Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.*Ved tilmelding accepterer du vores persondatapolitik.
Du kan altid afmelde dig igen.
Find inspiration til bøger om grafisk design og diverse how-to guider. Lær at programmere eller køb bøger til din næste certificering. Vi har et stort udvalg af bøger til at forbedre dine evner i MS Office, Adobe mv. Derudover har vi de traditionelle bøger for dummies, så man kan komme godt i gang.
Hvorfor har kunstig intelligens så stor indflydelse på vores fremtid?Og hvad er kunstig intelligens egentlig?Kunstig intelligens er nu kernen af forretningen for nogle af de mest værdifulde selskaber i verden, og de investerer massive summer i den fortsatte udvikling af kunstig intelligens. Under dem vokser en underskov af start-ups fokuseret på anvendelsen af kunstig intelligens, drevet af ambitiøse grundlæggere og investorer med dybe lommer. Sammen med mere etablerede virksomheder har de planer om at revolutionere stort set alle sektorer med kunstig intelligens med nye intelligente tjenester og produkter. På den internationale scene har Rusland, USA og Kina startet et kapløb om at blive førende indenfor kunstig intelligens, hver med håbet om at blive den verdensledende nation. Kampen om fremtidens magt og markeder er startet, og den handler om kunstig intelligens.For de fleste er kunstig intelligens dog stadig noget abstrakt, som gemmer sig på fjerntliggende servere placeret i en lige så uhåndgribelig sky. Men kunstig intelligens er i virkelighed ikke så komplekst, og mekanikken bag er ofte inspireret af simple principper fra biologiens verden. Forstår man principperne, og hvordan de efterlignes i computeren, forstår man også, hvad kunstig intelligens er, og hvordan det kan bruges.Kampen om fremtiden - forstå hvordan kunstig intelligens påvirker mennesker, magt og markeder er den første bogpå dansk, der i et letforståeligt sprog går bag om begrebet og giver en grunding indføring i årsagerne til kampen om at udvikle bedre kunstig intelligens, hvad kunstig intelligens egentlig er, og guider dig til, hvad du skal tænke over, når du vil anvende kunstig intelligens.
Kina har i al stilhed taget et kvantespring og gennemgår i disse år en vild tech-revolution, som rykker ved magtbalancen i verden og kommer til at påvirke os alle. Kinesiske virksomheder er allerede globalt førende inden for flere af de vigtigste nye teknologier, som droner, solceller, fintech, sociale medier, e-handel og sandsynligvis også kunstig intelligens. Åbenheden og lysten til at afprøve nye teknologier – ansigtsgenkendelse og dronelevering – er stor, og kinesiske virksomheder er ikke underlagt de samme etiske dilemmaer og lovgivningsmæssige begrænsninger, som vi kender i Europa og USA.Hvorfor er det vigtigt for dig? Fordi det er et spørgsmål om tid, før kinesiske teknologiselskaber for alvor begynder at ekspandere uden for Kina, og fordi Kina på mange måder er blevet et vindue til fremtiden – på godt og ondt. En fremtid, hvor man kan betale med sit ansigt, og hvor staten ved hjælp af massiv overvågning uddeler point til borgerne for deres opførsel på de sociale medier og i den fysiske verden.
To unge venstrefløjspolitikere – et folketings- og et regionsrådsmedlem – giver deres bud på, hvordan vi i en fremtid med kunstig intelligens og stigende digitalisering får skabt de bedst mulige betingelser for alle. Det handler blandt andet om, hvordan der kan indføres basisindkomst, finanssektoren kan reguleres, og der kan skaffes mere fri tid og grøn omstilling. Vi ser ind i en fremtid med eksponentiel teknologisk vækst, hvor stort set alle brancher og uddannelsesniveauer bliver udviklet og udfordret af kunstig intelligens og robotter. Hvis politikerne handler klogt, vil disse forandringer komme alle til gode. Det handler om at sikre, at mennesker ikke bliver slaver af teknologien, og at vi ikke får en enorm underklasse – uden arbejde, uden indtægt og uden indflydelse – mens en lille elite sidder på kontrollen over teknologi, velstand og magt.De to SF’ere opridser muligheder og trusler. Fra klimaløsninger til moderne daglejere. Fra computerhandler på finansmarkedet til personlig medicin og overflødig arbejdskraft. De viser også, at vi til mange af fremtidens løsninger ikke behøver at genopfinde den dybe tallerken. Det handler om at nytænke nogle af fortidens succeser, fra andelstanke til folkeoplysning og fagbevægelse.
Digitale nomader er bogen om en anderledes måde at strukturere sit arbejdsliv og sin hverdag på. Flere og flere mennesker arbejder bag en computer, og det betyder, at flere og flere af os lige så godt kan arbejde fra en strand på Bali som fra et kontor i indre København. Med de digitale jobs er det blevet muligt for mange mennesker ikke bare at flytte til udlandet, men også at rejse Jorden rundt med hele familien - uden at misse én eneste arbejdsdag. I Digitale nomader får du et indblik i Mille og Kristian Sjøgrens digitale nomadetilværelse, hvor de har valgt at indrette deres arbejdsliv og familieliv på en måde, så de kan fylde deres tilværelse med eventyr og rejser. Bogen giver også et indblik i mange af facetterne af det digitale nomadeliv og fungerer samtidig som en guide til, hvordan de fleste danskere formentlig kan transformere deres hverdage til at indeholde mere eventyr og mere frihed til selv at bestemme, hvordan livet skal formes.Digitale nomader handler også om de fantastiske, sjove og vanvittige eventyr, som familien Sjøgren har været på gennem deres 7 år som digitale nomader.
I disse år opstår der en lang række nye problemer og etiske dilemmaer i forbindelse med kunstig intelligens: Kommer robotterne til at tage vores arbejde? Bliver de klogere end os? Kan man stole på en selvkørende bil? Og hvem skal bestemme, hvem den skal slå ihjel, hvis et uheld er uundgåeligt? I Hvad skal vi med mennesker? diskuterer Peter Svarre på medrivende vis disse etiske dilemmaer og klæder læseren på til at forstå, hvordan kunstig intelligens overhovedet fungerer. Kunstig intelligens er nemlig ikke så kompliceret, som mange tror. Alle kan deltage i denne vigtige diskussion om vores fremtid!
Mere end nogensinde er det den teknologiske udvikling, der skaber fundamentet for forandringer i vores verden. Vi har gennem de sidste mange år vænnet os til, at digitaliseringen udvikler sig voldsomt hurtigt. Det nye er, at bioteknologi, robotter, kunstig intelligens og meget mere også er blevet digitalt og kommer til at accelerere på samme måde som informationsteknologi har gjort det de sidste 50 år - eksponentielt. Eksponentiel eller accelererende vækst er vanskelig af forholde sig til. Der er store muligheder og farer, men for at håndtere dem, har vi brug for et nyt sprog og nye begreber. Forstå fremtiden er fremtidsteknologerne Anders Hvid og Jannick B. Pedersens bud på paradigmer, færdigheder og værktøj, som kan bidrage til, at vi kan være konkurrencedygtige i en verden med eksponentiel vækst.Denne udgave er en ny udgave, som er opdateret i 2018.
Høst & Søn udgiver de originale råmanuskripter til den verdensomspændende successerie SKAM. Manuskripterne indeholder bl.a. scener der aldrig kom med, nyskrevne prologer og epiloger og ikke mindst Julie Andems egne kommentarer og håndskrevne mind maps. Et unikt indblik i skabelsen af serien der har tryllebundet millioner af seere verden over.Hver sæson udgør nu en bog i manuskriptform, og andet bind handler om Noora, som er den smukke pige i venindegruppen. Hun har tilsyneladende styr på sit eget liv og hjælper andre med deres. Men Noora kæmper med at leve op til det hele og må indse, at "mennesker har brug for mennesker". Manuskriptet er en kærlighedshistorie mellem 1.g.'eren Noora og William fra 3. g.
Høst & Søn udgiver de originale råmanuskripter til den verdensomspændende successerie SKAM. Manuskripterne indeholder bl.a. scener der aldrig kom med, nyskrevne prologer og epiloger og ikke mindst Julie Andems egne kommentarer og mind maps. Et unikt indblik i skabelsen af serien der har tryllebundet millioner af seere verden over.Hver sæson udgør nu en bog i manuskriptform, og første bind handler om Eva, som starter i gymnasiet, kort efter at hun er blevet uvenner med bedsteveninden, Ingrid. Hun føler sig alene og kæmper for at få forholdet til sin kæreste Jonas til at fungere. Eva bliver en del af en ny venindegruppe, men må indse, at det kan være svært at balancere venskab og kærlighed. Og ikke kun for hende selv.
Et elskende par bliver sat på en prøve, der går langt over deres forstand.Charlie driver gennem livet og holder sig langt væk fra et fuldtidsarbejde, men er forelsket i Miranda, en dygtig studerende der må leve med en frygtelig hemmelighed. Da Charlie en dag kommer til penge, køber han Adam, et af de første syntetiske mennesker, og designer – med Mirandas hjælp – hans personlighed. Det næsten fuldendte menneske, der kommer ud af dette eksperiment, er en smuk, stærk og klog mand. Det varer ikke længe, før de tre er viklet ind i et trekantsdrama, der kaster dem ud i store moralske problemer.Romanen stiller spørgsmålet, om en maskine kan forstå menneskehjertet – eller om det er vores forståelse, der er mangelfuld.
Award-winning journalist David Ewing Duncan considers 24 visions of possible human-robot futuresIncredible scenarios from Teddy Bots to Warrior Bots, and Politician Bots to Sex BotsGrounded in real technologies and possibilities and inspired by our imagination. What robot and AI systems are being built and imagined right now? What do they say about us, their creators? Will they usher in a fantastic new future, or destroy us? What do some of our greatest thinkers, from physicist Brian Greene and futurist Kevin Kelly to inventor Dean Kamen, geneticist George Church, and filmmaker Tiffany Shlain, anticipate about our human-robot future? For even as robots and A.I. intrigue us and make us anxious about the future, our fascination with robots has always been about more than the potential of the technologyit's also about what robots tell us about being human.
