About this Item

The item is a book Paperback
The Author Name is Tom Litterer
The Title is System Administration Ethics : Ten Commandments for Security and Compliance in a Modern Cyber World

Condition New

Other Comments
New Store Stock


Product Description -
Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today's digital landscape. This book serves as a equitable guideline in helping system administrators, engineers - as well as their managers - on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see how to correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments. Using the appropriate rules of engagement, best policies and practices, and proactive "building/strengthening" behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment. What You'll LearnThe concepts of Least Privilege and Need to KnowRequest change approval and conduct change communicationFollow "Break Glass" emergency proceduresCode with data breaches, hacking and security violations, and proactively embrace and design for failures Build and gain trust with employees and build the right ethical cultureReview what managers can do to improve ethics and protect their employeesWho This Book Is ForThis book's primary audience includes system administrators and information security specialists engaged with the creation, process and administration of security policies and systems. A secondary audience includes company leaders seeking to improve the security, privacy, and behavioral practices.

Because we have over 2 million items for sale, we have to use stock images, not actual images of the items for sale. Unless explicitly mentioned in this listing, the purchase of this specific item is made with the understanding that the  image is a stock image and not the actual item for sale. For example, some of our stock images include stickers,  labels, price tags, hyper stickers, obi's, promotional messages, and or writing on the sleeve or disk label.

When possible we will add details of the items we are selling to help buyers know what is included in the item for sale. The details  are provided automatically  from our central master database and can sometimes be wrong.

Books are released in many editions and variations, such as standard edition, re-issue, not for sale, promotional, special edition, limited edition, and many other editions and versions.  The Book you receive could be any of these editions or variations. If you are looking for a specific edition or version please contact us to verify what we are selling.

 

Gift Ideas
This is a  great  gift idea.

 

Hours of Service
We have many warehouses,  some of the warehouses process orders seven days a week, but the Administration Support Staff are located at a head office location, outside of the warehouses, and typically work only Monday to Friday.
 

Contact Us
Please contact us to check and verify the details of the item before purchasing if there is a specific image, edition, or variation you are looking for. If we have resources available we will share images.


Location ID 245z

iHaveit SKU ID 153638177

Unique Reference Number 2319476466