Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
The discipline of Knowledge Management (KM) is rapidly becoming established as an essential course or module in both information systems and management programs around the world.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.
Shaping American Telecommunications examines the technical, regulatory, and economic forces that have shaped the development of American telecommunications services.
This cutting-edge reference represents a new phase in the talkRA project-an initiative dedicated to improving the discipline of revenue assurance (RA) for communication providers.
Delivering successful projects means the ability to produce high quality software within budget and on time-consistently, but when one mentions quality to software engineers or project managers, they talk about how impossible it is to eliminate defects from software.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state.
Managing IT Performance to Create Business Value provides examples, case histories, and current research for critical business issues such as performance measurement and management, continuous process improvement, knowledge management, risk management, benchmarking, metrics selection, and people management.
IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance.
This book provides a first-hand account of business analytics and its implementation, and an account of the brief theoretical framework underpinning each component of business analytics.
Become a certified Azure Architect and learn how to design effective solutions that span compute, security, networking, and developmentKey FeaturesDiscover how you can design and architect powerful and cost-effective solutions on Microsoft AzurePrepare to achieve AZ-303 certification with the help of mock tests and practice questionsEnhance your computing, networking, storage, and security skills to design modern cloud-based solutionsBook DescriptionFrom designing solutions on Azure to configuring and managing virtual networks, the AZ-303 certification validates your knowledge and skills for all this and much more.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes.
With the widespread transformation of information into digital form throughout society - firms and organisations are embracing this development to adopt multiple types of IT to increase internal efficiency and to achieve external visibility and effectiveness - we have now reached a position where there is data in abundance and the challenge is to manage and make use of it fully.
This complete medical informatics textbook begins by reviewing the IT aspects of informatics, including systems architecture, electronic health records, interoperability, privacy and security, cloud computing, mobile healthcare, imaging, capturing data, and design issues.
This updated and reorganized fourth edition of Software Testing: A Craftsman's Approach applies the strong mathematics content of previous editions to a coherent treatment of Model-Based Testing for both code-based (structural) and specification-based (functional) testing.
Incomplete or missed requirements, omissions, ambiguous product features, lack of user involvement, unrealistic customer expectations, and the proverbial scope creep can result in cost overruns, missed deadlines, poor product quality, and can very well ruin a project.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality.
Parallel Computing Architectures and APIs: IoT Big Data Stream Processing commences from the point high-performance uniprocessors were becoming increasingly complex, expensive, and power-hungry.
The area of detection and estimation in a distributed wireless sensor network (WSN) has several applications, including military surveillance, sustainability, health monitoring, and Internet of Things (IoT).
The early explorers up through those of the early part of the last century were the supreme users of management practices that have been formalized today.
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, processes, and units already in existence.
As the population ages and healthcare costs continue to soar, the focus of the nation and the healthcare industry turns to reducing costs and making the delivery process more efficient.
Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages.