Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways.
Cloud computing has created a shift from the use of physical hardware and locally managed software-enabled platforms to that of virtualized cloud-hosted services.
This book highlights the essence of information technology in the modern digital world in relation to improvements and threats to organisations and e-business in the era of the digital economy.
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment.
Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage.
"e;This book addresses how health apps, in-home measurement devices, telemedicine, data mining, and artificial intelligence and smart medical algorithms are all enabled by the transition to a digital health infrastructure.
Although the patch management process is neither exceedingly technical nor extremely complicated, it is still perceived as a complex issue that's often left to the last minute or resolved with products that automate the task.
The 21st century has witnessed massive changes around the world in intelligence systems in order to become smarter, energy efficient, reliable, and cheaper.
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organizationKey FeaturesBuild complex Python-based applications with IoTExplore different concepts, technologies, and tradeoffs in the IoT architectural stackDelve deep into each element of the IoT design-from sensors to the cloudBook DescriptionThe Internet of Things (IoT) is the fastest growing technology market.
Collaborative manufacturing is an interactive process with great potential, but without the direct input of the plant floor systems information, a significant piece of the management process is not available for consideration.
This book introduces students to business process management, an approach that aims to align the organization's business processes with the demands of the marketplace.
For knowledge management to be successful, the corporate culture needs to be adapted to encourage the creation, sharing, and distribution of knowledge within the organization.
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages.
Around the world, virtually every company is engaged in some form of effort intended to improve the processing that takes place across an end-to-end supply chain system as they work towards moving their organizations to the next level of performance.
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance.
As organizations struggle to implement effective security measures, all too often they focus solely on the tangible elements, such as developing security policies or risk management implementations.
Graphite has become one of the most powerful monitoring tools available today, due to its ease of use, rapid graph prototyping abilities, and a friendly rendering API.
The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector.
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers.
In addition to test questions in each of the five domains and two practice tests in print and online, this all-in-one study guide also contains flashcards for learning terms.
Accounting for the rapid and often confusing changes currently underway in the information systems of organizations, such as the rush to replace mainframes with networks and the decentralization of data storage and processing, provides insights on the duties and challenges of a data center manager.
Recognizing the importance of selecting and pursuing programs, projects, and operational work that add sustainable business value that benefits end users, the Project Management Institute (PMI) issued its first Standard on Portfolio Management in 2006.
Used by corporations, industry, and government to inform and fuel everything from focused advertising to homeland security, data mining can be a very useful tool across a wide range of applications.
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.
The book provides a comprehensive overview of biometrics, including its theoretical foundations and practical applications, and offers valuable insights into its relevance and impact on various sectors of society.
This desk reference for IT professionals in the insurance industry provides information about the latest technologies to improve efficiency and prediction.
Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information Technology and Career Education (ICITCE 2014, Hong Kong, China, 9,10 October 2014).
This book highlights the practical aspects of using Oracle Essbase and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution.
A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy.
Cloud computing has created a shift from the use of physical hardware and locally managed software-enabled platforms to that of virtualized cloud-hosted services.
Logistics and fulfillment management (LFM) - the management of the flow of goods, services and information throughout a value chain - is becoming an important part of e-business.
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage.
Although there are countless books about process improvement and business performance, there is a dearth of literature on how process improvement yields business performance results.
This book serves as a primer on freight transportation and logistics, providing a general and broad coverage of concepts, mathematical models and methodologies available for freight transportation planning at strategic, tactical and operational levels.
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.