- Table View
- List View
IT Convergence and Security: Proceedings of ICITCS 2020 (Lecture Notes in Electrical Engineering #712)
by Kuinam J. Kim Hyuncheol KimThis volume comprises the proceedings of ICITCS 2020. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security is core to most current research, industrial and commercial activities. Topics covered in this volume include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, healthcare and wellness, web technology and applications, internet of things, and security & privacy. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book will be of use to researchers in academia, industry and other research institutes focusing on IT convergence and security.
IT Convergence and Security: Proceedings of ICITCS 2021 (Lecture Notes in Electrical Engineering #782)
by Kuinam J. Kim Hyuncheol KimThis book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.
IT Convergence and Services
by James J. Park Hamid Arabnia Hang-Bae Chang Taeshik ShonIT Convergence and Services is proceedings of the 3rd FTRA International Conference on Information Technology Convergence and Services (ITCS-11) and the FTRA International Conference on Intelligent Robotics, Automations, telecommunication facilities, and applications (IRoA-11). The topics of ITCS and IRoA cover the current hot topics satisfying the world-wide ever-changing needs. The ITCS-11 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services. The ITCS-11 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. The main scope of ITCS-11 is as follows. Computational Science and Applications Electrical and Electronics Engineering and Technology Manufacturing Technology and Services Management Information Systems and Services Electronic Commerce, Business and Management Vehicular Systems and Communications Bio-inspired Computing and Applications IT Medical Engineering Modeling and Services for Intelligent Building, Town, and City The IRoA is a major forum for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of intelligent robotics and automations. The main scope of IRoA-11 is as follows. Intelligent Robotics & Perception systems Automations & Control Telecommunication Facilities Artificial Intelligence The IRoA is a major forum for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of intelligent robotics and automations. The main scope of IRoA-11 is as follows. Intelligent Robotics & Perception systems Automations & Control Telecommunication Facilities Artificial Intelligence
IT Crisisology Casebook: Smart Digitalization for Sustainable Development (Smart Innovation, Systems and Technologies #300)
by Sergey V. ZykovThe book focuses on the real-world case-based crisis management in digital product development. This includes forecasting, responding, and agile engineering/management methods, patterns, and practices for sustainable development. This book introduces a set of case studies for sustainability in management as a blend, the components of which have been carefully selected from a few domains adjacent to digital production such as IT-intensive operation, human resource management, and knowledge engineering, to name a few. The key ingredients of this crisis management framework include information management, tradeoff optimization, agile product development, and knowledge transfer. The case studies this book features will help the stakeholders in understanding and identifying the key technology, business, and human factors that may likely result in a digital production crisis, i.e., critically affect the organization outcomes in terms of successful digitalization and sustainable development. These factors are particularly important for the large-scale applications, typically considered very complex in managerial and technological aspects, and, therefore, specifically addressed by the discipline of IT crisisology.
IT Crisisology Models: Object-Based Optimization for Sustainable Development (Smart Innovation, Systems and Technologies #381)
by Sergey V. ZykovThe book focuses on modeling real-world crisis management in digital product development. This includes models and methods for forecasting, responding, and agile engineering/managing for sustainable product development. This book suggests an approach that contains principles, formal models, and semi-formal practice-oriented methods, patterns and techniques to efficiently manage these crises and provide sustainable development. The book also introduces a set of principles, models, and methods for sustainable management as a blend, the components of which have been carefully selected from a few domains adjacent to digital production such as IT-intensive operation, human resource management, and knowledge engineering, to name a few. The key ingredients of this crisis management framework include smart data modeling, trade-off optimizing, agile product controlling, and knowledge transferring.
