Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function.
Electronic bill presentment and payment (EBPP) is revolutionizing the billing process by offering online and real time presentment of bill content and payment choices.
The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations.
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to harden their security.
Oracle 11i E-Business Suite from the Front Lines is the first book to compile the tips, techniques, and practical advice for administering Oracle E-Business Suite 11i.
Project Managers leading massive IT projects--defined as projects rolling out deliverables across geographic boundaries with budgets ranging well into the millions--need a unique level of expertise and an arsenal of personal and professional skills to successfully accomplish their tasks.
In Offshore Software Development: Making It Work, hands-on managers of Offshore solutions help you answer these questions:What is Offshore and why is it an IT imperative?
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets.
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.
This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management.
UML for Developing Knowledge Management Systems provides knowledge engineers the framework in which to identify types of knowledge and where this knowledge exists in an organization.
Successful management teams can identify the cost and return derived from the implementation of new technology, and they can properly apply the technology toward gaining a competitive advantage.
Performance Assurance for IT Systems emphasizes the importance of addressing performance and technology-related issues from the beginning of the planning process, at the feasibility and bid stages.
Here is all the practical, hands-on information you need to build, manage and maintain a heterogeneous computing environment with hardware, software, and network equipment from a number of different vendors.
Around the world, virtually every company is engaged in some form of effort intended to improve the processing that takes place across an end-to-end supply chain system as they work towards moving their organizations to the next level of performance.
This new book explores emerging new technologies for the development of business and finance sectors, to strengthen economic growth, and to facilitate the efficiency and creation of new and innovative business and finance management applications.
Aligning information security to the goals and strategies of the business is paramount for ensuring risks are addressed, without an abundance of negative impacts to the company.
In Learning with Information Systems the author takes the developing world as the context and through a series of case studies develops a commonly used systems analysis methodology.
In Learning with Information Systems the author takes the developing world as the context and through a series of case studies develops a commonly used systems analysis methodology.
Most managers know very little about the technology they introduce into their firms, often preferring to leave such decisions to a small band of technological 'experts'.
Most managers know very little about the technology they introduce into their firms, often preferring to leave such decisions to a small band of technological 'experts'.
The aim of this book is to contribute to a better understanding of those intermediate countries with specific reference to two relevant international areas; those countries of southern Europe whose dynamic is very much influenced by the phases of European construction, and in countries of Latin America where the opening up process has changed the traditional role played by multinational corporations.
The aim of this book is to contribute to a better understanding of those intermediate countries with specific reference to two relevant international areas; those countries of southern Europe whose dynamic is very much influenced by the phases of European construction, and in countries of Latin America where the opening up process has changed the traditional role played by multinational corporations.
In Rethinking Information Systems in Organizations John Paul Kawalek challenges the current orthodoxy of information systems and proposes new alternatives.
In Rethinking Information Systems in Organizations John Paul Kawalek challenges the current orthodoxy of information systems and proposes new alternatives.
Whilst Information Systems has the potential to widen our view of the world, it often has the opposite effect by limiting our ability to interact, facilitating managerial and state surveillance or instituting strict hierarchies and personal control.
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 -- the latest IP version -- has grown substantially.
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 -- the latest IP version -- has grown substantially.
If you have a business or a nonprofit organization, or if you re the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital.
Presents an analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek).
Presents an analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek).
This text demystifies the subject of operating systems by using a simple step-by-step approach, from fundamentals to modern concepts of traditional uniprocessor operating systems, in addition to advanced operating systems on various multiple-processor platforms and also real-time operating systems (RTOSs).
In the digital-driven economy era, an AI-oriented competency framework (AIoCF) is a collection to identify AI-oriented knowledge, attributes, efforts, skills, and experiences (AKASE) that directly and positively affect the success of employees and the organization.