Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics.
Easy-to-follow and understand, The Systems Thinking Approach to Strategic Planning and Management presents the first practical application of "e;systems thinking"e;, a concept first introduced by Peter Senge in the Fifth Discipline as a new, better and elegantly simple A-B-C approach to strategic management, planning, and change.
Information Technology Security and Risk Management: Inductive Cases for Information Security is a compilation of cases that examine recent developments and issues that are relevant to IT security managers, risk assessment and management, and the broader topic of IT security in the 21st century.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
Affecting every sector and country in the world, digital technology is changing the way citizens engage in society, companies conduct business, and governments deliver public services.
This comprehensive reference uses a formal and standard evaluation technique to show the strengths and weakness of more than 60 software development methodologies such as agile, DevOps, RUP, Waterfall, TSP, XP and many more.
This book explains how to achieve dramatic improvements in service and agility by enhancing the people, processes, and culture within your organization.
A database management system (DBMS) is a collection of programs that enable users to create and maintain a database; it also consists of a collection of interrelated data and a set of programs to access that data.
The international conference "e;Sustainable Collaboration in Business, Technology, Information and Innovation (SCBTII) 2019"e; has brought together academics, professionals, entrepreneurs, researchers, learners, and other related groups from around the world who have a special interest in theories and practices in the development of the field of digital economy for global competitiveness.
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components.
Software engineers are increasingly becoming business people; Professional Issues in Software Engineering, 3rd Edition gives them comprehensive coverage of the issues they should know about.
This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business.
Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage.
Exploring many aspects of blockchain technologies and providing an overview of the latest cuttingedge developments along with their diversified business applications, this volume addresses the challenges, emerging issues, and problems in classical centralized architecture and covers how blockchain platforms provide almost magical solutions and novel services for improving business processes.
In a world bursting with new information, ideas, opportunities, and technological advancements, it is time to rethink how continuous learning shapes our future.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime.
Software Engineering Approaches to Enable Digital Transformation Technologies features contributions reflecting ideas and research in enabling digital transformation technologies through software engineering.
This proceedings set contains selected Computer, Information and Education Technology related papers from the 2015 International Conference on Computer, Intelligent Computing and Education Technology (CICET 2015), to be held April 11-12, 2015 in Guilin, P.
Successful Packaged Software Implementation guides IT departments through the selection and implementation of packaged software, pointing out potential pitfalls and how to avoid them.
As manufacturing control systems converge with manufacturing automation systems and systems supporting the back office, IT managers in manufacturing companies are being asked to oversee all their company's IT-including the manufacturing systems.
This book contains selected Computer, Management, Information and Educational Engineering related papers from the 2014 International Conference on Management, Information and Educational Engineering (MIEE 2014) which was held in Xiamen, China on November 22-23, 2014.
The conference on 'Interdisciplinary Research in Technology and Management"e; was a bold experiment in deviating from thetraditional approach of conferences which focus on a specific topic or theme.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes.
Providing structured yet adaptable models of project success within an organization, A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum.