With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations.
Today, there are few in senior management positions who can afford to ignore modern information technology, and few individuals who would prefer to be without it.
Software-Defined Data Infrastructures Essentials provides fundamental coverage of physical, cloud, converged, and virtual server storage I/O networking technologies, trends, tools, techniques, and tradecraft skills.
The primary cause of many project failures is that responsible executives, because of their lack of knowledge in project management, fail to demand that their managers and staff properly utilize the well-proven best practices, processes, systems, and tools that are now available in this field.
Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company.
In this book, the author presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role.
Grounded in practicality, this book explains the procedures for running a successful project and highlights the finer points of managing and controlling the project.
The First International Conference on Advancement of Computer, Communication and Electrical Technology focuses on key technologies and recent progress in computer vision, information technology applications, VLSI, signal processing, power electronics & drives, and application of sensors & transducers, etc.
Healthcare Informatics: Improving Efficiency through Technology, Analytics, and Management supplies an understanding of the different types of healthcare service providers, corresponding information technologies, analytic methods, and data issues that play a vital role in transforming the healthcare industry.
Reducing Risk with Software Process Improvement recommends the critical practices that aid in the successful delivery of software products and services.
As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats.
Modernize and optimize network management with APIs and automation Legacy network management approaches don't scale adequately and can't be automated well.
This book highlights the essence of information technology in the modern digital world in relation to improvements and threats to organisations and e-business in the era of the digital economy.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes.
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls.
With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase to 90 percent by the end of 2014, it is not a question of if, or when, it's a question of will you be ready.
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises.
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured.
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules.
Recognized as One of the Best Business Books for 2014 by CIO MagazineBased on interviews with more than 150 CIOs, IT/business executives, and academic thought leaders, The Strategic CIO: Changing the Dynamics of the Business Enterprise provides insight, success stories, and a step-by-step methodology to transform your IT organization into a strategic asset that drives customer value, increases revenues, and enhances shareholder wealth.
As we get caught up in the quagmire of big data and analytics, it is important to be able to reflect and apply insights, experience, and intuition as part of the decision-making process.
Inclusive Development of Society contains papers that were originally presented at the 2018 International Congress on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018), held 6-7 October and 15-16 December 2018 in Kuta, Bali, Indonesia and 18-19 October, 2018 at The Southern Federal University, Rostov-on-don, Russia.
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals.
Business intelligence (BI) has evolved over several years as organizations have extended their online transaction processing (OLTP) capabilities and applications to support their routine operations.
Parallel Computing Architectures and APIs: IoT Big Data Stream Processing commences from the point high-performance uniprocessors were becoming increasingly complex, expensive, and power-hungry.
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional.
SHELVING GUIDE: Project ManagementThis hands-on guide is written for project professionals seeking to find an optimized way of performing project management.
The global shift toward delivering services online requires organizations to evolve from using traditional paper files and storage to more modern electronic methods.
For more than a decade, the focus of information technology has been on capturing and sharing data from a patient within an all-encompassing record (a.
Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications unravels the mystery of cloud computing and explains how it can transform the operating contexts of business enterprises.