Narrow your search

Library

KU Leuven (7)

Odisee (6)

Thomas More Kempen (6)

Thomas More Mechelen (6)

UCLL (6)

VIVES (6)

KBC (4)

UGent (4)

ULB (4)

ULiège (4)

More...

Resource type

book (18)

digital (3)


Language

English (20)


Year
From To Submit

2020 (2)

2019 (2)

2018 (2)

2015 (4)

2012 (2)

More...
Listing 1 - 10 of 20 << page
of 2
>>
Sort by
Accounting and financial disclosure : a guide to basic concepts.
Authors: ---
ISBN: 0314747338 Year: 1983 Publisher: Saint Paul (Conn.) : West publishing co.,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
CTOs at Work
Authors: --- ---
ISBN: 9781430235941 Year: 2012 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Building an effective security program.
Authors: --- ---
ISBN: 1501506528 1501506420 Year: 2020 Publisher: Boston, Massachusetts : DE GRUYTER,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.


Book
Building an Effective Security Program
Authors: --- ---
ISBN: 9781501506529 Year: 2020 Publisher: Berlin Boston

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
CTOs at Work
Authors: --- ---
ISBN: 1430235934 1430235942 Year: 2011 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Scott Donaldson, Stanley Siegel and Gary Donaldson interview many of the world's most influential chief technology officers in CTOs at Work, offering a brand-new companion volume to the highly acclaimed elite At Work books including Coders at Work, CIOS at Work and Venture Capitalists at Work. As the words “at work” suggest, the authors focus on how their interviewees tackle the day-to-day work of the CTO while revealing much more: how they got there, how they manage and allocate projects, and how they interact with business units and ensure that their companies take advantage of technologies, teamwork, and software development practices to respond to organizational needs and improve employee productivity. Surveying a variety of unique corporations, CTOs at Work offers insights into the present and future of CTOs in organizations around the world. Other books in the Apress At Work Series: Coders at Work, Seibel, 978-1-4302-1948-4 Venture Capitalists at Work, Shah & Shah, 978-1-4302-3837-9 CIOs at Work, Yourdon, 978-1-4302-3554-5 Founders at Work, Livingston, 978-1-4302-1078-8 European Founders at Work, Santos, 978-1-4302-3906-2 Women Leaders at Work, Ghaffari, 978-1-4302-3729-7 Advertisers at Work, Tuten, 978-1-4302-3828-7 Gamers at Work, Ramsay. 978-1-4302-3351-0.


Book
CTOs at Work
Authors: --- --- ---
ISBN: 9781430235941 Year: 2012 Publisher: Berkeley CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Scott Donaldson, Stanley Siegel and Gary Donaldson interview many of the world's most influential chief technology officers in CTOs at Work, offering a brand-new companion volume to the highly acclaimed elite At Work books including Coders at Work, CIOS at Work and Venture Capitalists at Work. As the words at work  suggest, the authors focus on how their interviewees tackle the day-to-day work of the CTO while revealing much more: how they got there, how they manage and allocate projects, and how they interact with business units and ensure that their companies take advantage of technologies, teamwork, and software development practices to respond to organizational needs and improve employee productivity. Surveying a variety of unique corporations, CTOs at Work offers insights into the present and future of CTOs in organizations around the world. Other books in the Apress At Work Series: Coders at Work, Seibel, 978-1-4302-1948-4 Venture Capitalists at Work, Shah & Shah, 978-1-4302-3837-9 CIOs at Work, Yourdon, 978-1-4302-3554-5 Founders at Work, Livingston, 978-1-4302-1078-8 European Founders at Work, Santos, 978-1-4302-3906-2 Women Leaders at Work, Ghaffari, 978-1-4302-3729-7 Advertisers at Work, Tuten, 978-1-4302-3828-7 Gamers at Work, Ramsay. 978-1-4302-3351-0


Book
Enterprise Cybersecurity : How to Build a Successful Cyberdefense Program Against Advanced Threats
Authors: --- --- ---
Year: 2015 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities.


Book
Corporation and partnership : statutes, rules and forms.
Authors: --- ---
ISBN: 0882775979 Year: 1987 Publisher: Mineola (N.Y.) : Foundation press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Agency, associations, employment, licensing and partnerships.
Authors: --- ---
ISBN: 0882770802 Year: 1982 Publisher: Mineola (N.Y.) : Foundation press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Software configuration management: an investment in product integrity
Authors: --- ---
ISBN: 0138217696 Year: 1980 Publisher: Englewood Cliffs, N.J. Prentice-Hall

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Programming

Listing 1 - 10 of 20 << page
of 2
>>
Sort by