Recognized as One of the Best Business Books for 2014 by CIO MagazineBased on interviews with more than 150 CIOs, IT/business executives, and academic thought leaders, The Strategic CIO: Changing the Dynamics of the Business Enterprise provides insight, success stories, and a step-by-step methodology to transform your IT organization into a strategic asset that drives customer value, increases revenues, and enhances shareholder wealth.
This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support.
First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions.
Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change as well as human dimensions such as economic crises, epidemics, and emergency responses.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to your organization.
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance.
With the advent of such advanced technologies as cloud computing, the Internet of Things, the Medical Internet of Things, the Industry Internet of Things and sensor networks as well as the exponential growth in the usage of Internet-based and social media platforms, there are enormous oceans of data.
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to harden their security.
Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage.
There are a number of books on computational intelligence (CI), but they tend to cover a broad range of CI paradigms and algorithms rather than provide an in-depth exploration in learning and adaptive mechanisms.
With the aim of simplifying relational database modeling, Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach, which is a more simplistic, intuitive way to building relational database models.
This book serves as a primer on freight transportation and logistics, providing a general and broad coverage of concepts, mathematical models and methodologies available for freight transportation planning at strategic, tactical and operational levels.
In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present.
In an increasingly globalised built environment industry, achieving higher levels of integration across organisational and software boundaries can lead to improved economic, social and environmental outcomes.
These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research and practice in information technology.
Public Key Infrastructure (PKI) is an operational ecosystem that employs key management, cryptography, information technology (IT), information security (cybersecurity), policy and practices, legal matters (law, regulatory, contractual, privacy), and business rules (processes and procedures).
The First International Conference on Advancement of Computer, Communication and Electrical Technology focuses on key technologies and recent progress in computer vision, information technology applications, VLSI, signal processing, power electronics & drives, and application of sensors & transducers, etc.
This straightforward book will provide you with the insight necessary to save your organization revenue through the processes of bill auditing, expense reduction, and savvy contract negotiations.
Modernize and optimize network management with APIs and automation Legacy network management approaches don't scale adequately and can't be automated well.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules.
Project Management for Healthcare, Second Edition covers the significant changes in both the direction of healthcare and the direction of project management.
Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises.
With the announcement in 2011 that the current Internet Protocol (IP), IPv4, has nearly run out, interest in IPv6 -- the latest IP version -- has grown substantially.