Search Results: 'security monitoring'

Search

×
×
×
×
65 results for "security monitoring"
Selecting Video Monitors For The Home Features Of The Best Video Monitor By Neville Francis Francis
eBook (ePub): $2.99
Download immediately.
With the ever increasing rate of crime, security has become an important concern for many people and as such new and innovative ways are being found to get that sense of peace that so many other... More > individuals desire. “Selecting Video Monitors For The Home” is one of the books that can help the homeowner or small business person learn the best ways that they can monitor what is going on in their premises. Bear in mind that crime is not simply restricted to individuals that steal something but also those individuals who may be carrying out unscrupulous actions in the home. It may be the housekeeper, the nanny or the private tutor, with an effective video monitor, that can all be kept track of. Also bear in mind that the video monitor may not be for security purposes alone as they do serve many other purposes. This book helps the reader to find the best one that will suit their needs.< Less
Email and IM Governance, Security & Archiving Developing, Monitoring, and Enforcing Email, IM & Electronic Communications Policy Successfully By Robert Smallwood, E-Records Institute
Paperback: $129.00
Ships in 3-5 business days.
This updated and expanded report is current for Fall 2011. It is an email and IM policy, governance, security and archiving Management Guide. The Guide includes trends in email control including... More > using cloud services, email encryption, and also how to manage the security and compliance risks of using corporate IM. It covers Best Practices and methods for developing a comprehensive email policy supported and enforced by email monitoring/management software. The goal is to comply with regulations and governance policies while readying the organization for any potential litigation. The report even includes a review of preparations and processes needed for the Federal Rules of Civil Procedure. The author is Robert Smallwood, directs the E-Records Institute and is a Partner at IMERGE Consulting, and expert in enterprise content management (ECM) specializing in email archiving, e-records and e-discovery. He is the author of the book, "Taming the Email Tiger" and over 100 articles on related topics.< Less
Online Security For Children - Best Computer Security For The Protection Of Your Children By Tommy Smith
eBook (PDF): $7.76
Download immediately.
In Online Security For Children, you would learn how to protect your children online from the risks on intruders or viruses. From this book, you would discover:- *Warning Signs That You Would Get... More > From Your Children Surfing Tendencies *Monitoring And Protection Software That Is Right For You *How To Avoid Sexual Predators *Protecting Your Identify *Malware And Spyware To Be Careful *Protect Your Child On Social Networks *Important Advice That You Should Give Your Children Get this book now if you want to protect your lovely children from being harmed by other people. This is an important book to get to protect the children that you so love.< Less
Privacy & Security Considerations for Information Governance By Robert F. Smallwood, E-Records Institute
eBook (PDF): $99.00
Download immediately.
This new 2013 Management Guide covers privacy and security issues for Information Governance (IG). It reveals potential sources of data and document leaks, and pinpoints information technology and... More > policy solutions to counter threats. Technologies such as data loss prevention (DLP), information rights management (IRM), document analytics, database monitoring, identity access management, and more are discussed, and solutions are offered. It also covers privacy issues and major laws and considerations for keeping certain information, such as personally identifiable information (PII) private. A critical resource for records, compliance, risk, and information governance professionals, preview the Table of Contents and get your Management Guide today.< Less
Topic: Crown Capital Management Jakarta Indonesia - Environmental Monitoring By Pao Daiki
eBook (PDF): $9.03
Download immediately.
Crown Capital Eco Management group does not guarantee that any transmission of data over the Internet is completely secure. We cannot ensure or warrant the security of any information you transmit to... More > us and such transmission is done at your own risk.< Less
DAM - Database Activity Monitoring: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors By Kevin Roebuck
Paperback: $39.95
Ships in 3-5 business days.
The Knowledge Solution. Stop Searching, Stand Out and Pay Off. The #1 ALL ENCOMPASSING Guide to DAM. An Important Message for ANYONE who wants to learn about DAM Quickly and Easily... "Here's... More > Your Chance To Skip The Struggle and Master DAM, With the Least Amount of Effort, In 2 Days Or Less..." Database activity monitoring (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS-resident) auditing or native logs such as trace or transaction logs. DAM is typically performed continuously and in real-time. Get the edge, learn EVERYTHING you need to know about DAM, and ace any discussion, proposal and implementation with the ultimate book – guaranteed to give you the education that you need, faster than you ever dreamed possible!< Less
Red Hat Enterprise Linux 5: Administration, Security, Desktop By Richard Petersen
eBook (PDF): $12.00
Download immediately.
This book is designed as an administration, security, and desktop reference for Red Hat Enterprise Linux 5. Administration tools are covered as well as the underlying configuration files and system... More > implementations. Desktop and shell operations are also examined. Topics covered include user management, devices, kernel customization, software installs, virtualization, services, monitoring, shell configuration, encryption, authentication, SELinux, firewalls, file systems, RAID and LVM, desktop preferences, GNOME, KDE, desktop applications, shared folders, shell commands, and printers. Coverage includes Red Hat Enterprise Linux 5.1 and 5.2. Installation and setup are also covered. The ebook is fully linked, with links for contents, tables, figures, index, and Web addresses.< Less
Network Security: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors By Kevin Roebuck
Paperback: $49.95
Ships in 3-5 business days.
In the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification,... More > or denial of the computer network and network-accessible resources. Network Security is the authorization of access to data in a network, which is controlled by the network administrator. Users are assigned an ID and password that allows them access to information and programs within their authority. Network Security covers a variety of computer networks, both public and private that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. This book is your ultimate resource for Network Security. Here you will find the most up-to-date information, analysis, background and everything you need to know.< Less
Managed Security Services: High-impact Strategies - What You Need to Know: Definitions, Adoptions, Impact, Benefits, Maturity, Vendors By Kevin Roebuck
Paperback: $59.95
Ships in 3-5 business days.
Managed Security Services (MSS) are network security services that have been outsourced to a service provider. A company providing such a service is a managed security service provider (MSSP) Also... More > Managed security services (MSS) is a systematic approach to managing an organization's security needs. The services may be conducted in house or outsourced to a service provider that oversees other companies' network and information system security. Functions of a managed security service include round-the-clock monitoring and management of intrusion detection systems and firewalls, overseeing patch management and upgrades, performing security assessments and security audits, and responding to emergencies. There are products available from a number of vendors to help organize and guide the procedures involved. This book is your ultimate resource for Managed Security Services. Here you will find the most up-to-date information, analysis, background and everything you need to know.< Less
Availability Management for IT Services Best Practice Handbook - proactively manage and maintain Service Levels to meet SLA expectations in Reliability, Maintainability, Serviceability, Resilience and Security - Ready to use bringing Theory into Action By Gerard Blokdijk
Paperback: $49.95
Ships in 3-5 business days.
Availability Management allows organizations to sustain the IT service availability in order to support the business at a justifiable cost. The activities are Realize Availability Requirements,... More > Compile Availability Plan, Monitor Availability, and Monitor Maintenance Obligations. The object of Availability Management is to ensure that IT Services and the supporting Infrastructure can be delivered in a cost effective manner, with a sustained level of Availability, in line with your business objectives. Availability Management is a critical ITIL process area and one that delivers measurable benefits. The Availability Management Workbook provides a wide variety of resources to boost your understanding and ability to implement availability management in your organization. It is tailor-fit for IT managers who need to move towards a services-oriented organization, but they don't have the time or resources at hand to develop the required templates and structure for implementation.< Less