Browse Results

Showing 18,176 through 18,200 of 54,108 results

Enterprise Architektur entschlüsselt: Ein Praxisorientierter Leitfaden von den Grundlagen bis zur Anwendung

by Dennis Suhari

Entdecken Sie "Enterprise Architektur entschlüsselt: Ein praxisorientierter Leitfaden von den Grundlagen bis zur Anwendung“ von Dennis Suhari, ein praxisorientiertes Werk, das die Förderung des Bewusstseins für Enterprise Architektur, die Vermittlung praktischer Erfahrungen und die Unterstützung der Leser bei der erfolgreichen Anwendung ihres Wissens in den Mittelpunkt stellt. Ein Schlüsselelement dieses Buches ist das praxisnahe Fallbeispiel, das einen einzigartigen Einblick in den Aufbau einer Enterprise Architektur von der Geschäfts- über die IT Architektur von Grund auf bietet.Was Sie erwartet:Fundamentale Grundlagen: Ein tiefgreifender Einblick in die essenziellen Grundlagen der Unternehmensarchitektur, um Schlüsselkonzepte und Prinzipien zu vermitteln, die als robuste Basis für die weitere Entwicklung dienen.Modellierung und praktische Tools: Entdecken Sie vielfältige Modellierungsmöglichkeiten und EAM-Tools, die inder Praxis zur Unterstützung der Architekturentwicklung eingesetzt werden.Architekturentwicklung in der Praxis: Anhand des Fallbeispiels der fiktiven Micayu GmbH, basierend auf den umfangreichen Erfahrungen des Autors, erleben Sie die Schritte der Entwicklung einer Unternehmensarchitektur von Grund auf.Zukunftsperspektiven: Ein Ausblick auf die Rolle der Künstlichen Intelligenz und dessen Einfluss auf das Enterprise Architektur Management

Enterprise-Architektur in der digitalen Welt: Zentrale Konzepte und Methoden für das EAM im agilen Projektalltag

by Hüseyin Yüksel

Wie schaffen Unternehmen die Transformation in die agile, innovative, digitale Geschäfts- und Arbeitswelt? Diese Frage treibt nicht nur IT-Manager, sondern auch die strategischen Akteure, die Enterprise-Architekten, um. Sie müssen den Spagat zwischen strategischer Planung und dem Umgang mit steigender Geschwindigkeit und wachsender Unsicherheit leisten. Eine ganzheitliche Unternehmensentwicklung in der digitalen Zukunft heißt, digitale Ökosysteme und komplexe IT-Landschaften zu entwickeln. In diesem Buch werden Methoden und Konzepte aus der agilen Welt, der Zeichentheorie und der Neuropsychologie vorgestellt, die dem Enterprise-Architekten im praktischen Alltag helfen können. Ausgehend von einem positiven Menschenbild kann es mit dem grundlegenden Wissen gelingen, das Potential von Individuen und Teams für den digitalen Wandel auszuschöpfen. Das Buch richtet sich vorwiegend an IT-Manager, Enterprise-Architekten und Manager im Umfeld von größeren Softwareentwicklungsprozessen.Viele praxisnahe Beispiele veranschaulichen die theoretisch dargestellten Zusammenhänge und eröffnen einen breiteren Zugang zum Enterprise-Architektur-Management.

Enterprise Artificial Intelligence Transformation

by Rashed Haq

Enterprise Artificial Intelligence Transformation AI is everywhere. From doctor's offices to cars and even refrigerators, AI technology is quickly infiltrating our daily lives. AI has the ability to transform simple tasks into technological feats at a human level. This will change the world, plain and simple. That's why AI mastery is such a sought-after skill for tech professionals. Author Rashed Haq is a subject matter expert on AI, having developed AI and data science strategies, platforms, and applications for Publicis Sapient's clients for over 10 years. He shares that expertise in the new book, Enterprise Artificial Intelligence Transformation. The first of its kind, this book grants technology leaders the insight to create and scale their AI capabilities and bring their companies into the new generation of technology. As AI continues to grow into a necessary feature for many businesses, more and more leaders are interested in harnessing the technology within their own organizations. In this new book, leaders will learn to master AI fundamentals, grow their career opportunities, and gain confidence in machine learning. Enterprise Artificial Intelligence Transformation covers a wide range of topics, including: Real-world AI use cases and examples Machine learning, deep learning, and slimantic modeling Risk management of AI models AI strategies for development and expansion AI Center of Excellence creating and management If you're an industry, business, or technology professional that wants to attain the skills needed to grow your machine learning capabilities and effectively scale the work you're already doing, you'll find what you need in Enterprise Artificial Intelligence Transformation.

Enterprise Augmented Reality Projects: Build real-world, large-scale AR solutions for various industries

by Jorge R. Benito Enara Artetxe Gonzalez

Design end-to-end AR solutions for domains such as marketing, retail, manufacturing, tourism, automation, and training Key Features Use leading AR development frameworks such as ARCore, ARKit, and Vuforia across key industries Identify the market potential of AR for designing visual solutions in different business sectors Build multi-platform AR projects for various platforms such as Unity, iOS, and Android Book Description Augmented reality (AR) is expanding its scope from just being used in mobile and game applications to enterprise. Different industries are using AR to enhance assembly line visualization, guide operators performing difficult tasks, attract more customers, and even improve training techniques. In this book, you'll gain comprehensive insights into different aspects of developing AR-based apps for six different enterprise sectors, focusing on market needs and choosing the most suitable tool in each case. You'll delve into the basics of Unity and get familiar with Unity assets, materials, and resources, which will help you build a strong foundation for working on the different AR projects covered in the book. You'll build real-world projects for various industries such as marketing, retail, and automation in a step-by-step manner. This will give you hands-on experience in developing your own industrial AR apps. While building the projects, you'll explore various AR frameworks used in the enterprise environment such as Vuforia, EasyAR, ARCore, and ARKit, and understand how they can be used by themselves or integrated into the Unity 3D engine to create AR markers, 3D models, and components of an AR app. By the end of this book, you'll be well versed in using different commercial AR frameworks as well as Unity for building robust AR projects. What you will learn Understand the basics of Unity application development and C# scripting Learn how to use Android Studio along with ARCore and Sceneform to build AR prototypes for Android devices Enable AR experiences on the web with ARCore and WebAR Explore emerging AR authoring tools such as Augmented Class! for education Understand the differences and similarities between handheld and head-mounted display (HMD) environments and how to build an app for each target Become well versed in using Xcode with ARKit and SceneKit to develop AR portals for iOS devices Who this book is for This book is for anyone interested in emerging and interactive technologies or looking to build AR applications for any domain. Although, no prior augmented reality experience is required, having some skills in object-oriented programming (OOP) will be helpful.

The Enterprise Big Data Framework: Building Critical Capabilities to Win in the Data Economy

by Jan-Willem Middelburg

Businesses who can make sense of the huge influx and complexity of data will be the big winners in the information economy. This comprehensive guide covers all the aspects of transforming enterprise data into value, from the initial set-up of a big data strategy, towards algorithms, architecture and data governance processes. Using a vendor-independent approach, The Enterprise Big Data Framework offers practical advice on how to develop data-driven decision making, detailed data analysis and data engineering techniques.With a focus on business implementation, The Enterprise Big Data Framework includes sections on analysis, engineering, algorithm design and big data architecture, and covers topics such as data preparation and presentation, data modelling, data science, programming languages and machine learning algorithms. Endorsed by leading accreditation and examination institute AMPG International, this book is required reading for the Enterprise Big Data Certifications, which aim to develop excellence in big data practices across the globe. Online resources include sample data for practice purposes.

The Enterprise Big Data Lake: Delivering the Promise of Big Data and Data Science

by Alex Gorelik

Enterprises are experimenting with using Hadoop to build Big Data Lakes, but many projects are stalling or failing because the approaches that worked at Internet companies have to be adopted for the enterprise. This practical handbook guides managers and IT professionals from the initial research and decision-making process through planning, choosing products, and implementing, maintaining, and governing the modern data lake.You'll explore various approaches to starting and growing a Data Lake, including Data Warehouse off-loading, analytical sandboxes, and "Data Puddles." Author Alex Gorelik shows you methods for setting up different tiers of data, from raw untreated landing areas to carefully managed and summarized data. You'll learn how to enable self-service to help users find, understand, and provision data; how to provide different interfaces to users with different skill levels; and how to do all of that in compliance with enterprise data governance policies.

Enterprise, Business-Process and Information Systems Modeling: 23rd International Conference, BPMDS 2022 and 27th International Conference, EMMSAD 2022, Held at CAiSE 2022, Leuven, Belgium, June 6–7, 2022, Proceedings (Lecture Notes in Business Information Processing #450)

by Adriano Augusto Asif Gill Dominik Bork Selmin Nurcan Iris Reinhartz-Berger Rainer Schmidt

This book contains the refereed proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling: * the 23rd International Conference on Business Process Modeling, Development and Support, BPMDS 2022, and * the 27th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2022. The conferences were taking place in Leuven, Belgium during June 6-7, 2022. For BPMDS 7 full papers and 2 short papers were carefully reviewed and selected for publication from a total of 18 submissions; for EMMSAD 11 full papers and 3 short papers were accepted from 30 submissions after thorough reviews. The papers were organized in topical sections as follows: BPMDS: Actual and perceived challenges; business process modeling; understanding collaboration: one issue, many perspectives; and event logs – why it derivates; EMMSAD: Foundations of modeling and method engineering; enterprise, business process, and capability modeling; information systems and requirements modeling; domain-specific and knowledge modeling; and evaluation of modeling approaches.

Enterprise, Business-Process and Information Systems Modeling: 22nd International Conference, BPMDS 2021, and 26th International Conference, EMMSAD 2021, Held at CAiSE 2021, Melbourne, VIC, Australia, June 28–29, 2021, Proceedings (Lecture Notes in Business Information Processing #421)

by Adriano Augusto Asif Gill Selmin Nurcan Iris Reinhartz-Berger Rainer Schmidt Jelena Zdravkovic

This book contains the proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling: * the 22nd International Conference on Business Process Modeling, Development and Support, BPMDS 2021, and * the 26th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2021. The conferences were planned to take place in Melbourne, Australia, during June 28–29, 2021, but changed to an online format due to the COVID-19 pandemic. For BPMDS 10 full papers and 1 short paper were carefully reviewed and selected for publication from a total of 26 submissions; for EMMSAD 13 full papers and 1 short paper were accepted from 34 submissions. The papers were organized in topical sections as follows: BPMDS: Improving event data quality in coherence with business requirements; enhancing the value of data in processes improvement; event stream and predictive monitoring; modeling languages and reference models; EMMSAD: Enterprise modeling; handling models and modeling methods; threat and evidence modeling; and model-driven engineering and applications.

Enterprise, Business-Process and Information Systems Modeling: 19th International Conference, BPMDS 2018, 23rd International Conference, EMMSAD 2018, Held at CAiSE 2018, Tallinn, Estonia, June 11-12, 2018, Proceedings (Lecture Notes in Business Information Processing #318)

by Jens Gulden Iris Reinhartz-Berger Rainer Schmidt Sérgio Guerreiro Wided Guédria Palash Bera

This book constitutes the proceedings of two events held at the CAiSE conference and relating to the areas of enterprise, business process and information systems modeling: The 19th International Conference on Business Process Modeling, Development and Support, BPMDS 2018, and the 23rd International Conference on Evaluation and Modeling Methods for Systems Analysis and Development, EMMSAD 2018. The conferences took place in Tallinn, Estonia, in June 2018. The 13 papers accepted for BPMDS were carefully reviewed and selected from 29 submissions; for EMMSAD 6 papers out of 13 submissions were accepted for publication. For BPMDS 2018, the papers were organized in topical sections as follows: context-awareness in business processes; automatic analysis of business processes; advanced approaches for business process modeling; evaluation of business process modeling techniques; an experience report on modeling collaborative processes. For EMMSAD 2018, the six related papers are listed without further sections.

