![]() |
![]() |
Your cart is empty |
||
Showing 1 - 2 of 2 matches in All Departments
Apply best practices and proven methods to ensure a successful CMMi implementation. This practical book shows you which implementation hurdles to avoid and which CMMi best practices to apply in your work areas. You'll experience how easy the CMMi practice description is and how quickly and efficiently it can be implemented into your work processes. CMMi is a popular software process improvement model developed by the US department of Defence Software Engineering Institute (Carnegie Mellon University). This model is extensively used by software professionals and organizations worldwide. CMMI for Development: Implementation Guide is a step by step guide to change the way people interpret and implement CMMi in their organizations. What You'll Learn Use itDetect to rectify common mistakes Define your processes using CMMi Collect improvement data Prepare your work area for CMMi appraisal Who This Book Is For Program Managers, Project Managers, Development Leads, Test Leads, Quality professionals, and Training professionals.
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. What You Will Learn Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets Who This Book Is For Security professionals who implement and manage a security framework or security controls within their organization. This book can also be used by developers with a basic knowledge of security concepts to gain a strong understanding of security standards for an enterprise.
|
![]() ![]() You may like...
Fast & Furious: 8-Film Collection
Vin Diesel, Paul Walker, …
Blu-ray disc
|