Information Technology

IT Management

Per Page:
Sort:

A Guide to Selecting Software Measures and Metrics

Featured

Capers Jones
March 16, 2017

Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major gaps...

Leading and Motivating Global Teams: Integrating Offshore Centers and the Head Office

Vimal Kumar Khanna
May 08, 2017

This book provides techniques for offshore center managers and head office managers to motivate and manage globally distributed teams, which are spread across the offshore center and the head office, and thereby achieve higher productivity. Readers learn how to integrate the offshore center with...

Planning by Design (PxD)-Based Systematic Methodologies

Hakan Butuner
April 13, 2017

The book shows how to use Planning by Design (PxD) for developing working models to any type of subject area. Section 1 describes the nature of planning in general, the formula of planning, the features that make it systematic, the essence of PxD, and developing and using the working model. Section...

Introduction to Computer Networks and Cybersecurity

Chwan-Hwa (John) Wu, J. David Irwin
April 06, 2017

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses...

Spatial Cloud Computing: A Practical Approach

Chaowei Yang, Qunying Huang
March 31, 2017

An exploration of the benefits of cloud computing in geoscience research and applications as well as future research directions, Spatial Cloud Computing: A Practical Approach discusses the essential elements of cloud computing and their advantages for geoscience. Using practical examples, it...

A Guide to Selecting Software Measures and Metrics

Capers Jones
March 16, 2017

Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major...

HIPAA and PCI Audits: Secrets to Getting GREAT Results

Raj Goel
March 15, 2017

This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system, record, and security compromises. It addresses policy, software, and procedural solutions to safeguarding information including: assigning unique IDs to users, controlling...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

Eugene M Fredriksen
March 13, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 09, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

Virtualization and Private Cloud with VMware Cloud Suite

Lee Chao
March 03, 2017

To help readers understand virtualization and cloud computing, this book is designed to cover the theories and concepts enough to understand the cutting-edge technology. Meanwhile, in this book, the reader can gain hands-on skills on VMware Cloud Suite to create a private cloud. With the academic...

The Internet of Things: Enabling Technologies, Platforms, and Use Cases

Pethuru Raj, Anupama C. Raman
March 02, 2017

As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and...

Walling Out the Insiders: Controlling Access to Improve Organizational Security

Michael Erbschloe
February 23, 2017

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an...

Data Protection: Ensuring Data Availability

Preston de Guise
February 22, 2017

This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is...

Conferences

Year: