Matches in UGent Biblio for { <https://biblio.ugent.be/publication/902518#aggregation> ?p ?o. }
Showing items 1 to 27 of
27
with 100 items per page.
- aggregation classification "B1".
- aggregation creator person.
- aggregation date "2006".
- aggregation format "application/pdf".
- aggregation hasFormat 902518.bibtex.
- aggregation hasFormat 902518.csv.
- aggregation hasFormat 902518.dc.
- aggregation hasFormat 902518.didl.
- aggregation hasFormat 902518.doc.
- aggregation hasFormat 902518.json.
- aggregation hasFormat 902518.mets.
- aggregation hasFormat 902518.mods.
- aggregation hasFormat 902518.rdf.
- aggregation hasFormat 902518.ris.
- aggregation hasFormat 902518.txt.
- aggregation hasFormat 902518.xls.
- aggregation hasFormat 902518.yaml.
- aggregation language "mis".
- aggregation publisher "Qazvin University".
- aggregation rights "I have retained and own the full copyright for this publication".
- aggregation subject "Business and Economics".
- aggregation title "Data and systems security".
- aggregation abstract "Security is the foundation of any systems or organizations based on Information Technology(IT), e.g., financial institution, Banks, etc. This fundamental requirement mandates that all institution operations meet or exceed IT security standards. IT securing daily operations when processes are rapidly changing makes this challenging task exceptionally difficult, e.g., IT security infrastructure solutions for financial services from IBM combine market-leading technology and a comprehensive services portfolio to design an IT security solution that is customized to your specific needs, in this book first I give an introduction and general view, in the second chapter there are the definitions about IT security and its infrastructures in detail, in third, fourth and fifth chapters I explain each IT security elements and then I give some efficient solutions with specific example (an IT organization), in sixth chapter I explain Risk Analysis and try to give solutions in IT Risk management and in the seventh chapter you can find solutions for IT system security policy, in the last chapter there are all appendixes. References : - ISO/IEC TR 13335 - ISO 17799".
- aggregation authorList BK13955.
- aggregation aggregates 902525.
- aggregation isDescribedBy 902518.
- aggregation similarTo LU-902518.