CMMI 1 3
La version 1.3 du CMMI (Capability Maturity Model Integration) a été publiée à la fin de l'année 2010. Ce référentiel est utilisé pour évaluer la fiabilité du logiciel, pour développer des plans d'amélioration ou mettre en oeuvre des pratiques plus matures. Ce livre est un guide qui explique et détaille les bonnes pratiques préconisées par le CMMI- DEV, c'est-à-dire la partie du référentiel qui porte sur les aspects développement logiciel. Cette 4e édition s'enrichit bien sûr des nouveautés sur CMMI-DEV, mais également d'un aperçu sur deux autres référentiels CMMI que sont CMMI-ACQ (sous-traitance) et CMMI- SVC (gestion des services).
COBIT Security Baseline
This guide, based on COBIT 4.1, consists of a comprehensive set of resources that contains the information organizations need to adopt an IT governance and control framework. COBIT covers security in addition to all the other risks that can occur with the use of IT. COBIT Security Baseline focuses on the specific risk of IT security in a way that is simple to follow and implement for the home user or the user in small to medium enterprises, as well as executives and board members of larger organizations.
COBIT 4 1
IT Governance Institute A été écrit sous une forme ou une autre pendant la plus grande partie de sa vie. Vous pouvez trouver autant d'inspiration de COBIT 4 1 Aussi informatif et amusant. Cliquez sur le bouton TÉLÉCHARGER ou Lire en ligne pour obtenir gratuitement le livre de titre $ gratuitement.
The Balanced Scorecard
The Balanced Scorecard translates a company's vision and strategy into a coherent set of performance measures. The four perspectives of the scorecard--financial measures, customer knowledge, internal business processes, and learning and growth--offer a balance between short-term and long-term objectives, between outcomes desired and performance drivers of those outcomes, and between hard objective measures and softer, more subjective measures. In the first part, Kaplan and Norton provide the theoretical foundations for the Balanced Scorecard; in the second part, they describe the steps organizations must take to build their own Scorecards; and, finally, they discuss how the Balanced Scorecard can be used as a driver of change.
Knowledge Management and Organizational Learning
Knowledge management (KM) is a set of relatively-new organizational activities that are aimed at improving knowledge, knowledge-related practices, organizational behaviors and decisions and organizational performance. KM focuses on knowledge processes—knowledge creation, acquisition, refinement, storage, transfer, sharing and utilization. These processes support organizational processes involving innovation, individual learning, collective learning and collaborative decision-making. The “intermediate outcomes” of KM are improved organizational behaviors, decisions, products, services, processes and relationships that enable the organization to improve its overall performance. Knowledge Management and Organizational Learning presents some 20 papers organized into five sections covering basic concepts of knowledge management; knowledge management issues; knowledge management applications; measurement and evaluation of knowledge management and organizational learning; and organizational learning.
Wavelets: Theory and Applications for Manufacturing presents a systematic description of the fundamentals of wavelet transform and its applications. Given the widespread utilization of rotating machines in modern manufacturing and the increasing need for condition-based, as opposed to fix-interval, intelligent maintenance to minimize machine down time and ensure reliable production, it is of critical importance to advance the science base of signal processing in manufacturing. This volume also deals with condition monitoring and health diagnosis of rotating machine components and systems, such as bearings, spindles, and gearboxes, while also: -Providing a comprehensive survey on wavelets specifically related to problems encountered in manufacturing -Discussing the integration of wavelet transforms with other soft computing techniques such as fuzzy logic, for machine defect and severity classification -Showing how to custom design wavelets for improved performance in signal analysis Focusing on wavelet transform as a tool specifically applied and designed for applications in manufacturing, Wavelets: Theory and Applications for Manufacturing presents material appropriate for both academic researchers and practicing engineers working in the field of manufacturing.
COBIT Quickstart 2nd Edition
This special version of COBIT serves as a starting point for enterprises in their move towards an appropriate level of control and governance of IT. This publication was developed in response to comments that COBIT, in its complete form, can be a bit overwhelming. Those who operate with a small IT staff often do not have the resources to implement all of COBIT. This subset of COBIT includes only those control objectives that are considered the most critical, so that implementation of COBIT's fundamental principles can take place easily, effectively and relatively quickly.
Discusses storage networks, covering architecture, devices, connectivity options, data organization methods, and the two major models: Network Attached Storage and Storage Area Networking.
Unthinking Social Science
In this, new edition of a classic work—now with a new preface—on the roots of social scientific thinking, Immanuel Wallerstein develops a thorough-going critique of the legacy of nineteenth-century social science for social thought in the new millennium. We have to "unthink"—radically revise and discard—many of the presumptions that still remain the foundation of dominant perspectives today. Once considered liberating, these notions are now barriers to a clear understanding of our social world. They include, for example, ideas built into the concept of "development." In place of such a notion, Wallerstein stresses transformations in time and space. Geography and chronology should not be regarded as external influences upon social transformations but crucial to what such transformation actually is.Unthinking Social Scienceapplies the ideas thus elaborated to a variety of theoretical areas and historical problems. Wallerstein also offers a critical discussion of the key figures whose ideas have influenced the position he formulates—including Karl Marx and Fernand Braudel, among others. In the concluding sections of the book, Wallerstein demonstrates how these new insights lead to a revision of world-systems analysis. Author note:Immanuel Wallersteinis the Director of the Fernand Braudel Center for the Study of Economies, Historical Systems and Civilizations at the State University of New York at Binghamton, where he is also an emeritus Distinguished Professor of Sociology. He is currently a research sociologist at Yale University.
The Art of Deception
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.