System Administration Ethics Ten Commandments for Security and Compliance in a Modern Cyber World /

Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when f...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Ljubuncic, Igor (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Litterer, Tom (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03671nam a2200481 4500
001 978-1-4842-4988-8
003 DE-He213
005 20191031131334.0
007 cr nn 008mamaa
008 191030s2019 xxu| s |||| 0|eng d
020 |a 9781484249888  |9 978-1-4842-4988-8 
024 7 |a 10.1007/978-1-4842-4988-8  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Ljubuncic, Igor.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a System Administration Ethics  |h [electronic resource] :  |b Ten Commandments for Security and Compliance in a Modern Cyber World /  |c by Igor Ljubuncic, Tom Litterer. 
250 |a 1st ed. 2019. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2019. 
300 |a XXXI, 290 p. 18 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: In the Beginning -- Chapter 2: Separate Roles -- Chapter 3: Respect Privacy -- Chapter 4: Do Not Change Data -- Chapter 5: Don't Steal (Intellectual Property) -- Chapter 6: Don't Steal (Computers) -- Chapter 7: Do Not Go Where You Are Not Wanted -- Chapter 8: Follow Procedures and Get Out -- Chapter 9: Communicate Change -- Chapter 10: Do No Harm -- Chapter 11: Break Glass. 
520 |a Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today's digital landscape. This book serves as a equitable guideline in helping system administrators, engineers - as well as their managers - on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see how to correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments. Using the appropriate rules of engagement, best policies and practices, and proactive "building/strengthening" behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment. . 
650 0 |a Data protection. 
650 0 |a Business ethics. 
650 0 |a Computer security. 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Business Ethics.  |0 http://scigraph.springernature.com/things/product-market-codes/526000 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
700 1 |a Litterer, Tom.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781484249871 
776 0 8 |i Printed edition:  |z 9781484249895 
856 4 0 |u https://doi.org/10.1007/978-1-4842-4988-8  |z Full Text via HEAL-Link 
912 |a ZDB-2-CWD 
950 |a Professional and Applied Computing (Springer-12059)