Books

12 results found
Title Authors Description OpenBook ID
Web-based outsourcing Web-based outsourcing K. S. Rajasekaran,Varum Sharma,Vivek Sharma "The book elucidates various outsourcing aspects and tackles nagging questions: * Should Outsourcing be considered at all or not? If so, what functions are potential candidates? * What factors contri… OL15414176W
Cyber security standards, practices and industrial applications Cyber security standards, practices and industrial applications Junaid Ahmed Zubairi "This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classific… OL15917366W
Thermal guidelines for data processing environments Thermal guidelines for data processing environments American Society of Heating, Refrigerating and Air-Conditioning Engineers "This third edition of Thermal Guidelines for Data Processing Environments breaks new ground through the addition of new data center classes enabling near full-time use of free cooling techniques in … OL16769483W
Managing IT outsourcing performance Managing IT outsourcing performance Gottschalk "This book provides a collection of methodologies and tools that can be used in managing relationships and performance of IT outsourcing"--Provided by publisher. OL16920899W
Strategic IT management Strategic IT management S. A. Kelkar "This book allows students to learn the essentials of theory and practice of Strategic Information Technology (IT) Management through serialization of key points. The book is structured into three un… OL27975085W
Motivating and managing computer personnel Motivating and managing computer personnel J. Daniel Couger xv, 213 p. : 24 cm OL2906665W
Network security Network security Charlie Kaufman This witty, concisely-written guide to the latest advances in network security protocols provides a critical assessment of the state of network security protocols and mechanisms (what works, what doe… OL3099646W
Computer outsourcing Computer outsourcing Thomas R. Mylott xiv, 385 p. ; 24 cm OL3519351W
Managing successful it outsourcing relationships Managing successful it outsourcing relationships Petter Gottschalk "This book focuses on the important issues of strategy, structure, and management of IT outsourcing relationships"--Provided by publisher. OL5823328W
A Practical Guide to Security Assessments A Practical Guide to Security Assessments Sudhanshu Kairab The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mi… OL8636700W
Managing the human factor in information security how to win over staff and influence business mana… Managing the human factor in information security how to win over staff and influence business mana… David Lacey With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and pr… OL9324439W
Computer Security Handbook Computer Security Handbook Seymour Bosworth This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security. Chapters are contributed by recogniz… OL9385944W