e Se
’re
ou
y at
wh
mi
g.
in
ss
rs W ffe NO ail o com UP E em ess. GN IV pr SI CLUS .crc X ww rE w fo at
Contents IT Security ............................................................3 IT Management & Operations ..........................22 Project Management ..........................................31
Page 4
Page 23
Page 11
Page 29
Join the CRC Press online community! Sign up for email alerts at CRCPress.com and be the first to know about new books in your area of interest. You will also be eligible for: • • • • •
Page 31
Page 39
Exclusive discounts Content Event announcements New book alerts FREE shipping
only available in our email and print promotions. Take full advantage of your insider savings and free shipping when you buy directly from CRCPress.com http://www.crcpress.com
To view more information and complete tables of contents for these and many other related books, Visit us at
www.crcpress.com e-mail: orders@crcpress.com 1-800-634-7064 • 1-859-727-5000 +44 (0) 1235 400 524 LVM03_5.5x8.5 MC_ISSUU 12.12.13_gtr
IT Security Securing Cloud and Mobility A Practitioner's Guide Ian Lim Ingram Micro, Santa Ana, California, USA
E. Coleen Coolidge Aliso Viejo, California, USA
Paul Hourani Corona, California, USA
A practitioners' handbook on securing virtualization, cloud computing, and mobility, this book bridges academic theory with real-world implementation. It provides pragmatic guidance on securing the multifaceted layers of private and public cloud deployments as well as mobility infrastructures. The book offers in-depth coverage of implementation plans, workflows, process consideration points, and project planning. Topics covered include physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, secure mobile architecture, and secure mobile coding standards. • Covers network, server, and endpoint security • Offers technical discussions of security, based on academic research and real-world experiences • Includes implementation plans, technical decision points, and process consideration points
New!
Developing and Securing the Cloud Bhavani Thuraisingham The University of Texas at Dallas, USA
Providing a comprehensive overview of cloud computing technology, this book supplies step-by-step instruction on how to develop and secure cloud computing platforms and web services. It includes a basic-level overview of cloud computing. It outlines a framework for secure cloud computing development and describes supporting technologies such as web services and security. Detailing the various layers of the cloud computing framework, the book includes several examples of cloud products and prototypes, including private, public, and US government clouds. • Examines the importance of good communication • Defines the four types of poor-quality communication • Covers how to create a climate of communication • Explains how to establish a climate of communication that encourages the development of quality relationships
Selected Contents:
• Provides guidelines and examples of security virtualization
Introduction
Selected Contents:
Secure Services Technologies
Rethinking IT and Security. Tectonic Shifts. The Evolving Threat Landscape. Deconstructing Cloud Security. The Cloud Dialogues. Securing Private Cloud Computing. Segmentation and the Private Cloud. Orchestration and Cloud Management. Encryption Services. Threat Intelligence. Identity Management for Private Clouds. Securing Public Clouds. Enterprise Cloud Governance. The Cursory Cloud Use Review. In-Depth Cloud Assessment. Third-Party Cloud Assessment. Securing Mobile. Mobile Security Infrastructure. The Mobile Client Itself. Connecting to Enterprise and Third-Party Applications from Mobile Devices. Creating Secure Mobile Applications.
Supporting Technologies Cloud Computing Concepts Experimental Cloud Computing Systems Secure Cloud Computing Concepts Experimental Secure Cloud Computing Systems Experimental Cloud Systems for Security Applications Toward a Trustworthy Cloud Building an Infrastructure, an Education Initiative, and a Research Program for a Secure Cloud Catalog no. K12920, October 2013, 730 pp. ISBN: 978-1-4398-6291-9, $79.95 / £49.99 Also available as an eBook
Catalog no. K12301, February 2013, 228 pp. ISBN: 978-1-4398-5055-8, $79.95 / £49.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
3
IT Security Conflict and Cooperation in Cyberspace The Challenge to National Security Edited by
Panayotis A. Yannakogeorgos and Adam B. Lowther US Air Force Research Institute, Maxwell AFB, Alabama, USA
“Facilitated by the exceptional handiwork of the editors, this book significantly advances the effort to achieve common ground in the debates regarding cyberspace. National security and cyber-related professionals will find it equally useful in their work.” —Lt. Gen Bob Elder, USAF (Retired)
Selected Contents: Introduction. KEY CONSIDERATIONS. The Future of Things Cyber. What’s Wrong with Cyberspace? Cyberspace Security Considerations.Two, Maybe Three Cheers for Ambiguity. The Essential Features of an Ontology for Cyber Warfare. Cyber Defense as Environmental Protection: The Broader Potential Impact of Failed Defensive Counter Cyber Operations. TECHNOLOGY. Challenges in Monitoring Cyber Arms Compliance. Digital Policy Management: A Foundation for Tomorrow; National Security Agency Enterprise Service Division-Identity and Access Branch On Mission Assurance. Stuxnet: A Case Study in Cyber Warfare. Digital Dissent: The Internet and Dissent in Authoritarian States. ETHICS, LAW, AND POLICE. Can There be an Ethical Cyber War? Perspectives for Cyber Strategists on Cyber Law for Cyber War. A New Normal? The Cultivation of Global Norms as Part of a Cyber Security Strategy. The Prospects for Cyber Deterrence: American Sponsorship of Global Norms for Cyberspace. Cyber Sovereignty. American Cybersecurity Triad: Government-wide Integration, Technological Counterintelligence, and Educational Mobilization.
New!
Trade Secret Theft, Industrial Espionage, and the China Threat Carl Roper Richmond, Virginia, USA
This book provides an overview of economic espionage as practiced by a range of nations from around the world—focusing on the mass scale in which information is being taken for China's growth and development. It supplies an understanding of how the economy of a nation can prosper or suffer, depending on whether that nation is protecting its intellectual property, or whether it is stealing such property for its own use. The text concludes by outlining specific measures that corporations and their employees can practice to protect information and assets, both at home and abroad.
Selected Contents: China: The Red Dragon of Economic Espionage. We Are Not Alone: Economic Espionage and the World. The Background of Economic Espionage. PRC Acquisition of US Technology: An Overview and Short History. Chinese Product Piracy and Counterfeiting. Who, What, and How China Targets. The China Spy Guide and Open-Source Information. The Intelligence Cycle and Collection Effort. Corporate Rivals. Sources of Information. The Economic Espionage Act. The U.S. Response to Economic Espionage. The DOD View of IP Theft: A Trend Analysis of Reporting on Foreign. Intellectual Property Rights: Patents, Copyrights, and Trade Secrets. Internet Exploitation: The Web, Your Computer, Your IT System. Protecting Your Data. Source Documents and Other Resources. Catalog no. K14353, November 2013, 320 pp. ISBN: 978-1-4398-9938-0, $69.95 / £44.99 Also available as an eBook
Catalog no. K20542, July 2013, 360 pp. ISBN: 978-1-4665-9201-8, $59.95 / £38.99 Also available as an eBook
4
Save when you order online at www.crcpress.com
IT Security New!
New!
How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code
Terrorist Recognition Handbook
David Kahn
Malcolm W. Nance
New York, New York, USA
David Kahn is universally regarded as the dean of intelligence historians. Recounting the desperate efforts to gather information during World War II and the Cold War, he provides insight into the dark realm of intelligence and code that will fascinate cryptographers, intelligence personnel, and the millions interested in military history, espionage adventure, and world affairs. By revealing the past, the book helps guide present and future intelligence efforts. Kahn is the author of The Codebreakers and Seizing the Enigma: The Race to Break the German U-Boats Codes, 19391943, which was the basis for the movie U-571. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today’s leaders avoid making the same mistakes that have helped bring at least one global power to its knees.
Selected Contents: Introduction
A Practitioner's Manual for Predicting and Identifying Terrorist Activities, Third Edition Executive Director, Stottville Center for Understanding Terrorism and Radical-Ideologies (SCUTARI) at Hudson, New York, USA
This fully revised and updated third edition contains the detailed analysis and history of prior editions with completely new case studies and information on new and emerging terrorist practices and trends. Updates to the third edition include: • The newest geopolitical challenges and terrorism to emerge from the geopolitical climate postArab Spring • Details on the newest attack tactics and procedures of al-Qaeda including al-Qaeda of the Arabian Peninsula, the Islamic Maghreb, and East and North Africa • Lessons learned from recent terrorist operations and information gained from plots foiled by the FBI in the U.S. • Current strategic factors and regional variables affecting global terrorism and regional insurgencies • Potential points of failure in terrorist operations where plots can be most easily detected and disrupted
A Theory, Clausewitz, and More
• The increasing trend of self-radicalized, Internet-educated "lone wolf" operations, as demonstrated in the Boston Marathon bombing
Personalities
• The rebirth of U.S. and European militia groups
A Counterfactual and the Future
Written for counterterrorism practitioners who risk their lives to uncover planned attacks on civilian populations, this book will serve as a guide to train intelligence operatives, law enforcement entities, and military intelligence agents and soldiers to recognize and disrupt the various stages of developing terrorist plots.
Cases
Catalog no. K15960, December 2013, 469 pp. ISBN: 978-1-4665-6199-1, $59.95 / £29.99
Catalog no. K15325, September 2013, 439 pp. Soft Cover, ISBN: 978-1-4665-5457-3 $59.95 / £38.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
5
IT Security Forthcoming!
PCI Compliance The Definitive Guide Abhay Bhargav With case studies and examples from a variety of industry verticals currently undergoing compliance, including banking, retail, outsourcing, software development, and processors, this critical handbook articulates specific compliance issues and challenges, focuses on audit and assessment strategies, and covers the latest PCI v 2.0.
Selected Contents: Payment Card Industry – An Evolution Card Anatomy: The Essentials Security and the Payment Card Industry The Payment Card Industry Data Security Standard The Payment Application Data Security Standard – PA-DSS Enterprise Approach to PCI Compliance Scoping for PCI Compliance Requirement 1: Build and Maintain a Secure Network Requirement 2: Vendor Supplied Defaults, System Passwords and Security Parameters Requirement 3: Protect Stored Cardholder Data Requirement 4: Securing Cardholder Information in Transit Requirement 5: Use and Regularly Update Anti-Virus Software Requirement 6: Develop and Maintain Secure Systems Requirement 7: Restrict Access to Cardholder Data by Business Need to Know Requirement 8: Access Control Requirements for PCI Environments Requirement 9: Restrict Physical Access to Cardholder Data Requirement 10: Logging and Monitoring for the PCI Standards
The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules John J. Trinckes, Jr. PathForwardIT, Cincinnati, Ohio, USA
This volume is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices. It can also help those entities that may not be covered by HIPAA regulations but want to assure their customers they are doing their due diligence to protect their information. The book covers administrative, physical, and technical safeguards; organizational requirements; procedures; and documentation requirements. It provides sample documents and directions on using the policies and procedures to establish proof of compliance.
Selected Contents: HIPAA/HITECH Overview. The Relevance of HIPAA/HITECH to Healthcare Organizations. Compliance Overview. Privacy Rule Detailed. The Electronic Transactions and Code Set Rule Detailed. The National Provider Identifier Requirements Detailed. "Meaningful Use" Detailed. Breach Notification Detailed. Enforcement Rule Detailed. Security Rule Detailed. Security Rule: Administrative Safeguards. Security Rule: Risk Assessments. Security Rule: Security Awareness Training. Security Rule: Incident Response. Security Rule: Business Continuity Planning and Disaster Recovery. Security Rule: Compliance Assessment. Security Rule: Physical Safeguards. Security Rule: Technical Safeguards. Security Rule: Organizational Requirements. Frequently Asked Questions. Checklists. Works Cited. Additional Resources. Acronyms. Glossary. Index. Catalog no. K14680, December 2012, 472 pp. ISBN: 978-1-4665-0767-8, $79.95 / £49.99 Also available as an eBook
Requirement 11: Security Testing for the PCI Environment Requirement 12: Information Security Policies and Practices for PCI Compliance Beyond PCI Compliance Catalog no. K14041, March 2014, 344 pp. ISBN: 978-1-4398-8740-0, $59.95 / £38.99 Also available as an eBook
6
Save when you order online at www.crcpress.com
IT Security New! New!
Information Security Fundamentals Second Edition Thomas R. Peltier Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. Reorganizing its contents around ISO 27002, this updated edition presents ten new chapters; adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks; expands its coverage of compliance and governance issues; and includes new information on mobile security issues. • Provides a clear understanding of the foundations of the field and the range of issues that practitioners must address • Discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act (GLBA) • Details physical security requirements and controls, and offers a sample physical security policy
Selected Contents: Developing Policies Organization of Information Security Cryptology Risk Management Building and Maintaining an Effective Security Awareness Program Physical Security Disaster Recovery and Business Continuity Planning Continuity of Operations Planning Access Controls Information System Development, Acquisition, and Maintenance Information Security Incident Management Asset Classification Threats to Information Security Information Security Policies: A Practitioner’s View Glossary Appendices: Facilitated Risk Analysis and Assessment Process Business Impact Analysis Catalog no. K10531, October 2013, 438 pp. Soft Cover, ISBN: 978-1-4398-1062-0 $69.95 / £44.99 Also available as an eBook
Responsive Security Be Ready to Be Secure Meng-Chow Kang Cisco Systems, Singapore
Exploring the challenges, issues, and dilemmas of managing information security risk, this volume introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, the book discusses the issues and dilemmas that fueled the study, examines its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach. • Supplies comprehensive coverage of the issues/challenges facing individuals and organizations in managing information security risks today • Explains how to become a true professional and keep your skills sharp when the landscape keeps changing • Addresses organizational security needs, including how to improve effectiveness of security investment, where to start, where to place focus, and how to determine if an organization’s information security program is effective
Selected Contents: Introduction Knowledge, Issues, and Dilemmas Practice, Issues, and Dilemmas Responsive Security Conclusions and Implications Appendices References Index
Catalog no. K19031, October 2013, 259 pp. Soft Cover, ISBN: 978-1-4665-8430-3 $69.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
7
IT Security New!
Official (ISC)2 Guide to the CISSP CBK Third Edition
Official (ISC)2 Guide to the CSSLP CBK
Edited by
Second Edition
Steven Hernandez, CISSP Series: (ISC)2 Press
Recognized as one of the best tools available for the information security professional and especially for candidates studying for the (ISC)2 CISSP examination, the Official (ISC)2® Guide to the CISSP® CBK®, Third Edition has been updated and revised to reflect the latest developments in this ever-changing field. Endorsed by the (ISC)2, this book provides unrivaled preparation for the certification exam that is both up to date and authoritative. Compiled and reviewed by CISSPs and (ISC)2 members, the text provides an exhaustive review of the ten current domains of the CBK. Catalog no. K16456, December 2012, 1520 pp. ISBN: 978-1-4665-6976-8, $79.95 / £54.99 Also available as an eBook
Official (ISC)2® Guide to the ISSAP® CBK Second Edition
SecuRisk Solutions, Pflugerville, Texas, USA Series: (ISC)2 Press
The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development. Catalog no. K16532, August 2013, 800 pp. ISBN: 978-1-4665-7127-3, $89.95 / £54.99 Also available as an eBook
Official (ISC)2® Guide to the CAP® CBK® Second Edition
Edited by
Patrick D. Howard
(ISC)² Corporate Series: (ISC)2 Press
“This book will review and deepen your knowledge of security architecture, covering each of the six domains contained in the CISSP-ISSAP® CBK®.” —W. Hord Tipton, CISSP-ISSAP, CAP, CISA, Executive Director (ISC)2®
Supplying an authoritative review of key concepts and requirements of the ISSAP® CBK®, the second edition of this official guide provides the practical understanding required to implement the latest security protocols. Encompassing all of the knowledge elements needed to create secure architectures, the text covers requirements analysis, access control, cryptography, physical security, BCP/DRP, and telecommunications and network security. Catalog no. K16840, August 2013, 600 pp. ISBN: 978-1-4665-7900-2, $79.95 / £49.99 Also available as an eBook
8
Mano Paul
Chief Information Security Officer, Nuclear Regulatory Commission, USA
Providing an overview of certification and accreditation, the second edition of this officially sanctioned guide demonstrates the effectiveness of C&A as a risk management methodology for IT systems in public and private organizations. It enables readers to document the status of their security controls and learn how to secure IT systems via standard, repeatable processes. The text describes what it takes to build a certification and accreditation program at the organization level and analyzes various C&A processes and how they interrelate. A case study illustrates the successful implementation of certification and accreditation in a major U.S. government department. Catalog no. K11099, July 2012, 462 pp. ISBN: 978-1-4398-2075-9, $69.95 / £42.99 Also available as an eBook
Save when you order online at www.crcpress.com
IT Security Enterprise Architecture and Information Assurance Developing a Secure Foundation James A. Scholz Computer Security Consulting, Inc., Mabelvale, Arkansas, USA
This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes. Considering the lack of tolerance of enterprise for operational interruptions or the risks that accompany theft and loss of data, this reference describes how to ensure your organization is prepared for the unexpected. The text also aids in containing liability with guidance on network and application vulnerability assessments, intrusion detection and penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. • Explains how to evaluate your network, the business model of the company, and how they fit together • Brings to light knowledge of the different processes of ITIL, MOF, and Business Service Management • Covers the 17 families of management and how they are implemented within an infrastructure • Supplies the tools to document your infrastructure to feed into the Continuity of Operations and Disaster Recovery
Selected Contents: Setting the Foundation Building the Enterprise Infrastructure Infrastructure Security Model Components Systems Security Categorization Business Impact Analysis Risk Secure Configuration Management Contingency Planning Cloud Computing Continuous Monitoring Physical Security Building Security The Certification and Accreditation Process
Effective Surveillance for Homeland Security Balancing Technology and Social Issues Edited by
Francesco Flammini Ansaldo STS Italy, Napoli
Roberto Setola Universita Campus Bio-Medico Di Roma, Italy
Giorgio Franceschetti “... focuses on privacy and other related social issues, which are of conflicting interests with the surveillance operations necessary for the working of homeland security solutions.” —Jaydip Sen, Senior Scientist, Tata Consultancy Services Ltd.
Since the September 11th attacks, the scientific and engineering communities have been called upon to help the world respond to security challenges. This volume focuses on multidisciplinary problem analysis and systems engineering approaches to security. It presents a comprehensive survey of state-of-the-art methods for the surveillance and protection of citizens and critical infrastructure against both natural and deliberate threats. The first section analyzes technical issues related to surveillance. Next, the book examines legislative, organization, and management issues with a specific emphasis on privacy concerns. Finally, the contributors discuss innovative solutions and new research topics garnering heightened attention. • Covers state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures • Focuses on current technological challenges • Provides an overview of the most relevant aspects related to surveillance systems • Analyzes the technological issues related to surveillance
Selected Contents: Surveillance and Society. Physical and Cyber Surveillance. Technologies for Homeland Security. Catalog no. K13920, June 2013, 646 pp. ISBN: 978-1-4398-8324-2, $119.95 / £72.99 Also available as an eBook
Catalog no. K11935, July 2013, 266 pp. ISBN: 978-1-4398-4159-4, $79.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
9
IT Security Security and Privacy in Smart Grids
Handbook of SCADA/Control Systems Security
Edited by
Yang Xiao
Edited by
The University of Alabama, Tuscaloosa, USA
Robert Radvanovsky
A versatile reference, this book details state-of-the-art approaches and novel technologies for communication networks and security in smart grids. It examines contemporary grid security and discusses how it is being developed and deployed. The chapters cover direct attacks and smart meters, as well as attacks via the networks—providing actionable suggestions for preventing such attacks. The chapters work together to provide a framework for how security should be implemented throughout this growing system. Figures, illustrations, graphs, and charts are included to aid with comprehension.
Selected Contents: SMART GRIDS IN GENERAL An Overview of Recommendations for a Technical Smart Grid Infrastructure Smart Grid and Cloud Computing: Minimizing Power Consumption and Utility Expenditure in Data Centers Distributed Opportunistic Scheduling for Building Load Control Advanced Metering Infrastructure and Its Integration with the Distribution Management System Cognitive Radio Network for the Smart Grid SECURITY AND PRIVACY IN SMART GRIDS Requirements and Challenges of Cybersecurity for Smart Grid Communication Infrastructures Regulations and Standards Relevant for Security of the Smart Grid Vulnerability Assessment for Substation Automation Systems Smart Grid, Automation, and SCADA System Security Smart Grid Security in the Last Mile Index Catalog no. K13608, July 2013, 353 pp. ISBN: 978-1-4398-7783-8, $79.95 / £49.99 Also available as an eBook
CIPS, Infracritical, Geneva, Illinois, USA
Jacob Brodsky Woodbine, Maryland, USA
The availability and security of many services we rely upon are routinely put at risk by cyber threats. This volume outlines security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of utility and industrial facilities worldwide. The book supplies information for securing industrial automation/process control systems as part of a critical infrastructure protection program. The authors present a "best practices" approach to securing business management environments at the strategic, tactical, and operational levels.
Selected Contents: Social Implications and Impacts Introduction Sociological and Cultural Aspects Threat Vectors Risk Management Governance and Management Disaster Recovery and Business Continuity of SCADA Incident Response and SCADA Forensics Management Governance and Compliance Architecture and Modeling Communications and Engineering Systems Metrics Framework for a SCADA System Network Topology and Implementation Commissioning and Operations Obsolescence and Procurement of SCADA Patching and Change Management Physical Security Management Tabletop/Red-Blue Exercises Integrity Monitoring Data Management and Records Retention Conclusion and References The Future of SCADA and Control Systems Security Appendix A—Listing of Online Resources SCADA/Control Systems Appendix B—Terms and Definitions Index Catalog no. K14428, February 2013, 383 pp. ISBN: 978-1-4665-0226-0, $99.95 / £63.99 Also available as an eBook
10
Save when you order online at www.crcpress.com
IT Security Coming Soon!
New!
Intrusion Detection in Wireless Ad-Hoc Networks
Intrusion Detection Networks
Edited by
Nabendu Chaki and Rituparna Chaki University of Calcutta, Kolkata, West Bengal, India
Presenting cutting-edge research, this book explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume reviews and analyzes state-of-theart IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems. • Explains how to ensure Quality of Service in secure routing • Considers honesty and trust-based IDS solutions • Explores emerging trends in WAN security • Describes the blackhole attack detection technique Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build next-generation wireless networking environments.
Selected Contents: Introduction Architecture and Organization Issues Routing for ad-hoc Networks Different Types of Routing Attacks for WANs IDSX HIDS BHIDS Intrusion Detection for Wireless Mesh Networks Security in WAN and Quality of Services (QoS) Future Trends in WAN Security Catalog no. K15047, January 2014, 258 pp. ISBN: 978-1-4665-1565-9, $99.95 / £63.99 Also available as an eBook
A Key to Collaborative Security Carol Fung Raouf Boutaba University of Waterloo, Ontario, Canada
The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges. • Provides a complete introduction to intrusion detection networks and intrusion detection systems • Identifies the challenges underlying the design of IDNs and IDSs • Evaluates various IDN designs • Outlines comprehensive validation methodologies and evaluation metrics
Selected Contents: Cyber Intrusions Intrusion Detection Collaborative Intrusion Detection Networks Architecture Design Trust Management Collaborative Decision Resource Management Collaborators Selection and Management Knowledge-Based Intrusion Detection Networks and Knowledge Propagation Collaborative Malware Detection Networks Catalog no. K16024, November 2013, 261 pp. ISBN: 978-1-4665-6412-1, $119.95 / £76.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
11
IT Security Coming Soon!
The State of the Art in Intrusion Prevention and Detection Edited by
Al-Sakib Khan Pathan International Islamic University Malaysia, Kuala
Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection. • Analyzes latest trends and issues about intrusion detection and prevention in computer networks and systems, especially in communications networks • Covers wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks • Reports on new techniques and research on intrusion detection schemes, intrusion prevention schemes, and tracing back mobile attackers
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks Mohssen Mohammed University of Cape Town, South Africa
Al-Sakib Khan Pathan International Islamic University Malaysia, Kuala
Polymorphic worm attacks are considered one of the top threats to Internet security. They can be used to delay networks, steal information, delete information, and launch flooding attacks against servers. This book supplies unprecedented coverage of how to generate automated signatures for unknown polymorphic worms. Describing attack detection approaches and automated signature generation systems, the book details the design of double-honeynet systems and the experimental investigation of these systems. It also discusses experimental implementation of signaturegeneration algorithms and discusses what we can expect in future developments. • Supplies unprecedented coverage on how to generate automated signatures for unknown polymorphic worms • Describes attack detection approaches and automated signature generation systems • Discusses experimental implementation of signature-generation algorithms and doublehoneynet systems • Details the design of double-honeynet systems
Selected Contents:
Selected Contents:
Network Traffic Analysis and Management For IDS
Introduction
IDS Issues for Different Infrastructures Artificial Intelligence Techniques for IDS IDS for Wireless Systems
Worm Attacks Attack Detection Approaches Automated Signature Generation Systems
Catalog no. K21319, January 2014, 504 pp. ISBN: 978-1-4822-0351-6, $119.95 / £76.99 Also available as an eBook
Design of Double-honeynet System Signature Generation Algorithms for Polymorphic Worms Experimental Investigation of Double-honeynet System Experimental Implementation of Signature generation Algorithms What to Expect in the Coming Days? Catalog no. K15460, May 2013, 337 pp. ISBN: 978-1-4665-5727-7, $89.95 / £57.99 Also available as an eBook
12
Save when you order online at www.crcpress.com
IT Security Iris Biometric Model for Secured Network Access Franjieh El Khoury Université Claude Bernard, Villeurbanne, France
Biometric techniques have proven their ability to provide secure access to shared resources in various domains and software agents. In addition, multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. This volume proposes a new model—the IrisCryptoAgentSystem (ICAS)—which is based on a biometric method for authentication using the iris of the eye. The book explains how MAS can be used to solve security problems in complex systems and demonstrates how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access.
Selected Contents: State of the Art: Security of Computer Network Systems Biometric Systems Cryptography Multi-Agent Systems (MAS) Critical Analysis on the Iris Recognition Methods: Existing Methods for the Localization of the Inner and Outer Edges of the Iris of the Eye Existing Methods for The Elimination of the Effects of the Eyelids Proposed Model: IrisCryptoAgentSystem (lCAS): Biometric Model for the Authentication Using the Iris of the Eye Existing Methods for The Elimination of the Effects of the Eyelids Global Model Integrating Multi-Agents System Implementation and Simulations: Implementation of the New Methods Simulation of the Modules Application Conclusion and Perspectives Acknowledgments Bibliography Catalog no. K14421, May 2013, 220 pp. ISBN: 978-1-4665-0213-0, $119.95 / £76.99 Also available as an eBook
New!
Advances in Biometrics for Secure Human Authentication and Recognition Edited by
Dakshina Ranjan Kisku Asansol Engineering College, Barddhaman, India
Phalguni Gupta Indian Institute of Technology, Kanpur
Jamuna Kanta Sing Jadavpur University, Kolkata, India
This book showcases the technologies and algorithms being used for human authentication and recognition. Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional biometric techniques as well as novel systems developed over the past few years. It includes coverage of new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. The text includes model question papers, mathematical notations, and exercises to reinforce understanding.
Selected Contents: Security and Reliability Assessment for Biometric Systems. Review of Human Recognition Based on Retinal Images. Visual Speech as Behavioral Biometric. Human Gait Signature for Biometric Authentication. Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier. On Deciding the Dynamic Periocular Boundary for Human Recognition. Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System. Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis. Case Studies and Large Scale Biometric Systems. The Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway. Biometric Identification: Device Specification and Actual Performance Considered for the Operations of the Unique Identity Authority of India. Catalog no. K18934, December 2013, 352 pp. ISBN: 978-1-4665-8242-2, $129.95 / £82.00 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
13
IT Security New!
Managing Risk and Security in Outsourcing IT Services Onshore, Offshore and the Cloud Frank Siepmann 1 Security Solutions Applied, LLC, Leesburg, Virginia, USA
“The information on the different countries ... provides a great perspective as to what is going on in the world and why it is so important to know who and what country you are dealing with.” —Todd Fitzgerald, Global Information Security Director, Grant Thornton International, Ltd.
This book explains how to address the risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book provides the fundamental understanding and guidance readers need to keep information, processes, and people secure when outsourcing IT services.
Information Security Policy Development for Compliance ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 Barry L. Williams Williams Technology Audit Services, Alton, Illinois, USA
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. This book provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will help readers elicit management opinions on information security and document the formal and informal procedures currently in place. Topics covered include: • Entity-level policies and procedures • Access-control policies and procedures • Change control and change management • System information integrity and monitoring
• Covers onshore, offshore, and cloud services
• System services acquisition and protection
• Explains how to tailor the right risk approach for any organization
• Informational asset management
• Uses case studies to illustrate what to do and what not to do during implementation
Selected Contents: Outsourcing The Cloud Before You Decide to Outsource Ready to Outsource Day One and Beyond
• Continuity of operations The book supplies you with the tools to use the full range of compliance standards as guides for writing policies that meet the security needs of your organization. Detailing a methodology to facilitate the elicitation process, it asks pointed questions to help you obtain the information needed to write relevant policies. More importantly, this methodology can help you identify the weaknesses and vulnerabilities that exist in your organization. Catalog no. K18842, March 2013, 152 pp. ISBN: 978-1-4665-8058-9, $59.95 / £38.99 Also available as an eBook
When We Part Outsourcing Anecdotes Catalog no. K13704, December 2013, 244 pp. ISBN: 978-1-4398-7909-2, $69.95 / £44.99 Also available as an eBook
14
Save when you order online at www.crcpress.com
IT Security The Complete Book of Data Anonymization From Planning to Implementation Balaji Raghunathan Infosys, Bangalore, India
“… provides a comprehensive view of data anonymization both from a program sponsor’s perspective as well as a practitioner’s. The special focus on implementation of data anonymization across the enterprise makes this a valuable reference book for large data anonymization implementation programs.” —Prasad Joshi, Vice President, Infosys Labs, Infosys Ltd.
