Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also well-known for being difficult to master. With Datab
In past decades, the ability of a system to index thousands of documents and conduct key word searches was deemed good enough. Today, systems must be able to quickly scale to tens of millions of docum
With a focus on designing applications, this book presents a step-by-step architectural approach to learning and mastering design patterns using C#. The author provides guidance for the architecture a
Changing industry trends—cloud computing, mobile computing, big data, and the ascendency of virtualization—have made a staggering impact on data recovery requirements. This book arms readers with info
From the Foreword of theFirst Edition of Integral Logistics Management: Operations and Supply Chain Management Within and Across Companies: "Changes in the world outside the company alter the way that
The AI revolution is moving at a breakneck speed. Organizations are beginning to invest in innovative ways to monetize their data through the use of artificial intelligence. Businesses need to underst
Candidates for the CISSP-ISSAP® professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP® CBK®, but also the ability to apply this i
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is an internation
Explains the basic elements of disks and disk architectures, and explores how to successfully manage and maintain functionality within a Windows environment. This book features critical issues includi
Presents the process of setting up a secure E-commerce Web site. This book includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. It highlights the plethora o
Offers an overview of how to develop a strategy to implement security within an organization. This managerial and practical technical tutorial for Windows NT/2000 presents in-depth knowledge on how, w
Compliance is the hottest buzz word throughout the business world today and therefore ensuring the security of IT systems has become a prime focus for all companies conducting business in any electron
Entity-relationship (E-R) diagrams are time-tested models for database development well-known for their usefulness in mapping out clear database designs. Also commonly known is how difficult it is to
AntiPatterns: Identification, Refactoring, and Management catalogs 48 bad management practices and environments common to software development, IT, and other organizations. The authors cover antipatte
The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial proce
Lean techniques have proven especially effective when they target customer satisfaction in terms of cost, quality, and delivery. This book presents lean tools that take into account the voice of the c
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company’s reputation, violating a consumer’s privacy, compromising int