By Kai Pohl
In dieser Ausarbeitung sollen Handlungsoptionen für eine Umsetzung einer IT-Richtlinie aufgezeigt werden. Dabei geht es darum, dem Leser einen Überblick über verwendbare criteria, Maßnahmenkataloge und Zertifizierungen zu bieten. Diese Informationen können bei der Entwicklung eines IT-Sicherheitskonzepts correct sein. Außerdem sollen dazu technische und organisatorische Maßnahmen dargestellt werden.
Es werden die bekannten Referenzmodelle und Frameworks CobIT und ITIL behandelt. Abschließend werden durch die Bewertungskriterien – TCSEC, „Die deutschen IT-Kriterien“ & ITSEC, sowie universal standards weitere Werkzeuge als Grundlage zum Schutz der Datensicherheit und –schutz dargestellt.
Read Online or Download Enforcing Corporate IT Policies. Referenzmodelle, Frameworks und Bewertungskriterien: CobiT, ITIL, TCSEC, ITSEC und Common Criteria (German Edition) PDF
Best business information technology books
Security Metrics Management: How to Manage the Costs of an Assets Protection Program
Protection metrics is the applying of quantitative, statistical, and/or mathematical analyses to measuring safeguard practical tendencies and workload. In different phrases, monitoring what every one functionality is doing when it comes to point of attempt (LOE), expenses, and productiveness. protection metrics administration is the coping with of an resources safety application and similar safety services by using metrics.
Dealing with Dilemmas: Where Business Analytics Fall Short
Looking at how company administration is captivated with research and numbers, facing Dilemmas indicates there's a whole type of difficulties that can not be solved by way of research: company dilemmas. Dilemmas, representing a wide a part of strategic decision-making, require the other process of research; synthesis.
The CIO Playbook: Strategies and Best Practices for IT Leaders to Deliver Value (Wiley CIO)
As our economic system shifts from recession to restoration, our present economy is ripe for transformation. CIOs are in a different place to leverage expertise with the intention to force innovation and increase enterprise development. The CIO Playbook is the convenient table reference for CIOs, CEOs, CFOs, and up and coming leaders, revealing a dynamic seven-step framework (Partner – arrange – Innovate – bring – help – safeguard – develop) that may consultant you in making crucial alterations for your association.
Formal SQL Tuning for Oracle Databases: Practical Efficiency - Efficient Practice
The objective of SQL tuning is the development of the present execution plan. The authors speak about the removing of brakes within the execution plan. Such "brakes" or bottlenecks will be well-known through a proper research of the execution plan. For this function no info version wisdom is required. this can be specially worthy for database directors simply because they're frequently now not or insufficiently familiar with the information version.
- Data Governance: How to Design, Deploy and Sustain an Effective Data Governance Program (The Morgan Kaufmann Series on Business Intelligence)
- Enterprise as an Instrument of Civilization: An Anthropological Approach to Business Administration (Translational Systems Sciences)
- Institutional Learning and Knowledge Transfer Across Epistemic Communities: New Tools of Global Governance: 13 (Innovation, Technology, and Knowledge Management)
- Leading the Internal Audit Function (Internal Audit and IT Audit)
- Software Business: 7th International Conference, ICSOB 2016, Ljubljana, Slovenia, June 13-14, 2016, Proceedings (Lecture Notes in Business Information Processing)
Extra info for Enforcing Corporate IT Policies. Referenzmodelle, Frameworks und Bewertungskriterien: CobiT, ITIL, TCSEC, ITSEC und Common Criteria (German Edition)
Example text
- Miklós Jancsó (Italian Edition) by a cura di Angelo Signorelli
- Nikon D7200 (The Expanded Guide) by Jon Sparks