“… could not have come at a better time, given the rapid adoption of outsourcing within enterprises and an ever increasing growth of business data. … a must read for enterprise data architects and data managers grappling with the problem of balancing the needs of application outsourcing with the requirements for strong data privacy.” —Dr. Pramod Varma, Chief Architect, Unique Identification Authority of India
Data anonymization provides a systematic and integrated approach to privacy protection that goes far beyond simple data-masking or network security from external or internal theft. Discussing the analysis, planning, set-up, and governance, this timely manual illuminates the entire process of adapting and implementing anonymization tools and programs to increase the success of privacy protection in vulnerable organizations. Providing a 360-degree view of data privacy protection, it details data anonymization patterns, automation/tool capabilities, and the key factors for success in disguising the person behind the data. Catalog no. K13578, May 2013, 267 pp. ISBN: 978-1-4398-7730-2, $79.95 / £49.99 Also available as an eBook
Guide to the De-Identification of Personal Health Information Khaled El Emam University of Ottawa & Privacy Analytics, Ontario, Canada
“… a valuable and much needed resource for all data custodians who use or disclose personal health information for secondary purposes. Doubly enabling, privacy-enhancing tools like these, that embrace privacy by design, will ensure the continued availability of personal health information for valuable secondary purposes that benefit us all.” —Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada
The book supplies a detailed case for why de-identification is important as well as best practices to help you pinpoint when it is necessary to apply de-identification in the disclosure of personal health information. It also: • Outlines practical methods for de-identification • Describes how to measure de-identification risk • Includes proofs and supporting reference material • Focuses only on transformations proven to work on health information—rather than covering all possible approaches, whether they work in practice or not Rated the top systems and software engineering scholar worldwide by The Journal of Systems and Software, Dr. El Emam is one of only a handful of individuals worldwide qualified to de-identify personal health information for secondary use under the HIPAA Privacy Rule Statistical Standard. In this book Dr. El Emam explains how we can make health data more accessible—while protecting patients’ privacy and complying with current regulations. Catalog no. K16841, May 2013, 413 pp. ISBN: 978-1-4665-7906-4, $69.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
15
IT Security Network Attacks and Defenses
Android Security
A Hands-on Approach
Anmol Misra
Attacks and Defenses
Zouheir Trabelsi
Cisco Systems, Inc. San Jose, California, USA
United Arabs Emirates University, Al-Ain
Abhishek Dubey
Kadhim Hayawi University of Waterloo, Ontario, Canada
Arwa Al Braiki United Arabs Emirates University, Al-Ain
Sujith Samuel Mathew University of Adelaide, Australia
Using step-by-step processes to build and generate attacks using offensive techniques, this volume enables readers to implement appropriate network security solutions within a laboratory environment. Topics covered include CAM table poisoning attacks on network switches, ARP cache poisoning attacks, the detection and prevention of abnormal ARP traffic, network traffic sniffing and the detection of NICs running in promiscuous mode, and IP-based DoS attacks. It also examines reconnaissance traffic, network traffic filtering and inspection, and IPsec VPN security solution protocols, standards, types, and deployments. • Presents a practical guide for simulating common network attacks and defenses • Bridges the gap between academia and industry by offering real-world scenarios of best practices • Enables students to actively learn attack and defense strategies with hands-on lab scenarios • Includes a rich collection of diagrams to describe setup for network attacks, architecture, and configurations • Introduces model scenarios to help educators of security courses design and implement innovative hands-on exercises • Provides multi-vector hands-on experience
Selected Contents: Switch’s CAM Table Poisoning Attack. ARP Cache Poisoning-Based MiM and DoS Attacks. Abnormal ARP Traffic Detection and Prevention. Network Traffic Sniffing and Promiscuous Mode Detection. IP-Based Denial-of-Service Attacks. Reconnaissance Traffic. Packet Filtering and Inspection. Router Security. Siteto-Site VPN Tunnel Implementation against Eavesdropping Attacks. Remote Access VPN Tunnel Implementation against Eavesdropping Attacks. Index.
Webroot Software, San Mateo, California, USA
“... a must-have for security architects and consultants as well as enterprise security managers who are working with mobile devices and applications.” —Dr. Dena Haritos Tsamitis, Director of the Information Networking Institute; and Director of Education, CyLab, Carnegie Mellon University
“If you are facing the complex challenge of securing data and applications for Android, this book provides valuable insight into the security architecture and practical guidance for safeguarding this modern platform.” —Gerhard Eschelbeck, Chief Technology Officer and Senior Vice President, Sophos
“... Dubey and Misra have filled a critical gap in software security literature … They have captured the essential threats and countermeasures that are necessary to understand and effectively implement secure Android-driven mobile environments.” —James Ransome, Senior Director of Product Security, McAfee, An Intel Company
The book covers security features and issues specific to the Android platform and applications—including possible attacks and the means to prevent them. It describes mobile devices pen-testing methodology and techniques for data leak prevention (DLP). The text also discusses advanced topics, including reverse engineering and forensics, malware analysis, and secure coding and hardening guidelines for Android. The book explains how to perform threat modeling for Android mobile devices/applications and incorporate them into enterprise SDLC processes. Catalog no. K14268, April 2013, 280 pp. ISBN: 978-1-4398-9646-4, $59.95 / £38.99 Also available as an eBook
Catalog no. K15137, October 2012, 475 pp. ISBN: 978-1-4665-1794-3, $89.95 / £57.99 Also available as an eBook
16
Save when you order online at www.crcpress.com
IT Security Digital Forensics for Handheld Devices Eamon P. Doherty Fairleigh Dickinson University, Teaneck, New Jersey, USA
Cell phones, cameras, PDAs, GPS devices, and other digital items are an investigator’s treasure trove, frequently holding evidence or containing logs about communications concerning a crime. Designed to prepare investigators in the public and private sectors, this book covers both the theoretical and practical aspects of investigating handheld digital devices and emphasizes the policies needed in the work environment. The author provides examples of commercially available digital forensic tools and discusses how to seize data, examine it, and prepare it as evidence for court. Catalog no. K14323, August 2012, 336 pp. ISBN: 978-1-4398-9877-2, $69.95 / £44.99 Also available as an eBook
Digital Forensics Explained Greg Gogolin Ferris State University, Big Rapids, Michigan, USA
Focusing on the concepts investigators need to know to conduct a thorough investigation, this volume provides an overall description of the forensic practice from a practitioner’s perspective. Based on the author’s decades of experience conducting investigations and working in information technology, the text describes best practices, illustrates the forensic process, explains what it takes to be an investigator, and highlights emerging trends. Filled with helpful templates and contributions from seasoned experts in their respective fields, the book also considers cultural implications, ethics, and the psychological effects that digital forensics investigations can have on investigators. Catalog no. K13476, December 2012, 198 pp. ISBN: 978-1-4398-7495-0, $79.95 / £49.99 Also available as an eBook
Investigating ComputerRelated Crime Second Edition Peter Stephenson Norwich University, Northfield, Vermont, USA
Keith Gilbert Enfield, New Hampshire, USA
Cybercrime has evolved since the last edition of this book was published a decade ago. Motives have not changed, but new means and opportunities have arisen with the advancement of the digital age. This volume incorporates the results of research and practice, growth in the field, and new technology to offer a fresh look at the topic of digital investigation. The second edition reflects a heightened focus on cyber stalking and cybercrime scene assessment, updates the tools used by digital forensic examiners, and places increased emphases on following the cyber trail and the concept of end-to-end digital investigation. Catalog no. 1973, April 2013, 404 pp. ISBN: 978-0-8493-1973-0, $89.95 / £57.99 Also available as an eBook
New!
Expert Bytes Computer Expertise in Forensic Documents Players, Needs, Resources and Pitfalls Vlad Atanasiu University of Fribourg, Switzerland
This volume introduces computer scientists and forensic document examiners to the computer expertise of forensic documents and assists them with the design of research projects in this interdisciplinary field. Examining what has been done in the field so far and what the future looks like, the book is a project design guide, an anthropological inquiry, and a technology, market, and policies review. Concise and practical, featuring an attractive and functional layout design, the text is supplemented with graphical data representations, statistics, resource lists, and extensive references to facilitate further study. Catalog no. K20536, September 2013, 208 pp. ISBN: 978-1-4665-9190-5, $79.95 / £49.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
17
IT Security New Directions of Modern Cryptography Zhenfu Cao Shanghai Jiao Tong University, China
The study of cryptography is motivated by and driven forward by security requirements. This volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. Providing vivid demonstrations of how modern cryptographic techniques can be used to solve security problems, the book’s applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography.
Security for Wireless Sensor Networks using Identity-Based Cryptography Harsh Kupwade Patil Fish & Richardson P.C. Dallas, Texas, USA
Stephen A. Szygenda Southern Methodist University, Dallas, Texas, USA
This book explores cross-layer design approaches for wireless sensor networks using identity-based cryptography. It starts with a review of the existing layered approach and then examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the authors present a cross layer design approach to address authentication, integrity, and encryption. • Examines new ID-based key management mechanisms using a cross-layer design perspective • Discusses secure routing algorithms using IDbased cryptography
Selected Contents: Introduction. Trust Problem. Ciphertext Access Control Problem. Efficiency Problems in MultiMessage Cryptology. The Challenges from Quantum and Biological Computing. Organization. Proxy Re-Cryptography. Introduction. Proxy Re-Signature. Proxy Re-Encryption. Attribute-Based Cryptography. Universal Definitions. Bounded Ciphertext-Policy Encryption Schemes. Multi-Authority Encryption Schemes. Interval Encryption Schemes. Fuzzy Identity-Based Signature Schemes. Batch Cryptography. Aggregate Signature and Batch Verification. Batch Decryption and Batch Key Agreement. Batch RSA’s Implementation Based on Diophantine Equations. Solving the Diophantine Equations. Noncommutative Cryptography. BraidBased Cryptography. Z-Modular Method. Using Monomials in Z-Modular Method. Improved Key Exchange over Thompson’s Group. Perspectives. Appendices. Appendix A. Appendix B. Appendix C.
