![]() |
![]() |
Your cart is empty |
||
Showing 1 - 5 of 5 matches in All Departments
Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuable case studies that illustrate how to combine Six Sigma's rigorous quality principles with Lean methods for uncovering and eliminating waste in IT processes. Using these methods, the text explains how to take an approach that is all about improving IT performance, productivity, and security-as much as it is about cutting costs. Savvy IT veterans describe how to use Lean Six Sigma with IT governance frameworks such as COBIT and ITIL and warn why these frameworks should be considered starting points rather than destinations. This complete resource for CIOs and IT managers provides effective strategies to address the human element that is so fundamental to success and explains how to maximize the voice of your customers while keeping in touch with the needs of your staff. And perhaps most importantly-it provides the evidence needed to build your case to upper management. Supplying you with the tools to create methods that will bring out the best in your employees; Lean Six Sigma Secrets for the CIO provides the understanding required to manage your IT operations with unique effectiveness and efficiency in service of the bottom line.
Learn how to perform project management according to international standards of compliance using capability assessment processes. This book compares and contrasts the approach to project management using ISO 21500 against the more direct ISO 33000 Capability Assessment. It shows how to assess projects adequately for process improvement or how well an organization performs against a standard, measurable framework. Using ISO 21500 as the project management reference point and ISO 15504/33000 as the capability assessment reference, the book shows you how to assess whether your projects are being run according to a specific capability level or support them to reach higher levels of capability.
Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuable case studies that illustrate how to combine Six Sigma 's rigorous quality principles with Lean methods for uncovering and eliminating waste in IT processes. Using these methods, the text explains how to take an approach that is all about improving IT performance, productivity, and security as much as it is about cutting costs. Savvy IT veterans describe how to use Lean Six Sigma with IT governance frameworks such as COBIT and ITIL and warn why these frameworks should be considered starting points rather than destinations. This complete resource for CIOs and IT managers provides effective strategies to address the human element that is so fundamental to success and explains how to maximize the voice of your customers while keeping in touch with the needs of your staff. And perhaps most importantly it provides the evidence needed to build your case to upper management. Supplying you with the tools to create methods that will bring out the best in your employees; Lean Six Sigma Secrets for the CIO provides the understanding required to manage your IT operations with unique effectiveness and efficiency in service of the bottom line.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.
|
![]() ![]() You may like...
Vusi - Business & Life Lessons From a…
Vusi Thembekwayo
Paperback
![]()
Churchill and the Bomb in War and Cold…
Kevin Ruane
Hardcover
![]()
|