Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher von Haitham Ismail

Filter
Filter
Ordnen nachSortieren Beliebt
  • von Haitham Ismail
    17,95 €

    Project Report from the year 2021 in the subject Business economics - Offline Marketing and Online Marketing, grade: 75, , language: English, abstract: In this study, a situational factors analysis relates to the retail business of grooming products is conducted to clarify the customer, organisational, market and product (COMP) situational factors for Shaver Shop to assess its ability to satisfy customer needs.First, the study will explore Shaver Shop's current customers, organisation, market, and product characteristics. Then, a summary of strengths, weaknesses, opportunities and threats are summarised in a SWOT matrix.Shaver Shop is a specialised retailer for grooming products; it has many points of strength, such as excellent customer service, well-trained staff and the exclusiveness of some products. The company also has weaknesses, such as basic websites, the absence of a mobile application, poor logistics and delivery system and customer membership. However, it has opportunities if it successfully leverages the DIY trend, artificial intelligence and the overall economic recovery.

  • von Haitham Ismail
    13,99 €

  • von Haitham Ismail
    14,99 €

    Essay from the year 2017 in the subject Computer Science - Applied, grade: A, Anglia Ruskin University, language: English, abstract: Information technology project management is different from normal project management due to the possible complexity it could be. It could vary from designing the infrastructure of a new building to developing a simple application. Its complexity comes from the fact that many teams can be involved (e.g. network team, software team, technical support, vendors, finance, etc.). In addition, the dynamic nature of the IT projects requires the project manager to be more agile to challenges that might come. In this article, we will have a situation from real life on how IT project manager will organize his project in all its stages, from project initiation to project close. It will show samples of reports that should be generated periodically to track the project execution.

  • von Haitham Ismail
    15,95 €

    Essay from the year 2019 in the subject Computer Science - IT-Security, , language: English, abstract: PII is Personal Identifiable Information is the information that can be used on its own or with other information to identify, contact, or locate a single person and it is maintained by the information technology department of any organization. An example of PII is data like names, place or date of birth, email address, National ID, Passport Number, employment information finical or medical records, etc. Likewise, PHI has Protected health information according to HIPA is any health information whether oral or recorded in any form of media which is created or received by a health care provider, public health authority, employer, life insurer or hospital. PII and PHI are different from any kind of data as it should be collected, maintained and disseminated according to fair information practice which is the base of Laws and regulations. In this article, we will discuss what is needed to make your organization able to handle securely and according to privacy laws. Furthermore, it will help in understanding the basic concepts of industry standards like HIPAA Security rule. Finally, it has recommendation and guidelines to be followed when protecting information

  • von Haitham Ismail
    47,95 €

    Master's Thesis from the year 2018 in the subject Computer Science - IT-Security, grade: B, Anglia Ruskin University, course: Dissertation, language: English, abstract: Information Security is very important for businesses and national security of any country. In the Middle East, especially with the current geopolitical tensions and unbalanced situation resulting from terrorism rising, cybersecurity is very important to protect the nation¿s economy and security. This research investigates with a deep look inside hybrid cloud security deployments, which is new to the Middle East region with focusing on Infrastructure as service security (IaaS). Furthermore, it assesses the current practice when it comes to cloud data adoption in an IaaS environment, whether it is on-premises or hosted by a third party, dedicated or shared across multitenant. This research aims to develop two templates to be followed by IT professionals whether they have the required expertise for cloud adoption or not to guide them through the whole data cloud adoption process. According to the risk appetite of the organization and their acceptable risk level, the template is chosen. These templates contain a guide to design the cloud security infrastructures, the placement of information in different IaaS deployment models (e.g. private IaaS, public IaaS, community IaaS, etc.), and what controls recommended to establish controls and governance in the cloud realm. These templates were developed based on the recommendation and guidelines National Institute of Standards and Technology (NIST), Cloud Security Alliance (CSA), and European Union Agency for Network and Information Security (ENISA).

  • von Haitham Ismail
    17,95 €

    Document from the year 2017 in the subject Computer Science - Internet, New Technologies, grade: B, Anglia Ruskin University, language: English, abstract: Ransomware is a dangerous malware which causes high financial loses for organizations. It is usually installed using a type of privilage esclation attack and then it encrypts data, asking for a ransom. In this paper, we will analyze ransomware life cycle and answer the question how to arrange your information security defences to combat ransomware outbreak.Information is an important asset for individuals, organisations, and governments. Stealing confidential information such as credit card numbers or Intellectual properties can cause financial loss or reputation damage. For example, Organisations invest in research creating intellectual property to secure their future earnings and pursue innovation. Because of that, Rao & Nayak (2014) state that intellectual property is valuable assets that need to be protected from theft or unauthorised access as it will cost mainly a severe financial loss. Chai, et al. (2016) state that individuals might be subjected to electronic bullying and harassments through internet social media like Facebook and Twitter. Most of the cases, protecting customer¿s information is protected by law which means that the theft of customer¿s sensitive information such as personal identifiable information (PII) and protected health information (PHI) will cause organisations to pay fines that consider also as a financial loss and reputation damage. In Healthcare industry, unauthorised modification on medical records can cause human life losses.Hammondl (2013) states that effective information security addresses the security triad (Confidentiality, Integrity & Availability). Confidentiality grantees that sensitive information (e.g. PHI, PII, Credit card, etc.) accessed by those who have the authority to access them. On the other hand, Integrity is making sure that data is protected against unauthorised malicious or non-intention modifications (Hammondl, 2013). Finally, availability grantees that information is available for the right person when it's needed and access granted.BBC (2017) reported in 12th of May an example that shows how important information security is to our life. Information security was violated by a massive cyber-attack hit NHS services across England and Scotland resulting hospital operation disruption and GP appointments that make staff uses pen and papers.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.