Knowledge Management: Systems and Processes in the AI Era, Third Edition, is aimed at students and managers who seek detailed insights into contemporary knowledge management (KM).
Like other critical organizational assets, information is a strategic asset that requires high level of oversight in order to be able to effectively use it for organizational decision-making, performance improvement, cost management, and risk mitigation.
Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuable case studies that illustrate how to combine Six Sigma's rigorous quality principles with Lean methods for uncovering and eliminating waste inIT processes.
The PMI-PBA(R) Exam Practice Test and Study Guide attempts to address all your questions and concerns by providing two of the most sought-after study aids: memory maps and practice questions.
This book provides techniques for offshore center managers and head office managers to motivate and manage globally distributed teams, which are spread across the offshore center and the head office, and thereby achieve higher productivity.
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries.
The rapid growth of software applications within healthcare organizations has made it essential to have defined methodologies and formal processes for the management of the entire Information Technology (IT) portfolio.
The growing complexity of projects today, as well as the uncertainty inherent in innovative projects, is making obsolete traditional project management practices and procedures, which are based on the notion that much about a project is known at its start.
This book explores the intersection of cybersecurity and education technologies, providing practical solutions, detection techniques, and mitigation strategies to ensure a secure and protected learning environment in the face of evolving cyber threats.
As digital technologies occupy a more central role in working and everyday human life, individual and social realities are increasingly constructed and communicated through digital objects, which are progressively replacing and representing physical objects.
A database management system (DBMS) is a collection of programs that enable users to create and maintain a database; it also consists of a collection of interrelated data and a set of programs to access that data.
Focusing on the critical role IT plays in organizational development, the book shows how to employ action learning to improve the competitiveness of an organization.
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.
This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management.
Learn how to hack systems like black hat hackers and secure them like security expertsKey FeaturesUnderstand how computer systems work and their vulnerabilitiesExploit weaknesses and hack into machines to test their securityLearn how to secure systems from hackersBook DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal.
Written for project managers who may encounter ethical dilemmas, this book considers typical and atypical ethical issues that may occur in each phase of the project life cycle.
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company.
Parallel Computing Architectures and APIs: IoT Big Data Stream Processing commences from the point high-performance uniprocessors were becoming increasingly complex, expensive, and power-hungry.
Healthcare Informatics: Improving Efficiency through Technology, Analytics, and Management supplies an understanding of the different types of healthcare service providers, corresponding information technologies, analytic methods, and data issues that play a vital role in transforming the healthcare industry.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.