Listing 1 - 10 of 33 | << page >> |
Sort by
|
Choose an application
Choose an application
Do your library and computing center clash or collaborate? Successful collaborations improve service to faculty, students, and researchers. Patrons and librarians alike will have access to a full range of technology. As library instruction blends with software training, you have new partners. Books, Bytes and Bridges: Libraries and Computer Centers in Academic Institutions explores the strategies and working models for developing and maintaining successful partnerships between the two groups critical to providing information access in academic institutions. Larry Hardesty has assembled a team
Choose an application
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respect
Choose an application
Coaching for High Performance is intended to inspire IT managers with practical advice and tips on how to create a coaching environment in their department. Applying coaching skills in the IT workplace will help create a climate of high performance.
Employees --- Organizational effectiveness. --- Electronic data processing departments --- Coaching of. --- Personnel management. --- Management. --- coaching. --- high performance. --- leadership. --- professional development. --- soft skills.
Choose an application
The Enterprise Operations Management Handbook provides the expert advice and guidance of hundreds of leading computing practitioners and consultants. Covering all major areas of enterprise operations management, this edition provides essential information for managing a modern, evolving data center. Topics include business issues, technology issues, and operational issues. This current, practical reference also reviews such critical areas as strategic planning, data center management, data center controls, systems planning, network technology, contingency planning, human resource planning, desktop computing, and future directions. The Enterprise Operations Management Handbook serves as an invaluable tool for designing, building, and maintaining a high-performance, service-oriented data center.
Choose an application
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an
Choose an application
Building a High-Performance Team is intended to provide IT managers with informative and practical advice and tips on how to create a high-performance team.
Teams in the workplace --- Electronic data processing departments --- Management. --- communication. --- leadership. --- management techniques. --- management. --- motivation. --- professional development. --- team building. --- team working.
Choose an application
The increased complexity and variety of information systems outsourcing poses challenges for the successful management of sourcing projects. Stefanie Leimeister examines different types of IT outsourcing relationships and their governance structures depending on the outsourcing clients’ underlying expectations. Based on a variety of current theories from the fields of information systems, business administration, and social science, she develops a governance model for the successful management of IT outsourcing projects. Following a multi-method approach and also based on a quantitative empirical investigation of German IT leaders and CIOs, she proposes appropriate governance mechanisms for the specific management of each outsourcing client type. The author derives actionable advice for applicable strategies and an effective allocation of resources for an outsourcing venture.
Contracting out. --- Electronic data processing departments -- Contracting out. --- Information technology -- Management. --- Commerce --- Business & Economics --- Commerce - General --- Information technology --- Electronic data processing departments --- Management. --- Business. --- Information technology. --- Business --- Business and Management. --- IT in Business. --- Data processing. --- Contracting out --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business—Data processing.
Choose an application
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts
Electronic data processing departments --- Electronic data processing --- Internet --- Networking --- Security measures. --- Distributed processing. --- Distributed computer systems in electronic data processing --- Distributed computing --- Distributed processing in electronic data processing --- Computer networks --- Computer department security measures --- Data protection
Choose an application
Managing data continues to grow as a necessity for modern organizations. There are seemingly infinite opportunities for organic growth, reduction of costs, and creation of new products and services. It has become apparent that none of these opportunities can happen smoothly without data governance. The cost of exponential data growth and privacy / security concerns are becoming burdensome. Organizations will encounter unexpected consequences in new sources of risk. The solution to these challenges is also data governance; ensuring balance between risk and opportunity. Data Governance, Second Edition, is for any executive, manager or data professional who needs to understand or implement a data governance program. It is required to ensure consistent, accurate and reliable data across their organization. This book offers an overview of why data governance is needed, how to design, initiate, and execute a program and how to keep the program sustainable. This valuable resource provides comprehensive guidance to beginning professionals, managers or analysts looking to improve their processes, and advanced students in Data Management and related courses. With the provided framework and case studies all professionals in the data governance field will gain key insights into launching successful and money-saving data governance program. Incorporates industry changes, lessons learned and new approaches Explores various ways in which data analysts and managers can ensure consistent, accurate and reliable data across their organizations Includes new case studies which detail real-world situations Explores all of the capabilities an organization must adopt to become data driven Provides guidance on various approaches to data governance, to determine whether an organization should be low profile, central controlled, agile, or traditional Provides guidance on using technology and separating vendor hype from sincere delivery of necessary capabilities Offers readers insights into how their organizations can improve the value of their data, through data quality, data strategy and data literacy Provides up to 75% brand-new content compared to the first edition.
Data protection --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Electronic data processing departments --- Security measures. --- Computer department security measures --- E-books --- Gouvernance des données
Listing 1 - 10 of 33 | << page >> |
Sort by
|