語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
System Administration Ethics = Ten C...
~
Ljubuncic, Igor.
System Administration Ethics = Ten Commandments for Security and Compliance in a Modern Cyber World /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
System Administration Ethics/ by Igor Ljubuncic, Tom Litterer.
其他題名:
Ten Commandments for Security and Compliance in a Modern Cyber World /
作者:
Ljubuncic, Igor.
其他作者:
Litterer, Tom.
面頁冊數:
XXXI, 290 p. 18 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-1-4842-4988-8
ISBN:
9781484249888
System Administration Ethics = Ten Commandments for Security and Compliance in a Modern Cyber World /
Ljubuncic, Igor.
System Administration Ethics
Ten Commandments for Security and Compliance in a Modern Cyber World /[electronic resource] :by Igor Ljubuncic, Tom Litterer. - 1st ed. 2019. - XXXI, 290 p. 18 illus.online resource.
Chapter 1: In the Beginning -- Chapter 2: Separate Roles -- Chapter 3: Respect Privacy -- Chapter 4: Do Not Change Data -- Chapter 5: Don't Steal (Intellectual Property) -- Chapter 6: Don't Steal (Computers) -- Chapter 7: Do Not Go Where You Are Not Wanted -- Chapter 8: Follow Procedures and Get Out -- Chapter 9: Communicate Change -- Chapter 10: Do No Harm -- Chapter 11: Break Glass.
Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today’s digital landscape. This book serves as a equitable guideline in helping system administrators, engineers – as well as their managers – on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see how to correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments. Using the appropriate rules of engagement, best policies and practices, and proactive “building/strengthening” behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment. .
ISBN: 9781484249888
Standard No.: 10.1007/978-1-4842-4988-8doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
System Administration Ethics = Ten Commandments for Security and Compliance in a Modern Cyber World /
LDR
:03115nam a22003855i 4500
001
1011001
003
DE-He213
005
20200701121936.0
007
cr nn 008mamaa
008
210106s2019 xxu| s |||| 0|eng d
020
$a
9781484249888
$9
978-1-4842-4988-8
024
7
$a
10.1007/978-1-4842-4988-8
$2
doi
035
$a
978-1-4842-4988-8
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Ljubuncic, Igor.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1305126
245
1 0
$a
System Administration Ethics
$h
[electronic resource] :
$b
Ten Commandments for Security and Compliance in a Modern Cyber World /
$c
by Igor Ljubuncic, Tom Litterer.
250
$a
1st ed. 2019.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2019.
300
$a
XXXI, 290 p. 18 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: In the Beginning -- Chapter 2: Separate Roles -- Chapter 3: Respect Privacy -- Chapter 4: Do Not Change Data -- Chapter 5: Don't Steal (Intellectual Property) -- Chapter 6: Don't Steal (Computers) -- Chapter 7: Do Not Go Where You Are Not Wanted -- Chapter 8: Follow Procedures and Get Out -- Chapter 9: Communicate Change -- Chapter 10: Do No Harm -- Chapter 11: Break Glass.
520
$a
Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today’s digital landscape. This book serves as a equitable guideline in helping system administrators, engineers – as well as their managers – on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see how to correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments. Using the appropriate rules of engagement, best policies and practices, and proactive “building/strengthening” behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment. .
650
0
$a
Data protection.
$3
557764
650
0
$a
Business ethics.
$3
555013
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Business Ethics.
$3
1069082
650
2 4
$a
Systems and Data Security.
$3
677062
700
1
$a
Litterer, Tom.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1305127
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484249871
776
0 8
$i
Printed edition:
$z
9781484249895
856
4 0
$u
https://doi.org/10.1007/978-1-4842-4988-8
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入