Search Results - Max Cryer~
Suggested Topics within your search.
Suggested Topics within your search.
- Asymmetric warfare 1
- Auto-industrie 1
- Automobile industry and trade 1
- Computer networks 1
- Computer security 1
- Forecasting 1
- Gestion des stocks 1
- Human engineering 1
- Inventory control 1
- Military policy 1
- Palliative Care 1
- Palliative treatment 1
- Security measures 1
- Technological innovations 1
- Veterans 1
- War 1
- World War, 1914-1918 1
- management 1
-
1
-
2
-
3
-
4
-
5
-
6
Mastering automotive challenges
Published 2007Table of Contents: “…/ Silvio Schindler -- The market challenge : who will gain strategic control? / J�urgen Reers -- The sales and after-sales challenge : capturing value along the car lifecycle / Max Blanchet and Jacques Rade -- Partnership as a model for success / Franz Fehrenbach -- Brand differentiation on the basis of platform and module strategies / Bernd Pischetsrieder -- Visteon corporation : transforming from OEM to supplier / Heinz Pfannschmidt -- New impetus for General Motors in Europe / Carl-Peter Forster -- How electronics is changing the automotive industry : from component suppliers to system partners / Peter Bauer -- The next evolutionary step for the automotive industry is just around the corner : factors for sustainable success in the interplay of OEMs and suppliers / Siegfried Wolf -- BlueTec : the path to the world's cleanest diesel / Thomas Weber -- Bharat Forge : emerging players from emerging regions / Babasaheb N Kalyani.…”
ebrary
NetLibrary
An electronic book accessible through the World Wide Web; click for information
Table of contents only
Publisher description
Electronic eBook -
7
Information security and IT risk management
Published 2014Table of Contents: “…-- Design case -- ch. 9 Hardware and Software Controls -- Overview -- Password management -- Access control -- Firewalls -- Intrusion detection/prevention systems -- Patch management for operating systems and applications -- End-point protection -- Example case -- AirTight networks -- Chapter review questions -- Example case questions -- Hands-on activity -- host-based IDS (OSSEC) -- Critical thinking exercise -- extra-human security controls -- Design case -- ch. 10 Shell Scripting -- Overview -- Introduction -- Output redirection -- Text manipulation -- Variables -- Conditionals -- User input -- Loops -- Putting it all together -- Example case -- Max Butler -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic scripting -- Critical thinking exercise -- script security -- Design case -- ch. 11 Incident Handling -- Introduction -- Incidents overview -- Incident handling -- The disaster -- Example case -- on-campus piracy -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- incident timeline using OSSEC -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 12 Incident Analysis -- Introduction -- Log analysis -- Event criticality -- General log configuration and maintenance -- Live incident response -- Timelines -- Other forensics topics -- Example case -- backup server compromise -- Chapter review questions -- Example case questions -- Hands-on activity -- server log analysis -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 13 Policies, Standards, and Guidelines -- Introduction -- Guiding principles -- Writing a policy -- Impact assessment and vetting -- Policy review -- Compliance -- Key policy issues -- Example case -- HB Gary -- Summary -- Reference -- Chapter review questions -- Example case questions -- Hands-on activity -- create an AUP -- Critical thinking exercise -- Aaron Swartz -- Design case -- ch. 14 IT Risk Analysis and Risk Management -- Overview -- Introduction -- Risk management as a component of organizational management -- Risk-management framework -- The NIST 800-39 framework -- Risk assessment -- Other risk-management frameworks -- IT general controls for Sarbanes--Oxley compliance -- Compliance versus risk management -- Selling security -- Example case -- online marketplace purchases -- Summary -- Chapter review questions -- Hands-on activity -- risk assessment using LSOF -- Critical thinking exercise -- risk estimation biases -- Design case.…”
Book


