Information Technology

IT Management

Per Page:
Sort:

Walling Out the Insiders: Controlling Access to Improve Organizational Security

Featured

Michael Erbschloe
February 23, 2017

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an orga...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

Featured

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabili...

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

Featured

John J. Trinckes, Jr.
January 19, 2017

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medic...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Featured

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 8, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain special...

A Guide to Selecting Software Measures and Metrics

Capers Jones
March 16, 2017

Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major...

HIPAA and PCI Audits: Secrets to Getting GREAT Results

Raj Goel
March 15, 2017

This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system, record, and security compromises. It addresses policy, software, and procedural solutions to safeguarding information including: assigning unique IDs to users, controlling...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

Eugene M Fredriksen
March 13, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 08, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

Virtualization and Private Cloud with VMware Cloud Suite

Lee Chao
March 03, 2017

To help readers understand virtualization and cloud computing, this book is designed to cover the theories and concepts enough to understand the cutting-edge technology. Meanwhile, in this book, the reader can gain hands-on skills on VMware Cloud Suite to create a private cloud. With the academic...

The Internet of Things: Enabling Technologies, Platforms, and Use Cases

Pethuru Raj, Anupama C. Raman
March 02, 2017

As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and...

Walling Out the Insiders: Controlling Access to Improve Organizational Security

Michael Erbschloe
February 23, 2017

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an...

Data Protection: Ensuring Data Availability

Preston de Guise
February 22, 2017

This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is...

HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations, Fourth Edition

Himss
February 09, 2017

This significantly expanded and newest edition of the bestselling HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations has been developed and extensively reviewed by more than 50 industry experts. The fourth edition of this dictionary serves as a quick reference for...

The Analytics Process: Strategic and Tactical Steps

Eduardo Rodriguez
February 03, 2017

This book is about the process of using analytics and the capabilities of analytics in today’s organizations. Cutting through the buzz surrounding the term analytics and the overloaded expectations about using analytics, the book demystifies analytics with an in-depth examination of concepts...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security...

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

John J. Trinckes, Jr.
January 26, 2017

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased...

Conferences

Year: