Narrow your search
Listing 1 - 10 of 33 << page
of 4
>>
Sort by

Book
Second review of a new data management system for the Social Security Administration : a report to the Social Security Administration, Department of Health, Education and Welfare
Authors: --- ---
Year: 1979 Publisher: Washington, D.C. : National Academy of Sciences,


Book
Books, bytes, and bridges
Authors: ---
ISBN: 0838999921 Year: 2001 Publisher: Chicago : ALA Editions,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do your library and computing center clash or collaborate? Successful collaborations improve service to faculty, students, and researchers. Patrons and librarians alike will have access to a full range of technology. As library instruction blends with software training, you have new partners. Books, Bytes and Bridges: Libraries and Computer Centers in Academic Institutions explores the strategies and working models for developing and maintaining successful partnerships between the two groups critical to providing information access in academic institutions. Larry Hardesty has assembled a team


Book
Managing information security
Author:
ISBN: 1299808344 9781299808348 9780124166882 0124166881 0124166946 Year: 2014 Publisher: Amsterdam ; Boston : Elsevier/Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respect


Book
Coaching for high performance
Author:
ISBN: 1628700122 1849281041 1282263528 9786612263521 1849280037 9781849280037 9781628700121 1849280029 9781849280020 9781849280020 9781849281041 9781282263529 6612263520 Year: 2009 Publisher: Ely IT Governance Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Coaching for High Performance is intended to inspire IT managers with practical advice and tips on how to create a coaching environment in their department. Applying coaching skills in the IT workplace will help create a climate of high performance.

Enterprise operations management handbook
Author:
ISBN: 084939824X 1482287811 1280290501 0203997573 0429257201 0849399424 100306938X 9780849398247 9780203997574 9781420052169 1420052160 9781439870754 1439870756 9786610290505 6610290504 9780849399664 0849399661 9781003069386 9780367399368 9781000152746 100015274X 9781000125962 1000125963 9781000109702 1000109704 9780429257209 9781482287813 9781280290503 Year: 2000 Publisher: Boca Raton, Fla. Auerbach

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Enterprise Operations Management Handbook provides the expert advice and guidance of hundreds of leading computing practitioners and consultants. Covering all major areas of enterprise operations management, this edition provides essential information for managing a modern, evolving data center. Topics include business issues, technology issues, and operational issues. This current, practical reference also reviews such critical areas as strategic planning, data center management, data center controls, systems planning, network technology, contingency planning, human resource planning, desktop computing, and future directions. The Enterprise Operations Management Handbook serves as an invaluable tool for designing, building, and maintaining a high-performance, service-oriented data center.

Physical security for IT
Author:
ISBN: 128101494X 9786611014940 0080495907 155558327X 9781555583279 9780080495903 9781281014948 Year: 2005 Publisher: Amsterdam Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an


Book
Building a High Performance Team
Author:
ISBN: 1282384481 9786612384486 1905356811 9781905356812 9781282384484 9781628700091 1628700092 9781849281409 1849281408 1905356803 9781905356805 6612384484 Year: 2009 Publisher: Ely IT Governance Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Building a High-Performance Team is intended to provide IT managers with informative and practical advice and tips on how to create a high-performance team.


Book
IT outsourcing governance : client types and their management strategies
Author:
ISBN: 3834922757 9786613171665 3834963038 128317166X Year: 2010 Publisher: [Wiesbaden, Germany] : Gabler,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The increased complexity and variety of information systems outsourcing poses challenges for the successful management of sourcing projects. Stefanie Leimeister examines different types of IT outsourcing relationships and their governance structures depending on the outsourcing clients’ underlying expectations. Based on a variety of current theories from the fields of information systems, business administration, and social science, she develops a governance model for the successful management of IT outsourcing projects. Following a multi-method approach and also based on a quantitative empirical investigation of German IT leaders and CIOs, she proposes appropriate governance mechanisms for the specific management of each outsourcing client type. The author derives actionable advice for applicable strategies and an effective allocation of resources for an outsourcing venture.


Book
The cloud security ecosystem
Authors: ---
ISBN: 0128015950 0128017805 9780128017807 9780128015957 9780128015957 Year: 2015 Publisher: Waltham, MA

Loading...
Export citation

Choose an application

Bookmark

Abstract

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts


Book
Data governance
Author:
ISBN: 012815831X 0128158328 9780128158326 9780128158319 Year: 2020 Publisher: [Place of publication not identified] Academic Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Managing data continues to grow as a necessity for modern organizations. There are seemingly infinite opportunities for organic growth, reduction of costs, and creation of new products and services. It has become apparent that none of these opportunities can happen smoothly without data governance. The cost of exponential data growth and privacy / security concerns are becoming burdensome. Organizations will encounter unexpected consequences in new sources of risk. The solution to these challenges is also data governance; ensuring balance between risk and opportunity. Data Governance, Second Edition, is for any executive, manager or data professional who needs to understand or implement a data governance program. It is required to ensure consistent, accurate and reliable data across their organization. This book offers an overview of why data governance is needed, how to design, initiate, and execute a program and how to keep the program sustainable. This valuable resource provides comprehensive guidance to beginning professionals, managers or analysts looking to improve their processes, and advanced students in Data Management and related courses. With the provided framework and case studies all professionals in the data governance field will gain key insights into launching successful and money-saving data governance program. Incorporates industry changes, lessons learned and new approaches Explores various ways in which data analysts and managers can ensure consistent, accurate and reliable data across their organizations Includes new case studies which detail real-world situations Explores all of the capabilities an organization must adopt to become data driven Provides guidance on various approaches to data governance, to determine whether an organization should be low profile, central controlled, agile, or traditional Provides guidance on using technology and separating vendor hype from sincere delivery of necessary capabilities Offers readers insights into how their organizations can improve the value of their data, through data quality, data strategy and data literacy Provides up to 75% brand-new content compared to the first edition.

Listing 1 - 10 of 33 << page
of 4
>>
Sort by