Configuration Management: Using COBIT 5
Author: ISACA
Publisher: ISACA
Published: 2013-07-23
Total Pages: 88
ISBN-13: 1604203455
DOWNLOAD EBOOKRead and Download eBook Full
Author: ISACA
Publisher: ISACA
Published: 2013-07-23
Total Pages: 88
ISBN-13: 1604203455
DOWNLOAD EBOOKAuthor: Alexis Leon
Publisher: Artech House
Published: 2015-02-01
Total Pages: 439
ISBN-13: 1608078442
DOWNLOAD EBOOKSoftware configuration management (SCM) is one of the scientific tools that is aimed to bring control to the software development process. This new resource is a complete guide to implementing, operating, and maintaining a successful SCM system for software development. Project managers, system designers, and software developers are presented with not only the basics of SCM, but also the different phases in the software development lifecycle and how SCM plays a role in each phase. The factors that should be considered and the pitfalls that should be avoided while designing the SCM system and SCM plan are also discussed. In addition, this third edition is updated to include cloud computing and on-demand systems. This book does not rely on one specific tool or standard for explaining the SCM concepts and techniques; In fact, it gives readers enough information about SCM, the mechanics of SCM, and SCM implementation, so that they can successfully implement a SCM system.
Author: ISACA
Publisher: ISACA
Published: 2014-03-24
Total Pages: 266
ISBN-13: 1604204648
DOWNLOAD EBOOK"This practical guidance was created for enterprises using or considering using cloud computing. It provides a governance and control framework based on COBIT 5 and an audit program using COBIT 5 for Assurance. This information can assist enterprises in assessing the potential value of cloud investments to determine whether the risk is within the acceptable level. In addition, it provides a list of publications and resources that can help determine if cloud computing is the appropriate solution for the data and processes being considered."--
Author: ISACA
Publisher: ISACA
Published: 2014-02-01
Total Pages: 196
ISBN-13: 1604203439
DOWNLOAD EBOOKAuthor: ISACA
Publisher: ISACA
Published: 2013-06-18
Total Pages: 190
ISBN-13: 1604203412
DOWNLOAD EBOOKThe cost and frequency of cybersecurity incidents are on the rise, is your enterprise keeping pace? The numbers of threats, risk scenarios and vulnerabilities have grown exponentially. Cybersecurity has evolved as a new field of interest, gaining political and societal attention. Given this magnitude, the future tasks and responsibilities associated with cybersecurity will be essential to organizational survival and profitability. This publication applies the COBIT 5 framework and its component publications to transforming cybersecurity in a systemic way. First, the impacts of cybercrime and cyberwarfare on business and society are illustrated and put in context. This section shows the rise in cost and frequency of security incidents, including APT attacks and other threats with a critical impact and high intensity. Second, the transformation addresses security governance, security management and security assurance. In accordance with the lens concept within COBIT 5, these sections cover all elements of the systemic transformation and cybersecurity improvements.
Author: Rosado da Cruz, António Miguel
Publisher: IGI Global
Published: 2018-11-09
Total Pages: 352
ISBN-13: 1522572724
DOWNLOAD EBOOKInformation modeling plays an important role in every level of the enterprise information system’s architecture. Modeling allows organizations to adapt and become more efficient, helping top managers and engineers outline tactics to reach strategic objectives, understand organizational needs, and design information systems that are aligned with business goals. New Perspectives on Information Systems Modeling and Design is an essential reference source that discusses organizational adaptation through the integration of new information technologies into existing processes and underlying supporting applications. Featuring research on topics such as application integration, change management, and mobile process activities, this book is ideally designed for managers, researchers, system developers, entrepreneurs, graduate-level students, business professionals, information system engineers, and academicians seeking coverage on emerging technological developments and practical solutions for system modeling and design.
Author: Mostafa Ezziyyani
Publisher: Springer
Published: 2017-11-10
Total Pages: 522
ISBN-13: 3319691376
DOWNLOAD EBOOKThis book includes the proceedings of the International Conference on Advanced Information Technology, Services and Systems (AIT2S-17) held on April 14–15, 2017 in Tangier, Morocco. Presenting the latest research in the field, it stimulates debate, discusses new challenges and provides insights into the field in order to promote closer interaction and interdisciplinary collaboration between researchers and practitioners. Intended for researchers and practitioners in advanced information technology/management and networking, the book is also of interest to those in emergent fields such as data science and analytics, big data, Internet of Things, smart networked systems, artificial intelligence and expert systems, pattern recognition, and cloud computing.
Author: ISACA
Publisher: ISACA
Published: 2012
Total Pages: 220
ISBN-13: 1604202548
DOWNLOAD EBOOKCOBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT. COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise, taking into account the full end-to-end business and IT functional areas of responsibility, considering IT-related interests of internal and external stakeholders.
Author: ISACA
Publisher: ISACA
Published: 2013-10-10
Total Pages: 90
ISBN-13: 1604203498
DOWNLOAD EBOOKAuthor: ISACA
Publisher: ISACA
Published: 2013-09-25
Total Pages: 246
ISBN-13: 1604204575
DOWNLOAD EBOOKInformation is a key resource for all enterprises. From the time information is created to the moment it is destroyed, technology plays a significant role in containing, distributing and analysing information. Technology is increasingly advanced and has become pervasive in enterprises and the social, public and business environments.