This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availabi
Roughly half of all project managers have to lead customer projects as profit centers on contractor side with two big objectives: making the customer happy and bringing money home. Customer projects a
Executives should not necessarily know the intricacies of project management, but they should know how project management, as a discipline, can benefit the organization in implementing its strategies
This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information inf
This book presents a unique approach of change management in the language of project and process managers. The first part of this book presents the concept of change management, its players, strategie
In addition to laying the foundation for today’s online security industry, PKC made encryption technologies accessible to individuals and companies. In view of the many achievements of PKC, it should
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15
Today's graduates should be grounded in the basics of personal finance and possess the skills and knowledge necessary to make informed decisions and take responsibility for their own financial well-be
Many enterprises are moving their applications and IT services to the cloud. Better risk management results in fewer operational surprises and failures, greater stakeholder confidence and reduced regu
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive s
There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to
Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human histo
This book aims to help the reader better understand the importance of data analysis in project management. Moreover, it provides guidance by showing tools, methods, techniques and lessons learned on h
Knowing your market ahead of time can make for considerable savings and profit for those who can capture a market with their projects. The present book provides an in-depth description of the marketin
Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author fo
This comprehensive reference uses a formal and standard evaluation technique to show the strengths and weakness of more than 60 software development methodologies such as agile, DevOps, RUP, Waterfall
Solid requirements engineering has increasingly been recognized as the key to improved, on-time, and on-budget delivery of software and systems projects. This textbook provides a comprehensive treatme