Angebote zu "Audit" (6 Treffer)

Kategorien

Shops

Crystal Report
49,00 € *
ggf. zzgl. Versand

Crystal Reports is a business intelligence application used to design and generate reports from a wide range of data sources. Crystal Reports is designed to produce the report from virtually any data source. Built-in report experts guide you step by step through building reports and completing common reporting tasks. Crystal Reports is designed to work with your database to help you analyze and interpret important information. Crystal Reports makes it easy to create simple reports and it also has the comprehensive tools you need to produce complex or specialized reports. The EN'RGISE software is designed to cater to several business areas such as financial accounting, material management, human resource management, energy audit, operation and maintenance, fuel management and works accounting. This report will form the basis for design, software development and acceptance testing. The document will also serve as a reference document for post-implementation maintenance of the system. This design will form the basis for software development and will be used as a reference document for the software's post-implementation maintenance and change management.

Anbieter: Dodax
Stand: 30.05.2020
Zum Angebot
It Service Portfolio Management
83,90 CHF *
ggf. zzgl. Versand

IT portfolio management is the application of systematic management to large classes of items managed by enterprise Information Technology (IT) capabilities. Examples of IT portfolios would be planned initiatives, projects, and ongoing IT services (such as application support). The promise of IT portfolio management is the quantification of previously informal IT efforts, enabling measurement and objective evaluation of investment scenarios. This book is your ultimate resource for IT Service Portfolio Management. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about IT Service Portfolio Management right away, covering: IT portfolio management, Information technology, Val IT, Balanced scorecard, Vertical integration, Application Portfolio Management, Project portfolio management, Information Technology Infrastructure Library, Information Systems Audit and Control Association, Institute of Electrical and Electronics Engineers, Corporate governance of information technology, IT service management, Enterprise architecture, Integrated business planning, Information technology management, Data proliferation, Information Lifecycle Management, Information repository, Storage virtualization, 25U Signal Support Systems Specialist, Aarohan, Accelops, Advanced planning and scheduling, Application Services Library, Autonomic Networking, Bachelor in Information Management, Banking BPO Services, Battle Command Knowledge System, Bizagi, Blind credential, Bonita Open Solution, Bricks and clicks, Building lifecycle management, Business informatics, Business Information Services Library, Business Object Model, Business performance management, Business process management, PNMsoft, Business process outsourcing, Business record, Business service management, Business Technology Management, Business transaction performance, Business transformation, Business-to-business, Business-to-employee, Business-to-government, CA IT Process Automation Manager, Cable management, Capability Maturity Model, Capacity management, CatDV, Central Computer and Telecommunications Agency, Change Management (ITSM), Change management auditing, Clean enterprise, Closed Loop Lifecycle Management, Computer-aided facility management, Computer-aided manufacturing, Computer-aided process planning, Computer-integrated manufacturing, Computerized Maintenance Management System, Configuration Management (ITSM), Configuration management database, Consumer privacy, Contract management, Corporate taxonomy, Croquet Project, Cumulus (software), Customer communications management, Customer intelligence, Customer to customer, Data farming, Data warehouse, Data warehouse appliance, Dataspaces, Definitive Media Library, Demand chain, Desktop Outsourcing, Device Management Forum, DevOps, Digital asset management, VFinity, Digital Fuel, DigitalFusion Platform, Direct digital manufacturing, Disintermediation, Distributed development, Document imaging, DocSTAR, Document management system, Dot-com bubble, Downtime, Drill down, Dynamic business process management, E-Booking (UK government project), E-HRM, Early-arriving fact, ETM (Economic Traffic Management), EDIFACT, EFx Factory, Electronic commerce, Electronic data processing, Electronic Document and Records Management System, Electronic Human Resources, Enterprise bus matrix, Enterprise content management, Enterprise information management, Enterprise IT Management, Enterprise Output Management, Enterprise portal, Enterprise project management...and much more. This book explains in-depth the real drivers and workings of IT Service Portfolio Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of IT Service Portfolio Management

Anbieter: Orell Fuessli CH
Stand: 30.05.2020
Zum Angebot
Cybersecurity
83,90 CHF *
ggf. zzgl. Versand

Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. This book is your ultimate resource for Cybersecurity. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Cybersecurity right away, covering: Cyber security standards, Hacker (term), 2007 cyberattacks on Estonia, 2010 cyberattacks on Myanmar, Camfecting, Chinese intelligence operations in the United States, Comprehensive National Cybersecurity Initiative, Computer insecurity, Cyber Operations, Cyber spying, Cyber-security regulation, Cyberattacks during the 2008 South Ossetia war, Cyberstrategy 3.0, Cyberterrorism, Cyberwarfare, Cyberwarfare in the United States, Denial-of-service attack, Echelon (signals intelligence), Electronic warfare, Endgame systems, Espionage, Firewall (computing), Fleet Electronic Warfare Center, GhostNet, Industrial espionage, Information warfare, Internet censorship in the People's Republic of China, Intervasion of the UK, IWar, July 2009 cyber attacks, Küberkaitseliit, List of cyber attack threat trends, Military-digital complex, National Cyber Security Division, National Cybersecurity Center, Political repression of cyber-dissidents, Proactive Cyber Defence, Signals intelligence, Stars virus, Stuxnet, TCP reset attack, W3af, WarVOX, Web brigades, Wireless signal jammer, AFSSI-5020, BLACKER, BS 7799, Common Criteria, CTCPEC, Datacenter star audit, FIPS 140, FIPS 140-2, FIPS 140-3, IEEE 802.10, ISO 15292, ISO 27799, ISO/IEC 27002, ITSEC, Pluggable Authentication Modules, Rainbow Series, Standard of Good Practice, Trusted Computer System Evaluation Criteria, Computer security, Portal:Computer security, 2009 Sidekick data loss, AAFID, Absolute Manage, Accelops, Acceptable use policy, Access token, Advanced Persistent Threat, Air gap (networking), Ambient authority, Anomaly-based intrusion detection system, Application firewall, Application security, Asset (computer security), Attack (computer), AutoRun, Blacklist (computing), Blue Cube Security, BlueHat, Centurion guard, Client honeypot, Cloud computing security, Collaboration-oriented architecture, Committee on National Security Systems, Computer Law and Security Report, Computer security compromised by hardware failure, Computer security incident management, Computer security model, Computer surveillance, Confused deputy problem, Countermeasure (computer), CPU modes, Crackme, Cross-site printing, CryptoRights Foundation, CVSS, Control system security, Cyber Storm Exercise, Cyber Storm II, Cyberheist, Dancing pigs, Data breach, Data loss prevention software, Data validation, Digital self-defense, Dolev-Yao model, DREAD: Risk assessment model, Dynamic SSL, Economics of security, Enterprise information security architecture, Entrust, Evasion (network security), Event data, Federal Desktop Core Configuration, Federal Information Security Management Act of 2002, Flaw hypothesis methodology, Footprinting, Forward anonymity, Four Horsemen of the Infocalypse, Fragmented distribution attack, Higgins project, High Assurance Guard, Host Based Security System, Human-computer interaction (security), Inference attack, Information assurance...and much more This book explains in-depth the real drivers and workings of Cybersecurity. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Cybersecurity

Anbieter: Orell Fuessli CH
Stand: 30.05.2020
Zum Angebot
It Service Portfolio Management
48,99 € *
ggf. zzgl. Versand

IT portfolio management is the application of systematic management to large classes of items managed by enterprise Information Technology (IT) capabilities. Examples of IT portfolios would be planned initiatives, projects, and ongoing IT services (such as application support). The promise of IT portfolio management is the quantification of previously informal IT efforts, enabling measurement and objective evaluation of investment scenarios. This book is your ultimate resource for IT Service Portfolio Management. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about IT Service Portfolio Management right away, covering: IT portfolio management, Information technology, Val IT, Balanced scorecard, Vertical integration, Application Portfolio Management, Project portfolio management, Information Technology Infrastructure Library, Information Systems Audit and Control Association, Institute of Electrical and Electronics Engineers, Corporate governance of information technology, IT service management, Enterprise architecture, Integrated business planning, Information technology management, Data proliferation, Information Lifecycle Management, Information repository, Storage virtualization, 25U Signal Support Systems Specialist, Aarohan, Accelops, Advanced planning and scheduling, Application Services Library, Autonomic Networking, Bachelor in Information Management, Banking BPO Services, Battle Command Knowledge System, Bizagi, Blind credential, Bonita Open Solution, Bricks and clicks, Building lifecycle management, Business informatics, Business Information Services Library, Business Object Model, Business performance management, Business process management, PNMsoft, Business process outsourcing, Business record, Business service management, Business Technology Management, Business transaction performance, Business transformation, Business-to-business, Business-to-employee, Business-to-government, CA IT Process Automation Manager, Cable management, Capability Maturity Model, Capacity management, CatDV, Central Computer and Telecommunications Agency, Change Management (ITSM), Change management auditing, Clean enterprise, Closed Loop Lifecycle Management, Computer-aided facility management, Computer-aided manufacturing, Computer-aided process planning, Computer-integrated manufacturing, Computerized Maintenance Management System, Configuration Management (ITSM), Configuration management database, Consumer privacy, Contract management, Corporate taxonomy, Croquet Project, Cumulus (software), Customer communications management, Customer intelligence, Customer to customer, Data farming, Data warehouse, Data warehouse appliance, Dataspaces, Definitive Media Library, Demand chain, Desktop Outsourcing, Device Management Forum, DevOps, Digital asset management, VFinity, Digital Fuel, DigitalFusion Platform, Direct digital manufacturing, Disintermediation, Distributed development, Document imaging, DocSTAR, Document management system, Dot-com bubble, Downtime, Drill down, Dynamic business process management, E-Booking (UK government project), E-HRM, Early-arriving fact, ETM (Economic Traffic Management), EDIFACT, EFx Factory, Electronic commerce, Electronic data processing, Electronic Document and Records Management System, Electronic Human Resources, Enterprise bus matrix, Enterprise content management, Enterprise information management, Enterprise IT Management, Enterprise Output Management, Enterprise portal, Enterprise project management...and much more. This book explains in-depth the real drivers and workings of IT Service Portfolio Management. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of IT Service Portfolio Management

