You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization. Add to that the spending restraints of a down economy, and IT managers find themselves in need of a thoughtful, rea
HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches. The Official (ISC)2 (R) Guide to the HCISPPSM CBK (R) is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). This guide covers the diversity of the healthcare industry, the types of technologies and information flows that require variou...
Design research promotes understanding of advanced, cutting-edge information systems through the construction and evaluation of these systems and their components. Since this method of research can produce rigorous, meaningful results in the absence of a strong theory base, it excels in investigating new and even speculative technologies, offering
The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry's first and only CBK, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK conti
September 11, 2001 had a profound impact upon individuals, institutions, and governments, but also upon the world of global trade. Years later, the reverberations of this deliberate and focused act of terrorism are manifest in much more stringent logistics, documentary requirements, and regulations. A single source on compliance and security, writt
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company's reputation, violating a consumer's privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to da
Annals of Cases on Information Technology provides a collection of case studies focusing on IT implementation in organizations. The cases included in Volume VI describe successful projects and offer advice on how to achieve these best practices. They also look at IT project failures and describe steps to avoid pitfalls in the path to successful IT utilization. The organizations described in this book represent small businesses, educational institutions, public and private corporations and describe may aspects of IT implementation including, e-commerce endeavors, intelligent technologies, enterprise resource planning and many other facets of emerging IT utilization.