Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance.
The second edition of Data Protection goes beyond the traditional topics including deduplication, continuous availability, snapshots, replication, backup, and recovery, and explores such additional considerations as legal, privacy, and ethical issues.
Whether it's because of a lack of understanding, poor planning, or a myriad of other things, 50 to 60 percent of the IT effort in most companies can be considered waste.
In orderto maximizeIT resources andjustify IT expenditures, CIO's and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand.
In the digital-driven economy era, an AI-oriented competency framework (AIoCF) is a collection to identify AI-oriented knowledge, attributes, efforts, skills, and experiences (AKASE) that directly and positively affect the success of employees and the organization.
COVID-19 accelerated healthcare's transition towards digital technology since it helped expand the capacity of healthcare organizations (HCOs) through extended patient access and isolation.
Making IT Lean: Applying Lean Practices to the Work of IT presents Lean concepts and techniques for improving processes and eliminating waste in IT operations and IT Service Management, in a manner that is easy to understand.
Use data analytics to drive innovation and value throughout your network infrastructure Network and IT professionals capture immense amounts of data from their networks.
Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuable case studies that illustrate how to combine Six Sigma's rigorous quality principles with Lean methods for uncovering and eliminating waste inIT processes.
Knowledge Management (KM) is strongly rooted in the discipline of Knowledge Engineering (KE), which in turn grew partly out of the artificial intelligence field.
"e;This evidence-based book provides the framework and guidelines that professionals need for working with the contemporary explosion of data that is creating opportunities and challenges to all phases of our society and commerce.
Although complexity is a phenomenon that confounds and challenges program managers across industry sectors, there is little information available that identifies the set of competencies managers need to complete their program successfully and deliver the benefits desired by stakeholders.
The modern application server is a complex platform that is the linchpin of an enterprise environment that includes a very wide range of technologies-web document formatting, web protocols, server-side scripts, servlets, applets, programming languages, distributed object technologies, security capabilities, directory and naming services, load balan
Written for those starting a career in IT or whose career is well advanced, this career guide shows how to blaze a path to success through the jungle of modern IT.
With research perspectives on elements of psychology and technology, Emotional Intelligence in the Digital Era: Concepts, Frameworks, and Applications provides insight into the intersection of emotional intelligence and digital technologies, including artificial intelligence (AI).
Process Improvement and CMMI for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software.
This book explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients.
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured.
The 2015 International Congress on Economics, Social Sciences and Information Management (ICESSIM 2015), held 28-29 March 2015 in Bali, Indonesia, aimed to provide a platform for the sharing of valuable knowledge and experience in the context of changing economics and social settings.
This handbook provides a detailed description and analysis of the concepts, processes, and technologies used in the development and implementation of an effective customer relationship (CRM) strategy.
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases.
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations.
In the digital-driven economy era, an AI-oriented competency framework (AIoCF) is a collection to identify AI-oriented knowledge, attributes, efforts, skills, and experiences (AKASE) that directly and positively affect the success of employees and the organization.
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment.
In Learning with Information Systems the author takes the developing world as the context and through a series of case studies develops a commonly used systems analysis methodology.