IT Governance
Subir um nível-
Information Technology Strategic Planning: A Well Developed Framework is Essential to Support the Library´s Current and Future IT Needs Report nº 2008-PA-105 - Abr. 2009
3.0 MB
-
ITIL V3: Tackling the beast - 20 Fev. 2008
98.9 kB
-
Top 10 things IT managers should know about implementing ITIL - 01 Dez. 2007
105.6 kB
-
Comparing E-Government vs. E-Governance - Jun. 2006
36.5 kB
-
The road to IT Governance Excellence - Jun. 2006
536.7 kB
-
Framework to Reinforce the Exchange of Good Practices in eGovernment - A contribution to eEurope 2005 - Abr. 2004
42.9 kB
-
Knowledge Management: Best Practices for Service and Support - Out. 2003
78.6 kB
-
Programme for Open Standards and Open Source Software in Government (OSSOS) - Nov. 2002
686.3 kB
- Users of software are highly dependent on their software suppliers. This dependence is reflected in the obligatory implementation of new versions, the obligatory purchase of new hardware, the unilateral alteration of licence conditions and the termination of maintenance agreements. These are just a few examples of practices that adversely affect organisations throughout the public sector from education and care to population records.
-
Java™ Standards - 2002
414.9 kB
- This paper discusses methods of performing authorization on Java, with particular emphasis on authorization within servers of requests made by remote users. This is the type of authorization provided by Entegrity AssureAccess and other access management products. In distributed environments, it is difficult to protect resources on client systems. Therefore the general practice is to concentrate them in servers. Authorization in non-server contexts tends to be useful in two cases: applets and imbedded systems where the OS does not provide access control.