Search Results - Max Cryer~

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Last post by Arthur, Max 1939-

    Published 2005
    Book
  2. 2

    Essentials of inventory management by Muller, Max 1947

    Published 2019
    Book
  3. 3

    Oxford handbook of palliative care by Watson, Max S., Lucas, Caroline, Hoy, Andrew, Wells, Jo

    Published 2009
    Book
  4. 4

    The complexity of modern asymmetric warfare by Manwaring, Max G.

    Published 2012
    Book
  5. 5
  6. 6

    Mastering automotive challenges

    Published 2007
    Table of Contents: “…/ Silvio Schindler -- The market challenge : who will gain strategic control? / J�urgen Reers -- The sales and after-sales challenge : capturing value along the car lifecycle / Max Blanchet and Jacques Rade -- Partnership as a model for success / Franz Fehrenbach -- Brand differentiation on the basis of platform and module strategies / Bernd Pischetsrieder -- Visteon corporation : transforming from OEM to supplier / Heinz Pfannschmidt -- New impetus for General Motors in Europe / Carl-Peter Forster -- How electronics is changing the automotive industry : from component suppliers to system partners / Peter Bauer -- The next evolutionary step for the automotive industry is just around the corner : factors for sustainable success in the interplay of OEMs and suppliers / Siegfried Wolf -- BlueTec : the path to the world's cleanest diesel / Thomas Weber -- Bharat Forge : emerging players from emerging regions / Babasaheb N Kalyani.…”
    ebrary
    NetLibrary
    An electronic book accessible through the World Wide Web; click for information
    Table of contents only
    Publisher description
    Electronic eBook
  7. 7

    Information security and IT risk management by Agrawal, Manish

    Published 2014
    Table of Contents: “…-- Design case -- ch. 9 Hardware and Software Controls -- Overview -- Password management -- Access control -- Firewalls -- Intrusion detection/prevention systems -- Patch management for operating systems and applications -- End-point protection -- Example case -- AirTight networks -- Chapter review questions -- Example case questions -- Hands-on activity -- host-based IDS (OSSEC) -- Critical thinking exercise -- extra-human security controls -- Design case -- ch. 10 Shell Scripting -- Overview -- Introduction -- Output redirection -- Text manipulation -- Variables -- Conditionals -- User input -- Loops -- Putting it all together -- Example case -- Max Butler -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic scripting -- Critical thinking exercise -- script security -- Design case -- ch. 11 Incident Handling -- Introduction -- Incidents overview -- Incident handling -- The disaster -- Example case -- on-campus piracy -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- incident timeline using OSSEC -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 12 Incident Analysis -- Introduction -- Log analysis -- Event criticality -- General log configuration and maintenance -- Live incident response -- Timelines -- Other forensics topics -- Example case -- backup server compromise -- Chapter review questions -- Example case questions -- Hands-on activity -- server log analysis -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 13 Policies, Standards, and Guidelines -- Introduction -- Guiding principles -- Writing a policy -- Impact assessment and vetting -- Policy review -- Compliance -- Key policy issues -- Example case -- HB Gary -- Summary -- Reference -- Chapter review questions -- Example case questions -- Hands-on activity -- create an AUP -- Critical thinking exercise -- Aaron Swartz -- Design case -- ch. 14 IT Risk Analysis and Risk Management -- Overview -- Introduction -- Risk management as a component of organizational management -- Risk-management framework -- The NIST 800-39 framework -- Risk assessment -- Other risk-management frameworks -- IT general controls for Sarbanes--Oxley compliance -- Compliance versus risk management -- Selling security -- Example case -- online marketplace purchases -- Summary -- Chapter review questions -- Hands-on activity -- risk assessment using LSOF -- Critical thinking exercise -- risk estimation biases -- Design case.…”
    Book