In today's unforgiving business environment where customers demand zero defect software at lower costs-it is testing that provides the opportunity for software companies to separate themselves from the competition.
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations.
The Green and Virtual Data Center sets aside the political aspects of what is or is not considered green to instead focus on the opportunities for organizations that want to sustain environmentally-friendly economical growth.
Offering a practical way to generate effective and efficient project-specific system architecture engineering methods, this volume addresses the entire range of systems architecture including hardware, software, subsystems, and systems of systems.
As a pioneer in Lean improvement methods, Jim Martin was among the first to suggest that truly successful Lean initiatives are those applied across every facet of an organization, not just on the shop floor.
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls.
Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization.
Grounded in practicality, this book explains the procedures for running a successful project and highlights the finer points of managing and controlling the project.
In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent compliance requirements.
If you had to evacuate from your building right now and were told you couldn't get back in for two weeks, would you know what to do to ensure your business continues to operate?
As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations.
Mastering cluster technology-the linking of servers-is becoming increasingly important for application and system programmers and network designers, administrators, and managers.
Discussing specific best practices for making specific decisions, this book offers qualitative and quantitative methods, tools, and techniques for deploying and supporting all kinds of information technology.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment.
Delivering successful projects means the ability to produce high quality software within budget and on time-consistently, but when one mentions quality to software engineers or project managers, they talk about how impossible it is to eliminate defects from software.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam.
In orderto maximizeIT resources andjustify IT expenditures, CIO's and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand.
In a business world of uncertain budgets, relentless technology changes, scarce management talent, and intense production demands, theory is good, but practice sells.
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product.
Providing structured yet adaptable models of project success within an organization, A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum.
Process Improvement and CMMI for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software.
Completely revised and updated, ERP: Tools, Techniques, and Applications for Integrating the Supply Chain, Second Edition describes, from the perspective of a business manager, concepts and tools for enterprise planning, management, and execution.
While global sourcing has expanded dramatically in terms of activities, consistent challenges remain for organizations that choose such a business decision.
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage.
The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies.