|
Web-based outsourcing
|
K. S. Rajasekaran,Varum Sharma,Vivek Sharma |
"The book elucidates various outsourcing aspects and tackles nagging questions: * Should Outsourcing be considered at all or not? If so, what functions are potential candidates? * What factors contri… |
OL15414176W |
|
Cyber security standards, practices and industrial applications
|
Junaid Ahmed Zubairi |
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classific… |
OL15917366W |
|
Thermal guidelines for data processing environments
|
American Society of Heating, Refrigerating and Air-Conditioning Engineers |
"This third edition of Thermal Guidelines for Data Processing Environments breaks new ground through the addition of new data center classes enabling near full-time use of free cooling techniques in … |
OL16769483W |
|
Managing IT outsourcing performance
|
Gottschalk |
"This book provides a collection of methodologies and tools that can be used in managing relationships and performance of IT outsourcing"--Provided by publisher. |
OL16920899W |
|
Strategic IT management
|
S. A. Kelkar |
"This book allows students to learn the essentials of theory and practice of Strategic Information Technology (IT) Management through serialization of key points. The book is structured into three un… |
OL27975085W |
|
Motivating and managing computer personnel
|
J. Daniel Couger |
xv, 213 p. : 24 cm |
OL2906665W |
|
Network security
|
Charlie Kaufman |
This witty, concisely-written guide to the latest advances in network security protocols provides a critical assessment of the state of network security protocols and mechanisms (what works, what doe… |
OL3099646W |
|
Computer outsourcing
|
Thomas R. Mylott |
xiv, 385 p. ; 24 cm |
OL3519351W |
|
Managing successful it outsourcing relationships
|
Petter Gottschalk |
"This book focuses on the important issues of strategy, structure, and management of IT outsourcing relationships"--Provided by publisher. |
OL5823328W |
|
A Practical Guide to Security Assessments
|
Sudhanshu Kairab |
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mi… |
OL8636700W |
|
Managing the human factor in information security how to win over staff and influence business mana…
|
David Lacey |
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and pr… |
OL9324439W |
|
Computer Security Handbook
|
Seymour Bosworth |
This is the most comprehensive book on computer security on the market, with 23 chapters and 29 Appendices covering virtually all aspects of computer security. Chapters are contributed by recogniz… |
OL9385944W |