Listing 1 - 10 of 52 | << page >> |
Sort by
|
Choose an application
The purpose of this book is to answer the questions that all responsible managers are asking or will ask on the subject of information security. There are few managers with first hand experience of serious attacks or catastrophic occurrences with regard to integrated information systems.
Electronic data processing departments --- Security measures.
Choose an application
Choose an application
Do your library and computing center clash or collaborate? Successful collaborations improve service to faculty, students, and researchers. Patrons and librarians alike will have access to a full range of technology. As library instruction blends with software training, you have new partners. Books, Bytes and Bridges: Libraries and Computer Centers in Academic Institutions explores the strategies and working models for developing and maintaining successful partnerships between the two groups critical to providing information access in academic institutions. Larry Hardesty has assembled a team
Choose an application
Learn how to run successful big data projects, how to resource your teams, and how the teams should work with each other to be cost effective. This book introduces the three teams necessary for successful projects, and what each team does. Most organizations fail with big data projects and the failure is almost always blamed on the technologies used. To be successful, organizations need to focus on both technology and management. Making use of data is a team sport. It takes different kinds of people with different skill sets all working together to get things done. In all but the smallest projects, people should be organized into multiple teams to reduce project failure and underperformance. This book focuses on management. A few years ago, there was little to nothing written or talked about on the management of big data projects or teams. Data Teams shows why management failures are at the root of so many project failures and how to proactively prevent such failures with your project. You will: Discover the three teams that you will need to be successful with big data Understand what a data scientist is and what a data science team does Understand what a data engineer is and what a data engineering team does Understand what an operations engineer is and what an operations team does Know how the teams and titles differ and why you need all three teams Recognize the role that the business plays in working with data teams and how the rest of the organization contributes to successful data projects.
Information systems --- gegevensanalyse --- Big data. --- Database management. --- Electronic data processing departments --- Management.
Choose an application
When it comes to computer security, the role of auditors today has never been more crucial. Auditors must ensure that all computers, in particular those dealing with e-business, are secure. The only source for information on the combined areas of computer audit, control, and security, the IT Audit, Control, and Security describes the types of internal controls, security, and integrity procedures that management must build into its automated systems. This very timely book provides auditors with the guidance they need to ensure that their systems are secure from both internal and external threats.
Computer networks --- Computer security --- Electronic data processing departments --- Information technology --- Security measures --- Auditing
Choose an application
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respect
Choose an application
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respect
Choose an application
Coaching for High Performance is intended to inspire IT managers with practical advice and tips on how to create a coaching environment in their department. Applying coaching skills in the IT workplace will help create a climate of high performance.
Employees --- Organizational effectiveness. --- Electronic data processing departments --- Coaching of. --- Personnel management. --- Management. --- coaching. --- high performance. --- leadership. --- professional development. --- soft skills.
Choose an application
The Enterprise Operations Management Handbook provides the expert advice and guidance of hundreds of leading computing practitioners and consultants. Covering all major areas of enterprise operations management, this edition provides essential information for managing a modern, evolving data center. Topics include business issues, technology issues, and operational issues. This current, practical reference also reviews such critical areas as strategic planning, data center management, data center controls, systems planning, network technology, contingency planning, human resource planning, desktop computing, and future directions. The Enterprise Operations Management Handbook serves as an invaluable tool for designing, building, and maintaining a high-performance, service-oriented data center.
Choose an application
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an
Listing 1 - 10 of 52 | << page >> |
Sort by
|