Anbieter: Thalia AT
Stand: 30.05.2020
Zum Angebot
Cybersecurity
48,99 € *
ggf. zzgl. Versand

Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. This book is your ultimate resource for Cybersecurity. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Cybersecurity right away, covering: Cyber security standards, Hacker (term), 2007 cyberattacks on Estonia, 2010 cyberattacks on Myanmar, Camfecting, Chinese intelligence operations in the United States, Comprehensive National Cybersecurity Initiative, Computer insecurity, Cyber Operations, Cyber spying, Cyber-security regulation, Cyberattacks during the 2008 South Ossetia war, Cyberstrategy 3.0, Cyberterrorism, Cyberwarfare, Cyberwarfare in the United States, Denial-of-service attack, Echelon (signals intelligence), Electronic warfare, Endgame systems, Espionage, Firewall (computing), Fleet Electronic Warfare Center, GhostNet, Industrial espionage, Information warfare, Internet censorship in the People's Republic of China, Intervasion of the UK, IWar, July 2009 cyber attacks, Küberkaitseliit, List of cyber attack threat trends, Military-digital complex, National Cyber Security Division, National Cybersecurity Center, Political repression of cyber-dissidents, Proactive Cyber Defence, Signals intelligence, Stars virus, Stuxnet, TCP reset attack, W3af, WarVOX, Web brigades, Wireless signal jammer, AFSSI-5020, BLACKER, BS 7799, Common Criteria, CTCPEC, Datacenter star audit, FIPS 140, FIPS 140-2, FIPS 140-3, IEEE 802.10, ISO 15292, ISO 27799, ISO/IEC 27002, ITSEC, Pluggable Authentication Modules, Rainbow Series, Standard of Good Practice, Trusted Computer System Evaluation Criteria, Computer security, Portal:Computer security, 2009 Sidekick data loss, AAFID, Absolute Manage, Accelops, Acceptable use policy, Access token, Advanced Persistent Threat, Air gap (networking), Ambient authority, Anomaly-based intrusion detection system, Application firewall, Application security, Asset (computer security), Attack (computer), AutoRun, Blacklist (computing), Blue Cube Security, BlueHat, Centurion guard, Client honeypot, Cloud computing security, Collaboration-oriented architecture, Committee on National Security Systems, Computer Law and Security Report, Computer security compromised by hardware failure, Computer security incident management, Computer security model, Computer surveillance, Confused deputy problem, Countermeasure (computer), CPU modes, Crackme, Cross-site printing, CryptoRights Foundation, CVSS, Control system security, Cyber Storm Exercise, Cyber Storm II, Cyberheist, Dancing pigs, Data breach, Data loss prevention software, Data validation, Digital self-defense, Dolev-Yao model, DREAD: Risk assessment model, Dynamic SSL, Economics of security, Enterprise information security architecture, Entrust, Evasion (network security), Event data, Federal Desktop Core Configuration, Federal Information Security Management Act of 2002, Flaw hypothesis methodology, Footprinting, Forward anonymity, Four Horsemen of the Infocalypse, Fragmented distribution attack, Higgins project, High Assurance Guard, Host Based Security System, Human-computer interaction (security), Inference attack, Information assurance...and much more This book explains in-depth the real drivers and workings of Cybersecurity. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Cybersecurity

Anbieter: Thalia AT
Stand: 30.05.2020
Zum Angebot