IT Security: Risking the Corporation : 9780131011120

Even the world's largest and most sophisticated networks are vulnerable to attack-and so is yours. The scenarios described in IT Security:Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software-as well as the vulnerability caused by poor training, corporate politics, and careless management.


In the previous version of this book, originally published as Intranet Security:Stories From the Trenches, Linda McCarthy drew on her experience penetrating thousands of corporate networks to identify key security risks and practical solutions. This timely update is even more compelling and offers a clear plan for improvinhg the security of your systems. You'll find useful tools and preventive measures you can take right now. In addition, McCarthy's security checklists and resource listings can help you tighten security throughout your entire IT infrastructure.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job : 9780471779872

It's not a job. It's THE job, and here's how to get it.

What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven't had much experience? What if you're not 30 anymore?


Here's the crash course in how to discover, apply for, and land the IT security job you want. Written by a squad of highly credentialed security professionals, this guide prepares you with the technical knowledge, interview skills, strategies, and job search techniques you need to find and get the perfect job.


Meet every job search challenge




  • What does — and doesn't — belong on your résumé


  • How to survive a telephone interview




  • All about firewall technologies, devices, deployment strategies, and management




  • A review of security essentials, regulations, legislation, and guidelines




  • The effects of state cyber security laws, Sarbanes-Oxley, and international standards




  • A refresher course in network fundamentals




  • Everything you should know about wireless, security posture, and tools




  • When and how to say "no"



Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Project+ Study Guide : 9780782140682

Here's the book you need to prepare for the latest version of CompTIA's IT Project+ exam. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides:

* Clear and concise information on IT project management
* Practical examples and insights drawn from real-world experience
* Leading-edge exam preparation software, including a test engine and electronic flashcards
You'll also find authoritative coverage of key exam topics, including:
* IT Project Initiation and Scope Definition
* IT Project Planning
* IT Project Execution, Control and Coordination
* IT Project Closure, Acceptance and Support

This book has been reviewed and approved as CompTIA Authorized Quality Curriculum (CAQC). Students derive a number of important study advantages with CAQC materials, including coverage of all exam objectives, implementation of important instructional design principles, and instructional reviews that help students assess their learning comprehension and readiness for the exam.

Note: On August 10, 2004 CompTIA changed the name of the IT Project+ certification to Project+, "in order to better reflect the title's application beyond IT professionals." Neither the exam objectives nor the exam questions were changed. The CAQC appoved content found in this edition of the IT Project+ Study Guide therefore remains valid and suitable for candidates preparing for the Project+ certification.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Project+ Study Guide, 2nd Edition (Exam PKO-002) : 9780782143188

Here’s the book you need to prepare for the latest version of CompTIA’s IT Project+ exam. This Study Guide was developed to meet the exacting requirements of today’s certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the “Best Study Guide” designation in the 2003 CertCities Readers Choice Awards, this book provides:



  • Clear and concise information on IT project management

  • Practical examples and insights drawn from real-world experience

  • Leading-edge exam preparation software, including a test engine and electronic flashcards


You’ll also find authoritative coverage of key exam topics, including:



  • IT Project Initiation and Scope Definition

  • IT Project Planning

  • IT Project Execution, Control, and Coordination

  • IT Project Closure, Acceptance and Support


Look to Sybex for the knowledge and skills needed to succeed in today’s competitive IT marketplace.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Project Portfolio Management : 9781580537810

While consulting for a large company’s information technology (IT)
department, I was asked to help find a way to better manage the various
IT projects that were spread among all of its business units. The executives
wanted me to research tools that would help them prioritize the
projects so they would know which ones were healthy contributors to
the corporate strategy and which ones could be axed. The market in
which they were selling their products was slowing down, and they
wanted to centralize corporate governance and trim unnecessary IT
projects. Because they also knew that some IT projects were critical to
the growth and ongoing operations of the company, they couldn’t simply
eliminate a random sampling. Though we had experiences in IT
program management and executive information systems (EISs), we
had little experience in project portfolio management (PPM). After
some research, we realized that implementing a project prioritization
tool would be just the tip of the iceberg in providing a successful and
lasting solution to their problem.

This was a very project-centric company with over 250 ongoing IT
projects running at one time. The market was constantly forcing the
product line to change. Such pressures to decrease the life cycle and
increase the quality of their products directly affected how the executives
wanted IT to improve the efficiencies of their units. This ultimately
made the company a prime candidate to adopt IT project-centric
management techniques. Combining such a need with the realization
that the company had dispersed IT governance across all of
the business units highlighted the notion that this initiative would be
an organizational change exercise similar in scale to an enterprise
resource planning (ERP) or customer resources management (CRM)
implementation. As it turns out, the long-term solution to centralizing
IT project control was too much of a bite for them to take at
once—organizational change needed to come piecemeal if it was going
to succeed.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Project Management : On Track from Start to Finish, Second Edition : 9780072232028

Get expert advice on planning and steering a successful IT project using PMBOK-driven principles. Expert author and PMI certified Project Management Professional, Joseph Phillips, walks you through each step of the IT project management process, and shares critical strategies that engender smoothly-run, on-time, and within-budget projects. Find the best path to initiate a project, uncover techniques for project planning, focus your managing skills on picking the most qualified team members, and discover ways to deal with management. Then, establish communication channels and realistic timetables and learn how to track financial obligations. These concepts are also illustrated through interviews with leading IT project managers.



  • Define a project goal and create the project charter

  • Create a feasibility plan and establish a priority list

  • Determine strategy and obtain budget dollars

  • Work with management and define their role

  • Determine project expenses—including estimated required hours

  • Organize a project team—assess internal skills as well as utilize external resources

  • Delegate responsibilities and manage project schedules

  • Resolve disagreements—as well as address delays and budget increases

  • Track progress and implement quality testing

  • Maintain leadership and keep your team focused

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Project Management Handbook : 9781567260984

Now you can manage IT projects quickly, easily, on time, and on budget!

IT project management has developed into a complex process with a broader scope of responsibilities than ever before. Here is the newest and most comprehensive book to offer winning insights and strategies on how to manage every step of the process. Written by two of this country’s leading experts on IT Project Management, this extensive yet easy-to-use volume will give you the tools you need to successfully navigate your next IT project.


You’ll learn how to avoid cost overruns and schedule delays, meet customer requirements, take control of budgets and resource allocation, build a successful team, and put to use many more tried-and-true methods of project management. The handbook includes a completely up-to-date overview of the best Internet services, current software, and repositories available via the Internet along with networking, e-commerce, reuse, prototype, modeling and simulations.


It’s all contained in this user-friendly handbook that will soon become the foundation for every IT project you manage … or take part in. Based on real-world practical experience and case studies, the Handbook will give you the framework to manage, improve, and build greater accuracy into every phase of your IT project management.


Here are just some of the systems, methods, tools, case studies, and techniques covered:


* IT Project Planning and Development Life Cycle Phases * Identifying Users, Customers, and Stakeholders * Customer Requirements Management * Project Modeling and Simulation * Customer Acceptance Criteria * Project Control and Recovery Mechanisms * Project Budgeting, Staffing, and Scheduling * Function Point and Earned Value Methods * The Gantt Chart, PERT Chart, and CPM * Risk Management – Assessment, Mitigation, Monitoring, and Reporting Plan * System Management Standard * Project Measurement Schema * Project management Tools – Microsoft Project, Kidasa Software’s Fast Track Schedule * Project Management Quality Control Mechanism * IT Networks and Internet Taxonomy * Wireless Technology, E-Commerce, and M-Commerce * System Software LifeCycle Model * System Integration Techniques * System Testing and Evaluation * Customer Satisfaction

About the Author


Jag Sodhi, MS, is a professor associated with the Defense Acquisition University. He has 32 years of combined experience as a well-known author, software developer, consultant, instructor, and project manager for defense products and commercial business applications. He has been a computer specialist and project manager and a member of DOD’s advanced technology team. He specializes in the best commercial practices and COTS tools for systems development and maintenance. Mr. Sodhi evaluated the Integrated Computer Aided Software Engineering (I-CASE) pilot project and is a member of the team for the DII COE project. He was the project leader for migration of his systems to the Joint Technical Architecture standard.