IT Crisisology: Models, Methods, Patterns, Practices, Case Studies (Smart Innovation, Systems and Technologies #210)
by Sergey V. ZykovThis book focuses on crisis management in software development which includes forecasting, responding and adaptive engineering models, methods, patterns and practices. It helps the stakeholders in understanding and identifying the key technology, business and human factors that may result in a software production crisis. These factors are particularly important for the enterprise-scale applications, typically considered very complex in managerial and technological aspects and therefore, specifically addressed by the discipline of software engineering. Therefore, this book throws light on the crisis responsive, resilient methodologies and practices; therewith, it also focuses on their evolutionary changes and the resulting benefits.
IT Development in Korea: A Broadband Nirvana? (Routledge Advances in Korean Studies)
by Kwang-Suk LeeThis book investigates the contextual factors that led to Korean society becoming ‘broadband heaven’ — the most wired nation in the world — by scrutinizing the historical contexts surrounding the Korean Information Infrastructure (KII) project (1995–2005), which aimed to establish a nationwide high-speed backbone network, as well as its later evolution, which involved redesigning the public infrastructure. The book details the hidden mechanisms and the real elements of building the ‘broadband heaven’: the global constraints conditioning its telecom policies, the dense state–capital linkages, and the bureaucratic desire for social control. It draws on the state-in-society approach to analyze the deformations caused by the symbiosis between the state and big business in implementing the rosy vision of the broadband network. This book provides insights into how to formulate future telecom policies along much more democratically participatory lines while restraining the overwhelming power of the telecom oligopolies and conglomerates. It stands alone as a comprehensive study of the recent East Asian model of IT development, written specifically to examine Korea’s socio-historical mechanisms for promoting physical speed and broadband mobility. This book will be important reading to anyone interested in Korean Studies, Information Technology and I.T. Development.
IT Disaster Recovery Planning For Dummies
by Peter H. Gregory Philip Jan RothsteinIf you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off. After all, where do you start?IT Disaster Recovery Planning For Dummies shows you how to get started by creating a safety net while you work out the details of your major plan. The right plan will get your business back on track quickly, whether you're hit by a tornado or a disgruntled employee with super hacking powers. Here's how to assess the situation, develop both short-term and long-term plans, and keep your plans updated.This easy-to-understand guide will help youPrepare your systems, processes, and people for an organized response to disaster when it strikesIdentify critical IT systems and develop a long-range strategySelect and train your disaster recovery teamConduct a Business Impact AnalysisDetermine risks to your business from natural or human-made causesGet management supportCreate appropriate plan documentsTest your planSome disasters get coverage on CNN, and some just create headaches for the affected organization. With IT Disaster Recovery Planning For Dummies, you'll be prepared for anything from hackers to hurricanes!
IT Disaster Response
by Greg D. MooreLearn how to develop solutions to handle disasters both large and small. Real-world scenarios illustrate the importance of disaster response (DR) planning.IT Disaster Response takes a different approach to IT disaster response plans. Rather than focusing on details such as what hardware you should buy or what software you need to have in place, the book focuses on the management of a disaster and various management and communication tools you can use before and during a disaster.This book examines disasters in general—a compilation of lessons the author learned over the course of years working in IT, reviewing plane crashes, and his experiences as a cave rescuer and cave rescue instructor. Although at first it may seem that none of these are really related, the truth is they all have elements in common. In each case, the unexpected has happened. Just as not all plane crashes are deadly, not all IT mishaps have terrible consequences. With the proper training and approach, many problems can either be avoided in the first place or better handled if they do arise.The book contains practical guidance on:How to think about a disaster both before it happens and while it’s happeningHow to apply management skills used in other fields during disastersHow to get everyone on board when it comes to planning for and handling disastersHow to better deal with smaller, more manageable—and more frequently occurring—disastersWhat you’ll learn Discover the difference between a DR solution and a DR planDefine a disaster — it’s not always of the scale of a fire burning down the building.See when to actually implement your DR plan Who This Book Is ForIT professionals in charge of developing their company’s disaster recovery plan who also need to raise issues to the required C-level people to make sure they have a viable plan.
