Need-to-know technologies for a successful future:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston ; Berlin
De G Press
[2019]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xx, 359 Seiten Illustrationen 24 cm x 17 cm |
ISBN: | 9781547416929 1547416920 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045105087 | ||
003 | DE-604 | ||
005 | 20200304 | ||
007 | t | ||
008 | 180726s2019 gw a||| |||| 00||| eng d | ||
015 | |a 18,N29 |2 dnb | ||
020 | |a 9781547416929 |9 978-1-5474-1692-9 | ||
020 | |a 1547416920 |9 1547416920 | ||
024 | 3 | |a 9781547416929 | |
035 | |a (OCoLC)1104877681 | ||
035 | |a (DE-599)BVBBV045105087 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE | ||
049 | |a DE-M382 |a DE-355 | ||
084 | |a ST 110 |0 (DE-625)143583: |2 rvk | ||
100 | 1 | |a Keogh, James Edward |d 1948- |e Verfasser |0 (DE-588)143959425 |4 aut | |
245 | 1 | 0 | |a Need-to-know technologies for a successful future |c Jim Keogh |
263 | |a 201812 | ||
264 | 1 | |a Boston ; Berlin |b De G Press |c [2019] | |
300 | |a xx, 359 Seiten |b Illustrationen |c 24 cm x 17 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
653 | |a Technology, Career, Success | ||
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | |5 DE-604 | |
710 | 2 | |a Walter de Gruyter Inc. |0 (DE-588)2036938-4 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 978-1-5474-0081-2 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-1-5474-0083-6 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030495573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030495573 |
Datensatz im Suchindex
_version_ | 1804178741142749184 |
---|---|
adam_text | Contents Chapter 1: Talking Intelligently About Technology------ 1 More than Companies and Industries------ 3 Make Your Life Easier------ 3 From Idea to Reality------ 4 Finer Details of Your Idea------ 5 The Business Case------ 6 The Project------ 7 Project Management------ 9 The Project Team------ 10 Virtual Project Teams------ 12 Shared Values------ 12 Relationship Capital------ 12 The Project Sponsor and the Steering Committee------ 13 The ProjectPlan------ 13 Project Phases, Milestones, and Deliverables------ 14 Work Package: Tasks and Subtasks------ 14 Sequencing Tasks------ 15 Duration------ 15 The Schedule------ 16 Resources------ 17 The Resource List------ 18 Resource Usage------ 18 Cost to Bring an Idea to Reality------ 19 Tools to Manage Development------ 20 Change Management------ 20 Risk and Managing Risk------21 Your Idea Is Delivered------ 23 Simple Project: No Need for Complex Project Management-----The Focus Board------ 25 The Scrum------ 26 Sprint------ 26 Daily Scrum------ 27 Backlog Grooming------ 27 The Project Team------ 27 Extremely Quick, Changing Needs------ 28 Rapid Planning------ 28 The Design Process: Sketch the Idea------ 29 Pseudo Code------ 31 Object Oriented Design and Programming------ 32 Data Capture------ 34
x Contents Chapter 2: Talking Intelligently About Communication Networks The Neighborhood of Networks------ 35 Converting the Message------37 Catching a Wave------39 Analog and Digital Waves------ 41 At the Speed of Light------ 42 From the Keyboard to the Communications Network------ 43 Protocols------44 Packets------44 A Closer Look at Communication Networks------ 45 Network Addresses------47 The Internet------48 Web Server------49 A Behind-the-Scenes Look at Email------51 SMTP------52 POP3------52 Internet Mail Access Protocol Server------53 Attachment------53 The Intranet------54 Wi-Fi------ 55 Cell Phone Technology------ 56 Transmission------56 Virtual Private Network (VPN)------ 57 N etwo rk Ad m i n ¡stratio n------58 Network Operating System------ 59 Network Monitoring------ 60 Chapter 3: Talking Intelligently About Computers------ 61 Larger Computers------ 62 A Box of Switches------ 63 Building Blocks of a Computer------ 64 The Central Processing Unit (CPU)------67 The Process Control Block------ 69 Memory Management------ 69 Device Management------ 70 Measuring the Processor------ 72 (Kind of) Doing More Than One Thing at the Same Time How the Processor Makes Decisions------75 Memory------ 76 The RAM Divide------ 77 Types of RAM------78 Types of ROM------78
Video Memory------ 79 Inside a Memory Chip------ 80 Memory Errors: Few and Far Between------ 81 BIOS and Starting the Computer------ 82 Changing BIOS Options------ 83 The Operating System------ 83 Behind the Scenes of Running a Program------ 85 Interrupts------ 86 The Keyboard------ 87 The Mouse------ 89 Touchscreens------ 90 Permanent Secondary Storage------ 91 Saving Data to a Disk------ 92 Important Measurements of a Disk Drive------ 94 Deleting a File------ 93 Disk Fragmentation------ 93 Compact Disc (CD) and Digital Optical Disc (DVD)-----Flash Storage------ 95 Monitors------ 95 Inside Look at LCD Monitors------ 97 Landscape, Portrait, or Multiple Monitors------ 98 Chapter 4: About Computer Applications------ 99 Application Architecture------ 100 Tier Architecture------ 101 Inside an Application------ 105 From Pseudo Code to a Program------ 107 High-Level Programming Languages------ 109 Breaking Down a Program into Parts------ 110 Function at Work------ 111 Decisions, Decisions, Decisions------ 113 Feeling Loopy------ 115 Sharing Parts of Programs------ 116 The Tool Box: Integrated Development Environment— AGUI Program------ 119 Web Applications------ 121 Cascading Style Sheets (CSS)------ 123 JavaScript------ 125 Mobile Apps------ 126 Building an App------ 127 Creating a Dynamic Webpage------ 128 Testing the Application------ 129
xii Contents Chapters: Data and Databases------ 133 Storing Data------ 133 Memory and Disk------ 136 Developing a Database Application------ 136 More About Structured Data------ 138 Database Managementsystem (DBMS)------ 141 Data Modeling------ 141 Relational Database------ 145 The Relational Database Advantage------ 146 Referential Integrity------ 146 Relational Database Design------ 147 Normalization------ 147 Index------ 148 Structured Query Language (SQL)------ 149 SQL Basics------ 150 Creating a Table------ 151 Automatically Validating Data------ 152 Modifying the Database------ 153 Creating an Index------ 154 Insert Data------ 155 Pattern Matching------ 157 Searching for Ranges------ 157 Changing Values------ 158 Deleting a Row------ 158 Calculating Values in a Column------ 158 Remove Duplicates------ 159 Organizing Data------ 160 Joining Together Tables------ 161 Writing SQL------ 163 Chapter 6: Talking Intelligently About Cybersecurity Challenges of Cybersecurity------ 165 Cybersecurity Audit------ 168 Database Access Points------ 168 Physical Access------ 170 Biometrics------ 170 Handwriting------ 171 Hands and Fingers------ 172 Voice Prints------ 172 Iris Scanning------ 172 Fingerprints------ 173 Veins------ 173
Contents — xiii Facial------ 174 Password------ 175 Access Rights------ 177 Disabling Services------ 178 Proxy Server------ 179 Demilitarized Zone (DMZ)------ 180 Firewall------ 180 Firewall Controls Traffic Flow------ 180 Configuring a Firewall------ 181 Breaking Through the Firewall------ 181 Encryption------ 182 Classes of Information and the Need For Protection------ 183 Categories of Encryption------ 184 Digital Certificates, SSL and TLS------ 184 Hash Value------ 185 Cyclic Redundancy Check and Checksum------ 185 Wireless Network Security------ 186 Bluetooth Security------ 186 Hacking------ 187 Computer Viruses------ 187 Inside a Computervirus------ 188 Rootkit------ 189 Computervirus Protection------ 189 Macro Virus------ 189 Key logger------190 Denial of Service------ 191 Wi-Fi Access Points------ 191 Identity Theft------ 192 Cookie Theft------ 193 Network Sniffing------ 193 Detecting a Hacker------ 193 Mobile Computing Device------ 194 Chapter 7: Risk Management and Disaster Recovery------ 195 Disaster------ 195 Risk Assessment------ 197 Disaster-Based Risk Assessment------ 198 Asset-Based RiskAssessment------ 198 Business Impact Analysis------ 198 Legacy Systems------199 Points of Failure----- 200 Recovery Point Objective (RPO) and Recovery Time Objective (RTO)------ 201
xiv — Contents Data Synchronization Point------ 202 Unseen Fail Points------ 202 Disaster Recovery------ 203 Disaster Recovery Team------ 204 Disaster Recovery Plan------ 204 Elements of a Disaster Recovery Plan — Assumptions------ 206 Risk Tolerance------ 206 Risk Management------ 207 Detail Analysis Is Critical------ 208 Low-Level Focus------ 209 Disaster Recovery Options------ 210 Service Level of Agreement------ 213 Disaster Recovery Operations------ 214 Emergency Operations Center (EOC)-----Downtime Procedures------ 215 Contact Lists------ 216 Disaster Drills------ 216 Chapter 8.· Vendor Negotiations and Management Procurement------ 219 Procurement Process------ 220 Finding a Vendor------ 220 Contacting Vendors------ 221 The Proposal------ 222 Risks of Procurement------ 223 Negotiation------ 224 Preparing for Negotiations------ 225 Negotiation Strategy------ 226 Value------ 227 Do the Math------ 227 Payment------ 228 General Contractor------ 229 Face-to-Face Negotiation------ 229 Negotiating Terms------ 230 Terminate Negotiation------ 231 Conflict Resolution------ 232 Fact Finder, Mediator, and Arbitrator-----Suing------ 233 The List------ 233 Stages of Adoption------234 Contract------ 235
Contents ------ XV Elementsofa Contract------ 236 Breach of Contract----- 237 Industry Standard------238 Contract Interpretation------ 238 The Uniform Commercial Code (UCC) In the US------ 239 United Nations Convention on Contracts for the International Sales of Goods (CISG)------ 239 Warranty------ 239 Remedies------ 240 Modifying a Contract------ 241 Memorandum of Understanding------ 241 Contract Termination------ 241 Workingthe Contract------ 241 Reasonableness------ 242 Penalty Clause and Performance Incentives------ 242 The Contract Manager------ 243 Service-Level Agreement------ 243 Chapter 9: The Importance of Cloud Computing------ 245 It Can Rain Too------ 245 Governmental Access------ 246 The Cloud and Data Science------ 246 The Cloud Services------ 247 The Private Cloud------ 249 The Public Cloud------ 250 Hybrid Clouds------ 250 Why Implement a Cloud?------ 251 Why Not Use the Cloud?------ 252 Mitigating Risk------ 254 The Cloud Life Cycle------ 256 Cloud Architecture------ 257 Serverless Computing------ 259 DevOps------ 260 The DevOps Maturity Model------ 262 Compliance------ 263 Cloud Security------ 263 Levels of Security------ 264 Chapter 10: Decision Support Systems, Data Analysis, and Big Data------ 267 The Decision Process------ 268 Business Intelligence------ 271 Data and Business Analytics------ 271
xvi Contents Technology Supports the Decision Maker------ 271 Simon’s Decision-Making Process------ 272 Business Reporting------ 273 Performance Dashboard------ 273 Models and How Models Are Used to Help Make Decisions------ 274 Mathematical Models------ 275 Certainty and Uncertainty------ 276 Decision Tree------ 277 Search------ 277 Simulation Model------ 277 Automated Decision Systems and Expert Systems------ 278 Knowledge Management and Collaborative Systems-------280 Data Warehousing and Data Mining------ 280 Text Analytics, Text Mining, and Sentiment Analysis------ 282 Web Analytics, Web Mining, and Social Analytics------ 283 Big Data and Analytics------ 284 Chapter 11: Forensic Computing and How People Can Be Tracked------ 287 Protecting Your Computing Device------ 289 The Legal Environment------ 289 Criminal Trial------ 290 Civil Trial------ 291 Decisions and Appeals------ 292 Evidence------ 293 A Computer Forensics Investigation------ 294 Types of Computer Forensics Investigations------ 295 Tools of Computer Forensics------ 296 Legal Consequences of Computer Forensics------ 296 Conducting a Computer Forensics Investigation------ 299 Preserving Data Using Write Blockers------ 299 Hashing------ 300 Hexadecimal Level of Investigation------ 301 Offset: Locating Data------ 302 Mounting: Hiding Data------ 303 Bit Shifting------ 304 Bit Flipping------ 304 Live Data Acquisition------- 305 Remote Acquisition------ 306 Deleted Data------ 307 Anti-Forensics Tools------ 307 Cell Phones------ 308
Contents ------ AppendixA: Information Technology Auditing------ 311 The Information Technology Audit Process------ 311 Auditing Technology------ 313 Controls------ 314 COBIT------ 315 The Audit Charter------ 315 The Audit Committee------ 316 Preplanning the Audit------ 317 Audit Restrictions------318 The Audit Planning------ 319 Tasks and Subtasks------ 320 Duration------ 320 Dependencies------ 321 Critical Path------ 322 Resources------ 322 Resource Cost------ 323 Cost of the Audit------ 323 Responsibilities of the Auditor and Auditee------ 324 Audit Risk Assessment------ 326 Types of Risks------ 327 Audit Quality Control------ 328 Techniques to Ensure a Quality Audit------ 329 Data Collection------ 330 Review Existing Controls------ 332 Evidence Life Cycle------ 332 Identifying Evidence------ 333 Grading Evidence------ 334 Material Relevance------ 334 Competency of the Evidence Provider------ 334 Evidence Independence------ 334 Recording Evidence------ 335 Analysis of the Evidence------ 335 Preparing Audit Documentation------ 336 Audit Samples------ 336 Statistical Sampling------ 337 Non-statistical Sampling------ 337 Compliance Testing------337 Substantive Testing----- 338 Reporting Audit Findings------ 339 The Audit Report and Stakeholders------ 340 Detecting Irregularities------ 341 Index------ 343 xvii
|
any_adam_object | 1 |
author | Keogh, James Edward 1948- |
author_GND | (DE-588)143959425 |
author_facet | Keogh, James Edward 1948- |
author_role | aut |
author_sort | Keogh, James Edward 1948- |
author_variant | j e k je jek |
building | Verbundindex |
bvnumber | BV045105087 |
classification_rvk | ST 110 |
ctrlnum | (OCoLC)1104877681 (DE-599)BVBBV045105087 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01651nam a2200421 c 4500</leader><controlfield tag="001">BV045105087</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200304 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180726s2019 gw a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">18,N29</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781547416929</subfield><subfield code="9">978-1-5474-1692-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1547416920</subfield><subfield code="9">1547416920</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781547416929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1104877681</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045105087</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 110</subfield><subfield code="0">(DE-625)143583:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Keogh, James Edward</subfield><subfield code="d">1948-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143959425</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Need-to-know technologies for a successful future</subfield><subfield code="c">Jim Keogh</subfield></datafield><datafield tag="263" ind1=" " ind2=" "><subfield code="a">201812</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston ; Berlin</subfield><subfield code="b">De G Press</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 359 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm x 17 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Technology, Career, Success</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Walter de Gruyter Inc.</subfield><subfield code="0">(DE-588)2036938-4</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">978-1-5474-0081-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-1-5474-0083-6</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030495573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030495573</subfield></datafield></record></collection> |
id | DE-604.BV045105087 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:08:47Z |
institution | BVB |
institution_GND | (DE-588)2036938-4 |
isbn | 9781547416929 1547416920 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030495573 |
oclc_num | 1104877681 |
open_access_boolean | |
owner | DE-M382 DE-355 DE-BY-UBR |
owner_facet | DE-M382 DE-355 DE-BY-UBR |
physical | xx, 359 Seiten Illustrationen 24 cm x 17 cm |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | De G Press |
record_format | marc |
spelling | Keogh, James Edward 1948- Verfasser (DE-588)143959425 aut Need-to-know technologies for a successful future Jim Keogh 201812 Boston ; Berlin De G Press [2019] xx, 359 Seiten Illustrationen 24 cm x 17 cm txt rdacontent n rdamedia nc rdacarrier Informatik (DE-588)4026894-9 gnd rswk-swf Technology, Career, Success Informatik (DE-588)4026894-9 s DE-604 Walter de Gruyter Inc. (DE-588)2036938-4 pbl Erscheint auch als Online-Ausgabe, PDF 978-1-5474-0081-2 Erscheint auch als Online-Ausgabe, EPUB 978-1-5474-0083-6 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030495573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Keogh, James Edward 1948- Need-to-know technologies for a successful future Informatik (DE-588)4026894-9 gnd |
subject_GND | (DE-588)4026894-9 |
title | Need-to-know technologies for a successful future |
title_auth | Need-to-know technologies for a successful future |
title_exact_search | Need-to-know technologies for a successful future |
title_full | Need-to-know technologies for a successful future Jim Keogh |
title_fullStr | Need-to-know technologies for a successful future Jim Keogh |
title_full_unstemmed | Need-to-know technologies for a successful future Jim Keogh |
title_short | Need-to-know technologies for a successful future |
title_sort | need to know technologies for a successful future |
topic | Informatik (DE-588)4026894-9 gnd |
topic_facet | Informatik |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030495573&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT keoghjamesedward needtoknowtechnologiesforasuccessfulfuture AT walterdegruyterinc needtoknowtechnologiesforasuccessfulfuture |