Browse Results

Showing 35,176 through 35,200 of 53,798 results

Web-Based and Traditional Outsourcing

by Vivek Sharma Varun Sharma K.S. Rajasekaran

In today's increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success. The future will be driven by value and competing ideas-creating an environment where old alignments and equations will be replaced by a global network of

Asset Protection through Security Awareness: Theory, Methods, And Applications (Systems Innovation Book Ser.)

by Tyler Justin Speed

Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks. The author reviews key topics surrounding computer s

IT Best Practices: Management, Teams, Quality, Performance, and Projects

by Tom C. Witt

Consistent success does not happen by chance. It occurs by having an understanding of what is happening in the environment and then having the skills to execute the necessary changes. Ideal for project, IT, and systems development managers, IT Best Practices: Management, Teams, Quality, Performance, and Projects details the skills, knowledge, and a

Understanding Information Retrieval Systems: Management, Types, and Standards

by Marcia J. Bates

In order to be effective for their users, information retrieval (IR) systems should be adapted to the specific needs of particular environments. The huge and growing array of types of information retrieval systems in use today is on display in Understanding Information Retrieval Systems: Management, Types, and Standards, which addresses over 20 typ

Process-Driven SOA: Patterns for Aligning Business and IT

by Carsten Hentrich Uwe Zdun

Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrates the design process using proven patterns that address complex business/technical scenarios, where integrated concepts of service-oriented architecture (SOA), Business Process Management (BPM), and Event-Driven Architecture (EDA) are required. The book demonstrates that SOA is not limited to technical issues but instead, is a holistic challenge where aspects of SOA, EDA, and BPM must be addressed together. An ideal guide for SOA solution architects, designers, developers, managers, and students about to enter the field, the book: Provides an accessible introduction to basic and more advanced concepts in process-driven SOA Illustrates how to manage the complexities of business aligned IT architectures with detailed examples and industry cases Outlines a step-by-step design process using proven patterns to address complex business/ technical scenarios Integrates SOA, BPM, and EDA into practical patterns promoting SOA 2.0 Describing how to synchronize parallel enterprise processes, the authors explain how to cope with the architectural and design decisions you are likely to encounter when designing and implementing process-driven SOA systems. The decisions are described in the form of software patterns to provide you with a practical guideline for addressing key problems using time-tested solutions.

Information Security Governance Simplified: From the Boardroom to the Keyboard

by Todd Fitzgerald

Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information is protected and examines all positions from the board of directors to the end user, delineating the role each plays in protecting the security of the organization.

Cybersecurity: Public Sector Threats and Responses (Public Administration And Public Policy Ser.)

by Kim Andreasson

The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends and strategies from around the world and offers practical guidance for addressing contemporary risks. It supplies an overview of relevant U.S. Federal cyber incident response policies and outlines an organizational framework for assessing risk.

Fundamentals of Dependable Computing for Software Engineers (Chapman And Hall/crc Innovations In Software Engineering And Software Development Ser.)

by John Knight

Fundamentals of Dependable Computing for Software Engineers presents the essential elements of computer system dependability. The book describes a comprehensive dependability-engineering process and explains the roles of software and software engineers in computer system dependability. Readers will learn:Why dependability mattersWhat it means for a

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits

by James S. Tiller

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview o

A Tale of Two Transformations: Bringing Lean and Agile Software Development to Life

by Michael K. Levine

There are many books that seek to explain Lean and Agile software that offer theory, techniques, and examples. Michael Levine’s first book, A Tale of Two Systems, is one of the best, synthesizing Lean manufacturing and product development with agile software concepts in an engaging business novel. However, there has been precious little practical guidance for those seeking to change existing organizations to become Lean and Agile, until now. Mr. Levine has followed the successful approach of A Tale of Two Systems, telling two simultaneous intertwined and contrasting stories, to bring organizational transformation to life. Mary O’Connell and James "Wes" Wesleyan, recently engaged to be married, share a commitment to Lean and Agile Software. They have recently become leaders in two very different companies – one, stuck in a slow-moving, unresponsive, process-driven quagmire of a software culture; the other, struggling through the chaos of a sales-driven, process-less swirl. Together with their wise mentor, Neville Roberts, they identify two approaches to making needed changes: Drive People (a top-down approach focused on processes and tools), and People Driven (an enablement approach focused on people and organizations). Mary and Wes evaluate their situations and choose approaches that best fit for them, and the transformations commence. A Tale of Two Transformations differs from many information technology books by grappling with all the complexities of our organizations: the people, the politics, the financials, the processes – in short, the culture from which our Lean and Agile journeys must begin. The change model presented in the flow of the stories is generally applicable, and can help anyone thinking about how to improve their organization.

Data Warehouse Designs: Achieving ROI with Market Basket Analysis and Time Variance

by Fon Silvers

Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage. Time Variant data enables data warehouses to directly associate events in the past with the participants in each individual event. In the past however, the use of these powerful tools in tandem led to performance degradation and resulted in unactionable and even damaging information. Data Warehouse Designs: Achieving ROI with Market Basket Analysis and Time Variance presents an innovative, soup-to-nuts approach that successfully combines what was previously incompatible, without degradation, and uses the relational architecture already in place. Built around two main chapters, Market Basket Solution Definition and Time Variant Solution Definition, it provides a tangible how-to design that can be used to facilitate MBA within the context of a data warehouse. Presents a solution for creating home-grown MBA data marts Includes database design solutions in the context of Oracle, DB2, SQL Server, and Teradata relational database management systems (RDBMS) Explains how to extract, transform, and load data used in MBA and Time Variant solutions The book uses standard RDBMS platforms, proven database structures, standard SQL and hardware, and software and practices already accepted and used in the data warehousing community to fill the gaps left by most conceptual discussions of MBA. It employs a form and language intended for a data warehousing audience to explain the practicality of how data is delivered, stored, and viewed. Offering a comprehensive explanation of the applications that provide, store, and use MBA data, Data Warehouse Designs provides you with the language and concepts needed to require and receive information that is relevant and actionable.

Security De-Engineering: Solving the Problems in Information Risk Management

by Ian Tibble

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems i

.NET 4 for Enterprise Architects and Developers

by Sudhanshu Hate Suchi Paharia

Presenting cutting-edge insights from industry practitioners, .NET 4 for Enterprise Architects and Developers supplies in-depth coverage of the various server-side features of Microsoft .NET Framework 4 that can be leveraged in Enterprise Application development. It provides a fundamental understanding of the technical aspects of implementation and

Antipatterns: Managing Software Organizations and People, Second Edition (Applied Software Engineering Series)

by Colin J. Neill Philip A. Laplante Joanna F. DeFranco

Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure. This updated edition of a bestseller not only illustrates bad management approaches, but also covers the bad work environments and cultural traits commonly fou

Software Project Management: A Process-Driven Approach

by Ashfaque Ahmed

To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project Management: A

Maximizing Benefits from IT Project Management: From Requirements to Value Delivery

by Jose Lopez Soriano

With the majority of IT projects being delivered late, over budget, or cancelled altogether, it is clear that traditional project management methodologies do not provide an effective framework for today's IT projects. It is evident that a new Return-on-Investment (ROI) oriented approach is required that focuses on the ROI of a project fro

Emerging Wireless Networks: Concepts, Techniques and Applications

by Christian Makaya Samuel Pierre

An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireles

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

by Tyson Macaulay Bryan L. Singer

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and im

Mathematical Foundations for Signal Processing, Communications, and Networking

by Erchin Serpedin, Thomas Chen and Dinesh Rajan

Mathematical Foundations for Signal Processing, Communications, and Networking describes mathematical concepts and results important in the design, analysis, and optimization of signal processing algorithms, modern communication systems, and networks. Helping readers master key techniques and comprehend the current research literature, the book offers a comprehensive overview of methods and applications from linear algebra, numerical analysis, statistics, probability, stochastic processes, and optimization. From basic transforms to Monte Carlo simulation to linear programming, the text covers a broad range of mathematical techniques essential to understanding the concepts and results in signal processing, telecommunications, and networking. Along with discussing mathematical theory, each self-contained chapter presents examples that illustrate the use of various mathematical concepts to solve different applications. Each chapter also includes a set of homework exercises and readings for additional study. This text helps readers understand fundamental and advanced results as well as recent research trends in the interrelated fields of signal processing, telecommunications, and networking. It provides all the necessary mathematical background to prepare students for more advanced courses and train specialists working in these areas.

Mobile Ad Hoc Networks: Current Status and Future Trends

by Jonathan Loo

Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, this book examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Leading researchers, industry professionals, and academics provide an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service.

Software Maintenance Success Recipes

by Donald J. Reifer

Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 real-world maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do their work and instructs on the methods required to achieve success. Donald J. Reifer-an award winner for his contributions to the field of software engineering-provides step-by-step guidance on how to structure the job to complete all of the work related to the task.

Delay Tolerant Networks: Protocols and Applications

by Athanasios V. Vasilakos Yan Zhang Thrasyvoulos Spyropoulos

A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applicat

Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

by Thomas A. Johnson

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America‘s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran‘s efforts to develop into a nuclear power in an area that l

Software Engineering Design: Theory and Practice (Applied Software Engineering Ser.)

by Carlos Otero

Taking a learn-by-doing approach, Software Engineering Design: Theory and Practice uses examples, review questions, chapter exercises, and case study assignments to provide students and practitioners with the understanding required to design complex software systems. Explaining the concepts that are immediately relevant to software designers, it be

Internet Retail Operations: Integrating Theory and Practice for Managers (Supply Chain Integration Modeling, Optimization and Application)

by Timothy M. Laseter Elliot Rabinovich

The rise of the Internet as the first choice for retail shoppers presents new challenges for retailers and suppliers. This book details how information technology evolved to play such a role in retail supply chain networks, how this has impacted supply chain networks, and how this has changed service operations. The first part of the text addresses information technology in relation to service and retail industries. The second part covers how the new supply chain dynamics impacts traditional service and retail delivery, the costs involved, the impacts on customer service, and customer expectations. The third part presents case studies of how different retailers meet challenges.

Refine Search

Showing 35,176 through 35,200 of 53,798 results