by
Ash, Gerald W.
Call Number
658.4038 ASH
Publication Date
2007 2006
Format:
Books
Relevance:
71875.7188
by
Contos, Brian T.
Call Number
658.478 P578 22
Publication Date
2007
Summary
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
Format:
Electronic Resources
Relevance:
43629.6211
View Other Search Results
by
Betz, Charles T.
Call Number
004 22
Publication Date
2007
Summary
How would you feel if you visited your financial planners office and saw past-due credit card notices on their desk? Would you trust an auto mechanic whose car backfires and produces black smoke? A dentist with bad teeth? A banker in shabby clothes? An interior designer whose offices are a shambles? This is the position of the IT capability in many large organizations. The designated custodian of critical business processes and data does not manage its own processes and data reliably. A response in the form of Enterprise Resource Planning for Information Technology is emerging from major companies, research firms, and vendors; they are labeling these offerings "ERP for IT," IT Resource Planning, and related terms. This groundbreaking, practitioner-authored book provides an independent examination of and response to these developments. An analysis of the large scale IT capability, with specific attention to business processes, structured data, and enabling systems, it is essentially a comprehensive systems architecture, not for the business capabilities IT supports, but for IT itself. Features The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. ABOUT THE AUTHOR: Charles Betz is a Senior Enterprise Architect, and chief architect for IT Service Management strategy for a US-based Fortune 50 enterprise. He has held consultant and architect positions for Best Buy, Target, and Accenture, specializing in metadata, configuration management, IT governance, enterprise application integration, and ERP systems. He holds a summa B.A. in Political Science and a Master of Science in Software Engineering, both from the University of Minnesota. Charlie is an active member of the professional community, belonging to the IT Service Management Forum, IEEE, ACM, and Data Management Association (DAMA). He presents frequently both locally and nationally to professional associations and conferences. He is the sole author of the popular www.erp4it.com weblog. Are you in the thick of sorting out how to make ITIL and COBIT work, and trying to make sense of the dozens of vendors clamoring to help? Are you puzzled over how the ITIL vision for Change Management fits into the reality of your current processes? And how it relates to Enterprise Architecture and Portfolio Management? Is the concept of configuration management and the CMDB giving off more heat than light for you? How can you make it real? Have you found yourself wondering whether you really need an IT portfolio management tool, an enterprise architecture repository, a metadata repository, a service management tool, and a configuration management database (CMDB)? And if you have them, are you wondering if they should be related somehow? The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT - now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. Among the specific topics addressed are: * ITIL recommendations from a practical systems implementation point of view * Configuration management: challenges, misconceptions, myths, and realities. Business justification for. Support for compliance and regulatory goals. * Interrelationships between IT portfolio planning, solutions development, and IT operations * The relationship between application development and hosting (infrastructure) organizations * Business intelligence, performance management, and metrics for the IT capability itself * Detailed, actionable clarification of the vague concept of "IT Service" and all its permutations and implications * IT portfolio degradation through complexity * Detailed models of IT information * The various classes of systems used internally by large scale IT organizations * The concept of "repository" and its relationship to the Configuration Management Database (CMDB) * Process roles and responsibilities. Closed-loop, self-reinforcing processes for IT data management. * Application as critical control point and portfolio entry. Clarifying relationship between "application" and "IT service." Application portfolio management: process, data structures, and systems.
Format:
Electronic Resources
Relevance:
41501.0977
by
Heuvel, Willem-Jan van den.
Call Number
658.4038011 22
Publication Date
2007
Format:
Electronic Resources
Relevance:
2.3236
by
Williams, Bob, 1947-
Call Number
388.3 22
Publication Date
2008
Summary
This one-stop resource provides a state-of-the-art review of intelligent transport systems, services, and supporting technologies, and updates you on the latest ITS standards governing communications, technical support, information technology, and identification technology. You find details on standards covering everything from traveler information and traffic management, to weather monitoring and emergency response.
Format:
Electronic Resources
Relevance:
0.0737
6.
by
Neapolitan, Richard E.
Call Number
332.01519542 22
Publication Date
2007
Summary
Bayesian Networks are a form of probabilistic graphical models and they are used for modeling knowledge in many application areas, from medicine to image processing. They are particularly useful for business applications, ans * Unique coverage of probabilistic reasoning topics applied to business problems, including marketing, banking, operations management, and finance. * Shares insights about when and why probabilistic methods can and cannot be used effectively; * Complete review of Bayesian networks and probabilistic methods for those IT professionals new to informatics.
Format:
Electronic Resources
Relevance:
0.0680
Limit Search Results
Narrowed by: