Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged principles

Rss Feed Group items tagged

tech writer

Cyber Security: Essential principles to secure your organisation | IT Governance UK - 0 views

  •  
    This pocket guide takes you through the essentials of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Cyber Security: Essential principles to secure your organization takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks.
tech writer

Implementing IT Governance: Foundation & Principles Training Course | IT Governance UK - 0 views

  •  
    A 3-day intensive introduction to Corporate IT Governance, covering ITIL, COBIT, ISO38500, Risk, and Project Management, including the IBITGQ Certificate exam. A complete introduction to the business-critical subject of IT Governance. Designed to help managers create a single integrated management framework that ensures that an organization's IT supports and enables the achievement of its strategies and objectives. Train without the travel with our instructor-led online or classroom/online combination courses giving you all the benefits of classroom study without the hassle, uncertainty, and cost of travel. The classroom/online courses offer you the option to attend in person or online if circumstances change. Successful completion of the course and included exam leads to the ISO 17024-Certificated Implementing IT Governance: Foundation & Principles (CITGP) qualification and 21 CPD/CPE points.
tech writer

DxO ClearView Plus technology in DxO PhotoLab - 0 views

  •  
    DxO ClearView Plus technology in DxO PhotoLab. Remove haze with a single click. Haze is caused by the dispersion of light by particles in the air. Even on a clear day, the haze created by diffracted light is very visible on objects that are more than 2 miles away. This is called "dry haze." When the haze is created by the diffusion of water particles, we refer to it as "mist" or, if visibility is reduced to less than half a mile, as "fog". A portion of the light reflected by a subject into the lens (in this case, the light reflected by the building and represented by the yellow arrows in Figure A below) is lost because it is absorbed or scattered by particles in the air. In other words, the light is redirected elsewhere, as represented by the arrows pointing in different directions. As a result, the subject appears fainter. Some of the light coming from the light source (in this case, the sun) is redirected towards the camera due to light being reflected by particles in the air, creating even more parasitic light in the photo. This phenomenon makes dark areas appear lighter than they are. In theory, to remove haze, you would need to know the distance between the camera and each subject, the amount of diffracted light, and the properties of the light source. However, it's impossible to get all of this information from a single image! As a result, choices have to be made, starting with the assumption that if a photo does not have haze, it's because it includes local dark areas (and, more specifically, because at least one of the RGB color channels is low). The haze removal process must bring the R, G, and B values back to zero (to compensate for light diffusion) and amplify the signal to compensate for the loss of light from the subject. DxO Clearview Plus uses these principles and can remove haze with a single click.
tech writer

Certificate of Cloud Auditing Knowledge (CCAK) Certification Training | Learning Tree - 0 views

  •  
    Certificate of Cloud Auditing Knowledge (CCAK) Certification Training | Learning Tree - In this course, you will learn the essential principles of auditing cloud computing systems to successfully obtain the Certificate of Cloud Auditing Knowledge (CCAK).
tech writer

Security Essentials Labs | Learning Tree - 0 views

  •  
    Security Essentials Labs | Learning Tree - CYBRScore Security Essentials Labs include 19 distinct, hands-on labs that prepare you with the essential principles of network security & risk management.
tech writer

EC-Council Certified CISO Training CCISO v3 | Learning Tree - 0 views

  •  
    EC-Council Certified CISO Training CCISO v3 | Learning Tree - This CCISO Certification course from EC-Council focuses on applying information security management principles & preps you to pass the CCISO exam.
tech writer

Leading SAFe® Certification Training | Learning Tree - 0 views

  •  
    Leading SAFe® Certification Training | Learning Tree - In this two-day SAFe® certification course, you will learn how to lead a Lean-Agile enterprise by leveraging the Scaled Agile Framework (SAFe) and its underlying principles derived, like Lean, systems thinking, Agile development, product development flow, DevOps and more.
tech writer

Amazon Assessment Test 2022: What to Expect & How to Ace It - 0 views

  •  
    The Amazon Assessment is an online test given to any Amazon applicant. The most popular tests are Work Styles, Work Simulation, and Hiring Simulation. Amazon Work Simulation Assessment - Get to know one of the trickiest Amazon assessments, which evaluates your analytical skills, decision-making, and your use of Amazon's Leadership Principles. Amazon Coding Assessment - Thorough prep, important tips, and inside info to help you pass the Amazon SDE coding and behavioral assessments. Amazon Work Style Assessment - Learn about Amazon's most common personality test (sent to almost every Amazon applicant). AWS Assessment Test - Learn more about the AWS online assessment that's sent to candidates for Solution Architect, Cloud Support, Cloud Architect, and many other AWS roles. Amazon Area Manager Assessment - Complete preparation for the four modules of the assessment (including Working with Metrics). Amazon Operations Manager Assessment Test - Exclusive prep for the main screening step that any Amazon Operations Manager must pass. Amazon MBA Online Assessment - Get info & prep for the initial online assessment that any Amazon MBA candidate has to pass. Amazon Ramsay Test - Thorough prep for the toughest part of the Amazon maintenance tech's hiring process (created by certified engineers). Amazon Mechatronics & Robotics (RME) Apprenticeship Skills Battery Test - Get an exclusive and in-depth preparation for the RME apprenticeship assessment. Amazon Control Systems Technician Test - Similar to the Maintenance Technician Test, yet focuses more on electricity, electronics, and robotics. Amazon Financial Analyst Assessment - Exclusive practice tests covering all sections of the online assessment - Work Simulation, Work Style, and MS Excel. Amazon ATA Technical Assessment - Get exclusive practice for all three Amazon Technical Academy tests - AMCAT, Work Style Assessment, and Technical Assessment. Amazon Interview
tech writer

Official ISACA COBIT® 5 Enabling Information Guide | IT Governance UK - 0 views

  •  
    Perfect introduction to the principles and practice of the governance of enterprise IT using COBIT®5. Written by an experienced COBIT® trainer and practitioner, Geoff Harmer provides advice that is easy to follow and apply. This book includes: A practical introduction to the key concepts of COBIT® 5, ideal for anyone involved in an implementation project, or studying for the COBIT® 5 Foundation exam. The main frameworks and standards supporting the governance of enterprise IT (GEIT), putting the benefits of COBIT® 5 into context. [COBIT, GEIT, Enterprise IT, IT Governance, Governance Framework, COBIT5, COBIT 5,]
tech writer

NIS Regulations - A Pocket Guide for Operators of Essential Services | IT Governance UK - 0 views

  •  
    Gain a clear introduction to the NIS Regulations (The Network and Information Systems Regulations 2018) with this essential pocket guide, which explains: The objectives, principles, and indicators of good practice, and gives implementation guidance; The key requirements for OES (operators of essential services); and How to comply with the Regulations
tech writer

EU GDPR - An international pocket guide to compliance | IT Governance UK - 0 views

  •  
    A clear, concise primer on the GDPR this pocket guide provides an overview of what you need to do to comply with the Regulation. Thrive under the GDPR (General Data Protection Regulation) wherever you are in the world. This pocket guide will help you understand the Regulation, the broader principles of data protection, and what the GDPR means for businesses in Europe and beyond. It explains: The terms and definitions used within the GDPR in simple terms; The key requirements; and How to comply with the Regulation.
tech writer

NIS Regulations Documentation Toolkit | IT Governance UK - 0 views

  •  
    As an OES (operator of essential services), ensure you meet your legal requirements and fully comply with the NIS (Network and Information Systems) Regulations. Accelerate and simplify your compliance project with more than 100 pre-written, customizable document templates for NIS policies and procedures. Ensure you meet the requirements of the 14 high-level security principles to achieve compliance with the CAF (Cyber Assessment Framework). Developed by information security specialists, so you can be sure you're on the right track.  Guarantee full coverage of the Regulations with the comprehensive compliance tools, including the Gap Analysis tool, Business Impact Analysis tool, Risk Treatment Plan, and Training Record. This is an annual subscription product, however, you can cancel at any time. (T&Cs apply)
tech writer

COBIT 5 Foundation Training Course | IT Governance UK - 0 views

  •  
    In this two-day COBIT 5 Foundation training course, learn from the experts how COBIT 5 aligns IT goals with strategic objectives. Become COBIT® qualified with our three-day, specialist-led training course Understand the key principles of COBIT 5® and how it aligns IT goals with strategic objectives. Train without the travel with our instructor-led online or classroom/online combination courses giving you all the benefits of classroom study without the hassle, uncertainty, and cost of travel. The classroom/online courses offer you the option to attend in person or online if circumstances change. Successful completion of the course and included exam leads to the COBIT® 5 Foundation qualification and 14 CPD/CPE points.
tech writer

Avast SecureLine VPN - 0 views

  •  
    In addition to the complete anonymity of online activities, the networks also offer protection against hacker attacks in public WLAN networks. AVAST VPN products such as the AVAST SecureLine VPN are ideal for absolute protection and completely anonymous surfing. The AVAST SecureLine VPN provides a guaranteed encrypted connection between two networks. All files uploaded and downloaded to the Internet are fully protected and cannot be viewed by third parties. The AVAST VPN encrypts the user's IP address and prevents it from being traced. Anyone who places great value on complete anonymity on the net should buy a VPN as a matter of principle.
tech writer

Microsoft Windows Remote Desktop Services 2022, Device CAL, RDS CAL, Client Access License - 0 views

  •  
    Unlike the Win Server 2022 Standard User CAL, which is the same as the Remote Desktop 2022 User CAL, this license is applied "per device". It is therefore not bound to a user, but a device or a client computer as soon as it connects to the server for the remote desktop session. Usually, a temporary license is issued. Once access is terminated, it can be reissued. This type of licensing allows the user to access the server directly or indirectly. However, it is also common to tie the remote session license directly to a device. This would make sense, for example, if employees work remotely all the time or are employed in a home office on certain days of the week. Otherwise, the "first-come-first-served" principle applies. Which form of licensing is relevant for the company depends on its prioritization and the circumstances at hand.
1 - 15 of 15
Showing 20 items per page