Prince Sodhi is a senior management consultant for Proxicom Int'l Corp. He is an expert in project management, several programming languages, and in distributed computing applications in a multiple-tier, client-server environments. He is co-author of the books Software Reuse: Domain Analysis and Design Process (1999) and Object-Oriented Methods for Software Development (1996), McGraw-Hill. He has a bachelor’s degree in computer/mathematics from the University of Minnesota.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Project + CoursePrep ExamGuide : 9780619063498

Provides the essential information you need to ace CompTIA?s IT Project+ Certification Exam. Each certification objective is covered in a unique two-page spread that highlights the key points of the objective.

Prepare your students for CompTIA's new IT Project + exam in this prep guide. Devotes two full pages of material to every IT Project+ exam objective. Softcover.

About the Author

Kathy Schwalbe is an associate professor at Augsburg College in Minneapolis and teaches project management, problem solving for business, systems analysis and design, information systems projects, and electronic commerce. Kathy worked for 10 years in industry before entering academia in 1991. In addition, Kathy is an active member of PMI (Project Management Institute). Kathy earned her Ph.D. at the University of Minnesota, her MBA at Northeastern University, and her B.S. in mathematics at the University of Notre Dame.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Problem Management : 9780130307705

The complete "best practices" guide to IT problem resolution!


No matter how professional your IT organization, if you can't resolve problems quickly and effectively, you'll lose your stakeholders' confidence—and fail. Nowadays, help desk s aren't enough: companies want true service centers capable of delivering complex, strategic solutions. IT Problem Management is the first single source for building world-class problem management processes. Drawing upon his extensive consulting e xperience, Gary Walker presents specific improvements you can make to achieve breakthrough results in any help desk or service center—in-house or out-sourced. Coverage includes:



  • Problem identification, customer validation, problem lo gging, service delivery, knowledge capture and sharing, and management oversight

  • The Immediate Response Model: accounting for problem variability, complexity, and volume

  • Detailed metrics for measuring your responsiveness

  • Bett er ways to create and use service level agreements

  • State-of-the-art tools for customer interaction, service delivery, and proactive monitoring

  • New Internet and knowledge base systems: empowering users to solve their own problems

  • The human side: staffing, retention, and motivation


IT Problem Management isn't just theory: it delivers real-world case studies, detailed benchmarks, and practical solutions for turning your help desk into a high-performance I T service center, starting today.


About the Author

GARY WALKER is a leading IT consultant, helping Fortune 500 and emerging growth companies focus on the people, processes, and technology required to operate a highly reliable and cost effective infrastructure.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Portfolio Management: Unlocking the Business Value of Technology : 9780471649847

This book provides a pragmatic, step-by-step road map, describing IT portfolio
management and its major elements. Chapter 1 provides an overview of IT
portfolio management. Chapter 2 describes the planning aspects of IT portfolio
management. It explains the IT portfolio management maturity model and the
key people, process, and technology aspects at each of five levels within the model.
Chapter 3 describes the IT governance aspects of the IT portfolio. It discusses the
relationship between IT and corporate governance, and the impact of legislation
and compliance rules, such as the Sarbanes-Oxley Act, on the IT portfolio. Chapter
4 covers the IT life cycle and IT subportfolios. Chapter 5 provides step-by-step
aspects of building the IT portfolio. Chapter 6 describes the request for information
and the request for proposal parameters that companies should consider when
evaluating and assessing IT portfolio management software providers. Chapter 7
covers the way forward, discussing the impact that adaptability and new technologies
have on IT portfolio management. The book concludes with detailed case
studies of Cisco Systems, In-Q-Tel, and Xcel Energy, which are exemplar companies
that actively practice IT portfolio management.

About the Author
Bryan Maizlish is Chief Technology Officer-Program Team at Lockheed Martin Integrated Systems & Solutions' GeoSpatial-Intelligence Solutions line of business. He is also the Chairman for the annual Strategic & Operational Portfolio Management conference cosponsored by the PDMA and IIR. He has served in management roles for companies that developed the Internet strategy, design and architecture, and systems integration and implementation for many global 2000 companies. He received his MBA from The Wharton School of Business, and was a member of the 1983 Rose Bowl Champion UCLA football team. He lives in Potomac, Maryland with his wife and three children.

Robert Handler is Vice President at META Group, Inc., one of the leading IT research firms. Robert led the IT portfolio management research for META Group and is a sought-after speaker and author of numerous research papers on the topic. He has over fifteen years of experience in all aspects of information technology, and has worked at such esteemed organizations as IBM and Ernst & Young LLP. He holds a Bachelor of Science in Business Administration from Pepperdine University and an MBA in Information and Decision Systems from San Diego State University. He lives in San Diego with his wife, two children, and two golden retrievers.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Innovation for Adaptability and Competitiveness : 9781402079993

IT Innovation for Adaptability and Competitiveness addresses the topic of IT innovations that can further an organization's ability to adapt and be competitive. Thus we address the problem at an earlier starting point, that is, the emergence of something innovative in an organization, applied to that organization, and its process of being diffused and accepted internally.
Topics covered in the book include:



  • The role of IT in organizational innovation,

  • Innovating systems development & process,

  • Assessing innovation drivers,

  • Innovation adoption,

  • New environments, new innovation practices.


This volume contains the edited proceedings of the Seventh Working Conference on IT Innovation for Adaptability and Competitiveness, which was sponsored by the International Federation for Information Processing (IFIP) Working Group 8.6 and held at Intel Corporation, Leixlip, Ireland in May-June 2004.


IFIP WG 8.6 has as its focus diffusion of technological innovation. In this conference we have solicited papers on the topic of IT innovations that can further an organization’s ability to adapt and be competitive. Thus we address the problem at an earlier starting point, that is, the emergence of something innovative in an organization, applied to that organization, and its process of being diffused and accepted internally.


A further extension of this would be the propagation of a successful innovation outside the originating organization as a product, service or example of technology use that builds the firm’s markets. In this discussion we are supposing that said innovations are indeed a contribution. In reality, an idea is only labeled an innovation once it is accepted. Before that time, it can be just an idea, a crackpot idea, a disturbance, obsession, distraction or dissatisfaction with the status quo. Many innovations are of course deliberately cultivated in research labs, but again their success is the determinant of their eventual designation as “innovative”.


Conversely, some ideas really are crackpot concoctions or technologies in search of a use that linger in the environment as potential innovations long after their use is discredited. Case in point: voice recognition software, which does have some applications but has been over hyped and over applied for about 20 years. Today some call centers won’t let users punch a single button on their telephone sets; they MUST tell the voice recognition program what they want. Some of these systems will revert to an operator if the voice recognition system doesn’t understand, while others will just hang up. We were relieved to note the following title in the March 5 Financial Times: “To speak to an operator, start swearing now.” Someone has developed an innovation to recognize user frustration and bypass the prior innovation of persistent automated voice “response”!

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT-Enabled Strategic Management: Increasing Returns for the Organization : 9781591409083

We live in an age in which the value of information and knowledge has far surpassed that
of physical goods. Information resources have become a key differentiator of successful
businesses. Information technology (IT) and information systems (IS) are now integrated
in almost every aspect of business, from planning to analysis and design,
operations management and strategic decision making. Even for those businesses not
in information industries, information plays a vital role in supporting their business
functions, from routine operations to strategizing. John Naisbitt (1982) theorized that
information would be the driving force for organizations. Companies that manage
information well are more likely to maintain a competitive advantage against their peers.
Because information has become a major force in driving business activities, Evans and
Wurster (2000) proclaimed that every business is in the information business.

IT and IS have experienced dramatic changes in the last few decades. Their major role in
business has shifted from tools to support “back-office” operations to an integrated part
of business strategies and the maintenance of core competencies. Strategic management,
as the process of business strategy formulation and strategy implementation, is concerned
with establishing goals and directions, and developing and carrying out plans to
achieve those goals. As organizations evolve, so do their strategies and strategic
management practices. In recent years, IT has become increasingly important in strategic
management. IT and IT-enabled systems are now indispensable in supporting business
strategies. In this chapter, we examine the evolution of information technology and
strategic management, and their interplay in the last 50 years. We start with a review of
major theories and development in both strategic management and IT, and then explore
how IT has become an enabler for strategic management. We also discuss research issues
in IT-enabled strategic management, and suggest future directions in this crossdisciplinary
research field.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Auditing: Using Controls to Protect Information Assets : 9780072263435

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.


Build and maintain an IT audit function with maximum effectiveness and value



  • Implement best practice IT audit processes and controls

  • Analyze UNIX-, Linux-, and Windows-based operating systems

  • Audit network routers, switches, firewalls, WLANs, and mobile devices

  • Evaluate entity-level controls, data centers, and disaster recovery plans

  • Examine Web servers, platforms, and applications for vulnerabilities

  • Review databases for critical controls

  • Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies

  • Implement sound risk analysis and risk management practices

  • Drill down into applications to find potential control weaknesses


About the Authors


Chris Davis, CISA, CISSP, leverages his experience auditing IT systems for Texas Instruments. Mr. Davis has trained and presented in information security, advanced computer forensic analysis, and hardware security design. He actively teaches auditing and certification curriculum for Southern Methodist University and is the author and contributor to several books and publications. His contributions include projects and presentations for SANS, Gartner, Harvard, BlackHat, and 3GSM. He has enjoyed positions at Texas Instruments, Austin Microsoft Technology Center, and Cisco Systems. He holds a bachelor's degree in nuclear engineering technologies from Thomas Edison, and a master's in business from the University of Texas at Austin. Chris was a U.S. Navy submariner, and served on the deep dive Submarine NR-1 and the ballistic missile OHIO class USS Nebraska, SSBN 739, Blue Crew.


Mike Schiller, CISA, has 14 years of experience in the IT audit field, most recently as the worldwide IT audit manager at Texas Instruments(TI). Prior to that, Mike served as the IT audit manager at The Sabre Group, where he served as the company's first-ever IT audit manager, creating the IT audit function, team, and processes from the ground up. Mike also has several years of experience as a senior IT auditor, programmer/analyst, and manager of IT support teams. He is involved in multiple industry IT audit organizations and has been a presenter at IT conferences such as ASUG. In addition to his years of experience in corporate management, Mike is also heavily involved in leadership at his church, Richardson East Church of Christ. He has a bachelor's degree in business analysis from Texas A&M University.


Kevin Wheeler, CISA, CISSP, NSA IAM/IEM, is the founder and CEO of InfoDefense, an information security consultancy. Mr. Wheeler's project and employment portfolio includes organizations such as Bank of America, EDS, McAfee, Southern Methodist University and the State of Texas. He has performed information security audits and assessments as well as information security design, computer incident response, business continuity planning, and IT security training for both government and commercial entities in the financial services, healthcare, and IT services industries. He holds a bachelor of business administration degree from Baylor University and is an active member of ISSA, ISACA, Infragard, the North Texas Electronic Crimes Task Force, and Greater Dallas Chamber of Commerce.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Administrator's Top Ten Introductory Scripts for Windows (Administrator's Advantage Series) : 9781584502128

A key problem with Microsoft Windows is that its friendly user interface can get in the way of efficient system administration. There's no easy way, for example, to use the graphical administration tools to determine which of your users have passwords that will soon expire. The answers to such problems of administration come in the form of scripts written for the Windows Script Host (WSH), which are what IT Administrator's Top 10 Introductory Scripts for Windows aims to teach its readers about. It succeeds; Jeff Fellinge takes on 10 significant administration challenges (getting a list of a machine's local user accounts remotely, comparing successive weeks' computer rosters, getting a concise report of users and groups on Active Directory, and so on) and shows how to solve them. It's a handy resource for an administrator who's not fond of trooping across the office (or, all too frequently, the country) to do menial tasks.

This book should also prove useful to programmers interested in integrating their products with Active Directory. Fellinge takes care to document his scripts in detail--he does not commit the popular sin of presenting the user with giant, unexplained code listings--and it's usually easy to figure out why he's designed his code as he as. Combined with a reference that details JScript for WSH, this book will prove especially valuable. --David Wall


Topics covered: How to use JScript and the Windows Script Host (WSH) to write time-saving administrative scripts for Microsoft Windows 2000, Windows Server 2003, and (to a far lesser extent) Windows NT.

The IT Administrator's Top 10 Introductory Scripts for Windows helps administrators learn, and quickly implement, new scripting tools to increase productivity and reduce redundancy. It teaches readers scripting basics by explaining and breaking down real-world examples, and focuses on harnessing scripting power for IT systems administrators and systems engineers. The book is built around 10 fully-functional scripts that will help IT administrators manage their environment right "out of the box." Administrators also learn the strategies and tactics surrounding the development and implementation of these real-world scripts. Additionally, the chapters cover hypothetical, real-world business needs and explain how to map a script-based solution, including a discussion of the preferred language, tools, and technologies.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Issues of Human Computer Interaction : 9781591401919

The interaction between humans and computers is evolving rapidly, impacting every aspect of human and organizational life. This book presents the latest developments in this field of Human Computer Interaction (HCI). It discusses issues related End User Computing, as well as issues related to the human side of IT. This book will set a framework for the social and organizational issues related to IT, giving emphasis to its role as facilitator of social relationships, enabling the development of the organizational and individual intelligence and helping to improve human conditions. In Issues of Human Computer Interaction, models and theories are presented together with practical cases that will help students, lecturers, researchers and managers to have a clear idea of what is going on in HCI, today.

About the Author
Anabela Sarmento is a professor at the Institute of Administration and Accountancy (ISCAP)/Polytechnic School of Porto (Portugal). She is also an invited researcher at the Algoritmi R & D Center, Information Systems Group, at the University of Minho (Portugal). She lectures courses related to business communication, information society, and interactive marketing. Her primary area of research is the impact of information systems on organizations, namely in the domain of communication, knowledge and organizational learning, as well as in the role of the context in the use of information systems. She is also interested in knowledge management and its relation with information systems. She received her doctorate in information systems from the University of Minho (Portugal) in 2002.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Issues of Human Computer Interaction: Opportunities and Challenges : 9781591402350

The interaction between humans and computers is evolving rapidly, impacting every aspect of human and organizational life. This book presents the latest developments in this field of Human Computer Interaction (HCI). It discusses issues related End User Computing, as well as issues related to the human side of IT. This book will set a framework for the social and organizational issues related to IT, giving emphasis to its role as facilitator of social relationships, enabling the development of the organizational and individual intelligence and helping to improve human conditions. In Issues of Human Computer Interaction, models and theories are presented together with practical cases that will help students, lecturers, researchers and managers to have a clear idea of what is going on in HCI, today.

Human Computer Interaction (HCI) has its roots in the main areas of industrial engineering, human factors and cognitive psychology with the focus on the development of user-friendly IT. Traditionally, the research in this area has emphasised the technological aspect of this relationship (the Computer). More recently, other aspects concerning the organizational, social and human context also began to be considered (the Human). Today, one can say that any attempt to facilitate the relationship between the machine and the user must consider not only the technological perspective (e.g., promote the usability) but also, for instance, the way the user is going to use the technology and his or her purpose as well as the social and cultural context of this use (the Human and the Computer).

Another issue that should be considered in this interaction is the impact that information systems/technology may have on humans and organizations. There is general consensus that the adoption of any IT/IS brings change. Furthermore, IT/IS and organizations have a mutual influence on each other, meaning that this technology affects organizations and that organizations necessarily affect, for instance, the design, the choice and the management of those systems. The adoption of an IT/IS is, thus, mediated by factors that will influence the interaction between the sectors involved. It is also generally agreed that the adoption of a certain IS by different organizations does not give rise to the same changes; that is, the same technology might engender different impacts and these differences are due not to the characteristics of the technology itself, but to the characteristics of the context and the relationships that are established among all the factors involved.

About the Author
Anabela Sarmento is a professor at the Institute of Administration and Accountancy (ISCAP)/Polytechnic School of Porto (Portugal). She is also an invited researcher at the Algoritmi R & D Center, Information Systems Group, at the University of Minho (Portugal). She lectures courses related to business communication, information society, and interactive marketing. Her primary area of research is the impact of information systems on organizations, namely in the domain of communication, knowledge and organizational learning, as well as in the role of the context in the use of information systems. She is also interested in knowledge management and its relation with information systems. She received her doctorate in information systems from the University of Minho (Portugal) in 2002.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Issues and Trends in Technology and Human Interaction (Advances in Technology and Human Interaction) : 9781599042688

purposes of humans. It often has unintended and unexpected effects on humans and can be used for purposes other than originally planned. While technology cannot exist without humans, one can equally well argue that humans cannot exist without technology. This relationship touches on many fundamental questions of anthropology, ontology, and epistemology. Due to the complexity of the field of technology and human interaction, we cannot hope to do it justice in a single volume. The chapters in this current book are therefore focused on a sub-sector, namely the area of information and communication technology. They discuss different topics and angles on the way in which humans interact with ICT. The book reflects a variety of approaches and problems that researchers have investigated in this area. It is meant to be multi-disciplinary and demonstrate the richness of these studies. The reference disciplines that the authors draw upon reflect this multi- and trans-disciplinary nature. They include information systems, computer science, sociology, philosophy, gender studies, and even theology.

This book will provide the reader with a wide range of interesting and novel approaches to the relationship between technology and humans. It can be used for teaching as well as for research purposes, and it will contain insights that are of relevance for social and organisational use of ICT.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Isometric Game Programming with DirectX 7.0 w/CD : 9780761530893

Isometric Game Programming with DirectX takes you from zero to DirectX, literally! Beginning with game programming basics you will explore such topics as WIN32 programming basics, GDI fundamentals, fonts, regions and bitmaps, DirectDraw, and Game Logic. You'll then move on to Isometric fundamentals and methodology as well as advanced topics such as Random World Generation and Direct3D.This book is a comprehensive Isometric game programming guide ideal for any serious game developer!

This book, as you are no doubt aware, is a book about programming games—how to do so, specifically—
and it emphasizes use of the isometric view. This means that the program examples are mainly concerned
with the graphical aspect of game programming.
Contained herein is also quite a bit of information on the algorithms behind tile-based games. Isometric
games tend to be tile-based. If you wanted to make overhead view tile-based games, the same algorithms
apply.

Why did I write this book, you ask? Because isometric game programming, and isometric algorithms, have
been largely ignored by other game programming books. Sure, you can find plenty of books on how to
program 3D games, and there are plenty of books on 2D games, but none of the in-between stuff, like
isometric games.

You will find the program examples (and there are a ton of them) that go along with the text on the CD
in the back of the book; you will find instructions on how to load and run those examples in Appendix A.
It is a good idea to turn to that appendix first, even before you start reading. That way, when the first mention
of an example is made, you’ll be ready to go.

About the Author


Ernest S. Pazera started programming on a TRS-80 Color Computer 2 in 1986; he switched to PC permanently
in 1990. He doesn’t have a computer science degree, just a high school diploma. Ernest served in
the United States Navy from 1993 until 1996 but never forgot his first love, which was game programming.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

ISO 9001: 2000 Quality Management System Design : 9781580535267

An effective ISO 9001:2000 quality management system, driven by a fully compliant quality manual, is key in meeting ISO 9000 quality standards and a must for obtaining ISO certification. Written by an RAB certified quality management systems lead auditor, with forty years of industrial experience – who has a 10-year track record in either the consultation or auditing support of over one-hundred ISO certified organizations – this book provides you with the design principles and techniques for implementing an effective quality management system.

The book describes the design rules required to document, implement, and demonstrate quality management system effectiveness in compliance with the latest version of the ISO 9000 International Standard. This systematic and engineering approach simplifies the many complexities in maintaining compliance with ISO standards. This hands-on guide is packed with tips and insights the author has garnered from personally designing quality management systems that integrate organizational strategy with quality management. Moreover, the book helps you create meaningful documentation and a user-friendly, informative quality manual that together form the core of an effective and responsive quality management system.

Text describes the design rules required to document, implement, and demonstrate quality management system effectiveness in compliance with the latest version of the ISO 9000 International Standard.


The pursuit of product quality requires that an organization create a quality framework. The ISO 9001:2000 quality management system (QMS) is an internationally established quality framework. This book is designed to assist an organization to structure an ISO 9001:2000 QMS on some well-established documentation and implementation concepts that have been proven to be effective based on ten years of intensive consulting and auditing experiences with 106 ISO 9000–certified organizations. The intent of this exercise is to provide the reader with a reasonable probability of maximized organizational productivity when the ISO 9001:2000 system is implemented.


About the Author
Jay J. Schlickman is an RAB certified quality management systems lead auditor; an RAB qualified ISO 9001:2000 auditor; a certified Canadian medical devices conformity assessment system auditor; and quality management systems consultant based in Lexington MA. He received his B.S. and M.S. in physics from Northeastern University. He is a Life Member of the Institute of Electrical & Electronics Engineers (IEEE), a member of the American Physical Society (APS), and a member of the American Society for Quality (ASQ).

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IS-IS Network Design Solutions : 9781578702206

The definitive IS-IS reference and design guide.





  • Extensive coverage of both underlying concepts and practical applications of the IS-IS protocol




  • Detailed explanation of how the IS-IS database works and relevant insights into the operation of the shortest path first (SPF) algorithm




  • Comprehensive tutorial on configuring and troubleshooting IS-IS on Cisco routers




  • Advanced information on IP network design and performance optimization strategies using IS-IS




  • Network design case studies provide a practical perspective of various design strategies




  • Comprehensive overview of routing and packet-switching mechanisms on modern routers




  • A collection of IS-IS packet formats and analyzer decodes useful for mastering the nuts and bolts of the IS-IS protocol and troubleshooting complex problems




Interior gateway protocols such as Intermediate System-to-Intermediate System (IS-IS) are used in conjunction with the Border Gateway Protocol (BGP) to provide robust, resilient performance and intelligent routing capabilities required in large-scale and complex internetworking environments. Despite the popularity of the IS-IS protocol, however, networking professionals have depended on router configuration manuals, protocol specifications, IETF RFCs, and drafts. Mastering IS-IS, regardless of its simplicity, has been a daunting task for many.


IS-IS Network Design Solutions provides the first comprehensive coverage available on the IS-IS protocol. Networking professionals of all levels now have a single source for all the information needed to become true experts on the IS-IS protocol, particularly for IP routing applications. You'll learn about the origins of the IS-IS protocol and the fundamental underlying concepts and then move to complex protocol mechanisms involving building, maintaining, and dissemination of the information found in the IS-IS database on a router. Subsequent discussions on IP network design issues include configuration and troubleshooting techniques, as well as case studies with practical design scenarios.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google