Enterprise, Business-Process and Information Systems Modeling: 24th International Conference, BPMDS 2023, and 28th International Conference, EMMSAD 2023, Zaragoza, Spain, June 12–13, 2023, Proceedings (Lecture Notes in Business Information Processing #479)

by Han van der Aa Dominik Bork Henderik A. Proper Rainer Schmidt

This book contains the refereed proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling: * the 24th International Conference on Business Process Modeling, Development and Support, BPMDS 2023, and * the 28th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2023. The conferences were taking place in Zaragoza, Spain, during June 12-13, 2023. For BPMDS 9 full papers and 2 short papers were carefully reviewed and selected for publication from a total of 26 submissions; for EMMSAD 9 full papers and 3 short papers were accepted from 26 submissions after thorough reviews. The BPMDS papers deal with a broad range of theoretical and applications-based research in business process modeling, development and support. EMMSAD focusses on modeling methods for systems analysis and development.

Enterprise, Business-Process and Information Systems Modeling: 18th International Conference, BPMDS 2017, 22nd International Conference, EMMSAD 2017, Held at CAiSE 2017, Essen, Germany, June 12-13, 2017, Proceedings (Lecture Notes in Business Information Processing #287)

by Iris Reinhartz-Berger, Jens Gulden, Selmin Nurcan, Wided Guédria and Palash Bera

This book constitutes the proceedings of two events held in conjunction with the CAiSE conferences and related to the areas of enterprise, business-process and information systems modeling: the 18th International Conference on Business Process Modeling, Development and Support, BPMDS 2017, and the 22nd International Conference on Evaluation and Modeling Methods for Systems Analysis and Development, EMMSAD, 2017. They took place in Essen, Germany, in June 2017. The focus theme for BPMDS 2017 papers was “Enabling Business Transformation by Business Process Modeling, Development and Support". From 24 submitted papers, 11 were finally accepted and organized by: Non-functional considerations in business processes; new challenges in business process modeling and support; testing business processes; business process model comprehension; an experience report on teaching business process modeling. The EMMSAD conference focuses on evaluating, exploring and enhancing modeling methods and techniques for the development of information and software systems, enterprises, and business processes. It received 25 submissions, from which 9 full and 2 short papers were selected and organized: evaluation and comparison of modeling languages and methods; modeling approaches to support decision making; behavioral specification and business process modeling; and modeling languages and methods in evolving context.

Enterprise, Business-Process and Information Systems Modeling: 21st International Conference, BPMDS 2020, 25th International Conference, EMMSAD 2020, Held at CAiSE 2020, Grenoble, France, June 8–9, 2020, Proceedings (Lecture Notes in Business Information Processing #387)

by Selmin Nurcan Iris Reinhartz-Berger Pnina Soffer Jelena Zdravkovic

This book contains the proceedings of two long-running events held along with the CAiSE conference relating to the areas of enterprise, business-process and information systems modeling: * the 21st International Conference on Business Process Modeling, Development and Support, BPMDS 2020, and * the 25th International Conference on Exploring Modeling Methods for Systems Analysis and Development, EMMSAD 2020. The conferences were planned to take place in Grenoble, France, during June 8–9, 2020. They were held virtually due to the COVID-19 pandemic. For BPMDS 13 full papers and 1 short paper were carefully reviewed and selected for publication from a total of 30 submissions; for EMMSAD 11 full papers and 4 short papers were accepted from 29 submissions. The papers were organized in topical sections named as follows: BPMDS: Business process execution and monitoring, BPM applications in industry and practice, planning and scheduling in business processes, process mining, process models and visualizations EMMSAD: Requirements and method engineering, enterprise and business modeling, software-related modeling, domain-specific modeling, evaluation-related research.

Enterprise, Business-Process and Information Systems Modeling: 20th International Conference, BPMDS 2019, 24th International Conference, EMMSAD 2019, Held at CAiSE 2019, Rome, Italy, June 3–4, 2019, Proceedings (Lecture Notes in Business Information Processing #352)

by Iris Reinhartz-Berger Jelena Zdravkovic Jens Gulden Rainer Schmidt

This book constitutes the proceedings of two events held at the CAiSE conference and relating to the areas of enterprise, business process and information systems modeling: The 20th International Conference on Business Process Modeling, Development and Support, BPMDS 2019, and the 24th International Conference on Evaluation and Modeling Methods for Systems Analysis and Development, EMMSAD 2019. The conferences took place in Rome, Italy, in June 2019. The 7 full and 2 short papers accepted for BPMDS were carefully reviewed and selected from a total of 20 submissions; for EMMSAD 15 full papers were accepted from 38 submissions. The papers were organized in topical sections named as follows: BPMDS: large and complex business process modeling and development; execution and understandability of declarative process models; novel approaches in enterprise modeling; transformative business process modeling, development, and support. EMMSAD: foundations of modeling and method engineering; enterprise process and capability modeling; information systems and requirements modeling; domain-specific and ontology modeling; and evaluation of modeling approaches.

Enterprise, Business-Process and Information Systems Modeling

by Rainer Schmidt Wided Guédria Ilia Bider Sérgio Guerreiro

This book contains the refereed proceedings of the 17th International Conference on Business Process Modeling, Development and Support, BPMDS 2016, and the 21st International Conference on Exploring Modeling Methods for Systems Analysis and Design, EMMSAD 2016, held together with the 28th International Conference on Advanced Information Systems Engineering (CAiSE 2016) in Ljubljana, Slovenia, in June 2016. The focus theme for BPMDS 2016 papers was "Business Processes in a Connected World", for which three subthemes were identified: business processes for connecting people, connecting intelligent objects to business processes and connecting information/data/knowledge to business processes. The 17 full and 1 short paper accepted for BPMDS were selected from 48 submissions and are grouped into topical sections on process execution support; improving usability of process models; social and human perspectives; new directions in process modeling; consistency, correctness and compliance; process and data mining; and process variability. The intention of EMMSAD is to solicit papers related to the field of information systems analysis and design including numerous information modeling methods and notations that are typically evolving. These ongoing changes significantly impact the way information systems, enterprises, and business processes are being analyzed and designed in practice. The 12 full papers accepted for EMMSAD were chosen from 19 submissions and are grouped into topical sections on fundamental issues in modeling; requirements and regulations; enterprise and software ecosystem modeling; information and process model quality; meta-modeling and domain specific modeling and model composition; and modeling of architecture and design.

The Enterprise Cloud

by James Bond

Despite the buzz surrounding the cloud in recent years, only a small percentage of organizations worldwide rely on this service--so far. If you're planning your long-term cloud strategy, this practical book provides insider knowledge and real-world lessons regarding planning, design, operations, security, and application transformation.Author James Bond provides useful guidance and best practice checklists based on his field experience with real customers and cloud providers. You'll view cloud services from the perspective of a consumer and as an owner/operator of an enterprise private or hybrid cloud, and learn valuable lessons from successful and less-than-successful organization use-case scenarios.Get updated trends and definitions in cloud computing, deployment models, and for building or buying cloud servicesDiscover challenges in cloud operations and management not foreseen by early adoptersUse real-world lessons to plan and build an enterprise private or hybrid cloudLearn how to assess, port, and migrate legacy applications to the cloudIdentify security threats and vulnerabilities unique to the cloudEmploy a cloud management system for your enterprise (private or multi-provider hybrid) cloud ecosystemUnderstand the challenges for becoming an IT service broker leveraging the power of the cloud

Enterprise Cloud Computing

by Gautam Shroff

Cloud computing promises to revolutionize IT and business by making computing available as a utility over the internet. This book is intended primarily for practising software architects who need to assess the impact of such a transformation. It explains the evolution of the internet into a cloud computing platform, describes emerging development paradigms and technologies, and discusses how these will change the way enterprise applications should be architected for cloud deployment. Gautam Shroff provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services, programming paradigms such as MapReduce, as well as 'do-it-yourself' hosted development tools. He also describes emerging technologies critical to cloud computing. The book also covers the fundamentals of enterprise computing, including a technical introduction to enterprise architecture, so it will interest programmers aspiring to become software architects and serve as a reference for a graduate-level course in software architecture or software engineering.

Enterprise Cloud Computing for Non-Engineers (Technology for Non-Engineers)

by Frank Groom Stephan Jones

This book provides a technical description of cloud computing technologies, covering cloud infrastructure and platform services. It then addresses the basics of operating a Cloud computing data center, the services offered from Cloud providers, the carrier role in connecting users to data centers, and the process of interconnecting Cloud data centers to form a flexible processing unit. It also describes how cloud computing has made an impact in various industries and provides emerging technologies that are critical within each industry. Lastly, this book will address security requirements and provide the best practices in securing data.

Enterprise Cloud Security and Governance: Efficiently set data protection and privacy principles

by Adrian Pruteanu Zeal Vora

Key Features Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform Practical examples to ensure you secure your Cloud environment efficiently A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Book Description Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. What you will learn Configure your firewall and Network ACL Protect your system against DDOS and application-level attacks Explore cryptography and data security for your cloud Get to grips with configuration management tools to automate your security tasks Perform vulnerability scanning with the help of the standard tools in the industry Learn about central log management

Enterprise Content and Search Management for Building Digital Platforms

by Shailesh Kumar Shivakumar

Provides modern enterprises with the tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques Contemporary business organizations can either embrace the digital revolution—or be left behind. Enterprise Content and Search Management for Building Digital Platforms provides modern enterprises with the necessary tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques to compete in the today’s digital world. Features include comprehensive discussions on content strategy, content key performance indicators (KPIs), mobile-first strategy, content assessment models, various practical techniques and methodologies successfully used in real-world digital programs, relevant case studies, and more. Initial chapters cover core concepts of a content management system (CMS), including content strategy; CMS architecture, templates, and workflow; reference architectures, information architecture, taxonomy, and content metadata. Advanced CMS topics are then covered, with chapters on integration, content standards, digital asset management (DAM), document management, and content migration, evaluation, validation, maintenance, analytics, SEO, security, infrastructure, and performance. The basics of enterprise search technologies are explored next, and address enterprise search architecture, advanced search, operations, and governance. Final chapters then focus on enterprise program management and feature coverage of various concepts of digital program management and best practices—along with an illuminating end-to-end digital program case study. Comprehensive and cutting-edge, Enterprise Content and Search Management for Building Digital Platforms is an invaluable reference resource for creating an optimal enterprise digital eco-system to meet the challenges of today’s hyper-connected world.

Enterprise Content Management in Information Systems Research

by Jan Vom Brocke Alexander Simons

This book collects ECM research from the academic discipline of Information Systems and related fields to support academics and practitioners who are interested in understanding the design, use and impact of ECM systems. It also provides a valuable resource for students and lecturers in the field. "Enterprise content management in Information Systems research - Foundations, methods and cases" consolidates our current knowledge on how today's organizations can manage their digital information assets. The business challenges related to organizational information management include reducing search times, maintaining information quality, and complying with reporting obligations and standards. Many of these challenges are well-known in information management, but because of the vast quantities of information being generated today, they are more difficult to deal with than ever. Many companies use the term "enterprise content management" (ECM) to refer to the management of all forms of information, especially unstructured information. While ECM systems promise to increase and maintain information quality, to streamline content-related business processes, and to track the lifecycle of information, their implementation poses several questions and challenges: Which content objects should be put under the control of the ECM system? Which processes are affected by the implementation? How should outdated technology be replaced? Research is challenged to support practitioners in answering these questions.

Enterprise Content Management with Microsoft SharePoint

by Christopher D. Riley Shadrach White

<p>Meet the challenges of Enterprise Content Management (ECM) head on, using rich ECM features in Microsoft SharePoint 2013. Led by two ECM experts, you&#8217;ll learn how to build a solid information architecture (IA) for managing documents, knowledge, web content, digital assets, records, and user-generated content throughout your organization. Examples and case studies are based on the authors&#8217; real-world experience.</p>

Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage

by Bob Chaput

This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.What You Will LearnRead new information and treat ECRM and cybersecurity as a value creatorReceive updates on legal cases, legislative actions, and regulations that are raising the stakes for organizations, their C-suites, and boardsThink differently about funding ECRM and cybersecurity initiativesUnderstand the most critical ECRM decision that boards must facilitate in their organizationsUse practical, tangible, actionable content to develop and document your ECRM program and cybersecurity strategy“This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust.” —Paul Connelly, First CISO at the White House and HCA Healthcare Who This Book Is ForThe primary audience includes Chief Information Security Officers, Chief Risk Officers, and Chief Compliance Officers. The secondary audience includes C-suite executives and board members. The tertiary audience includes any stakeholder responsible for privacy, security, compliance, and cyber risk management or students of these topics.

Enterprise Cybersecurity

by Scott E. Donaldson Stanley G. Siegel Chris K. Williams Abdul Aslam

Unify your organization''s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. Enterprise Cybersecurity presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise''s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. What you''ll learn Executives, managers, architects, IT professionals, customers and vendors of cybersecurity services, and engineering students will learn from this book How to create a data-driven and objectively-managed cybersecurity program optimally tailored to your organization How to organize, assess, and score cybersecurity programs using the authors'' enterprise cybersecurity architecture scheme The methodology of targeted attacks and why they succeed The processes of cybersecurity risk management, capability assessment, scope selection, operations, and supporting information systems How to audit and report your cybersecurity program in compliance with regulatory frameworks How cybersecurity is evolving and projected to evolve Who this book is for Enterprise Cybersecurity is for people and organizations interested in modern cybersecurity and who are responsible for leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. Table of Contents Part I: The Cybersecurity Challenge Chapter 1: Defining the Cybersecurity Challenge Chapter 2: Meeting the Cybersecurity Challenge Part II: A New Enterprise Cybersecurity Architecture Chapter 3: Enterprise Cybersecurity Architecture Chapter 4: Implementing Enterprise Cybersecurity Chapter 5: Operating Enterprise Cybersecurity Chapter 6: Enterprise Cybersecurity and the Cloud Chapter 7: Enterprise Cybersecurity for Mobile and BYOD Part III: The Art of Cyberdefense Chapter 8: Building an Effective Defense Chapter 9: Responding to Incidents Chapter 10: Managing a Cybersecurity Crisis Part IV: Enterprise Cyberdefense Assessment Chapter 11: Assessing Enterprise Cybersecurity Chapter 12: Measuring a Cybersecurity Program Chapter 13: Mapping Against Cybersecurity Frameworks Part V: Enterprise Cybersecurity Program Chapter 14: Managing an Enterprise Cybersecurity Program Chapter 15: Looking to the Future Appendices: Appendix A: Common Cyberattacks Appendix B: Cybersecurity Frameworks Appendix C: Enterprise Cybersecurity Capabilities Appendix D: Sample Cybersecurity Policy Appendix E: Cybersecurity Operational Processes Appendix F: Object Measurement Appendix G: Cybersecurity Capability Value Scales Appendix H: Cybersecurity Sample Assessment Appendix I: Net...

Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization

by Ariel Evans

Cyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in Digital Business: Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience for their business. Written by a world-renowned expert in the field, the book is based on three years of research with the Fortune 1000 and cyber insurance industry carriers, reinsurers, and brokers. It acts as a roadmap to understand cybersecurity maturity, set goals to increase resiliency, create new roles to fill business gaps related to cybersecurity, and make cyber inclusive for everyone in the business. It is unique since it provides strategies and learnings that have shown to lower risk and demystify cyber for each person. With a clear structure covering the key areas of the Evolution of Cybersecurity, Cybersecurity Basics, Cybersecurity Tools, Cybersecurity Regulation, Cybersecurity Incident Response, Forensics and Audit, GDPR, Cybersecurity Insurance, Cybersecurity Risk Management, Cybersecurity Risk Management Strategy, and Vendor Risk Management Strategy, the book provides a guide for professionals as well as a key text for students studying this field. The book is essential reading for CEOs, Chief Information Security Officers, Data Protection Officers, Compliance Managers, and other cyber stakeholders, who are looking to get up to speed with the issues surrounding cybersecurity and how they can respond. It is also a strong textbook for postgraduate and executive education students in cybersecurity as it relates to business.

Enterprise Cybersecurity Study Guide: How To Build A Successful Cyberdefense Program Against Advanced Threats

by Scott E. Donaldson Stanley G. Siegel Chris K. Williams Abdul Aslam

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work. The guide can be used for self-study or in the classroom.Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum—what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit—gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer.Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank.People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program.What You’ll Learn Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade Who This Book Is For Those involved in or interested in successful enterprise cybersecurity (e.g., business professionals, IT professionals, cybersecurity professionals, and students). This guide can be used in a self-study mode. The book can be used by students to facilitate note-taking in the classroom and by Instructors to develop classroom presentations based on the contents of the original book, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats.

Refine Search

Showing 18,176 through 18,200 of 54,108 results