A plain-English guide to managing IT from the customer's perspective Practical guidance on delivering and managing IT so that it meets the multiple needs and demands of a company and its customers and end-users–both inside and outside the organization–is hard to come by; this accessible book takes a common-sense approach that explains exactly what IT services are and how to fit them most effectively into a business Topics include setting a framework, keeping costs down, improving efficiency, and maintaining standards and best practices This concept of how IT should be wired specifically into the goals and need of the company and its customers is part of a broader picture that includes ITIL, BPM, SOA, and Six Sigma
ITIL(R) is a framework for IT service management and provides best management practice to meet ISO/IEC 20k. This guide introduces ITIL to Foundation Exam candidates and offers a practical understanding of IT service management. The new edition is fully updated and contains several additional processes. An ITIL(R) licensed product.
Increasingly, information technology governance is being considered an integral part of corporate governance. There has been a rapid increase in awareness and adoption of IT governance as well as the desire to conform to national governance requirements to ensure that IT is aligned with the objectives of the organization. Information Technology Governance and Service Management: Frameworks and Adaptations provides an in-depth view into the critical contribution of IT service management to IT governance, and the strategic and tactical value provided by effective service management. A must-have resource for academics, students, and practitioners in fields affected by IT in organizations, this work gathers authoritative perspectives on the state of research on organizational challenges and benefits in current IT governance frameworks, adoption, and incorporation.
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer security breaches in your systems. Written for professionals and college students, it provides comprehensive best guidance about how to minimize hacking, fraud, human error, the effects of natural disasters, and more. This essential and highly-regarded reference maintains timeless lessons and is fully revised and updated with current information on security issues for social networks, cloud computing, virtualization, and more.
This book is the sequel to the author’s previous book titled “Technology Governance – Concepts and Practices” (ISBN 978-1-5246-7815-9) – which was a pioneering book on the subject. Technology governance has during these years become even more important due to the introduction of new technologies and the proliferation of artificial intelligence. This book takes the concept further in the context of the fourth industrial revolution (Industrie 4.0) and Society 5.0. The emerging domain of governance of ethics has been introduced considering concerns in the use of artificial intelligence. New methodologies have been introduced for transformation, technology governance, data governance, and process documentation. These are all based on international standards and are enhancements to accepted methodologies. This book is expected to take the domain of technology governance further towards maturity. Let me express my appreciation for your accomplishment in writing a book on the Fourth Industrial Revolution and Society 5.0 I am confident that the book will contribute to the contemporary debate on how to succeed and sustain in the era of a technological revolution that is fundamentally altering the way we exist, operate, and interact with each other, and is a manifestation of the dedication on your part. Dr. Arif Alvi President of Pakistan
The best-practice guide to managing IT infrastructures–now fully updated! IT Systems Management is an up-to-the-minute guide to maintaining stable, responsive IT production environments. Top IT systems management expert Rich Schiesser illuminates both the theoretical and practical aspects of systems management, using methods and examples drawn from decades of experience leading and consulting with the world’s most complex enterprise IT organizations. This thoroughly updated edition covers every systems management discipline and all elements of success: people, process, and technology. Schiesser shows how to apply best-practice system management throughout all IT infrastructure environments, from mainframe data centers to web-enabled systems, client/server and mid-range platforms to wireless and VoIP networks. Schiesser systematically addresses today’s most crucial issues, as well as emerging trends that will transform IT systems management. You’ll find an entirely new chapter on using IT Infrastructure Library (ITIL) effectively, plus new coverage ranging from managing outsourced functions to efficiently delivering “ultra-speed” Internet connections. This edition includes more real-life examples throughout, and new interactive problems designed to give IT professionals even deeper insight. Coverage includes: • Implementing bullet-proof processes in areas ranging from change management to production acceptance, capacity planning to storage • Optimizing the “people” components of IT service delivery, from customer service to executive support • Using technology to manage systems more efficiently and effectively • Systematically managing performance, availability, and business continuity • Reducing the cost and complexity of IT facilities management • Taking a more strategic approach to security Rich Schiesser founded and owns RWS Enterprises, Inc., a consultancy that specializes in designing and implementing world-class IT infrastructures. His client list has included The Weather Channel, Amazon.com, and DIRECTV. He has led major IT infrastructure organizations at Hughes Aircraft, the City of Los Angeles, and Twentieth Century Fox. For nearly ten years, he managed the primary data center at Northrop Grumman, one of the world’s most advanced computer facilities. A former University of Phoenix faculty member, he has taught IT management at UCLA and California State University, Los Angeles (CSULA). informit.com/ph
IT services are prevalent throughout virtually all businesses. Most enterprises and many government functions are totally dependent upon reliable and responsive IT services to underpin vital business, community and social functions. IT services have become mainstream and managing them to deliver value it the core message of ITIL V3, and the emphasis in ITIL V3 on service catalogue management is a direct result of the growing requirement for business and IT to work together sharing data, information and knowledge about demand for services, service capabilities and patterns of business activity. The Service Catalogue Management process is now a very important management field complete with its own terminology and vital concepts. This study guide outlines the concepts and principles underlying the service catalogue; discusses a project plan approach and reporting considerations; describes the value of a sound business case and the key relationships and touch points in the service catalogue management process.
This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers: Fundamentals of information security providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors. Fundamentals of management of information security - explains what information security management is about and its objectives. Details are also given on implementing the process and the continuous effort required to maintain its quality. ITIL V3 and Information Security Management - shows the links with the other ITIL processes. Shows how integrating the Information Security Management activities into existing processes and activities not only supports efficiencies but ultimately is the key way to achieve effective Information Security Management. Implementing Information Security Management - gives practical advice how to put Information Security Management into practice. From awareness in the organization via documentation required to maturity models; this guidance describes best practices for realizing Information Security Management.
"This 4-volume set provides a compendium of comprehensive advanced research articles written by an international collaboration of experts involved with the strategic use of information systems"--Provided by publisher.
A very practical publication that contains the knowledge of a large number of experts from all over the world. Being independent from specific frameworks, and selected by a large board of experts, the contributions offer the best practical guidance on the daily issues of the IT manager.