LoveReading

Becoming a member of the LoveReading community is free.

No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.

New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…

Find out more

Network management

See below for a selection of the latest books from Network management category. Presented with a red border are the Network management books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Network management books and those from many more genres to read that will keep you inspired and entertained. And it's all free!

Ensuring the Integrity of Electronic Health Records

Ensuring the Integrity of Electronic Health Records

Author: Orlando Lopez Format: Paperback / softback Release Date: 24/11/2020

Data integrity is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data. The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended and upon later retrieval, ensure the data is the same as it was when originally recorded. Any alternation to the data is then traced to the person who made the modification. The integrity of data in a patient's electronic health record is critical to ensure safety to the patient. This book, relevant to production systems and quality control systems relevant to the manufacture of pharmaceuticals and medical device products and updates the practical information to enable the better understanding of the controls applicable to e-records. The book highlights the e-records suitability implementation and associated risk-assessed controls, and e-records handling. The book also provides updated regulatory standards from global regulatory organizations such as MHRA - Medicines and Healthcare Products Regulatory Agency (UK); FDA - Food and Drug Administration (US); TGA - Therapeutic Goods Administration (Australia); SIMGP - Russia State Institute of Medicines and Good Practices and the World Health Organization to name a few.

Ensuring the Integrity of Electronic Health Records

Ensuring the Integrity of Electronic Health Records

Author: Orlando Lopez Format: Hardback Release Date: 24/11/2020

Data integrity is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data. The overall intent of any data integrity technique is the same: ensure data is recorded exactly as intended and upon later retrieval, ensure the data is the same as it was when originally recorded. Any alternation to the data is then traced to the person who made the modification. The integrity of data in a patient's electronic health record is critical to ensure safety to the patient. This book, relevant to production systems and quality control systems relevant to the manufacture of pharmaceuticals and medical device products and updates the practical information to enable the better understanding of the controls applicable to e-records. The book highlights the e-records suitability implementation and associated risk-assessed controls, and e-records handling. The book also provides updated regulatory standards from global regulatory organizations such as MHRA - Medicines and Healthcare Products Regulatory Agency (UK); FDA - Food and Drug Administration (US); TGA - Therapeutic Goods Administration (Australia); SIMGP - Russia State Institute of Medicines and Good Practices and the World Health Organization to name a few.

Enterprise Architecture for Digital Business

Enterprise Architecture for Digital Business

Enterprise Architecture (EA) is an essential part of the fabric of a business; however, EA also transcends and transforms technology and moves it into the business space. Therefore, EA needs to be discussed in an integrated, holistic, and comprehensive manner. Only such an integrated approach to EA can provide the foundation for a transformation that readies the business for the myriad enterprise-wide challenges it will face. Highly disruptive technologies such as Big Data, Machine Learning, and Mobile and Cloud Computing require a fine balance between business and technical aspects as an organization moves forward with its digital transformation. This book focuses on preparing all organizations - large and small - and those wishing to move into them for the impact of leveraging these emerging, disruptive, and innovative technologies within the EA framework.

The Insider's Guide to Outsourcing Risks and Rewards

The Insider's Guide to Outsourcing Risks and Rewards

Author: Johann Rost Format: Paperback / softback Release Date: 30/09/2020

It is essential for a corporation to not only survive but thrive in today's global outsourcing environment. The Insider's Guide to Outsourcing Risks and Rewards is a comprehensive and accessible resource that assists an organization in deciding whether it will benefit from pursuing-or not pursuing-such an endeavor. The author, an 18-year veteran of the IT industry, is an experienced consultant, software developer, manager, and entrepreneur. Providing an authoritative and unbiased view, he helps the reader navigate through a number of offshore outsourcing issues related to software management and international business. He examines the potential benefits derived from offshore outsourcing, as well as the possible pitfalls and how to avoid them as they apply to an organization's particular situation. Offering a unique combination of technical and political insight, The Insider's Guide to Outsourcing Risks and Rewards is the one resource to have when trying to figure out your organization's next step.

The Project Manager's Emergency Kit

The Project Manager's Emergency Kit

Author: PMP Kliem Format: Paperback / softback Release Date: 30/09/2020

Project success requires a solid understanding and proper implementation of the tools, techniques, and principles of project management. A reference for both the novice and expert project manager, The Project Manager's Emergency Kit provides you with everything you will need to get your project off to a solid start and overcome any emergencies that may arise during the project life cycle. It supplies you with over 200 project management tools, techniques, and principles arranged in alphabetical order. The text provides guidance on how to complete projects on time and within budget while meeting the needs of your customers. It presents easy-to-follow project planning steps covering the responsibilities, work breakdown structures, time and cost estimating, scheduling, resource allocation, and budgeting. The Project Manager's Emergency Kit provides you with straightforward guidelines that will help you overcome any challenges that may arise and deliver a product or service that will satisfy everyone who has a stake in the outcome of your project.

Information Security Policies, Procedures, and Standards

Information Security Policies, Procedures, and Standards

Author: Douglas J. Landoll Format: Paperback / softback Release Date: 30/09/2020

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

Case Studies in Strategic Planning

Case Studies in Strategic Planning

Author: Hakan Butuner Format: Paperback / softback Release Date: 30/09/2020

Case Studies in Strategic Planning shows you how to do systematic strategic planning in real-life cases, regardless of your level of expertise. The simplified version of this methodology and its analysis tools, based on fundamentals, are easily understood and universally applied to any type of business for developing strategic plans. More importantly, this methodology guides you in identifying the circumstances in which you might use particular tools, use them effectively, and target them directly at achieving effective results. The book is organized into two parts: Part I provides the overall framework and describes the systematic pattern of strategic planning. Part II demonstrates case studies, most of which are entrepreneurial and related to new businesses. The book is written for two groups: The first group includes professional strategic planners and students who are interested in strategic planning. This group may be skilled at making strategic plans but do not fully understand that a strategic plan for any business involves variables specific to a particular business process. Their conventional approaches must be replaced by broader analyses and individual and factual analyses of specifics by group opinions and evaluation of convenience or preference. The second group is made up of professionals unskilled in the techniques of strategic planning. This group might include owner/managers of small businesses, managers who are generally familiar with strategic planning, and department heads who do their own planning. Regardless of which group you fit into, or your level of expertise, you will find this book to be specific, simple to understand, and easy to use.

Security without Obscurity

Security without Obscurity

Author: Jeff Stapleton Format: Paperback / softback Release Date: 30/09/2020

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Information Technology Control and Audit, Fifth Edition

Information Technology Control and Audit, Fifth Edition

Author: Angel R. Otero Format: Paperback / softback Release Date: 30/09/2020

The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legislation, audit process, governance, strategy, and outsourcing, among others. This new edition also outlines common IT audit risks, procedures, and involvement associated with major IT audit areas. It further provides cases featuring practical IT audit scenarios, as well as sample documentation to design and perform actual IT audit work. Filled with up-to-date audit concepts, tools, techniques, and references for further reading, this revised edition promotes the mastery of concepts, as well as the effective implementation and assessment of IT controls by organizations and auditors. For instructors and lecturers there are an instructor's manual, sample syllabi and course schedules, PowerPoint lecture slides, and test questions. For students there are flashcards to test their knowledge of key terms and recommended further readings. Go to http://routledgetextbooks.com/textbooks/9781498752282/ for more information.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0)

Author: Dan Shoemaker, Anne Kohnke, Ken Sigler Format: Paperback / softback Release Date: 30/09/2020

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

Author: Bongsik Shin Format: Paperback / softback Release Date: 30/09/2020

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful professional career. A Practical Introduction to Enterprise Network and Security Management contains 12 chapters of the correct amount of coverage for a semester or quarter. It balances introductory and fairly advanced subjects on computer networking and cybersecurity to deliver effectively technical and managerial knowledge. It explains sometimes challenging concepts in a manner that students can follow with careful reading. A Practical Introduction to Enterprise Network and Security Management is designed to offer impactful, hands-on learning experiences without relying on a computer lab. First, each chapter comes with practical exercise questions. In the class setting, they are good as individual or group assignments. Many of them are based on simulated or real cases, and take advantage of actual industry products and systems for a reader to better relate theories to practice. Second, there are a number of information-rich screen shots, figures, and tables in each chapter carefully constructed to solidify concepts and thus enhance visual learning. A Practical Introduction to Enterprise Network and Security Management: Is written for students studying management information systems, accounting information systems, or computer science in a semester of 15 to 16 weeks, and exposed to the subject for the first time Takes advantage of many real cases and examples, and actual industry products and services (software, hardware, and configurations) so that students can better relate concepts and theories to practice Explains subjects in a systematic, but very practical manner that students can follow through Provides students with practical understanding of both computer networking and cybersecurity Contains highly practical exercise questions, which can be individual or group assignments within or without the class, included in each chapter to reinforce learning. In addition to the thorough technical details, managerial issues including, enterprise network planning, design, and management from the practitioner's perspective are embedded throughout the text to assist balanced learning. Bearing in mind of the critical importance of security in today's enterprise networks, the text discusses the implications of network design and management on enterprise security whenever appropriate. Lastly, to reinforce knowledge in security management further, two chapters introduce the fundamentals of cybersecurity in terms of threat types and defense techniques.

Computer and Cyber Security

Computer and Cyber Security

Author: Brij B. Gupta Format: Paperback / softback Release Date: 30/09/2020

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.