Greening the data center [[electronic resource] ] : opportunities for improving data center energy efficiency / / George Spafford |
Autore | Spafford George |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (60 p.) |
Disciplina | 004.0682 |
Soggetto topico |
Data libraries - Energy consumption
Data processing service centers - Energy conservation Information technology - Environmental aspects Green technology Social responsibility of business |
ISBN |
1-84928-131-9
1-282-38453-8 9786612384530 1-84928-009-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction; Chapter 1: What is "Energy Efficiency"?; Chapter 2: Processes and Planning; Chapter 3: Applications and Data; Chapter 4: Broad Themes; Chapter 5: IT Hardware; Chapter 6: Facilities - Electrical; Chapter 7: Facilities - Cooling; Chapter 8: Selecting a Data Center Location; Chapter 9: Monitoring and Reporting; Chapter 10: Conclusion; Appendix: Additional Resources; ITG Resources |
Record Nr. | UNINA-9910821229803321 |
Spafford George
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The insider threat [[electronic resource] ] : combatting the enemy within / / Clive Blackwell |
Autore | Blackwell Clive |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (64 p.) |
Disciplina | 005.8 |
Soggetto topico |
Business - Data processing - Security measures - Planning
Data protection |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-38475-9
9786612384752 1-84928-011-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; CONTENTS; Chapter 1 Modelling the Insider Threat; What is the insider threat; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; Chapter 2 Insider Attacks; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; Appendix Further Reading; ITG Resources |
Record Nr. | UNINA-9910455024703321 |
Blackwell Clive
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The insider threat [[electronic resource] ] : combatting the enemy within / / Clive Blackwell |
Autore | Blackwell Clive |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (64 p.) |
Disciplina | 005.8 |
Soggetto topico |
Business - Data processing - Security measures - Planning
Data protection |
ISBN |
1-282-38475-9
9786612384752 1-84928-011-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; CONTENTS; Chapter 1 Modelling the Insider Threat; What is the insider threat; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; Chapter 2 Insider Attacks; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; Appendix Further Reading; ITG Resources |
Record Nr. | UNINA-9910778069003321 |
Blackwell Clive
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The insider threat [[electronic resource] ] : combatting the enemy within / / Clive Blackwell |
Autore | Blackwell Clive |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (64 p.) |
Disciplina | 005.8 |
Soggetto topico |
Business - Data processing - Security measures - Planning
Data protection |
ISBN |
1-282-38475-9
9786612384752 1-84928-011-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; CONTENTS; Chapter 1 Modelling the Insider Threat; What is the insider threat; Architectural security model; An attack classification scheme; Attack surface; Impact zone; System hardening; Targeting the attacker; Chapter 2 Insider Attacks; Insider attack classification; Damage; Defensive protection; Fraud; Theft; Conclusions; Appendix Further Reading; ITG Resources |
Record Nr. | UNINA-9910810355603321 |
Blackwell Clive
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Managing information risk [[electronic resource] ] : a director's guide / / Stewart Mitchell |
Autore | Mitchell Stewart |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (57 p.) |
Disciplina | 658.4038 |
Soggetto topico |
Data protection
Management information systems Business - Data processing |
Soggetto genere / forma | Electronic books. |
ISBN |
1-84928-133-5
1-282-27498-8 9786612274985 1-84928-019-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction; Chapter 1: Managing Risk; Chapter 2: Information Risk Policy; Chapter 3: The Risks; Chapter 4: Risk Management Framework; Chapter 5: Risk Assessment; Chapter 6: Risk Mitigation Strategy; Chapter 7: Controls; Chapter 8: Interacting with Partners and Suppliers; Chapter 9: Standards; Appendix 1: Checklist for Directors; Appendix 2: Establishing an Information Risk Tsar; Further Reading; ITG Resources |
Record Nr. | UNINA-9910455287803321 |
Mitchell Stewart
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Managing information risk [[electronic resource] ] : a director's guide / / Stewart Mitchell |
Autore | Mitchell Stewart |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (57 p.) |
Disciplina | 658.4038 |
Soggetto topico |
Data protection
Management information systems Business - Data processing |
ISBN |
1-84928-133-5
1-282-27498-8 9786612274985 1-84928-019-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction; Chapter 1: Managing Risk; Chapter 2: Information Risk Policy; Chapter 3: The Risks; Chapter 4: Risk Management Framework; Chapter 5: Risk Assessment; Chapter 6: Risk Mitigation Strategy; Chapter 7: Controls; Chapter 8: Interacting with Partners and Suppliers; Chapter 9: Standards; Appendix 1: Checklist for Directors; Appendix 2: Establishing an Information Risk Tsar; Further Reading; ITG Resources |
Record Nr. | UNINA-9910778600103321 |
Mitchell Stewart
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Managing information risk [[electronic resource] ] : a director's guide / / Stewart Mitchell |
Autore | Mitchell Stewart |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (57 p.) |
Disciplina | 658.4038 |
Soggetto topico |
Data protection
Management information systems Business - Data processing |
ISBN |
1-84928-133-5
1-282-27498-8 9786612274985 1-84928-019-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction; Chapter 1: Managing Risk; Chapter 2: Information Risk Policy; Chapter 3: The Risks; Chapter 4: Risk Management Framework; Chapter 5: Risk Assessment; Chapter 6: Risk Mitigation Strategy; Chapter 7: Controls; Chapter 8: Interacting with Partners and Suppliers; Chapter 9: Standards; Appendix 1: Checklist for Directors; Appendix 2: Establishing an Information Risk Tsar; Further Reading; ITG Resources |
Record Nr. | UNINA-9910811019403321 |
Mitchell Stewart
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobile security [[electronic resource] /] / Steven Furnell |
Autore | Furnell Steven |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (77 p.) |
Disciplina | 005.8 |
Soggetto topico | Wireless communication systems - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
1-84928-122-X
1-282-27499-6 9786612274992 1-84928-021-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; CONTENTS; Chapter 1 Getting Mobile; Chapter 2 Surviving Outside; Chapter 3 Getting Connected; Chapter 4 Ensuring it's You; Chapter 5 Safeguarding your Data; Chapter 6 Are you a Moving Target; Chapter 7 Know your Limits; Conclusions; ITG Resources |
Altri titoli varianti | Mobile security : a pocket guide |
Record Nr. | UNINA-9910455030303321 |
Furnell Steven
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobile security [[electronic resource] /] / Steven Furnell |
Autore | Furnell Steven |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (77 p.) |
Disciplina | 005.8 |
Soggetto topico | Wireless communication systems - Security measures |
ISBN |
1-84928-122-X
1-282-27499-6 9786612274992 1-84928-021-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; CONTENTS; Chapter 1 Getting Mobile; Chapter 2 Surviving Outside; Chapter 3 Getting Connected; Chapter 4 Ensuring it's You; Chapter 5 Safeguarding your Data; Chapter 6 Are you a Moving Target; Chapter 7 Know your Limits; Conclusions; ITG Resources |
Altri titoli varianti | Mobile security : a pocket guide |
Record Nr. | UNINA-9910778500603321 |
Furnell Steven
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobile security [[electronic resource] /] / Steven Furnell |
Autore | Furnell Steven |
Edizione | [1st edition] |
Pubbl/distr/stampa | Ely, U.K., : IT Governance Pub., 2009 |
Descrizione fisica | 1 online resource (77 p.) |
Disciplina | 005.8 |
Soggetto topico | Wireless communication systems - Security measures |
ISBN |
1-84928-122-X
1-282-27499-6 9786612274992 1-84928-021-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preliminaries; CONTENTS; Chapter 1 Getting Mobile; Chapter 2 Surviving Outside; Chapter 3 Getting Connected; Chapter 4 Ensuring it's You; Chapter 5 Safeguarding your Data; Chapter 6 Are you a Moving Target; Chapter 7 Know your Limits; Conclusions; ITG Resources |
Altri titoli varianti | Mobile security : a pocket guide |
Record Nr. | UNINA-9910806276303321 |
Furnell Steven
![]() |
||
Ely, U.K., : IT Governance Pub., 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|