000916192 000__ 03490cam\a2200469Ii\4500 000916192 001__ 916192 000916192 005__ 20230306150529.0 000916192 006__ m\\\\\o\\d\\\\\\\\ 000916192 007__ cr\nn\nnnunnun 000916192 008__ 191031s2019\\\\caua\\\\o\\\\\001\0\eng\d 000916192 019__ $$a1127274657$$a1127989219$$a1128811800 000916192 020__ $$a9781484249888$$q(electronic book) 000916192 020__ $$a1484249887$$q(electronic book) 000916192 0248_ $$a10.1007/978-1-4842-4 000916192 035__ $$aSP(OCoLC)on1126004412 000916192 035__ $$aSP(OCoLC)1126004412$$z(OCoLC)1127274657$$z(OCoLC)1127989219$$z(OCoLC)1128811800 000916192 040__ $$aLQU$$beng$$erda$$cLQU$$dGW5XE$$dNOC$$dEBLCP$$dTEFOD$$dYDXIT 000916192 049__ $$aISEA 000916192 050_4 $$aTK5105.878$$b.L58 2019 000916192 050_4 $$aT58.5 000916192 08204 $$a174/.9004$$223 000916192 08204 $$a005.8 000916192 1001_ $$aLjubuncic, Igor,$$eauthor. 000916192 24510 $$aSystem Administration Ethics :$$bTen Commandments for Security and Compliance in a Modern Cyber World /$$cIgor Ljubuncic, Tom Litterer. 000916192 264_1 $$aBerkeley, CA :$$bAPress,$$c[2019] 000916192 300__ $$a1 online resource (xxx, 290 pages) :$$billustrations 000916192 336__ $$atext$$btxt$$2rdacontent 000916192 337__ $$acomputer$$bc$$2rdamedia 000916192 338__ $$aonline resource$$bcr$$2rdacarrier 000916192 500__ $$aIncludes index. 000916192 5050_ $$aChapter 1: In the Beginning -- Chapter 2: Separate Roles -- Chapter 3: Respect Privacy -- Chapter 4: Do Not Change Data -- Chapter 5: Don't Steal (Intellectual Property) -- Chapter 6: Don't Steal (Computers) -- Chapter 7: Do Not Go Where You Are Not Wanted -- Chapter 8: Follow Procedures and Get Out -- Chapter 9: Communicate Change -- Chapter 10: Do No Harm -- Chapter 11: Break Glass. 000916192 506__ $$aAccess limited to authorized users. 000916192 520__ $$aSuccessfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in todays digital landscape. This book serves as a equitable guideline in helping system administrators, engineers - as well as their managers - on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see how to correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments. Using the appropriate rules of engagement, best policies and practices, and proactive "building/strengthening" behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment. 000916192 588__ $$aDescription based on online resource; title from digital title page (viewed on November 12, 2019). 000916192 650_0 $$aInformation technology$$xMoral and ethical aspects. 000916192 650_0 $$aComputer security. 000916192 650_0 $$aComputer networks. 000916192 7001_ $$aLitterer, Tom. 000916192 852__ $$bebk 000916192 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-4988-8$$zOnline Access$$91397441.1 000916192 909CO $$ooai:library.usi.edu:916192$$pGLOBAL_SET 000916192 980__ $$aEBOOK 000916192 980__ $$aBIB 000916192 982__ $$aEbook 000916192 983__ $$aOnline 000916192 994__ $$a92$$bISE