With the majority of IT projects being delivered late, over budget, or cancelled altogether, it is clear that traditional project management methodologies do not provide an effective framework for today's IT projects.
This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment.
It is almost impossible to conceive of the concept and practical application of supply chain management (SCM) without linking it to the enabling power of today's information technologies.
Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and organized approach to implementing networks capable of handling the increasing data requirements of today'salways on mobile society.
A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy.
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional.
Taking a broad approach that speaks to experienced and inexperienced process improvement practitioners, CMMI experts and CMMI novices, this second edition thoroughly examines the latest version of the CMMI.
From small start-ups to major corporations, companies of all sizes have embraced cloud computing for the scalability, reliability, and cost benefits it can provide.
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to your organization.
In today's business world, project managers not only have to be diligent in project planning and execution, but also need to have skills in persuasion,communication, and relationship management.
As the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals.
Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that's often left to the last minute or resolved with products that automate the task.
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals.
In today's increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success.
Addressing the unique difficulties involved in day-to-day project management communication, The Project Manager's Communication Toolkit provides proven methods for creating clear and effective communications-including text-based plans, reports, messages, and presentations.
Healthcare Informatics: Improving Efficiency and Productivity examines the complexities involved in managing resources in our healthcare system and explains how management theory and informatics applications can increase efficiencies in various functional areas of healthcare services.
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.
In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT.
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies.
A valuable tool for establishing and maintaining system reliability, overall equipment effectiveness (OEE) has proven to be very effective in reducing unscheduled downtime for companies around the world.
Critical-to-success factors (CSFs) have become essential elements to strategic planning and no business can achieve consistent success without effectively adopting them.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change as well as human dimensions such as economic crises, epidemics, and emergency responses.
Winner of a Shingo Research and Professional Publication AwardInformation Technology is supposed to enable business performance and innovation, improve service levels, manage change, and maintain quality and stability, all while steadily reducing operating costs.
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages.
Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace.
Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuable case studies that illustrate how to combine Six Sigma's rigorous quality principles with Lean methods for uncovering and eliminating waste inIT processes.
Enterprise-Scale Agile Software Development is the collective sum of knowledge accumulated during the full-scale transition of a 1400-person organization to agile development-considered the largest implementation of agile development and Scrum ever attempted anywhere in the world.
Characterized by lightning quick innovation, abrupt shifts in technology, and shorter lifecycles, the marketing of IT products and services presents a unique set of challenges and often requires IT managers and developers to get involved in the marketing process.
This is a collection of essays from key researchers in the field of project management who describe what they feel are the most impactful findings from research.