Information Security Management Principles [[electronic resource] ] : An ISEB Certificate
| Information Security Management Principles [[electronic resource] ] : An ISEB Certificate |
| Autore | Taylor Andy |
| Pubbl/distr/stampa | Swindon, : British Computer Society, 2008 |
| Descrizione fisica | 1 online resource (216 p.) |
| Disciplina |
005.8
005.8068 |
| Altri autori (Persone) |
AlexanderDavid
FinchAmanda SuttonDavid TaylorAndy |
| Soggetto topico |
Computer networks -- Security measures
Computer security -- Management Computer viruses Engineering & Applied Sciences Computer Science |
| ISBN | 1-906124-39-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover |
| Record Nr. | UNISA-996339087303316 |
Taylor Andy
|
||
| Swindon, : British Computer Society, 2008 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Security Management Principles : An ISEB Certificate
| Information Security Management Principles : An ISEB Certificate |
| Autore | Taylor Andy |
| Pubbl/distr/stampa | Swindon, : British Computer Society, 2008 |
| Descrizione fisica | 1 online resource (216 p.) |
| Disciplina |
005.8
005.8068 |
| Altri autori (Persone) |
AlexanderDavid (Information security practitioner)
FinchAmanda SuttonDavid TaylorAndy |
| Soggetto topico |
Computer networks -- Security measures
Computer security -- Management Computer viruses Engineering & Applied Sciences Computer Science |
| ISBN | 1-906124-39-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover |
| Record Nr. | UNINA-9910139870803321 |
Taylor Andy
|
||
| Swindon, : British Computer Society, 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
| Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world |
| Autore | Simmons Andrea |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Ely, : IT Governance Ltd, 2015 |
| Descrizione fisica | 1 online resource (273 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures Computer networks -- Security measures Computer security -- Management Data protection Information technology -- Security measures Commerce Business & Economics Marketing & Sales |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-84928-710-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary |
| Record Nr. | UNINA-9910460203303321 |
Simmons Andrea
|
||
| Ely, : IT Governance Ltd, 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
| Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world |
| Autore | Simmons Andrea |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Ely, : IT Governance Ltd, 2015 |
| Descrizione fisica | 1 online resource (273 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures Computer networks -- Security measures Computer security -- Management Data protection Information technology -- Security measures Commerce Business & Economics Marketing & Sales |
| ISBN | 1-84928-710-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary |
| Record Nr. | UNINA-9910787343203321 |
Simmons Andrea
|
||
| Ely, : IT Governance Ltd, 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
SQL Server Analysis Services 2012 Cube Development Cookbook [[electronic resource]]
| SQL Server Analysis Services 2012 Cube Development Cookbook [[electronic resource]] |
| Autore | Dewald Baya |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham, : Packt Publishing, 2013 |
| Descrizione fisica | 1 online resource (340 p.) |
| Disciplina |
005.75
005.7585 |
| Altri autori (Persone) |
TurleyPaul
HughesSteve |
| Collana | Quick answers to common problems |
| Soggetto topico |
Client/server computing
Computer networks -- Security measures SQL server Web servers Engineering & Applied Sciences Computer Science |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-84968-981-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Multidimensional Data Model Design; Introduction; The business value of Business Intelligence; Challenges and barriers of effective BI; Overcoming BI challenges and barriers; Choosing multidimensional or Tabular models; Star- or Snowflake-relational schema; A sample scenario for choosing the Snowflake schema; Chapter 2: Defining Analysis Services Dimensions; Introduction; Defining data sources; Defining data source views
Defining entity relationships in DSVExtending data source views; Creating named calculations and queries; Creating simple dimensions; Building dimension hierarchies; Setting essential attribute properties; Browsing dimension data; Sorting the attributes; Customizing advanced attribute properties; Creating parent-child dimensions; Creating the date and time dimensions; Chapter 3: Creating Analysis Services Cubes; Introduction; Defining measure groups and measures; Setting measure properties; Browsing the cube data; Dimension usage with measure group; Examining cube file structures Partitioning strategiesDefining partition slice; Merging partitions; Defining aggregation designs; Distinct count measure groups; Enabling write-back feature; Deployment options; Chapter 4: Extending and Customizing Cubes; Introduction; Defining calculated measures; Defining named sets; Defining drillthrough actions; Defining URL actions; Defining reporting actions; Defining key performance indicators; Defining perspectives; Defining translations; Defining measure expressions; Chapter 5: Optimizing Dimension and Cube Processing; Introduction; Understanding dimension processing options Learning about basic dimension processingLearning advanced dimension processing options; Using out-of-line bindings for dimension processing; Dealing with partition processing options; Using SQL Server Integration Services to process Analysis Services objects; Monitoring and tuning processing performance; Chapter 6: MDX; Introduction; Returning data on the query axes; Limiting the query output; Sorting the query output; Defining query level calculations and named sets; Navigating dimension hierarchies; Working with the Time dimensions; MDX script's functionality Monitoring and tuning MDX queriesChapter 7: Analysis Services Security; Introduction; Managing instance-level administrative security; Managing database-level security; Managing cube-level security; Managing dimension hierarchy-level security; Implementing dynamic dimension security; Implementing cell-level security; Chapter 8: Administering and Monitoring Analysis Services; Introduction; SSAS instance configuration options; Creating and dropping databases; Monitoring SSAS instance using Activity Viewer; Monitoring SSAS instance using DMVs; Cancelling a session Checking whether cubes are accessible |
| Record Nr. | UNINA-9910453416803321 |
Dewald Baya
|
||
| Birmingham, : Packt Publishing, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
SQL Server Analysis Services 2012 Cube Development Cookbook [[electronic resource]]
| SQL Server Analysis Services 2012 Cube Development Cookbook [[electronic resource]] |
| Autore | Dewald Baya |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham, : Packt Publishing, 2013 |
| Descrizione fisica | 1 online resource (340 p.) |
| Disciplina |
005.75
005.7585 |
| Altri autori (Persone) |
TurleyPaul
HughesSteve |
| Collana | Quick answers to common problems |
| Soggetto topico |
Client/server computing
Computer networks -- Security measures SQL server Web servers Engineering & Applied Sciences Computer Science |
| ISBN | 1-84968-981-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Multidimensional Data Model Design; Introduction; The business value of Business Intelligence; Challenges and barriers of effective BI; Overcoming BI challenges and barriers; Choosing multidimensional or Tabular models; Star- or Snowflake-relational schema; A sample scenario for choosing the Snowflake schema; Chapter 2: Defining Analysis Services Dimensions; Introduction; Defining data sources; Defining data source views
Defining entity relationships in DSVExtending data source views; Creating named calculations and queries; Creating simple dimensions; Building dimension hierarchies; Setting essential attribute properties; Browsing dimension data; Sorting the attributes; Customizing advanced attribute properties; Creating parent-child dimensions; Creating the date and time dimensions; Chapter 3: Creating Analysis Services Cubes; Introduction; Defining measure groups and measures; Setting measure properties; Browsing the cube data; Dimension usage with measure group; Examining cube file structures Partitioning strategiesDefining partition slice; Merging partitions; Defining aggregation designs; Distinct count measure groups; Enabling write-back feature; Deployment options; Chapter 4: Extending and Customizing Cubes; Introduction; Defining calculated measures; Defining named sets; Defining drillthrough actions; Defining URL actions; Defining reporting actions; Defining key performance indicators; Defining perspectives; Defining translations; Defining measure expressions; Chapter 5: Optimizing Dimension and Cube Processing; Introduction; Understanding dimension processing options Learning about basic dimension processingLearning advanced dimension processing options; Using out-of-line bindings for dimension processing; Dealing with partition processing options; Using SQL Server Integration Services to process Analysis Services objects; Monitoring