CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers.
This book provides business managers, IT professionals, and students with an integrated approach to designing, developing, and sustaining an effective data governance strategy.
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people.
An accessible primer, Electronic Health Record: A Systems Analysis of the Medications Domain introduces the tools and methodology of Structured Systems Analysis as well as the nuances of the Medications domain.
The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization.
This book explains how to achieve dramatic improvements in service and agility by enhancing the people, processes, and culture within your organization.
Making IT Lean: Applying Lean Practices to the Work of IT presents Lean concepts and techniques for improving processes and eliminating waste in IT operations and IT Service Management, in a manner that is easy to understand.
The third book in the Healthcare Payment Systems series, Prospective Payment Systems examines the various types of prospective payment systems (PPS) used by healthcare providers and third-party payers.
The fourth book in the Healthcare Payment System series, Cost-Based, Charge-Based, and Contractual Payment Systems compares cost-based systems, charge-based payment approaches, and contractually-based payment processes with fee-schedule payment systems and prospective payment systems.
Although physicians and hospitals are receiving incentives to use electronic health records (EHRs), there is little emphasis on workflow and process improvement by providers or vendors.
Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage.
Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure.
Used by corporations, industry, and government to inform and fuel everything from focused advertising to homeland security, data mining can be a very useful tool across a wide range of applications.
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security.
Although enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility has resulted in a lack of books on the subject.
The widespread deployment of millions of current and emerging software applications has placed software economic studies among the most critical of any form of business analysis.
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals.
Aligning business intelligence (BI) infrastructure with strategy processes not only improves your organization's ability to respond to change, but also adds significant value to your BI infrastructure and development investments.
Offering an introduction to Cloud-based healthcare IT system, this timely book equips healthcare providers with the background necessary to evaluate and deploy Cloud-based solutions to today's compliance and efficiency issues.
A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes.
Healthcare Informatics: Improving Efficiency and Productivity examines the complexities involved in managing resources in our healthcare system and explains how management theory and informatics applications can increase efficiencies in various functional areas of healthcare services.
Cloud computing has created a shift from the use of physical hardware and locally managed software-enabled platforms to that of virtualized cloud-hosted services.
Detailing procedures that will help your team perform better risk assessments and aggregate results into more meaningful metrics, Practical Risk Management for the CIO approaches information risk management through improvements to information management and information security.
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules.
Detailing powerful methods for reducing the energy costs associated with operating a data center, Making Your Data Center Energy Efficient examines both equipment and building facilities.
Supplying busy project professionals with time-tested tips and templates for developing teams efficiently and effectively, Team Planning for Project Managers and Business Analysts provides the planning materials required to increase team collaboration and productivity in a global workplace.
Edited by Jussi Kantola, the founding faculty member of the world's first university Knowledge Service Engineering Department at Korea Advanced Institute of Science and Technology, and Waldemar Karwowski from the Department of Industrial Engineering and Management Systems at UCF, Knowledge Service Engineering Handbook defines what knowledge services engineering means and how it is different from service engineering and service production.
Whether you use budget, schedule, quality, or other criteria, the statistics by think tanks, institutes, associations, and other trade organizations all point to one inescapable conclusion: your project has a greater chance of getting into trouble than staying out of it.
Written for project managers who may encounter ethical dilemmas, this book considers typical and atypical ethical issues that may occur in each phase of the project life cycle.
This cutting-edge reference represents a new phase in the talkRA project-an initiative dedicated to improving the discipline of revenue assurance (RA) for communication providers.
The Art of Agile Practice: A Composite Approach for Projects and Organizations presents a consistent, integrated, and strategic approach to achieving Agility in your business.
Although complexity is a phenomenon that confounds and challenges program managers across industry sectors, there is little information available that identifies the set of competencies managers need to complete their program successfully and deliver the benefits desired by stakeholders.
In IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge.
In order to achieve long-term profitability and assure survival for their companies, managers must be informed, imaginative, and capable of adapting to shifting circumstances.
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance.
As the population ages and healthcare costs continue to soar, the focus of the nation and the healthcare industry turns to reducing costs and making the delivery process more efficient.