IT Manager's Handbook
|
|
|
- Patrick Golden
- 10 years ago
- Views:
Transcription
1 IT Manager's Handbook Getting your new job done Third Edition Bill Holtsnider Brian D. Jaffe AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an Imprint of Elsevier
2 Contents About the Authors Brief Table of Contents Key Changes for This Edition Preface vii ix xxi xxiii CHAPTER 1 The Role of an IT Manager Just What Does an IT Manager Do? 2 Why All That Change and Flexibility Is Good 2 Why All That Change and Flexibility Is Bad Managers in General 3 Definition of a Manager 3 Styles of Management 3 Pros and Cons of Being a Manager: Reasons to Become a Manager, and Reasons Not to Become One 5 The Hidden Work of Management 6 Resentment toward Management 7 Babysitting versus Managing 7 Politics 7 Managing in Four Directions The Strategic Value of the IT Department 8 Application Development versus Technical Operations 9 IT Department Goals 10 The Value of IT Managers Developing an IT Strategy 10 Determine Who Your Team Members Are 11 Determine How Important Technology Is to Your Organization 11 Determine Who Your Customers Are and What Their Needs Are 12 Keep Your Department Central to the Company's Operations Leadership versus Management Starting Your New Job 14 The First Day 14 Meeting the Staff 14 A Few Ideas for What to Say to Break the Ice 15 Some Don'ts 15 One-on-One Meetings 15 What to Say to Those Who Wanted Your Job and Didn't Get It 16 Establish a Relationship with Your Manager and Your Peers 17 Learning the Landscape: Key Users and Key Applications 18 xi
3 1.7 The First 100 Days 20 No Organization Is Perfect 20 Quietly Advertising What You Bring to the Table 21 Projects in Progress and Projects on the Horizon 22 Is the Status Quo Good Enough? 23 People to Meet and Know 24 Quick Introductory Meetings 24 Human Resource Issues 25 Budgeting 26 Making Those First Decisions Two IT Departments What Happens If Your Company Merges with Another? 27 CHAPTER 2 Managing Your IT Team Keeping Employees Focused 32 Establish Priorities 32 Communicate with Your Team 32 Company Mission, Vision, and Values 34 Be as Clear as Possible about Your Real Priorities 35 Avoid Burnout in Your Employees 35 Make Your Employees Aware of the Dangers of Burnout 36 Deal with the Situation 36 Managing Remote Workers (or Teleworkers) Employee Training 39 Cost 39 Need 39 Scheduling Demands 40 Employee Morale 40 How Do You Know When Your Employees Need Training? 40 Certification 41 What If the Employee Takes a Training Class and Then Uses His New-Found Skills to Find Another Job? 41 Nontechnical Training 42 Maximizing the Value of Training Employee Performance 43 Performance Reviews 43 Key Areas of Evaluation 44 Specific Evaluation Statements 47 Guidelines for Reviews 48 Negative Reviews 49 Have Employees Review Themselves Reviews 51
4 Contents xiii How to Conduct the Actual Review Discussion 52 Development Plans and Goals 52 Salary Review 53 Disciplinary Problems and Terminations Generational Issues at Work 57 Managing across Generations 58 CHAPTER 3 Staffing Your IT Team Why IT Managers Need to Deal with Hiring People 65 Human Resources Department's Role 66 Justifying a Hire 67 Start with Internal and External Referrals 68 Internal versus External Hires 68 Should You Hire a Full-Time Employee or a Consultant? Write a Position Description 74 Position Descriptions versus Contracts 75 General Requirements 75 Advertising Options Recruiters 79 Finding the Right Recruiter Selecting Candidates 83 Reviewing Resumes 83 Telephone Screening 84 At What Level Should I Interview? 84 Narrowing Down the List 84 General Interview Guidelines 86 Prepare a List of Questions 87 Who Else Should Interview a Candidate? 88 Key Concepts for a Good Technical Interview 89 Rank Criteria 93 The Value of Certification 94 Education 95 Checking References 97 Common Hiring Mistakes 98 Offering the Correct Salary for an IT Position 99 CHAPTER 4 Project Management Projects and Project Management: A Quick Overview 104 Different Kinds of Projects 104 The Value of Project Management 104 Five Key Phases to a Project 104 Do You Have to Be a Certified Project Manager to Run a Project? 105
5 xiv Contents The Project Management Institute (PMI) 105 A Project Management Office Phase One: Scope the Project 106 Clearly Define the Project's Objective and Scope to Avoid Scope Creep 106 Department versus Company Objectives 107 Get Proper Sponsorship for the Project 107 Identify the Stakeholders 108 Identify the Constraints, Interdependencies, and Risks 109 The Project Charter 110 Get Historical Perspective Phase Two: Develop a Project Plan Ill Three Critical Components to Any Project Write the Project Plan with the Closeout Report in Mind 112 Time Estimates 112 Resources Required: Employees (Internal and External to IT) 113 Money 114 Roles and Responsibilities 115 Multiple Projects Phase Three: Launch the Project 116 Range of Launch Options Stage a Kick-Off Meeting Phase Four: Track the Project's Progress 117 Microsoft Project 117 Other Project Management Tools 118 Gantt Charts and Time Lines 118 PERT Charts and Critical Paths 118 Project Milestones 119 Updates to Management Ill and the Team Phase Five: Close Out the Project 121 Writing a Closeout Report Decision-Making Techniques 122 Four Types of Decision-Making Methods What to Do If/When the Project Gets Off Track 123 Some Issues out of Your Control 124 When a Project Gets behind Schedule 124 Your Project Is Costing More Than Expected Useful Project Management Techniques 126 Project Teams 126 Create a War Room 126 Formalized Project Frameworks 127
6 Contents xv Participate in the Project Yourself 127 Offer Project Perks 127 Give Your Project a Code Name 127 Productive Project Meetings Funding Projects 130 Estimating Costs: Go High 130 Projects Always Cost More Than Estimated 131 Exactly Who Is Going to Pay for It? 131 Justifying the Costs Multiple Projects: How to Juggle Them Well 132 You Will Have Multiple Projects Dealing with Non-IT Departments on a Project 133 Motivating Employees outside of Your Department 133 Who Is in Charge? 133 CHAPTER 5 Software, Operating Systems, and Enterprise Applications Types of Software Operating Systems 137 Windows 137 Mac 137 Unix Variants and Linux 138 Choosing an Operating System 138 Multiple Operating Systems Open Source 141 Definition 141 Cost Managing Software 142 Total Cost of Ownership (TCO) 142 Software Management Techniques 142 Software -. Licensing ^ 144 Licensing Issues Cloud Computing 148 The Many Flavors of Cloud Computing 148 Private versus Public Cloud 149 Considerations When Moving to the Cloud Enterprise Applications Managing 153 Unified Messaging 155 Directory Services 156
7 xvi Contents 5.7 Enterprise Resource Planning (ERP) 157 The Value of ERP Software 157 General ERP Implementation Issues 157 Costs of Implementing ERP 158 Major Changes Required 158 It Isn't Only IT's Decision 158 Disadvantages to ERP 159 CHAPTER 6 Managing the Money The Budgeting Process 161 Possible Budget Items 162 Chargebacks Who Really Pays? 164 Reviewers for Your Budget 164 Estimating (and Overestimating) Your Numbers 165 Getting Approval and Defending Your Budget 165 During the Year: Tracking and Revising Your Budget The Difference between Capital Expenditures and Operating Expense Items 167 Capital Expenditure Details 167 Check with Your Company's Policies 168 Gray Areas Lease versus Buy: Which One Is Better? 168 Leasing 169 Who Makes This Decision? Other Budgeting Factors to Consider 170 Growth of Your Department's Workload 170 Technological Change 171 Staff 171 Software Maintenance 171 Hardware Maintenance Managing Vendors 173 Establish a Relationship 173 Help Your Vendors 174 Request for Proposals 174 Get Multiple Bids 175 Set Up a Trial 175 Reviewing Contracts with Vendors 175 Evaluating Alternatives 176 Set Up a Matrix Managing the Money during Difficult Times 179
8 Managing Costs Leverage IT for Increased Business Value 180 Demonstrating Leadership Outsourcing and Offshoring 182 Offshore Outsourcing Overview Which Functions to Outsource 184 Does Outsourcing Make Sense? CHAPTER 7 Getting Started with the Technical Environment The Technical Environment 189 What Do We Have Here? 189 Define Your Scope 190 The Elements 190 Tools for Tracking the Technical Environment 194 The Value of Good Infrastructure Documentation 195 What You May Find Understanding the User Environment TCO and Asset Management: What Are They? 196 Total Cost of Ownership 197 Asset Management Standards 199 Issues That Users Care About 199 Issues That IT Cares About 200 Standards for IT Technology Refreshing CHAPTER 8 Security and Compliance How We Got Here 206 Get Perspective 206 Computer Security Themes Managing Security Action 1: Evaluate Your Environment's Needs, Exposures, and Defenses 209 Action 2: Get Upper Level Management Buy-In 212 Action 3: Mitigate the Risks 212 Action 4: Work with Users to Make Everyone More Secure 213 Action 5: Remember That Security Is an Ongoing Process Security Solutions and Technologies 214 Tracking and Controlling Access 214 Authentication 219 Security Defenses 220 Security Incident Response 223
9 8.4 Types of Threats 224 Malware 224 Phishing and Social Engineering Compliance and IT 226 Overview 226 Victims of Non-Compliance The Rules 227 Sarbanes-Oxley 227 Health Insurance Portability and Accountability Act (HIPAA) 228 Basel II 229 SB Massachusetts Data Protection Law 230 Fair and Accurate Credit Transactions Act (FACTA) 231 Gramm-Leach-Bliley 231 U.S. Securities 232 Patriot Act 232 Dodd-Frank Act 233 Office of Foreign Assets Control (OFAC) 233 CLERP-9 (Australia) 233 Personal Information Protection and Electronic Documents Act (PIPEDA) 233 Privacy and Electronic Communications Directive (European Union) 234 Data Protection Directive (European Union) How to Comply with the Rules 234 Document the Policies 235 Identify Control Mechanisms 236 Educate Employees 236 Maintain Evidence Hidden Benefits of Compliance 237 The Hidden Benefit of Documentation 237 The Hidden Benefit of Control Mechanisms 237 The Hidden Benefit of Educating Your Employees 237 Hidden Benefits of Maintaining Evidence Methodologies and Frameworks 238 IT Governance 238 Committee of Sponsoring Organizations (COSO) 239 Control Objectives for Information and Related Technology (COBIT) 239 IT Infrastructure Library (ITIL) 240 Capability Maturity Model Integration (CMMI) 240 International Organization for Standards (ISO 9000) 240 Six Sigma 241
10 Contents xix 8.10 It's Not Just Regulatory Compliance 242 Electronic Discovery 242 Information and Records Retention 242 Working with Auditors Disaster Recovery and Business Continuity 243 Definition of Policies and Procedures Outsourcing 244 CHAPTER 9 Disaster Recovery Defining the Scope 248 Key Questions 248 Recovery Time and Recover Point Objectives 249 Disaster Recovery Committee Application Assessment The Value of Your Data 9.2 Creating a Disaster Recovery Plan Communication Plan Documentation Real Estate and IT Facilities Off-Site Storage of Data Hardware Availability 257 Regular Updating and Testing 257 After the Disaster Regional and Catastrophic Disasters 259 The ACT Model 9.3 A Word about Incident Response, Business Continuity, and Disaster Recovery The Hidden Benefits of Good Disaster Recovery Planning CHAPTER 10 Working with Users Relationships with Users Who Are Your Users? Find Out Who Your Department Thinks Its Users Are 264 Find Out Who Your Boss Thinks Your Users Are 265 Meet the Users 265 Being Available and Reachable 266 Sharing Information 266 Collecting Information 267 Proactive Solutions 268 Being Flexible 270 User Training 270
11 xx Contents 10.2 The Consumerization of IT 271 How to Deal with Consumerization 272 Support Issues Associated with Consumerization and Handheld Devices 272 Bring Your Own (BYO) Policies When Your Users Are Part of a Mobile Work Force 274 Techniques for Supporting Your Mobile Users The Help Desk 275 Typical Help Desk Activities 276 Procedures 276 Access 277 Self-Service 277 Tools 278 User Surveys 280 Measuring the Help Desk Workload 281 Staffing Service Level Agreements 283 Positive Values of SLAs 283 Ask for Help from Your Staff 283 Writing Good SLAs 284 CHAPTER 11 Connectivity: Social Media, Handhelds, and More Get in Front of the Curve 288 The Blurry Line between Company-Owned and Personally-Owned Equipment 288 (BYO Policies) 289 The New Technologies of Connectedness Benefits and Challenges of Connectivity 290 Dealing with a Lot More Empowered Users 292 Wisdom of Crowds The Power of All These Connections 293 How Companies Use the Web 293 How Companies Use Intranets 294 How Companies Use Social Media and Mobile Devices 295 Mobile Device Operating Systems, Apps, and Hardware 296 Handheld Hardware How Does This Affect You as IT Manager? 298 Lead, Encourage, and Experiment 298 It's Not the Tools, But How They Are Used 299 Remember Your Goals 301 What Is "Focused" and What Is "Distracted"? 301 Glossary 305 Index 317
IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN
i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann
Agile Development & Business Goals. The Six Week Solution. Joseph Gee. George Stragand. Tom Wheeler
Agile Development & Business Goals The Six Week Solution Bill Holtsnider Tom Wheeler George Stragand Joseph Gee AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
Managing the Unmanageable
Managing the Unmanageable Rules, Tools, and Insights for Managing Software People and Teams MICKEY W. MANTLE RON LICHTY VVAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York
Master Data Management
Master Data Management David Loshin AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO Ик^И V^ SAN FRANCISCO SINGAPORE SYDNEY TOKYO W*m k^ MORGAN KAUFMANN PUBLISHERS IS AN IMPRINT OF ELSEVIER
Risk Analysis and the Security Survey
Risk Analysis and the Security Survey Fourth Edition James F. Broder Eugene Tucker ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann
Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER
Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso
Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann
Human Performance Improvement
Human Performance Improvement Building Practitioner Competence Second Edition William J. Rothwell Carolyn K. Hohne Stephen B. King ELoEVIElx AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN
Network Security: A Practical Approach. Jan L. Harrington
Network Security: A Practical Approach Jan L. Harrington ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of
Measuring Data Quality for Ongoing Improvement
Measuring Data Quality for Ongoing Improvement A Data Quality Assessment Framework Laura Sebastian-Coleman ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
Big Data Analytics From Strategie Planning to Enterprise Integration with Tools, Techniques, NoSQL, and Graph
Big Data Analytics From Strategie Planning to Enterprise Integration with Tools, Techniques, NoSQL, and Graph David Loshin ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN
Managing Data in Motion
Managing Data in Motion Data Integration Best Practice Techniques and Technologies April Reeve ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY
Executive's Guide to
Executive's Guide to IT Governance Improving Systems Processes with Service Management, COBIT, and ITIL ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Contents Preface xiii PART I: IT GOVERNANCE CONCEPTS
Data Warehousing in the Age of Big Data
Data Warehousing in the Age of Big Data Krish Krishnan AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD * PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of Elsevier
Security Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan
Security Metrics A Beginner's Guide Caroline Wong Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents FOREWORD
Job Hazard Analysis. A Guide for Voluntary Compliance and Beyond. From Hazard to Risk: Transforming the JHA from a Tool to a Process
Job Hazard Analysis A Guide for Voluntary Compliance and Beyond From Hazard to Risk: Transforming the JHA from a Tool to a Process James E. Roughton Nathan Crutchfield E L S E V I E R AMSTERDAM. BOSTON.
Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO
Federal Cloud Computing The Definitive Guide for Cloud Service Providers Matthew Metheny ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO
Implementing the Project Management Balanced Scorecard
Implementing the Project Management Balanced Scorecard Jessica Keyes CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an informa business
Network Security. Windows 2012 Server. Securing Your Windows. Infrastructure. Network Systems and. Derrick Rountree. Richard Hicks, Technical Editor
Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure Derrick Rountree Richard Hicks, Technical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN
Gobierno de TI Enfrentando al Reto. IT Governance Facing the Challenge. Everett C. Johnson, CPA International President ISACA and ITGI
Gobierno de TI Enfrentando al Reto IT Facing the Challenge Everett C. Johnson, CPA International President ISACA and ITGI 1 Add titles Agenda Agenda IT governance keys IT governance focus areas: theory
How To Write A Diagram
Data Model ing Essentials Third Edition Graeme C. Simsion and Graham C. Witt MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF ELSEVIER AMSTERDAM BOSTON LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
Configuration. Management for. Senior Managers. Essential Product Configuration. and Lifecycle Management
Configuration Management for Senior Managers Essential Product Configuration and Lifecycle Management for Manufacturing Frank B. Watts ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS
CIMA'S Official Learning System
cima CIMA'S Official Learning System Strategic Level Paul M. Collier Sam Agyei-Ampomah ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Contents
Helping Midsize Businesses Grow Through HR Technology
Helping Midsize Businesses Grow Through HR Technology As a business grows, the goal of streamlining operations is increasingly important. By maximizing efficiencies across the board, employee by employee,
Governance Simplified
Information Security Governance Simplified From the Boardroom to the Keyboard TODD FITZGERALD, cissp; cisa, cism Foreword by Tom Peltier CRC Press Taylor & Francis Croup Boca Raton London NewYork CRC Press
Customer Relationship Management
Customer Relationship Management Concepts and Technologies Second edition Francis Buttle xlloillvlcjx. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY
Securing SQL Server. Protecting Your Database from. Second Edition. Attackers. Denny Cherry. Michael Cross. Technical Editor ELSEVIER
Securing SQL Server Second Edition Protecting Your Database from Attackers Denny Cherry Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON ELSEVIER NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
Measuring and. Communicating. Security's Value. A Compendium of Metrics. for Enterprise Protection
Measuring and Communicating Security's Value A Compendium of Metrics for Enterprise Protection George Campbell AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
PROJECT MANAGEMENT PROFESSIONAL CERTIFIED ASSOCIATE IN PROJECT MANAGEMENT (PMP & CAPM) EXAM PREPARATION WORKSHOP
TSE015 PROJECT MANAGEMENT PROFESSIONAL CERTIFIED ASSOCIATE IN PROJECT MANAGEMENT (PMP & CAPM) EXAM PREPARATION WORKSHOP Course Outline I. Introduction and Course Objectives A. About PMI B. PMP and CAPM
AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO
DW2.0 The Architecture for the Next Generation of Data Warehousing W. H. Inmon Forest Rim Technology Derek Strauss Gavroshe Genia Neushloss Gavroshe AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS
Cloud Computing. Theory and Practice. Dan C. Marinescu. Morgan Kaufmann is an imprint of Elsevier HEIDELBERG LONDON AMSTERDAM BOSTON
Cloud Computing Theory and Practice Dan C. Marinescu AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO M< Morgan Kaufmann is an imprint of Elsevier
AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Academic Press is an imprint of Elsevier
Emerging Market Bank Lending and Credit Risk Control Evolving Strategies to Mitigate Credit Risk, Optimize Lending Portfolios, and Check Delinquent Loans Leo Onyiriuba ELSEVIER AMSTERDAM BOSTON HEIDELBERG
THE COMPLETE PROJECT MANAGEMENT METHODOLOGY AND TOOLKIT
THE COMPLETE PROJECT MANAGEMENT METHODOLOGY AND TOOLKIT GERARD M. HILL CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an informa business
Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier
Penetration Tester's Open Source Toolkit Third Edition Jeremy Faircloth Neil Fryer, Technical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS. SAN DIEGO SAN FRANCISCO. SINGAPORE SYDNEY
Virtualization and Forensics
Virtualization and Forensics A Digital Forensic Investigator's Guide to Virtual Environments Diane Barrett Gregory Kipper Technical Editor Samuel Liles ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK
Metrics and Methods for Security Risk Management
Metrics and Methods for Security Risk Management Carl S. Young ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Syngress is an imprint of
AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Academic Press is an imprint of Elsevier
Trading and Money Management in a Student-Managed Portfolio Brian Bruce Jason Greene ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Academic
Practical Web Analytics for User Experience
Practical Web Analytics for User Experience How Analytics Can Help You Understand Your Users Michael Beasley UX Designer, ITHAKA Ypsilanti, Michigan, USA üf IBs fmij ELSEVIER Amsterdam Boston Heidelberg
Project Management Concepts, Methods, and Techniques
Project Management Concepts, Methods, and Techniques Claude H. Maley Uffi\ CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Valvation. Theories and Concepts. Rajesh Kumar. Professor of Finance, Institute of Management Technology, Dubai, UAE
Valvation Theories and Concepts Rajesh Kumar Professor of Finance, Institute of Management Technology, Dubai, UAE ELSEVIER AMSTERDAM BOSTON CAMBRIDGE HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN
Program Lifecycle Methodology Version 1.7
Version 1.7 March 30, 2011 REVISION HISTORY VERSION NO. DATE DESCRIPTION AUTHOR 1.0 Initial Draft Hkelley 1.2 10/22/08 Updated with feedback Hkelley 1.3 1/7/2009 Copy edited Kevans 1.4 4/22/2010 Updated
Project Management and ITIL Transitions
Project Management and ITIL Transitions April 30 th 2012 Linda Budiman Director CSC 1 Agenda Thought Leadership: Linda Budiman What is ITIL & Project Management: Applied to Transitions Challenges & Successes:
PART A: OVERVIEW...1 1. INTRODUCTION...1 2. APPLICABILITY...1 3. OBJECTIVE...1 PART B: LEGAL PROVISIONS...2 4. LEGAL PROVISIONS...
PART A: OVERVIEW...1 1. INTRODUCTION...1 2. APPLICABILITY...1 3. OBJECTIVE...1 PART B: LEGAL PROVISIONS...2 4. LEGAL PROVISIONS...2 PART C: POLICY...2 5. SCOPE OF ACTIVITIES THAT CAN BE OUTSOURCED...2
Contents. iii. ix xi xi xi xiii xiii xiii xiv xv xvi xvii xix
What s New in Microsoft Office Project 2003 Getting Help Getting Help with This Book and Its CD-ROM Getting Help with Microsoft Office Project 2003 Using the Book s CD-ROM What s on the CD-ROM System Requirements
The Data Access Handbook
The Data Access Handbook Achieving Optimal Database Application Performance and Scalability John Goodson and Robert A. Steward PRENTICE HALL Upper Saddle River, NJ Boston Indianapolis San Francisco New
Master Data Management and Data Governance Second Edition
Master Data Management and Data Governance Second Edition Alex Berson Larry Dubov Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore
I D C E V E N T P R O C E E D I N G S
I D C E V E N T P R O C E E D I N G S As i a / P a c i f i c Perspecti ve s : N a vi g a t i n g t h e D a t a c e n t e r Security I m p e r a t i ve September 2014 By Chuang Shyne-Song; Program Director,
INTERNATIONAL MONEY AND FINANCE
INTERNATIONAL MONEY AND FINANCE EIGHTH EDITION MICHAEL MELVIN AND STEFAN C. NORRBIN ELSEVIER Amsterdam Boston Heidelberg London New york Oxford Paris San Diego San Francisco Singapore Sydney Tokyo Academic
SOFTWARE TESTING AS A SERVICE
SOFTWARE TESTING AS A SERVICE ASHFAQUE AHMED (g) CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business AN AUERBACH BOOK
From Big Data to Big Profits SUCCESS WITH DATA AND ANALYTICS. Russell Walker OXFORD UNIVERSITY PRESS
From Big Data to Big Profits SUCCESS WITH DATA AND ANALYTICS Russell Walker OXFORD UNIVERSITY PRESS Contents Foreword xiii Preface xvii Acknowledgments xix Introduction xxi Definitions of Concepts and
RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title
RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference
PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA
Chapter-4: Business Continuity Planning and Disaster Recovery Planning PAPER-6 PART-5 OF 5 CA A.RAFEQ, FCA Learning Objectives 2 To understand the concept of Business Continuity Management To understand
Business Continuity Planning. Description and Framework. White Paper. Preface. Contents
Comprehensive Consulting Solutions, Inc. Business Savvy. IT Smart. Business Continuity Planning White Paper Published: April 2001 (with revisions) Business Continuity Planning Description and Framework
Hacking Web Apps. Detecting and Preventing Web Application Security Problems. Jorge Blanco Alcover. Mike Shema. Technical Editor SYNGRESS
Hacking Web Apps Detecting and Preventing Web Application Security Problems Mike Shema Technical Editor Jorge Blanco Alcover AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
C ONTENTS. Acknowledgments
kincaidtoc.fm Page vii Friday, September 20, 2002 1:25 PM C ONTENTS Preface Acknowledgments xxi xxvii Part 1 CRM: Is It Right for Your Company? 1 Chapter 1 Commerce in the 21st Century 3 1.1 Understanding
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Helping municipalities leverage IT to realize maximum value. Information Technology Management and Leadership Professional Certification (ITMLP)
Information Technology Management and Leadership Professional Certification (ITMLP) Curriculum The Institute for Business Technology and Innovation A Division of InvOrg Cloud Computing Management Cloud
HANDBOOK OF CORPORATE FINANCE
HANDBOOK OF CORPORATE FINANCE A business companion to financial markets, decisions & techniques 2nd edition Glen Arnold Financial Times Prentice Hall is an imprint of Harlow, England London New York Boston
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Assessing Your Information Technology Organization
Assessing Your Information Technology Organization Are you running it like a business? By: James Murray, Partner Trey Robinson, Director Copyright 2009 by ScottMadden, Inc. All rights reserved. Assessing
Cloud Computing and Data Center Consolidation
Cloud Computing and Data Center Consolidation Charles Onstott, PMP Chief Technology Officer, Enterprise IT Services SAIC Steven Halliwell General Manager for State and Local and Education Sales Amazon
Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Brochure More information from http://www.researchandmarkets.com/reports/3302152/ Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO 27000 / HIPAA / SOX / CobiT /
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Preparing for the Worst: Disaster Recovery and Business Continuity Planning for Investment Firms An Eze Castle Integration ebook
Preparing for the Worst: Disaster Recovery and Business Continuity Planning for Investment Firms An Eze Castle Integration ebook Table of Contents 1. Introduction to Business Continuity Planning and Disaster
AL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
MANAGING INFORMATION TECHNOLOGY PROJECTS
MANAGING INFORMATION TECHNOLOGY PROJECTS Kathy Schwalbe, Ph.D., PMP Augsburg College ; \ COURSE TECHNOLOGY»% CENGAGE Learning- Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United
AVANTGARD Private Cloud and Managed Services
AVANTGARD Private Cloud and Managed Services AVANTGARD PRIVATE CLOUD AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and
LOCAL GOVERNMENT MANAGEMENT ASSESSMENT OVERVIEW AND QUESTIONNAIRE
LOCAL GOVERNMENT MANAGEMENT ASSESSMENT OVERVIEW AND QUESTIONNAIRE The Comptroller s Economic Development and Analysis (EDA) Division provides education and direct assistance to local governments, helping
Trends in Information Technology (IT) Auditing
Trends in Information Technology (IT) Auditing Padma Kumar Audit Officer May 21, 2015 Discussion Topics Common and Emerging IT Risks Trends in IT Auditing IT Audit Frameworks & Standards IT Audit Plan
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Any successful software implementation is dependent upon
Best Practices for Selecting Governance Risk and Compliance Software By Shannan Layette, Pete McAteer and Buddy Doyle Any successful software implementation is dependent upon selecting the right vendor
Private Equity and Venture Capital in Europe
Private Equity and Venture Capital in Europe Markets, Techniques, and Deals Stefano Caselli AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO ELSEVIER
Supply Chain Strategies
Supply Chain Strategies Customer-driven and customer-focused Tony Hines ELSEVIER BUTTERWORTH HEINEMANN AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY
PMP Examination Tasks Puzzle game
PMP Examination Tasks Puzzle game Here is a great game to play to test your knowledge of the tasks you will be tested on in the actual examination. What we have done is take each of the domain tasks in
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization
Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements
This page was left intentionally blank.
This page was left intentionally blank. Workforce Planning Model Steps What This Step Accomplishes 1. Define the Scope Determines our focus could be long or short term could be a specific business unit
Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York
Software Project Management A Process-Driven Approach Ashfaque Ahmed CRC Press Taylor Si Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Croup, an Informa business
Agile Development & Business Goals
Agile Development & Business Goals About the Authors Bill Holtsnider is an experienced writer, educator, and software professional with more than 26 years of experience working in the computer industry.
Eye Tracking in User Experience Design
Eye Tracking in User Experience Design Jennifer Romano Bergstrom, Ph.D Andrew Jonathan Schall i'p-&>,' JDIIL ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW Y0RK * OXFORD * PARIS * SAN DIEGO SAN FRANCISCO
Ctfo MANAGEMENT SECURITY PATCH. Felicia M. Nicastro. Second Edition. CRC Press. VC#*' J Taylor & Francis Group / Boca Raton London New York
SECURITY PATCH MANAGEMENT Second Edition Felicia M. Nicastro Ctfo CRC Press VC#*' J Taylor & Francis Group / Boca Raton London New York CRC Press Is an imprint of the Taylor & Francis Croup, an Informa
PMP Project Management Professional Study Guide, Third Edition
PMP Project Management Professional Study Guide, Third Edition Joseph Phillips McGraw-Hill is an independent entity from the Project Management Institute, Inc. and is not affiliated with the Project Management
AVANTGARD Hosting and Managed Services
AVANTGARD Hosting and Managed Services AVANTGARD HOSTING AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and industry leading
Based on 2008 Survey of 255 Non-IT CEOs/Executives
Based on 2008 Survey of 255 Non-IT CEOs/Executives > 50% Ranked ITG as very important > 75% of businesses consider ITG to be an integral part of enterprise governance, but the overall maturity level is
The Clear Path to ITIL Certification
THE CLEAR PATH TO IT SERVICE MANAGEMENT The Clear Path to ITIL Certification Understanding the clear path to business value ITIL is a registered trade mark of AXELOS CONTENTS 1 1 2 2 3 4 4 Executive Summary
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
Practical Intrusion Analysis
Practical Intrusion Analysis PREVENTION AND DETECTION FOR THE TWENTY-FIRST CENTURY Ryan Trost TT Ar Addison-Wesley Upper Saddle River, NJ Boston Indianapolis * San Francisco New York Toronto Montreal London
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA
^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS KOGAN PAGE London and Sterling, VA Contents Foreword by Nigel Turnbull How to use this book
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
