Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!
Actionable Intelligence: A Guide to Delivering Business Results with Big Data Fast!

Building an analysis ecosystem for a smarter approach tointelligence

Keith Carter's Actionable Intelligence: A Guide to DeliveringBusiness Results with Big Data Fast! is the comprehensive guideto achieving the dream that business intelligence practitionershave been chasing since the concept itself came into being....

The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)
The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)

The Art of Agile Practice: A Composite Approach for Projects and Organizations presents a consistent, integrated, and strategic approach to achieving "Agility" in your business. Transcending beyond Agile as a software development method, it covers the gamut of methods in an organization?including...

IT Project Portfolio Management
IT Project Portfolio Management
While consulting for a large company’s information technology (IT) department, I was asked to help find a way to better manage the various IT projects that were spread among all of its business units. The executives wanted me to research tools that would help them prioritize the projects so they would know which ones were healthy contributors...
Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications
  • Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more
  • Risk Management: Creating a risk management program, performing risk assessment and control verification, and more
  • ...
Sarbanes-Oxley and Nonprofit Management: Skills, Techniques, and Methods
Sarbanes-Oxley and Nonprofit Management: Skills, Techniques, and Methods
Is your nonprofit organization ready for increased scrutiny, reporting requirements, regulations, and increased expectations from donors? This combination reference/workbook prepares you and shows you how Sarbanes-Oxley best practices can benefit your organization. It includes:
  • A structured description of Sarbanes-Oxley and its...
E-Business Strategy, Sourcing and Governance
E-Business Strategy, Sourcing and Governance
E-Business Strategy, Sourcing and Governance is based on the premise that it is difficult, if not impossible, to manage a modern business or public organization without at least some knowledge of the planning, use, control, and benefits of information technology. Managers need to have an understanding of strategy development, including the current...
Beyond Governance: Creating Corporate Value through Performance, Conformance and Responsibility
Beyond Governance: Creating Corporate Value through Performance, Conformance and Responsibility
T oday’s finance professionals face a very different world to
their predecessors. The steady, planned and predictable
world of the accountant has been changed beyond
measure, by a number of pressures including:

. corporate scandals and the consequent intense focus on
corporate governance and risk management;...
IT Portfolio Management: Unlocking the Business Value of Technology
IT Portfolio Management: Unlocking the Business Value of Technology
This book provides a pragmatic, step-by-step road map, describing IT portfolio
management and its major elements. Chapter 1 provides an overview of IT
portfolio management. Chapter 2 describes the planning aspects of IT portfolio
management. It explains the IT portfolio management maturity model and the
key people, process, and
...
IT Services Portfolio Management Best Practice Handbook
IT Services Portfolio Management Best Practice Handbook

If you support an organization that wants to improve the performance of complex IT portfolios to achieve both immediate and strategic goals or are responsible for and oversee many projects that are contractually required to produce measurable results; you will be pleased to find that this book serves as both a roadmap and a checklist for...

CISSP All-in-One Exam Guide, 6th Edition
CISSP All-in-One Exam Guide, 6th Edition

A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris

Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by...

Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks
The rapid progress of mobile/wireless communication and embedded microsensing MEMS technologies leads us toward the dream “Ubiquitous/Pervasive Computing.” Wireless local-area networks (WLANs) have been widely deployed in many cities and have become a requisite tool to many people in their daily lives. Wireless personal-area networks...
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy