Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu (The Art of War), the Thirty-Six Principles from the Warring States...
Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The P...
Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.
Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, ...
Business Continuity Management: Choosing to survive shows you how to systematically prepare your business, not only for the unthinkable, but also for smaller incidents which, if left unattended, could well lead to major disasters.
Business Continuity Management: Choosing to survive shows you how to systematically prepare your business, not only for the unthinkable, but also for ...
'IT as we know it is dead.' Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing perceptions of how technology should work and newfound, but very real, competition, IT organizations are struggling to evolve - but into what? In The Quantum Age of IT, Charles Araujo examines what has led us to this point and what it means to the future of IT organizations. With a broad perspective on the fundamental changes affecting the industry, he offers practical guidance that every IT professional needs to compete in this new era of IT. Whether...
'IT as we know it is dead.' Forces are at work that are reshaping the very fabric of the IT organization. Driven by our own history, changing percepti...
Regardless of whether you are client or provider, if you want to understand, assess or improve your IT, you first need to measure it.
But what do you measure? How and when do you take those measurements? Who does the measuring? And what do you do with the measurements once you've taken them?
Getting the measure of IT measurement -
This pocket guide brings together client and provider perspectives on IT and outlines a set of common measures that both sides can relate to. It seeks to emphasize the importance of meeting the needs of IT users and the role that measurement can play in...
Regardless of whether you are client or provider, if you want to understand, assess or improve your IT, you first need to measure it.
You've read the books, but... A wealth of material has been written to describe the underlying mechanics of ITSM, but very little practical advice is available on how to implement ITSM best practices to achieve an organization's business objectives. The official ITIL(r) volumes explain what service management is, how the processes work and fit together, and why IT shops should adopt the practice, but they are notoriously vague on how to design and implement an ITSM model in a real organization. This challenge is best understood by those with experience of transforming ineffective and...
You've read the books, but... A wealth of material has been written to describe the underlying mechanics of ITSM, but very little practical advice is ...
Covers all of the vital material required for the entry-level ITIL Foundation Certificate, which gives candidates a solid grounding in the key elements, concepts and terminology used in the ITIL service lifecycle.
Covers all of the vital material required for the entry-level ITIL Foundation Certificate, which gives candidates a solid grounding in the key element...
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security. It will ensure the systems you put in place are effective, reliable and auditable. This pocket guide will help you to: *Make informed decisions. Use this guide will enable the key people in your organisation to make better decisions before embarking on an information security project....
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An ...
This guide, updated to reflect ISO27001:2013, presents the compelling business case for implementing ISO27001 in order to protect your information assets.
This guide, updated to reflect ISO27001:2013, presents the compelling business case for implementing ISO27001 in order to protect your information ass...