Catalog Search Results
Author
Publisher
O'Reilly Media
Pub. Date
c2012
Description
"The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the screens and speakers we hold dear. Just as we have grown morbidly obese on sugar, fat, and flour--so, too, have we become gluttons for texts, instant messages, emails, RSS feeds, downloads, videos, status updates, and tweets.We're all battling a storm of distractions, buffeted with...
Author
Description
Ce livre vient répondre à un besoin observé: comment rédiger et présenter un plan de communication. En effet, le plan de communication prend autant de formes qu'il y a de professionnels qui en rédigent. Si la littérature abonde sur les étapes de planification en communication, peu d'ouvrages abordent la rédaction et la présentation d'un plan de communication N'ayant pas la prétention des ouvrages plus complets sur le sujet, Plan de communication:...
3) Ordenadores
Author
Description
La información de este libro electrónico sobre diversos aspectos de los ordenadores, los periféricos y temas afines está organizada en 21 capítulos de unas 500-600 palabras cada uno. Espero que sea de interés para quienes se interesan por los ordenadores, Internet, los periféricos, la electrónica y su uso práctico. Como ventaja añadida, le concedo permiso para utilizar el contenido en su propio sitio web o en sus propios blogs y boletines,...
Author
Description
Pourquoi s'intéresser à la notion des genres de documents dans le contexte actuel des sciences de l'information ? Parce qu'elle recèle un grand potentiel en matière d'identification et de traitement de l'infor-mation écrite produite dans les organisations. Au-delà de la forme et du contenu généralement reconnus aux fins d'organisation et de conservation, la notion des genres de documents intègre les aspects particuliers des documents. Reflétant...
Author
Description
A Manager's Guide to Safeguarding Sensitive Information Properly is a quick reference guide on the 12 SSIP Rules managers should be aware of in respect to safeguarding sensitive information properly at their company. This guide is a companion to "An Employee's Guide to Safeguarding Sensitive Information Properly." Sean Lowther who designed and implemented the information security awareness program at Bank of America from 1999 to 2006 is the author...
Author
Description
Learn how to effectively run large IT systems such that they work well and create happy customers. A complement to ITIL, the authors cover everything from technology to process to organization design. Many IT organizations suffer from poor system and service quality with costly consequences. Every day it seems there's a new media report of a system failure damaging a company's bottom line or reputation. Don't let your business be next. Achieving IT...
Author
Description
Show me a company with weak cybersecurity and I will show you a company with lackluster corporate governance, anemic C-suite leadership and head-in-the-sand operations. That is why there is a new, specialized and complex business demand in the corporate world: cybersecurity due diligence. Cybersecurity due diligence is rapidly becoming a critical factor of the decision-making calculus for a corporation contemplating a merger, acquisition, asset purchase...
Author
Description
Firms with superior IT governance have more than 25% higher profits than firms with poor governance given the same strategic objectives. These top performers have custom designed IT governance for their strategies. Just as corporate governance aims to ensure quality decisions about all corporate assets, IT governance links IT decisions with company objectives and monitors performance and accountability. Based on a study of 250 enterprises worldwide,...
Author
Description
A Delusional Technology Syndrome (Chapter 1) has facilitated the manifestation of Digital Data Disorders (Chapter 2) that are impacting our lives in very negative ways and thus driving the need for an Information Integrity Imperative for the twenty first century (Chapter 3). There is a new way forward and a new day to prosper that I will cover in the Road to Recovery (Chapter 4). I hope you will gain insight from reading this book and will share your...
Author
Description
Big data, and information more generally, is big business and top of mind in this era of cyber security as the vision of an integrated world moves from science fiction to a day-to-day reality. There are no trivial answers to managing this burgeoning resource even though there are a myriad of point solutions. Since 2006, MIKE2.0 has acted as a free resource for information professionals bringing together best practices in methods, techniques and benchmarking....
Author
Description
Ce manuel, le seul en langue française à proposer une approche de nature pratique sur le sujet, présente une introduction à l'analyse et à la représentation documentaires. Réalisé à l'intention des étudiants en sciences de l'information et de la documentation, il est axé sur les opérations d'analyse, les langages utilisés pour représenter les sujets, les politiques et les normes ainsi que le contrle de qualité.
Author
Description
"Web 2.0" is the portion of the Internet that's interactively produced by many people; it includes Wikipedia, Facebook, Twitter, Delicious, and prediction markets. In just a few years, Web 2.0 communities have demonstrated astonishing levels of innovation, knowledge accumulation, collaboration, and collective intelligence.
Now, leading organizations are bringing the Web's novel tools and philosophies inside, creating Enterprise 2.0. In this book,...
Author
Description
Stay Cyber Safe: What Every CEO Should Know About Cybersecurity is your jargon-free guide to understanding the cyber threats you face each day. In this brief book, authors JT Kostman and Brian Gallagher introduce CodeLock™ – a revolutionary approach to cybersecurity that provides what the U.S. Department of Homeland Security (DHS) describes as being able to "stop the most sophisticated criminal malware." They will also offer you affordable, practical,...
Author
Description
Your company's data has the potential to add enormous value to every facet of the organization -- from marketing and new product development to strategy to financial management. Yet if your company is like most, it's not using its data to create strategic advantage. Data sits around unused -- or incorrect data fouls up operations and decision making.
In Data Driven, Thomas Redman, the "Data Doc," shows how to leverage and deploy data to sharpen your...
15) Summary, Analysis & Review of Gene Kim's, Jez Humble's, Patrick Debois's, & John Willis's The DevOps
Author
Description
Summary, Analysis & Review of Gene Kim's, Jez Humble's, Patrick Debois's, & John Willis's The DevOps Handbook by Instaread Preview: The DevOps Handbook: How to Create World-Class Agility, Reliability, & Security in Technology Organizations is a manual for technology companies looking to improve their ability to deliver high-value products to consumers. In the 1980s, Toyota revolutionized manufacturing with its application of the Lean production philosophy....
Author
Description
Cybersecurity is not a one size fits all solution; therefore, security must be tailored to the needs of the individual. The purpose of this book is to provide readers with rational business processes by which they can understand what information is important, and why. "The Alchemy of Information Protection" was specifically written for:
1. The non-cybersecurity executive or business owner who wants to gain an understanding of their role in the protection...
Author
Description
Our digital world is growing at an astounding pace. The ongoing collection, analysis, and dissemination of vast amounts of data is enriching society's collective knowledge and understanding, its genome, in unprecedented ways. Yet in this golden information age, no person or organization is immune from devastating, irreparable data loss, whether by natural disaster, cyber-attacks, or simple human error. Society's Genome is a clarion call to all data...
Author
Description
This book blends academic rigor and real-world experience on the agile and planning schools of project management and the process of becoming a project leader.
To some, project management is all about logically and rationally planning out dependencies and mapping them out into a flawless plan; a plan that must be rigorously and undeviatingly followed in all its geometric perfection. To others it is about agility—15-minute scrum meetings and responding...
Author
Description
Digitization of business interactions and processes is advancing full bore. But in many organizations, returns from IT investments are flat lining, even as technology spending has skyrocketed.
These challenges call for new levels of IT savvy: the ability of all managers-IT or non-IT-to transform their company's technology assets into operational efficiencies that boost margins. Companies with IT-savvy managers are 20 percent more profitable than...
Author
Description
Do you really understand what business value is? Information technology can and should deliver business value. But the Agile literature has paid scant attention to what business value means-and how to know whether or not you are delivering it. This problem becomes ever more critical as you push value delivery toward autonomous teams and away from requirements "tossed over the wall" by business stakeholders. An empowered team needs to understand its...
Didn't find it?
Can't find what you are looking for?
Search Hurst Public LibraryOr request an item not in the catalog. Submit Request