Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged IT

Rss Feed Group items tagged

tech writer

Cyber Security: Essential principles to secure your organisation | IT Governance UK - 0 views

  •  
    This pocket guide takes you through the essentials of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Cyber Security: Essential principles to secure your organization takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.
tech writer

EU General Data Protection Regulation (GDPR) - An implementation and compliance guide, ... - 0 views

  •  
    This bestselling guide is the ideal companion for anyone carrying out a GDPR compliance project, providing comprehensive guidance and practical advice. Now in its fourth edition, this bestselling guide is the ideal companion for anyone carrying out a GDPR (General Data Protection Regulation) compliance project. It provides comprehensive guidance and practical advice on complying with the Regulation, including: The GDPR in terms you can understand; The obligations of data controllers and processors; What to do about international data transfers; and Data subjects' rights and consent.
tech writer

IT Governance Training - Introductory to Advanced - In-Person or Online - 0 views

  •  
    Take the next step in your career and discover the benefits of IT Governance training. Book any classroom or live online training course this November for your free e-book and you'll automatically qualify for the IT Governance Rewards Club. Plus, members receive 25% off training courses for life! That's right, we're offering a free e-book of your choice up to the value of £30 and 25% off all future classroom and live online training courses when you book before 30 November 2019.
tech writer

BS 10012 Internal Audit Service | IT Governance UK - 0 views

  •  
    Save time and effort by outsourcing your BS 10012 internal audit | IT Governance: Save time and effort by outsourcing your BS 10012 internal audit to an experienced consultant and get peace of mind that the personal information you hold is managed effectively and securely. Comprising one audit of two days' duration led by a qualified consultant with in-depth understanding and experience of the Standard, IT Governance's BS 10012 internal audit service will ensure that your client and stakeholder requirements for personal information management are met.
tech writer

BS 10012 Gap Analysis Service | IT Governance UK - 0 views

  •  
    Receive expert insight into your compliance gaps against the personal information management standard, BS 10012, with IT Governance's gap analysis service. IT Governance's BS 10012 Gap Analysis Service enables you to: Get the true picture of your BS 10012 compliance gaps; Receive expert advice on how to scope your project; Establish your project resource requirements; and Know exactly what needs to be done to become BS 10012 compliant.
tech writer

ISO 27001 do-it-yourself package | IT Governance UK - 0 views

  •  
    This ISO 27001 do-it-yourself package provides organisations with all the essential resources required to achieve ISO27001 certification. An affordable DIY package to help you achieve ISO 27001 compliance featuring: Copies of the three essential standards in the ISO 27001 family of standards; Our flagship ISO 27001 policies and procedures toolkit; vsRisk risk assessment software - Annual license; ISO 27001 staff awareness e-learning (add as many users as you need); and Two best-selling ISO 27001 implementation guides.
tech writer

ISO 9001 2015 Standard | IT Governance UK - 0 views

  •  
    This is the newest version of ISO 9001. Users of ISO 9001:2008 should upgrade their systems to ISO 9001:2015 and will need the revised version of the Standard to keep their certificates up to date. ISO 9001:2015 specifies the requirements for a quality management system (QMS), where an organization: Needs to demonstrate its ability to consistently provide products and services that meet customer and applicable regulatory requirements. Aims to enhance customer satisfaction through the effective application of the system, including processes for continual improvement of the system and the assurance of conformity and applicable regulatory requirements. ISO 9001 is by far the world's most established quality framework and is currently used by more than a million organizations worldwide. It sets the standard not only for quality management systems but for management systems in general. All requirements of ISO 9001:2015 are generic and are intended to be applicable to all organisations, regardless of type, size and product provided. ISO 9001 helps all kinds of organisations succeed through improved customer satisfaction, staff motivation and continual improvement.
tech writer

