MANAGEMENT, THIRD EDITION
Title | MANAGEMENT, THIRD EDITION PDF eBook |
Author | SATYA RAJU, R. |
Publisher | PHI Learning Pvt. Ltd. |
Pages | 546 |
Release | 2018-07-25 |
Genre | Business & Economics |
ISBN | 9388028058 |
This comprehensive text providing clear insight into the principles and practices of management with real-life examples and cases, now in its third edition, updates and revise chapters in lights of recent advances in the area. It discusses whole gamut of management beginning from its introduction, evolution, communication to the latest powerful and necessary tools such as QMS and Six Sigma, which are used to drive quality improvement in a company. KEY FEATURES • Case studies at the end of each chapter with related thought-provoking discussion questions. • Clearly labelled, self-explanatory diagrams and tables to support concept. • Review Questions, Chapter Summary, Glossary and List of Abbreviations. WHAT IS NEW TO THIS EDITION • Introduces strategies and issues of Corporate Respect and Corporate Social Responsibilities. • Incorporates a new chapter on ‘Six Sigma’ and revised chapters on Management and Society, TQM and QMS. • Includes several new case studies to give hands-on experience and professional orientation to the students. TARGET AUDIENCE • BBA/MBA • B.Com/M.Com
Computing Handbook, Third Edition
Title | Computing Handbook, Third Edition PDF eBook |
Author | Heikki Topi |
Publisher | CRC Press |
Pages | 1526 |
Release | 2014-05-14 |
Genre | Mathematics |
ISBN | 1439898545 |
Computing Handbook, Third Edition: Information Systems and Information Technology demonstrates the richness and breadth of the IS and IT disciplines. The second volume of this popular handbook explores their close links to the practice of using, managing, and developing IT-based solutions to advance the goals of modern organizational environments. Established leading experts and influential young researchers present introductions to the current status and future directions of research and give in-depth perspectives on the contributions of academic research to the practice of IS and IT development, use, and management Like the first volume, this second volume describes what occurs in research laboratories, educational institutions, and public and private organizations to advance the effective development and use of computers and computing in today’s world. Research-level survey articles provide deep insights into the computing discipline, enabling readers to understand the principles and practices that drive computing education, research, and development in the twenty-first century.
ISO 27001 Controls – A guide to implementing and auditing, Second edition
Title | ISO 27001 Controls – A guide to implementing and auditing, Second edition PDF eBook |
Author | Bridget Kenyon |
Publisher | IT Governance Ltd |
Pages | 249 |
Release | 2024-07-15 |
Genre | Computers |
ISBN | 1787784312 |
Following the success of the first edition, this book has been re-released to reflect the ISO/IEC 27001:2022 and ISO/IEC 27002:2022 updates. Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001:2022 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001:2022. Similarly, for anyone involved in internal or external audits, the book includes the definitive requirements that auditors must address when certifying organisations to ISO 27001:2022. The auditing guidance covers what evidence an auditor should look for to satisfy themselves that the requirement has been met. This guidance is useful for internal auditors and consultants, as well as information security managers and lead implementers as a means of confirming that their implementation and evidence to support it will be sufficient to pass an audit. This guide is intended to be used by those involved in: Designing, implementing and/or maintaining an ISMS; Preparing for ISMS audits and assessments; or Undertaking both internal and third-party ISMS audits and assessments.
ISO 27001 Controls - A Guide to Implementing and Auditing
Title | ISO 27001 Controls - A Guide to Implementing and Auditing PDF eBook |
Author | Bridget Kenyon |
Publisher | |
Pages | 21989 |
Release | 2020 |
Genre | |
ISBN | 9781787782402 |
Ideal for information security managers, auditors, consultants and organisations preparing for ISO 27001 certification, this book will help readers understand the requirements of an ISMS (information security management system) based on ISO 27001.
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Title | Information Security Risk Management for ISO 27001/ISO 27002, third edition PDF eBook |
Author | Alan Calder |
Publisher | IT Governance Ltd |
Pages | 181 |
Release | 2019-08-29 |
Genre | Computers |
ISBN | 1787781372 |
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as providing useful background material for auditors, this book will enable readers to develop an ISO 27001-compliant risk assessment framework for their organisation and deliver real, bottom-line business benefits.
Foundations of Information Security Based on ISO27001 and ISO27002 - 3rd revised edition
Title | Foundations of Information Security Based on ISO27001 and ISO27002 - 3rd revised edition PDF eBook |
Author | Jule Hintzbergen |
Publisher | Van Haren |
Pages | 205 |
Release | 2015-04-01 |
Genre | Architecture |
ISBN | 9401805415 |
This book is intended for everyone in an organization who wishes to have a basic understanding of information security. Knowledge about information security is important to all employees. It makes no difference if you work in a profit- or non-profit organization because the risks that organizations face are similar for all organizations. It clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers: The quality requirements an organization may have for information; The risks associated with these quality requirements; The countermeasures that are necessary to mitigate these risks; Ensuring business continuity in the event of a disaster; When and whether to report incidents outside the organization. The information security concepts in this revised edition are based on the ISO/IEC27001:2013 and ISO/IEC27002:2013 standards. But the text also refers to the other relevant international standards for information security. The text is structured as follows: Fundamental Principles of Security and Information security and Risk management. Architecture, processes and information, needed for basic understanding of what information security is about. Business Assets are discussed. Measures that can be taken to protect information assets. (Physical measures, technical measures and finally the organizational measures.) The primary objective of this book is to achieve awareness by students who want to apply for a basic information security examination. It is a source of information for the lecturer who wants to question information security students about their knowledge. Each chapter ends with a case study. In order to help with the understanding and coherence of each subject, these case studies include questions relating to the areas covered in the relevant chapters. Examples of recent events that illustrate the vulnerability of information are also included. This book is primarily developed as a study book for anyone who wants to pass the ISFS (Information Security Foundation) exam of EXIN. In an appendix an ISFS model exam is given, with feedback to all multiple choice options, so that it can be used as a training for the real ISFS exam.
IT Governance
Title | IT Governance PDF eBook |
Author | Alan Calder |
Publisher | Kogan Page Publishers |
Pages | 384 |
Release | 2012-04-03 |
Genre | Business & Economics |
ISBN | 0749464860 |
For many companies, their intellectual property can often be more valuable than their physical assets. Having an effective IT governance strategy in place can protect this intellectual property, reducing the risk of theft and infringement. Data protection, privacy and breach regulations, computer misuse around investigatory powers are part of a complex and often competing range of requirements to which directors must respond. There is increasingly the need for an overarching information security framework that can provide context and coherence to compliance activity worldwide. IT Governance is a key resource for forward-thinking managers and executives at all levels, enabling them to understand how decisions about information technology in the organization should be made and monitored, and, in particular, how information security risks are best dealt with. The development of IT governance - which recognises the convergence between business practice and IT management - makes it essential for managers at all levels, and in organizations of all sizes, to understand how best to deal with information security risk. The new edition has been full updated to take account of the latest regulatory and technological developments, including the creation of the International Board for IT Governance Qualifications. IT Governance also includes new material on key international markets - including the UK and the US, Australia and South Africa.