Verlag: GRIN Verlag, GRIN Verlag Sep 2019, 2019
ISBN 10: 3668911754 ISBN 13: 9783668911758
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware Books on Demand GmbH, Überseering 33, 22297 Hamburg 28 pp. Englisch.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering.
Verlag: GRIN Verlag, GRIN Verlag Jul 2019, 2019
ISBN 10: 3668969590 ISBN 13: 9783668969599
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Essay from the year 2017 in the subject Computer Science - Applied, grade: A, Anglia Ruskin University, language: English, abstract: Information technology project management is different from normal project management due to the possible complexity it could be. It could vary from designing the infrastructure of a new building to developing a simple application. Its complexity comes from the fact that many teams can be involved (e.g. network team, software team, technical support, vendors, finance, etc.). In addition, the dynamic nature of the IT projects requires the project manager to be more agile to challenges that might come. In this article, we will have a situation from real life on how IT project manager will organize his project in all its stages, from project initiation to project close. It will show samples of reports that should be generated periodically to track the project execution.Books on Demand GmbH, Überseering 33, 22297 Hamburg 28 pp. Englisch.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Essay from the year 2017 in the subject Computer Science - Applied, grade: A, Anglia Ruskin University, language: English, abstract: Information technology project management is different from normal project management due to the possible complexity it could be. It could vary from designing the infrastructure of a new building to developing a simple application. Its complexity comes from the fact that many teams can be involved (e.g. network team, software team, technical support, vendors, finance, etc.). In addition, the dynamic nature of the IT projects requires the project manager to be more agile to challenges that might come. In this article, we will have a situation from real life on how IT project manager will organize his project in all its stages, from project initiation to project close. It will show samples of reports that should be generated periodically to track the project execution.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Scientific Essay from the year 2022 in the subject Computer Science - IT-Security, grade: 75%, , language: English, abstract: This report will select one of the obsolete cryptographic algorithms, analyse it, discuss one of its vulnerabilities, and suggest a modern algorithm to address this weakness.The business Management system (BMS) is a powerful management tool that helps an organisation¿s management build, create, control, and monitor business activities. Currently, it evolved and has become the backbone of strategic planning and everyday business operations. BMS has the technical infrastructure, such as access control, to protect information from unauthorised access. Still, it can not be used alone to preserve the confidentiality and integrity of information handled against different challenges such as secure system development and maintenance, operation and physical security and compliance with regulations. Cryptography plays an essential role in protecting datäs confidentiality and integrity, which might be hosted within the companies¿ premises or outsourced to a cloud service. Furthermore, cryptography protect information processed and transmitted within a communication medium. BMS incorporates many algorithms that serve this purpose; however, some of them are legacy or obsolete, such as RC2, RC4, DES, 3DES, MD2, MD4, MD5, SHA-1, and no longer recommended to be used because they are proved to be vulnerable.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Project Report from the year 2021 in the subject Business economics - Offline Marketing and Online Marketing, grade: 75, , language: English, abstract: In this study, a situational factors analysis relates to the retail business of grooming products is conducted to clarify the customer, organisational, market and product (COMP) situational factors for Shaver Shop to assess its ability to satisfy customer needs.First, the study will explore Shaver Shop's current customers, organisation, market, and product characteristics. Then, a summary of strengths, weaknesses, opportunities and threats are summarised in a SWOT matrix.Shaver Shop is a specialised retailer for grooming products; it has many points of strength, such as excellent customer service, well-trained staff and the exclusiveness of some products. The company also has weaknesses, such as basic websites, the absence of a mobile application, poor logistics and delivery system and customer membership. However, it has opportunities if it successfully leverages the DIY trend, artificial intelligence and the overall economic recovery.Books on Demand GmbH, Überseering 33, 22297 Hamburg 20 pp. Englisch.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Project Report from the year 2021 in the subject Business economics - Offline Marketing and Online Marketing, grade: 75, , language: English, abstract: In this study, a situational factors analysis relates to the retail business of grooming products is conducted to clarify the customer, organisational, market and product (COMP) situational factors for Shaver Shop to assess its ability to satisfy customer needs.First, the study will explore Shaver Shop's current customers, organisation, market, and product characteristics. Then, a summary of strengths, weaknesses, opportunities and threats are summarised in a SWOT matrix.Shaver Shop is a specialised retailer for grooming products; it has many points of strength, such as excellent customer service, well-trained staff and the exclusiveness of some products. The company also has weaknesses, such as basic websites, the absence of a mobile application, poor logistics and delivery system and customer membership. However, it has opportunities if it successfully leverages the DIY trend, artificial intelligence and the overall economic recovery.
