CERT(R) Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments.
The Business-Focused, Best-Practice Guide to Succeeding with ITIL Capacity Management Using ITIL(R) capacity management processes, IT organizations can eliminate waste and overbuying, reduce both equipment and staffing costs, drive more value from existing investments, and consistently provide the right resources to meet the needs of the business.
"e;This book successfully addresses the approach for adopting cloud into organizations (small and large), realizing that every application may not be a fit for a cloud environment.
"e;This book successfully addresses the approach for adopting cloud into organizations (small and large), realizing that every application may not be a fit for a cloud environment.
The Business-Focused, Best-Practice Guide to Succeeding with ITIL Capacity Management Using ITIL(R) capacity management processes, IT organizations can eliminate waste and overbuying, reduce both equipment and staffing costs, drive more value from existing investments, and consistently provide the right resources to meet the needs of the business.
A Complete Blueprint for Maximizing the Value of Business Intelligence in the Enterprise The typical enterprise recognizes the immense potential of business intelligence (BI) and its impact upon many facets within the organization-but it's not easy to transform BI's potential into real business value.
The Executive's Strategic Guide to Driving Maximum Business Value from Cloud Services Cloud services represent a fundamental shift in how individuals, enterprises, and governments conduct business, interact, and use technology.
Multistate System Reliability with Dependencies explains how to select a model of load sharing that best describes the impact of changes in reliability states of components.
Handbook of Economic Expectations discusses the state-of-the-art in the collection, study and use of expectations data in economics, including the modelling of expectations formation and updating, as well as open questions and directions for future research.
Security Operations Management, Fourth Edition, the latest release in this seminal reference on corporate security management operations for today's security management professionals and students, explores the characteristics of today's globalized workplaces, security's key role within them, and what the greatest concern is for security practitioners and senior managers.
THE ESSENTIAL MARKETING WISDOM OF PETER DRUCKER"e;Bill Cohen has done us a wonderful service by faithfully combing through Peter Drucker's vast writings and weaving together Peter's thoughts on marketing.
Knowledge Capital, vital for organizations' sustainability, competitiveness, and stability, can be regenerated in a value-added manner, enabling the development of high-quality products and services through innovative Knowledge Management (KM) techniques.
Entrepreneurship Trajectories: Entrepreneurial Opportunities, Business Models, and Firm Performance explores several entrepreneurship trajectories recognized by economists and entrepreneurs.
Eight previous iterations of this text have proven to be highly regarded and considered the definitive training guide and instructional text for first-line security officers in both the private and public sectors.
This book explains why conflict between the institutional and human agencies is an unavoidable outcome of competing local, national and global agendas at a major research university.
This book discusses the latest advances in people-centered design, operation, and management of broadly defined advanced manufacturing systems and processes.
Introduction to Emergency Management, Seventh Edition, sets the standard for excellence in the field and has educated a generation of emergency managers.
Mergers, Acquisitions, and Other Restructuring Activities: An Integrated Approach to Process, Tools, Cases, and Solutions, Tenth Edition, is the most comprehensive and cutting-edge text available on the subject.
Security Operations Management, 3rd edition, is the latest edition the seminal reference on corporate security management operations for today's security management professionals and students.
A seminal collection of research methodology themes, this two-volume work provides a set of key scholarly developments related to robustness, allowing scholars to advance their knowledge of research methods used outside of their own immediate fields.
The Economics and Politics of China's Energy Security Transition clarifies China's energy and foreign policies through a comprehensive examination of energy sources, providing an insider's unique perspective for assessing China's energy policies.
Mergers, Acquisitions, and Other Restructuring Activities: An Integrated Approach to Process, Tools, Cases, and Solutions, Tenth Edition, is the most comprehensive and cutting-edge text available on the subject.
This book gathers the papers presented at the XXIX International Congress INGEGRAF "e;The digital transformation in graphic engineering,"e; which was held in Logrono, Spain on June 20-21, 2019.
Effective Security Management, Seventh Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.
This book guides readers through the broad field of generic and industry-specific management system standards, as well as through the arsenal of tools that are needed to effectively implement them.
This book constructs a model of the knowledge value chain in the university and analyzes the university knowledge value-added mechanism in the process of Industry-University Collaborative Innovation.
Fashion Supply Chain Management Using Radio Frequency Identification (RFID) Technologies looks at the application of RFID technologies in such areas as order allocation, garment manufacturing, product tracking, distribution and retail.
The Only Complete Technical Primer for MDM Planners, Architects, and Implementers Companies moving toward flexible SOA architectures often face difficult information management and integration challenges.
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response.
Successes and Failures of Knowledge Management highlights examples from across multiple industries, demonstrating where the practice has been implemented well-and not so well-so others can learn from these cases during their knowledge management journey.
From Corporate Security to Commercial Force: A Business Leader's Guide to Security Economics addresses important issues, such as understanding security related costs, the financial advantages of security, running an efficient security organization, and measuring the impact of incidents and losses.
Security Metrics Management, Measuring the Effectiveness and Efficiency of a Security Program, Second Edition details the application of quantitative, statistical, and/or mathematical analyses to measure security functional trends and workload, tracking what each function is doing in terms of level of effort (LOE), costs, and productivity.
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry.
Women in the Security Profession: A Practical Guide for Career Development is a resource for women considering a career in security, or for those seeking to advance to its highest levels of management.
Maritime Security: An Introduction, Second Edition, provides practical, experience-based, and proven knowledge - and a "e;how-to-guide"e; - on maritime security.
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.
Security technology convergence, which refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems, was first introduced in the 1970s with the advent of computer-based access control and alarm systems.
Corporate Security Management provides practical advice on efficiently and effectively protecting an organization's processes, tangible and intangible assets, and people.
In corporate security today, while the topic of information technology (IT) security metrics has been extensively covered, there are too few knowledgeable contributions to the significantly larger field of global enterprise protection.
Effective Security Management, Sixth Edition teaches practicing security professionals how to build their careers by mastering the fundamentals of good management.