top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Management Principles [[electronic resource] ] : An ISEB Certificate
Information Security Management Principles [[electronic resource] ] : An ISEB Certificate
Autore Taylor Andy
Pubbl/distr/stampa Swindon, : British Computer Society, 2008
Descrizione fisica 1 online resource (216 p.)
Disciplina 005.8
005.8068
Altri autori (Persone) AlexanderDavid
FinchAmanda
SuttonDavid
TaylorAndy
Soggetto topico Computer networks -- Security measures
Computer security -- Management
Computer viruses
Engineering & Applied Sciences
Computer Science
ISBN 1-906124-39-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover
Record Nr. UNISA-996339087303316
Taylor Andy  
Swindon, : British Computer Society, 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Management Principles : An ISEB Certificate
Information Security Management Principles : An ISEB Certificate
Autore Taylor Andy
Pubbl/distr/stampa Swindon, : British Computer Society, 2008
Descrizione fisica 1 online resource (216 p.)
Disciplina 005.8
005.8068
Altri autori (Persone) AlexanderDavid (Information security practitioner)
FinchAmanda
SuttonDavid
TaylorAndy
Soggetto topico Computer networks -- Security measures
Computer security -- Management
Computer viruses
Engineering & Applied Sciences
Computer Science
ISBN 1-906124-39-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Copyright; Contents; List of Figures and Tables; Authors; Acknowledgements; Abbreviations; Preface; 1 Information Security Principles; 2 Information Risk; 3 Information Security Framework; 4 Information Security Controls; Index; Back Cover
Record Nr. UNINA-9910139870803321
Taylor Andy  
Swindon, : British Computer Society, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Autore Simmons Andrea
Edizione [2nd ed.]
Pubbl/distr/stampa Ely, : IT Governance Ltd, 2015
Descrizione fisica 1 online resource (273 p.)
Disciplina 005.8
Soggetto topico Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures
Computer networks -- Security measures
Computer security -- Management
Data protection
Information technology -- Security measures
Commerce
Business & Economics
Marketing & Sales
Soggetto genere / forma Electronic books.
ISBN 1-84928-710-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings
Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy
Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary
Record Nr. UNINA-9910460203303321
Simmons Andrea  
Ely, : IT Governance Ltd, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Once more unto the Breach [[electronic resource] ] : Managing information security in an uncertain world
Autore Simmons Andrea
Edizione [2nd ed.]
Pubbl/distr/stampa Ely, : IT Governance Ltd, 2015
Descrizione fisica 1 online resource (273 p.)
Disciplina 005.8
Soggetto topico Business enterprises -- Computer networks -- Security measures
Business enterprises -- Information technology -- Security measures
Computer networks -- Security measures
Computer security -- Management
Data protection
Information technology -- Security measures
Commerce
Business & Economics
Marketing & Sales
ISBN 1-84928-710-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Once more unto the Breach; Title Page; Copy Page; Preface; About The Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Physical security; Password management; Laptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction
Information security policyManaging corporate antivirus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud computing; Project management; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Chapter summary; Chapter 5: December: Oh, for the sake of yet another proposal; Security improvement programme; Fax management; Image build again; Physical security findings
Physical security solution suggestionsOther security tasks for this month; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management; Penetration testing results; Back to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy
Other security tasks for this monthChapter summary; Chapter 8: March: Slipping through the net; The impact of politics; Privacy impact assessments; Managing a virus outbreak; Other information security tasks this month; Chapter summary; Chapter 9: April: Linking InfoSec with InfoGov; A linguistic journey to information governance; How did we get here?; Other security tasks for this month; Chapter summary; Chapter 10: May: Politics and management; Situational political awareness; Language and management challenges; Other security tasks for this month; Chapter summary
Record Nr. UNINA-9910787343203321
Simmons Andrea  
Ely, : IT Governance Ltd, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
SQL Server Analysis Services 2012 Cube Development Cookbook [[electronic resource]]
SQL Server Analysis Services 2012 Cube Development Cookbook [[electronic resource]]
Autore Dewald Baya
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, : Packt Publishing, 2013
Descrizione fisica 1 online resource (340 p.)
Disciplina 005.75
005.7585
Altri autori (Persone) TurleyPaul
HughesSteve
Collana Quick answers to common problems
Soggetto topico Client/server computing
Computer networks -- Security measures
SQL server
Web servers
Engineering & Applied Sciences
Computer Science
Soggetto genere / forma Electronic books.
ISBN 1-84968-981-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Multidimensional Data Model Design; Introduction; The business value of Business Intelligence; Challenges and barriers of effective BI; Overcoming BI challenges and barriers; Choosing multidimensional or Tabular models; Star- or Snowflake-relational schema; A sample scenario for choosing the Snowflake schema; Chapter 2: Defining Analysis Services Dimensions; Introduction; Defining data sources; Defining data source views
Defining entity relationships in DSVExtending data source views; Creating named calculations and queries; Creating simple dimensions; Building dimension hierarchies; Setting essential attribute properties; Browsing dimension data; Sorting the attributes; Customizing advanced attribute properties; Creating parent-child dimensions; Creating the date and time dimensions; Chapter 3: Creating Analysis Services Cubes; Introduction; Defining measure groups and measures; Setting measure properties; Browsing the cube data; Dimension usage with measure group; Examining cube file structures
Partitioning strategiesDefining partition slice; Merging partitions; Defining aggregation designs; Distinct count measure groups; Enabling write-back feature; Deployment options; Chapter 4: Extending and Customizing Cubes; Introduction; Defining calculated measures; Defining named sets; Defining drillthrough actions; Defining URL actions; Defining reporting actions; Defining key performance indicators; Defining perspectives; Defining translations; Defining measure expressions; Chapter 5: Optimizing Dimension and Cube Processing; Introduction; Understanding dimension processing options
Learning about basic dimension processingLearning advanced dimension processing options; Using out-of-line bindings for dimension processing; Dealing with partition processing options; Using SQL Server Integration Services to process Analysis Services objects; Monitoring and tuning processing performance; Chapter 6: MDX; Introduction; Returning data on the query axes; Limiting the query output; Sorting the query output; Defining query level calculations and named sets; Navigating dimension hierarchies; Working with the Time dimensions; MDX script's functionality
Monitoring and tuning MDX queriesChapter 7: Analysis Services Security; Introduction; Managing instance-level administrative security; Managing database-level security; Managing cube-level security; Managing dimension hierarchy-level security; Implementing dynamic dimension security; Implementing cell-level security; Chapter 8: Administering and Monitoring Analysis Services; Introduction; SSAS instance configuration options; Creating and dropping databases; Monitoring SSAS instance using Activity Viewer; Monitoring SSAS instance using DMVs; Cancelling a session
Checking whether cubes are accessible
Record Nr. UNINA-9910453416803321
Dewald Baya  
Birmingham, : Packt Publishing, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
SQL Server Analysis Services 2012 Cube Development Cookbook [[electronic resource]]
SQL Server Analysis Services 2012 Cube Development Cookbook [[electronic resource]]
Autore Dewald Baya
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, : Packt Publishing, 2013
Descrizione fisica 1 online resource (340 p.)
Disciplina 005.75
005.7585
Altri autori (Persone) TurleyPaul
HughesSteve
Collana Quick answers to common problems
Soggetto topico Client/server computing
Computer networks -- Security measures
SQL server
Web servers
Engineering & Applied Sciences
Computer Science
ISBN 1-84968-981-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Multidimensional Data Model Design; Introduction; The business value of Business Intelligence; Challenges and barriers of effective BI; Overcoming BI challenges and barriers; Choosing multidimensional or Tabular models; Star- or Snowflake-relational schema; A sample scenario for choosing the Snowflake schema; Chapter 2: Defining Analysis Services Dimensions; Introduction; Defining data sources; Defining data source views
Defining entity relationships in DSVExtending data source views; Creating named calculations and queries; Creating simple dimensions; Building dimension hierarchies; Setting essential attribute properties; Browsing dimension data; Sorting the attributes; Customizing advanced attribute properties; Creating parent-child dimensions; Creating the date and time dimensions; Chapter 3: Creating Analysis Services Cubes; Introduction; Defining measure groups and measures; Setting measure properties; Browsing the cube data; Dimension usage with measure group; Examining cube file structures
Partitioning strategiesDefining partition slice; Merging partitions; Defining aggregation designs; Distinct count measure groups; Enabling write-back feature; Deployment options; Chapter 4: Extending and Customizing Cubes; Introduction; Defining calculated measures; Defining named sets; Defining drillthrough actions; Defining URL actions; Defining reporting actions; Defining key performance indicators; Defining perspectives; Defining translations; Defining measure expressions; Chapter 5: Optimizing Dimension and Cube Processing; Introduction; Understanding dimension processing options