• Covers elliptic curve cryptography and identitybased cryptography
Catalog no. K14392, December 2012, 400 pp. ISBN: 978-1-4665-0138-6, $99.95 / £63.99 Also available as an eBook
Cross-Layer Security in Wireless Sensor Networks
• Explores new ID-based security solutions to overcome cross layer attacks in WSN
Selected Contents: Introduction to Wireless Sensor Networks Security in Wireless Sensor Networks Elliptic Curve Cryptography Identity-Based Cryptography Identity-Based Authentication and Encryption in Wireless Sensor Networks Identity-Based Key Distribution in Wireless Sensor Networks Routing in Wireless Sensor Networks Using Identity-Based Cryptography Implementation of Elliptic Curve Cryptography in Wireless Sensor Networks Each chapter includes a Summary and References Appendix—For Further Reading Catalog no. K13162, October 2012, 232 pp. ISBN: 978-1-4398-6901-7, $119.95 / £76.99 Also available as an eBook
18
Save when you order online at www.crcpress.com
IT Security Information Security Management Handbook Sixth Edition, Volume 7 Edited by
Richard O'Hanley Auerbach Publications, New York, New York, USA
James S. Tiller Raleigh, North Carolina, USA
Updated annually, this is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Catalog no. K16337, August 2013, 434 pp. ISBN: 978-1-4665-6749-8, $89.95 / £57.99 Also available as an eBook
Information Security Management Handbook 2013 CD-ROM Edition James S. Tiller Rich O’Hanley Containing the complete contents of Volumes 1-7, the Information Security Management Handbook, 2013 CD-ROM Edition is an authoritative resource that is linked and searchable by keyword. This CD updates the benchmark Volume 1 with information on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®). In addition to the complete contents of the set, the CD contains an extra volume's worth of information—including chapters from other security and networking books that have never appeared in the print editions. Catalog no. K16321, October 2013 ISBN: 978-1-4665-6726-9, CD-ROM $199.95 / £127.00
PRAGMATIC Security Metrics Applying Metametrics to Information Security W. Krag Brotby Enterprise Security Architect, Thousand Oaks, California, USA
Gary Hinson Hastings, New Zealand
Light on mathematics and heavy on utility, this is the ultimate how-to-do-it guide for security metrics. Packed with time-saving tips, the book offers easy-tofollow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system. In addition to its obvious utility in the information security realm, the PRAGMATIC approach, introduced for the first time in this book, has broader application across diverse fields of management Catalog no. K13838, January 2013, 512 pp. ISBN: 978-1-4398-8152-1, $69.95 / £44.99 Also available as an eBook
Information Technology Control and Audit Fourth Edition Sandra Senft California State Polytechnic University, Pomona, USA
Frederick Gallegos California State Polytechnic University, Pomona, USA
Aleksandra Davis Glendora, California, USA
Updated to address cloud computing, web-based applications, and server virtualization, the fourth edition of this bestselling text provides a comprehensive overview of IT controls and audits. It facilitates a fundamental understanding of IT governance, controls, auditing applications, systems development, and operations. Supporting and analyzing the COBIT model, the book prepares IT professionals for the CISA and CGEIT exams. With summary sections, exercises, review questions, and references for further readings, it promotes the mastery of the concepts and practical implementation of controls needed to effectively manage IT resources. Catalog no. K14177, July 2012, c. 776 pp. ISBN: 978-1-4398-9320-3, $89.95 / £57.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
19
IT Security Electronically Stored Information
Managing the Insider Threat
The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval
Nick Catrantzos
No Dark Corners
David R. Matthews Office of Information Security, Seattle, Washington, USA
Accessible to readers at varied levels of technological understanding, this book covers all aspects of electronic data and how to manage it. It explains what electronic information is and where it is located. It explores different ways it can be stored, why we need to manage it from a legal and organizational perspective, who is likely to control it, and how it should be acquired to meet legal and managerial goals. The text includes links and references to additional information, technical software solutions, as well as helpful forms and time-saving guides. Catalog no. K13576, July 2012, 400 pp. ISBN: 978-1-4398-7726-5, $69.95 / £44.99 Also available as an eBook
The 7 Qualities of Highly Secure Software Mano Paul SecuRisk Solutions, Pflugerville, Texas, USA
An adversary who attacks an organization from within can prove fatal to the organization and is generally impervious to conventional defenses. The first comprehensive resource to use social science research to explain why traditional methods fail against these trust betrayers, this groundbreaking book identifies new management, security, and workplace strategies for categorizing and defeating insider threats. Each chapter offers questions to stimulate discussion and exercises or problems suitable for team projects. This practical text enables those charged with protecting an organization from internal threats to circumvent these predators before they jeopardize the workplace and sabotage business operations. Catalog no. K13375, May 2012, 363 pp. ISBN: 978-1-4398-7292-5, $69.95 / £44.99 Also available as an eBook
Noiseless Steganography The Key to Covert Communications Abdelrahman Desoky
Providing a framework for designing, developing, and deploying hack-resilient software, this book uses engaging anecdotes and analogies— from Aesop’s fables and athletics to architecture and video games—to illustrate the qualities needed for the development of highly secure software. Each chapter details one of the seven qualities that make software less susceptible to hacker threats. Filled with realworld examples, the book explains complex security concepts in language that’s easy to understand to supply readers with the understanding needed to building secure software. Catalog no. K10743, May 2012, 160 pp. ISBN: 978-1-4398-1446-8, $49.95 / £31.99 Also available as an eBook
20
University of Alaska, Fairbanks, USA
Consultant, Baltimore, Maryland, USA
This volume introduces Nostega—a novel noiseless steganography paradigm. Rather than hiding data in noise or producing noise, Nostega camouflages messages as well as their transmission in the form of unquestionable data in the generated steganographic cover. The book explains how to use Nostega to determine suitable domains capable of generating unsuspicious steganographic cover in which messages are embedded in the form of innocent data compatible with the chosen domain. It presents a number of Nostega-based methodologies and discusses their implementation and steganalysis validation. Catalog no. K12069, February 2012, 300 pp. ISBN: 978-1-4398-4621-6, $119.95 / £76.99 Also available as an eBook
Save when you order online at www.crcpress.com
IT Security Investigations in the Workplace Second Edition Eugene F. Ferraro Business Controls, Inc., Greenwood Village, Colorado, USA
Gleaned from the author’s decades of experience, this volume provides both novice and experienced investigators with essential information on the processes for the proper and safe investigation of workplace crime and misconduct. Revised and updated with more techniques and case studies, the book includes new diagrams, checklists, and visuals. Each chapter begins with Key Learning Points and is supplemented with boxed Tips, Traps, and Common Mistakes. An exhaustive appendix includes a glossary of common investigative terms, sample surveillance and investigative reports, advice on digital evidence, and more. Catalog no. K10762, February 2012, c. 603 pp. ISBN: 978-1-4398-1480-2, $79.95 / £49.99 Also available as an eBook
Forthcoming!
Secure Data Provenance and Inference Control with Semantic Web Bhavani Thuraisingham Tyrone Cadenhead Murat Kantarcioglu Vaibhav Khadilkar
Core Software Security Security at the Source James Ransome Senior Director, Product Security, McAfee - An Intel Company, Santa Clara California, USA
Anmol Misra Cisco Systems, Inc., San Jose, California, USA
Introducing users to existing software development life cycle (SDLC) models, this book explains their weakness and shows how to build security practices into these models. After working with Fortune 500 companies, the authors have often seen examples of a breakdown in SDLC practices. They supply a realistic look at how to best apply available Secure Software Development Lifecycle (SSDLC) models. The text proposes improvements in applying these models to the software code. Case studies from Linux, Apache, and web applications walk readers through examples of how to implement improved practices. • Introduces existing software development life cycle (SDLC) models, explains their weakness, and shows how to build security practices into these models • Discusses how to collect metrics and analyze effectiveness of secure SDLC practices • Includes case studies from Linux and Apache as well as web applications that walk readers through the implementiation of secure SDLC practices • Tackles security at the code level to secure software and critical infrastructure • Covers threat modeling and securing mobile software
Selected Contents:
With the explosion of information on the web, it is critical to understand the provenance of the data, which includes its pedigree, quality, and accuracy. At the same time, the provenance data must be secured. This book describes a detailed step-by-step approach to securing provenance data and ensuring that the data cannot be subject to inference attacks. It presents solutions with case studies in the healthcare domain, describes the design and implementation of a policy engine for provenance, and demonstrates the use of semantic web technologies as well as cloud computing technologies for enhancing the scalability of solutions.
Introduction The Secure Development Lifecycle Security Assessment (A1): SDL Activities and Best Practices Architecture (A2): SDL Activities and Best Practices Design and Development (A3): SDL Activities and Best Practices Design and Development (A4): SDL Activities and Best Practices Ship (A5): SDL Activities and Best Practices Post-Release Support (PRSA1–5) Applying the SDL Framework to the Real World Pulling It All Together: Using the SDL to Prevent Real-World Threats
Catalog no. K16438, June 2014, 480 pp. ISBN: 978-1-4665-6943-0, $89.95 / £57.99 Also available as an eBook
Catalog no. K15922, December 2013, 416 pp. ISBN: 978-1-4665-6095-6, $79.95 / £49.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
21
IT Security Cyberspace and Cybersecurity George Kostopoulos University of Maryland University College, Adelphi, USA
“…a timely read, and even more so, a trusted resource … will keep the reader cognizant of the interrelationships among the disparate disciplines making up cyberspace.” —Riley Repko, CEO, Trusted Cyber Solutions LLC & Senior Research Fellow, Virginia Tech University
Based on related courses and research of the cyber environment in areas such as Europe, America, and Asia, this book provides comprehensive coverage of cyberspace and cybersecurity. It not only focuses on technologies but also explores human factors and organizational perspectives—emphasizing why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, and ethical and legal issues. The book also describes how to ensure business continuity in the event of adverse incidents, including acts of nature. • Identifies the traits a CIO must have to address cybersecurity challenges • Describes how to ensure business continuity in the event of adverse incidents, including acts of nature • Considers intrusion detection and prevention systems (IDPS), focusing on configurations, capabilities, selection, management, and deployment
Selected Contents: Vulnerabilities in Information Systems Vulnerabilities in the Organization Risks in Information Systems Infrastructure Secure Information Systems Cybersecurity and the CIO Building a Secure Organization Cyberspace Intrusions Cyberspace Defense Cyberspace and the Law Cyber Warfare and Homeland Security Catalog no. K14391, July 2012, 236 pp. ISBN: 978-1-4665-0133-1, $79.95 / £48.99 Also available as an eBook
22
IT Management & Operations New!
Software Testing A Craftsman’s Approach, Fourth Edition Paul C. Jorgensen This updated and reorganized fourth edition applies the strong mathematics content of previous editions to a coherent treatment of ModelBased Testing for both code-based (structural) and specification-based (functional) testing. These techniques are extended from the usual unit testing discussions to full coverage of less understood levels integration and system testing.
See What’s New in the Fourth Edition: • Emphasizes technical inspections and is supplemented by an appendix with a full package of documents required for a sample Use Case technical inspection • Introduces model-based development and provides an explanation of how to conduct testing within model-based development environments • Presents a new section on methods for testing software in an Agile programming environment • Explores test-driven development, reexamines all-pairs testing, and explains the four contexts of software testing
Selected Contents: A Mathematical Context: A Perspective on Testing Examples Discrete Math for Testers Graph Theory for Testers Unit Testing: Boundary Value Testing Equivalence Class Testing Decision Table–Based Testing Path Testing Data Flow Testing Retrospective on Unit Testing Beyond Unit Testing: Life Cycle–Based Testing Model-Based Testing Integration Testing System Testing Object-Oriented Testing Software Complexity Model-Based Testing for Systems of Systems Exploratory Testing Test-Driven Development A Closer Look at All Pairs Testing Evaluating Test Cases Software Technical Reviews Epilogue: Software Testing Excellence Appendix: Complete Technical Inspection Packet Catalog no. K15906, October 2013, 494 pp. ISBN: 978-1-4665-6068-0, $99.95 / £63.99 Also available as an eBook
Save when you order online at www.crcpress.com
IT Management & Operations Data Governance Creating Value from Information Assets Edited by
Neera Bhansali iMEMS Corp.
This book provides an integrated approach to designing, developing, and sustaining an effective data governance strategy. Focusing on the organizational, operational, and strategic aspects of data governance, it addresses the issue of how to leverage, derive, and sustain value from informational assets that are housed in the IT infrastructure. • Details how to align data governance to business strategies and goals • Illustrates how to build successful data stewardship with a governance framework • Offers strategies to integrate IT and data governance frameworks • Provides business-driven and technical perspectives on data quality management, metadata management, data access and security, and data lifecycle • Addresses the issue of how to leverage, derive, and sustain value from informational assets housed in the IT infrastructure
Selected Contents: The Role of Data Governance in an Organization Navigating the Organization to Ensure Data Governance Metadata Management and Data Governance Operationalizing Data Quality through Data Governance
New!
Green Networking and Communications ICT for Sustainability Edited by
Shafiullah Khan Jaime Lloret Mauri Politechnic University of Valencia, Spain
Green Networking and Communications: ICT for Sustainability brings together leading researchers to discuss emerging developments in energy-efficient networking and communications. It covers the spectrum of research subjects, including methodologies and architectures for energy efficiency, energy-efficient protocols and networks, energy management, smart grid communications, and communication technologies for green solutions. It addresses open research challenges regarding energy efficiency for IT and for wireless sensor networks, including mobile and wireless access networks, broadband access networks, home networks, vehicular networks, and smart grids. • Examines foraging-inspired radio-communication energy management for green multi-radio networks • Considers a cross-layer approach to the design of energy-efficient wireless access networks • Investigates the interplay between cooperative device-to-device communications and green LTE cellular networks • Considers smart grid energy procurement for green LTE cellular networks • Details smart grid networking protocols and standards
Bridging the Gap between Business and IT: An Information Governance Perspective in the Banking Industry
Considering the spectrum of energy-efficient network components and approaches for reducing power consumption, the book is organized into three sections: Energy Efficiency and Management in Wireless Networks, Cellular Networks, and Smart Grids. It addresses many open research challenges regarding energy efficiency for IT and for wireless sensor networks, including mobile and wireless access networks, broadband access networks, home networks, vehicular networks, intelligent future wireless networks, and smart grids. It also examines emerging standards for energy-efficient protocols.
Catalog no. K13707, June 2013, 268 pp. ISBN: 978-1-4398-7913-9, $79.95 / £49.99 Also available as an eBook
Catalog no. K16402, October 2013, 488 pp. ISBN: 978-1-4665-6874-7, $99.95 / £63.99 Also available as an eBook
Semantic Analytics and Ontologies. Data Privacy, Security, and Compliance through Data Governance Adaptive Data Governance: The AT-EASE Change Management Approach Case Study: State Level Governance of Health Information Exchange
For more information and complete contents, visit www.crcpress.com
23
IT Management & Operations Green Computing Tools and Techniques for Saving Energy, Money, and Resources Bud E. Smith Connecting the green agenda in IT to the broader overall green agenda, this book shows how going green can pay for itself with reduced hardware, software, support, and energy costs. It also ties green computing to the broader corporate agendas of risk management, brand management, and reputation management. This authoritative text provides quotable budget justifications that can be used by executives, IT management, suppliers, and market analysts to help place IT stakeholders on the same page for a new agenda that will save energy, money, resources, and the planet. • Explains why going green is a necessity for every IT department, and why the green agenda will drive IT for years and decades to come • Demonstrates not only savings but increased business resiliency from green computing • Describes how to use the cloud to make software available and store data • Embodies the green philosophy on how to deploy IT devices, software, and services in a way that makes people more effective with less use of resources
The Internet of Things in the Cloud A Middleware Perspective Honbo Zhou “… I also believe this book, which I highly recommend, is the first on the market that covers almost all of the related subjects.” —George (Aiping) Guo, Ph.D., CEO of TCL Communication Technology Holdings Ltd.
This book provides a panoramic view of the Internet of Things (IoT) landscape, focusing on the overall technological architecture and design of a tentatively unified IoT system underpinned by different cloud computing paradigms from a middleware perspective. The first part of the book describes IoT, related concepts, and a number of key vertical IoT applications. The second part focuses on middleware. The third part covers cloud computing and IoT as well as their synergy based on the common background of distributed processing. • Describes and categorizes the many facets of the Internet of Things • Proposes a number of paradigms and classifications about Internet of Things' mass and niche markets and technologies • Marks the first text of its kind published in China
• Shows readers how to make the case for green computing to a wide range of internal and even external audiences
• Reflects the author’s extensive search of relevant materials worldwide
Selected Contents:
THE INTERNET OF THINGS
Green Computing and Your Reputation
The Third ICT Wave
Green Computing and Saving Money
Ubiquitous IoT Applications
Green Computing and the Environment
our Pillars of IoT
A New Vision of Computing
The DNA of IoT
Building a Green Device Portfolio
MIDDLEWARE FOR IoT
Finding Green Devices
Middleware and IoT
Green Servers and Data Centers
Protocol Standards for IoT
Saving Energy
Architecture Standardization for WoT
Reducing Greenhouse Gas Emissions Reducing Resource Use
THE CLOUD OF THINGS
Green Computing by Industry Segment
The Cloud of Things
The Future: Deep Green Computing Catalog no. K14462, July 2013, 262 pp. ISBN: 978-1-4665-0340-3, $69.95 / £44.99 Also available as an eBook
24
Selected Contents:
Cloud Computing Catalog no. K14173, October 2012, 391 pp. ISBN: 978-1-4398-9299-2, $99.95 / £60.99 Also available as an eBook
Save when you order online at www.crcpress.com
IT Management & Operations Unit and Ubiquitous Internet of Things Huansheng Ning Beijing University of Aeronautics & Astronautics, China
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts. Answering fundamental questions about IoT architectures and models, this book introduces essential IoT concepts from the perspectives of mapping and interaction between the physical world and the cyber world. It addresses key issues such as strategy and education, particularly around unit and ubiquitous IoT technologies. • Introduces essential IoT concepts from the perspectives of mapping and interaction between the physical world and cyber world • Outlines a fundamental architecture for future IoT, based on the IoT layered model, topological structure, various existence forms, and corresponding logical relationships • Presents specific case studies that illustrate various application scenarios • Establishes an IoT technology system based on the knowledge of IoT scientific problems • Provides an overview of core technologies, including basic connotation, development status, and open challenges
Selected Contents: Introduction Architecture and Fundamentals Unit Internet of Things Ubiquitous Internet of Things Resource Management Loop Control in Actuation Session Management Space-time Consistency and Location Privacy Security and Privacy Energy Management Spectrum Management Nanotechnology Quantum Technology Big Data
Bring Your Own Devices (BYOD) Survival Guide Jessica Keyes New Art Technologies, Monroe Township, New Jersey, USA
This book explains and then helps readers live with the psycho-techno phenomenon that is bring your own technology (BYOT). Readers will learn how to understand these new endusers and their demands, as well as the strategic and tactical ramifications of these demands. Next, it covers the broad range of technical considerations such as selection, connectivity, training, support, and security. The text includes best practices and case studies of well-known companies, including IBM, Ford, and CarFax. • Covers the broad range of technical considerations such as selection, connectivity, training, support and security • Explains the new end-users and their demands, as well as the strategic and tactical ramifications of their demands • Includes an extensive set of best practices and case studies, including IBM, Ford, and CarFax • Examines the business aspects of BYOT: selection, purchasing, and corporate culture
Selected Contents: Consumerization of IT New generation of workers Good idea or bad The technology aspects of BYOT: virtualization, connecting to the network, etc Business aspects of BYOT: selection, purchasing, corporate culture Training Support Security Best practices in deploying BYOT Resources Appendices Catalog no. K16077, March 2013, 451 pp. ISBN: 978-1-4665-6503-6, $79.95 / £49.99 Also available as an eBook
Catalog no. K15947, April 2013, 260 pp. ISBN: 978-1-4665-6166-3, $99.95 / £63.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
25
IT Management & Operations Return On Process (ROP) Getting Real Performance Results from Process Improvement Michael West Natural SPI Inc., Salt Lake City, Utah, USA
This book details a comprehensive and coherent endto-end process for integrating organizational performance objectives and measures to process improvement activities. Describing how to achieve real business performance results from process improvement, it supplies sound, proven advice on how to improve your organization’s software and systems development and delivery processes in ways that affect your business. Filled with examples and case studies that illustrate key concepts, it provides "how to" information based on three role categories: executive, manager, and practitioner. Describing non-traditional and innovative ways to achieve process and performance improvement, the book includes action plan guides at the end of each chapter that provide clear-cut guidance on exactly what you should and shouldn’t do. • Details a comprehensive and coherent end-toend process for integrating organizational performance objectives and measures to process improvement activities • Provides "how to" information based on three role categories: executive, manager, and practitioner • Includes many examples and case studies that illustrate the major concepts
Impact of Healthcare Informatics on Quality of Patient Care and Health Services Divya Srinivasan George Mason University, Arlington, Virginia, USA
Taking an integrated approach, this book provides a comparative perspective of how different organizations adapt and use healthcare informatics. The first part of the book covers the basics of HIT. The second part focuses on the broader community: the patient, the physician, government, and how HIT will impact each. The book includes a discussion about mobile health and how a rapidly growing mobile health generation is changing the face of healthcare as we know it.
Selected Contents: HIPAA: Intent versus Actuality of the Law in Upholding the Privacy of Health Records Organizational Culture Differences in Incorporation of Health Information Technology (HIT) across Healthcare Providers An Overview of How Health Information Technology Will Make a Mark on Hospital Financing Funding Electronic Medical Records: Reality or Illusion? A Cost-Benefit Analysis
• Describes non-traditional and innovative ways to achieve process and performance improvement
Impact of Organizational Behavior Characteristics on Usage of a Healthcare Provider’s Health Information Technology (HIT) Services
• Includes action plan guides at the end of each chapter
Quality of Care and the Patient
Selected Contents: Introduction Real Performance Real Process Improvement Building a Performance Culture What Could Be Catalog no. K14019, March 2013, 390 pp. ISBN: 978-1-4398-8639-7, $69.95 / £44.99 Also available as an eBook
26
Physicians and Perceptions on HIT Medical Malpractice Lawsuits: Can Physicians Reduce Their Chances by Using Health Information Technology? Community Impacts from the Detection of Bioterrorism Using EMRs Health Informatics and the New Direction of Healthcare: Mobile Health, PHRs, Mobile Health Apps, and More Catalog no. K14545, February 2013, 162 pp. Soft Cover, ISBN: 978-1-4665-0487-5 $59.95 / £38.99 Also available as an eBook
Save when you order online at www.crcpress.com
IT Management & Operations Coming Soon!
