This second edition of the Strategic Project Leader prepares project managers to develop leadership competencies that translate into increased confidence to lead in a demanding environment.
All best practice recommendations and key success criteria point to the importance of developing soft skills as a project manager, but few sources exist about how to develop the power of influence for achieving better project and business results.
This complete medical informatics textbook begins by reviewing the IT aspects of informatics, including systems architecture, electronic health records, interoperability, privacy and security, cloud computing, mobile healthcare, imaging, capturing data, and design issues.
Together, Big Data, high-performance computing, and complex environments create unprecedented opportunities for organizations to generate game-changing insights that are based on hard data.
Command and Control (C2) is the set of organizational and technical attributes and processes by which an enterprise marshals and employs human, physical, and information resources to solve problems and accomplish missions.
An exploration of the benefits of cloud computing in geoscience research and applications as well as future research directions, Spatial Cloud Computing: A Practical Approach discusses the essential elements of cloud computing and their advantages for geoscience.
Big Data: A Business and Legal Guide supplies a clear understanding of the interrelationships between Big Data, the new business insights it reveals, and the laws, regulations, and contracting practices that impact the use of the insights and the data.
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone.
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices.
This book discusses how built-in and third-party networking tools can be used to diagnose network problems and performance issues as well as enhance the security of computer systems.
Making IT Lean: Applying Lean Practices to the Work of IT presents Lean concepts and techniques for improving processes and eliminating waste in IT operations and IT Service Management, in a manner that is easy to understand.
The Art of Agile Practice: A Composite Approach for Projects and Organizations presents a consistent, integrated, and strategic approach to achieving Agility in your business.
Although enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility has resulted in a lack of books on the subject.
Supplying busy project professionals with time-tested tips and templates for developing teams efficiently and effectively, Team Planning for Project Managers and Business Analysts provides the planning materials required to increase team collaboration and productivity in a global workplace.
Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation: An Action Guide for Business and IT Leaders explains how to increase IT delivery capabilities through the use of Agile and Kanban.
Although tens of thousands of global users have implemented Systems, Applications, and Products (SAP) for enterprise data processing for decades, there has been a need for a dependable reference on the subject, particularly for SAP materials management (SAP MM).
Aligning business intelligence (BI) infrastructure with strategy processes not only improves your organization's ability to respond to change, but also adds significant value to your BI infrastructure and development investments.
The widespread deployment of millions of current and emerging software applications has placed software economic studies among the most critical of any form of business analysis.
Shingo Prize-winning author Steve Bell and other thought leaders show you how guiding you to more effectively align people and purpose, promote enterprise agility, and leverage transformative IT capabilities to create market-differentiating value for your customers.
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways.
Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients' privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health information.
Project management methodologies, practices, and guidelines are the only explicit information that project managers have and, when properly maintained, should reflect the most current knowledge and guidance to achieve repeatable successful project outcomes.
Helpful to those tasked with managing complex environments, Projects and Complexity introduces a new way of looking at projects and fostering the culture needed to achieve sustainable results.
In IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge.
Recognized as One of the Best Business Books for 2014 by CIO MagazineBased on interviews with more than 150 CIOs, IT/business executives, and academic thought leaders, The Strategic CIO: Changing the Dynamics of the Business Enterprise provides insight, success stories, and a step-by-step methodology to transform your IT organization into a strategic asset that drives customer value, increases revenues, and enhances shareholder wealth.
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance.
Although physicians and hospitals are receiving incentives to use electronic health records (EHRs), there is little emphasis on workflow and process improvement by providers or vendors.
This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support.
Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own.
"e;This evidence-based book provides the framework and guidelines that professionals need for working with the contemporary explosion of data that is creating opportunities and challenges to all phases of our society and commerce.