In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT.
How did we end up here, masters of scientific insight, purveyors of ever more powerful technologies, astride the burning planet that created us, and now responsible for cleaning up the mess and determining the future direction of all of life?
Technology and organizations co-evolve, as is illustrated by the growth of information and communication technology (ICT) and global software engineering (GSE).
Up to date with the third edition of PMI's Standard for Program Management, this is the most comprehensive resource available to help prepare readers for the PgMP Exam.
Machine Learning is an integral tool in a business analyst's arsenal because the rate at which data is being generated from different sources is increasing and working on complex unstructured data is becoming inevitable.
"e;If I were giving out an award for 'book of the year' for internal audit professionals, I would certainly award it to her outstanding manuscript: Radical Reporting: Writing Better Audit, Risk, Compliance and Information Security Reports.
To achieve consistent software project success under the pressures of today's software development environment, software organizations require achievable plans including viable estimates of schedule, resources, and risks.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.
Every CEO in the world, if questioned, will always complain that there are a lot of ideas to implement, but, unfortunately, insufficient resources to accomplish them.
The Project Management Office (PMO) is a rapidly emerging concept in project management that has evolved in terms of its application, sophistication, and proven results.
This second edition of the Strategic Project Leader prepares project managers to develop leadership competencies that translate into increased confidence to lead in a demanding environment.
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components.
Blockchain technology is a disruptive technology that affords businesspeople an opportunity to correct problems of dishonesty, corruption, and poor decision-making.
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it.
The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process.
Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences.
In IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state.
Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change as well as human dimensions such as economic crises, epidemics, and emergency responses.
Organizations increasingly need to deal with unstructured processes that traditional business process management (BPM) suites are not designed to deal with.
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.
In this book, the author presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role.
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environmentsKey FeaturesUnderstand how to identify and manage business drivers during transitionsExplore Microsoft Identity and Access Management as a Service (IDaaS) solutionOver 40 playbooks to support your learning process with practical guidelinesBook DescriptionMicrosoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management.
Finance Transformation: Leadership on Digital Transformation and Disruptive Innovation is a general and wide-ranging survey of finance transformation and emerging technologies.
Evolving from Digital Transformation to Digital Acceleration Using The Galapagos Framework challenges established thinking and offers a new way to deliver digital change.
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers.