Click on a book cover for more information or to order.
SAVE 20% AND GET FREE SHIPPING when you order these or any book online! Simply enter this code--813DA--when you checkout.
Genesis of Personal Communications
This is an excerpt from Mobile Evolution: Insights on Connectivity and Service by Sebastian Thalanany. The book presents insights, interpretations, concepts, and interdependent views--in the landscape of mobile connectivity and service--that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art. The author explores the forward-looking and enabling capabilities of mobile connectivity and service in the context of long term evolution (LTE) systems and multimedia services, as viewed through a lens of human experience. It provides information and guidelines pertaining to the strategies and technologies associated with the next-generation mobile ecosystem.
IT Performance Improvement: What's New March 2015
"A Reality Check for Project Managers" by Lynda Bourne. "What Is Project Management Maturity?" by J. Kent Crawford. "The Scope of Project Scope Management" by Jamal Moustafaev. John Monroe's and regular columnist Nancy Settle-Murphy's "How to Create a 12-Month Plan in Just Two Hours."
Definition and Evaluation of IT Human Factors
This chapter from Modeling, Evaluating, and Predicting IT Human Resources Performance adopts the "Big Five" theory, widely used in the recruitment and personnel selection process, in order to evaluate human factors of software development team members and to find the connection with individual performance.
Onslaught of New Ransomware Strains
Ransomware is now a common term in our vocabulary, but it continues to evolve. The release below warns of an onslaught of new flavors and how they can be found and averted. The tactics range from using help files to infect along with phishing emails. Games are also now being targeted, bad news for those with teenagers in the house.
Reliability and Availability
The concepts of reliability and availability are talked about, written about, equated with each other, and given star status but, in the main, remain somewhat one-dimensional concepts. In this chapter, and throughout High Availability IT Services, Terry Critchley shows that these concepts, particularly availability, have other dimensions and interpretations as well.
Big Data: Architecture and Its Enablement
The concept of big data not a database or data architecture but is more the solutions that leverage any and all data, wherever they come from. In health care, the concepts of big data are enabled only in organizations that focus on data--capture, management, and usage. Health care data is extremely broad, deep, and complex, yet the needs for data access are even greater and ever evolving. To meet such needs, effective data architecture must be intertwined with a formal data governance program. This combination unlocks analytics and begins to leverage big data.
Planning Meetings: The Risk Management Plan
Planning meetings are conducted to ensure the organization has a consistent vision in terms of the project's risk methodology, roles and responsibilities, timing, thresholds, reporting formats, and approaches to tracking. Planning meetings focus on bringing together key stakeholders on risk to determine the risk practices to be pursued and the approach to be used in pursuing them.
IT Performance Improvement: What's New in February 2015
"How to Measure and Improve the Business Value of IT Service" by Phil Weinzimer. "Two Weeks in Fire-Fighting Mode" by M. Kemal Atesman. "Systems Availability: The View from 30,000 Feet" by Terry Critchley. "Project Health Assessment Process" by Paul Royer. Richard Richards' and regular columnist Nancy Settle-Murphy's "Making Virtual Meetings Come Alive: It’s Everyone’s Job!"
Introduction to Customer Relationship Management (CRM) Systems
What is a Customer Relationship Management (CRM) system? Not only is there little agreement on what it really stands for, there is even less agreement on what constitutes a CRM system, how it should be used, the potential of profitability gain, the impact on customer loyalty, the costs involved, the personnel needed, and the training needed for the CRM personnel. CRM system characteristics are not limited to the CRM products and tools that are currently available in the market, and CRM is certainly not a technique or methodology.
Ten Tips to Avoid Massive Data Breaches. Don’t Be the Next Sony!
With Sony recently setting aside $15M to investigate the reasons for and remediate the damage caused by last year's data breach, many organizations—from large enterprises to small business—are wondering what they need to do make sure they aren’t the next big data breach headline. The good news is that most data breaches can be prevented by a common sense approach, coupled with some key IT security adjustments.
