Catalog Search Results
Author
Description
"Management Information System" by Sanjivan Saini is a comprehensive book that covers various aspects of Management Information Systems (MIS) and Enterprise Resource Planning (ERP). It provides readers with a deep understanding of the key concepts, principles, and applications related to MIS and ERP. The book is structured into different units, each focusing on essential topics in the field of MIS and ERP. Here is an overview of the units included...
Author
Description
In today's data-driven world, information professionals are at the forefront of managing the lifeblood of organizations - information. "Mastering the Management of Information Systems and Services" is your comprehensive guide to navigating the dynamic landscape of information management, ensuring you have the knowledge and skills needed to excel in this critical role.This book covers a wide spectrum of topics that encompass the realm of Information...
Author
Description
This course will examine each of the 5 phases of risk management i.e. 1) Introduction to Risk, 2) Risk Identification, 3) IT Risk assessment, 4) Risk Response and Mitigation, 5) Risk and Control Monitoring and Reporting, and will help you prepare for ISACA's CRISC or Certified in Risk and Information Systems Control examination.
Through this course, you will have the opportunity to gain a high-level understanding of the risk management process. This...
Author
Description
Companies increasingly recognize that the analysis of business information (business intelligence) can generate decisive competitive advantages. In addition, the compliance guidelines BCBS 239, Basel II and III, SOX, and Solvency II have led to legal requirements for a minimum level of quality in reporting and planning data and processes. The establishment of enterprise-wide data management thus continues to be one of the major challenges for IT and...
Author
Description
As a result of advances in sophisticated artificial intelligence and machine learning, automation and augmented reality, the Internet landscape is undergoing massive change. It's no longer just about accessing information via electronic devices like laptops, smartphones, and tablets. From toasters to transit systems, we are now in the age of the Internet of Things where interconnected devices and objects are fully networked and communicate data back...
Author
Description
The management information system is one of the most important and well-known information systems available, which
provides immense facilities and services to an organization or any institution. It is one of the best ways through which an
organization or a company can sort out its various transactions and keep a better record of each and every data and
information which comes to that organization or goes out from that organization. A management information...
Author
Description
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused.
Although the main focus is on implementation of the NIST 800 RMF process,...
Author
Description
"Information Systems Unraveled: Exploring the Core Concepts" is an invaluable resource that delves into the intricate world of Information Systems (IS) through a comprehensive glossary of key terms and concepts. Authored with meticulous attention to detail, this book serves as a compass for both novices and experts in the realm of IS, offering a clear and concise guide to the essential principles that underpin modern information management. The book...
Author
Description
Enterprises are facing enormous challenges to respond to the rapid changes and growing demands of digital consumers globally. There is constant search to find solutions to the growing problems. The most optimal solution to address this problem is to architect our enterprise digital transformation requirements aligning with digital trends and innovative frameworks as described in this book with an articulated 12-step method.
Architecting digital transformations...
Author
Description
Este texto es el resultado del estudio de las concepciones de complejidad, lo sistémico, lo organizacional y del pensamiento complejo. En este trabajo se plasman las características del pensamiento complejo y del sistémico y se dan sugerencias para su empleo en la formación de los ingenieros.
Author
Description
Did you know that using Excel properly could cut your work time in half? Would you like to learn how to use it well but think it is difficult and takes too much time?One of the most common and frustrating problems in offices and for those managing household finances is having to repeat the same operations over and over again, making work increasingly stressful and less productive over time.To date, employers are looking for people who know how to...
Author
Series
Description
In our interconnected world, where information flows seamlessly across networks and systems, safeguarding digital assets has become an imperative. "Fortifying Digital Fortress: A Comprehensive Guide to Information Systems Security" is a comprehensive exploration of strategies, methodologies, and best practices that organizations and individuals can adopt to protect their information systems from ever-evolving cyber threats. This book provides a holistic...
Author
Description
Security Operation Center (SOC), as the name suggests, is a central operation center that deals with information and cyber security events by employing people, processes, and technology. It continuously monitors and improves an organization's security posture. It is considered to be the first line of defense against cyber security threats. HOW A SECURITY OPERATIONS CENTER WORKS:Rather than being focused on developing a security strategy, designing...
Author
Description
Small and midsized businesses (SMBs) have the same information security concerns and needs as large organizations yet, are often-hampered by resource limitations. Most large companies have a Chief Information Security Officer (CISO) to lead and manage information security programs, initiatives, and risks. However, the cost of retaining a full-time CISO is often prohibitive for SMBs.
This gap has led to the rise of the virtual CISO, or vCISO role....
15) Microsoft Power Platform Up and Running: Learn to Analyze Data, Create Solutions, Automate Processes
Author
Description
Prepare yourself for the digital transformation with the Microsoft Power Platform
KEY FEATURES ● Learn using concrete examples, minimal theoretical coverage, and practical Power Platform illustrations. ● Explore the interactive understanding of the no-code concept and various Power Platform components for building intelligent systems.● Learn to develop robust end-to-end applications using numerous solutions provided in each chapter. DESCRIPTION...
Author
Description
The Tax Administration Management Information System (TAMIS) Tool Kit was developed with the objective of guiding and helping tax agents in developing countries undertake a holistic transformation of tax administration using information and communication technology. The tool kit provides guidance on key activities any tax agency should undertake in introducing TAMIS in various stages---including diagnostic assessment, prioritization of target taxes...
Author
Description
The digital world is transitioning from text to media: photos, audio files, video clips, animations, games, and more. Enterprises of all kinds struggle with how to manage those media assets. Digital professionals who want to master the life cycles behind creating, storing, and reusing media need the inside scoop on how digital and media asset management technology really works.
Author
Description
Throughout this series, I discussed definitive insights and themes in The Psychology of Insider Threat Prevention Cyber Security that can prepare the ITP CS Specialist to become more aware and cautious about the genius of the ordinary malicious insider. Malicious insiders are not often stupid. They are most often very smart people who do stupid things. The dangerous challenge occurs when brilliant people launch malicious insider attacks brilliantly....
Author
Description
Pages 90If you're looking to improve your Excel skills for management consulting, then this book is an excellent resource that you don't want to miss out on! With its comprehensive coverage of Excel's interface, features, and advanced tools, this book is sure to equip you with the necessary knowledge to excel in your consulting work.Whether you're a beginner looking to learn the basics or an experienced Excel user seeking to improve your skills, this...
Author
Description
Congratulations, you've purchased your first home, now what? While new homeowners spend months, if not years, planning to buy their first home, many are still unprepared for the financial responsibilities that come with homeownership. If you find yourself house-rich but cash-poor from unexpected repairs to adjusting to fluctuating bills and expenses, you are not alone. After emptying her savings and accumulating credit card debt, like many first-time...
Didn't find it?
Can't find what you are looking for? Let us know! Suggest a Title