Buy qrcodecompanies.org ?

Products related to Monitoring:


  • Workplace Monitoring and Technology
    Workplace Monitoring and Technology

    Workplace Monitoring and Technology aims to showcase results of research and explanatory theories that influence employees' acceptance of the fact that work is monitored using ICT-based monitoring tools.Work monitoring, understood as obtaining, storing and reporting the results of collected observations, has always been a managerial task.Traditionally it was carried out by supervisors who, while overseeing the work of employees, would draw conclusions from their observations and implement corrective actions.The use of information and communication technologies (ICT) to monitor the working employee and their performance has changed the methods of monitoring, and the popularization of remote work has increased interest in searching for new monitoring systems using the full potential of new ICT solutions.The new developments in ICT have caused smart monitoring systems and new solutions to evolve in electronic work monitoring based on the Internet of Things and Artificial Intelligence, which enables nearly cost-free monitoring.However, scientific knowledge about them is limited, and above all, so is managerial knowledge about the reception of these tools by employees, while their misuse can cause considerable damage.Presenting a broad overview of the current state of different areas of scientific knowledge regarding smart and electronic monitoring systems of work performance, this book will be of relevance for academics within the fields of human resource management and performance management, and for similar groups of researchers in psychology and sociology.

    Price: 135.00 £ | Shipping*: 0.00 £
  • Workplace Monitoring and Technology
    Workplace Monitoring and Technology

    Workplace Monitoring and Technology aims to showcase results of research and explanatory theories that influence employees' acceptance of the fact that work is monitored using ICT-based monitoring tools.Work monitoring, understood as obtaining, storing and reporting the results of collected observations, has always been a managerial task.Traditionally it was carried out by supervisors who, while overseeing the work of employees, would draw conclusions from their observations and implement corrective actions.The use of information and communication technologies (ICT) to monitor the working employee and their performance has changed the methods of monitoring, and the popularization of remote work has increased interest in searching for new monitoring systems using the full potential of new ICT solutions.The new developments in ICT have caused smart monitoring systems and new solutions to evolve in electronic work monitoring based on the Internet of Things and Artificial Intelligence, which enables nearly cost-free monitoring.However, scientific knowledge about them is limited, and above all, so is managerial knowledge about the reception of these tools by employees, while their misuse can cause considerable damage.Presenting a broad overview of the current state of different areas of scientific knowledge regarding smart and electronic monitoring systems of work performance, this book will be of relevance for academics within the fields of human resource management and performance management, and for similar groups of researchers in psychology and sociology.

    Price: 39.99 £ | Shipping*: 0.00 £
  • Information Technology Security and Risk Management : Inductive Cases for Information Security
    Information Technology Security and Risk Management : Inductive Cases for Information Security

    Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.As the title indicates, the cases are written and analyzed inductively, which is to say that the authors allowed the cases to speak for themselves, and lead where they would, rather than approach the cases with presuppositions or assumptions regarding what the case should be "about".In other words, the authors were given broad discretion to interpret a case in the most interesting and relevant manner possible; any given case may be "about" many things, depending on the perspective adopted by the reader, and many different lessons may be learned.The inductive approach of these cases reflects the design philosophy of the advanced IT Security and Risk Management course we teach on the topic here at the University of Canterbury, where all discussions begin with the analysis of a specific case of interest and follow the most interesting and salient aspects of the case in evidence.In our course, the presentation, analysis, and discussion of a case are followed by a brief lecture to address the conceptual, theoretical, and scholarly dimensions arising from the case.The inductive approach to teaching and learning also comes with a huge advantage – the students seem to love it, and often express their appreciation for a fresh and engaging approach to learning the sometimes-highly-technical content of an IT security course.As instructors, we are also grateful for the break in the typical scripted "chalk-and-talk" of a university lecture afforded by the spontaneity of the inductive approach. We were motivated to prepare this text because there seems to be no other book of cases dedicated to the topic of IT security and risk management, and because of our own success and satisfaction with inductive teaching and learning.We believe this book would be useful either for an inductive, case-based course like our own or as a body of cases to be discussed in a more traditional course with a deductive approach.There are abstracts and keywords for each case, which would help instructors select cases for discussions on specific topics, and PowerPoint slides are available as a guide for discussion about a given case.

    Price: 37.99 £ | Shipping*: 0.00 £
  • Modern Cryptography : Applied Mathematics for Encryption and Information Security
    Modern Cryptography : Applied Mathematics for Encryption and Information Security

    This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices.Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters.Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape.Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications.The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography.This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given.The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography;Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear);Includes a full suite of classroom materials including exercises, Q&A, and examples.

    Price: 49.99 £ | Shipping*: 0.00 £
  • Is digital traffic monitoring for parking violations legal?

    Digital traffic monitoring for parking violations is legal in many jurisdictions, as long as it complies with local laws and regulations. However, it is important to ensure that the monitoring is conducted in accordance with privacy laws and that any data collected is handled and stored in a secure and compliant manner. Additionally, it is essential to clearly communicate to the public that digital monitoring is being used for parking enforcement purposes. Overall, digital traffic monitoring for parking violations can be legal and effective when implemented responsibly and in accordance with the law.

  • How does the monitoring of mobile phones work?

    The monitoring of mobile phones typically involves the use of specialized software or apps that can be installed on the device to track its location, call logs, text messages, and internet usage. This software can be installed either with physical access to the phone or remotely through phishing attacks or other methods. Once installed, the software can transmit the data to a monitoring system, allowing the user to track the phone's activity in real-time or review historical data. This type of monitoring is often used by parents to keep an eye on their children's phone usage or by employers to track company-issued devices. However, it's important to note that monitoring someone's phone without their consent may be illegal in some jurisdictions.

  • What are the data of the Mauna Loa monitoring station?

    The Mauna Loa monitoring station collects data on atmospheric carbon dioxide levels. This data is crucial for understanding the impact of human activities on the Earth's climate. The station has been collecting data since the late 1950s, providing one of the longest continuous records of carbon dioxide levels in the world. The data collected at Mauna Loa has been instrumental in shaping our understanding of climate change and informing policy decisions.

  • What are the data from the Mauna Loa monitoring station?

    The Mauna Loa monitoring station collects data on atmospheric carbon dioxide levels. This data is crucial for understanding the impact of human activities on climate change. The continuous measurements taken at Mauna Loa have shown a steady increase in carbon dioxide levels over the years, providing valuable information for climate scientists and policymakers. The data from Mauna Loa has been instrumental in shaping our understanding of global carbon cycles and the need for action to mitigate climate change.

Similar search terms for Monitoring:


  • The Practice Of Network Security Monitoring
    The Practice Of Network Security Monitoring

    Network security is not simply about building impenetrable walls determined attackers will eventually overcome traditional defenses.The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks no prior experience required.To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to: Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There s no foolproof way to keep attackers out of your network.But when they get in, you ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them.Attacks are inevitable, but losing sensitive data shouldn't be.

    Price: 53.99 £ | Shipping*: 0.00 £
  • Lenovo Absolute PS - Endpoint Security Monitoring
    Lenovo Absolute PS - Endpoint Security Monitoring

    Lenovo Absolute PS - Endpoint Security Monitoring

    Price: 314.33 £ | Shipping*: 0.00 £
  • Windows Security Monitoring : Scenarios and Patterns
    Windows Security Monitoring : Scenarios and Patterns

    Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you understand the operating system's event logging patterns for operations and changes performed within the system.Expert guidance brings you up to speed on Windows auditing, logging, and event systems to help you exploit the full capabilities of these powerful components.Scenario–based instruction provides clear illustration of how these events unfold in the real world.From security monitoring and event patterns to deep technical details about the Windows auditing subsystem and components, this book provides detailed information on security events generated by the operating system for many common operations such as user account authentication, Active Directory object modifications, local security policy changes, and other activities. This book is based on the author's experience and the results of his research into Microsoft Windows security monitoring and anomaly detection.It presents the most common scenarios people should be aware of to check for any potentially suspicious activity. Learn to: Implement the Security Logging and Monitoring policyDig into the Windows security auditing subsystemUnderstand the most common monitoring event patterns related to operations and changes in the Microsoft Windows operating system About the Author Andrei Miroshnikov is a former security program manager with Microsoft.He is an organizer and author for the DEFCON security conference "Forensics CTF" village and has been a speaker at Microsoft's Bluehat security conference.In addition, Andrei is an author of the "Windows 10 and Windows Server 2016 Security Auditing and Monitoring Reference" and multiple internal Microsoft security training documents.Among his many professional qualifications, he has earned the (ISC)2 CISSP and Microsoft MCSE: Security certifications.

    Price: 37.99 £ | Shipping*: 0.00 £
  • Car TPMS Tyre Pressure Monitoring SystemTyre Pressure Battery Digital LCD Display Auto Security
    Car TPMS Tyre Pressure Monitoring SystemTyre Pressure Battery Digital LCD Display Auto Security

    Car TPMS Tyre Pressure Monitoring SystemTyre Pressure Battery Digital LCD Display Auto Security

    Price: 12.29 € | Shipping*: 3.41 €
  • How can the monitoring of VPN data be carried out?

    The monitoring of VPN data can be carried out through various methods. One common approach is to use network monitoring tools that can track and analyze the traffic passing through the VPN connection. These tools can provide insights into the volume, type, and source/destination of the data being transmitted. Additionally, organizations can implement logging and auditing mechanisms within the VPN infrastructure to track user activity and access to specific resources. Finally, some VPN providers offer built-in monitoring and reporting features that allow administrators to track usage and performance metrics.

  • What is the question about parental monitoring of mobile phones?

    The question about parental monitoring of mobile phones revolves around the ethical implications of parents monitoring their children's phone activities. It raises concerns about privacy, trust, and the potential impact on the parent-child relationship. It also delves into the effectiveness of such monitoring in ensuring the safety and well-being of children in the digital age.

  • How does the monitoring of mobile phones and computers work?

    Monitoring of mobile phones and computers typically involves the use of software or applications that can be installed on the device to track and record various activities. These monitoring tools can capture data such as call logs, text messages, browsing history, and app usage. Some monitoring software can also track the device's location using GPS. Once the data is collected, it is usually sent to a central server or dashboard where the user can access and review the information. This type of monitoring is often used by parents to keep an eye on their children's online activities or by employers to track employee productivity and ensure company devices are being used appropriately.

  • Who is monitoring the toilets?

    The toilets are typically monitored by building maintenance staff or custodial workers. They are responsible for ensuring that the toilets are clean, well-stocked with supplies, and in proper working condition. In some cases, there may also be automated monitoring systems in place to track usage and alert staff when maintenance is needed. Overall, the goal is to provide a clean and functional restroom environment for users.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.