Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
50
result(s) for
"Business enterprises-Computer programs"
Sort by:
Cybersecurity program development for business
by
Chris Moschovitis
in
Business enterprises
,
Business enterprises -- Computer programs
,
Computer industry
2018
\"This is the book executives have been waiting for. It is clear: With deep expertise but in nontechnical language, it describes what cybersecurity risks are and the decisions executives need to make to address them. It is crisp: Quick and to the point, it doesn't waste words and won't waste your time. It is candid: There is no sure cybersecurity defense, and Chris Moschovitis doesn't pretend there is; instead, he tells you how to understand your company's risk and make smart business decisions about what you can mitigate and what you cannot.
It is also, in all likelihood, the only book ever written (or ever to be written) about cybersecurity defense that is fun to read.\"
—Thomas A. Stewart, Executive Director, National Center for the Middle Market and Co-Author of Woo, Wow, and Win: Service Design, Strategy, and the Art of Customer Delight Get answers to all your cybersecurity questions
In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term \"cybersecurity\" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk.
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it's a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise.
* Unlike other cybersecurity books, the text is not bogged down with industry jargon
* Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs
* Shows you how to make pragmatic, rational, and informed decisions for your organization
* Written by a top-flight technologist with decades of experience and a track record of success
If you're a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you.
Cybersecurity program development for business : the essential planning guide
by
Moschovitis, Christos J. P., author
in
Information technology Management.
,
Business enterprises Computer programs.
,
Computer networks Security measures.
2018
\"Get answers to all your cybersecurity questions In 2016, we reached a tipping point—a moment where the global and local implications of cybersecurity became undeniable. Despite the seriousness of the topic, the term \"cybersecurity\" still exasperates many people. They feel terrorized and overwhelmed. The majority of business people have very little understanding of cybersecurity, how to manage it, and what's really at risk. This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles and responsibilities, this book walks the reader through each step of developing and implementing a cybersecurity program. Read cover-to-cover, it’s a thorough overview, but it can also function as a useful reference book as individual questions and difficulties arise. Unlike other cybersecurity books, the text is not bogged down with industry jargon Speaks specifically to the executive who is not familiar with the development or implementation of cybersecurity programs Shows you how to make pragmatic, rational, and informed decisions for your organization Written by a top-flight technologist with decades of experience and a track record of success If you’re a business manager or executive who needs to make sense of cybersecurity, this book demystifies it for you. \"-- Provided by publisher.
WebSphere Commerce V5.4 Catalog Design and Content Management
2003
This IBM Redbooks publication provides detailed information on
how to design, implement, and manage a WebSphere Commerce catalog
and content management system for use with WebSphere Commerce
V5.4.
In Part 1 we introduce the concepts of catalog and content
management, provide an overview of the WebSphere Commerce store and
data architecture, and provide a summary of ISV Partner Solutions
for catalog and content management. In addition, we introduce
managing digital media with WebSphere Commerce for Digital
Media.In Part 2, we provide architecture, design, and development
guidelines for the WebSphere Commerce catalog, aggregating data,
transforming data, resolving data, and loading data. In addition,
we provide a detailed chapter on integrating divine Inc.’s
Content Server with WebSphere Commerce to manage content and
data.In Part 3 we provide an end-to-end scenario for the ITSO as a
fictitious business that sells Redbooks and software to B2C and B2B
customers. The example includes requirements analysis and solution
design, runtime and development environment implementation,
creating B2B and B2C stores using WebSphere Studio Application
Developer, converting CSV data to XML, transforming XML data to
WebSphere Commerce XML, and resolving and loading the catalog
data.Please note that the additional material referenced in the text is not available from IBM.
e-Commerce Hosting Solutions Guide, Using WebSphere Commerce V5.5 Business Edition
2004
This IBM Redbooks publication provides IT architects, IT
specialists, and administrators with the critical knowledge to
design, develop, implement, deploy, and manage a WebSphere Commerce
V5.5 hosting site with multiple stores. This book includes:- An introduction to the WebSphere Commerce hosting model and
the hosting composite pattern
- An ITSO hosting example, including a business requirements
analysis and solution design.
- How to implement a team development environment, customize a
store profile, and build, deploy, and manage multiple stores.
- How to manage a hosting hub, hub organization, and hosted
stores.
- How to manage a hosted B2B store and organizations.
- How to manage a hosted B2C store and organizations.The appendixes include procedures and tips for WebSphere
Commerce implementation, WebSphere Commerce Studio implementation,
common procedures, and error handling scenarios.Please note that the additional material referenced in the text is not available from IBM.
Social media risk and governance : managing enterprise risk
\"In a recent survey, 71 percent of executives polled said their company was concerned about the possible risks posed by social media, but 59 percent do not perform a social media risk assessment. This book is a comprehensive, practical guide to the components and considerations that make up a social media governance strategy, spanning both external communications channels such as Facebook, Twitter and LinkedIn, as well as enterprise social networks within an organization. Phil Mennie, PwC's Global Social Media Risk and Governance leader, addresses key issues such as policy evaluation and planning, information security and fraud risks, how to respond to a crisis and how to archive data. The book empowers professional users of social networks to collaborate with their compliance and risk management counterparts, and to harness the power of social media safely and successfully for their organization\"-- Provided by publisher.
Cybersecurity Program Development for Businesses
by
Moschovitis, Chris
in
Business enterprises-Computer programs
,
Computer industry
,
Computer networks-Security measures
2018
Intro -- TITLE PAGE -- TABLE OF CONTENTS -- FOREWORD -- PREFACE -- Something Completely Different -- ABOUT THE AUTHOR -- ACKNOWLEDGMENTS -- CHAPTER 1: Understanding Risk -- How Much Is It Worth to You? -- Risk! Not Just a Board Game -- CHAPTER 2: Everything You Always Wanted to Know About Tech (But Were Afraid to Ask Your Kids) -- In the Beginning… -- Key Definitions -- Note -- CHAPTER 3: A Cybersecurity Primer -- Cybersecurity Defined -- The Meaning of Security -- Measuring Cybersecurity's Success -- Deter, Identify, Protect, Detect, Respond -- Cybersecurity Controls and Defense in Depth -- Defense in Depth -- The Threats -- Threat Agents -- Key Trends Influencing Threat Agents -- The Nature of Hackers -- Attack Process -- Types of Attacks -- A Brief Cyberglossary of Terms -- CHAPTER 4: Management, Governance, and Alignment -- Why Governance Matters -- Strategy, Steering, and Standards -- Critical Success Factors -- CHAPTER 5: Your Cybersecurity Program: A High‐Level Overview -- Vision and Mission Statements -- Culture and Strategy -- Off to See the Wizard -- What's at Risk? -- Threat Assessment -- At the Club House Turn! -- Mitigating Risk -- Incident‐Response Planning -- CHAPTER 6: Assets -- Asset Classification -- Asset Metadata -- Business‐Impact Analysis -- One Spreadsheet to Rule Them All -- CHAPTER 7: Threats -- Types of Threats -- Threat Rankings -- Threat Intelligence -- Threat Modeling -- CHAPTER 8: Vulnerabilities -- Who Is Who in Vulnerabilities Tracking -- Zero‐Day Exploits -- Vulnerabilities Mapping -- Vulnerability Testing -- Prioritizing Vulnerability Remediation -- CHAPTER 9: Environments -- On‐Premises (Onsite) Computing Environments -- Private‐Cloud Computing Environments -- Public‐Cloud Computing Environments -- Hybrid‐Cloud Computing Environments -- The Internet of Things (IoT) -- Distributed Workforces