Browse Results

Showing 53,251 through 53,275 of 55,759 results

Microsoft Office 2010: A Case Approach (Introductory Edition)

by Timothy J. O'Leary Linda I. O'Leary

"Timothy and Linda O'Leary and the Computer Information Technology Team at McGraw-Hill Higher Education offer your students a fully integrated learning program with time-tested quality and reliability. Office 2010: A Case Approach offers running case study throughout the text to help students understand the material in a consistent, relevant environment. Through this theme of "Making Office Relevant," this text helps students understand why they need this course and these skills. Updated for Office 2010, student success is assured through clear step-by-step instruction, plentiful screen captures and conceptual explanations. Each Lab, designed to be covered in 1 hour of class time, combines conceptual coverage with detailed software-specific instructions. Each Lab opens with a running case study that highlights real-world applications of each software program and leads students from problem to solution. Moreover, 25-50% of all end of chapter exercises are completely new. The O'Leary Series helps students learn specific applications skills along with those that cross all Office applications, which is especially important in mastering this version of Office. The O'Leary Series also correlates with SimNet Online, our online training and assessment program for Office 2010"-- "As we begin the 21st century, computer literacy is undoubtedly becoming a prerequisite in whatever career you choose. The goal of the O'Leary Series is to provide you with the necessary skills to efficiently use these applications. Equally important is the goal to provide a foundation for students to readily and easily learn to use future versions of this software. This series does this by providing detailed step-by-step instructions combined with careful selection and presentation of essential concepts. Times are changing, technology is changing, and this text is changing too. As students of today, you are different from those of yesterday. You put much effort toward the things that interest you and the things that are relevant to you. Your efforts directed at learning application programs and exploring the Web seem, at times, limitless. On the other hand, students often can be shortsighted, thinking that learning the skills to use the application is the only objective. The mission of the series is to build upon and extend this interest by not only teaching the specific application skills but by introducing the concepts that are common to all applications, providing students with the confidence, knowledge, and ability to easily learn the next generation of applications.

Brandishing Cyberattack Capabilities

by Martin C. Libicki

Deterrence is possible only when others have at least a good idea of possible U.S. military reprisals, but cyberattack capabilities resist such demonstration. This report explores ways they can be and under what circumstances, then goes on to examine the difficulties and the drawbacks. Such "brandishing" is no panacea and could even backfire if misinterpreted. Its success also relies on the strength of other elements of the deterrence posture.

Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software

by Michael Sikorski Andrew Honig

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You'll learn how to: Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back. Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

The Quest for Artificial Intelligence

by Nils J. Nilsson

Artificial intelligence (AI) is a field within computer science that is attempting to build enhanced intelligence into computer systems. This book traces the history of the subject, from the early dreams of eighteenth-century (and earlier) pioneers to the more successful work of today's AI engineers. AI is becoming more and more a part of everyone's life. The technology is already embedded in face-recognizing cameras, speech-recognition software, Internet search engines, and health-care robots, among other applications. The book's many diagrams and easy-to-understand descriptions of AI programs will help the casual reader gain an understanding of how these and other AI systems actually work. Its thorough (but unobtrusive) end-of-chapter notes containing citations to important source materials will be of great use to AI scholars and researchers. This book promises to be the definitive history of a field that has captivated the imaginations of scientists, philosophers, and writers for centuries.

Apple Pro Training Series: The Craft of Editing with Final Cut Pro

by Michael Wohl

In this Apple-authorized training book, director and filmmaker Michael Wohl delivers comprehensive training in the real-world skills editing pros use every day in the field. This is the ideal curriculum for a hands-on exploration of advanced editing with Final Cut Pro 6.

Computing Essentials 2013 Introductory Edition: Make IT Work for You

by Timothy J. O'Leary Linda I. O'Leary

Computing Essentials 2013 allows you to Make IT Work for You through relevant Explorations, Ethics and Environment themes throughout each chapter.

EMBOSS Administrator's Guide

by Dr Alan Bleasby Dr Jon Ison Mr Peter Rice Dr Alan Bleasby Dr Jon Ison

The European Molecular Biology Open Software Suite (EMBOSS) is a high quality package of open source software tools for molecular biology. It includes over 200 applications integrated with a range of popular third party software packages under a consistent and powerful command line interface. The tools are available from a wide range of graphical interfaces, including easy to use web interfaces and powerful workflow software. The EMBOSS Administrator's Guide is the official, definitive and comprehensive guide to EMBOSS installation and maintenance: • Find all the information needed to configure, install and maintain EMBOSS, including recent additions for version 6. 2 • Step-by-step instructions with real-world examples – saves you time and helps you avoid the pitfalls on all the common platforms • In-depth reference to database configuration – learn how to set up and use databases under EMBOSS • Includes EMBOSS Frequently Asked Questions (FAQ) with answers – quickly find solutions to common problems

The Handbook of Personal Area Networking Technologies and Protocols

by Dean Anthony Gratton

This handbook offers an unparalleled view of wireless personal area networking technologies and their associated protocols. It lifts the lid on their growing adoption within the consumer electronics, home automation, sports, health and well-being markets. Bluetooth low energy, ZigBee, EnOcean and ANT+ are comprehensively covered, along with other WPAN technologies including NFC, Wi-Fi, Bluetooth classic and high speed, and WHDI. It also features 802. 11ac, the Internet of Things, Wireless USB, WiGig and WirelessHD. The handbook shows how white space radio, cellular and Femtocells have inadvertently blurred the boundaries between personal and wide area communications, creating disruptive topologies through technology convergence. It explores how pervasive WAN technologies have spawned a new generation of consumers through the Lawnmower Man Effect and explains how our personal space has become integral to social media streams, including Twitter, Facebook and Pinterest. An essential read for students, software engineers and developers, product planners, technical marketers and analysts.

Membrane Filtration

by Greg Foley

Focusing on the application of membranes in an engineering context, this hands-on computational guide makes previously challenging problems routine. It formulates problems as systems of equations solved with MATLAB, encouraging active learning through worked examples and end-of-chapter problems. The detailed treatments of dead-end filtration include novel approaches to constant rate filtration and filtration with a centrifugal pump. The discussion of crossflow microfiltration includes the use of kinetic and force balance models. Comprehensive coverage of ultrafiltration and diafiltration processes employs both limiting flux and osmotic pressure models. The effect of fluid viscosity on the mass transfer coefficient is explored in detail, the effects of incomplete rejection on the design and analysis of ultrafiltration and diafiltration are analysed, and quantitative treatments of reverse osmosis and nanofiltration process analysis and design are explored. Includes a chapter dedicated to the modelling of membrane fouling.

Learning with ComputersTM I

by H. Albert Napier Ollie N. Rivers Jack P. Hoggatt

The new second edition LEARNING WITH COMPUTERS I (Level Green, Grade 7) is a revision of the first edition project-based text to cover Microsoft Office 2007 and 2010. There is also a companion text, LEARNING WITH COMPUTERS II (Level Orange, Grade 8). This series for middle school students delivers a strong foundation in keyboarding and computer applications. In this project based text, students are introduced to the Explorers Club where four young members of the club - Luis, Ray, Julie, and Lin - guide students on Microsoft Office explorations. Along the way, each student keeps a personal journal about their explorations. The text offers multiple opportunities to reinforce and maintain basic keyboarding, word processing, spreadsheet, presentation, database, graphics, and Internet skills. Students are also introduced to new grade-level appropriate computer skills based on the National Educational Technology Standards (NETS). Additionally, the text emphasizes research, reading, and writing activities relevant to social studies, science, math, and language arts curriculum. The text for use with Windows applications, is divided into 4 units; Word Processing, Spreadsheets, Presentations (Graphics, Multimedia, and Integration) and Databases. Each unit contains multiple projects for a total of 18 projects per text, plus an introductory project. Each project focuses on a group of grade-level appropriate objectives for particular computer applications. Several hands-on activities within each project are designed around these objectives. This one-semester text can be used as a stand alone or in conjunction with South-Western's MicroType keyboarding software. MicroType is an engaging, easy-to-use program that teaches new-key learning and skill building. Features include 3-D animations, videos, and fun interactive games.

