Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Collaborate with colleagues in real timeThrough Google's single sign-in suite of products, students, employees, and businesses can work seamlessly in G Suite's cloud-based office productivity apps: Gmail, Calendar, Docs and Sheets, Drive, Hangouts, Meet, and more. G Suite offers many benefits including security, reliability, and compatibility with other products. Three simple pricing plans are available to meet the usage and storage needs of large and small groups of collaborators.
This book brings together the insights and practical experience of some of the most experienced Data Plane Development Kit (DPDK) technical experts, detailing the trend of DPDK, data packet processing, hardware acceleration, packet processing and virtualization.
A must-have resource for anyone looking to establish, implement and maintain an ISMS.Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001.The book covers:Implementation guidance -what needs to beconsidered to fuli lthe requirements of thecontrols from ISO/IEC27001, Annex A. This guidance is aligned with ISO/IEC27002, which gives advice on implementing the controls;Auditing guidance -whatshouldbechecked, and how,whenexaminingthe ISO/IEC27001controls to ensure that the implementation coversthe ISMS control requirements.The implementation guidance gives clear descriptions covering what needs to be considered to achieve compliance against the requirements, with examples given throughout. The auditing guidance covers what evidence an auditor should look for in order to satisfy themselves that the requirement has been met. Useful for internal auditors and consultants, the auditing guidance will also be useful for information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit.This guide is intended to be used by those involved in:Designing, implementing and/or maintaining an ISMS;Preparing for ISMS audits and assessments; orUndertaking both internal and third-party ISMS audits and assessmentsAbout the authorBridget Kenyon (CISSP) is global CISO for Thales eSecurity. Her experience in information security started in 2000 with a role in network vulnerabilities at DERA, following which she has been a PCI Qualified Security Assessor, information security officer for Warwick University and head of information security for UCL, and has held a variety of roles in consultancy and academia.Bridget has been contributing to international standards since 2006, when she first joined BSI Panel 1, coordinating development of information security management system standards; she is currently editor for ISO/IEC 27014. Bridget has also co-authored three textbooks on information security. She strongly believes that "e;information security is fundamental to reliable business operations, not a nice-to-have"e;. In 2018, she was named one of the top 25 women in tech by UK publication PCR.
In The Platform Society, Van Dijck, Poell and De Waal offer a comprehensive analysis of an online world where platforms have penetrated the heart of societies. The book analyzes intense struggles in four sectors-news, urban transport, health, and education-asking who is responsible for anchoring public values and the common good in a platform society?
From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing: the blockchain.
Currently used at many colleges, universities, and high schools, this hands-on introduction to computer science is ideal for people with little or no programming experience. The goal of this concise book is not just to teach you Java, but to help you think like a computer scientist.
Design a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy, with a detailed roadmap that shows you how to install and configure this open source software, whether you're upgrading your existing phone system or starting from scratch.
Get the essential information you need to implement CSS effectively with this concise yet comprehensive quick reference. Ideal for intermediate to advanced web designers and developers, this 4th edition is revised and updated for CSS3, the latest version of the Cascading Style Sheet specification.
Users demand applications that are well behaved, good-looking, and easy to use. This bestselling book captures UI best practices and reusable ideas as design patterns -- solutions to common design problems, tailored to the situation at hand.
In this book, bestselling author Williams expands her focus to explain the four fundamental principles of good presentation design and the logic behind those principles. She also guides the fledgling speaker through the entire process of creating a presentation from choosing the right software to organizing ideas.
A practical guide that addresses the problems and difficult choices which professional compositors face on a daily basis. It presents you with tips, techniques, and solutions for dealing with badly shot elements, color artifacts, mismatched lighting and other commonly faced compositing obstacles.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.