Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls.
Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization.
Grounded in practicality, this book explains the procedures for running a successful project and highlights the finer points of managing and controlling the project.
In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent compliance requirements.
If you had to evacuate from your building right now and were told you couldn't get back in for two weeks, would you know what to do to ensure your business continues to operate?
As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations.
Mastering cluster technology-the linking of servers-is becoming increasingly important for application and system programmers and network designers, administrators, and managers.
Discussing specific best practices for making specific decisions, this book offers qualitative and quantitative methods, tools, and techniques for deploying and supporting all kinds of information technology.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment.
Delivering successful projects means the ability to produce high quality software within budget and on time-consistently, but when one mentions quality to software engineers or project managers, they talk about how impossible it is to eliminate defects from software.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam.
In orderto maximizeIT resources andjustify IT expenditures, CIO's and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand.
In a business world of uncertain budgets, relentless technology changes, scarce management talent, and intense production demands, theory is good, but practice sells.
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product.
Providing structured yet adaptable models of project success within an organization, A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum.
Process Improvement and CMMI for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software.
Completely revised and updated, ERP: Tools, Techniques, and Applications for Integrating the Supply Chain, Second Edition describes, from the perspective of a business manager, concepts and tools for enterprise planning, management, and execution.
While global sourcing has expanded dramatically in terms of activities, consistent challenges remain for organizations that choose such a business decision.
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage.
Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development.
Knowledge Management (KM) is strongly rooted in the discipline of Knowledge Engineering (KE), which in turn grew partly out of the artificial intelligence field.
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization.