top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Handbook of Data Center Management, 1998 edition / / edited by Auerbach
Handbook of Data Center Management, 1998 edition / / edited by Auerbach
Edizione [2nd ed.]
Pubbl/distr/stampa Boca Raton, FL : , : Auerbach Publications, , [1999]
Descrizione fisica 1 online resource (632 p.)
Disciplina 658/.05
Soggetto topico Information technology - Management
Client/server computing - Management
Business enterprises - Computer networks - Management
Electronic data processing departments - Management
Soggetto genere / forma Electronic books.
ISBN 1-003-06938-X
0-429-25720-1
1-4822-8781-1
1-280-29050-1
0-203-99757-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contributors; Contents; Introduction; Section I : IT Management; Section II: Data Center Management; Section III : Applications Infrastructure and Operations; Section IV: Enterprise Network Management; Section V: Desktop Computing; Section VI: Equipment Asset Management; Section VII: Customer Support Operations; Section VIII : Quality Control and Computer Security; Section IX: Contigency Planning; About the Editor; Index
Record Nr. UNINA-9910450340903321
Boca Raton, FL : , : Auerbach Publications, , [1999]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Human-computer etiquette : cultural expectations and the design implications they place on computers and technology / / edited by Caroline C. Hayes, Christopher A. Miller
Human-computer etiquette : cultural expectations and the design implications they place on computers and technology / / edited by Caroline C. Hayes, Christopher A. Miller
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla., : Auerbach Publications, 2011
Descrizione fisica 1 online resource (386 p.)
Disciplina 005.4/37
Altri autori (Persone) HayesCaroline
MillerChristopher Allan
Collana Supply chain integration
Soggetto topico Computers - Social aspects
Human-computer interaction
User interfaces (Computer systems)
Etiquette
ISBN 1-04-008276-9
0-429-24946-2
1-4200-6946-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Etiquette and multicultural collisions -- pt. 2. Introducing etiquette and culture into software -- pt. 3. Etiquette and development of trust -- pt. 4. Anthropomorphism : computer agents that look or act like people -- pt. 5. Understanding humans : physiological and neurological indicators -- pt. 6. The future : polite and rude computers as agents of social change.
Record Nr. UNINA-9910807231403321
Boca Raton, Fla., : Auerbach Publications, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Human-computer etiquette : cultural expectations and the design implications they place on computers and technology / / edited by Caroline C. Hayes, Christopher A. Miller
Human-computer etiquette : cultural expectations and the design implications they place on computers and technology / / edited by Caroline C. Hayes, Christopher A. Miller
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : Auerbach Publications, , 2010
Descrizione fisica 1 online resource (386 p.)
Disciplina 005.4/37
Altri autori (Persone) HayesCaroline
MillerChristopher Allan
Collana Supply chain integration
Soggetto topico Computers - Social aspects
Human-computer interaction
User interfaces (Computer systems)
Etiquette
Soggetto genere / forma Electronic books.
ISBN 0-429-24946-2
1-4200-6946-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Etiquette and multicultural collisions -- pt. 2. Introducing etiquette and culture into software -- pt. 3. Etiquette and development of trust -- pt. 4. Anthropomorphism : computer agents that look or act like people -- pt. 5. Understanding humans : physiological and neurological indicators -- pt. 6. The future : polite and rude computers as agents of social change.
Record Nr. UNINA-9910458996103321
Boca Raton, Fla. : , : Auerbach Publications, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Human-computer etiquette : cultural expectations and the design implications they place on computers and technology / / edited by Caroline C. Hayes, Christopher A. Miller
Human-computer etiquette : cultural expectations and the design implications they place on computers and technology / / edited by Caroline C. Hayes, Christopher A. Miller
Edizione [1st edition]
Pubbl/distr/stampa Boca Raton, Fla. : , : Auerbach Publications, , 2010
Descrizione fisica 1 online resource (386 p.)
Disciplina 005.4/37
Altri autori (Persone) HayesCaroline
MillerChristopher Allan
Collana Supply chain integration
Soggetto topico Computers - Social aspects
Human-computer interaction
User interfaces (Computer systems)
Etiquette
ISBN 0-429-24946-2
1-4200-6946-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. Etiquette and multicultural collisions -- pt. 2. Introducing etiquette and culture into software -- pt. 3. Etiquette and development of trust -- pt. 4. Anthropomorphism : computer agents that look or act like people -- pt. 5. Understanding humans : physiological and neurological indicators -- pt. 6. The future : polite and rude computers as agents of social change.
Record Nr. UNINA-9910791883003321
Boca Raton, Fla. : , : Auerbach Publications, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook . Volume 5 / / edited by Harold F. Tipton, Micki Krause
Information security management handbook . Volume 5 / / edited by Harold F. Tipton, Micki Krause
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton, : Auerbach Publications, c2012
Descrizione fisica 1 online resource (544 p.)
Disciplina 005.8
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Soggetto topico Computer security - Management
Data protection
ISBN 0-429-10792-7
1-283-35050-5
9786613350503
1-4398-5346-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: Whitelisting for Endpoint Defense; Chapter 2: Whitelisting; Chapter 3: RFID and Information Security; Chapter 4: Privileged User Management; Chapter 5: Privacy in the Age of Social Networking; Chapter 6: IF-MAP as a Standard for Security Data Interchange; Chapter 7: Understating the Ramifications of IPv6; Chapter 8: Managing Security in Virtual Environments; Chapter 9: Do Your Business Associate Security and Privacy Programs Live Up To HIPAA and HITECH Requirements?
Chapter 10: Organization Culture Awareness Will Cultivate Your Information Security ProgramChapter 11: Role-Based Information Security Governance: Avoiding the Company Oil Slick; Chapter 12: Social Networking Security Exposure; Chapter 13: Social Networking, Social Media, and Web 2.0 Security Risks; Chapter 14: Applying Adult Education Principles to Security Awareness Programs; Chapter 15: Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Access; Chapter 16: Governance and Risk Management within the Context of Information Security
Chapter 17: Improving Enterprise Security through Predictive AnalysisChapter 18: Security Outsourcing; Chapter 19: The Effectiveness of Access Management Reviews; Chapter 21: Attacking RFID Systems; Chapter 22: Cryptography: Mathematics vs. Engineering; Chapter 23: Cryptographic Message Syntax; Chapter 24: An Introduction to Virtualization Security; Chapter 25: Warfare and Security: Deterrence and Dissuasion in the Cyber Era; Chapter 26: Configuration, Change, and Release Management; Chapter 27: Tape Backup Considerations; Chapter 28: Productivity vs. Security
Chapter 29: Continuity Planning for Small- and Medium-Sized OrganizationsChapter 30: The Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industry; Chapter 31: Data Security and Privacy Legislation; Chapter 32: Discovery of Electronically Stored Information; Chapter 33: The Layered Defense Model and Perimeter Intrusion Detection; Information Security Management Handbook, Sixth Edition: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910825881503321
Boca Raton, : Auerbach Publications, c2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2007-
Descrizione fisica 1 online resource (495 p.)
Disciplina 658
658/.0558
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Collana Information security management handbook
Soggetto topico Computer security - Management
Data protection
Soggetto genere / forma Electronic books.
ISBN 0-429-11284-X
1-283-59665-2
9786613909107
1-4398-9315-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910461297403321
Boca Raton : , : Auerbach Publications, , 2007-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2007-2012
Descrizione fisica 1 online resource (544 p.)
Disciplina 005.8
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Soggetto topico Computer security - Management
Data protection
Soggetto genere / forma Electronic books.
ISBN 0-429-10792-7
1-283-35050-5
9786613350503
1-4398-5346-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: Whitelisting for Endpoint Defense; Chapter 2: Whitelisting; Chapter 3: RFID and Information Security; Chapter 4: Privileged User Management; Chapter 5: Privacy in the Age of Social Networking; Chapter 6: IF-MAP as a Standard for Security Data Interchange; Chapter 7: Understating the Ramifications of IPv6; Chapter 8: Managing Security in Virtual Environments; Chapter 9: Do Your Business Associate Security and Privacy Programs Live Up To HIPAA and HITECH Requirements?
Chapter 10: Organization Culture Awareness Will Cultivate Your Information Security ProgramChapter 11: Role-Based Information Security Governance: Avoiding the Company Oil Slick; Chapter 12: Social Networking Security Exposure; Chapter 13: Social Networking, Social Media, and Web 2.0 Security Risks; Chapter 14: Applying Adult Education Principles to Security Awareness Programs; Chapter 15: Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Access; Chapter 16: Governance and Risk Management within the Context of Information Security
Chapter 17: Improving Enterprise Security through Predictive AnalysisChapter 18: Security Outsourcing; Chapter 19: The Effectiveness of Access Management Reviews; Chapter 21: Attacking RFID Systems; Chapter 22: Cryptography: Mathematics vs. Engineering; Chapter 23: Cryptographic Message Syntax; Chapter 24: An Introduction to Virtualization Security; Chapter 25: Warfare and Security: Deterrence and Dissuasion in the Cyber Era; Chapter 26: Configuration, Change, and Release Management; Chapter 27: Tape Backup Considerations; Chapter 28: Productivity vs. Security
Chapter 29: Continuity Planning for Small- and Medium-Sized OrganizationsChapter 30: The Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industry; Chapter 31: Data Security and Privacy Legislation; Chapter 32: Discovery of Electronically Stored Information; Chapter 33: The Layered Defense Model and Perimeter Intrusion Detection; Information Security Management Handbook, Sixth Edition: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910457784403321
Boca Raton : , : Auerbach Publications, , 2007-2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2007-
Descrizione fisica 1 online resource (495 p.)
Disciplina 658
658/.0558
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Collana Information security management handbook
Soggetto topico Computer security - Management
Data protection
ISBN 0-429-11284-X
1-283-59665-2
9786613909107
1-4398-9315-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910790021503321
Boca Raton : , : Auerbach Publications, , 2007-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2007-2012
Descrizione fisica 1 online resource (544 p.)
Disciplina 005.8
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Soggetto topico Computer security - Management
Data protection
ISBN 0-429-10792-7
1-283-35050-5
9786613350503
1-4398-5346-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: Whitelisting for Endpoint Defense; Chapter 2: Whitelisting; Chapter 3: RFID and Information Security; Chapter 4: Privileged User Management; Chapter 5: Privacy in the Age of Social Networking; Chapter 6: IF-MAP as a Standard for Security Data Interchange; Chapter 7: Understating the Ramifications of IPv6; Chapter 8: Managing Security in Virtual Environments; Chapter 9: Do Your Business Associate Security and Privacy Programs Live Up To HIPAA and HITECH Requirements?
Chapter 10: Organization Culture Awareness Will Cultivate Your Information Security ProgramChapter 11: Role-Based Information Security Governance: Avoiding the Company Oil Slick; Chapter 12: Social Networking Security Exposure; Chapter 13: Social Networking, Social Media, and Web 2.0 Security Risks; Chapter 14: Applying Adult Education Principles to Security Awareness Programs; Chapter 15: Controlling the Emerging Data Dilemma: Building Policy for Unstructured Data Access; Chapter 16: Governance and Risk Management within the Context of Information Security
Chapter 17: Improving Enterprise Security through Predictive AnalysisChapter 18: Security Outsourcing; Chapter 19: The Effectiveness of Access Management Reviews; Chapter 21: Attacking RFID Systems; Chapter 22: Cryptography: Mathematics vs. Engineering; Chapter 23: Cryptographic Message Syntax; Chapter 24: An Introduction to Virtualization Security; Chapter 25: Warfare and Security: Deterrence and Dissuasion in the Cyber Era; Chapter 26: Configuration, Change, and Release Management; Chapter 27: Tape Backup Considerations; Chapter 28: Productivity vs. Security
Chapter 29: Continuity Planning for Small- and Medium-Sized OrganizationsChapter 30: The Cost of Risk: An Examination of Risk Assessment and Information Security in the Financial Industry; Chapter 31: Data Security and Privacy Legislation; Chapter 32: Discovery of Electronically Stored Information; Chapter 33: The Layered Defense Model and Perimeter Intrusion Detection; Information Security Management Handbook, Sixth Edition: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910781936803321
Boca Raton : , : Auerbach Publications, , 2007-2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki
Edizione [6th ed.]
Pubbl/distr/stampa Boca Raton : , : Auerbach Publications, , 2007-
Descrizione fisica 1 online resource (495 p.)
Disciplina 658
658/.0558
Altri autori (Persone) TiptonHarold F
NozakiMicki Krause
Collana Information security management handbook
Soggetto topico Computer security - Management
Data protection
ISBN 0-429-11284-X
1-283-59665-2
9786613909107
1-4398-9315-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications
Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19: Format Preserving Encryption
Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover
Record Nr. UNINA-9910813980803321
Boca Raton : , : Auerbach Publications, , 2007-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui