Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company.
Recognizing the importance of selecting and pursuing programs, projects, and operational work that add sustainable business value that benefits end users, the Project Management Institute (PMI) issued its first Standard on Portfolio Management in 2006.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
With the widespread transformation of information into digital form throughout society - firms and organisations are embracing this development to adopt multiple types of IT to increase internal efficiency and to achieve external visibility and effectiveness - we have now reached a position where there is data in abundance and the challenge is to manage and make use of it fully.
With the widespread transformation of information into digital form throughout society - firms and organisations are embracing this development to adopt multiple types of IT to increase internal efficiency and to achieve external visibility and effectiveness - we have now reached a position where there is data in abundance and the challenge is to manage and make use of it fully.
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society.
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
The editors of the HIMSS Books' best-seller Health: From Smartphones to Smart Systems have returned to deliver an expansive survey of the initiatives, innovators, and technologies driving the patient-centered mobile healthcare revolution.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.
This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit.
This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit.
The 21st century has witnessed massive changes around the world in intelligence systems in order to become smarter, energy efficient, reliable, and cheaper.
The 21st century has witnessed massive changes around the world in intelligence systems in order to become smarter, energy efficient, reliable, and cheaper.
A Sensible Guide to Program Management Professional (PgMP)(R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard).
A Sensible Guide to Program Management Professional (PgMP)(R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard).
This book contains a collection of scientific chapters addressing the emerging trends in IT and telecommunications, as well as the issues that accompany them in business.
This book contains a collection of scientific chapters addressing the emerging trends in IT and telecommunications, as well as the issues that accompany them in business.