Wi-Fi Enabled Healthcare Ali Youssef Douglas McDonald II Jon Linton Bob Zemke Aaron Earle
The Art of Agile Practice A Composite Approach for Projects and Organizations Bhuvan Unhelkar Consultant, New South Wales, Australia
This book focuses on the recent proliferation of Wi-Fi in hospital systems. It explains how Wi-Fi has transformed clinical work flows and infused new life into the types of mobile devices being evaluated and implemented in hospitals. The book focuses on the key areas associated with wireless network design, security, and support. It also provides an in-depth view into voice over wireless (including smart phones), mobile medical devices, and wireless guest services. Several solutions in each space are discussed with design considerations, pros, and cons.
Addressing the growing popularity of Agile software development, this book begins by identifying the challenges currently facing organizations in terms of their development and maintenance approaches. It presents a comprehensive Composite Agile Method and Strategy as a carefully constructed combination of process elements. The book creates and applies relevant metrics and measurements to the entire CAMS lifecycle—opening up the possibility of improving estimations by project managers. It includes figures, case studies, and tables that illustrate key concepts.
Catalog no. K15890, January 2014, 280 pp. ISBN: 978-1-4665-6040-6, $79.95 / £49.99 Also available as an eBook
Catalog no. K12339, November 2012, 527 pp. ISBN: 978-1-4398-5118-0, $79.95 / £49.99 Also available as an eBook
A Guide to IT Contracting
Coming Soon!
Foley & Lardner LLP, Los Angeles, California, USA
Network Innovation through OpenFlow and SDN
Matthew A. Karlyn
Principles and Design
Technology Transactions Practice, Cooley LLP, Boston, MA
Edited by
Checklists, Tools, and Techniques Michael R. Overly
Distilling critical business and legal lessons learned from decades of drafting and negotiating technologyrelated agreements, this handbook allows readers to quickly access information on almost every type of agreement and immediately understand the intended and actual purpose. It includes key business and legal issues, tips and techniques for negotiating terms, and common pitfalls. It offers checklists to organize concepts and a complete glossary to define key legal, business, and technical terms as well as Internet resources and online aids to assist in drafting contracts. Catalog no. K13556, December 2012, 448 pp. ISBN: 978-1-4398-7657-2, $79.95 / £49.99 Also available as an eBook
Fei Hu University of Alabama, Tuscaloosa, USA
Legacy networks simply weren’t designed to handle the speed, volume, and scalability needs of today’s organizations. To address this, it is important to consider software-defined networking (SDN) powered by the OpenFlow protocol for your network architecture. Introducing SDN and OpenFlow, this book explains how to use them to build next-generation networks that are simple to design and scale; less expensive to build and operate; more agile and customizable; and more virtualized, flexible, and interoperable. Catalog no. K16575, February 2014, 488 pp. ISBN: 978-1-4665-7209-6, $89.95 / £57.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
27
IT Management & Operations Making IT Lean Applying Lean Practices to the Work of IT
Beverly G. McCarter
Howard Williams Rebecca Duray
MITRE
Making IT Lean presents Lean concepts and techniques for improving processes and eliminating waste in IT operations and IT Service Management. The authors provide a context for discussing several areas of application within this domain, allowing you to quickly gain insight into IT processes and Lean principles. The text reviews IT Service Management, with reference to the IT Infrastructure Library (ITIL®) as a framework for best practices. Filled with straight forward examples, it provides enough modeling tools so you can start your Lean journey right away. Catalog no. K13533, November 2012, 232 pp. Soft Cover, ISBN: 978-1-4398-7602-2 $59.95 / £38.99 Also available as an eBook
Cloud Enterprise Architecture Pethuru Raj Enterprise Architecture Consultant, Wipro Consulting Services, Bangalore, India
This book examines enterprise architecture (EA) in the context of the surging popularity of cloud computing. It explains the transformation of EA resulting from the strategically significant convergence that cloud computing can achieve. Chapters cover each of the contributing architectures of EA, illustrating the current and impending implications of the cloud on each of them. The author ties together these topics with chapters on cloud integration and composition architecture. He also examines the Enterprise cloud, federated clouds, and the vision to establish the intercloud. Catalog no. K14431, October 2012, 528 pp. ISBN: 978-1-4665-0232-1, $79.95 / £49.99 Also available as an eBook
28
Leadership in Chaordic Organizations Brian E. White CAU, SES, Sudbury, Massachusetts, USA
Supplying a clear vision of how to build high-performance teams, Leadership in Chaordic Organizations presents methods for improving operations through the application of complex systems engineering principles and psychological counseling techniques. The book considers the dynamic variables inherent in the human condition and how they impact group dynamics. Helping you to demystify complex system behaviors, it details an approach to leadership that integrates elements of neurobiology, systems engineering, complexity science, philosophy, and evolutionary and social psychology. Catalog no. AU7417, October 2012, 311 pp. ISBN: 978-1-4200-7417-8, $69.95 / £44.99 Also available as an eBook
A Comprehensive Guide to Enterprise Mobility Jithesh Sathyan Anoop N. Navin Narayan Shibu Kizhakke Vallathai This book provides comprehensive coverage of enterprise mobility. It emphasizes the value and impact of enterprise mobility, discusses the technology that backs this business change, and explains how enterprise mobility will be used in different industries. Focusing on mobility concepts, Section I addresses the needs of business managers and decision makers in an enterprise. Section II presents mobile solutions and case studies in different industries. Section III covers mobile application development. Section IV provides details on the key technology considerations in mobility. Catalog no. K13025, September 2012, 556 pp. ISBN: 978-1-4398-6735-8, $79.95 / £44.99 Also available as an eBook
Save when you order online at www.crcpress.com
IT Management & Operations
Run Grow Transform Integrating Business and Lean IT Steven C Bell What readers are saying: “… focuses on the most critical and challenging issue for any aspect of the development or use of IT: creating a collaborative learning culture.” —Jeffrey K. Liker, Shingo Prize-winning Author of The Toyota Way
“A powerful read detailing how companies can leverage their Lean IT transformation to supercharge the business.” —Tom Paider, IT Build Capability Leader, Nationwide
• Explains how to apply Lean IT practices to drive operational excellence, enable efficient growth, and accelerate idea-to-value innovation • Offers insights and examples that can be put to use immediately • Describes how to integrate and leverage transformative IT capabilities with all assets of an enterprise • Outlines a framework to facilitate collaboration and stimulate innovation • Supplies a collaborative value stream management approach to help readers harnesses the principles and practices of Lean across the entire enterprise Your customers want innovation and value, and they want it now. How can you apply Lean principles and practices throughout your enterprise to drive operational excellence, reduce costs while improving quality, enable efficient growth, and accelerate idea-tovalue innovation? Shingo Prize-winning author Steve Bell and other thought leaders show you how—guiding you to more effectively align people and purpose, promote enterprise agility, and leverage transformative IT capabilities to create market-differentiating value for your customers. Catalog no. K14527, September 2012, 372 pp. Soft Cover, ISBN: 978-1-4665-0449-3 $49.95 / £31.99 Also available as an eBook
Agile Strategy Management Techniques for Continuous Alignment and Improvement Soren Lyngso Lyngso Informatique Series: ESI International Project Management Series
Strategies are challenged all the time because markets, technology, legal factors, government, and other factors change. In order to ensure that a strategy does not become ephemeral it must be flexible when confronting the challenges. This flexibility is ensured by building agility into the methods proposed in this book for initiation, development, implementation, and governance of strategic initiatives. The book shows how you can initiate, develop, implement, and govern a healthy strategy delivering the benefits expected by all stakeholders. • Shows how to initiate, develop, implement, and govern a healthy strategy delivering the benefits expected by all stakeholders • Demonstrates how to ensure flexibility by building agility initiation, development, implementation, and governance of strategic initiatives • Guides readers on how to respond strategically to changing markets, technology, legal factors, government, and other factors
Selected Contents: Introduction Team-Building for a Strategic Initiative Strategy Process Quality Management Solution Provider Procurement Strategy Implementation Strategy Governance Agile Strategic Management Recap Catalog no. K20756, February 2014, 433 pp. ISBN: 978-1-4665-9607-8, $79.95 / £49.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
29
IT Management & Operations Big Data and Business Analytics
Business Analytics
Edited by
Edited by
Jay Liebowitz
Jay Liebowitz
An Introduction
University of Maryland University College, Adelphi, USA
University of Maryland University College, Adelphi, USA
"The chapters in this volume offer useful case studies, technical roadmaps, lessons learned, and a few prescriptions to ‘do this, avoid that.’"
As the field of business analytics continues to emerge rapidly, there is a need for a reliable textbook and reference on the subject. Filling this need, this book is suitable for graduate-level students and undergraduate seniors. It maintains a focus on only the key areas so the material can be covered adequately in a one-semester or one-quarter course. Each chapter includes softwaregeneric exercises, labs, and associated answers to the exercises/labs.
—From the Foreword by Joe LaCugna, Ph.D., Enterprise Analytics and Business Intelligence, Starbucks Coffee Company
Research shows that organizations that use business analytics to guide their decision making are more productive and experience higher returns on equity. Big Data and Business Analytics helps you quickly grasp the trends and techniques of big data and business analytics to make your organization more competitive. Packed with case studies, this book assembles insights from some of the leading experts and organizations worldwide. Spanning industry, government, not-forprofit organizations, and academia, they share valuable perspectives on big data domains such as cybersecurity, marketing, emergency management, healthcare, finance, and transportation. • Understand the trends, potential, and challenges associated with big data and business analytics • Get an overview of machine learning, advanced statistical techniques, and other predictive analytics that can help you resolve big data issues • Learn from VPs of Big Data/Insights & Analytics via case studies of Fortune 100 companies, government agencies, universities, and not-for-profits This book shows you how to go from being data-rich to insight-rich, improving your decision making and creating competitive advantage. Catalog no. K16118, April 2013, 304 pp. ISBN: 978-1-4665-6578-4, $69.95 / £44.99 Also available as an eBook
30
• Introduces business analytics concepts, techniques, issues, applications, and emerging trends • Includes software-generic exercises and labs along with answers to labs/exercises • Examines legal and privacy issues • Explores social media in analytics
Selected Contents: The Value of Business Analytics Producing Insights from Information through Analytics Executive/Performance Dashboards Data Mining: Helping To Make Sense of Big Data Big Data Analytics for Business Intelligence Text Mining Fundamentals Neural Network Fundamentals Measuring Success in Social Media: An Information Strategy in a Data Obese World The Legal and Privacy Implications of Data Mining Epilogue: Parting Thoughts about Business Analytics Catalog no. K20757, January 2014, 288 pp. ISBN: 978-1-4665-9609-2, $89.95 / £57.99 Also available as an eBook
Save when you order online at www.crcpress.com
Project Management Coming Soon!
