Information Technology

Per Page:
Sort:
PCI Compliance: The Definitive Guide

PCI Compliance: The Definitive Guide

Featured

Abhay Bhargav

May 5, 2014

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explai...

The Influential Project Manager: Winning Over Team Members and Stakeholders

The Influential Project Manager: Winning Over Team Members and Stakeholders

Featured

Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F

July 25, 2014

If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to devel...

Project Leadership: Creating Value with an Adaptive Project Organization

Project Leadership: Creating Value with an Adaptive Project Organization

Featured

Barry L. Cross, M. Kathryn Brohman

July 1, 2014

Look around your organization: can you identify who owns project management? Would that person appreciate that they own responsibility for your projects? Project Leadership: Creating Value with an Adaptive Project Organization highlights the importance of these questions—underlining the importance...

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Featured

Rafay Baloch

July 28, 2014

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking t...

Hardware Security: Design, Threats, and Safeguards

Hardware Security: Design, Threats, and Safeguards

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

October 29, 2014

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

The Strategic CIO: Changing the Dynamics of the Business Enterprise

The Strategic CIO: Changing the Dynamics of the Business Enterprise

Philip Weinzimer

October 29, 2014

Based on interviews with more than 150 CIOs, IT/business executives, and academic thought leaders, The Strategic CIO: Changing the Dynamics of the Business Enterprise provides insight, success stories, and a step-by-step methodology to transform your IT organization into a strategic asset that...

Computational Trust Models and Machine Learning

Computational Trust Models and Machine Learning

Xin Liu, Anwitaman Datta, Ee-Peng Lim

October 29, 2014

Computational Trust Models and Machine Learning provides a detailed introduction to the concept of trust and its application in various computer science areas, including multi-agent systems, online social networks, and communication systems. Identifying trust modeling challenges that cannot be...

Physical Security and Safety: A Field Guide for the Practitioner

Physical Security and Safety: A Field Guide for the Practitioner

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

October 29, 2014

How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the...

Project Management Theory and Practice, Second Edition

Project Management Theory and Practice, Second Edition

Gary L. Richardson

October 29, 2014

Updated to reflect the Project Management Institute’s (PMI’s) Project Management Body of Knowledge (PMBOK® Guide), Fifth Edition, the new edition of this bestselling textbook continues to provide a practical and up-to-date overview of project management theory. Project Management Theory and...

Project Management Maturity Model, Third Edition

Project Management Maturity Model, Third Edition

J. Kent Crawford

October 29, 2014

Following in the tradition of its bestselling predecessors, Project Management Maturity Model, Third Edition provides a roadmap for improving project success and boosting organizational performance. This edition presents new and revised material based on the Project Management Institute’s (PMI’s) A...

Software and Systems Architecture in Action

Software and Systems Architecture in Action

Raghvinder S. Sangwan

October 27, 2014

Modern-day projects require software and systems engineers to work together in realizing architectures of large and complex software-intensive systems. To date, the two have used their own tools and methods to deal with similar issues when it comes to the requirements, design, testing, maintenance,...

Android Malware and Analysis

Android Malware and Analysis

Ken Dunham

October 24, 2014

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware...

Project Health Assessment

Project Health Assessment

Paul S. Royer, PMP

October 24, 2014

Project managers, sponsors, team members, and involved stakeholders know when things aren’t going well. A frequent first indication is a missing or errant process. Project Health Assessment presents an innovative approach for assessing project processes through a set of ten critical success factors...

High Performance Parallel I/O

High Performance Parallel I/O

Prabhat, Quincey Koziol

October 23, 2014

Gain Critical Insight into the Parallel I/O Ecosystem Parallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance...

The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

Rebecca Herold, Kevin Beaver

October 20, 2014

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the...

Portfolio Management: A Strategic Approach

Portfolio Management: A Strategic Approach

Ginger Levin, PMP, PgMP, John Wyzalek, PfMP

October 15, 2014

Recognizing the importance of selecting and pursuing programs, projects, and operational work that add sustainable business value that benefits end users, the Project Management Institute (PMI®) issued its first Standard on Portfolio Management in 2006. In 2014, it launched the Portfolio Management...