IS Management Handbook

Pirmais vāks
CRC Press, 2003. gada 26. jūn. - 944 lappuses
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization. Add to that the spending restraints of a down economy, and IT managers find themselves in need of a thoughtful, rea

No grāmatas satura

Lietotāju komentāri - Rakstīt atsauksmi

Ierastajās vietās neesam atraduši nevienu atsauksmi.

Saturs

Happier Users Mean Greater Profits
465
The Good the Bad and the Ugly
483
Chapter 40 Use Case Modeling
499
Chapter 41 Extreme Programming and Agile Software Development Methodologies
511
Chapter 42 ComponentBased IS Architecture
531
Chapter 43 Does Your Project Risk Management System Do the Job?
545
Chapter 44 Managing Development in the Era of Complex Systems
555
Chapter 45 Reducing IT Project Complexity
561

Chapter 9 The CIO Role in the Era of Dislocation
111
The Role of the CIO
119
Chapter 11 Designing a ProcessBased IT Organization
125
Chapter 12 Preparing for the Outsourcing Challenge
135
Chapter 13 Managing Information Systems Outsourcing
145
Building Relatioships across International Boundaries
153
Chapter 15 Application Service Providers
159
Designing and Operating an Enterprise Infrastructure
169
Chapter 16 The New Enabling Role of the IT Infrastructure
175
Chapter 17 US Telecommunications Today
191
Chapter 18 Information Everywhere
213
Chapter 19 Designing and Provisioning an Enterprise Network
223
Personalized Services
241
Chapter 21 Virtual Private Networks with Quality of Service
257
Chapter 22 Storage Area Networks Meet Enterprise Data Networks
269
Chapter 23 Data Warehousing Concepts and Strategies
279
Plan Big Build Small
301
Exploring the Corporate Asset
307
Chapter 26 Data Conversion Fundamentals
315
Chapter 27 Service Level Management Links IT to the Business
331
Whats in It for Executives?
341
Chapter 29 CostEffective IS Security via Dynamic Prevention and Protection
349
Chapter 30 Reengineering the Business Continuity Planning Process
361
Here We Go Again
379
Chapter 32 Understanding Intrusion Detection Systems
389
Providing Application Solutions
399
Extending Your Web
405
An Application Development Perspective
415
Information Interchange
425
A New Paradigm
435
A New Paradigm
457
Chapter 46 Software Quality Assurance Activities
573
Chapter 47 Six Myths about Managing Software Development
581
Chapter 48 Ethical Responsibility for Software Development
589
Leveraging EBusiness Opportunities
599
Chapter 49 Building an EBusiness Strategy
603
New Rules of Survival
625
Business and Technical Issues
637
Chapter 52 Evaluating the Options for BusinesstoBusiness ECommerce
651
Chapter 53 The Role of Corporate Intranets
663
Chapter 54 Integrating WebBased Data into a Data Warehouse
671
NET Redefines the Way Systems Interact
691
An Issue for the 21st Century
697
Chaptre 57 A Strategic Response to the Broad Spectrum of Internet Abuse
715
Chapter 58 World Wide Web Application Security
729
Facilitating Knowledge Work
749
Chapter 59 Improving Satisfaction with EndUser Support
753
Chapter 60 Internet Acceptable Usage Policies
761
Chapter 61 Managing Risks in User Computing
771
Chapter 62 Reviewing UserDeveloped Applications
781
What To Do When Downsizing
799
Obstacles and Solutions
807
The CrossCultural Dimension
819
Chapter 66 When Meeting FacetoFace Is Not the Best Option
827
Success in an Information Economy
835
Coming Up the Learning Curve
843
Chapter 69 Building Knowledge Management Systems
857
Process Mapping
873
Index
891
Back cover
925
Autortiesības

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Populāri fragmenti

120. lappuse - But of a good leader, who talks little, when his work is done, his aim fulfilled, they will all say, 'We did this ourselves.
700. lappuse - ... processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller or in a third party to whom the data are disclosed...
700. lappuse - ... processing is necessary for the purposes of the legitimate interests pursued by the controller or by the third party or parties to whom the data are disclosed, except where such interests are overridden by the interests for fundamental rights and freedoms of the data subject...
109. lappuse - Whom could your decision or action injure? 8. Can you discuss the problem with the affected parties before you make your decision? 9. Are you confident that your position will be as valid over a long period of time as it seems now?
120. lappuse - The first responsibility of a leader is to define reality. The last is to say thank you.
30. lappuse - I shall not today attempt further to define the kinds of material I understand to be embraced within that shorthand description, and perhaps I could never succeed in intelligibly doing so. But I know it when I see it, and the motion picture involved in this case is not that.
363. lappuse - System An assembly of procedures, processes, methods, routines or techniques united by some form of regulated interaction to form an organized whole.
160. lappuse - As a precursor to more detailed discussion, a virtual organization can be defined as: . . . composed of several business partners sharing costs and resources for the purpose of producing a product or service. [It] can be temporary ... or it can be permanent. Each partner contributes complementary resources that reflect its strengths, and determines its role in the virtual corporation.
698. lappuse - October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23 November 1995. [6] Directive 2002/58/EC of 12 July 2002, concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communication), OJ L 201/37, 3 1 July 2002.
188. lappuse - Broadbent, M., & Weill, P. (1997). Management by maxim: How business and IT managers can create IT infrastructures.

Atsauces uz šo grāmatu

Bibliogrāfiskā informācija