Angebote zu "Technical" (1.201 Treffer)

Kategorien

Shops

Security Technical Implementation Guide
34,00 € *
ggf. zzgl. Versand

A Security Technical Implementation Guide or STIG is a methodology for standardized secure installation and maintenance of computer software and hardware. The term was coined by DISA who creates configuration documents in support of the United States Department of Defense (DoD). The implementation guidelines include recommended administrative processes and span over the lifecycle of the device. An example where STIGs would be of benefit is in the configuration of a desktop computer. Most operating systems are ordinarily usable in a wide-range of environments. This leaves them open to easily being controlled by malicious people, such as identity thieves and computer hackers.

Anbieter: Dodax
Stand: 19.01.2020
Zum Angebot
Panda Internet Security Download Card
6,99 € *
zzgl. 3,49 € Versand

Panda Internet Security 2014 is more than just a simple security system. The new Panda Internet Security 2014 makes it easy to use and provides intuitive protection for your computer. Simply install it to protect your data and avoid the dangers of the internet. With the PC recovery system you can start your computer in safe mode and cure it from viruses in emergencies or critical scenarios. You can even share this with other people to help them clean their computers. Protect your PC from all sorts of known and unknown threats. Install it to protect your family from inappropriate content, while also shielding your documents and confidential data. With Panda Internet Security 2014 you can ensure your private files are safe. Protect your family from online fraud, phishing, identity theft and other threats. Installing security software has never been easier, Panda is light, fast and quick to install. Panda Internet Security 2014 is a modern and intuitive user experience just like the latest operating systems. - A.D. Features: Panda Internet Security 2014 Download Card Panda Internet Security offers a new protection model based on a user community where everyone contributes. Your computer will always be updated and protected. Additionally, your PC won't limit detection capabilities as Panda's huge virus detection database is located on the Internet (in the Cloud) Protection against spyware, phishing (online fraud), rootkits (stealth techniques) and banker Trojans. Real-time protection New Web Filter for safe Web browsing Complete protection against known and unknown virus attacks Vaccinate your USB flash drives against infections Firewall. Block intruders and hackers, even on your wireless network Technical Specifications: Operating System: Windows 8 (32-bit and 64-bit), Windows 7 (32-bit and 64-bit), Windows Vista (32-bit and 64-bit), Windows XP (32-bit only) Technical Requirements: Processor: Pentium 300 MHz or faster, RAM: 128 MB (1 GB recommended), Hard Disk: 265 MB free space, MS Internet Explorer 6.0 Supported Browser: Microsoft Internet Explorer 6.0 or higher, Mozilla Firefox 2 or higher, Google Chrome

Anbieter: Sowaswillichauch
Stand: 19.01.2020
Zum Angebot
Romantic Residues
13,66 € *
ggf. zzgl. Versand

"Gilchrist is now unsurpassed among lyric tenors in sweetness and technical security, and for his musical intelligence" - The Independent

Anbieter: Dodax
Stand: 19.01.2020
Zum Angebot
Romantic Residues
13,99 € *
ggf. zzgl. Versand

"Gilchrist is now unsurpassed among lyric tenors in sweetness and technical security, and for his musical intelligence" - The Independent

Anbieter: Dodax AT
Stand: 19.01.2020
Zum Angebot
ICT Security Readiness Checklist for Developing...
79,00 € *
ggf. zzgl. Versand

The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes, impacting the way we work, learn and live. To be a part in this revolution, the governments and organisations must meet the security challenges of exploiting the benefits of ICT, as many of the technical and social security controls are rendered ineffective by the revolution. The multiplicity of new technical possibilities gives rise to both good and bad ends. Thus, new social and technical security controls are imperative in this revolution. This book therefore provides means for evaluation, formation and implementation of ICT security controls. The Social- Technical ICT Security Readiness Checklist can be helpful in managing the risks that ICT presents. Also the challenges of the process of computerisation and other changes due to ICT are investigated in the book from a security point of view.The checklist would serve as a starting point in assisting organizations to meet the security challenges of exploiting the benefits of ICT.

Anbieter: Dodax
Stand: 19.01.2020
Zum Angebot
ICT Security Readiness Checklist for Developing...
81,30 € *
ggf. zzgl. Versand

The consequences of Information and Communication Technology revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes, impacting the way we work, learn and live. To be a part in this revolution, the governments and organisations must meet the security challenges of exploiting the benefits of ICT, as many of the technical and social security controls are rendered ineffective by the revolution. The multiplicity of new technical possibilities gives rise to both good and bad ends. Thus, new social and technical security controls are imperative in this revolution. This book therefore provides means for evaluation, formation and implementation of ICT security controls. The Social- Technical ICT Security Readiness Checklist can be helpful in managing the risks that ICT presents. Also the challenges of the process of computerisation and other changes due to ICT are investigated in the book from a security point of view.The checklist would serve as a starting point in assisting organizations to meet the security challenges of exploiting the benefits of ICT.

Anbieter: Dodax AT
Stand: 19.01.2020
Zum Angebot
The Manager's Guide to Web Application Security
50,97 € *
ggf. zzgl. Versand

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the technical barrier and identifies many real-world examples of security vulnerabilities commonly found by IT security auditors, translates them into business risks with identifiable consequences, and provides practical guidance about mitigating them.The Manager's Guide to Web Application Security describes how to fix and prevent these vulnerabilities in easy-to-understand discussions of vulnerability classes and their remediation. For easy reference, the information is also presented schematically in Excel spreadsheets available to readers for free download from the publisher's digital annex. The book is current, concise, and to the point - which is to help managers cut through the technical jargon and make the business decisions required to find, fix, and prevent serious vulnerabilities.

Anbieter: Dodax AT
Stand: 19.01.2020
Zum Angebot
The Manager's Guide to Web Application Security
50,97 € *
ggf. zzgl. Versand

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are the result of intricate programming deficiencies and highly technical issues. Author and noted industry expert Ron Lepofsky breaks down the technical barrier and identifies many real-world examples of security vulnerabilities commonly found by IT security auditors, translates them into business risks with identifiable consequences, and provides practical guidance about mitigating them.The Manager's Guide to Web Application Security describes how to fix and prevent these vulnerabilities in easy-to-understand discussions of vulnerability classes and their remediation. For easy reference, the information is also presented schematically in Excel spreadsheets available to readers for free download from the publisher's digital annex. The book is current, concise, and to the point - which is to help managers cut through the technical jargon and make the business decisions required to find, fix, and prevent serious vulnerabilities.

Anbieter: Dodax
Stand: 19.01.2020
Zum Angebot
Panda Internet Security Download Card
35,99 € *
zzgl. 1,49 € Versand

Panda Internet Security 2014 is more than just a simple security system. The new Panda Internet Security 2014 makes it easy to use and provides intuitive protection for your computer. Simply install it to protect your data and avoid the dangers of the internet. With the PC recovery system you can start your computer in safe mode and cure it from viruses in emergencies or critical scenarios. You can even share this with other people to help them clean their computers. Protect your PC from all sorts of known and unknown threats. Install it to protect your family from inappropriate content, while also shielding your documents and confidential data. With Panda Internet Security 2014 you can ensure your private files are safe. Protect your family from online fraud, phishing, identity theft and other threats. Installing security software has never been easier, Panda is light, fast and quick to install. Panda Internet Security 2014 is a modern and intuitive user experience just like the latest operating systems. - A.D. Features: Panda Internet Security 2014 Download Card Panda Internet Security offers a new protection model based on a user community where everyone contributes. Your computer will always be updated and protected. Additionally, your PC won't limit detection capabilities as Panda's huge virus detection database is located on the Internet (in the Cloud) Protection against spyware, phishing (online fraud), rootkits (stealth techniques) and banker Trojans. Real-time protection New Web Filter for safe Web browsing Complete protection against known and unknown virus attacks Vaccinate your USB flash drives against infections Firewall. Block intruders and hackers, even on your wireless network Technical Specifications: Operating System: Windows 8 (32-bit and 64-bit), Windows 7 (32-bit and 64-bit), Windows Vista (32-bit and 64-bit), Windows XP (32-bit only) Technical Requirements: Processor: Pentium 300 MHz or faster, RAM: 128 MB (1 GB recommended), Hard Disk: 265 MB free space, MS Internet Explorer 6.0 Supported Browser: Microsoft Internet Explorer 6.0 or higher, Mozilla Firefox 2 or higher, Google Chrome

Anbieter: Zavvi
Stand: 19.01.2020
Zum Angebot