Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
System Administration Ethics
Ten Commandments for Security and Compliance in a Modern Cyber World
Taschenbuch von Tom Litterer (u. a.)
Sprache: Englisch

29,85 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Lieferzeit 1-2 Wochen

Kategorien:
Beschreibung
Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today¿s digital landscape. This book serves as a equitable guideline in helping system administrators, engineers ¿ as well as their managers ¿ on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small.
You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see howto correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments.
Using the appropriate rules of engagement, best policies and practices, and proactive ¿building/strengthening¿ behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment.
What You'll Learn
The concepts of Least Privilege and Need to Know
Request change approval and conduct change communication

Follow "Break Glass" emergency procedures
Code with data breaches, hacking and security violations, and proactively embrace and design for failures

Build and gain trust with employees and build the right ethical culture

Review what managers can do to improve ethics and protect their employees
Who This Book Is For
This book¿s primary audience includes system administrators and information security specialists engaged with the creation, process and administration of security policies and systems. A secondary audience includes company leaders seeking to improve the security, privacy, and behavioral practices.
Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today¿s digital landscape. This book serves as a equitable guideline in helping system administrators, engineers ¿ as well as their managers ¿ on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small.
You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see howto correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments.
Using the appropriate rules of engagement, best policies and practices, and proactive ¿building/strengthening¿ behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment.
What You'll Learn
The concepts of Least Privilege and Need to Know
Request change approval and conduct change communication

Follow "Break Glass" emergency procedures
Code with data breaches, hacking and security violations, and proactively embrace and design for failures

Build and gain trust with employees and build the right ethical culture

Review what managers can do to improve ethics and protect their employees
Who This Book Is For
This book¿s primary audience includes system administrators and information security specialists engaged with the creation, process and administration of security policies and systems. A secondary audience includes company leaders seeking to improve the security, privacy, and behavioral practices.
Über den Autor
Igor Ljubuncic is a physicist by vocation and a Linux geek by profession. Igor comes with many years of experience in the hi-tech industry, including medical, high-performance computing, data center, cloud, and hosting fields, with emphasis on complex problem solving and the scientific method. To date, Igor's portfolio includes 15 patents, 16 books, several open-source projects, numerous articles published in leading journals and magazines, and presentations at prestigious international conferences like LinuxCon, CloudOpen, OpenStack days, IEEE events, and others. In his free time, Igor writes car reviews, fantasy novels and manages his award-winning blog, [...]
Tom Litterer is a business leader and a future-focused thinker with threedecades of experience in the industry. Tom spent the first six years of his career as a UNIX system administrator, transitioning from novice to expert. He has since managed each of the key areas within IT, including help desk, site operations, high performance computing (HPC) services, identity and access management, lab operations, internal cloud deployment, engineering tools and licensing. He was also the global manager of Intel's HPC servers and storage chip design environment. Tom is currently the Associate Director of Data Center and Cloud Infrastructure at Portland State University (PSU), Oregon, US. In this role, he is responsible for all Linux, Windows, virtualization, storage, backup, and HPC services in local data centers as well as the university's cloud infrastructure.
Zusammenfassung

Provides the clarity, awareness and understanding into concepts and ideas that are currently not well defined in the delicate and complex interaction between technology and ethics

Defines the middle ground between worlds of ethics and code as the unstoppable explosion of data and connectivity around the globe puts the world of technology on a collision course with ethics

Written by industry leaders with decades of work in corporate offices, small business, and hyper-scale cloud and engineering environments. This book contains lessons learned from difficult situations and problems with real impact on customers

Inhaltsverzeichnis

Chapter 1: In the Beginning.- Chapter 2: Separate Roles.- Chapter 3: Respect Privacy.- Chapter 4: Do Not Change Data.- Chapter 5: Don't Steal (Intellectual Property).- Chapter 6: Don't Steal (Computers).- Chapter 7: Do Not Go Where You Are Not Wanted.- Chapter 8: Follow Procedures and Get Out.- Chapter 9: Communicate Change.- Chapter 10: Do No Harm.- Chapter 11: Break Glass.

Details
Erscheinungsjahr: 2019
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xxxi
290 S.
18 s/w Illustr.
290 p. 18 illus.
ISBN-13: 9781484249871
ISBN-10: 1484249879
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Litterer, Tom
Ljubuncic, Igor
Auflage: 1st ed.
Hersteller: Apress
Apress L.P.
Verantwortliche Person für die EU: Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de
Maße: 235 x 155 x 18 mm
Von/Mit: Tom Litterer (u. a.)
Erscheinungsdatum: 31.10.2019
Gewicht: 0,493 kg
Artikel-ID: 116542378
Über den Autor
Igor Ljubuncic is a physicist by vocation and a Linux geek by profession. Igor comes with many years of experience in the hi-tech industry, including medical, high-performance computing, data center, cloud, and hosting fields, with emphasis on complex problem solving and the scientific method. To date, Igor's portfolio includes 15 patents, 16 books, several open-source projects, numerous articles published in leading journals and magazines, and presentations at prestigious international conferences like LinuxCon, CloudOpen, OpenStack days, IEEE events, and others. In his free time, Igor writes car reviews, fantasy novels and manages his award-winning blog, [...]
Tom Litterer is a business leader and a future-focused thinker with threedecades of experience in the industry. Tom spent the first six years of his career as a UNIX system administrator, transitioning from novice to expert. He has since managed each of the key areas within IT, including help desk, site operations, high performance computing (HPC) services, identity and access management, lab operations, internal cloud deployment, engineering tools and licensing. He was also the global manager of Intel's HPC servers and storage chip design environment. Tom is currently the Associate Director of Data Center and Cloud Infrastructure at Portland State University (PSU), Oregon, US. In this role, he is responsible for all Linux, Windows, virtualization, storage, backup, and HPC services in local data centers as well as the university's cloud infrastructure.
Zusammenfassung

Provides the clarity, awareness and understanding into concepts and ideas that are currently not well defined in the delicate and complex interaction between technology and ethics

Defines the middle ground between worlds of ethics and code as the unstoppable explosion of data and connectivity around the globe puts the world of technology on a collision course with ethics

Written by industry leaders with decades of work in corporate offices, small business, and hyper-scale cloud and engineering environments. This book contains lessons learned from difficult situations and problems with real impact on customers

Inhaltsverzeichnis

Chapter 1: In the Beginning.- Chapter 2: Separate Roles.- Chapter 3: Respect Privacy.- Chapter 4: Do Not Change Data.- Chapter 5: Don't Steal (Intellectual Property).- Chapter 6: Don't Steal (Computers).- Chapter 7: Do Not Go Where You Are Not Wanted.- Chapter 8: Follow Procedures and Get Out.- Chapter 9: Communicate Change.- Chapter 10: Do No Harm.- Chapter 11: Break Glass.

Details
Erscheinungsjahr: 2019
Genre: Importe, Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Taschenbuch
Inhalt: xxxi
290 S.
18 s/w Illustr.
290 p. 18 illus.
ISBN-13: 9781484249871
ISBN-10: 1484249879
Sprache: Englisch
Ausstattung / Beilage: Paperback
Einband: Kartoniert / Broschiert
Autor: Litterer, Tom
Ljubuncic, Igor
Auflage: 1st ed.
Hersteller: Apress
Apress L.P.
Verantwortliche Person für die EU: Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de
Maße: 235 x 155 x 18 mm
Von/Mit: Tom Litterer (u. a.)
Erscheinungsdatum: 31.10.2019
Gewicht: 0,493 kg
Artikel-ID: 116542378
Sicherheitshinweis