This updated and reorganized fourth edition of Software Testing: A Craftsman's Approach applies the strong mathematics content of previous editions to a coherent treatment of Model-Based Testing for both code-based (structural) and specification-based (functional) testing.
Although software development is one of the most complex activities carried out by man, sound development processes and proper project management can help ensure your software projects are delivered on time and under budget.
This book prepares readers to master an IT and managerial discipline quickly gaining momentum in organizations of all sizes - Business Process Management (BPM).
An accessible primer, Electronic Health Record: A Systems Analysis of the Medications Domain introduces the tools and methodology of Structured Systems Analysis as well as the nuances of the Medications domain.
Business-Driven IT-Wide Agile (Scrum) and Kanban (Lean) Implementation: An Action Guide for Business and IT Leaders explains how to increase IT delivery capabilities through the use of Agile and Kanban.
In today's increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success.
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.
Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment.
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers.
Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage.
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security.
Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure.
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules.
With the majority of IT projects being delivered late, over budget, or cancelled altogether, it is clear that traditional project management methodologies do not provide an effective framework for today's IT projects.
This book discusses how built-in and third-party networking tools can be used to diagnose network problems and performance issues as well as enhance the security of computer systems.
When implemented correctly, release management can help ensure that quality is integrated throughout the development, implementation, and delivery of services, applications, and infrastructure.
Whether you use budget, schedule, quality, or other criteria, the statistics by think tanks, institutes, associations, and other trade organizations all point to one inescapable conclusion: your project has a greater chance of getting into trouble than staying out of it.
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices.
Shingo Prize-winning author Steve Bell and other thought leaders show you how guiding you to more effectively align people and purpose, promote enterprise agility, and leverage transformative IT capabilities to create market-differentiating value for your customers.
Explaining how going green can pay for itself, Green Computing: Tools and Techniques for Saving Energy, Money, and Resources ties the green agenda in IT to the broader corporate agenda in risk management, brand management, and reputation management.
Whether it's because of a lack of understanding, poor planning, or a myriad of other things, 50 to 60 percent of the IT effort in most companies can be considered waste.
Illustrating the why, what, and how of project management, Project Management Concepts, Methods, and Techniques will help readers develop and refine the skills needed to achieve strategic objectives.
Helpful to those tasked with managing complex environments, Projects and Complexity introduces a new way of looking at projects and fostering the culture needed to achieve sustainable results.
This two volume set of the Computing Handbook, Third Edition (previously theComputer Science Handbook) provides up-to-date information on a wide range of topics in computer science, information systems (IS), information technology (IT), and software engineering.
Describing both the practical details of interest to students and the high-level concepts and abstractions highlighted by faculty, The Tao of Computing, Second Edition presents a comprehensive introduction to computers and computer technology.
This book prepares readers to master an IT and managerial discipline quickly gaining momentum in organizations of all sizes - Business Process Management (BPM).
Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment.
Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards.
Although there are countless books about process improvement and business performance, there is a dearth of literature on how process improvement yields business performance results.
Winner of a Shingo Research and Professional Publication AwardInformation Technology is supposed to enable business performance and innovation, improve service levels, manage change, and maintain quality and stability, all while steadily reducing operating costs.
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle.