Innovative Management Science Practices: Bridging Theory and Applied Research delves into the dynamic interplay between theoretical frameworks and practical applications in management.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
Get the most out of ACDs (automatic call distributors) and other complex systems in order to boost customer satisfaction and increase sales Includes three ready to use RFPs (request for proposals) for buying an ACD, computer telephony system, or recording
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more.
Step into the next frontier of technology with The Quantum Internet Revolution, a groundbreaking exploration of the science, innovations, and transformative potential of quantum networking.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both business intelligence and Web-based applications.
Enterprise-Scale Agile Software Development is the collective sum of knowledge accumulated during the full-scale transition of a 1400-person organization to agile development-considered the largest implementation of agile development and Scrum ever attempted anywhere in the world.
Introduction to Health Care Management is a concise, reader-friendly, introductory healthcare management book that covers a wide variety of healthcare settings, from hospitals to nursing homes and clinics.
Organizations that rely on computing technology for survival understand the critical importance of managing projects that meet strategic goals and objectives.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.
The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality and tourism industry to investigate the potential of these technologies in revolutionizing the industry.
Data Warehousing for Biomedical Informatics is a step-by-step how-to guide for designing and building an enterprise-wide data warehouse across a biomedical or healthcare institution, using a four-iteration lifecycle and standardized design pattern.
Discussing specific best practices for making specific decisions, this book offers qualitative and quantitative methods, tools, and techniques for deploying and supporting all kinds of information technology.
Presenting practical guidelines and examples, Advanced Server Virtualization emphasizes design, implementation, and management from both a technical and consultative point of view.
How did we end up here, masters of scientific insight, purveyors of ever more powerful technologies, astride the burning planet that created us, and now responsible for cleaning up the mess and determining the future direction of all of life?
Up to date with the third edition of PMI's Standard for Program Management, this is the most comprehensive resource available to help prepare readers for the PgMP Exam.
Over the past three years, the landscape of blockchain technology has undergone remarkable transformation, extending far beyond its association with cryptocurrencies especially with the emergence of Web3 applications.
Evolving from Digital Transformation to Digital Acceleration Using The Galapagos Framework challenges established thinking and offers a new way to deliver digital change.
Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization.
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack.
Written by one of the nation's most highly regarded project management mentors, The Complete Project Management Methodology and Toolkit provides a combined project and business management solution that any can be readily applied in any industry by both novice and certified project managers.
Incomplete or missed requirements, omissions, ambiguous product features, lack of user involvement, unrealistic customer expectations, and the proverbial scope creep can result in cost overruns, missed deadlines, poor product quality, and can very well ruin a project.
How did we end up here, masters of scientific insight, purveyors of ever more powerful technologies, astride the burning planet that created us, and now responsible for cleaning up the mess and determining the future direction of all of life?
AI iQ for a Human-Focused Future: Strategy, Talent, and Culture offers a pioneering approach to integrating artificial intelligence (AI) and generative AI (GenAI) in business, emphasizing a business strategy first mindset over a technologycentric one.
As we get caught up in the quagmire of big data and analytics, it is important to be able to reflect and apply insights, experience, and intuition as part of the decision-making process.
Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
This guide explains how to gain a handle on the vital aspects of data protection, offering a solid understanding of how data protection fits into various organizations.
This book explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients.
Grounded in practicality, this book explains the procedures for running a successful project and highlights the finer points of managing and controlling the project.
Examining the project environment from the perspective of project team members, this book re-interprets project management methodologies and behaviors using a bottom-up approach.