BreachTrak™ Service | IT Governance UK - 0 views

  •  
    BreachTrak™ enables you to monitor data usage by both employees and your supply chain - so you can track your data even when it leaves the building and moves beyond your direct control. Find out if your data is being used in a way you don't expect. Monitor how your data is being used via e-mail, physical mail, landlines, and mobiles. Be alerted if your data has been stolen and offered for sale on the Surface or Dark Web via our Platinum Service. Take action if your data is not being used in accordance with the permissions you have for it (for example, if your marketing team is sending promotions to opted-out individuals). This is a monthly subscription product that you can cancel at any time. (T&Cs apply)
tech writer

Cyber Security as a Service | IT Governance UK - 0 views

  •  
    Outsource your cyber security resource to world-renowned experts. Benefit from a dedicated cyber security specialist to help address your specific cyber security challenges with monthly check-ins. Let IT Governance cyber security consultants, legal experts, and incident responders become an extension of your in-house IT department. Benefit from a dedicated cyber security specialist to help address your specific challenges and needs. Achieve peace of mind from day one with cyber security insurance cover, unlimited cyber security expert advice, pre-written policy and procedure templates, staff awareness training, vulnerability scanning, cyber incident response management planning, emergency legal support, and a knowledge pool of newsletters, webinars, and security updates. Suitable for organizations of all sizes that lack in-house cyber security support. This is an annual subscription product that can be billed annually, or in easy monthly installments. (T&Cs apply)
tech writer

Governance and Internal Controls for Cutting Edge IT | IT Governance UK - 0 views

  •  
    Shows you how to manage the risks of adopting cutting-edge technology for your business in the context of COBIT 5 and related standards. To remain competitive we rely on being early adopters of new technologies - but there are inherent risks. As we implement these technologies, how do we manage the risks without hindering the progress of the business? Governance and Internal Controls for Cutting Edge IT shows you how to manage the risks of adopting cutting edge technology for your business in the context of COBIT® 5 and related standards.
tech writer

CRISC Training Course | ITGovernance | IT Governance UK - 0 views

  •  
    Learn how to identify and manage risks with this 3-day exam preparation course enabling you to pass the CRISC exam the first time. Get ahead with CRISC® (Certified in Risk and Information Systems Control®) certification, the world-renowned standard of achievement for enterprise IT risk and information systems control managers. Build your senior career in IT risk management with a four-day exam preparation course. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. This course uses the official ISACA® curriculum and includes the ISACA CRISC Review and Questions, Answers & Explanations study guides. Successful completion of the course leads to 28 CPD points.
tech writer

IT Governance USA Books - 0 views

  •  
    Browse ITGP Books in the leading UK and international IT GRC bookstore [ITGP, ITGP Books, IT GRC Books]
tech writer

Training Courses webshop from IT Governance - 0 views

  •  
    Browse the leading Training webshop with IT Governance, offering affordable and flexible training solutions for all aspects of IT Governance.
tech writer

EU General Data Protection Regulation (GDPR): An Implementation and Compliance Guide | ... - 0 views

  •  
    This comprehensive manual will provide detailed insights into the EU GDPR and practical implementation advice on setting up and managing a privacy program. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. Our customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

Standards webshop from IT Governance - ISO, IEC and British Standards - 0 views

  •  
    Browse the leading Standards webshop. Cheap UK and international shipping and free Soft Skills resources and information. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

IT Governance: An International Guide to Data Security and ISO27001/ISO27002, Sixth Edi... - 0 views

  •  
    This is sixth edition of THE definitive guide to ISO27001 and ISO27002 compliant information security and management. New for 2015: the Sixth edition of the definitive guide to ISO 27001-compliant information security management by Alan Calder and Steve Watkins. The textbook for the Open University's postgraduate information security course. The recommended textbook for all IBITGQ ISO 27001 courses. Available in softcover or eBook format. IT Governance USA is the leading global provider of books, tools, training and consultancy for cybersecurity, IT governance, risk management and compliance. The customer base ranges from government departments and market leading organizations, to small businesses and individuals looking to further their knowledge, ability and qualifications.
tech writer

DxO ClearView Plus technology in DxO PhotoLab - 0 views

  •  
    DxO ClearView Plus technology in DxO PhotoLab. Remove haze with a single click. Haze is caused by the dispersion of light by particles in the air. Even on a clear day, the haze created by diffracted light is very visible on objects that are more than 2 miles away. This is called "dry haze." When the haze is created by the diffusion of water particles, we refer to it as "mist" or, if visibility is reduced to less than half a mile, as "fog". A portion of the light reflected by a subject into the lens (in this case, the light reflected by the building and represented by the yellow arrows in Figure A below) is lost because it is absorbed or scattered by particles in the air. In other words, the light is redirected elsewhere, as represented by the arrows pointing in different directions. As a result, the subject appears fainter. Some of the light coming from the light source (in this case, the sun) is redirected towards the camera due to light being reflected by particles in the air, creating even more parasitic light in the photo. This phenomenon makes dark areas appear lighter than they are. In theory, to remove haze, you would need to know the distance between the camera and each subject, the amount of diffracted light, and the properties of the light source. However, it's impossible to get all of this information from a single image! As a result, choices have to be made, starting with the assumption that if a photo does not have haze, it's because it includes local dark areas (and, more specifically, because at least one of the RGB color channels is low). The haze removal process must bring the R, G, and B values back to zero (to compensate for light diffusion) and amplify the signal to compensate for the loss of light from the subject. DxO Clearview Plus uses these principles and can remove haze with a single click.
tech writer

Camera and Lens Corrections - DxO - 0 views

  •  
    Correcting camera and lens defects: one of DxO's areas of expertise. Correct lens sharpness, geometric distortion, unwanted vignetting. DxO is the only company to offer such a high-quality feature for improving lens sharpness. Its analytical protocol measures the sharpness of multiple points in the image. Its complex algorithms restore even the finest details and micro-contrasts to the entire image, including along the edges. DxO excels in geometric distortion correction. Using a reference image, DxO's experts calculate the extent of the distortion for each position in the image. The defect is then automatically corrected, even when the image has already been corrected by the camera. To identify chromatic aberrations, DxO's experts analyze the image's red, green, and blue channels separately. DxO's powerful algorithms then take into account the aperture and focal length used to obtain the best finish. As a result, colored outlines are removed without altering the image's details and colors. Thanks to its exclusive lens and camera pairing map protocol, DxO's correction feature compensates for the risk of over-exposure and color alteration and does not create additional noise when brightening dark areas. The result is a perfectly balanced photo. DxO lens modules contain all the necessary information for simultaneously correcting vignetting distortion, chromatic aberrations, and a lack of sharpness. They are designed in the laboratory using a rigorous and extremely precise process that is specific to each lens and camera combination.
tech writer

SMB-How it Works - Sollensys - 0 views

  •  
    Making the World Safer, One Block at a Time™ -- Sollensys allows you to archive any data or file type and securely recall a perfect copy of your unviewed, uncorrupted, and unchanged data from any browser. Even video, a first for blockchain technology! In a time when cybercriminals run rampant, attacking companies and individuals alike, securing your critical data can feel like walking a cybersecurity tightrope. Sollensys created an unbreakable safety net that harnesses the power of double-blockchain technology to encrypt and scatter a secure, unchangeable copy of your data across thousands of servers that is virtually impossible for hackers to reassemble without a unique key identifier. This isn't a storage solution; this is an indestructible vault. Blockchain is a technology-centered concept of immutability, meaning it keeps data from being changed or corrupted. Blockchain is a superior method for storing, securing, and transferring data, which is why Sollensys uses a private version of it to protect your most important data. Sollensium is a private, double blockchain that allows you to upload, encrypt, secure, and safely recall any type of data, including video assets, which is a first for blockchain technology.
tech writer

Windows Server 2022 - the new server operating system - 0 views

  •  
    Windows Server 2022 has been released: After three years, it follows its predecessor from 2019. It is offered with the build number "20348.169, version 21H2" in two basic variants and an additional Datacenter Azure Edition and is aimed, among others, at companies that install their operating system...
« First ‹ Previous 41 - 60 of 575 Next › Last »
Showing 20 items per page