and tuning processing performance; Chapter 6: MDX; Introduction; Returning data on the query axes; Limiting the query output; Sorting the query output; Defining query level calculations and named sets; Navigating dimension hierarchies; Working with the Time dimensions; MDX script's functionality Monitoring and tuning MDX queriesChapter 7: Analysis Services Security; Introduction; Managing instance-level administrative security; Managing database-level security; Managing cube-level security; Managing dimension hierarchy-level security; Implementing dynamic dimension security; Implementing cell-level security; Chapter 8: Administering and Monitoring Analysis Services; Introduction; SSAS instance configuration options; Creating and dropping databases; Monitoring SSAS instance using Activity Viewer; Monitoring SSAS instance using DMVs; Cancelling a session Checking whether cubes are accessible |
| Record Nr. | UNINA-9910790721203321 |
Dewald Baya
|
||
| Birmingham, : Packt Publishing, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
SQL Server Analysis Services 2012 Cube Development Cookbook
| SQL Server Analysis Services 2012 Cube Development Cookbook |
| Autore | Dewald Baya |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham, : Packt Publishing, 2013 |
| Descrizione fisica | 1 online resource (340 p.) |
| Disciplina |
005.75
005.7585 |
| Altri autori (Persone) |
TurleyPaul
HughesSteve |
| Collana | Quick answers to common problems |
| Soggetto topico |
Client/server computing
Computer networks -- Security measures SQL server Web servers Engineering & Applied Sciences Computer Science |
| ISBN |
9781849689816
1849689814 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Multidimensional Data Model Design; Introduction; The business value of Business Intelligence; Challenges and barriers of effective BI; Overcoming BI challenges and barriers; Choosing multidimensional or Tabular models; Star- or Snowflake-relational schema; A sample scenario for choosing the Snowflake schema; Chapter 2: Defining Analysis Services Dimensions; Introduction; Defining data sources; Defining data source views
Defining entity relationships in DSVExtending data source views; Creating named calculations and queries; Creating simple dimensions; Building dimension hierarchies; Setting essential attribute properties; Browsing dimension data; Sorting the attributes; Customizing advanced attribute properties; Creating parent-child dimensions; Creating the date and time dimensions; Chapter 3: Creating Analysis Services Cubes; Introduction; Defining measure groups and measures; Setting measure properties; Browsing the cube data; Dimension usage with measure group; Examining cube file structures Partitioning strategiesDefining partition slice; Merging partitions; Defining aggregation designs; Distinct count measure groups; Enabling write-back feature; Deployment options; Chapter 4: Extending and Customizing Cubes; Introduction; Defining calculated measures; Defining named sets; Defining drillthrough actions; Defining URL actions; Defining reporting actions; Defining key performance indicators; Defining perspectives; Defining translations; Defining measure expressions; Chapter 5: Optimizing Dimension and Cube Processing; Introduction; Understanding dimension processing options Learning about basic dimension processingLearning advanced dimension processing options; Using out-of-line bindings for dimension processing; Dealing with partition processing options; Using SQL Server Integration Services to process Analysis Services objects; Monitoring and tuning processing performance; Chapter 6: MDX; Introduction; Returning data on the query axes; Limiting the query output; Sorting the query output; Defining query level calculations and named sets; Navigating dimension hierarchies; Working with the Time dimensions; MDX script's functionality Monitoring and tuning MDX queriesChapter 7: Analysis Services Security; Introduction; Managing instance-level administrative security; Managing database-level security; Managing cube-level security; Managing dimension hierarchy-level security; Implementing dynamic dimension security; Implementing cell-level security; Chapter 8: Administering and Monitoring Analysis Services; Introduction; SSAS instance configuration options; Creating and dropping databases; Monitoring SSAS instance using Activity Viewer; Monitoring SSAS instance using DMVs; Cancelling a session Checking whether cubes are accessible |
| Record Nr. | UNINA-9910964981303321 |
Dewald Baya
|
||
| Birmingham, : Packt Publishing, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||