Turning Heads and Changing Minds

by Chong Ee

Bringing a human touch to the IT audit process How IT auditors and their clients perceive each other affects the quality of their working relationships. Although most books for IT auditors acknowledge the importance of soft skills, they usually focus on technical abilities. Beyond giving simple advice like "improving listening skills" and "not jumping to conclusions," they rarely tackle the issue of how to build a better rapport with the client. Turning Heads and Changing Minds provides the IT auditor (student or practitioner) with an understanding of soft skills. The author, Chong Ee, looks at common auditor perceptions that can hinder an audit and offers practical techniques to overcome them. Chong uses an intuitive, organic approach, with real-life scenarios involving general computer, application and third-party controls at various stages of an audit life cycle. By exploring how and why the auditor becomes trapped in an archetypal role, the book helps the reader to avoid the traditional finger-pointing stance and, instead, become a convincing partner with business and technology counterparts. Chong Ee is a Certified Information Systems Auditor (CISA) and Certified in the Governance of Enterprise IT (CGEIT). He has worked in external and in-house auditing, including eight years in Sarbanes-Oxley compliance. Chong speaks regularly on the conference circuit and has published articles in various magazines and industry journals. His first book, Compliance by Design: IT Controls that Work, is also published by IT Governance. Evolve the role of the IT auditor from hinderer to enabler.

Exploding the Myths Surrounding ISO9000

by Andrew W. Nichols

The secrets of successful ISO9000 implementation Thousands of companies worldwide are reaping the benefits from adopting the ISO9000 family of quality management standards. However, there are many conflicting opinions about ISO9000s best practice approach. Some companies have delayed adopting ISO9000, or have chosen not to undertake implementation at all. This might be because of a lack of time and resources to investigate it properly, or because of misunderstandings about the way it works. So, how do we know who and what to believe? In Exploding the Myths Surrounding ISO9000, Andrew W Nichols debunks many of the common misconceptions about ISO9001 and describes the many advantages it brings. Drawing on more than 25 years of hands-on experience, Andy gives clear, practical and up-to-date advice on how to implement a Quality Management System to maximum effect. Full of real-life examples, this book enables you to read and interpret the ISO9000 documentation. With the advice in this book, you can foster an effective ISO9000 system that brings increased efficiencies, reduces waste and fuels growth in sales as you better understand and meet the needs of your customers. About the author Andrew W Nichols has more than 25 years of experience of management systems, in both the UK and the USA. As a trainer, he has delivered hundreds of ISO9000 related courses to audiences ranging from shop-floor personnel to CEOs of Fortune 500 companies. He has also led and contributed to the development of best in class training courses for a number of international standards. Andy is a regular contributor to the well-known Elsmar Cove internet forum for management systems. Read this unique book and make ISO9000 work for you.

No One of Us is as Strong as All of Us

by Daniel Mclean

Fresh from tackling incidents, changes and problems in The ITSM Iron Triangle, Chris is back in this fantastic follow-up title. High-performing IT organizations know success is more dependent on transforming behaviors than on the state of their technology. They've learned how to change behaviors as effectively as they change technology. Your success depends on mastering the toughest task in business - transforming people's behavior. This innovative fictionalized narrative builds on real-life experiences of people just like you and the daily ITSM challenges you encounter. See how they: * Dealt with situations where being right didn't mean success * Survived management pressure as others were fired around them * Built credibility in the face of doubt and mistrust from their peers * Separated good advice from bad. Read the book to learn from their mistakes and replicate their successes! This book, '. . . ensures we understand the interpersonal aspects often overlooked as we focus on design and implementation of new tools and processes rather than change in behavior . . . The use of a story to illustrate both ITIL process basics and the inherent implementation challenges makes this a powerful but quick, easy read. ' (Susan Schellhase, itSMF USA member) This book will transform your career! About the author Daniel McLean has more than 20 years' IT experience. His consultancy focuses on turning ITSM best practices into practical operational success. Daniel was a peer reviewer during the development of the OGC ITIL v3 Service Strategy element of the ITIL framework. He is the author of The ITSM Iron Triangle: Incidents, Changes and Problems and holds many honors in IT and related areas.

The Definitive Guide to IT Service Metrics

by Kurt Mcwhirter Ted Gaughan

IT service metrics: Manage them. Measure them. Make them work for you. Measuring success is crucial, but how do we do it? How can we be sure that the IT services we offer are adding real value to our business? Metrics are an invaluable tool for measuring the effectiveness of IT service provision. Used effectively, metrics enable businesses to assess performance in order to inform the decision-making process, drive change and realize improvements. They facilitate cost savings through economical use of finance and resources, and ensure that the services provided are appropriate - thereby strengthening customer loyalty. Based on ITIL(R) and other service management frameworks and standards Up-to-date, based on the ITIL(R) framework, as well as COBIT(R), ISO/IEC 20000, PMI(R) and ISO/IEC 27000, The Definitive Guide to IT Service Metrics will show you how to integrate metrics into your business and maximize their usage and effectiveness. You will learn what to consider when gathering and reporting information and how to secure and protect your company's metrics. Use metrics to benefit your IT department and the business as a whole Used just as they are, the metrics in this book will bring many benefits to both the IT department and the business as a whole. Details of the attributes of each metric are given, enabling you to make the right choices for your business. You may prefer and are encouraged to design and create your own metrics to bring even more value to your business - this book will show you how to do this, too. About the authors Kurt McWhirter is a recognized authority on using the ITIL(R) framework and has more than 30 years' experience in IT strategic planning, operations management, and enterprise process design and implementation. He is certified as an ITIL(R) Expert and ISO/IEC 20000 Consultant and is an accredited ITIL(R) Trainer. Ted Gaughan has more than 25 years' experience in business/technical strategic development, program/project management, and IT engineering and operations management. He is a certified Project Management Professional (PMP(R)), Process Design Engineer (CPDE(R)), ITIL(R) Expert, ISO/IEC 20000 Consultant and TIPAiE Lead Assessor. The definitive guide you can't afford to be without!

The Definitive Guide to IT Service Metrics

by Kurt Mcwhirter Ted Gaughan

IT service metrics: Manage them. Measure them. Make them work for you. Measuring success is crucial, but how do we do it? How can we be sure that the IT services we offer are adding real value to our business? Metrics are an invaluable tool for measuring the effectiveness of IT service provision. Used effectively, metrics enable businesses to assess performance in order to inform the decision-making process, drive change and realize improvements. They facilitate cost savings through economical use of finance and resources, and ensure that the services provided are appropriate - thereby strengthening customer loyalty. Based on ITIL(R) and other service management frameworks and standards Up-to-date, based on the ITIL(R) framework, as well as COBIT(R), ISO/IEC 20000, PMI(R) and ISO/IEC 27000, The Definitive Guide to IT Service Metrics will show you how to integrate metrics into your business and maximize their usage and effectiveness. You will learn what to consider when gathering and reporting information and how to secure and protect your company's metrics. Use metrics to benefit your IT department and the business as a whole Used just as they are, the metrics in this book will bring many benefits to both the IT department and the business as a whole. Details of the attributes of each metric are given, enabling you to make the right choices for your business. You may prefer and are encouraged to design and create your own metrics to bring even more value to your business - this book will show you how to do this, too. About the authors Kurt McWhirter is a recognized authority on using the ITIL(R) framework and has more than 30 years' experience in IT strategic planning, operations management, and enterprise process design and implementation. He is certified as an ITIL(R) Expert and ISO/IEC 20000 Consultant and is an accredited ITIL(R) Trainer. Ted Gaughan has more than 25 years' experience in business/technical strategic development, program/project management, and IT engineering and operations management. He is a certified Project Management Professional (PMP(R)), Process Design Engineer (CPDE(R)), ITIL(R) Expert, ISO/IEC 20000 Consultant and TIPAiE Lead Assessor. The definitive guide you can't afford to be without!

Securing Cloud Services

by Lee Newcombe

Lee Newcombe is an enterprise architect with commercial experience at numerous high-profile companies, including a retail bank, a systems integrator and one of the Big 4 consultancies. He has worked within various Cloud programmes and acted as the IT industry security expert during the early days of the UK Government's G-Cloud programme. Lee has been writing about, presenting on, and working with Cloud technologies since 2007, and is a named contributor to the Cloud Security Alliance guidance document.

Once more unto the Breach

by Andrea C. Simmons

Andrea C Simmons is an information governance specialist with extensive experience in the private and the public sectors. She has made significant contributions to standard developments and industry research and is currently working on a PhD in Information Assurance. For more than a decade she has been writing articles and blogs and presenting at conferences, seminars and workshops. Andrea is a member of many professional bodies and has just been awarded Senior Member status of the ISSA.

Penetration Testing

by Kevin M. Henry

Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences, combined with other real-world examples, are used to illustrate common pitfalls that can be encountered during testing and reporting. Special attention is also paid to new technologies that improve business operations, but which can create new vulnerabilities, such as employee remote access, wireless communications and public-facing web applications. This book will give you a better understanding of how to conduct a penetration test, and also how to deliver a client-focused report that assesses the security of the system and whether the level of risk to the organization is within acceptable levels. Kevin Henry has 35 years' experience working on computer systems, initially as a computer operator, and then in various programmer and analyst roles, before moving into audit and security. Kevin currently provides security auditing, training and educational programs for major clients and governments around the world and is a frequent speaker on the security conference circuit. A business-aligned approach to penetration testing!

Cloud Computing

by Jared Carstensen Bernard Golden Jp Morgenthal

Do you trust the Cloud? Should you trust the Cloud? 'Cloud Computing' are the words on everyone's lips - it's the latest technology, the way forward. But how safe is the Cloud? Is it reliable? How secure will your information be? Cloud Computing: Assessing the risks looks at these challenges from a real-world perspective, with industry experts . . . . . .

Everything you want to know about Agile

by Jamie Lynn Cooke

Deliver exceptional results from your IT department using Agile approaches. Agile methodologies and practices have been proven over the past two decades to increase the relevance, quality, flexibility and business value of software solutions. The IT departments of many large and successful organizations (including Google, Microsoft, Yahoo! and BT) have all delivered productivity gains through the adoption of Agile approaches. It worked for them, but will it work for you? Everything you want to know about Agile is written specifically to address the challenges of implementing Agile within the unique structures, constraints and culture of your organization. It provides you with the information you need to assess whether Agile is right for your department, to select the Agile methodologies and practices that are best suited to your work, to successfully implement these approaches, and to measure the outcomes. Most importantly, this book gives you strategies for aligning Agile work within the reporting, budgeting, staffing and governance constraints of your organization, which is arguably the biggest challenge. Written for executives, IT department managers and other senior decision makers, this book is equally valuable for IT project managers, team leaders and management consultants who want to deliver successful Agile results. Jamie Lynn Cooke has 21 years' experience as a senior business analyst and solutions consultant, and has worked with over 125 public and private sector organizations throughout Australia, Canada and the US. Jamie has been working with Agile methodologies since 2003, and has written several other books on Agile, including Agile Productivity Unleashed and Agile: An Executive Guide: Real results from IT budgets. An essential read for anyone wanting to make Agile work in their organization!

An Introduction to Hacking and Crimeware

by Victoria Loewengart

Defend your business, protect your livelihood, safeguard your future. Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits to create malware are now readily available to anyone wishing to defraud and do damage. For your business to survive and thrive, it is vital to stay informed about the threats and the risks, and arm yourself against them. Know your enemyAn Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities. Fighting backIn this pocket guide, the author:defines exactly what crimeware is _ both intentional and unintentional _ and gives specific, up-to-date examples to help you identify the risks and protect your businessexplores the increasing use of COTS tools as hacking tools, exposing the enemy_s tactics gives practical suggestions as to how you can fight backprovides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business.

ISO/IEC 20000 An introduction to the global standard for service management

by David Clifford

Manage your IT services more effectively This pocket guide will show you how. Whatever your business, your capacity to supply products and services to your customers depends on your IT. Yet, all too often, companies and government departments fail to take effective control of their IT systems. Instead, organisations rely on a confused mish-mash of different technologies and ad hoc working practices. The solution: an ITSMS To avoid this fate, your organisation needs to adopt an IT Service Management System (ITSMS). Employing an ITSMS will enable your organisation to identify how to enhance the quality of service you deliver to your customers. The standard for an ITSMS is ISO/IEC 20000. ISO/IEC 20000 The standard This pocket guide offers an overview of the purpose of the standard and shows how it can be used. Topics covered include qualification programmes, certification schemes and the interrelationship of ISO20000 with other standards, such as ISO27001. The overall emphasis of the guide is on ISO20K s customer-driven approach, ensuring your IT service management processes will be aligned with the needs of your business. Benefits to business include: * Deliver on the commitments you have made. When you provide services to a customer, the customer expects you to take responsibility for completing the job on time. From your perspective, the way you deal with your suppliers plays a vital role in fulfilling that objective. Implementing ISO20000 entails adopting a holistic approach to service development and delivery, enabling prompt and accurate communication between your organisation and your suppliers. By managing relationships with your suppliers, you can establish a strong supply chain that will be capable of delivering on the commitments you have made. * More efficient and effective service delivery. Different divisions and departments are a fact of life in every organisation. The problem is how to get them working together. Without proper communication between your employees, you cannot get them to cooperate. By adopting ISO20000, employee coordination can be improved and you can protect your organisation from the risk of different business units turning into information silos. Measures, such as showing appreciation for actions that promote integration, and using key performance indicators that encourage measurement across the departmental divide, will foster team spirit and lead to more efficient and effective service delivery. * Strengthen relationships and win new business. You can improve the running of your business simply by using ISO20000 as a checklist of activities that need to be performed. However, there are many advantages to achieving formal certification. In particular, it will help you to strengthen your relationships with existing customers and to win new business. If you are a service provider, certification to ISO20000 is an opportunity to demonstrate the quality and reliability of your service management capability to existing and potential customers. * Win new contracts. For a service provider, certification to ISO20000 can open doors and help you bid for new orders. Sometimes, a customer organisation may make certification to ISO20000 a requirement when awarding a particular contract. When businesses devote too little time to researching or planning how they deal with customers, the quality of service they provide will inevitably suffer, as they find themselves reacting to problems rather than devising a solution to them. In the long run, the silo-based mentality leads to a decline in the quality of service the organisation can provide, undermining relationships with customers and making it harder to forge new partnerships or win new business. This pocket guide contains invaluable advice on how to define the appropriate scope for assessment against ISO20000 and how the service management activities are audited using test data. It will enable you to ensure your IT service management processes align with the needs of your business and ultimately grow your business by...

Compliance by Design

by Chong Ee

A must have book for anyone who is looking to develop awareness and deeper insight into IT controls, strategies and techniques to solve compliance challenges!What does 'compliance' mean to you? Is it a burden, a box-ticking exercise, or a way to avoid the penalties of non-compliance? Or do you see the opportunities it presents for your business? In Compliance by Design, Chong Ee will show you how your organisation can benefit from becoming compliant with the relevant national and international standards. You will discover how integrating controls into your processes will improve your security, increase your productivity, save you time and money, and increase your profits. Drawing on personal experience and using up-to-date, practical examples, the book considers the elements and principles of controls, and offers strategies to put them in place. It will show you how to:implement changes that will improve your processes allay fears and overcome resistance from your stakeholders integrate controls into your everyday processes achieve synergy from interconnected processes assess your priorities and handle conflicting objectives analyse and manage risks establish a system of controls that is right for your business manage your technology to make it work for you. Moving away from traditional effortsTraditional efforts in attaining or sustaining IT compliance employ an outside-looking-in approach, characterised by capturing varied compliance requirements and/or frameworks and applying these within the organisation. This book advocates an inside-looking-out approach, emphasising fundamental ideas of good control design as the basis for developing effective and sustainable IT compliance strategies. Tools and techniquesIntended to arm you with the tools and techniques to put in place the right system of internal controls, the focus is on IT controls, but with plenty of references to business and entity controls, too.

IT Asset Management A Pocket Survival Guide

by Martyn Hobbs

IT Asset Management: A Pocket Survival Guideis a quick reference style guide, addressing such serious issues with a fresh and pragmatic approach. Aimed at IT professionals who have been tasked with putting in place Asset Management disciplines, it first provides a commonsense introduction to the key processes outlined in the Information Technology Infrastructure Library (ITIL(r)), before proceeding to explain the various milestones of an Asset Management projec

The Governance of Green IT

by George Spafford

The economy and environment have combined to create quite a challenge. On one hand, there is a push to reduce capital investment and operating expenses. On the other, organizations are implementing green strategies to reduce the environmental impacts. Within this context, information technology is struggling to provide services that support the organization. Today's high-performance high-density computer systems are requiring power and cooling densities that hitherto were unheard of. As a result, not only are some data center facilities challenged to provide the power and cooling needed, but in some cases, the power utility can't even provide additional power without improving the power grid and/or developing additional generation facilities. If data center power and cooling issues aren't addressed, IT may find itself constrained and unable to add servers or use newer technology in new and revised services that enable the business. The Green IT process can help IT implement the necessary governance and processes to address these risks. This book provides an overview so IT can do just that.

Refine Search

Showing 53,251 through 53,275 of 55,759 results