Skip to main content

Books in It management

1-10 of 31 results in All results

Business Process Change

  • 4th Edition
  • February 28, 2019
  • Paul Harmon
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 5 8 4 7 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 5 8 4 8 - 7
Business Process Change: A Business Process Management Guide for Managers and Process Professionals, Fourth Edition, provides a balanced view of the field of business process change. Bestselling author and renowned expert in the field Paul Harmon offers concepts, methods, cases for all aspects, and phases of successful business process improvement. Students and professionals alike will benefit from the comprehensive coverage and customizable, integrated approach to broad business process management that focuses on improving efficiency and productivity. In this updated Edition, particular attention is paid to the impact of disruptive technology on business and the need for agile transformation.

RIoT Control

  • 1st Edition
  • September 15, 2016
  • Tyson Macaulay
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 9 9 7 1 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 9 9 9 0 - 3
RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.

Green Information Technology

  • 1st Edition
  • March 3, 2015
  • Mohammad Dastbaz + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 3 7 9 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 6 7 1 - 8
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres) currently use 7 giga watts of electricity during peak loads. This translates into about 61 billion kilowatt hours of electricity used. By the EPA’s estimates, power-hungry data centres consume the annual output of 15 average-sized power plants. One of the top constraints to increasing computing power, besides the ability to cool, is simply delivering enough power to a given physical space. Green Information Technology: A Sustainable Approach offers in a single volume a broad collection of practical techniques and methodologies for designing, building and implementing a green technology strategy in any large enterprise environment, which up until now has been scattered in difficult-to-find scholarly resources. Included here is the latest information on emerging technologies and their environmental impact, how to effectively measure sustainability, discussions on sustainable hardware and software design, as well as how to use big data and cloud computing to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Written by recognized experts in both academia and industry, Green Information Technology: A Sustainable Approach is a must-have guide for researchers, computer architects, computer engineers and IT professionals with an interest in greater efficiency with less environmental impact.

Securing VoIP

  • 1st Edition
  • November 14, 2014
  • Regis J. Jr (Bud) Bates
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 0 3 9 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 2 2 - 0
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

PCI Compliance

  • 4th Edition
  • October 29, 2014
  • Branden R. Williams + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 5 7 9 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 6 5 1 - 0
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information.

Windows Performance Analysis Field Guide

  • 1st Edition
  • August 12, 2014
  • Clint Huffman
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 7 0 1 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 7 0 4 - 9
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems.

Windows Forensic Analysis Toolkit

  • 4th Edition
  • March 11, 2014
  • Harlan Carvey
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 1 5 7 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 7 4 - 9
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting.

The Basics of IT Audit

  • 1st Edition
  • October 31, 2013
  • Stephen D. Gantz
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 1 5 9 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 7 6 - 3
The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.

Eleventh Hour CISSP

  • 2nd Edition
  • October 16, 2013
  • Joshua Feldman + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 4 5 - 9
Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All 10 domains are covered as completely and as concisely as possible, giving you the best possible chance of acing the exam.

Cyber Warfare

  • 2nd Edition
  • October 1, 2013
  • Jason Andress + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 6 6 7 2 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 6 6 3 3 - 2
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.