Creating the Requirements Management Plan and Requirements Traceability Matrix
The requirements management plan (RMP) is a document that describes how requirements will be analyzed, documented, and managed throughout the project. It is frequently published in conjunction with the requirements traceability matrix (RTM). Both the RMP and RTM are supposed to be created along with the requirements specifications, and all three documents act as key inputs in the creation of the project plan document. This excerpt from Project Scope Management: A Practical Guide to Requirements for Engineering, Product, Construction, IT and Enterprise Projects discusses creating the RMP and the RTM.
Overarching Topics in Managing the PSTN Transformation
This chapter from Managing the PSTN Transformation: A Blueprint for a Successful Migration to IP-Based Networks provides an overview of major organizational overarching topics, for example, the project structure with roles and responsibilities, the PSTN migration process, as well as a checklist of the main questions and risks that should be considered during the project.
The Smart Grid and Privacy
This chapter from Data Privacy for the Smart Grid discusses the emerging privacy risk and the need for privacy policies, reviews relevant privacy laws, regulations, and standards, and outlines privacy-enhancing technologies and new privacy challenges.
Critical Infrastructure Executives Complacent about Internet of Things Security
Tripwire, Inc. recently announced the results of an extensive study conducted by Atomik Research on the security of the "Enterprise of Things" in critical infrastructure industries. The study examined the impact that emerging security threats connected with the Internet of Things (IoT) have on enterprise security. Study respondents included 404 IT professionals and 302 executives from retail, energy and financial services organizations in the U.S. and U.K.
The Lean Leader: A Personal Journey of Transformation
In The Lean Leader, Robert B. Camp uses a compelling novel format to tackle the nuts and bolts of leading a Lean transformation. You'll follow along as the characters face real crises and what seem to be unreasonable deadlines. After reading this book, you'll know how to shed the decision-making tasks that have cluttered their days and delegate those decisions to employees who are closer to the action. You'll also learn how to look over the horizon to define and communicate a new course of action and compel others to follow. Click here to read Chapter 1.
How to Create a 12-Month Plan in Just Two Hours
There's something about the blank slate of a brand new year that makes it a perfect time to get your group together and lay down plans for the next 12 months. Sounds like a good idea in theory, but it can be near impossible to persuade people to hunker down in a meeting room for a couple of days when their 'day jobs' are so demanding. In this article Nancy Settle-Murphy describes how (and why) a processed called the Magic Wall works in a face-to-face (FTF) setting, and explores how some of these concepts might be played out virtually.
In this chapter from Techniques and Sample Outputs that Drive Business Excellence, H. James Harrington and Chuck Mignosa discuss brainstorming (creative brainstorming), a technique used by a group to quickly generate large lists of ideas, problems, or issues. The emphasis is on quantity of ideas, not quality.
The Digital Divide and the Global Post-2015 Development Debate
In this chapter from Digital Divides: The New Challenges and Opportunities of e-Inclusion, Jeremy Millard provides a global overview to put digital divides into perspective with a view toward the future. He argues that ICTs have a critical role to play in the proposed Sustainable Development Goals (SDGs), which will replace the Millennium Development Goals (MDGs) after they expire in 2015, but that stark digital divides, both between and within countries, could limit their potential effect.
Privacy Predictions 2025!
After posting their IT predictions for next year, Varonis decided to assign themselves an even more challenging task. Using recent headlines from the tech press as a baseline, they tried to extrapolate ahead to the year 2025. Where might today's stories about technology and privacy lead to in ten years if we don't change how we manage IT security today?
What Was, What Is, and What Should Never Be: A Look at Security 2014, 2015 and Beyond
In this insightful article, Stephen Coty, Chief Security Evangelist at Alert Logic, takes a retrospective look at some of the industries hardest hit by data breaches and vulnerabilities and looks to 2015 and beyond to discuss new and emerging malware.
McAfee Labs Threats Report: November 2014
Key topics in the November 2014 issue of the McAfee® Labs Threats Report and the significant impact of the recently-discovered BERserk vulnerability in RSA signature verification software and how cybercriminals exploit the trust we place in devices and websites. It also discusses some of the threat trends they expect to see in 2015.
Widespread Employee Access to Sensitive Files Puts Critical Data at Risk
It's been 18 months since Snowden demonstrated the inability of the Puzzle Palace to identify and mitigate internal threats. Now, a new survey suggests--not surprisingly--that most organizations are having difficulty balancing the need for improved security with employee productivity demands. Employees with needlessly excessive data access privileges represent a growing risk for organizations due to both accidental and conscious exposure of sensitive or critical data.
2014-2015 Security Surprises, Challenges and Predictions
As 2014 comes to a close, it is time to cast 2015 security predictions and look back at 2014 predictions to see what we got right, what we got wrong, and what surprised us. Here TK Keanini, Lancope CTO, takes retrospective look at his 2014 predictions, and projects 2015.
7 Ways to Keep Stakeholders Close in a Virtual World
Even though our intentions may be similar when working face-to-face and virtually, how we go about initiating and cultivating stakeholder relationships can be very different. Here are a few tips from Nancy Settle-Murphy, author of Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results, for engaging stakeholders virtually for projects that really matter.
Four Questions to Consider When Building a Security Platform
While most security professionals have come to grips with the fact that at some point they will fall victim to a compromise, the approach to security by and large still revolves around responding after something bad has occurred. Now this is by no means the fault of the security professional alone. The tools they have at their disposal, most of which offer a siloed view into their security posture, many times restrict their capabilities. To truly make the shift towards Continuous Advanced Threat Protection, security professionals need to evaluate tools and processes with a fresh set of eyes. This article outlines the four things to consider when making this necessary shift in security approach.
Breaking the Wall of Silence in a Virtual World
If you have ever led a virtual meeting, this scenario is familiar: You pose a brilliant provocative question, hoping to trigger a flurry of insightful responses. And instead, you hear ... Nothing. Nada. Zippo. Zilch. So what’s your next step? There are many techniques for generating more active participation in the virtual world. But first, you have to try to figure out the reasons for the silence. If you guess wrong, you might drive people further away from the virtual table. In this article from Communique, Nancy Settle-Murphy, author of Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results, explores some of the typical causes for a lack of participation, and will offer some remedies to help break through that painful wall of silence.
Basic Concepts of Multilevel Database Security
Mandatory access control (MAC) is a method of restricting unauthorized users from accessing objects that contain some sensitive information. An implementation of MAC is multilevel security (MLS), which has been developed mainly for computer and database systems at highly sensitive government organizations such as the intelligence community or the U.S. Department of Defense. This chapter from Multilevel Security for Relational Databases introduces the basic concepts of multilevel database security.
McAfee Report Reveals Organizations Choose Network Performance Over Advanced Security Features
McAfee today published a new report titled Network Performance and Security, exploring the challenges organizations face in deploying security protections while still maintaining an optimally performing network infrastructure. The report uncovered that an alarming number of organizations are now disabling advanced firewall features in order to avoid significant network performance degradation.
Android Malware Evolution
The evolution of Android malware, while mapping closely to the desktop trends, is often viewed at an accelerated pace. Malware and botnets have had time to grow and trial different methods of infections and potential uses, and the authors of the mobile counterparts are definitely applying these learned lessons. As explained in the chapter from Android Malware and Analysis, there are clear indicators that these are often the same groups working toward extending their list of infected machines to the Android world.
Introducing the Crowd
Crowdsourcing existed long before the term gained popularity and visibility among the masses. They were all practical problems that needed to be solved to create value to the general public or studies that were taken up to prove the power of the crowd. This chapter from Leveraging the Wisdom of the Crowd in Software Testing discusses how this benefits software development.
UTF-8 for PHP and MySQL
Overview of Mobile Platforms
This excerpt from Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective gives an overview of mobile devices (hardware) and mobile operating systems (software), and discusses MSN development architecture.
8 Ways to Stop Interruptions from Derailing Your Next Virtual Meeting
In this edition of Communique, Nancy Settle-Murphy explores practical steps that virtual meeting leaders can take to anticipate and effectively handle interruptions and other types of disruptions that may throw virtual meetings off-course.
New F-Secure Threat Report: Ransomware Rising, Even on Android
The first half 2014 saw an increase in online attacks that lock up user data and hold it for ransom -- even on mobile devices. According to F-Secure Labs' brand new 1H 2014 Threat Report, rising numbers of attacks from malicious software known as ransomware underscore the importance of data security for home, enterprise and government users. To find out the top countries for Android malware, the safest online market for mobile apps, and for more details about all the threats to PC, Mac and mobile, check out the full 1H 2014 Threat Report.
Survey of Secure Computing
Secure computing spans a wide spectrum of areas, including protocol-based security issues, denial of service, web and cloud, mobile, database, and social- and multimedia-related security issues, just to name a few. Even as threats present themselves, active mechanisms and good preparation can help to minimize incidents and losses arising from them, but it is also to be noted that security in computing is still a long way from complete. This chapter from Case Studies in Secure Computing: Achievements and Trends presents a survey of common issues in security attacks and defenses in computing through the application of cryptography and the aid of security models for securing systems.
Beyond PCI Compliance
An organization begins a journey when it achieves PCI compliance. It is usually a starting point for a continuing path to information security and assurance. It is very important for the organization to understand the potential challenges and effectively address them after they achieve successful PCI compliance. This excerpt from PCI Compliance: The Definitive Guide briefly discuss the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise.
Maintenance in the Digital World
This excerpt from Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle deals with contracting for maintenance for both hardware and software purposes in the initial negotiation.
The Oracle Cloud
Read this chapter on "Oracle Cloud" from Jessica Keyes' The CIO's Guide to Oracle Products and Solutions.
Don't Leave Remote Participants Hanging: 8 Tips for a Meeting of Equals
Let's face it: It's almost impossible to make remote callers feel like they're on equal footing with people who are gathered in the conference room for the big meeting. But with some thoughtful planning, you can come pretty close. Taking the perspective of a frustrated remote participant, Nancy Settle-Murphy, author of Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results, offers eight tips for people who plan and run "hybrid" meetings, consisting of people who are gathered face-to-face and those who join from afar. Here she assumes that the meeting planners are using WebEx and phone conferencing, but these tips can apply with almost any kind of virtual meeting set-up.
Enterprise architecture is a term that has been broadly defined and used by both academics and practitioners. This excerpt from Enterprise Integration and Information Architecture: A Systems Perspective on Industrial Information Integration provides a clearer understanding of enterprise architecture.
Stream vs. Batch Processing: Which One Is Better for Operational Intelligence?
Many organizations across industries leverage "real-time" analytics to monitor and improve operational performance. Essentially this means that they are capturing and collecting data in lots from various systems and analyzing it in batches through periodic on-demand queries. By contrast, companies that are leveraging "streaming analytics" are continuously collecting and analyzing data and automatically course-correcting as events unfold, when there's still an opportunity to positively impact the outcome.
Team Building for a Strategic Initiative
This excerpt from Agile Strategy Management: Techniques for Continuous Alignment and Improvement focuses on getting a strategic initiative off to a good start.
Accountability Is Why Technology Should Shift to the Business from IT
In the May 2003 edition of the Harvard Business Review, Nicholas Carr wrote an article that ignited a firestorm. In "IT Doesn’t Matter," later expanded to a book, he argues that IT is a commodity and doesn't provide competitive advantage. In this article, Ryan Ward suggests that "To meet business efficiency and growth requirements, Information Technology departments need to adopt a mindset of building processes and solutions where the Business is ultimately accountable for their desired solutions and information." What do you think? Another firestorm?
Before You Take Your Next Trip
I don't know if you've ever read Stratfor's guidance on personal security, such as "Taming Chaos with a Personal Plan," but this new book, Personal Security: A Guide for International Travelers, provides a comprehensive approach to personal security and safety when travelling, or even while at home. To support your pre-trip preparations, this chapter, "Before You Go," maps out expert advice and lessons from real life cases to give you insights into basic planning questions.
An Overview of the NoSQL World
Recently, a new generation of low-cost, high-performance database software, aptly named as NoSQL (Not Only SQL), has emerged to challenge the dominance of RDBMS. This excerpt from Large Scale and Big Data: Processing and Management explores NoSQL Key Systems and NoSQL Open Source Projects.
Heartbleed Disclosure Timeline InfoGraphic
This infographic looks at the vulnerability from March 21-April 7 from the perspective of NCSC-FI, Codenomicon, Google, Open SSL and other providers. In addition to the factual timeline, there is some analysis/commentary as well.
Data classification is the practice of assigning information into predefined groups where each group has a common risk and corresponding security controls. This excerpt from JJ Stapleton's Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity discusses how information can be organized into categories based on its impact of unauthorized disclosure due to insider or outsider threats. It also discusses the concept of data tagging of other attributes that affect data management.
Anonymity in Network Communication
In today’s interactive network environment, where various types of organizations and indiviudals are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Find out more in this excerpt from Anonymous Communication Networks: Protecting Privacy on the Web by Kun Peng.
Future Trends in WAN Security
This is an excerpt from Intrusion Detection in Wireless Ad-Hoc Networks edited by Nabendu Chaki and Rituparna Chaki.
Security Issues in Machine-to-Machine Communication
This is an excerpt from Security for Multihop Wireless Networks edited by Shafiullah Khan and Jaime Lloret Mauri.
The Hybrid (Frugal) CISO
This excerpt from Kerry Ann Anderson's The Frugal CISO: Using Innovation and Smart Approaches to Maximize Your Security Posture presents theFrugal CISO as a hybrid professional. Frugal CISOs possess a diverse set of qualities and is adaptable in choosing to utilize them depending upon the specific circumstances in which they are operating. Being able to adapt to a variety of environments and circumstances is fundamental to information security that is dynamic and constantly under pressure to securely manage new technical innovations.
Knowledge Management and e-Learning: Putting Theory into Practice
Knowledge management and e-learning have synergistic effects. They both contain elements of leveraging knowledge internally and externally, and both could add to the strategic intelligence of the organization. The combination of these two areas is just starting to evolve, per the evidence of the Knowledge Management & E-Learning journal and the recent book publication of Knowledge Management and E-Learning. Closer attention is warranted in the integration of these fields in order to advance the current state-of-the-art. In this presentation, Jay Liebowitz talks about these areas from a strategic intelligence framework, and will show examples of how you can translate the theory into practice.
Killer Music: Hackers Exploit Vulnerabilities in Media Players to Infect User Machines with Advanced Malware
Listening to music can have a positive impact on our brain. And of course, music improves our mood because it triggers the release of the "pleasure chemical" Dopamine. But what most organizations don't realize is that, while music can have a positive impact on its employees, the media players employees use to listen to their music of choice, or watch videos, can expose them, their machines, and their organization to risk of exploits and advanced malware infections.
SDN/OpenFlow: Concepts and Applications
From the Internet to many data center applications, SDN has found a wide array of useful possibilities. Everyone seems to be talking about SDN and OpenFlow, but what do they really know? Is it the panacea the media proclaims? In this excerpt from Network Innovation through OpenFlow and SDN: Principles and Design, Ashley Gerrity and Fei Hu discuss SDN's many applications, including researching new protocols prior to implementing them in real networks, increasing connectivity in rural environments, making both cloud-based and regular data centers better, and supporting mobile device offloading.
Internet Exploitation: The Web, Your Computer, Your IT System
In this excerpt from Trade Secret Theft, Industrial Espionage, and the China Threat, Carl Roper details vulnerabilities and attacks from hardware, software, and firmware (supply chain security issues) as well as network attacks.