top of page

Publications

Below you will find some of my publocations. They are written as handbooks to be used for remembering and training purposes. Free to download

Enjoy!

Already the ancient Romans sent coded messages to each other and throughout history until today, encryption has played an extremely important role in society

Crypto

Management is about creating a model/method (management model) to ensure that we support, maintain, further develop and support the systems/applications/services/processes that we and IT use to deliver value to the business.

Processoriented System Management

Working in projects means that we organize well-chosen competencies in a temporary cross-functional project group and define some control parameters, such as where we are going, how we should get there and when we should arrive.

Project Management

The General Data Protection Regulation (GDPR) is the toughest privacy and security law in the world. Though it was drafted and passed by the European Union (EU), it imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU. 

GDPR & NIS 1+2

Industrial IoT (IIoT) refers to the application of IoT technology in industrial settings, especially with respect to instrumentation and control of sensors and devices that engage cloud technologies.

IoT Described
bottom of page