IT Enabled Services
by Shiro UesugiAs the global economy turns more and more service oriented, Information Technology-Enabled Services (ITeS) require greater understanding. Increasing numbers and varieties of services are provided through IT. Furthermore, IT enables the creation of new services in diverse fields previously untouched. Because of the catalyzing nature of internet technology, ITeS today has become more than "Outsourcing" of services. This book illustrates the enabling nature of ITeS with its entailment of IT, thus contributing to the betterment of humanity. The scope of this book is not only for academia but also for business persons, government practitioners and readers from daily lives. Authors from a variety of nations and regions with various backgrounds provide insightful theories, research, findings and practices in various fields such as commerce, finance, medical services, government and education. This book opens up a new horizon with the application of Internet-based practices in business, government and in daily lives. Information Technology-Enabled Services works as a navigator for those who sail to the new horizon of service oriented economies.
IT Essentials Companion Guide v6
by Cisco Networking Cisco Networking AcademyIT Essentials v6 Companion Guide supports the Cisco Networking Academy IT Essentials version 6 course. The course is designed for Cisco Networking Academy students who want to pursue careers in IT and learn how computers work, how to assemble computers, and how to safely and securely troubleshoot hardware and software issues.
IT Governance
by Alan Calder Steve WatkinsThe development of IT governance - which recognises the convergence between business practicve and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security risk. The new edition has been full updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications. IT Governance also includes new material on key international markets - including the UK and the US, Australia and South Africa.
IT Governance
by Alan Calder Steve WatkinsFaced with constant and fast-evolving threats to information security and with a growing exposure to cyber risk, managers at all levels and in organizations of all sizes need a robust IT governance system. Now in its sixth edition, the bestselling IT Governance provides best-practice guidance for companies looking to protect and enhance their information security management systems and protect themselves against cyber threats. IT Governance has been fully updated to take account of current cyber security and advanced persistent threats and reflects the latest regulatory and technical developments, including the 2013 updates to ISO27001/ISO27002. Changes for this edition include: Full updates throughout in line with the revised ISO27001 standard and accompanying ISO27002 code of practice for information security controls Full coverage of changes to data-related regulations in different jurisdictions and advice on compliance Guidance on the options for continual improvement models and control frameworks made possible by the new standard New developments in cyber risk and mitigation practices The latest technological developments that affect IT governance and security Guidance on the new information security risk assessment process and treatment requirements Including coverage of key international markets including the UK, North America, the EU and Asia Pacific, IT Governance is the definitive guide to implementing an effective information security management and governance system.
IT Governance Bibliography
by Safari Content TeamIT Governance is the control of organizational structures through effective leadership and the hands-on management of organizational policies, processes, and structures that impact information, information-related assets and technology. Fundamentally, IT governance provides guidance to ensure that an information technology organization is performing successfully and that policies, processes and other organizational structures are in place so that essential organizational strategies and objectives are achieved. Organizations with excellent IT governance enjoy improved coordination, communication and alignment of goals throughout the entire enterprise. With effective IT governance, organizations are able to make effective decisions, manage performance and ensure that projects are completed on time and within budget. IT governance also helps to align business and IT strategy while minimizing risk and ensuring that processes comply with industry standards and frameworks. Most of all, IT governance helps organizations improve productivity, quality and achieve success. Follow along in this Safari Books Online bibliography to learn more about all of the IT Governance aspects that have been described here.
IT Governance and Information Security: Guides, Standards, and Frameworks (Advances in Cybersecurity Management)
by Yassine Maleh Mamoun Alazab Abdelkebir Sahid Mustapha BelaissaouiIT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes organizations to ever-growing risks. Understanding the threats, assessing the risks, adapting the organization, selecting and implementing the appropriate controls, and implementing a management system are the activities required to establish proactive security governance that will provide management and customers the assurance of an effective mechanism to manage risks. IT Governance and Information Security: Guides, Standards, and Frameworks is a fundamental resource to discover IT governance and information security. This book focuses on the guides, standards, and maturity frameworks for adopting an efficient IT governance and information security strategy in the organization. It describes numerous case studies from an international perspective and brings together industry standards and research from scientific databases. In this way, this book clearly illustrates the issues, problems, and trends related to the topic while promoting the international perspectives of readers. This book offers comprehensive coverage of the essential topics, including: IT governance guides and practices; IT service management as a key pillar for IT governance; Cloud computing as a key pillar for Agile IT governance; Information security governance and maturity frameworks. In this new book, the authors share their experience to help you navigate today’s dangerous information security terrain and take proactive steps to measure your company’s IT governance and information security maturity and prepare your organization to survive, thrive, and keep your data safe. It aspires to provide a relevant reference for executive managers, CISOs, cybersecurity professionals, engineers, and researchers interested in exploring and implementing efficient IT governance and information security strategies.
IT Governance to Drive High Performance: Lessons from Accenture
by Robert E. KressThis pocket guide provides you with an insider's detailed description of Accenture's IT governance policy and details its governance structure. It will show how effective IT governance links IT strategy and IT decisions to Accenture's business strategy and business priorities. Following the best practices approach set out in this pocket guide will serve as an excellent starting point for any organization with ambitions to achieve high performance. Benefits to business include: *Boost productivity* How hard do you work in other areas of your business to cut costs and improve efficiency? In testing economic times, is the absence of a clear strategy for your business s IT governance still a realistic option? Learning from Accenture s proven approach will enable you to increase your organization's competitiveness over the longer term. * Coordinate your operations * To ensure effective decision-making and align your IT function with your broader business goals, you need to make the structure of your IT governance fit your overall corporate governance structure. That way, you can make your IT work for your business. * Manage change effectively * IT is crucial for realizing the changes you want your business to make. For this reason, you cannot afford to have these changes treated merely as IT projects that have been foisted on the company by the IT department. By bringing top management on board, and giving business leaders a formal role in the IT governance of your organization, you will make the success of any project with an IT component much more likely. * Keep a grip on budgets * The costs of IT projects are notoriously prone to overrun, while some IT development programs have promised more than they ever delivered. The Accenture way of doing business is different. Following the Accenture approach means ensuring that your IT investment is backed by a solid business case, and measuring the return on investment following project completion.
IT Governance: A Pocket Guide
by Alan CalderAll businesses that accept payment cards are prey for hackers. When an attack is exposed - perhaps through a victim disputing fraudulent credit card charges - the target company will be exposed to a harsh and expensive set of repercussions. PCI DSS is designed to ensure that merchants are effectively protecting cardholder data. It recognises that not all merchants may have the technical understanding to identify for themselves the necessary steps and short-circuits to avoid danger. All merchants, and their service providers, should therefore ensure that they comply with PCI DSS, and that they stay compliant.
IT Governance: An International Guide to Data Security and ISO 27001/ISO 27002 (It Governance Ser.)
by Alan Calder Steve WatkinsFaced with the compliance requirements of increasingly punitive information and privacy-related regulation, as well as the proliferation of complex threats to information security, there is an urgent need for organizations to adopt IT governance best practice. IT Governance is a key international resource for managers in organizations of all sizes and across industries, and deals with the strategic and operational aspects of information security. Now in its seventh edition, the bestselling IT Governance provides guidance for companies looking to protect and enhance their information security management systems (ISMS) and protect themselves against cyber threats. The new edition covers changes in global regulation, particularly GDPR, and updates to standards in the ISO/IEC 27000 family, BS 7799-3:2017 (information security risk management) and the latest standards on auditing. It also includes advice on the development and implementation of an ISMS that will meet the ISO 27001 specification and how sector-specific standards can and should be factored in. With information on risk assessments, compliance, equipment and operations security, controls against malware and asset management, IT Governance is the definitive guide to implementing an effective information security management and governance system.
IT Governance: Guidelines for Directors
by Alan CalderThis book provides practical guidance to help directors and boards master the most important business topic of the information age. It comes with a complimentary eBook version! This important book cuts through the hype that surrounds IT governance to provide directors, executives, managers and professional advisers with clear, pragmatic guidelines for ensuring that IT and the business work together to ensure enterprise success in the highly competitive, global information economy. Aligning IT with the business is a key objective for boards and executives. Organizations with effective IT governance consistently generate better returns for their shareholders than equivalent organizations with ineffective IT governance, and the directors of companies that effectively govern their IT are significantly less exposed to compliance and shareholder challenges than others. It links IT governance to today's corporate governance environment and assesses the corporate impact t
IT Governance: Implementing Frameworks and Standards for the Corporate Governance of IT
by Alan Calder Steve MoirThis book aims to do two things. The first is to set out for managers, executives and IT professionals the practical steps necessary to meet today's corporate and IT governance requirements. The second is to provide practical guidance on how board executives and IT professionals can navigate and deploy to best corporate and commercial advantage the numerous IT management and IT governance frameworks and standards - particularly ISO/IEC 38500 - that have been published over the course of the last ten years.
IT Induction and Information Security Awareness: A Pocket Guide
by Valerie MaddockIf you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological, failings. However, the human factor usually receives far less attention. Training Computer systems are complex, so people who work with them often need to be trained in how to use them correctly. This applies especially to your company s information security. The loss of a memory stick by a careless employee, or the downloading of a file that contains a virus, may be all it takes to cause a security breach. Practical advice This book offers you practical advice on how to develop an IT Induction programme for your staff that can help safeguard your business information. By providing your employees with simple instruction in good IT working practices, and by making sure they know what is expected of them, you can strengthen your company s information security and reduce the risk that your data will be stolen or lost. A sense of responsibility Encouraging good corporate working and a strong sense of responsibility are, the author argues, essential for the protection of your business information. She shows you how to strike the right balance in your approach to staff training, thereby enabling you to provide your employees with an IT Induction that is at once informative and accessible. Benefits to business include: * Reduce the likelihood of a damaging security breach. Putting in place a programme of IT Induction will help ensure that your company s staff are following information security best practice. Educating employees in good IT working practices will help them to avoid the errors that might otherwise put your organisation at risk. * Protect the company s reputation. The damage an information security breach can do to your business goes beyond the initial cost of clearing up the mess. Without proper staff training, the danger is that theft or loss of data will damage your company s reputation. You need to provide your staff with a proper IT Induction in order to preserve good relations with your customers. * Avoid legal complications. IT offers business new, less formal means of communication. Employees write e-mails in a different style from the way they write letters. However, contracts can be made or broken via e-mail, and e-mail correspondence can be cited in litigation. An IT Induction programme will give your staff the appropriate guidance on e-mail communication with the clients or business partners of your company. * Manage employee working practices. Laptop computers and broadband mean that for many employees, the boundaries between work and home are becoming blurred. If you allow your staff to mix and match between working in the office and working from home, you need to make sure they know what they have to do to safeguard your firm s data both inside and outside the office.
