Angebote zu "Assessment" (34 Treffer)

ASL®2 Self-assessment
15,41 € *
ggf. zzgl. Versand

Self-assessment is the individual, systematic review of a way of working and the results of it. Filling out this ASL® 2 Self-assessment results into a clear notion how the application management and its processes and activities are arranged within your own organization. An important purpose for this self-assessment is not only to get a clear notion how certain processes are arranged, but also to make the constraints within the organization transparent as well as the consequences this has for (the continuity and quality of) the services. Based on the results of this evaluation actions can be initiated for further improvement. The eBook ISBN 9789087537647 is only available via Van Haren Publishing

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Survey on Cloud Computing Security Risk Assessment
2,99 € *
ggf. zzgl. Versand

Essay aus dem Jahr 2015 im Fachbereich Informatik - Allgemeines, , Sprache: Deutsch, Abstract: Cloud computing is a new computing technology which has attracted much attention. Unfortunately, it is a risk prone technology since users are sharing remote computing resources, data is held remotely, and clients lack of control over data. Therefore, assessing security risk of cloud is important to establish trust and to increase the level of confidence of cloud service consumers and provide cost effective and reliable service and infrastructure of cloud providers. This paper provides a survey on the state of the art research on risk assessment in the cloud environment.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Prozessmanagement im Software Asset Management
29,99 € *
ggf. zzgl. Versand

Bachelorarbeit aus dem Jahr 2014 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,3, Hochschule Deggendorf, Sprache: Deutsch, Abstract: Diese Arbeit behandelt das Thema Software Asset Management (SAM). Man kann SAM als Geschäftspraxis bezeichnen, die sich um die Einkaufsoptimierung und Verwaltung, sowie die Bereitstellung, Wartung, Nutzung und der Entsorgung von Software-Anwendungen innerhalb eines Unternehmens kümmert. In dieser Arbeit wird gezeigt, warum der Einsatz von SAM sinnvoll ist und wie Prozesse bei der Einführung von SAM optimiert werden können. Nach einer theoretischen Auseinandersetzung mit dem Thema, wird die Theorie anhand der Microsoft SAM Lösung aufgezeigt. Microsoft unterteilt hierbei ihre SAM Lösung in drei Bereiche: ? Sam Baseline ? SAM Assessment ? SAM Deployment Planning Im SAM Assessment werden die Prozesse aufgezeigt, die in einem Unternehmen implementiert werden sollten, um SAM dauerhaft zu leben. Durch ein SAM-Projekt wird Schritt für Schritt auf die Verbesserung der Prozesse hingearbeitet, da Probleme und Fehlverhalten aufgedeckt werden können. Im SAM - Deployment Planning gilt es dann, die entdeckten Probleme zu besprechen und Lösungen dafür zu finden. Die grundlegendsten Prozesse werden in der Arbeit grafisch dargestellt und analysiert.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
IT-Risikomanagement mit System - Praxisorientie...
46,99 € *
ggf. zzgl. Versand

Das Buch bietet einen praxisbezogenen Leitfaden für das Informationssicherheits-, IT- und Cyber-Risikomanagement im Unternehmen - es ist branchenneutral und nimmt Bezug auf relevante Konzepte und Standards des Risikomanagements und der Governance (z.B. COBIT, NIST SP 800-30 R1, ISO 31000, ISO 22301 und ISO/IEC 270xx-Reihe). Der Autor stellt integrierte Lösungsansätze in einem Gesamt-Risikomanagement vor. Dabei behandelt er systematisch, ausgehend von der Unternehmens-Governance, die fachspezifischen Risiken in einem beispielhaften Risikomanagement-Prozess. Der Leser erhält alles, was zur Beurteilung, Behandlung und Kontrolle dieser Risiken in der Praxis methodisch erforderlich ist. Diese 5. Auflage ist auf den aktuellen Stand der Compliance-Anforderungen und der Standardisierung angepasst und geht in einem zusätzlichen, neuen Kapitel speziell auf die Cyber-Risiken und deren Besonderheiten ein. Anhand von Beispielen wird ein Ansatz für das Assessment der Cyber-Risiken sowie in der Massnahmen zur adäquaten Behandlung gezeigt. Hans-Peter Königs, Dipl. El. Ing. und MBA, ist Geschäftsführer der IT Risk KM Consulting GmbH sowie Dozent an der Hochschule Luzern - Informatik, in den Zertifikats- und Master-Studiengängen (CAS und MAS) für Information Security. Nach langjähriger Tätigkeit als Corporate Security Officer liegen die Schwerpunkte seiner heutigen Beratertätigkeit in den Bereichen Risikomanagement, IT-Risikomanagement, Geschäftskontinuitäts- und IT-Notfall-Management sowie in der Informationssicherheit.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Einführung des Scrum Frameworks für ein IT-Unte...
0,00 € *
ggf. zzgl. Versand

Masterarbeit aus dem Jahr 2011 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,3, Hochschule München, Sprache: Deutsch, Abstract: Scrum gehört zu den agilen Projektmanagementmethoden und es bedarf eines Umdenkens seitens von Kunden und Management. Anders als bei klassischen Methoden, wird in Scrum auf selbstorganisierte Teams und flache Hierarchien großen Wert gelegt. Die Masterarbeit konzentriert sich auf die Einführung von Scrum in ein thailändisches IT-Unternehmen. Hierbei wurden kulturelle, organisatorische und technische Aspekte mit Hilfe des Problemlösungszyklus analysiert und Ziele definiert. Anschließend sind Lösungen nach Scrum und alternative Ansätze evaluiert worden. Für eine Bewertung wurden die drei Faktoren Kosten, Zeit und Risiko mit Punkten gewichtet um die Lösungen später im Maßnahmenkatalog vergleichen zu können. Als Ergebnis kam heraus, dass die zuvor definierten Ziele mit minimalen Anforderungen aus dem Scrum Framework umgesetzt werden können. Zusätzlich ist ein maximaler Lösungsansatz in Betracht gezogen worden. Hierbei tragen alternative Lösungsansätze dazu bei, Scrum als Ganzes zu adaptieren und unterstützen die Umsetzung. ABSTRACT [ENGLISH ] Scrum is one of the agile project management methods and requires a rethinking of customers and management. Unlike classical methods, Scrum set great values on self-organized teams and flat hierarchies. This master thesis focuses on implementing the Scrum Framework for an IT company in Thailand. On this occasion, cultural, organizational and technical aspects were analyzed using the problem solving cycle and objectives defined. Afterwards solutions to Scrum and alternative approaches have been evaluated. For an assessment, weighted points were categorized in three factors of cost, time and risk to compare the solutions later in the action plan. As a result, it was revealed that the previously defined goals can be implemented with the minimum requirements of the Scrum framework. In addition, a maximum approach has been considered. Regarding to this, alternative approaches help to adapt Scrum as a whole and support the implementation.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Enterprise Cybersecurity - How to Build a Succe...
55,92 € *
ggf. zzgl. Versand

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity program that is seamlessly coordinated with policy, programmatics, IT life cycle, and assessment. Fail-safe cyberdefense is a pipe dream. Given sufficient time, an intelligent attacker can eventually defeat defensive measures protecting an enterprise’s computer systems and IT networks. To prevail, an enterprise cybersecurity program must manage risk by detecting attacks early enough and delaying them long enough that the defenders have time to respond effectively. Enterprise Cybersecurity shows players at all levels of responsibility how to unify their organization’s people, budgets, technologies, and processes into a cost-efficient cybersecurity program capable of countering advanced cyberattacks and containing damage in the event of a breach. The authors of Enterprise Cybersecurity explain at both strategic and tactical levels how to accomplish the mission of leading, designing, deploying, operating, managing, and supporting cybersecurity capabilities in an enterprise environment. The authors are recognized experts and thought leaders in this rapidly evolving field, drawing on decades of collective experience in cybersecurity and IT. In capacities ranging from executive strategist to systems architect to cybercombatant, Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam have fought on the front lines of cybersecurity against advanced persistent threats to government, military, and business entities. Scott E. Donaldson is a Senior Vice President for Leidos, Inc., a Fortune 500 company that provides scientific, engineering, systems integration, and technical services. He is the Chief Technology Officer (CTO) and IT Director for its Heath and Engineering Sector.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Automotive SPICE(TM) in der Praxis
46,90 € *
ggf. zzgl. Versand

Automotive SPICE ist ein ISO/IEC-15504-kompatibles, speziell auf die Automobilbranche zugeschnittenes Assessmentmodell. Die Herausforderung bei der Einführung und Umsetzung von Automotive SPICE besteht darin, die Norm richtig zu interpretieren und auf eine konkrete Problemstellung anzupassen. Dieses Buch gibt die dafür notwendigen Interpretationshilfen und unterstützt dabei, Prozessverbesserung Automotive-SPICE-konform zu betreiben. Es liefert einheitliche Beurteilungsmaßstäbe. Der Buchaufbau entspricht der Struktur der Norm. Die 2. Auflage wurde auf Automotive SPICE 3.0 aktualisiert und ergänzt um aktuelle Themen wie praxistaugliche Assessments gemäß intacs(TM)- und VDA-Anforderungen, Herausforderungen bei Prozessverbesserungen, agile Entwicklung und funktionale Sicherheit nach ISO 26262.

Anbieter: buecher.de
Stand: 19.07.2017
Zum Angebot
TRIZ - The Theory of Inventive Problem Solving
98,99 € *
ggf. zzgl. Versand

The work presented here is generally intended for engineers, educators at all levels, industrialists, managers, researchers and political representatives. Offering a snapshot of various types of research conducted within the field of TRIZ in France, it represents a unique resource. ¿It has been two decades since the TRIZ theory originating in Russia spread across the world. Every continent adopted it in a different manner - sometimes by glorifying its potential and its perspectives (the American way); sometimes by viewing it with mistrust and suspicion (the European way); and sometimes by adopting it as-is, without questioning it further (the Asian way). However, none of these models of adoption truly succeeded. Today, an assessment of TRIZ practices in education, industry and research is necessary. TRIZ has expanded to many different scientific disciplines and has allowed young researchers to reexamine the state of research in their field. To this end, a call was sent out to all known francophone research laboratories producing regular research about TRIZ. Eleven of them agreed to send one or more of their postdoctoral researchers to present their work during a seminar, regardless of the maturity or completeness of their efforts. It was followed by this book project, presenting one chapter for every current thesis in order to reveal the breadth, the richness and the perspectives that research about the TRIZ theory could offer our society. The topics dealt with e.g. the development of new methods inspired by TRIZ, educational practices, and measuring team impact.

