I.T Auditing and Sarbanes Oxley Compliance | |
Sarbanes - Oxley Internal Controls | |
|
This book brings under one cover two key strategies for business improvement: information technology (IT) auditing and Sarbanes-Oxley (SOX) compliance , ... | | |
|
This book will highlight some of the important or evolving new changes or frameworks that will make compliance with SOx less difficult for all enterprises
.... | | | |
ISBN: 9789080671331 | |
ISBN: 9789087530426 | |
|
Software Project Management in Practice | |
The Art of Strategy Planning for I.T | |
|
The book is written primarily for project managers and for professionals who plan to become project managers. By using the methods described in this book they can systematically improve the planning and execution of their projects..... | | |
|
The strategic planning methods presented in this book contribute significantly to our success. By applying concepts such as core competencies, critical success factors, ... | | | |
ISBN: 0273686550 | |
ISBN: 9780113309184 | |
|
I.T Porfolio Management Step by Step | |
M.I.S - Management Information System (Full) | |
|
Following the guidance of this book, organizations can evolve into adaptive real-time enterprises that thrive in a world of change. IT Portfolio Management provides an answer to every senior business leader’s questions around the black hole of the IT budget.... | | |
|
This book is designed for anyone interested in taking the Certified Information Systems Auditor (CISA) exam. The CISA certification is one of the hottest in the market, with annual growth in excess of 28 percent, according to the Information Systems Audit and Control Association (ISACA),..... | | | |
ISBN: 9789077212868 | |
ISBN: 9781591392538 | |
|
Computer Security, Privacy and Politics | |
Business Continuity and Disaster Recovery Planning | |
|
This book aims to provide a window to academics and practitioners to view and understand the ties that bind computer technology, security, privacy, and politics..... | | |
|
It's cover the important elements of BC/DR, point you to additional resources and provide some real-world advice that you can put to use immediately. The book is intended to be scalable to fit your needs
... | | | |
ISBN: 9789077212264 | |
ISBN: 9780875847474 | |
|
Building and Effective Information Security Policy Architecture | |
Computer Security, Privacy and Politics | |
|
This book will assist any security professional who has the responsibility of developing and maintaining a security policy architecture...
| | |
|
This book aims to provide a window to academics and practitioners to view and understand the ties that bind computer technology, security, privacy, and politics. .... | | | |
ISBN: 9789087530471 | |
ISBN: 9781903091326 | |
|
Enterprise Architecture as Strategy | |
Business Intelligence Roadmap | |
|
The purpose of this handbook is to make readers
understand the need for enterprise security
strategies, current security tools, procedures
and processes, techniques, and tools that are
required to protect data and systems.
. | | |
|
Business Intelligence Roadmap is a visual guide to developing an effective business intelligence (BI) decision-support application. This book outlines a methodology that takes into account the complexity of developing applications in an integrated BI environment ... | | | |
ISBN: 9780113308705 | |
ISBN: 9781903091371 | |
|
I.T Porfolio Management Step by Step | |
Effective IT Service Management - To ITIL and Beyon
|
|
|
Following the guidance of this book, organizations can evolve into adaptive real-time enterprises that thrive in a world of change. IT Portfolio Management provides an answer to every senior business leader’s questions around the black hole of the IT budget. ... | | |
|
This book is a candid look into the relative merits of currently accepted wisdom regarding the provision of IT services using the principles of the IT Infrastructure Library (ITIL) guidance series.
... | | | |
ISBN: 0974080810 | |
ISBN: 0974080802 | |
|
IT Project Portfolio Management | |
Secure Computer and Network Systems | |
|
An established IT PMO that is actively supported at the executive level can help solve problems with project auditing and initiative approval....
| | |
|
This book contains various design, modeling and analytical methods which can be used by researchers to investigate the security of computer and network systems
... | | | |
ISBN: 9781578512508 | |
ISBN: 9781578512508 | |