Gain a strong understanding of IT project management as you learn to apply today’s most effective project management tools and techniques with the unique approach found in INFORMATION TECHNOLOGY PROJECT MANAGEMENT, 8E. This book emphasizes the latest developments and skills to help you prepare for the Project Management Professional (PMP) or Certified Associate in Project Management (CAPM) exams. While this edition reflect content from the latest the PMBOK Guide, it goes well beyond the Guide to provide a meaningful context for project management. Hundreds of timely examples highlight IT projects, while quick quizzes, discussion questions, exercises, and ongoing cases reinforce your learning. Time-saving template files assist in completing tasks. Examples from familiar companies featured in today’s news, an Agile case, MindView software, and a guide to using Microsoft Project 2013 help you master IT project management skills that are marketable around the globe.
A clear, actionable blueprint for securing the vital information and IT services of global organizations of all sizes Information Assurance Handbook provides an overall strategy for safeguarding your organization’s critical data. The book presents a body of knowledge and outlines the steps necessary for senior management to effectively work with risk and learn to strategically, systematically, and economically plan for security challenges. You’ll learn how to implement technology, practices, and processes to mitigate and manage risk over time and also how to prevent, detect, contain, and recover from security breaches. The professional practices outlined are essential knowledge for effective security and risk management.Reveals how to predict known–and yet unknown–security risks Invaluable best practices technically vetted by a panel of global security leaders Outlines privacy law and critical standards and practices required to make strategic choices about compliance, risk acceptance, and performance Explains the critical differences between assets, threats, vulnerabilities, and controls to achieve effective decision-making for risk management throughout all levels of the organization
This two-volume set (“CCIS 201” and “CCIS 202”) constitutes the refereed proceedings of the International Conference on Computer Science and Education, CSE 2011, held in Qingdao, China, in July 2011. The 164 revised full papers presented in both volumes were carefully reviewed and selected from a large number of submissions. The papers address a large number of research topics and applications: from artificial intelligence to computers and information technology; from education systems to methods research and other related issues; such as: database technology, computer architecture, software engineering, computer graphics, control technology, systems engineering, network, communication, and other advanced technology, computer education, and life-long education.