Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial products, and future challenges.
Recognizing the importance of selecting and pursuing programs, projects, and operational work that add sustainable business value that benefits end users, the Project Management Institute (PMI) issued its first Standard on Portfolio Management in 2006.
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures.
If you are in search of real-world practical scenarios of IT performance management practices, with a desire to obtain examples of strategic directives, accountabilities, outcomes, and performance measures for managing IT services, with an interest toward how performance management integrates with strategic and operational management, then Integrat
This book highlights the practical aspects of using Oracle Essbase and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution.
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases.
In today's competitive business environment, most companies realize that the better they can manage their customer relationships, the more successful they will become.
As we get caught up in the quagmire of big data and analytics, it is important to be able to reflect and apply insights, experience, and intuition as part of the decision-making process.
Explaining how ubiquitous computing is rapidly changing our private and professional lives, Ethical IT Innovation: A Value-Based System Design Approach stands at the intersection of computer science, philosophy, and management and integrates theories and frameworks from all three domains.
Organizations increasingly need to deal with unstructured processes that traditional business process management (BPM) suites are not designed to deal with.
Programming Languages for MIS: Concepts and Practice supplies a synopsis of the major computer programming languages, including C++, HTML, JavaScript, CSS, VB.
If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets.
With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase to 90 percent by the end of 2014, it is not a question of if, or when, it's a question of will you be ready.
Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises.
Examining the project environment from the perspective of project team members, this book re-interprets project management methodologies and behaviors using a bottom-up approach.
Up to date with the third edition of PMI's Standard for Program Management, this is the most comprehensive resource available to help prepare readers for the PgMP Exam.
Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own.
Although there are countless books about process improvement and business performance, there is a dearth of literature on how process improvement yields business performance results.
Data Warehousing for Biomedical Informatics is a step-by-step how-to guide for designing and building an enterprise-wide data warehouse across a biomedical or healthcare institution, using a four-iteration lifecycle and standardized design pattern.
The growing complexity of projects today, as well as the uncertainty inherent in innovative projects, is making obsolete traditional project management practices and procedures, which are based on the notion that much about a project is known at its start.
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment.
"e;If I were giving out an award for 'book of the year' for internal audit professionals, I would certainly award it to her outstanding manuscript: Radical Reporting: Writing Better Audit, Risk, Compliance and Information Security Reports.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.
Artificial intelligence and machine learning are integral parts of every business today, in areas ranging from finance, strategic decision-making, HR operations, and sales and marketing to manufacturing and more.
The workplace landscape has evolved dramatically over the past few decades, and with this transformation comes an ever-present threat: cybersecurity risks.