Scott E. Donaldson - Böcker
Visar alla böcker från författaren Scott E. Donaldson. Handla med fri frakt och snabb leverans.
3 produkter
3 produkter
660 kr
Skickas inom 10-15 vardagar
The objective of APM Best Practices: Realizing Application Performance Management is to establish reliable application performance management (APM) practices—to demonstrate value, to do it quickly, and to adapt to the client circumstances.
607 kr
Skickas inom 3-6 vardagar
Scott Donaldson, Stanley Siegel and Gary Donaldson interview many of the world's most influential chief technology officers in CTOs at Work, offering a brand-new companion volume to the highly acclaimed bestseller Founders at Work by Jessica Livingston and Peter Seibel's best-selling Coders at Work, both from Apress. As the words at work" suggest, the authors focus on how their interviewees tackle the day-to-day work of the CTO while revealing much more: how they got there, how they manage and allocate projects, and how they interact with business units and ensure that their companies take advantage of technologies, teamwork, and software development practices to respond to organizational needs and improve employee productivity. Surveying a variety of unique corporations, CTOs at Work offers insights into the present and future of CTOs in organizations around the world. What you'll learn * How many chief technical officers from the world's leading corporations do their job, and the skills they consider most essential for carrying out their work effectively * Interesting applications of technology and software development used to increase productivity or profitability in today's leading organizations * The technology- and business-related challenges and opportunities that CTOs foresee in years to come Who this book is for Anyone interested in how a CTO views the use of technologies in an organization and leads its software development initiatives. This book is especially useful for managers, developers, and IT personnel charged with using automation to increase productivity. Indeed, it's not just for aspiring CTOs, but also for project managers, software engineers, and application developers who want a better understanding of the strategies their senior IT executives employ to make their organizations as productive and competitive as possible. Table of Contents * SAIC * CA Technologies * Johns Hopkins University Applied Physics Laboratory * Polar Star Consulting * BPL Global * NPR * Mind Over Machines * Gartner, Inc. * Springer * TinEye/Idee * MAPA Group * Johnson & Johnson, Vertex Pharmaceuticals * Gerson Lehrman Group
Enterprise Cybersecurity Study Guide
How to Build a Successful Cyberdefense Program Against Advanced Threats
Häftad, Engelska, 2018
756 kr
Skickas inom 10-15 vardagar
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book’s ideas and put them to work. The guide can be used for self-study or in the classroom.Enterprise cybersecurity is about implementing a cyberdefense program that will succeed in defending against real-world attacks. While we often know what should be done, the resources to do it often are not sufficient. The reality is that the Cybersecurity Conundrum—what the defenders request, what the frameworks specify, and what the budget allows versus what the attackers exploit—gets in the way of what needs to be done. Cyberattacks in the headlines affecting millions of people show that this conundrum fails more often than we would prefer.Cybersecurity professionals want to implement more than what control frameworks specify, and more than what the budget allows. Ironically, another challenge is that even when defenders get everything that they want, clever attackers are extremely effective at finding and exploiting the gaps in those defenses, regardless of their comprehensiveness. Therefore, the cybersecurity challenge is to spend the available budget on the right protections, so that real-world attacks can be thwarted without breaking the bank.People involved in or interested in successful enterprise cybersecurity can use this study guide to gain insight into a comprehensive framework for coordinating an entire enterprise cyberdefense program.What You’ll Learn Know the methodology of targeted attacks and why they succeedMaster the cybersecurity risk management processUnderstand why cybersecurity capabilities are the foundation of effective cyberdefensesOrganize a cybersecurity program's policy, people, budget, technology, and assessmentAssess and score a cybersecurity programReport cybersecurity program status against compliance and regulatory frameworksUse the operational processes and supporting information systems of a successful cybersecurity programCreate a data-driven and objectively managed cybersecurity programDiscover how cybersecurity is evolving and will continue to evolve over the next decadeWho This Book Is ForThose involved in or interested in successful enterprise cybersecurity (e.g., business professionals, IT professionals, cybersecurity professionals, and students). This guide can be used in a self-study mode. The book can be used by students to facilitate note-taking in the classroom and by Instructors to develop classroom presentations based on the contents of the original book, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats.