Skip to main content

Books in Management information systems

41-50 of 65 results in All results

IM Instant Messaging Security

  • 1st Edition
  • June 15, 2005
  • John Rittinghouse PhD CISM + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 6 0 7 2 - 7
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today’s corporate environment.

Innovation Happens Elsewhere

  • 1st Edition
  • April 11, 2005
  • Ron Goldman + 2 more
  • English
  • Hardback
    9 7 8 - 1 - 5 5 8 6 0 - 8 8 9 - 4
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 4 6 7 - 1
It's a plain fact: regardless of how smart, creative, and innovative your organization is, there are more smart, creative, and innovative people outside your organization than inside. Open source offers the possibility of bringing more innovation into your business by building a creative community that reaches beyond the barriers of the business. The key is developing a web-driven community where new types of collaboration and creativity can flourish. Since 1998 Ron Goldman and Richard Gabriel have been helping groups at Sun Microsystems understand open source and advising them on how to build successful communities around open source projects. In this book the authors present lessons learned from their own experiences with open source, as well as those from other well-known projects such as Linux, Apache, and Mozilla.

Strategies for Growth in SMEs

  • 1st Edition
  • November 9, 2004
  • Margi Levy + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 1 6 - 6
Strategies for Growth in SMEs explores for the first time the role of information and information systems (IS) concepts in small and medium-sized enterprises (SMEs). Most IS research focuses on large firms, yet the majority of firms in most economies are SMEs. The book considers the applicability of IS theory and practice to SMEs and develops new theories that are relevant to these firms.Composed of 6 sections, it covers, amongst other things; the nature of SMEs, the background to IS, and SMEs' use of IS, issues of IS strategy and planning in SMEs, the way that firms can transform through use of IS, evaluation, IS flexibility, business process re-engineering, resource-based strategy and knowledge management, the appropriateness of existing theories and the development of new models to address SME-specific issues. The final section of the book reviews the learning in the previous chapters and poses future agendas for research.Written by two of the leading figures in the field, this book will be essential reading for researchers in IS and SMEs, students on entrepreneurship or IS courses, and others that focus on SMEs.

Physical Security for IT

  • 1st Edition
  • November 8, 2004
  • Michael Erbschloe
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 5 9 0 - 3
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets.

Value Creation from E-Business Models

  • 1st Edition
  • August 21, 2004
  • Wendy Currie
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 5 6 - 2
Value Creation from E-Business Models provides a thorough analysis of what constitutes an e-business model. Unlike many e-business books available, this text draws together theoretical and empirical contributions from leading academic scholars in the field of management information systems. Divided into four parts, E-Business Models and Taxonomies; E-Business Markets; E-Business Customer Performance Measurement; and E-Business Vendor Applications and Services, this book is the critical dissection of E-Business that today's academic community needs.

Resilient Storage Networks

  • 1st Edition
  • April 7, 2004
  • Greg Schulz
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 2 2 5 - 4
A resilient storage network is an environment where data is always available for the needs of the business. This book explains the components, as well as how to design and implement a resilient storage network for workgroup, departmental, and enterprise environments. Storage networks are an enabling capability combining technology and best practices to provide the foundation to support information technology systems and applications. Storage networks can be of various sizes, shapes, and technologies. This book shows you how to implement a resilient storage network infrastructure using different technologies including ATM, DWDM, FCIP, Fibre Channel, FICON, iFCP, InfiniBand, IP, iSCSI, Life Cycle Management, NAS, Object Based Storage, RAID, RDMA, Remote Mirroring, Replication, SAN, SCSI, SMI-S, SONET/SDH, Storage Services, Tape, Virtualization, and Volume Managers.

Web Services

  • 1st Edition
  • March 15, 2004
  • Anura Guruge
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 2 0 9 5 - 7
This is a soup-to-nuts reference guide on all aspects of Web Services - where Web Services is a fast emerging set of Internet-specific middleware technology to further promote the growth of all aspects of e-business via standardization, collaboration and "franchising." This book is best characterized as an executive brief for IT and senior management rather than a nuts-and-bolts technical guide for portal implementers. Think of it as the "Cliffs Notes on Web Services." Given this audience, the book consistently focuses on business needs, value propositions, ROI, proven solutions and actual examples of current implementations. Each chapter also ends with a 10-item "Q&A" section that consolidates and summarizes the information discussed in the chapter. The book is illustrated with detailed technical diagrams, includes lots of arresting subtitles and contains many bullet lists and tables to facilitate (and encourage) productive skimming.Decision makers - the intended readership for this book - gain increasing comfort and confidence as they get into the book that they are getting to see all facets of the issues, on a consistent basis, and that they will not be blind-sided at meetings by people asking 'difficult' questions. At the end of each chapter, Guruge summarizes and reinforces key points, allowing the reader to skim through the topics for crucial information. The book also leverages living outside resources and ensures that the readership always has ready and consistent access to any and all terms, definitions and concepts they might not be familiar with.

Integrating Wireless Technology in the Enterprise

  • 1st Edition
  • November 21, 2003
  • William Wheeler
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 5 5 - 5
Integrating Wireless Devices in the Enterprise provides a solution that every enterprise can use, described in terms of scope, feasibility and return on investment, architecture, and data structures. The solution Wheeler offers here is scalable from a single handheld and single desktop to small workgroup to large enterprise environments. The number of devices is not a determinant of success or failure. It's more often the planning and managing of them that's crucial. This book also provides tools to deal with the increase of devices, and the corresponding complexity of managing those resources and the increase in cost to the firm.

RAPID Value Management for the Business Cost of Ownership

  • 1st Edition
  • September 22, 2003
  • Andrew Wigodsky
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 2 2 2 - 3
The model presented in this manual for the IT professional helps managers work with tech workers and their customers to make a clear and well-substantiated argument for IT service investments. In order to validate and fully explain this model, Wigodsky presents an overview of the "why" behind technology investment for any organization, and combines this with detailed real-world solutions that maximize BCO efficiency. By eliminating the "futz factor" commonly associated with system ownership costs, the book provides a glimpse of the next generation IT architecture, a repeatable process for identifying organization-wide system costs, and a customizable model for integrating BCO management with your people, processes, and technology.

Semantics in Business Systems

  • 1st Edition
  • September 10, 2003
  • Dave McComb
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 8 1 2 - 6
Semantics in Business Systems begins with a description of what semantics are and how they affect business systems. It examines four main aspects of the application of semantics to systems, specifically: How do we infer meaning from unstructured information, how do application systems make meaning as they operate, how do practitioners uncover meaning in business settings, and how do we understand and communicate what we have deduced? This book illustrates how this applies to the future of application system development, especially how it informs and affects Web services and business rule- based approaches, and how semantics will play out with XML and the semantic Web. The book also contains a quick reference guide to related terms and technologies. It is part of Morgan Kaufmann's series of Savvy Manager's Guides.

Related subjects