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Document from the year 2017 in the subject Computer Science - Internet, New Technologies, grade: B, Anglia Ruskin University, language: English, abstract: Ransomware is a dangerous malware which causes high financial loses for organizations. It is usually installed using a type of privilage esclation attack and then it encrypts data, asking for a ransom. In this paper, we will analyze ransomware life cycle and answer the question how to arrange your information security defences to combat ransomware outbreak.Information is an important asset for individuals, organisations, and governments. Stealing confidential information such as credit card numbers or Intellectual properties can cause financial loss or reputation damage. For example, Organisations invest in research creating intellectual property to secure their future earnings and pursue innovation. Because of that, Rao & Nayak (2014) state that intellectual property is valuable assets that need to be protected from theft or unauthorised access as it will cost mainly a severe financial loss. Chai, et al. (2016) state that individuals might be subjected to electronic bullying and harassments through internet social media like Facebook and Twitter. Most of the cases, protecting customer's information is protected by law which means that the theft of customer's sensitive information such as personal identifiable information (PII) and protected health information (PHI) will cause organisations to pay fines that consider also as a financial loss and reputation damage. In Healthcare industry, unauthorised modification on medical records can cause human life losses.Hammondl (2013) states that effective information security addresses the security triad (Confidentiality, Integrity & Availability). Confidentiality grantees that sensitive information (e.g. PHI, PII, Credit card, etc.) accessed by those who have the authority to access them. On the other hand, Integrity is making sure that data is protected against unauthorised malicious or non-intention modifications (Hammondl, 2013). Finally, availability grantees that information is available for the right person when it's needed and access granted.BBC (2017) reported in 12th of May an example that shows how important information security is to our life. Information security was violated by a massive cyber-attack hit NHS services across England and Scotland resulting hospital operation disruption and GP appointments that make staff uses pen and papers.
Taschenbuch. Zustand: Neu. Cloud computing. A security analysis | Haitham Ismail | Taschenbuch | 28 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668911758 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Taschenbuch. Zustand: Neu. Managing Projects in Information Technology | Haitham Ismail | Taschenbuch | 28 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668969599 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Taschenbuch. Zustand: Neu. Ransomware life cycle and how to combat it | Haitham Ismail | Taschenbuch | 24 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668888555 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Verlag: GRIN Verlag, GRIN Verlag Mai 2019, 2019
ISBN 10: 3668890250 ISBN 13: 9783668890251
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Master's Thesis from the year 2018 in the subject Computer Science - IT-Security, grade: B, Anglia Ruskin University, course: Dissertation, language: English, abstract: Information Security is very important for businesses and national security of any country. In the Middle East, especially with the current geopolitical tensions and unbalanced situation resulting from terrorism rising, cybersecurity is very important to protect the nation¿s economy and security.This research investigates with a deep look inside hybrid cloud security deployments, which is new to the Middle East region with focusing on Infrastructure as service security (IaaS). Furthermore, it assesses the current practice when it comes to cloud data adoption in an IaaS environment, whether it is on-premises or hosted by a third party, dedicated or shared across multitenant.This research aims to develop two templates to be followed by IT professionals whether they have the required expertise for cloud adoption or not to guide them through the whole data cloud adoption process. According to the risk appetite of the organization and their acceptable risk level, the template is chosen.These templates contain a guide to design the cloud security infrastructures, the placement of information in different IaaS deployment models (e.g. private IaaS, public IaaS, community IaaS, etc.), and what controls recommended to establish controls and governance in the cloud realm. These templates were developed based on the recommendation and guidelines National Institute of Standards and Technology (NIST), Cloud Security Alliance (CSA), and European Union Agency for Network and Information Security (ENISA).Books on Demand GmbH, Überseering 33, 22297 Hamburg 96 pp. Englisch.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2018 in the subject Computer Science - IT-Security, grade: B, Anglia Ruskin University, course: Dissertation, language: English, abstract: Information Security is very important for businesses and national security of any country. In the Middle East, especially with the current geopolitical tensions and unbalanced situation resulting from terrorism rising, cybersecurity is very important to protect the nation's economy and security.This research investigates with a deep look inside hybrid cloud security deployments, which is new to the Middle East region with focusing on Infrastructure as service security (IaaS). Furthermore, it assesses the current practice when it comes to cloud data adoption in an IaaS environment, whether it is on-premises or hosted by a third party, dedicated or shared across multitenant.This research aims to develop two templates to be followed by IT professionals whether they have the required expertise for cloud adoption or not to guide them through the whole data cloud adoption process. According to the risk appetite of the organization and their acceptable risk level, the template is chosen.These templates contain a guide to design the cloud security infrastructures, the placement of information in different IaaS deployment models (e.g. private IaaS, public IaaS, community IaaS, etc.), and what controls recommended to establish controls and governance in the cloud realm. These templates were developed based on the recommendation and guidelines National Institute of Standards and Technology (NIST), Cloud Security Alliance (CSA), and European Union Agency for Network and Information Security (ENISA).
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. How to utilize the IaaS cloud safely? Developing cloud security for cloud adoption in the Middle East | Haitham Ismail | Taschenbuch | 96 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668890251 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.