As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective.
As featured on CNN, Forbes and Inc - BookAuthority identifies and rates the best books in the world, based on recommendations by the world's most successful business leaders and experts.
The primary cause of many project failures is that responsible executives, because of their lack of knowledge in project management, fail to demand that their managers and staff properly utilize the well-proven best practices, processes, systems, and tools that are now available in this field.
A valuable tool for establishing and maintaining system reliability, overall equipment effectiveness (OEE) has proven to be very effective in reducing unscheduled downtime for companies around the world.
In Rethinking Information Systems in Organizations John Paul Kawalek challenges the current orthodoxy of information systems and proposes new alternatives.
A comprehensive guide to understanding network architecture, communication protocols, and network analysis to build secure applications compatible with the latest versions of C# 8 and .
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime.
The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses.
Although software development is one of the most complex activities carried out by man, sound development processes and proper project management can help ensure your software projects are delivered on time and under budget.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets.
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance.
Census data is widely used by practitioners to understand demographic change, allocate resources, address inequalities, and make sound business decisions.
Presents an analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek).
Executives should not necessarily know the intricacies of project management, but they should know how project management, as a discipline, can benefit the organization in implementing its strategies and realizing its vision.
SHELVING GUIDE: Project ManagementThis hands-on guide is written for project professionals seeking to find an optimized way of performing project management.
Census data is widely used by practitioners to understand demographic change, allocate resources, address inequalities, and make sound business decisions.
Wireless Sensor Networks and the Internet of Things: Future Directions and Applications explores a wide range of important and real-time issues and applications in this ever-advancing field.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
This book explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients.
An exploration of the benefits of cloud computing in geoscience research and applications as well as future research directions, Spatial Cloud Computing: A Practical Approach discusses the essential elements of cloud computing and their advantages for geoscience.
In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present.
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment.
If you had to evacuate from your building right now and were told you couldn't get back in for two weeks, would you know what to do to ensure your business continues to operate?
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases.
Focusing on the critical role IT plays in organizational development, the book shows how to employ action learning to improve the competitiveness of an organization.
With the majority of IT projects being delivered late, over budget, or cancelled altogether, it is clear that traditional project management methodologies do not provide an effective framework for today's IT projects.