Skip to main content

Books in Information systems general

31-40 of 45 results in All results

Collaborative Enterprise Architecture

  • 1st Edition
  • August 29, 2012
  • Stefan Bente + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 5 9 3 4 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 5 9 8 9 - 1
Ever-changing business needs have prompted large companies to rethink their enterprise IT. Today, businesses must allow interaction with their customers, partners, and employees at more touch points and at a depth never thought previously. At the same time, rapid advances in information technologies, like business digitization, cloud computing, and Web 2.0, demand fundamental changes in the enterprises’ management practices. These changes have a drastic effect not only on IT and business, but also on policies, processes, and people. Many companies therefore embark on enterprise-wide transformation initiatives. The role of Enterprise Architecture (EA) is to architect and supervise this transformational journey.Unfortunately, today’s EA is often a ponderous and detached exercise, with most of the EA initiatives failing to create visible impact. The enterprises need an EA that is agile and responsive to business dynamics. Collaborative Enterprise Architecture provides the innovative solutions today’s enterprises require, informed by real-world experiences and experts’ insights. This book, in its first part, provides a systematic compendium of the current best practices in EA, analyzes current ways of doing EA, and identifies its constraints and shortcomings. In the second part, it leaves the beaten tracks of EA by introducing Lean, Agile, and Enterprise 2.0 concepts to the traditional EA methods. This blended approach to EA focuses on practical aspects, with recommendations derived from real-world experiences. A truly thought provoking and pragmatic guide to manage EA, Collaborative Enterprise Architecture effectively merges the long-term oriented top-down approach with pragmatic bottom-up thinking, and that way offers real solutions to businesses undergoing enterprise-wide change.

Penetration Tester's Open Source Toolkit

  • 3rd Edition
  • August 25, 2011
  • Jeremy Faircloth
  • English
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 2 8 - 5
Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the student for each situation. This edition offers instruction on how and in which situations the penetration tester can best use them. Real-life scenarios support and expand upon explanations throughout. It also presents core technologies for each type of testing and the best tools for the job. The book consists of 10 chapters that covers a wide range of topics such as reconnaissance; scanning and enumeration; client-side attacks and human weaknesses; hacking database services; Web server and Web application testing; enterprise application testing; wireless penetrating testing; and building penetration test labs. The chapters also include case studies where the tools that are discussed are applied. New to this edition: enterprise application testing, client-side attacks and updates on Metasploit and Backtrack. This book is for people who are interested in penetration testing or professionals engaged in penetration testing. Those working in the areas of database, network, system, or application administration, as well as architects, can gain insights into how penetration testers perform testing in their specific areas of expertise and learn what to expect from a penetration test. This book can also serve as a reference for security or audit professionals.

The Basics of Information Security

  • 1st Edition
  • June 10, 2011
  • Jason Andress
  • English
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 5 4 - 4
The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use. The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom. This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field.

Cybercrime and Espionage

  • 1st Edition
  • January 7, 2011
  • Will Gragido + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 6 1 3 - 1
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 1 4 - 8
Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.

Securing the Smart Grid

  • 1st Edition
  • September 23, 2010
  • Tony Flick + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 5 7 0 - 7
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 5 7 1 - 4
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised. This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices.

Ninja Hacking

  • 1st Edition
  • September 23, 2010
  • Thomas Wilhelm + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 5 8 8 - 2
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 5 8 9 - 9
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.

On the Development of China's Information Technology Industry

  • 1st Edition
  • November 13, 2009
  • Jiang Zemin
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 8 1 3 6 9 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 1 3 7 0 - 1
In the early 1980’s, Jiang Zemin, then Minister of Electronics Ministry of China, assessed the IT industry as ‘the strategic high ground in international competition.’ He "perceived the discrepancy between China’s level and the world's advanced level was so great that we had to do our utmost to catch up." Since then through numerous articles and frequent speeches he has drawn up a detailed technological and policy roadmap for doing exactly that. This volume collects over 25 pieces written over more than 20 years. It demonstrates the former president of China’s authority and insight into the development of China’s IT industry since the introduction of reforms, and the cutting-edge issues experienced throughout the global IT industry. Jiang’s ambitious goal is the transformation of China into a leader in the global IT industry by 2020. This volume offers IT industry analysts, China watchers, policy makers and advisors, IT researchers, and investors a singular and authoritative view on how China should get there.

Systems Engineering in Public Administration

  • 1st Edition
  • Volume 36
  • November 3, 1993
  • H.E.G. Bonin
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 8 4 4 - 3
The complexity of large systems in public administration progresses in terms of both quality and quantity year after year. Mastering complex systems is therefore assuming an increasing dominance in this area. Learning to master evolving systems needs at least a foundation in science and engineering know-how. The relationship between the professionals, such as system engineers viewing from the outside and the beneficiaries, such as public administration officials using the computer systems on the inside is therefore of prime importance if the many problems are to be solved.This book does not attempt to provide definitive answers but rather aims to give shape to our visions and ideas and to stimulate further discussion and research.

Information System Development Process

  • 1st Edition
  • Volume 30
  • August 2, 1993
  • N. Prakash + 2 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 8 4 8 - 1
This volume aims to pave the way to a greater understanding of the information system development process. Traditionally, information systems have been perceived as a slice of real world history. This has led to a strong emphasis on the development of conceptual models, the requirements specifications of which can readily be expressed. However, the route to such an expression, or the process of development, has not received any substantial attention.It is now agreed that a study of the development process affords notable benefits. Firstly, it helps to create an understanding of what a realistic development process is and how it proceeds from an initial specification to its acceptable representation. Secondly, the nature of guidance that can be provided by the next generation of CASE tools can be substantially improved. It can be expected that these tools will cease to be mere drafting aids and consistency checking programs. Instead it is likely that they will provide a procreative environment in which the development engineer will play an important role. This tool/user symbiosis should have a beneficial impact on both the productivity of the developer and on the quality of the product.In bringing together researchers and practitioners from such diverse areas as AI, Software Engineering, Decision Support and Information Systems, it is hoped this publication will take the quest to comprehend information system development processes a significant step forwards.

Decision Support in Public Administration

  • 1st Edition
  • Volume 26
  • May 5, 1993
  • P.W.G. Bots + 2 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 3 4 3 - 1
The vast flow of information to be considered by policy and decision makers in national and local governments is continuing to expand during the 1990s, whilst budgets for staff to process the information are being tightened. This publication provides a forum for the examination of the problem. It aims to focus the efforts of researchers and practitioners more effectively in applying information technology to increase the performance of decision makers in public administration despite the limited resources. Topics explored include the following: design considerations and approaches for, and practical experiences with, communication and information processing infrastructure and applications at the workplace level; the design and implementation of support systems for individual or group decision making in governmental and municipal settings; modelling and model management techniques, based on case reports of successful and unsuccessful modelling efforts; concepts, approaches and models for re-designing tasks and processes in public administration; issues and challenges in integrating the information systems of several governmental bodies. The book is divided into two parts for the discussion of these themes - the first section deals primarily with theoretical and conceptual issues; the second part contains papers with a stronger emphasis on systems, their functionality and experiences in their development and application. The authors' affiliations (17 organizations from 8 different countries) indicates the international nature of the contributions. The ideas put forward in their papers show that research into supporting decision making in public administration is well on its way but that the research area is vast, with yet many hills to scale.