by
Ash, Gerald W.
Call Number
658.4038 ASH
Publication Date
2007 2006
Format:
Books
Relevance:
71875.7188
by
Handzic, Meliha.
Call Number
658.4038 22
Publication Date
2004
Summary
This book discusses the role of technology in managingknowledge. Based on the most recent research and experience, the bookbrings together, in a logical sequence, diverse information andcommunication technologies and systems currently seen in knowledgemanagement research and practice, incorporating the most important andrepresentative examples into an integrated framework. With its largelyempirical focus, the book provides much needed evidence regarding thetrue potential of technology for managing knowledge in organizations.
Format:
Electronic Resources
Relevance:
67236.7891
View Other Search Results
by
Contos, Brian T.
Call Number
658.478 P578 22
Publication Date
2007
Summary
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in todays changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader through cases addressing various physical security technologies such as: video surveillance, HVAC, RFID, access controls, biometrics, and more. *This topic is picking up momentum every day with every new computer exploit, announcement of a malicious insider, or issues related to terrorists, organized crime, and nation-state threats *The author has over a decade of real-world security and management expertise developed in some of the most sensitive and mission-critical environments in the world *Enterprise Security Management (ESM) is deployed in tens of thousands of organizations worldwide.
Format:
Electronic Resources
Relevance:
43629.6211
by
Jansky, Libor.
Call Number
333.91 22
Publication Date
2005
Summary
This book aims to further global understanding of approaches and techniques for applying public participation to improve water resources management. Water resources management is the aggregate of policies and activities used to provide clean water to meet human needs across sectors and jurisdictions and to sustain the water-related ecological systems upon which we depend. Knowledge that is crucial for water management is distributed across governments, non-governmental organizations and the water users themselves. In most circumstances, water management aims to address the interests of and int.
Format:
Electronic Resources
Relevance:
41502.2969
by
Betz, Charles T.
Call Number
004 22
Publication Date
2007
Summary
How would you feel if you visited your financial planners office and saw past-due credit card notices on their desk? Would you trust an auto mechanic whose car backfires and produces black smoke? A dentist with bad teeth? A banker in shabby clothes? An interior designer whose offices are a shambles? This is the position of the IT capability in many large organizations. The designated custodian of critical business processes and data does not manage its own processes and data reliably. A response in the form of Enterprise Resource Planning for Information Technology is emerging from major companies, research firms, and vendors; they are labeling these offerings "ERP for IT," IT Resource Planning, and related terms. This groundbreaking, practitioner-authored book provides an independent examination of and response to these developments. An analysis of the large scale IT capability, with specific attention to business processes, structured data, and enabling systems, it is essentially a comprehensive systems architecture, not for the business capabilities IT supports, but for IT itself. Features The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. ABOUT THE AUTHOR: Charles Betz is a Senior Enterprise Architect, and chief architect for IT Service Management strategy for a US-based Fortune 50 enterprise. He has held consultant and architect positions for Best Buy, Target, and Accenture, specializing in metadata, configuration management, IT governance, enterprise application integration, and ERP systems. He holds a summa B.A. in Political Science and a Master of Science in Software Engineering, both from the University of Minnesota. Charlie is an active member of the professional community, belonging to the IT Service Management Forum, IEEE, ACM, and Data Management Association (DAMA). He presents frequently both locally and nationally to professional associations and conferences. He is the sole author of the popular www.erp4it.com weblog. Are you in the thick of sorting out how to make ITIL and COBIT work, and trying to make sense of the dozens of vendors clamoring to help? Are you puzzled over how the ITIL vision for Change Management fits into the reality of your current processes? And how it relates to Enterprise Architecture and Portfolio Management? Is the concept of configuration management and the CMDB giving off more heat than light for you? How can you make it real? Have you found yourself wondering whether you really need an IT portfolio management tool, an enterprise architecture repository, a metadata repository, a service management tool, and a configuration management database (CMDB)? And if you have them, are you wondering if they should be related somehow? The book presents on-the-ground coverage of enabling IT governance in architectural detail, which you can use to define a strategy and start executing. It fills the gap between high-level guidance on IT governance, and detailed discussions about specific vendor technologies. It is a next-step book that answers the question: OK, we need to improve the way we run IT - now what? It does this through: * A unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole * A field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures * Analysis of current system types in the IT governance and enablement domains: integration opportunities, challenges, and evolutionary trends * Patterns for integrating the process, data, and systems views to support specific problems of IT management. * Specific attention throughout to issues of building a business case and real-world implementation. Among the specific topics addressed are: * ITIL recommendations from a practical systems implementation point of view * Configuration management: challenges, misconceptions, myths, and realities. Business justification for. Support for compliance and regulatory goals. * Interrelationships between IT portfolio planning, solutions development, and IT operations * The relationship between application development and hosting (infrastructure) organizations * Business intelligence, performance management, and metrics for the IT capability itself * Detailed, actionable clarification of the vague concept of "IT Service" and all its permutations and implications * IT portfolio degradation through complexity * Detailed models of IT information * The various classes of systems used internally by large scale IT organizations * The concept of "repository" and its relationship to the Configuration Management Database (CMDB) * Process roles and responsibilities. Closed-loop, self-reinforcing processes for IT data management. * Application as critical control point and portfolio entry. Clarifying relationship between "application" and "IT service." Application portfolio management: process, data structures, and systems.
Format:
Electronic Resources
Relevance:
41501.0977
by
Karkala, Ashwin Kumar.
Call Number
005.7585 23
Publication Date
2011
Format:
Electronic Resources
Relevance:
31267.4121
by
Heuvel, Willem-Jan van den.
Call Number
658.4038011 22
Publication Date
2007
Format:
Electronic Resources
Relevance:
2.3236
by
Sharp, Alec.
Call Number
658.4063 22
Publication Date
2009
Summary
This extensively revised second edition of the acclaimed and bestselling book, Workflow Modeling, serves as a complete guide to discovering, scoping, assessing, modeling, and redesigning business processes. Providing proven techniques for identifying, modeling, and redesigning business processes, and explaining how to implement workflow improvement, this book helps you define requirements for systems development or systems acquisition.
Format:
Electronic Resources
Relevance:
2.3112
by
Gates, Bill, 1956-
Call Number
658.4038 GAT
Publication Date
1999
Format:
Books
Relevance:
1.9699
by
Coffing, Tom.
Call Number
005.7565 23
Publication Date
2013
Summary
Annotation 'This book will make every IT/Developer in your company a superstar. This book is designed to teach IT and developers everything they want to know about Teradata while leaving no stone unturned. They are going to see and understand Teradata at a level theyve never understood it before. It is a brilliant way to explain what is happening in Teradata down to the most detailed levels. Like the rest of the Genius Series, it takes a building block approach to allow readers to continually see how the data is laid out, how to design the tables as well as understand the mechanisms that Teradata uses, and understand why Teradata is the best data warehouse in the world.
Format:
Electronic Resources
Relevance:
1.5576
by
Gunasekaran, A.
Call Number
658.4038011 22
Publication Date
2010
Summary
This handbook covers the vast field of business information systems, focusing particularly on developing information systems to capture and integrate information technology together with the people and their businesses. Part I of the book, "Health Care Information Systems", focuses on providing global leadership for the optimal use of health care information technology (IT). It provides knowledge about the best use of information systems for the betterment of health care services. Part II, Business Process Information Systems, extends the previous theory in the area of process develo.
Format:
Electronic Resources
Relevance:
1.2757
by
Saranummi, Niilo.
Call Number
362.1068 22
Publication Date
2005
Summary
Aim to make the European market for telematic healthcare services more cohesive and less fragmented, by developing a model for the preparation of the regional healthcare providers to implement the next generation of secure, user-friendly healthcare networks. It paves the way towards the development of regional healthcare networks.
Format:
Electronic Resources
Relevance:
0.9626
Limit Search Results
Narrowed by: