Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Material
Type of Publication
Consortium
  • 1
    AV-Medium
    AV-Medium
    Happy Product Inc.
    UID:
    (DE-603)448262835
    Format: 2 DVD-Videos (60 min)
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    (DE-602)b3kat_BV048720485
    Format: 2 Blu-ray-Discs (107 Min.)
    Uniform Title: The little prince
    Content: Ein Mädchen wird von seiner Mutter mit manischer Verbissenheit auf Leistung gedrillt. In seine streng reglementierte Welt dringen einzelne Kapitel aus dem Buch eines schrulligen alten Nachbarn, der früher als Pilot tätig war. Antoine de Saint-Exupérys Geschichten vom kleinen Prinzen und dem Fuchs durchdringen die Gegenwartshandlung und plädieren dafür, dass die Kindheit nicht durch gesellschaftliche Zwänge ausgelöscht werden darf. Die eigenwillige Märchenadaption kombiniert innovativ 3D-Animation mit Stopptrick-Verfahren, wobei der "amerikanische Touch" der Inszenierung der zauberhaften Anverwandlung einen opernhaften Schwung verleiht. - Sehenswert ab 6. [Film-Dienst]
    Note: dt. / UT: dt. für Hörgesch.
    Language: German
    Keywords: Blu-Ray-Disc
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    AV-Medium
    AV-Medium
    UID:
    (DE-602)kobvindex_VBRD-osbmardeklprkl16d
    Format: 1 DVD (Laufzeit ca. 102 Min.)
    Content: Es freundet sich ein exzentrischer alter Flieger mit einem kleinen Mädchen an, das mit seiner sehr erwachsenen Mutter nebenan einzieht. Über das Buch und die Zeichnungen des Fliegers erfährt das kleine Mädchen, wie er einst in der Wüste notlanden musste und dort den kleinen Prinzen kennenlernte, einen seltsamen Jungen von einem entfernten Planeten...
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Rockland, MA : Syngress
    UID:
    (DE-603)195219058
    Format: XXV, 315 S.
    Edition: Online-Ausg. Amsterdam [u.a.] Elsevier 2006 Online-Ressource ISBN 9781597491105
    Edition: [Online-Ausg.]
    ISBN: 9781597491105 (Sekundärausgabe)
    Note: Online-Ausg.:
    Language: English
    Subjects: Computer Science
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    Rockland, Mass. : Syngress
    UID:
    (DE-605)HT015186459
    Format: XXV,315 S. : graph. Darst.
    ISBN: 1597491101
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Rockland : William Andrew
    UID:
    (DE-627)1658370422
    Format: 1 online resource (345 pages)
    Edition: 1st ed.
    ISBN: 9780080508283
    Series Statement: How to Cheat Ser
    Content: This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure * A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies * Navigate through jargon filled meetings with this handy aid * Provides information on understanding the design flaws of E-commerce and DMZ infrastructure.
    Content: Front Cover -- How to Cheat at Managing Information Security -- Copyright Page -- Contents -- Preface -- Introduction -- Chapter 1. The Security Organization -- Anecdote -- Introduction -- Where Should Security Sit? Below the CEO, CTO, or CFO -- Your Mission: If You Choose to Accept It -- Role of the Security Function: What's in a Job? -- The Hybrid Security Team: Back to Organizational Studies -- What Makes a Good CISO? -- Summary -- Chapter 2. The Information Security Policy -- Anecdote -- Introduction -- Policy, Strategy, and Standards: Business Theory -- Back to Security -- The Security Strategy and the Security Planning Process -- Security Policy Revisited -- Security Standards Revisited -- Compliance and Enforcement -- Summary -- Chapter 3. Jargon, Principles, and Concepts -- Anecdote -- Introduction -- CIA: Confidentiality, Integrity, and Availability -- The Vulnerability Cycle -- Types of Controls -- Risk Analysis -- AAA -- Other Concepts You Need to Know -- Generic Types of Attack -- Summary -- Chapter 4. Information Security Laws and Regulations -- Anecdote -- Introduction -- U.K. Legislation -- U.S. Legislation -- Summary -- Chapter 5. Information Security Standards and Audits -- Anecdote -- Introduction -- ISO/IEC 27001:2005: What Now for BS 7799? -- PAS 56 -- FIPS 140-2 -- Common Criteria Certification -- Types of Audit -- Summary -- Chapter 6. Interviews, Bosses, and Staff -- Anecdote -- Introduction -- Bosses -- Worst Employees -- Summary -- Chapter 7. Infrastructure Security -- Anecdote -- Introduction -- E-commerce -- Just Checking -- Summary -- Chapter 8. Firewalls -- Anecdote -- Introduction -- Firewall Structure and Design -- Other Types of Firewalls -- Commercial Firewalls -- Summary -- Chapter 9. Intrusion Detection Systems: Theory -- Anecdote -- Introduction -- Why Bother with an IDS? -- NIDS in Your Hair.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: 9781597491105
    Additional Edition: Erscheint auch als Druck-Ausgabe 9781597491105
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Rockland, MA : Syngress Publishing
    UID:
    (DE-604)BV044083704
    Format: xxv, 315 p
    ISBN: 9780080508283 , 1597491101
    Language: English
    Keywords: Managementinformationssystem ; Datensicherung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    AV-Medium
    AV-Medium
    〈〈[S.l.]〉〉 : Bad Clams
    UID:
    (DE-602)b3kat_BV024080965
    Format: 1 Videokassette (VHS, 7 Min.) , farb.
    Note: Fernsehmitschnitt: Arte, 25.07.2005
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Amsterdam : Elsevier
    UID:
    (DE-604)BV023293879
    Format: 1 Online-Ressource
    ISBN: 9786611072971 , 9780080508283
    Content: This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure * A clearly defined guide to designing the organization chart of a new security organization and how to implement policies and strategies * Navigate through jargon filled meetings with this handy aid * Provides information on understanding the design flaws of E-commerce and DMZ infrastructure.
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1597491101
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781597491105
    Language: English
    Keywords: Managementinformationssystem ; Datensicherung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Rockland, MA : Syngress Publishing | [Ann Arbor, Michigan] : [ProQuest]
    UID:
    (DE-603)379312166
    Format: xxv, 315 p.
    ISBN: 9780080508283
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages