We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 101-120 of 10,000 results
  1. Complying with the PCI DSS Standard

    It is hard to be in business without making money, so one of the first standards that must be adhered to internationally, is the Payment Card...
    Chapter 2024
  2. Designing Information Security

    Criminals and spies concentrate on stealing, modifying or destroying financial account information, trade secrets, and internal organization data....
    Chapter 2024
  3. Managing Risk

    The field of security – and American regulation – realizes that not all organizations need the same level or type of security. Banks need more...
    Chapter 2024
  4. Designing Physical Security

    Physical security may be overlooked because it is not as complex or interesting as technology security. Assets are things of value, and may include...
    Chapter 2024
  5. Preparing for Forensic Analysis

    This chapter is intimately linked with Incident Response. First you respond to an incident to contain it, then you must analyze it. It is important...
    Chapter 2024
  6. Complying with U.S. Security Regulations

    What security regulation(s) must your organization adhere to? What must you implement as part of that regulation? How important is it to adhere to...
    Chapter 2024
  7. Complying with HIPAA and HITECH

    The Health Insurance Portability & Accountability Act (HIPAA) of 1996 was a bipartisan bill implemented as part of United States law. HIPAA addressed...
    Chapter 2024
  8. Complying with the European Union General Data Protection Regulation (GDPR)

    Europe has a common overarching regulation that focuses on data privacy and is exemplary in the rights it affords its constituents. This chapter...
    Chapter 2024
  9. Maturing Ethical Risk

    The pervasive and accepted thought when dealing with cybersecurity is to evaluate risk from the organization’s perspective: the organization protects...
    Chapter 2024
  10. Planning for Network Security

    The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability, while a security...
    Chapter 2024
  11. Security Awareness: Brave New World

    Computer security is a challenge. An attacker only needs to find one hole…but a defender needs to close all holes. Since it is impossible to close...
    Chapter 2024
  12. Planning for Secure Software Requirements and Design with UML

    It is not possible to build an excellent software product quickly without understanding the requirements. It is known in the security world (and...
    Chapter 2024
  13. Meaning and Purpose as a Management and Control Instrument

    What is the top priority for the successful management of an IT organization? The CIO must be able to convey meaning and purpose. A goal and a clear...
    Volker Johanning in Organization and Management of IT
    Chapter 2024
  14. IT Management by Objectives: OKRs Instead of Management by Objectives (MbO)

    In the past, management by objective (MbO) – i.e., leading by setting clear objectives and controlling the objectives – was modern management. This...
    Volker Johanning in Organization and Management of IT
    Chapter 2024
  15. Leadership Principles for CIOs and IT Managers

    Four factors form the foundation of successful management of an IT organization. These include a focus on results, knowledge of the special...
    Volker Johanning in Organization and Management of IT
    Chapter 2024
  16. HCI for Cybersecurity, Privacy and Trust 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings, Part II

    This proceedings, HCI-CPT 2024, constitutes the refereed proceedings of the 6th International Conference on Cybersecurity, Privacy and Trust, held as...

    Conference proceedings 2024
  17. Critical Infrastructure Protection XVII 17th IFIP WG 11.10 International Conference, ICCIP 2023, Arlington, VA, USA, March 13–14, 2023, Revised Selected Papers

    The information infrastructure – comprising computers, embedded devices, networks and software systems – is vital to operations in every sector:...

    Conference proceedings 2024
  18. Organization and Management of IT The New Role of IT and the CIO in Digital Transformation

    This book takes a practical look at how IT organizations need to position themselves optimally in this dynamically changing world and what this means...

    Volker Johanning
    Book 2024
  19. Ethical and Legal Aspects of Computing A Professional Perspective from Software Engineering

    This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional...

    Textbook 2024
  20. Ethical Challenges of Artificial Intelligence in Medicine and the Triple Semantic Dimensions of Algorithmic Opacity with Its Repercussions to Patient Consent and Medical Liability

    Artificial intelligence algorithms have the potential to diagnose some types of skin cancer or to identify specific heart-rhythm abnormalities as...
    Rafaella Nogaroli, José Luiz de Moura Faleiros Júnior in Multidisciplinary Perspectives on Artificial Intelligence and the Law
    Chapter Open access 2024
Did you find what you were looking for? Share feedback.