Science world luminary John Brockman assembles twenty-five of the most important scientific minds, people who have been thinking about the field artificial intelligence for most of their careers, for an unparalleled round-table examination about mind, thinking, intelligence and what it means to be human."e;Artificial intelligence is today's story--the story behind all other stories. It is the Second Coming and the Apocalypse at the same time: Good AI versus evil AI."e;--John BrockmanMore than sixty years ago, mathematician-philosopher Norbert Wiener published a book on the place of machines in society that ended with a warning: "e;we shall never receive the right answers to our questions unless we ask the right questions.... The hour is very late, and the choice of good and evil knocks at our door."e;In the wake of advances in unsupervised, self-improving machine learning, a small but influential community of thinkers is considering Wiener's words again. InPossible Minds, John Brockman gathers their disparate visions of where AI might be taking us.The fruit of the long history of Brockman's profound engagement with the most important scientific minds who have been thinking about AI--from Alison Gopnik and David Deutsch to Frank Wilczek and Stephen Wolfram--Possible Mindsis an ideal introduction to the landscape of crucial issues AI presents. The collision between opposing perspectives is salutary and exhilarating; some of these figures, such as computer scientist Stuart Russell, Skype co-founder Jaan Tallinn, and physicist Max Tegmark, are deeply concerned with the threat of AI, including the existential one, while others, notably robotics entrepreneur Rodney Brooks, philosopher Daniel Dennett, and bestselling author Steven Pinker, have a very different view. Serious, searching and authoritative,Possible Mindslays out the intellectual landscape of one of the most important topics of our time.Read by Jason Culp, Rob Shapiro, Vikas Adam, Will Damron, and Kathleen McInerney
How would your organisation continue operating in the event of a crisis?If you were hit by a cyber attack and lost the use of your IT systems, would you be able to carry on? If your business premises were forced to close, what would you do? If you were affected by unexpected staff absence, how could you reassure your customers that you could still offer them the service they expected?If your organisation is affected by any of these issues and you're unprepared, then the financial and reputational damage you face could prove disastrous. You could fail to keep up with customer demand, lose important business, and your customers could go elsewhere. Without a proper risk assessment strategy, your company directors could even face prosecution if a major incident occurs and results in loss or injury.An introduction to ISO22301To minimise the impact of a disaster on your business, and to continue to provide essential services to your customers, you need to put in place a Business Continuity Management System (BCMS).ISO22301: A Pocket Guide is designed to help you satisfy the requirements of ISO22301, the latest international Standard for business continuity management (BCM). A BCMS based on ISO22301 will protect your organisation's turnover, profits and reputation. With the expert advice contained in this guide, you can ensure your organisation develops a business continuity plan that is fit for purpose, and ensure your continuing service when disaster strikes.Learn how to build your Business Continuity Management System (BCMS)Plan and manage a BCMS. If you are going to have a proper BCMS you will need to make business continuity a formal project. This pocket guide gives you valuable tips on how to draw up the BCM policy and establish the BCMS project, along with basic guidance on conducting a business impact analysis.Secure your licence to operate. Organisations such as law firms now have to put in place a BCMS in order to obtain a licence to operate.Retain your competitive edge. Organisations are beginning to seek formal assurance that their suppliers will be able to continue supplying them in the event of an interruptive incident. If you are a supplier, having a BCMS certified to ISO22301 represents a significant competitive advantage.Satisfy corporate governance concerns. A well-run company will have a strong corporate governance framework. Business continuity planning is a basic requirement of corporate governance.Expert ISO22301 guidance
A wealth of material has been written to describe the underlying mechanics of ITSM, but very little practical advice is available on how to implement ITSM best practices to achieve an organization's business objectives.The official ITIL volumes explain what service management is, how the processes work and fit together, and why IT functions should adopt the practice, but they are notoriously vague on how to design and implement an ITSM model in a real organization. This challenge is best understood by those with experience of transforming ineffective and expensive IT, yet most ITSM guides are authored from a purely academic standpoint.Real-world IT Service ManagementThis book provides guidance on implementing ITSM Best Practices in an organization based on the authors' real-world experiences. Advice is delivered through a Ten-Step approach, with each step building upon the successes of its predecessors.Subjects covered include:Documenting objectives, identifying current and future demands, analyzing service financials.High-level design, negotiating development priorities, creating an execution plan and roadmap, agreeing roles and responsibilities.Detailed design, building, testing, deploying.Monitoring and continual improvement.Each step includes summary lists of key questions to ask and specific actions to take, and a useful business case template is included as an appendix.A practical guide to ITSMAs organizations seek to boost revenue, cut costs and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives.Ten Steps to ITSM Success helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices. It is aimed at ITSM practitioners and consultants, but will also be of interest to IT Directors and C-suite executives looking to transform the role of IT into a value-creating business partner, to establish a service management culture, and to drive improvements in their respective organizations.
Taking you through the ITIL Foundation exam and beyond. ITIL is the best practice methodology for IT Service Management, developed by the UK government and globally adopted in both the public and private sectors. An official ITIL-Licensed product, ITIL Lifecycle Essentials covers all of the vital material required for the entry-level ITIL Foundation Certificate, and gives candidates a solid grounding in the key elements, concepts and terminology used in the ITIL service lifecycle.The book includes:An introduction to ITIL and why it is considered to be best practice for IT Service Management.An overview of the key components of a service management capability, including; processes, functions and generic roles.Specific chapters then cover the purpose, objectives, scope and value of the five phases of the service lifecycle that form the ITIL core; from strategy and design, through to transition, operation and continual service improvement (CSI).A summary of the ITIL qualification scheme and the Foundation level, together with some guidance on preparing for the exam.The essential link between your ITIL qualification and the real-world.This book doesn't just cover the information required to pass the foundation exam, but goes beyond this in providing practical guidance for when newly qualified practitioners enter the real-world. By addressing processes and concepts not covered in the syllabus, this book guides practitioners as they go beyond Foundation level. It features practical tips on using service management and, for each process, the author adds to the theory with lessons from her own real-world experience.The book is ideal for self-study candidates, training delegates and itSMF/BCS members, and V2 Foundation Certificate holders who have not yet taken the upgraded exam. Project managers looking to broaden their qualifications will find it a helpful companion to their studies and a practical aid for their professional development. Contractors or consultants with limited study time will also find this book essential to their part-time education.The Vital ITIL title - before, during and after your ITIL training.This product is accredited by AXELOS, the licensors of official ITIL products.ITIL is a Registered Trade Mark of AXELOS Limited.
A handy pocket guide to service integration and management (SIAM)IT outsourcing is the use of third-party resources to provide facilities and perform functions/services historically performed by internal IT personnel.Historically, IT organisations have outsourced their service provision to a single managed service provider.In today's competitive marketplace, however, many are focusing on their core activities and relying on the support of a multi-sourcing model.SIAM/MSI - An introduction to Service Integration and Management/Multi-sourcing Integration for IT Service Management explores the various characteristics of this IT operating model.Product overviewIn order for multi-sourcing to be successful, organisations must be capable of integrating their service providers into a single, cohesive unit.SIAM/MSI - An introduction to Service Integration and Management/Multi-sourcing Integration for IT Service Management explains:the merits of a multi-sourced approach to outsourcing service towersthe benefits of multi-sourcing contracts with service providers for specified towershow to align multi-sourced servicesthe challenges of using a multi-sourced modelhow to determine the IT operating model (with reference to the international standards ISO 38500, ISO 38501 and ISO 38502)the different types of service integration models (ISI, ESI and ETSI), and the benefits and challenges of eachaggregating service-level performancea multi-sourcing RFP approach, taking into account structural, operational and governance requirements.If you're thinking of moving from a single-source to a multi-source outsourcing model, SIAM/MSI - An introduction to Service Integration and Management/Multi-sourcing Integration for IT Service Management provides the answers to all of your questions.Buy now for a handy pocket guide to SIAM. Order your copy today.About the authorDavid Clifford is a director of Pace Harmon, an international advisory firm headquartered in the USA. He has contributed to a number of publications about IT service management, writing about ITIL service agreements and international standards. He also initiated, and contributed to the development and assisted with the promotion of EXIN's IT Service Management qualification program based on ISO/IEC 20000. He is currently Chair of the BSi committee on IT governance (ISO/IEC 38500) and contributes to the development of the IT service management standard ISO/IEC 20000 and BPO for IT enabled services (ISO/IEC 30105).
What is OSINT and what can it do for you?The Internet has become the defining medium for information exchange in the modern world, and the unprecedented success of new web publishing platforms such as those associated with social media has confirmed its dominance as the main information exchange platform for the foreseeable future.But how do you conduct an online investigation when so much of the Internet isn't even indexed by search engines? Accessing and using the information that's freely available online is about more than just relying on the first page of Google results.Open source intelligence (OSINT) is intelligence gathered from publically available sources, and is the key to unlocking this domain for the purposes of investigation.Product overviewThe Tao of Open Source Cyber Intelligence provides a comprehensive guide to OSINT techniques, for the investigator:It catalogues and explains the tools and investigative approaches that are required when conducting research within the surface, deep and dark webs.It explains how to scrutinise criminal activity without compromising your anonymity - and your investigation.It examines the relevance of cyber geography and how to get round its limitationsIt describes useful add-ons for common search engines, as well as considering Metasearch engines (including Dogpile, Zuula, PolyMeta, iSeek, Cluuz, and Carrot2) that collate search data from single-source intelligence platforms such as Google.It considers deep web social media platforms and platform-specific search tools, detailing such concepts as concept mapping, Entity Extraction tools, and specialist search syntax (Google Kung-Fu).It gives comprehensive guidance on Internet security for the smart investigator, and how to strike a balance between security, ease of use and functionality, giving tips on counterintelligence, safe practices, and debunking myths about online privacy.OSINT is a rapidly evolving approach to intelligence collection, and its wide application makes it a useful methodology for numerous practices, including within the criminal investigative community.The Tao of Open Source Cyber Intelligence is your guide to the cutting edge of this information collection capability.About the authorStewart K. Bertram is a career intelligence analyst who has spent over a decade working across the fields of counterterrorism, cyber security, corporate investigations and geopolitical analysis. The holder of a Master's degree in Computing and a Master of Letters in Terrorism studies, Stewart is uniquely placed at the cutting edge of intelligence and investigation, where technology and established tradecraft combine. Stewart fuses his academic knowledge with significant professional experience, having used open source intelligence on such diverse real-world topics as the terrorist use of social media in Sub-Saharan Africa and threat assessment at the London Olympic Games. Stewart teaches courses on open source intelligence as well as practising what he preaches in his role as a cyber threat intelligence manager for some of the world's leading private-sector intelligence and security agencies.
A compendium of essential information for the modern security entrepreneur and practitionerThe modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly,The Security Consultant's Handbooksets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market.This book provides essential direction for those who want to succeed in security, either individually or as part of a team. It also aims to stimulate some fresh ideas and provide new market routes for security professionals who may feel that they are underappreciated and overexerted in traditional business domains.Product overviewDistilling the author's fifteen years' experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature,The Security Consultant's Handbookprovides a wealth of knowledge for the modern security practitioner, covering:Entrepreneurial practice(including business intelligence, intellectual property rights, emerging markets, business funding and business networking)Management practice(including the security function's move from basement to boardroom, fitting security into the wider context of organisational resilience, security management leadership, adding value and professional proficiency)Legislation and regulation(including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions)Private investigations(including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law)Information and cyber security(including why information needs protection, intelligence and espionage, cyber security threats, and mitigation approaches such as the ISO 27001 standard for information security management)Protective security(including risk assessment methods, person-focused threat assessments, protective security roles, piracy and firearms)Safer business travel(including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability)Personal and organisationalresilience (including workplace initiatives, crisis management, and international standards such as ISO 22320, ISO 22301 and PAS 200)Featuring case studies, checklists and helpful chapter summaries,The Security Consultant's Handbookaims to be a practical and enabling guide for security officers and contractors. Its purpose is to plug information gaps or provoke new ideas, and provide a real-world support tool for those who want to offer their clients safe, proportionate and value-driven security services.About the authorRichard Bingley is a senior lecturer in security and organisational resilience at Buckinghamshire New University, and co-founder of CSARN, the popular business security advisory network. He has more than fifteen years' experience in a range of high-profile security and communications roles, including as a close protection operative at London's 2012 Olympics and in Russia for the 2014 Winter Olympic Games. He is a licensed close protection operative in the UK, and holds a postgraduate certificate in teaching and learning in higher education. Richard is the author of two previous books:Arms Trade: Just the Facts(2003) andTerrorism: Just the Facts(2004).
Every year, thousands of computer systems in the UK are compromised. The majority fall victim to easily preventable cyber attacks, carried out with tools which are freely available on the Internet.Cyber Essentials is theUKGovernment'sreaction to the proliferation of theseattacks. Itrequiresthat organisations putbasic security measures in place, enabling them toreliably counterthe most commontactics employed by cyber criminals.From1 October 2014, all suppliers bidding for a range of government ICT contracts - in particular contracts requiring the handling of sensitive and personal information - must be certified to the scheme.This Pocket Guide explains how toachievecertification to Cyber Essentialsin a fast, effective and cost-efficient manner. Itwill help you to:- understandthe requirements of the scheme- implement the controls correctly- realisewhen you are ready to seek certification- get a grip onboththe certification process and the distinction between Cyber Essentials and Cyber Essentials Plus- find additional help and resources.
Practical guidance on COBIT(R)5 implementation COBIT (Control Objectives for Information and related Technology) is the latest release of the popular framework for the governance of enterprise IT. It links controls, technical issues and business risks, enabling managers to manage the risks associated with business goals.Covers all key concepts of COBITWritten for IT service managers, consultants and other practitioners in IT governance, risk and compliance, this practical book discusses all the key concepts of COBIT, and explains how to direct the governance of enterprise IT (GEIT) using the COBIT framework. The book also covers the main frameworks and standards supporting GEIT, discusses the ideas of enterprise and governance, and shows the path from corporate governance to the governance of enterprise IT.Drawing on more than 30 years of experience in the IT sector, the author explains crucial concepts, including:the key elements of COBIT, the 5 principles, 7 enablers and the goals cascadethe structure of the 37 COBIT processesthe implementation of GEIT using COBIT and an implementation lifecyclethe COBIT Process Assessment Model (PAM) - the approach to process assessment of COBIT processes based on International Standard ISO/IEC 15504.Prepare for the COBIT Foundation examFor those studying for the COBIT qualifications,Governance of Enterprise IT based on COBITcovers all the material needed for the COBIT Foundation course, making it invaluable to anyone planning to take the exam.Read this book and get to grips with COBIT today.
Ensure the success of your security programme by understanding users' motivations"e;This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronising or prescriptive, making it an easy read with some very real practical takeaways."e;Thom Langford, Chief Information Security Officer at Publicis Groupe"e;Based on real world examples the book provides valuable insights into the relationship of information security, compliance, business economics and decision theory. Drawing on interdisciplinary studies, commentary from the field and his own research Leron gives the reader the necessary background and practical tools to drive improvements in their own information security program."e;Daniel Schatz, Director for Threat & Vulnerability Management at Thomson ReutersIn today's corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their company's assets and mitigate risks to the furthest extent possible.Security professionals can often be ignorant of the impact that implementing security policies in a vacuum can have on the end users' core business activities. These end users are, in turn, often unaware of the risk they are exposing the organisation to. They may even feel justified in finding workarounds because they believe that the organisation values productivity over security. The end result is a conflict between the security team and the rest of the business, and increased, rather than reduced, risk.This can be addressed by factoring in an individual's perspective, knowledge and awareness, and a modern, flexible and adaptable information security approach. The aim of the security practice should be to correct employee misconceptions by understanding their motivations and working with the users rather than against them - after all, people are a company's best assets.Product descriptionBased on insights gained from academic research as well as interviews with UK-based security professionals from various sectors,The Psychology of Information Security - Resolving conflicts between security compliance and human behaviourexplains the importance of careful risk management and how to align a security programme with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.The Psychology of Information Securityredresses the balance by considering information security from both viewpoints in order to gain insight into security issues relating to human behaviour , helping security professionals understand how a security culture that puts risk into context promotes compliance.ContentsChapter 1: Introduction to information securityChapter 2: Risk managementChapter 3: The complexity of risk managementChapter 4: Stakeholders and communicationChapter 5: Information security governanceChapter 6: Problems with policiesChapter 7: How security managers make decisionsChapter 8: How users make decisionsChapter 9: Security and usabilityChapter 10: Security cultureChapter 11: The psychology of complianceChapter 12: Conclusion - Changing the approach to securityAppendix: AnalogiesAbout the authorLeron Zinatullin (zinatullin.com) is an experienced risk consultant specialising in cyber security strategy, management and delivery. He has led large-scale, global, high-value security transformation projects with a view to improve cost performance and support business strategy.He has extensive knowledge and practical experience in solving information security, privacy and architectural issues across multiple industry sectors.He has an MSc in information security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behaviour.
Prepare for the ITIL Foundation examITIL is best practice for IT Service Management, developed by the UK government and globally adopted in both the public and private sectors. ITIL is not prescriptive, but rather it is a framework that organisations can adopt and adapt.The Foundation Certificate is the entry-level ITIL qualification, which offers candidates a general awareness of the key elements, concepts and terminology used in the ITIL service lifecycle.These fundamental ITIL ideas have been condensed into this pocket guide to provide candidates with the essential facts they need in order to pass the ITIL Foundation exam.All you need to knowto achieveITIL Foundation CertificationAn official ITIL Licensed product, ITIL Foundation Essentials is a distillation of critical information - no waffle or padding - just exactly what you need to understand how to pass the ITIL Foundation exam. Written forself-study candidates, ITIL community training delegates, itSMF/BCS members and V2 Foundation Certificate holders, who have yet to take an upgraded exam, this pocket guide is fully aligned with the ITIL 2011 core volumes.Project managers, who are looking to expand their qualifications, and IT contractors or consultants, who don't want to take time out from their day jobs to attend a course, will also find this pocket guide an essential companion to their studies and education.The complete ITIL Foundation syllabusTHE essential companion for those studying the ITIL Foundation syllabus, the pocket guide covers key areas including:A basic introduction to ITIL and a description of service classifications (core, enabling, enhancing) and an outline of internal and external services.A point-by-point summary of the purpose, objectives, scope and value of the five stages of the service lifecycle that form the ITIL core; from strategy and design, through to transition, operation and continual service improvement (CSI).Separate sections in the guide are dedicated to describing ITIL key concepts and terminology (including "e;stakeholders"e; and "e;processes, functions and roles"e;) and throughout the pocket guide the wide range of 3, 4 and 5 letter ITIL acronyms (including PBA, FMITS, BRM, SLM, OLA, SLR, VBF, ITSCM, SACM, RADM) are expanded and explained.A brief summary of the ITIL qualification scheme and the Foundation exam.The ideal revision guide for the ITIL Foundation examinationThis product is accredited by AXELOS, the licensors of official ITIL products.ITIL is a Registered Trade Mark of AXELOS Limited.
"e;Love the fact that it jumped in with 10 top tips for security, a great opening to the book Excellent section on phishing emails/vishing/smishing, with great practical examples "e;Christopher Wright, Wright-CandA Consulting LtdProtect yourself from cyber threats and risksCyberspace, the Internet, computer networks, the digital world - call it what you will - is always developing. And so are the threats and risks of being online.Security in the Digital Worldexplains the common digital threats to home users, home offices, mobile users, consumers and parents alike, as well as providing tips, advice and guidance. It doesn't matter if you are working in the most mature enterprise environment, unemployed, retired or still at school, whether you often have a smartphone in your hand or only use an e-reader, you are at risk.Security in the Digital Worldis a straightforward guide for the home user, parent, consumer and home office, providing a fountain of knowledge for modern security needs. It gives an overview of who conducts cyber attacks any why, and where cyber threats come from. It also explains what you can do to protect yourself and others, and provides a personal cyber security risk assessment.Deeper insight into threats in the digital worldThis must-have guide gives up-to-date information on consumer risks and provides:Ten tips to keep your digital information secure;Understanding and awareness of information security and cyber threats;Explanations of what social engineering is and techniques used by cyber criminals;Advice on what to look out for online and your rights as a consumer; andGuidance on common threats in the digital age, including malware, social engineering and ransomware.There is little technical knowledge or skill needed to understand and apply the book's tips and advice, and there are lots of images to help guide you.From the top ten tips and the breakdown of consumer risks, to social networking and parental security, this book is an essential guide for anyone and everyone trying to stay safe and secure in the evolving digital world.About the authorGraham Day spent 24 years in the military, including more than a decade as a counter-intelligence and security specialist on operational deployments around the world.Since retiring from the military, Graham has provided a range of services as a consultant, including, but not limited to, information security, cyber security , business continuity, cyber risk and cyber resilience.He is a CESG Certified Professional Security Information Risk Advisor, a Certified Information Systems Security Professional, and a member of the Author Group for British Standard 31111 Cyber Risk & Resilience.
Quality management principles to ensure business successThe success - or failure - of all businesses largely depends on the quality of the products and services they supply. This, in turn, depends on finding the right balance between investment and returns. Develop goods and services that are of too low a standard and no one will buy them; put too much into creating high-quality products and services and you may price yourself out of the market in an attempt to recover your costs. This is where quality management comes in.A quality management system (QMS) establishes process-driven methods of producing and delivering products and services with consistent results. Assuming your QMS processes are effective, your products and services will meet the expected quality levels every time, giving you greater control over production costs and increasing customer satisfaction.Currently used by more than 1.1 million organisations worldwide, the international standard ISO 9001:2015 is the world's most established quality framework. It specifies the best-practice requirements for a QMS that organisations can use to:demonstrate their ability to consistently provide products and services that meet customer and applicable regulatory requirements;enhance customer satisfaction;manage costs and improve efficiency.An ISO 9001-compliant QMS is adaptable, continually improves to meet organisational and market requirements, and includes processes for the assurance of conformity and applicable regulatory requirements.Product overviewISO 9001:2015 - A Pocket Guide is a handy reference book that provides an overview of the ISO 9001 quality management standard. It includes:a brief history of quality management and ISO 9001;useful definitions of ISO 9001 terminology;a discussion of the requirements of the Standard, including an in-depth examination of clauses 4 to 10 of ISO 9001, which specify the requirements for a QMS; andsome of the myths about ISO 9001 certification.This is the perfect introduction to the Standard, and will help ensure the quality of your products and services, increase customer satisfaction, and enhance your business's efficiency.About the authorsSteve G Watkinshas been working with quality management standards since the days of BS 5750, first applying it in a leisure centre and then other service sector environments. In addition to quality, his experience includes environment, health and safety, information security, business continuity, and IT service management systems, working with the relevant British and international standards. Steve sits on a number of UK technical committees that contribute to ISO's work developing and revising standards in the areas of risk, information security and service management. He also contracts to UKAS as a technical assessor, giving him a strong understanding of accredited certification.Nick Orchistonis a management systems consultant with more than 20 years' experience encompassing quality (ISO 9001), health & safety (OHSAS 18001), environmental (ISO 14001), IT service management (ITIL/ISO 20000) and information security (ISO 27001) management systems. He has successfully supported a wide variety of organisations, from SMEs to global corporations, through to accredited certification to all of these standards. Nick also created the IT Governance Toolkits for ISO 9001, ISO 14001, ISO 16001, ISO 50001, and OHSAS 18001 standards, used across the globe by project implementers.Buy your copy of ISO 9001:2015 - A Pocket Guide now to learn how an ISO 9001:2015-compliant QMS will help your business thrive.
The ideal primer for anyone implementing an Information Security Management System (ISMS)Written by an acknowledged expert on the new ISO27001 Standard, An Introduction to Information Security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security. It will ensure the systems you put in place are effective, reliable and auditable.This pocket guide will help you to:Make informed decisionsUsing this guide will enable the key people in your organisation to make better decisions before embarking on an information security project.Ensure everyone is up to speedUse this guide to give the non-specialists on the project board and in the project team a clearer understanding of what the project involves.Raise awareness among staffUse this guide to make sure your people know what is at stake with regard to information security and understand what is expected of them.Enhance your competitivenessUse this guide to let your customers know that the information you hold about them is managed and protected appropriately.Buy this pocket guide and learn how you can keep your information assets secure.
Step-by-step guidance on successful ISO 27001 implementation from an industry leaderISO 27001 is the international standard that sets out the requirements of an information security management system (ISMS) - a holistic approach to information security that encompasses people, processes and technology. Accredited certification to the Standard is recognised worldwide as the hallmark of best-practice information security management.Achieving and maintaining accredited certification to ISO 27001 can be a complicated undertaking, however, especially for implementers who are new to the Standard.Alan Calder knows ISO 27001 inside out: the founder and executive chairman of IT Governance, he led the implementation of the management system that achieved the world's first accredited certification to BS 7799 - the forerunner to ISO 27001 - and has been working with the Standard ever since. Hundreds of organisations around the world have achieved accredited certification to ISO 27001 with IT Governance's guidance - which is distilled in this book.InNine Steps to Success - An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps.Product overviewNow in its third edition,Nine Steps to Successhas been completely updated to reflect the implementation methodology used by IT Governance consultants in hundreds of successful ISMS implementations around the world.Aligned with the latest iteration of the Standard - ISO 27001:2013 - this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language, including:Getting management support and keeping the board's attention;Creating a management framework and performing a gap analysis so that you can clearly understand the controls you already have in place and identify where you need to focus your efforts;Structuring and resourcing your project - including advice on whether to use consultants or do it yourself, and an examination of the available tools and resources that will make your job easier;Conducting a five-step risk assessment, and creating a Statement of Applicability and risk treatment plan;Guidance on integrating your ISO 27001 ISMS with an ISO 9001 QMS and other management systems;Addressing the documentation challenges you'll face as you create business policies, procedures, work instructions and records - including viable alternatives to a costly trial-and-error approach;Continual improvement of your ISMS, including internal auditing and testing, and management review;The six secrets to certification success.If you're tackling ISO 27001 for the first time,Nine Steps to Successwill give you the guidance you need to understand the Standard's requirements and ensure your implementation project is a success - from inception to certification.ContentsProject mandateProject initiationISMS initiationManagement frameworkBaseline security criteriaRisk managementImplementationMeasure, monitor and reviewCertificationAbout the authorAlan Calder is the founder and executive chairman of IT Governance Ltd. He led the implementation of the management system that achieved the world's first accredited certification to BS 7799 - the forerunner to ISO 27001 - and has been working with the Standard through all of its iterations ever since, helping hundreds of organisations to achieve certification to the Standard.Expert guidance for anyone tackling ISO 27001 for the first time - buy this book today and learn the nine steps essential for a successful ISMS implementation.
Protect your organisation's information assets using ISO27001:2013Information is one of your organisation's most important resources. Keeping that information secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it.Furthering the objectives of your organisationInformation security means much more than a technology solution, and requires buy-in from senior managers and the collaboration of all staff in the organisation. For this reason, ISO27001 is not a one-size-fits-all solution, nor is it designed to be a static, fixed entity. By looking at ISO27001 and ISO27002 together, this pocket guide gives a wider view of what it means to implement an ISO27001 ISMS.Creating an ISMS based on ISO27001/ISO27002 will help you to:improve efficiency by having systems and procedures in place, enabling you to focus more on your core businessprotect your information assets from a wide range of cyber threats such as criminal activity and fraud, user errors, outside attack, insider compromise and system failuremanage risk systematically and put in place a plan to eliminate or reduce cyber threats to your organisationprepare for the worst, as ISO27001 requires you to monitor information security events, enabling earlier detection of threats or processing errors, and faster resolution.Completely up to date with the latest 2013 release of ISO27001, ISO27001/ISO27002: A Pocket Guide covers:the ISO/IEC 27000:2013 family of information security standardsbackground to the standards certification processthe ISMS and ISO27001:2013specification vs. code of practicedocumentation and recordsmanagement responsibilitypolicy and scoperisk assessmentimplementationcontinual improvement.Buy this pocket guide and start securing your information assets today
Harly er ikke bare glad for computere, han er også usædvanligt dygtig til at arbejde med dem. Han elsker at eksperimentere med virtual reality, men en dag kommer det til at gå lidt for vildt for sig. Harly har set "Fyrtøjet" i fjernsynet, og sammen med sin ven Svend Erik bliver han nu en del af historien. Pludselig er "Fyrtøjet" langt mere dramatisk, end Harly huskede den.Ole Boje (f.1932) er en dansk journalist, oversætter og forfatter. Han har skrevet for en lang række dag- og ugeblade og står bag både børne- og voksenbøger. Ole Boje har studeret filmmanuskriptteknik i Hollywood og i Italien og har skrevet flere danske filmmanuskripter.
Two leaders in the field offer a compelling analysis of the current state of the art and reveal the steps we must take to achieve a truly robust artificial intelligence.Despite the hype surrounding AI, creating an intelligence that rivals or exceeds human levels is far more complicated than we have been led to believe. Professors Gary Marcus and Ernest Davis have spent their careers at the forefront of AI research and have witnessed some of the greatest milestones in the field, but they argue that a computer beating a human in Jeopardy!does not signal that we are on the doorstep of fully autonomous cars or superintelligent machines. The achievements in the field thus far have occurred in closed systems with fixed sets of rules, and these approaches are too narrow to achieve genuine intelligence. The real world, in contrast, is wildly complex and open-ended. How can we bridge this gap? What will the consequences be when we do? Taking inspiration from the human mind, Marcus and Davis explain what we need to advance AI to the next level, and suggest that if we are wise along the way, we won't need to worry about a future of machine overlords. If we focus on endowing machines with common sense and deep understanding, rather than simply focusing on statistical analysis and gatherine ever larger collections of data, we will be able to create an AI we can trustin our homes, our cars, and our doctors' offices.Rebooting AI provides a lucid, clear-eyed assessment of the current science and offers an inspiring vision of how a new generation of AI can make our lives better.