Graphite has become one of the most powerful monitoring tools available today, due to its ease of use, rapid graph prototyping abilities, and a friendly rendering API.
The book Digital Health Transformation with Blockchain and Artificial Intelligence covers the global digital revolution in the field of healthcare sector.
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers.
In addition to test questions in each of the five domains and two practice tests in print and online, this all-in-one study guide also contains flashcards for learning terms.
Accounting for the rapid and often confusing changes currently underway in the information systems of organizations, such as the rush to replace mainframes with networks and the decentralization of data storage and processing, provides insights on the duties and challenges of a data center manager.
Recognizing the importance of selecting and pursuing programs, projects, and operational work that add sustainable business value that benefits end users, the Project Management Institute (PMI) issued its first Standard on Portfolio Management in 2006.
Used by corporations, industry, and government to inform and fuel everything from focused advertising to homeland security, data mining can be a very useful tool across a wide range of applications.
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.
Discussing specific best practices for making specific decisions, this book offers qualitative and quantitative methods, tools, and techniques for deploying and supporting all kinds of information technology.
The book provides a comprehensive overview of biometrics, including its theoretical foundations and practical applications, and offers valuable insights into its relevance and impact on various sectors of society.
This desk reference for IT professionals in the insurance industry provides information about the latest technologies to improve efficiency and prediction.
Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information Technology and Career Education (ICITCE 2014, Hong Kong, China, 9,10 October 2014).
This book highlights the practical aspects of using Oracle Essbase and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution.
Recent combinations of semantic technology and artificial intelligence (AI) present new techniques to build intelligent systems that identify more precise results.
A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy.
Cloud computing has created a shift from the use of physical hardware and locally managed software-enabled platforms to that of virtualized cloud-hosted services.
Logistics and fulfillment management (LFM) - the management of the flow of goods, services and information throughout a value chain - is becoming an important part of e-business.
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage.
The aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data.
Although there are countless books about process improvement and business performance, there is a dearth of literature on how process improvement yields business performance results.
This book serves as a primer on freight transportation and logistics, providing a general and broad coverage of concepts, mathematical models and methodologies available for freight transportation planning at strategic, tactical and operational levels.
Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks.
Aligning business intelligence (BI) infrastructure with strategy processes not only improves your organization's ability to respond to change, but also adds significant value to your BI infrastructure and development investments.
The PMI-PBA(R) Exam Practice Test and Study Guide attempts to address all your questions and concerns by providing two of the most sought-after study aids: memory maps and practice questions.
Project Managers leading massive IT projects--defined as projects rolling out deliverables across geographic boundaries with budgets ranging well into the millions--need a unique level of expertise and an arsenal of personal and professional skills to successfully accomplish their tasks.
Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security.
UML for Developing Knowledge Management Systems provides knowledge engineers the framework in which to identify types of knowledge and where this knowledge exists in an organization.
Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4)Shelving Guide: Business & Management The backbone of any organisation is its management system.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.