Although complexity is a phenomenon that confounds and challenges program managers across industry sectors, there is little information available that identifies the set of competencies managers need
The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce—business involvement,
Energy experts predict that wholesale electricity prices could easily rise 35 to 65 percent by 2015. Add to this the growing need for energy independence and the need to reduce carbon emissions and it
In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent
Organization of data warehouses is a vital, but often neglected, aspect of growing an enterprise. Unlike most books on the subject that focus on either the technical aspects of building data warehouse
Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning syste
Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vuln
Structured to follow the software life cycle, Patterns for Performance and Operability provides advice and examples-based instructions at every phase. You can read it from start to finish or go direct
Spectacular security failures continue to dominate the headlines despite huge increases in security budgets and ever-more draconian regulations. The 20/20 hindsight of audits is no longer an effective
Modern error control coding methods based on turbo coding have essentially solved the problem of reliable data communications over noisy channels. Contemporary Coding Techniques and Applications for M
Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-B
Contributors from around the world investigate dimensions of WiMAX network performance, providing information for a professional, technical, and academic audience interested in network planning and op
When used together effectively, computer-aided design (CAD) and geospatial information systems (GIS) have a solid track record for streamlining decision making and reducing inefficiencies in the desig
Process Improvement and CMMIR for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software. Focusing on planning, implementation, an
Effective communication on projects is a challenging, ongoing process for project managers and stakeholders at all levels within an organization. Project managers experience the greatest challenge du
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and pr
Cooperative devices and mechanisms are increasingly important to enhance the performance of wireless communications and networks, with their ability to decrease power consumption and packet loss rate
In order to maximize IT resources and justify IT expenditures, CIO’s and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand. The Bus
Fueled by ongoing and increasing consumer demand, the explosive growth in spectrum-based communications continues to tax the finite resources of the available spectrum. One possible solution, Cognitiv
This book compares enterprise architecture (EA), which can be an all-encompassing model of an organization’s technical (IT) architecture, systems, contents (databases), interfaces, applications, and n