Written by an Information Technology Infrastructure Library (ITIL) consulting and training expert, this all-new guide helps you pass the ITIL v3 Foundation certification exam and serves as an on-the-job reference.
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Second Edition takes an interdisciplinary approach to applying principles for efficient implementation of network devices, offering solutions to the problem of network implementation bottlenecks.
With research perspectives on elements of psychology and technology, Emotional Intelligence in the Digital Era: Concepts, Frameworks, and Applications provides insight into the intersection of emotional intelligence and digital technologies, including artificial intelligence (AI).
With research perspectives on elements of psychology and technology, Emotional Intelligence in the Digital Era: Concepts, Frameworks, and Applications provides insight into the intersection of emotional intelligence and digital technologies, including artificial intelligence (AI).
The aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data.
This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes.
The modern application server is a complex platform that is the linchpin of an enterprise environment that includes a very wide range of technologies-web document formatting, web protocols, server-side scripts, servlets, applets, programming languages, distributed object technologies, security capabilities, directory and naming services, load balan
As manufacturing control systems converge with manufacturing automation systems and systems supporting the back office, IT managers in manufacturing companies are being asked to oversee all their company's IT-including the manufacturing systems.
Oracle 11i E-Business Suite from the Front Lines is the first book to compile the tips, techniques, and practical advice for administering Oracle E-Business Suite 11i.
In Offshore Software Development: Making It Work, hands-on managers of Offshore solutions help you answer these questions:What is Offshore and why is it an IT imperative?
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment.
Executives, engineering managers, project managers, engineers, and process improvement experts within engineering organizations need a resource that systematically translates the requirements of ISO 9001:2000 into a usable specification for engineers.
The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks.
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets.
The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data that may be of value to corporations and organizations.
Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server downtime.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets.
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured.
Around the world, virtually every company is engaged in some form of effort intended to improve the processing that takes place across an end-to-end supply chain system as they work towards moving their organizations to the next level of performance.
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to harden their security.
UML for Developing Knowledge Management Systems provides knowledge engineers the framework in which to identify types of knowledge and where this knowledge exists in an organization.
This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management.
Project Managers leading massive IT projects--defined as projects rolling out deliverables across geographic boundaries with budgets ranging well into the millions--need a unique level of expertise and an arsenal of personal and professional skills to successfully accomplish their tasks.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state.
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization.
Successful management teams can identify the cost and return derived from the implementation of new technology, and they can properly apply the technology toward gaining a competitive advantage.
Performance Assurance for IT Systems emphasizes the importance of addressing performance and technology-related issues from the beginning of the planning process, at the feasibility and bid stages.
Modernize and optimize network management with APIs and automation Legacy network management approaches don't scale adequately and can't be automated well.
Modernize and optimize network management with APIs and automation Legacy network management approaches don't scale adequately and can't be automated well.
Use data analytics to drive innovation and value throughout your network infrastructure Network and IT professionals capture immense amounts of data from their networks.
Use data analytics to drive innovation and value throughout your network infrastructure Network and IT professionals capture immense amounts of data from their networks.