In addition, it describes the significant impacts of technological innovations on processes, products, services and business models. The digital transformation resulting from these developments leads to disruption for many enterprises and industries. While for many years, IT departments mainly concentrated on fulfilling the requirements of business departments effectively and efficiently by means of high-quality IT services and operations, today’s IT departments are increasingly expected to actively co-design and co-create the enterprise. This book describes how information technology enables innovation for businesses, and how IT departments can proactively and in a timely manner collaborate with the business departments of their corporation to leverage these innovations. It also delineates the implications of digitalization for the structures, processes and people in today’s IT departments. IT leaders and managers who are responsible for corporate IT, as well as practice-oriented researchers, will find valuable inspirations and guidance in this book, the central mission of which is to encourage and enable a more proactive role for IT in the digital transformation processes."This book demonstrates the impact of digital transformation on IT organizations and their management. It also presents potential risks for technology availability, security and data protection. The authors develop a vision of what IT management should look like in ten years if it is to continue playing an important role in the company. The book seeks to motivate IT executives and managers with IT responsibility to actively adapt their thinking and their IT organizations before they are forced to react to external pressure. Definitely worth reading!" Sven Kreimendahl, Director Business Technology Services, Campana & Schott

IT-Operations in der Transformation: Zukunftsweisende IT-Betriebsmodelle zwischen „Hey Joe“ und „NoOps“ (Edition HMD)

by Hans-Peter Fröschle Ralf Oestereich Nikolaus Schmidt

Die zunehmende Digitalisierung aller Lebensbereiche bedeutet für die Unternehmen, dass die IT sich mehr und mehr von einer betrieblichen Unterstützungsfunktion zu einem zentralen Wertschöpfungsprozess wandelt. Damit ist es erforderlich, dass die IT nach ähnlichen Prinzipien wie die Kernprozesse der Unternehmen funktioniert. Neben den bisherigen Anforderungen nach Stabilität, Sicherheit, kostenoptimaler und zuverlässiger Betrieb wird eine hohe Innovationsfähigkeit und hohe Veränderungsgeschwindigkeit vorausgesetzt.Die Konsequenzen sind bereits heute in vielen IT-Organisationen sichtbar:Innovative Anwendungen künstlicher Intelligenz bzw. selbstlernender Systeme werden als Enabler für Automatisierung eingesetzt.Agile Vorgehensweisen aus der Softwareentwicklung finden Einzug im IT-Projektmanagement, IT-Betrieb und Support. Zur Gewährleistung von IT-Qualität und Anpassungsgeschwindigkeit werden bisherige Bereichsgrenzen in Frage gestellt. So werden in vielen IT-Organisationen mit DevOps die Abteilungsgrenzen zwischen Entwicklung (Dev) und Betrieb (Ops) überwunden.Herkömmlich Architekturen und Betriebsmodelle werden durch Cloud-basierte Lösungen ersetzt. Damit verbunden sind aufbau- und ablauforganisatorischen Regelungen zur Bereitstellung und Verwaltung von Cloud-Lösungen und -Services. Während die Bedeutung eines hochverfügbaren, flexiblen IT-Betriebs damit steigt, verändern sich deren Aufgaben und Verantwortung grundlegend: Der eigentliche Betrieb der IT rückt in den Hintergrund Gefordert ist eine Steuerung der Anbieter und Partner in einem Multi-Sourcing-Umfeld.Vor diesem Hintergrund stellt sich auch die Frage, inwieweit etablierte Entwicklungs- und Betriebs-Frameworks für die Bewältigung der Anforderungen genutzt werden können.

IT Outsourcing Contracts: A Legal and Practical Guide

by Jimmy Desai

This book provides an overview of the IT outsourcing relationshipand life cycle. The process begins with an organizationconsidering whether or not IT outsourcing would be of benefit andthen the issues which would need to be considered in order toanswer this question accurately are discussed. If an organizationbelieves that an IT outsourcing deal could be of benefit, it willthen need to choose a suitable supplier to perform its IToutsourcing. The issues to consider regarding an IT supplier arealso set out in this book. Having selected an IT supplier, anorganization will then need to agree key terms (includingidentifying and agreeing any contentious issues which are so-called deal breakers). Agreeing the IT outsourcing contract isnot the end but the start of the IT outsourcing relationship andthis relationship will need to be managed and developed over thecourse of the contract. Sooner or later the IT outsourcingarrangement will have to come to an end and so an exit plan willneed to be formulated and implemented. This life cycle needs tobe fully understood by anyone involved in this kind of IToutsourcing transaction and this book provides useful informationabout this life cycle.

IT Performance Management

by Peter Wiggers Maritha de Boer-de Wit Henk Kok

IT Performance Management addresses the way organizations should balance the demand and the supply of information technology, optimizing the cost and maximizing the business value of IT.In this book several aspects of IT performance management are described. The way this management is executed and the techniques, which should be used, depend on the maturity of the relationship between the IT function and the lines of business of an organization. The foundation of the authors' approach is based on the flow of money and related management objectives. However, performance management is primarily based on perceptions. Therefore, this book introduces the IT value perception model. This model describes four separate levels of perception for the business value of IT. If the demand and the supply of IT do not share the same perception level, the balance is lost, which will lead to friction and inefficiency within an organization. This book is not about what is good or what is bad, but rather is about the 'what', the 'why' and to a limited extent the 'how' of managing the performance of IT. Therefore, the book finishes with a 'back-to-business' section in which a self-assessment checklist, a potential growth path and ten next steps are provided. This enables the reader to start applying this book in his every day working environment immediately. IT Performance Management: * Provides an overview of best practices and available thinking on the subject of IT cost and value* Describes the subject of IT cost and value related to management issues on IT strategy, portfolio management, service management, architecture and sourcing * Addresses differing degrees of maturity between IT and the business, illustrated by case studies

IT Planet Petabyte Class 8

by PM Publishers Pvt. Ltd.

The Petabyte book is based on the latest software packages and operating system programs such as Microsoft Office 2019 and Windows 10. Apart from these two, author has covered latest software programs such as Scratch, Stykz, Animate, Photoshop, Spark, MIT App Inventor and Python. To produce a visually appealing and easy to understand book, the author has artfully combined the latest technology, pictures, drawings and text in this series. Most of the pictures in this series show a step-by-step pedagogy, which simplifies the more complex computer concepts. The terms and examples described in this series are those which everyone will come across while using computers in school as well as at home.

The IT Professional's Business and Communications Guide

by Steven Johnson

Get the communication skills you need for career success with this unique book. Preparing you for exams and beyond, the valuable content delves into the issues that you'll face in corporate, retail, and remote support environments. The book offers more than fifty scenarios depicting typical workplace situations, possible responses-and appropriate solutions to guide you. With this approach, you'll gain valuable insight into becoming a team player and learn strategies to communicate more effectively with coworkers and customers.

IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value

by Sanjiv Purba

Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it’s been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project’s outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.

The IT Project Management Answer Book

by David Pratt Pmp

Zero in on the answers to your IT project management questionsWith constrained schedules and anxious stakeholders eager for results, the typical IT project team doesn't have the luxury of wading through lengthy tomes to find solutions. The IT Project Management Answer Book guides you to the specific answers you need to successfully conduct and complete your IT project.Written in an easy-to-use question-and-answer format, the book covers all aspects of managing an IT project, from initial organizational issues to closeout. Following the classic project management processes, author David Pratt builds on the basics to offer valuable insights not found in other resources, including:• Proven techniques such as the best way to manage defects• How to create performance standards for outside contractors• How to develop a user's manualFor more technically inclined team members, the author's plain-speak approach presents a refreshing view of the IT world. For those less technically oriented, he describes the tools and solutions for dealing with IT project challenges in an accessible, straightforward way. Let this information-packed resource lead you and your team to IT project success.

IT Project Management: A Geek's Guide to Leadership (Best Practices in Portfolio, Program, and Project Management)

by Byron A. Love

This book’s author, Byron Love, admits proudly to being an IT geek. However, he had found that being an IT geek was limiting his career path and his effectiveness. During a career of more than 31 years, he has made the transition from geek to geek leader. He hopes this book helps other geeks do the same. This book addresses leadership issues in the IT industry to help IT practitioners lead from the lowest level. Unlike other leadership books that provide a one-size-fits-all approach to leadership, this book focuses on the unique challenges that IT practitioners face. IT project managers may manage processes and technologies, but people must be led. The IT industry attracts people who think in logical ways—analytical types who have a propensity to place more emphasis on tasks and technology than on people. This has led to leadership challenges such as poor communication, poor relationship management, and poor stakeholder engagement. Critical IT projects and programs have failed because IT leaders neglect the people component of "people, process, and technology." Communications skills are key to leadership. This book features an in-depth discussion of the communications cycle and emotional intelligence, providing geek leaders with tools to improve their understanding of others and to help others understand them. To transform a geek into a geek leader, this book also discusses: Self-leadership skills so geek leaders know how to lead others by leading themselves first Followership and how to cultivate it among team members How a geek leader’s ability to navigate disparate social styles leads to greater credibility and influence Integrating leadership into project management processes The book concludes with a case study to show how to put leadership principles and practices into action and how an IT geek can transform into an effective IT geek leader.

IT-Projektmanagement: Effiziente Einführung in das Management von Projekten (essentials)

by Christian Aichele Marius Schönberger

Christian Aichele und Marius Schönberger haben aktuelle wissenschaftliche Methoden und Praxiserfahrungen aus IT-Projekten in unterschiedlichsten Bereichen und Branchen zusammengefasst. Zur erfolgreichen Durchführung von Projekten stellen sie hierbei aktuelle Methoden und Vorgehensweise kumuliert vor und erklären sie so, dass interessierte Leser ein fundiertes Grundlagenwissen über die Auswahl und den Einsatz passender Methoden des Projektmanagements erhalten.

IT-Prüfung, Datenschutzaudit und Kennzahlen für die Sicherheit: Neue Ansätze für die IT-Revision

by Aleksandra Sowa

Dieses Buch aus der Reihe „Neue Ansätze für die IT-Revision“ entwickelt aktuelle und neuartige Methoden für die Arbeit der Revision sowie für Prüfungen und Tests von IT-Systemen. Berücksichtigt werden dabei Aspekte des Datenschutzes, der Cybersicherheit, Effektivität und Funktionalität, und es werden Ansätze für Datenschutzbeauftragte, IT-Sicherheitsbeauftragte, CISOs, Compliance-Manager etc. vorgestellt. Die Schwerpunkte des Buches liegen auf Datenschutz, Kennzahlensystemen sowie Internet of Things und Künstlicher Intelligenz. Besondere Beachtung erfahren Themen wie Prüfung des Datenschutzmanagementsystems (DSMS), Prüfung der Auftragsverarbeitung sowie Meldepflichten gemäß DSGVO. Die präsentierten Ansätze zur Bewertung der Informationssicherheit mittels Kennzahlen, zu Tests für IoT-Geräte und zur Zertifizierung der Softwareentwicklung ermöglichen den Revisoren, diese Themen als systematische Prüfungen, Tests und Audits zu erfassen und umzusetzen.

IT-Prüfung, Sicherheitsaudit und Datenschutzmodell

by Aleksandra Sowa

Das Buch erläutert leicht verständlich die modernen Grundlagen der Revisionsarbeit. Erstmalig für praktische Anwendung systematisiert, führt es in Systeme der Security Intelligence, kognitiven Sicherheit und Schwarmintelligenz ein. Zudem stellt das Herausgeberwerk eine Anleitung für Prüfer im Umgang mit neuen Themen, wie Standard-Datenschutzmodell (SDM), Sicherheitsaudits in der industriellen Produktion und IoT-Umgebung sowie die Handhabung von Hinweisen zur Wirtschaftskriminalität und zu Compliance-Verstößen in den Jahresabschlussprüfungen vor. Damit können Revisoren diese Themen als systematische Prüfungen, Tests und Audits erfassen und umsetzen.

IT Quality Management

by Wolfgang W. Osterhage

In a comprehensive approach this book covers the end-to-end process from request management to change management, error management and migration management to acceptance testing and final data clean up. It is based upon nearly twenty years of experience in tests, acceptance and certification, when introducing medium to large IT systems including complex software for administrations and industry in many countries. There exist a variety of methodologies with different characteristics having emanated from various schools and consultancies to support such activities. However, it is obvious that because of the diversity in organisational levels in companies the rigor of application of such methodologies quite often suffers with regard to more pragmatic approaches. In view of economic considerations this may be unavoidable. For this reason no new or consolidated methodology shall be presented but an approach oriented on practical criteria coming closer to reality and offering methods, which can provide assistance on a case-by-case basis.

IT Regulatory Compliance in North America: A Pocket Guide

by Alan Calder

This pocket guide provides initial guidance to all who are concerned with IT regulatory compliance in North America. A key challenge for all IT executive teams is to ensure that the organization avoids breaches of any criminal or civil law, as well as any statutory, regulatory or contractual obligations, and of any security requirements. Control A.15.1.1 of ISO/IEC27001:2005 (the best-practice information security management standard) provides guidance that is relevant to the IT governance of every organization. It says that the organization should explicitly define and document the statutory, regulatory and contractual requirements for each of its information systems, and that this documentation should be kept up-to-date to reflect any relevant changes in the legal environment. The specific controls and individual responsibilities to meet these requirements should be similarly documented and kept up-to-date, and should be linked to the list of all the data assets and processes in the organization, together with their ownership details.

IT-Revision, IT-Audit und IT-Compliance: Neue Ansätze für die IT-Prüfung

by Aleksandra Sowa Peter Duscha Sebastian Schreiber

Auf Grundlage des risikoorientierten Prüfungsansatzes zeigt dieses Buch, wie effektive Prüfungsaktivitäten in einem komplexen Prüfungsumfeld mit besonderer Berücksichtigung aktueller Topthemen wie Datenschutz, Cybersecurity, Penetrationstests und Investigationen bei einer wachsenden Anzahl unternehmensinterner Ermittlungen durchgeführt werden können. Neuartige Instrumente und Methoden für die Arbeit der IT-Revision werden aufgezeigt und neue Ansätze diskutiert. In der zweiten, überarbeiteten und aktualisierten Auflage erfahren die Meldepflichten nach DSGVO, ITSiG bzw. NIS-Richtlinie eine besondere Betrachtung. Das Buch hilft, die Arbeitsweisen der Revision systematisch zu erfassen sowie Prüfungen zu planen und durchzuführen. Dabei bietet es sowohl fertige Lösungen als auch „Hilfe zur Selbsthilfe“ an.

IT-Risikomanagement von Cloud-Services in Kritischen Infrastrukturen: HMD Best Paper Award 2017 (essentials)

by Michael Adelmeyer Christopher Petrick Frank Teuteberg

Der Einsatz von Cloud-Services birgt neben vielfältigen Vorteilen auch Risiken für die IT-Sicherheit von Unternehmen. Dies gilt insbesondere für Betreiber Kritischer Infrastrukturen, die durch das IT-Sicherheitsgesetz dazu verpflichtet werden, ihre IT besser vor Cyber-Attacken zu schützen. Für ein funktionierendes IT-Risiko- und Sicherheitsmanagement ist daher eine vollständige Identifikation sowie Bewertung der sich aus dem Einsatz von Cloud-Services ergebenden Risiken unerlässlich. Hierzu werden im vorliegenden essential ein Anforderungskatalog an Cloud-Services zur Umsetzung des IT-Sicherheitsgesetzes, ein Framework für das IT-Risikomanagement von Cloud-Services in Kritischen Infrastrukturen sowie Handlungsempfehlungen für Unternehmen präsentiert.Die AutorenMichael Adelmeyer, M.Sc., CISA, ist wissenschaftlicher Mitarbeiter am Fachgebiet für Unternehmensrechnung und Wirtschaftsinformatik (UWI) der Universität Osnabrück. Christopher Petrick, M.Sc., hat Betriebswirtschaftslehre mit den Schwerpunkten Accounting und Management an der Universität Osnabrück studiert. Prof. Dr. Frank Teuteberg ist Leiter des Fachgebiets UWI an der Universität Osnabrück.

IT Security Controls: A Guide to Corporate Standards and Frameworks

by Virgilio Viegas Oben Kuyucu

Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.). To connect the book with the real world, a number of well-known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you.What You Will LearnUnderstand corporate IT security controls, including governance, policies, procedures, and security awarenessKnow cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scansUnderstand technical IT security controls for unmanaged and managed devices, and perimeter controlsImplement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and more Who This Book Is For IT security managers, chief information security officers, information security practitioners, and IT auditors will use the book as a reference and support guide to conduct gap analyses and audits of their organizations’ IT security controls implementations.

Refine Search

Showing 28,376 through 28,400 of 53,781 results