Learning about basic dimension processingLearning advanced dimension processing options; Using out-of-line bindings for dimension processing; Dealing with partition processing options; Using SQL Server Integration Services to process Analysis Services objects; Monitoring and tuning processing performance; Chapter 6: MDX; Introduction; Returning data on the query axes; Limiting the query output; Sorting the query output; Defining query level calculations and named sets; Navigating dimension hierarchies; Working with the Time dimensions; MDX script's functionality
Monitoring and tuning MDX queriesChapter 7: Analysis Services Security; Introduction; Managing instance-level administrative security; Managing database-level security; Managing cube-level security; Managing dimension hierarchy-level security; Implementing dynamic dimension security; Implementing cell-level security; Chapter 8: Administering and Monitoring Analysis Services; Introduction; SSAS instance configuration options; Creating and dropping databases; Monitoring SSAS instance using Activity Viewer; Monitoring SSAS instance using DMVs; Cancelling a session
Checking whether cubes are accessible
Record Nr. UNINA-9910790721203321
Dewald Baya  
Birmingham, : Packt Publishing, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
SQL Server Analysis Services 2012 Cube Development Cookbook
SQL Server Analysis Services 2012 Cube Development Cookbook
Autore Dewald Baya
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, : Packt Publishing, 2013
Descrizione fisica 1 online resource (340 p.)
Disciplina 005.75
005.7585
Altri autori (Persone) TurleyPaul
HughesSteve
Collana Quick answers to common problems
Soggetto topico Client/server computing
Computer networks -- Security measures
SQL server
Web servers
Engineering & Applied Sciences
Computer Science
ISBN 9781849689816
1849689814
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to Multidimensional Data Model Design; Introduction; The business value of Business Intelligence; Challenges and barriers of effective BI; Overcoming BI challenges and barriers; Choosing multidimensional or Tabular models; Star- or Snowflake-relational schema; A sample scenario for choosing the Snowflake schema; Chapter 2: Defining Analysis Services Dimensions; Introduction; Defining data sources; Defining data source views
Defining entity relationships in DSVExtending data source views; Creating named calculations and queries; Creating simple dimensions; Building dimension hierarchies; Setting essential attribute properties; Browsing dimension data; Sorting the attributes; Customizing advanced attribute properties; Creating parent-child dimensions; Creating the date and time dimensions; Chapter 3: Creating Analysis Services Cubes; Introduction; Defining measure groups and measures; Setting measure properties; Browsing the cube data; Dimension usage with measure group; Examining cube file structures
Partitioning strategiesDefining partition slice; Merging partitions; Defining aggregation designs; Distinct count measure groups; Enabling write-back feature; Deployment options; Chapter 4: Extending and Customizing Cubes; Introduction; Defining calculated measures; Defining named sets; Defining drillthrough actions; Defining URL actions; Defining reporting actions; Defining key performance indicators; Defining perspectives; Defining translations; Defining measure expressions; Chapter 5: Optimizing Dimension and Cube Processing; Introduction; Understanding dimension processing options
Learning about basic dimension processingLearning advanced dimension processing options; Using out-of-line bindings for dimension processing; Dealing with partition processing options; Using SQL Server Integration Services to process Analysis Services objects; Monitoring and tuning processing performance; Chapter 6: MDX; Introduction; Returning data on the query axes; Limiting the query output; Sorting the query output; Defining query level calculations and named sets; Navigating dimension hierarchies; Working with the Time dimensions; MDX script's functionality
Monitoring and tuning MDX queriesChapter 7: Analysis Services Security; Introduction; Managing instance-level administrative security; Managing database-level security; Managing cube-level security; Managing dimension hierarchy-level security; Implementing dynamic dimension security; Implementing cell-level security; Chapter 8: Administering and Monitoring Analysis Services; Introduction; SSAS instance configuration options; Creating and dropping databases; Monitoring SSAS instance using Activity Viewer; Monitoring SSAS instance using DMVs; Cancelling a session
Checking whether cubes are accessible
Record Nr. UNINA-9910964981303321
Dewald Baya  
Birmingham, : Packt Publishing, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui