Skip to main content

Books in It management

    • Business Process Change

      • 4th Edition
      • February 28, 2019
      • Paul Harmon
      • English
      • Paperback
        9 7 8 0 1 2 8 1 5 8 4 7 0
      • eBook
        9 7 8 0 1 2 8 1 5 8 4 8 7
      Business Process Change: A Business Process Management Guide for Managers and Process Professionals, Fourth Edition, provides a balanced view of the field of business process change. Bestselling author and renowned expert in the field Paul Harmon offers concepts, methods, cases for all aspects, and phases of successful business process improvement. Students and professionals alike will benefit from the comprehensive coverage and customizable, integrated approach to broad business process management that focuses on improving efficiency and productivity. In this updated Edition, particular attention is paid to the impact of disruptive technology on business and the need for agile transformation.
    • RIoT Control

      • 1st Edition
      • September 15, 2016
      • Tyson Macaulay
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 7 1 2
      • eBook
        9 7 8 0 1 2 4 1 9 9 9 0 3
      RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
    • Green Information Technology

      • 1st Edition
      • March 3, 2015
      • Mohammad Dastbaz + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 7 9 3
      • eBook
        9 7 8 0 1 2 8 0 1 6 7 1 8
      We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres) currently use 7 giga watts of electricity during peak loads. This translates into about 61 billion kilowatt hours of electricity used. By the EPA’s estimates, power-hungry data centres consume the annual output of 15 average-sized power plants. One of the top constraints to increasing computing power, besides the ability to cool, is simply delivering enough power to a given physical space. Green Information Technology: A Sustainable Approach offers in a single volume a broad collection of practical techniques and methodologies for designing, building and implementing a green technology strategy in any large enterprise environment, which up until now has been scattered in difficult-to-find scholarly resources. Included here is the latest information on emerging technologies and their environmental impact, how to effectively measure sustainability, discussions on sustainable hardware and software design, as well as how to use big data and cloud computing to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Written by recognized experts in both academia and industry, Green Information Technology: A Sustainable Approach is a must-have guide for researchers, computer architects, computer engineers and IT professionals with an interest in greater efficiency with less environmental impact.
    • IT Perspectives Conference

      • 1st Edition
      • May 23, 2014
      • Sam Stuart
      • English
      • Paperback
        9 7 8 1 8 5 3 8 4 0 0 8 1
      • eBook
        9 7 8 1 4 8 3 1 4 2 1 3 5
      IT Perspectives Conference is a documentation of the top-level conference sponsored by the publishers of Computer Weekly, which aims to examine the issues that concern computer professionals and to provide at least some of the answers while indicating the directions which IT may be expected to take moving on to the 1990s. Leading figures from the IT industry and from major computer users show how they are tackling the transition from the limited task based approach of traditional computing to the more wide-ranging strategic issues implicit in the concept of information as a resource to be managed, used competitively, and even sold. In looking towards a future characterized by transaction-oriented systems, online databases, and distributed processing, the significance of tools such as fourth generation languages and computer-assisted software engineering is described and the vital role of communications at all levels from local area networks to the development of international standards is examined. This book will be useful to anyone wishing to discern the main trends in IT development and computer systems implementation as they set out to develop the systems of the 1990s.
    • Campus Strategies for Libraries and Electronic Information

      • 1st Edition
      • June 28, 2014
      • Caroline Arms
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 8 0 3
      • eBook
        9 7 8 1 4 8 3 2 9 4 4 8 3
      A look at how ten American colleges and Universities bridged the gap between computing, administrative, and library organisationsDetaile... case studies from ten American colleges and universities will prepare you to make better plans and decisions for an electronic library, integrated information management system, or unified information resource. You'll find models and guidelines covering reference services, latest philosophies and strategies, management and organization issues, delivery mechanisms, and more.
    • PCI Compliance

      • 4th Edition
      • October 29, 2014
      • Branden R. Williams + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 7 9 7
      • eBook
        9 7 8 0 1 2 8 0 1 6 5 1 0
      Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifia... information.
    • Windows Forensic Analysis Toolkit

      • 4th Edition
      • March 11, 2014
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 1 5 7 2
      • eBook
        9 7 8 0 1 2 4 1 7 1 7 4 9
      Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting.
    • Windows Performance Analysis Field Guide

      • 1st Edition
      • August 12, 2014
      • Clint Huffman
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 7 0 1 8
      • eBook
        9 7 8 0 1 2 4 1 6 7 0 4 9
      Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems.
    • Securing VoIP

      • 1st Edition
      • November 14, 2014
      • Regis J. Jr (Bud) Bates
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 3 9 1
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 2 0
      Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
    • Eleventh Hour CISSP

      • 2nd Edition
      • October 16, 2013
      • Joshua Feldman + 2 more
      • English
      • eBook
        9 7 8 0 1 2 4 1 7 1 4 5 9
      Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All 10 domains are covered as completely and as concisely as possible, giving you the best possible chance of acing the exam.