Lean techniques have proven especially effective when they target customer satisfaction in terms of cost, quality, and delivery. This book presents lean tools that take into account the voice of the c
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company’s reputation, violating a consumer’s privacy, compromising int
This book is about how to test Web based applications so that customers know that they are very safe to access them, and that their information and data will not fall into the hands of a malicious thi
Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding
Although there are numerous project management resources available, most are either too academic, focus too heavily on IT, or provide quick-fix advice without the theory required to understand why the
As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certifie
Presenting cutting-edge insights from industry practitioners, .NET 4 for Enterprise Architects and Developers supplies in-depth coverage of the various server-side features of Microsoft .NET Framework
Securing information from insider threats need to startearly. Policies and procedures need to be in place to mitigate the risks associated with an insider prior to establishing trust. Once trust
This book outlines courses of action that organizational leaders and HR professionals can take to minimize the risks associated with insider threats and to minimize the losses when these threats mater
Due to their always-on wireless connections, physical sensors, and location services, mobile devices are subject to unique threats. The diversity of available devices, operating systems, carrier-provi
Who are our customers?What services do we offer our customers and are they willing to pay for these?Would our customers choose another provider?Do we measure our performance in terms of our customers'
Once overlooked as a minor and ineffective tactic in the mitigation and prevention of terrorism and violent crime, Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes
The term homeland security hardly existed before September 11, 2001, yet today it dominates public policy and the economic agendas of world governments. The transportation industries have been subject
Historically, the integration of manufacturing methodologies into the office environment has proven to be problematic. Part of the difficulty lies in the fact that process workflows tend to be globall
Senior level IT managers must understand the field of project management as well as the dynamics of managing the project manager. In this book/CD-ROM package, Keyes, president of a high-tech and manag
The first comprehensive resource on disaster response created for emergency management programs, this volume examines theoretical aspects while also addressing practical concerns related to creating a
When evidence is excluded or a case is dismissed or overturned, it is puzzling that the redress of constitutional rights violations is spoken of so derisively. As a check on improper police and govern