Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and organized approach to implementing networks capable of handling the increasing data requirements of today'salways on mobile society.
A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy.
Taking a broad approach that speaks to experienced and inexperienced process improvement practitioners, CMMI experts and CMMI novices, this second edition thoroughly examines the latest version of the CMMI.
From small start-ups to major corporations, companies of all sizes have embraced cloud computing for the scalability, reliability, and cost benefits it can provide.
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to your organization.
In today's business world, project managers not only have to be diligent in project planning and execution, but also need to have skills in persuasion,communication, and relationship management.
As the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals.
Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that's often left to the last minute or resolved with products that automate the task.
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals.
In today's increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success.
Addressing the unique difficulties involved in day-to-day project management communication, The Project Manager's Communication Toolkit provides proven methods for creating clear and effective communications-including text-based plans, reports, messages, and presentations.
Healthcare Informatics: Improving Efficiency and Productivity examines the complexities involved in managing resources in our healthcare system and explains how management theory and informatics applications can increase efficiencies in various functional areas of healthcare services.
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.
In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT.
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies.
A valuable tool for establishing and maintaining system reliability, overall equipment effectiveness (OEE) has proven to be very effective in reducing unscheduled downtime for companies around the world.
Critical-to-success factors (CSFs) have become essential elements to strategic planning and no business can achieve consistent success without effectively adopting them.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change as well as human dimensions such as economic crises, epidemics, and emergency responses.
Winner of a Shingo Research and Professional Publication AwardInformation Technology is supposed to enable business performance and innovation, improve service levels, manage change, and maintain quality and stability, all while steadily reducing operating costs.
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages.
Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace.
Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuable case studies that illustrate how to combine Six Sigma's rigorous quality principles with Lean methods for uncovering and eliminating waste inIT processes.
Enterprise-Scale Agile Software Development is the collective sum of knowledge accumulated during the full-scale transition of a 1400-person organization to agile development-considered the largest implementation of agile development and Scrum ever attempted anywhere in the world.
Characterized by lightning quick innovation, abrupt shifts in technology, and shorter lifecycles, the marketing of IT products and services presents a unique set of challenges and often requires IT managers and developers to get involved in the marketing process.
This is a collection of essays from key researchers in the field of project management who describe what they feel are the most impactful findings from research.
In today's unforgiving business environment where customers demand zero defect software at lower costs-it is testing that provides the opportunity for software companies to separate themselves from the competition.
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations.
The Green and Virtual Data Center sets aside the political aspects of what is or is not considered green to instead focus on the opportunities for organizations that want to sustain environmentally-friendly economical growth.
Offering a practical way to generate effective and efficient project-specific system architecture engineering methods, this volume addresses the entire range of systems architecture including hardware, software, subsystems, and systems of systems.
As a pioneer in Lean improvement methods, Jim Martin was among the first to suggest that truly successful Lean initiatives are those applied across every facet of an organization, not just on the shop floor.