Skip to main content

Books in Computers in business

21-30 of 52 results in All results

Security Risk Management

  • 1st Edition
  • April 20, 2011
  • Evan Wheeler
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 6 1 5 - 5
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 1 6 - 2
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the rationale behind these practices. It explains how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive text for managing security risks. This book will help you to break free from the so-called best practices argument by articulating risk exposures in business terms. It includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. It explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. It also presents a roadmap for designing and implementing a security risk management program. This book will be a valuable resource for CISOs, security managers, IT managers, security consultants, IT auditors, security analysts, and students enrolled in information security/assurance college programs.

Entity Resolution and Information Quality

  • 1st Edition
  • December 8, 2010
  • John R. Talburt
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 8 1 9 7 2 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 1 9 7 3 - 4
Entity Resolution and Information Quality presents topics and definitions, and clarifies confusing terminologies regarding entity resolution and information quality. It takes a very wide view of IQ, including its six-domain framework and the skills formed by the International Association for Information and Data Quality {IAIDQ). The book includes chapters that cover the principles of entity resolution and the principles of Information Quality, in addition to their concepts and terminology. It also discusses the Fellegi-Sunter theory of record linkage, the Stanford Entity Resolution Framework, and the Algebraic Model for Entity Resolution, which are the major theoretical models that support Entity Resolution. In relation to this, the book briefly discusses entity-based data integration (EBDI) and its model, which serve as an extension of the Algebraic Model for Entity Resolution. There is also an explanation of how the three commercial ER systems operate and a description of the non-commercial open-source system known as OYSTER. The book concludes by discussing trends in entity resolution research and practice. Students taking IT courses and IT professionals will find this book invaluable.

Agile Development and Business Goals

  • 1st Edition
  • June 4, 2010
  • Bill Holtsnider + 3 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 1 5 2 1 - 7
Agile Development and Business Goals: The Six-Week Solution is a guide for the software development process, which can be challenging, difficult, and time-consuming. This process, called the “Agile” process, is unique, and it features several aspects that distinguish it from the classical methods of software development. The book offers readers information about the design, implementation, and management of the different methods of creating world-class software. The book discusses the various reasons that the development of software is a difficult process, and it addresses how software development sometimes fails and why it seldom aligns with business needs. It further examines the risk associated with software creation and the different ways to mitigate them. This book is relevant to software development managers responsible for creating quality software products, and managing software development teams.

Executing Data Quality Projects

  • 1st Edition
  • July 11, 2008
  • Danette McGilvray
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 3 6 9 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 8 3 9 - 4
Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information (TM) presents a systematic, proven approach to improving and creating data and information quality within the enterprise. Recent studies show that data quality problems are costing businesses billions of dollars each year, with poor data linked to waste and inefficiency, damaged credibility among customers and suppliers, and an organizational inability to make sound decisions. This book describes a Ten Step approach that combines a conceptual framework for understanding information quality with the tools, techniques, and instructions for improving and creating information quality. It includes numerous templates, detailed examples, and practical advice for executing every step of the approach. It allows for quick reference with an easy-to-use format highlighting key concepts and definitions, important checkpoints, communication activities, and best practices. The author's trademarked approach, in which she has trained Fortune 500 clients and hundreds of workshop attendees, applies to all types of data and all types of organizations.

DW 2.0: The Architecture for the Next Generation of Data Warehousing

  • 1st Edition
  • June 25, 2008
  • W.H. Inmon + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 3 1 9 - 0
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 8 3 3 - 2
DW 2.0: The Architecture for the Next Generation of Data Warehousing is the first book on the new generation of data warehouse architecture, DW 2.0, by the father of the data warehouse. The book describes the future of data warehousing that is technologically possible today, at both an architectural level and technology level. The perspective of the book is from the top down: looking at the overall architecture and then delving into the issues underlying the components. This allows people who are building or using a data warehouse to see what lies ahead and determine what new technology to buy, how to plan extensions to the data warehouse, what can be salvaged from the current system, and how to justify the expense at the most practical level. This book gives experienced data warehouse professionals everything they need in order to implement the new generation DW 2.0. It is designed for professionals in the IT organization, including data architects, DBAs, systems design and development professionals, as well as data warehouse and knowledge management professionals.

Sarbanes-Oxley IT Compliance Using Open Source Tools

  • 2nd Edition
  • December 19, 2007
  • Christian B Lahti + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 7 2 7 - 4
The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals, including those affecting Enron, Arthur Andersen, and WorldCom. The law is named after Senator Paul Sarbanes and Representative Michael G. Oxley. It was approved by the House by a vote of 423-3 and by the Senate 99-0. This book illustrates the many Open Source cost-saving opportunities that public companies can explore in their IT enterprise to meet mandatory compliance requirements of the Sarbanes-Oxley act. This book will also demonstrate by example and technical reference both the infrastructure components for Open Source that can be made compliant, and the Open Source tools that can aid in the journey of compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion.The format of the book will begin each chapter with the IT business and executive considerations of Open Source and SOX compliance. The remaining chapter verbiage will include specific examinations of Open Source applications and tools which relate to the given subject matter.

Securing HP NonStop Servers in an Open Systems World

  • 1st Edition
  • August 16, 2006
  • XYPRO Technology XYPRO Technology Corp
  • English
  • Paperback
    9 7 8 - 1 - 5 5 5 5 8 - 3 4 4 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 5 5 7 - 8
Recent corporate events have exposed the frequency and consequences of poor system security implementations and inadequate protection of private information. In a world of increasingly complex computing environments, myriad compliance regulations and the soaring costs of security breaches, it is economically essential for companies to become proactive in implementing effective system and data security measures. This volume is a comprehensive reference for understanding security risks, mitigations and best practices as they apply to the various components of these business-critical computing environments.HP NonStop Servers are used by Financial, Medical, Manufacturing enterprises where there can be no down time. Securing HP NonStop Servers in an Open Systems World: OSS, TCP/IP, and SQL takes a wide angle view of NonStop Server use. This book addresses protection of the Open Systems Services environment, network interfaces including TCP/IP and standard SQL databases. It lays out a roadmap of changes since our first book HP has made to Safeguard, elaborating on the advantages and disadvantages of implementing each new version. Even the security aspects of managing Operating System upgrades are given attention. Auditors, security policy makers, information security administrators and system managers will find the practical information they need for putting security principles into practice to meet industry standards as well as compliance regulations.

Business Continuity and Disaster Recovery for InfoSec Managers

  • 1st Edition
  • September 20, 2005
  • John Rittinghouse PhD CISM + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 2 8 3 3 - 5
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup. James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.

Managing Microsoft's Remote Installation Services

  • 1st Edition
  • July 15, 2005
  • Soren Rasmussen + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 0 4 1 - 3
BRIEF DESCRIPTION OF CONTENT: The authors have been working with Remote Installation Services since its birth in 1999. We are really enthusiastic about working with it. From their experiences from very different customers with very different requirements to their Windows infrastructure environment, they have gained a tremendous deal of experience and in-depth knowledge with Remote Installation Services that other people can benefit from. This includes basic understanding, a lot of theory and best-practices, but also how you can stretch Remote Installation Services to really do what any system or network administrator would require. This information is essential for anyone wishing to implement Remote Installation Services and use the advanced features and tools it contains. There is much more than up grades, adding and deleting programs from a central administrator that can be done In addition it can save the cost adding a costly third party software package like Alteris to the enterprise network. This is the reason that the authors are now gathering all the experience and knowledge, and focusing on forming a single point of entry to everything you must know about Remote Installation Services in form of a book. Note based on my (TRS) and reviewers comments the book will be over 320 pages as authors ad numerous consulting client examples and illustrations UNIQUE FEATURE: Book is excellent companion to Windows and Exchange series and WMI books by Lissoir: Authors are top quality IBM Consultants

IM Instant Messaging Security

  • 1st Edition
  • June 15, 2005
  • John Rittinghouse PhD CISM + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 0 7 2 - 7
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today’s corporate environment.