Browse Results

Showing 28,376 through 28,400 of 63,684 results

ISO19770-1:2012 SAM Process Guidance

by Rory Canavan

ISO19770-1:2012 SAM Process Guidance

ISO27000 and Information Security: A Combined Glossary

by Steve G Watkins Alan Calder

Get to grips with key ISO27000 and information security vocabulary with this indispensable, concise pocket guide! Information security is of crucial importance to your business. If you don t know the difference between a cookie and a worm, or between war-chalking and digital watermarking, you are sure to find this guide enlightening. The strength of the book is that it is a combined glossary, enabling you to find explanations of geek slang, procedural language and acronyms all in one place. The combined glossary is a revised edition of the popular A Dictionary of Information Security Terms, and this new edition has been able to draw on the definitions provided in ISO/IEC 27000:2009 Security Techniques Information security management systems Overview and vocabulary. What's new? Further definitions are sourced from ISO/IEC Guide 73:2002 to provide you with authoritative explanations of those information security terms that are used across the ISO framework. The combined glossary has taken account of an important change on the information security scene, and contains some new acronyms and definitions from the Payment Card Industry Data Security Standard (PCI DSS). Benefits to business include: * Understand what everyone else is talking about The fact that you re reading this suggests you take an interest in information security. Whether you work in business or in the public sector, it s an issue that s likely to come up. If you re given a position paper to read on information security, or have to attend a briefing, you will want to form your own opinion, particularly when the discussion directly affects your company. Meekly accepting arguments you don t understand is never a good idea, especially not when large sums of money are involved. With the clear, reliable definitions contained in this combined glossary, you can finally get to grips with the problem. * Understand what you re talking about Any modern organisation relies on its IT systems. Although IT may not be your speciality, cybercrime affects all of us. So, wherever you work, if you are in a position of responsibility, then at some point, you will need to form a view on information security and put your point across. You can use this combined glossary to bring your arguments into sharper focus. The pocket guide will prove invaluable not only to business executives but also to civil servants and lawyers, as well as to people working in financial services and the media. * Assist ISO implementation If your company or department is introducing an information security management system (ISMS) as specified under ISO27001, then you can ensure that key personnel are up to speed on the issue of information security by giving them all a copy of this pocket guide. * Make better decisions The bad guys are only ever a mouse-click away. If you care at all about the financial well-being of your company, you need to take action on information security. However, there is often a gap between management s overall sense of its responsibilities regarding information security and the IT people whose technical skills are required to fulfil those obligations. This combined glossary will help your organisation to bridge that gap and to facilitate communication between managers and the IT department. The guide enables managers to grasp the key concepts of information security, thereby facilitating the planning and coordination that are essential for successful implementation of any major information security project. So it makes sense to take information security seriously, even if you are not an expert on the subject. This rapidly evolving discipline has spawned a complex and bewildering vocabulary and understanding the terms and language will stand you in good stead. If you have ever felt confused by the language of information security, this pocket guide is for you; designed for non-specialist managers and those who are new to the subject, two internationally recognised experts in the field of information security have created a simple key to the mysteries of geek speak.

ISO27001 / ISO27002 A Pocket Guide

by Alan Calder

ISO/IEC 27001:2005 is an international standard for information security management systems (ISMSs). Closely allied to ISO/IEC 27002:2005 (which used to be known as ISO17799), this standard (sometimes called the ISMS standard) can help organizations meet all their information-related regulatory compliance objectives and can help them prepare and position themselves for new and emerging regulations. Information is the lifeblood of modern organizations and, therefore, ensuring that information is simultaneously protected and available to those who need it is essential to modern business operations. Information systems are not usually designed from the outset to be secure. Technical security measures and checklists are limited in their ability to protect a complete information system. Management systems and procedural controls are essential components of any really secure information system and, to be effective, need careful planning and attention to detail. ISO/IEC 27001 provides the specification for an information security management system and, in the related Code of Practice, ISO/IEC 27002, it draws on the knowledge of a group of experienced information security practitioners in a wide range of significant organizations across more than 40 countries to set out best practice in information security. An ISO27001-compliant system will provide a systematic approach to ensuring the availability, confidentiality and integrity of corporate information. The controls of ISO27001 are based on identifying and combating the entire range of potential risks to the organizations information assets. This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards.

ISO27001 in a Windows® Environment

by Brian Honan

A fundamental title that should be part of every information security practitioner''s technical library!The vast majority of ISO27001 implementations will, to one extent or another, take place in a Windows environment. ISO27001 project managers are not always Microsoft technical experts, but a large number of the ISO27001 controls require a technical implementation. Bridging the gap between non-technical ISO27001 project managers and IT specialists, this book explains what the controls are, and describes how to implement them in a Windows environment, equipping the ISO27001 project manager to succeed with the implementation. MCSEs who have security training (MCSE Security), but who may not understand the ISO27001 approach to selecting and implementing controls, will also benefit from this book. It provides them with the necessary rationale and links their technical understanding of Microsoft information security controls into the international best practice framework for information security. This book should be a core part of the technical library of every MCSE and information security practitioner. If you have a CISSP, CISM, GIAC, or another professional certification, you should read this book. Covering best practice implementation over a wide range of Windows® environments, this second edition is completely up to date for Windows® 7 and Server® 2008. Benefits to business include: * Enable successful implementation Although ISO27001 project managers are seldom Microsoft technical experts, a large number of the ISO27001 Annexe A controls demand a technical implementation. Now, thanks to this book, project managers can finally give a clear explanation to their technical people of what is required under ISO27001. Armed with this guide, a project manager will find it much easier to succeed with implementation of ISO27001 * Help security engineers to understand ISO27001 ISO27001 is the international best practice framework for information security. However, because ISO27001 takes a business risk approach, it is unfamiliar territory to many Microsoft Certified Systems Engineers (MCSEs), even if they already have security training (MCSE Security). With this book, MSCEs can fill a gap in their knowledge and thereby harness their technical understanding of the Microsoft information security controls to drive through implementation of ISO27001 * Improve security and reliability. The purpose of ISO27001 is to ensure the confidentiality, integrity and availability of your business information. By putting suitable controls in place you can achieve these "CIA" goals. In this way you will also make your storage and handling of data more reliable * Take advantage of the tools you already have to hand. Since Microsoft products are so widely used, the technical details in this book are based on the Microsoft Windows® platform. This book shows IT managers how to make effective use of the Microsoft technologies at their disposal to support implementation of ISO27001. As a result, your organisation should be able to achieve certification without having to buy additional third-party software. Security improvements from MicrosoftMicrosoft''s latest desktop operating system, Windows® 7, comes with many security improvements. You can use these to help you to develop an ISMS that complies with ISO27001. One of these features is BitLocker, an encrypting system that allows you to encrypt individual files and folders. You can also encrypt the entire contents of a computer''s hard disk to make the data stored on it unavailable to unauthorised personnel. BitLocker To Go enables you to transport information securely from one system to another using portable devices such as a USB. Another feature of Windows 7, AppLocker, will allow your organisation to restrict the applications available to a user on a desktop. By preventing improper use of key applications by your staff, AppLocker can help your organisation to reduce security risks. This guide provides the IT manager with a detailed breakdown of the various controls requir...

ISUW 2021: Proceedings of the 7th International Conference and Exhibition on Smart Energy and Smart Mobility for Smart Cities (Lecture Notes in Electrical Engineering #843)

by Reji Kumar Pillai B. P. Singh N. Murugesan

This book presents selected articles from INDIA SMART UTILTY WEEK (ISUW 2021), which is the seventh edition of the Conference cum Exhibition on Smart Grids and Smart Cities, organized by India Smart Grid Forum from 02-05 March 2021, in New Delhi, India. ISGF is a public private partnership initiative of the Ministry of Power, Govt. of India with the mandate of accelerating smart grid deployments across the country. This book gives current scenario updates of Indian power sector business. It also highlights various disruptive technologies for power sector business.

IT Applications for Sustainable Living (SpringerBriefs in Applied Sciences and Technology)

by Andreas Öchsner Muhamad Husaini Abu Bakar Tajul Adli Abdul Razak

The Internet of Things (IoT) has emerged as a new paradigm that connects the physical world with the digital world. It is a network of interconnected devices, sensors, and objects that can communicate with each other, collect and exchange data, and perform various tasks without human intervention. The IoT has the potential to revolutionize various industries, such as healthcare, transportation, manufacturing, and agriculture, by enabling real-time monitoring, automation, and optimization of processes. This book is a collection of research manuscripts that explores the latest developments in smart technologies for sustainable living with reference to the IoT landscape, including its architecture, applications and challenges. The research covers a wide range of topics including character segmentation, recognition and classification, deep learning, smart home, earthquake early-warning system, wireless sensor network, embedded RFID system and many more. It also discusses various IoT platforms, protocols, and standards that are being developed to enable seamless integration and interoperability of IoT devices and services. The research book aims to become a valuable resource for researchers, practitioners, and policymakers interested in smart technologies and sustainable living.

IT Architecture For Dummies

by Kalani Kirk Hausman Susan L. Cook

A solid introduction to the practices, plans, and skills required for developing a smart system architecture Information architecture combines IT skills with business skills in order to align the IT structure of an organization with the mission, goals, and objectives of its business. This friendly introduction to IT architecture walks you through the myriad issues and complex decisions that many organizations face when setting up IT systems to work in sync with business procedures. Veteran IT professional and author Kirk Hausman explains the business value behind IT architecture and provides you with an action plan for implementing IT architecture procedures in an organization. You'll explore the many challenges that organizations face as they attempt to use technology to enhance their business's productivity so that you can gain a solid understanding of the elements that are required to plan and create an architecture that meets specific business goals. Defines IT architecture as a blend of IT skills and business skills that focuses on business optimization, business architecture, performance management, and organizational structure Uncovers and examines every topic within IT architecture including network, system, data, services, application, and more Addresses the challenges that organizations face when attempting to use information technology to enable profitability and business continuity While companies look to technology more than ever to enhance productivity, you should look to IT Architecture For Dummies for guidance in this field.

IT Asset Management A Pocket Survival Guide

by Martyn Hobbs

IT Asset Management: A Pocket Survival Guideis a quick reference style guide, addressing such serious issues with a fresh and pragmatic approach. Aimed at IT professionals who have been tasked with putting in place Asset Management disciplines, it first provides a commonsense introduction to the key processes outlined in the Information Technology Infrastructure Library (ITIL(r)), before proceeding to explain the various milestones of an Asset Management projec

IT Audit Field Manual: Strengthen your cyber defense through proactive IT auditing

by Lewis Heuermann

Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manualKey FeaturesSecure and audit endpoints in Windows environments for robust defenseGain practical skills in auditing Linux systems, focusing on security configurations and firewall auditing using tools such as ufw and iptablesCultivate a mindset of continuous learning and development for long-term career successPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAs cyber threats evolve and regulations tighten, IT professionals struggle to maintain effective auditing practices and ensure robust cybersecurity across complex systems. Drawing from over a decade of submarine military service and extensive cybersecurity experience, Lewis offers a unique blend of technical expertise and field-tested insights in this comprehensive field manual. Serving as a roadmap for beginners as well as experienced professionals, this manual guides you from foundational concepts and audit planning to in-depth explorations of auditing various IT systems and networks, including Cisco devices, next-generation firewalls, cloud environments, endpoint security, and Linux systems. You’ll develop practical skills in assessing security configurations, conducting risk assessments, and ensuring compliance with privacy regulations. This book also covers data protection, reporting, remediation, advanced auditing techniques, and emerging trends. Complete with insightful guidance on building a successful career in IT auditing, by the end of this book, you’ll be equipped with the tools to navigate the complex landscape of cybersecurity and compliance, bridging the gap between technical expertise and practical application.What you will learnEvaluate cybersecurity across AWS, Azure, and Google Cloud with IT auditing principlesConduct comprehensive risk assessments to identify vulnerabilities in IT systemsExplore IT auditing careers, roles, and essential knowledge for professional growthAssess the effectiveness of security controls in mitigating cyber risksAudit for compliance with GDPR, HIPAA, SOX, and other standardsExplore auditing tools for security evaluations of network devices and IT componentsWho this book is forThe IT Audit Field Manual is for both aspiring and early-career IT professionals seeking a comprehensive introduction to IT auditing. If you have a basic understanding of IT concepts and wish to develop practical skills in auditing diverse systems and networks, this book is for you. Beginners will benefit from the clear explanations of foundational principles, terminology, and audit processes, while those looking to deepen their expertise will find valuable insights throughout.

IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

by Dimitris N. Chorafas

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board's audit committee and CEO. Written as a contribution to the accounting and auditing professions

IT Auditing: The Practitioner's Guide to Reliable Information Automation

by Jerald Savin

More than ever, technology is indispensable to business operations and recordkeeping, so people skilled in computer automation — IT auditors — have become an essential part of the financial audit team.This book is a comprehensive guide to the IT audit discipline, and to the impact of abstraction on businesses. Developments including Robotic Process Automation (RPA) and artificial intelligence (AI) mean that businesses are moving from a physical world to an abstracted digital world, increasing reliance on systems, their design, their implementation and on those that oversee and maintain these systems — often parties outside the businesses’ control. Though the implications of these shifts go far beyond IT auditing, this book focuses on what IT auditors need to know in this new environment, such as:• How to understand abstracted services and appropriate internal business controls• How to evaluate situations where physicality has been replaced by abstracted services• How to understand and adapt to the impact of abstracted services on objectives, operations, decision-making, and Risk Management, including changing risk profiles and introducing new risks.In the wake of the Certified Public Accountant (CPA) Evolution project, this book will be an essential resource for readers seeking CPA certification, as well as for business leaders and Risk Management professionals who need to understand the benefits and challenges of ever-increasing automation and its concurrent abstraction of physical reality.

IT Auditing: Using Controls to Protect Information Assets

by Chris Davis Mike Kegerreis Mike Schiller

Secure Your Systems Using the Latest IT Auditing Techniques <p><p>Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included. This comprehensive guide describes how to assemble an effective IT audit team and maximize the value of the IT audit function. In-depth details on performing specific audits are accompanied by real-world examples, ready-to-use checklists, and valuable templates. Standards, frameworks, regulations, and risk management techniques are also covered in this definitive resource.

IT Best Practices: Management, Teams, Quality, Performance, and Projects

by Tom C. Witt

Consistent success does not happen by chance. It occurs by having an understanding of what is happening in the environment and then having the skills to execute the necessary changes. Ideal for project, IT, and systems development managers, IT Best Practices: Management, Teams, Quality, Performance, and Projects details the skills, knowledge, and a

IT Controlling: From IT cost and activity allocation to smart controlling

by Andreas Gadatsch

IT controlling is established as a tool for controlling information technology. The job description of the IT controller has changed only moderately over a long period of time. It was mainly associated with IT budgeting, IT portfolio management, IT cost planning, accounting and controlling. However, digitalization has brought movement in goals, contents and methods. New topics such as digital strategy management, cloud controlling, data science, etc. are being discussed. The task profile is changing away from pure IT cost analysis to the management of the digitization strategy with a focus on strategic IT portfolio management. Some voices are already talking about "smart controlling" or "digital controlling". This book presents an IT controlling concept for the digital age and explains the relevant methods in a practical way.

IT Convergence and Security 2012

by Kuinam J. Kim Kyung-Yong Chung

The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

IT Convergence and Security: Proceedings of ICITCS 2020 (Lecture Notes in Electrical Engineering #712)

by Kuinam J. Kim Hyuncheol Kim

This volume comprises the proceedings of ICITCS 2020. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security is core to most current research, industrial and commercial activities. Topics covered in this volume include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, healthcare and wellness, web technology and applications, internet of things, and security & privacy. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book will be of use to researchers in academia, industry and other research institutes focusing on IT convergence and security.

IT Convergence and Security: Proceedings of ICITCS 2021 (Lecture Notes in Electrical Engineering #782)

by Kuinam J. Kim Hyuncheol Kim

This book comprises the proceedings of ICITCS 2021. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security are core to most current research, industrial, and commercial activities. Topics covered in this book include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, health care and wellness, web technology and applications, Internet of things, and security & privacy. Through this book, readers gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book is of use to researchers in academia, industry, and other research institutes focusing on IT convergence and security.

IT Convergence and Services

by James J. Park Hamid Arabnia Hang-Bae Chang Taeshik Shon

IT Convergence and Services is proceedings of the 3rd FTRA International Conference on Information Technology Convergence and Services (ITCS-11) and the FTRA International Conference on Intelligent Robotics, Automations, telecommunication facilities, and applications (IRoA-11). The topics of ITCS and IRoA cover the current hot topics satisfying the world-wide ever-changing needs. The ITCS-11 will be the most comprehensive conference focused on the various aspects of advances in information technology convergence, applications, and services. The ITCS-11 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of ITCS. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and practical applications in ITCS. The main scope of ITCS-11 is as follows. Computational Science and Applications Electrical and Electronics Engineering and Technology Manufacturing Technology and Services Management Information Systems and Services Electronic Commerce, Business and Management Vehicular Systems and Communications Bio-inspired Computing and Applications IT Medical Engineering Modeling and Services for Intelligent Building, Town, and City The IRoA is a major forum for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of intelligent robotics and automations. The main scope of IRoA-11 is as follows. Intelligent Robotics & Perception systems Automations & Control Telecommunication Facilities Artificial Intelligence The IRoA is a major forum for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of intelligent robotics and automations. The main scope of IRoA-11 is as follows. Intelligent Robotics & Perception systems Automations & Control Telecommunication Facilities Artificial Intelligence

IT Crisisology Casebook: Smart Digitalization for Sustainable Development (Smart Innovation, Systems and Technologies #300)

by Sergey V. Zykov

The book focuses on the real-world case-based crisis management in digital product development. This includes forecasting, responding, and agile engineering/management methods, patterns, and practices for sustainable development. This book introduces a set of case studies for sustainability in management as a blend, the components of which have been carefully selected from a few domains adjacent to digital production such as IT-intensive operation, human resource management, and knowledge engineering, to name a few. The key ingredients of this crisis management framework include information management, tradeoff optimization, agile product development, and knowledge transfer. The case studies this book features will help the stakeholders in understanding and identifying the key technology, business, and human factors that may likely result in a digital production crisis, i.e., critically affect the organization outcomes in terms of successful digitalization and sustainable development. These factors are particularly important for the large-scale applications, typically considered very complex in managerial and technological aspects, and, therefore, specifically addressed by the discipline of IT crisisology.

IT Crisisology Models: Object-Based Optimization for Sustainable Development (Smart Innovation, Systems and Technologies #381)

by Sergey V. Zykov

The book focuses on modeling real-world crisis management in digital product development. This includes models and methods for forecasting, responding, and agile engineering/managing for sustainable product development. This book suggests an approach that contains principles, formal models, and semi-formal practice-oriented methods, patterns and techniques to efficiently manage these crises and provide sustainable development. The book also introduces a set of principles, models, and methods for sustainable management as a blend, the components of which have been carefully selected from a few domains adjacent to digital production such as IT-intensive operation, human resource management, and knowledge engineering, to name a few. The key ingredients of this crisis management framework include smart data modeling, trade-off optimizing, agile product controlling, and knowledge transferring.

IT Crisisology: Models, Methods, Patterns, Practices, Case Studies (Smart Innovation, Systems and Technologies #210)

by Sergey V. Zykov

This book focuses on crisis management in software development which includes forecasting, responding and adaptive engineering models, methods, patterns and practices. It helps the stakeholders in understanding and identifying the key technology, business and human factors that may result in a software production crisis. These factors are particularly important for the enterprise-scale applications, typically considered very complex in managerial and technological aspects and therefore, specifically addressed by the discipline of software engineering. Therefore, this book throws light on the crisis responsive, resilient methodologies and practices; therewith, it also focuses on their evolutionary changes and the resulting benefits.

IT Development in Korea: A Broadband Nirvana? (Routledge Advances in Korean Studies)

by Kwang-Suk Lee

This book investigates the contextual factors that led to Korean society becoming ‘broadband heaven’ — the most wired nation in the world — by scrutinizing the historical contexts surrounding the Korean Information Infrastructure (KII) project (1995–2005), which aimed to establish a nationwide high-speed backbone network, as well as its later evolution, which involved redesigning the public infrastructure. The book details the hidden mechanisms and the real elements of building the ‘broadband heaven’: the global constraints conditioning its telecom policies, the dense state–capital linkages, and the bureaucratic desire for social control. It draws on the state-in-society approach to analyze the deformations caused by the symbiosis between the state and big business in implementing the rosy vision of the broadband network. This book provides insights into how to formulate future telecom policies along much more democratically participatory lines while restraining the overwhelming power of the telecom oligopolies and conglomerates. It stands alone as a comprehensive study of the recent East Asian model of IT development, written specifically to examine Korea’s socio-historical mechanisms for promoting physical speed and broadband mobility. This book will be important reading to anyone interested in Korean Studies, Information Technology and I.T. Development.

IT Disaster Recovery Planning For Dummies

by Peter H. Gregory Philip Jan Rothstein

If you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off. After all, where do you start?IT Disaster Recovery Planning For Dummies shows you how to get started by creating a safety net while you work out the details of your major plan. The right plan will get your business back on track quickly, whether you're hit by a tornado or a disgruntled employee with super hacking powers. Here's how to assess the situation, develop both short-term and long-term plans, and keep your plans updated.This easy-to-understand guide will help youPrepare your systems, processes, and people for an organized response to disaster when it strikesIdentify critical IT systems and develop a long-range strategySelect and train your disaster recovery teamConduct a Business Impact AnalysisDetermine risks to your business from natural or human-made causesGet management supportCreate appropriate plan documentsTest your planSome disasters get coverage on CNN, and some just create headaches for the affected organization. With IT Disaster Recovery Planning For Dummies, you'll be prepared for anything from hackers to hurricanes!

IT Disaster Response

by Greg D. Moore

Learn how to develop solutions to handle disasters both large and small. Real-world scenarios illustrate the importance of disaster response (DR) planning.IT Disaster Response takes a different approach to IT disaster response plans. Rather than focusing on details such as what hardware you should buy or what software you need to have in place, the book focuses on the management of a disaster and various management and communication tools you can use before and during a disaster.This book examines disasters in general—a compilation of lessons the author learned over the course of years working in IT, reviewing plane crashes, and his experiences as a cave rescuer and cave rescue instructor. Although at first it may seem that none of these are really related, the truth is they all have elements in common. In each case, the unexpected has happened. Just as not all plane crashes are deadly, not all IT mishaps have terrible consequences. With the proper training and approach, many problems can either be avoided in the first place or better handled if they do arise.The book contains practical guidance on:How to think about a disaster both before it happens and while it’s happeningHow to apply management skills used in other fields during disastersHow to get everyone on board when it comes to planning for and handling disastersHow to better deal with smaller, more manageable—and more frequently occurring—disastersWhat you’ll learn Discover the difference between a DR solution and a DR planDefine a disaster — it’s not always of the scale of a fire burning down the building.See when to actually implement your DR plan Who This Book Is ForIT professionals in charge of developing their company’s disaster recovery plan who also need to raise issues to the required C-level people to make sure they have a viable plan.

IT Enabled Services

by Shiro Uesugi

As the global economy turns more and more service oriented, Information Technology-Enabled Services (ITeS) require greater understanding. Increasing numbers and varieties of services are provided through IT. Furthermore, IT enables the creation of new services in diverse fields previously untouched. Because of the catalyzing nature of internet technology, ITeS today has become more than "Outsourcing" of services. This book illustrates the enabling nature of ITeS with its entailment of IT, thus contributing to the betterment of humanity. The scope of this book is not only for academia but also for business persons, government practitioners and readers from daily lives. Authors from a variety of nations and regions with various backgrounds provide insightful theories, research, findings and practices in various fields such as commerce, finance, medical services, government and education. This book opens up a new horizon with the application of Internet-based practices in business, government and in daily lives. Information Technology-Enabled Services works as a navigator for those who sail to the new horizon of service oriented economies.

Refine Search

Showing 28,376 through 28,400 of 63,684 results