Anbieter: buecher.de
Stand: 19.07.2017
Zum Angebot
Expert Performance Indexing in SQL Server
39,26 € *
ggf. zzgl. Versand

This book is a deep dive into perhaps the single-most important facet of good performance: indexes, and how to best use them. The book begins in the shallow waters with explanations of the types of indexes and how they are stored in databases. Moving deeper into the topic, and further into the book, you will look at the statistics that are accumulated both by indexes and on indexes. Youll better understand what indexes are doing in the database and what can be done to mitigate and improve their effect on performance. The final destination is a guided tour through a number of real life scenarios showing approaches you can take to investigate, mitigate, and improve the performance of your database. Defines the types of indexes and their implementation options Provides use cases and common patterns in applying indexing Describes and explain the index metadata and statistics Provides a framework of strategies and approaches for indexing databases Jason Strate is a database architect and administrator with more than 15 years of experience. He has been a recipient of Microsofts Most Valuable Professional designation for SQL Server since July 2009. His experience includes design and implementation of both OLTP and OLAP solutions, as well as assessment and implementation of SQL Server environments for best practices, performance, and high availability solutions. Jason is a SQL Server MCITP and participated in the development of Microsoft Certification exams for SQL Server 2008.Jason is actively involved with his local PASS chapter (SQL Server User Group) and serves as its director of program development. Jason worked with the board to organize the PASSMN SQL Summit 2009 for the local community. Jason enjoys helping others in the SQL Server community and does this by presenting at technical conferences and user group meetings. Most recently, Jason has presented at the SSWUG Virtual Conferences, TechFuse, numerous SQL Saturdays, and at PASSMN user group meetings.Jason is a contributing author for the Microsoft whitepaper Empowering Enterprise Solutions with SQL Server 2008 Enterprise Edition. Jason is an active blogger with a focus on SQL Server and related technologies.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot
Data Mining and Learning Analytics - Applicatio...
112,99 € *
ggf. zzgl. Versand

Addresses the impacts of data mining on education and reviews applications in educational research teaching, and learning This book discusses the insights, challenges, issues, expectations, and practical implementation of data mining (DM) within educational mandates. Initial series of chapters offer a general overview of DM, Learning Analytics (LA), and data collection models in the context of educational research, while also defining and discussing data minings four guiding principles- prediction, clustering, rule association, and outlier detection. The next series of chapters showcase the pedagogical applications of Educational Data Mining (EDM) and feature case studies drawn from Business, Humanities, Health Sciences, Linguistics, and Physical Sciences education that serve to highlight the successes and some of the limitations of data mining research applications in educational settings. The remaining chapters focus exclusively on EDMs emerging role in helping to advance educational research-from identifying at-risk students and closing socioeconomic gaps in achievement to aiding in teacher evaluation and facilitating peer conferencing. This book features contributions from international experts in a variety of fields. Includes case studies where data mining techniques have been effectively applied to advance teaching and learning Addresses applications of data mining in educational research, including: social networking and education; policy and legislation in the classroom; and identification of at-risk students Explores Massive Open Online Courses (MOOCs) to study the effectiveness of online networks in promoting learning and understanding the communication patterns among users and students Features supplementary resources including a primer on foundational aspects of educational mining and learning analytics Data Mining and Learning Analytics: Applications in Educational Research is written for both scientists in EDM and educators interested in using and integrating DM and LA to improve education and advance educational research. Samira ElAtia is Associate Professor of Education at The University of Alberta, Canada. She has published numerous articles and book chapters on topics relating to the use of technology to support pedagogical research and education in higher education. Her current research focuses on using e-learning environment and big data for fair and valid longitudinal assessment of, and for, learning within higher education. Donald Ipperciel is Principal and Professor at Glendon College, York University, Toronto, Canada and was the Canadian Research Chair in Political Philosophy and Canadian Studies between 2002 and 2012. He has authored several books and has contributed chapters and articles in more than 60 publications. Ipperciel has dedicated many years of research on the questions of e-learning and using technology in education. He is co-editor of the Canadian Journal of Learning and Technology since 2010. Osmar R. Zaïane is Professor of Computing Science at the University of Alberta, Canada and Scientific Director of the Alberta Innovates Centre of Machine Learning. A renowned researcher and computer scientist, Dr. Zaiane is former Secretary Treasurer of the Association for Computing Machinery (ACM) Special Interest Group on Knowledge Discovery and Data Mining. He obtained the IEEE ICDM Outstanding Service Aware in 2009 as well as the ACM SIGKDD Service Award the following year.

Anbieter: ciando eBooks
Stand: 11.07.2017
Zum Angebot