IT Infrastructure: Security and Resilience Solutions
by Yannik Süß Ralf SüßEmbark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era. This exploration uncovers the multi-faceted domains of IaaS, PaaS, and SaaS, examining the primary components of modern IT infrastructure—compute, storage, backup, and beyond. As technology continues to surge forward, cyber threats evolve in tandem, prompting a dire need for reinforced data center security and resilience.This book provides readers with a holistic, layered understanding of IT operations in our interconnected age. You will dive deep into the heart of technological advancements, appreciating the symbiotic relationship between evolving hardware capabilities and the progressive nature of cloud services. You will understand the intricacies of data center design, management, and the strategic role they play amid the growing reliance on both private and public clouds. Asindustries pivot towards a more digital-first approach, this book serves as a guiding star, illuminating the pathways, challenges, and opportunities of the vast IT infrastructure landscape.What You Will LearnTrace the rich history and evolution of data centers over the last 60 yearsGet comprehensive insights into cloud services architecture, from IaaS to SaaSGain in-depth knowledge of data center facilities, infrastructure, and securityKnow best practices in storage provisioning, administration, and cost managementDevelop strategies and tools for ensuring data center security and resilienceUnderstand the multi-faceted world of IT support service in modern digital environmentsWho This Book Is ForIT professionals: from system administrators and network architects to IT managers and data center overseers, plus students and tech enthusiasts seeking deep insights into IT infrastructure
IT Inventory and Resource Management with OCS Inventory NG 1.02
by Barzan Tony AntalThis book closely follows the style of a practical, hands-on "how to" guide on working with OCS Inventory NG. The step-by-step approach, coupled with the use of visual aids, clear instructions, and real-world examples, makes it a fast-paced book. Upon the completion of this book, you will have the necessary skill set, know-how, and confidence to implement OCS Inventory NG to meet the demanding asset management needs of any organization. Then you can carry on using the book as reference material. This book targets an audience of system administrators and IT professionals who are required to implement, configure, customize, and work with IT Inventory and Asset Management solutions. The book does not presume any prior knowledge of inventory management, just a solid grasp of the server/client model and familiarity with the chosen operating system along with the necessary web server and database server terminologies. Anyone with an interest in inventorying IT assets and solving real-world resource management dilemmas will enjoy this book.
IT Investment: Making a Business Case (Computer Weekly Professional Ser.)
by Dan Remenyi Michael Sherwood-SmithFrequently not enough attention is given to producing a comprehensive business case or to producing an economic justification for an information systems investment. In fact many organizations are not clear as to what constitutes a sound business case and how to go about producing one. This Professional level book for the Computer Weekly Professional Series will show how to go about justification for I.T. spend. This book is designed for all those who are involved in the decision to invest in information systems. This book is especially relevant to senior business executives, senior financial managers and IT executives. Business consultants, computer and corporate advisors will also find the ideas and material addressed in this text of particular benefit as will anyone involved in corporate and strategic planning.In addition, senior students such as those working towards their MBAs will find this book of use.A business case is a statement or a series of statements that demonstrate the economic value of a particular intervention, a course of action or a specific investment. A business case is not simply a financial forecast of the hardware and software costs and the expected benefits. A business case for an information systems investment involves a comprehensive understanding of both the likely resources as well as the business drivers which will assist business managers improve their performance and thereby obtain a stream of benefits from the investment.In general there are approximately six steps in producing a business case for an information systems investment.1. Determine the high-level business outcomes that will be clearly and comprehensively expressed as a set of opportunities the organization can take advantage of, or problems that need to be rectified.2. Identify the corporate critical success factors that will be supported or enhanced by the operation of the completed information systems project or investment.3. Create a list of specific and detailed outcomes or benefits, their appropriate metrics, measuring methods and responsibility points that are represented by the stakeholders.4. Quantify the contribution made by the outcomes, which requires associating numbers or benefit values with outcomes where this is possible.5. Highlight the risks associated with the project.Fundamental to this new approach to developing a business case for information systems investment is the fact that it incorporates much more than the financial numbers which are typically found in the standard approach to a feasibility study. This approach looks behind the financial numbers to the improvements in business performance which are facilitated by information systems and which are the real drivers of the benefits. Furthermore, this approach to developing a business case allows the organization to manage the process so that the required results are achieved.
IT Maintenance: Applied Project Management
by Michael F. Malinoski PMPIT Maintenance: Applied Project Management modifies project management best practices to improve how IT system maintenance is managed. By taking a fresh look at increasing value and quality of system maintenance in a straightforward and practical way, this book helps readers understand how to apply modified project management best practices. From IT maintenance managers, project managers, and team members to CIOs, readers will: • Discover cost savings associated with reducing staff Improve reporting status and metrics •Build greater customer satisfaction Learn how to perform work consistently • Decrease staff stress level by stabilizing expectations •Streamline team operations •Decrease the manager's ongoing workload PLUS! This practical reference is organized by process groups similar to the PMBOK® — providing you with applied step-by-step guidance.