New!
Empowering Project Teams
Program Management Leadership
Using Project Followership to Improve Performance Marco Sampietro Business School of Bocconi University, Milan, Italy
Tiziano Villa Project Management LAB
Project team members play an important role in every project but often do not have the necessary understanding of project management methodologies. Thus, the dialog between the project manager and team members is often not as easy as it should be and becomes a source of stress and tensions. This book tries to improve on this situation by presenting the project environment from the perspective of project team members. • Illustrates the knowledge that team members should have and the behaviors they should adopt in order to successfully participate in a project environment
Creating Successful Team Dynamics Mark C. Bojeun Identifying critical success factors specific to program management, this book examines various leadership styles and traits—providing helpful insights on the tough choices leaders are often forced to make. Next, it examines teams and explains how to bring disparate people together to work towards common goals and visions. It describes how to build and maintain a High Performing Team as well as how to instill a competitive spirit and culture of cooperation and mutual respect in your team to make sure your team remains focused on the right things. • Identifies critical success factors specific to program management • Uses real-world scenarios to demonstrate the impact of good and bad leadership styles on program success
• Presents the project environment through the lenses of project team members
• Describes how to build and maintain High Performing Teams
• Provides individuals who work in project teams with tools and skills to produce better performing projects and increase personal satisfaction
• Explains how to make sure a team is driven towards success through the use of a competitive spirit, cooperation, and mutual respect
• Examines the project end as an important moment to "take stock" and evaluate whether the effort invested has been rewarded
Selected Contents:
Selected Contents: Introduction Why Doesn't Project Management Only Concern Project Managers? Project Followership in Action The Kick-Off Meeting The Requirements Analysis Planning the Scope Project Scheduling The Formulation of Estimates Project Risk Management Change as a Natural Factor in Projects Controlling the Project Projects Never Finish: The Importance of the Lessons Learned The Personal Assessment Catalog no. K22109, February 2014, 295 pp. ISBN: 978-1-4822-1755-1, $69.95 / £44.99 Also available as an eBook
Introduction Leadership and Program Management Leadership Study Developing and Achieving a Common Vision The History of Project and Program Management Distinction between Portfolio, Program, and Project Management Leadership Introduction to Leadership External Factors Affecting Leadership Individual Motivation Leadership Theories Leadership in Program Management Leadership and Teams Building Teams Team Dynamics High-Performing Teams (HPTs) Conflict Resolution Case Study in Leading Teams Formal Leadership Processes Formal Processes Catalog no. K16766, December 2013, 226 pp. ISBN: 978-1-4665-7709-1, $69.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
31
Project Management New!
New!
Creative, Efficient, and Effective Project Management
Successful Program Management
Ralph L. Kliem LeanPM, LLC, Redmond, Washington, USA
This book provides an in-depth discussion of creativity and its relationship to project management. Examining the five processes executed in a project, it discusses common and not some common tools and techniques for developing project management deliverables. Each chapter includes a checklist and a case study on the application of the concepts presented. The book also indicates how the topics of discussion relate to the Project Management Institute's (PMI®) Project Management Body of Knowledge (PMBOK®). • Provides an understanding of the benefits of creativity to projects • Identifies challenges to creativity in a project and how to overcome them • Describes the tools and techniques of creativity and how to apply them to the major processes within project management • Establishes the groundwork for encouraging and sustaining creativity in a project • Unveils ten secrets about creativity in projects
Selected Contents: Creativity and Project Management Creative Thinking Abilities Groups and Creativity Challenges and Constraints Laying the Groundwork for a Creative Environment Common Creativity Tools and Techniques Creativity Life Cycle Models Creativity and the Defining Process Creativity and the Organizing Process Creativity and the Planning Process Creativity and the Executing Process Creativity and the Monitoring and Controlling Process Creativity and the Closing Process A Baker’s Dozen of Takeaways Catalog no. K16757, October 2013, 320 pp. ISBN: 978-1-4665-7692-6, $69.95 / £44.99 Also available as an eBook
32
Complexity Theory, Communication, and Leadership Wanda Curlee Deloitte, Philadelphia, Pennsylvania, USA
Robert Lee Gordon American Public University System, Charlestown, West Virginia, USA
This book identifies the best leadership types for complex program environments. It goes beyond what is currently available in program management standards to outline powerful solutions to the macro and micro program issues facing program managers. Using language that is easy to understand, it explains what it takes to communicate strategically to all parties involved and addresses the communication issues common to most programs, including stakeholder communication, project team communication, and shareholder communication. • Addresses the communication issues common to programs, including stakeholder communication, project team communication, and shareholder communication • Describes complexity theory techniques for building effective communication in a virtual environment • Identifies the best leadership types for complex program environments • Goes beyond what is available in program management standards to address the macro and micro issues facing program managers
Selected Contents: Introduction. Complexity Theory. Course Materials #1. Leadership in Program Management. Leadership and Program Management. Complexity and Program Management. Course Materials #2. Communication and Program Management. Technology-Based Communication, Complexity, and Program Management. Course Materials #3. Complexity-Based Program Management. Applied Complexity and Program Management. Successful Program Management and Complexity. Course Materials #4. The Future of Program Management and Complexity. Advancing the Future of Program Management. Course Materials #5. Catalog no. K16403, October 2013, 246 pp. ISBN: 978-1-4665-6879-2, $69.95 / £44.99 Also available as an eBook
Save when you order online at www.crcpress.com
Project Management New!
New!
ENOVALE
Sustainable Program Management
How to Unlock Sustained Innovation Project Success Greg McLaughlin Inthesis, Inc., Boca Raton, Florida, USA and Global Targeting Inc., Fort Lauderdale, Florida, USA
Vinny Caraballo Global Targeting, Hawthorn Woods, Illinois, USA
Without sustained innovation, most organizations will simply fade away. Explaining how to achieve sustained innovation success in today’s increasingly competitive global environment, ENOVALE: How to Unlock Sustained Innovation Project Success provides a validated strategy for implementing innovation projects following the ENOVALE™ methodology: envision the need, nominate, objectify, validate, align and adapt, link, and execute. The authors’ first book, Chance or Choice: Unlocking Innovation Success, introduced a proven management process, using the ENOVALE methodology, for identifying innovation opportunities through validated outcomes. This book takes the outcome and provides a method—from project initiation to completion. • Goes beyond the typical innovation book to outline specific solutions and strategies • Includes templates, flow charts, tools, and strategies for each "means" of innovation • Provides business examples of the philosophy, strategic elements, and success criteria that readers can easily relate to
Gregory T Haugan The world is undergoing major transitions due to three driving forces—population changes, climate changes, and energy resource constraints—making it essential for us to move toward sustainability in the implementation of projects and programs as well as our everyday life. This book offers a unique approach to accommodating the three new constraints of population change, climate change, and energy resources as impacts on programs and portfolios. It presents them in the form of overlays, which facilitate planning by considering the effects of these additional constraints on a program, along with schedule, budget, and performance constraints. The overlays summarize the book’s extensive analyses of these global challenges. The book is divided into sections on population change, climate change, and energy resource constraints and provides background information and overlays for each one. The author discusses scenarios, possible solutions, and probable outcomes, which provide the basis for evaluating the risks and the sustainability considerations involved. The final section of the text addresses planning for real sustainability and describes six pathways toward a sustainable system. This practical book familiarizes readers with these new global challenges to program management and provides a basis for developing sustainable and successful programs.
The text begins by explaining what strategy means in terms of innovation and how it can be transformative for products, processes, and services. After an overview of innovation, the book discusses a series of strategies for each of the three means of innovation. These strategies outline a systematic process you can use to initiate and conduct your own innovation projects.
Selected Contents:
Catalog no. K20545, October 2013, 203 pp. Soft Cover, ISBN: 978-1-4665-9208-7 $69.95 / £44.99 Also available as an eBook
Nuclear Energy Source Overlays
Sustainability Population Climate Change Energy Resources Nonrenewable Energy Source Overlays Section IV-C: Renewable Energy Source Overlays Section V: Planning for Sustainability Glossary Bibliography Index Catalog no. K16683, October 2013, 384 pp. ISBN: 978-1-4665-7516-5, $79.95 / £49.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
33
Project Management New!
The Complete Project Management Office Handbook Third Edition
New!
From Projects to Programs A Project Manager's Journey Samir Penkar
Gerard M. Hill
FutureofProjectManagement.com
Expanded and thoroughly revised, this book extends the concepts and considerations of "modern project management" into the realm of project management oversight, control, and support. The PMO model defined in this book helps both project managers and the organization to understand and apply professional practices in project management, and to adapt and integrate business practices into the project management environment.
An engaging story of what makes program management effective, this book introduces key program management concepts in a manner that is easy to understand. It provides a backstage view into the workings of program management, program organization, team dynamics, and the skills required to manage programs. It gives readers the opportunity to experience the ins and outs of real-world program management. Every project team member will find themselves somewhere in this story. Whether an aspiring program manager, a successful project manager, or a project team member, this book offers a fascinating glimpse into what it takes to run successful programs in today’s business environment.
• Addresses setting up or establishing a PMO, which can aid organizations in determining their need for a PMO and in performing the steps needed to create a PMO within the organization • Enables readers who have specific needs in their project management environment to find guidance and a starting point for resolution of those needs in the relevant organization • Allows readers to review the prescribed approach (and prerequisites) for developing PMO functionality in the organization
Selected Contents: Practice Management Project Management Methodology Project Management Tools Standards and Metrics Project Knowledge Management Infrastructure Management Project Governance Assessment Organization and Structure Facilities and Equipment Support Resource Integration Resource Management Training and Education Career Development Team Development Technical Support Mentoring Project Planning Project Auditing Project Recovery Business Alignment Project Portfolio Management Customer Relationship Management Vendor/Contractor Relationship Management Business Performance Management Appendices Catalog no. K16277, September 2013, 741 pp. ISBN: 978-1-4665-6631-6, $89.95 / £57.99 Also available as an eBook
34
• Facilitates a clear understanding of how to run successful programs • Presents new ideas on program structure and organization • Outlines ways to simplify program reporting needs • Explains how to coordinate and prioritize resources across projects • Details an approach to program governance structure • Supplies techniques to keep the program focused on program goals
Selected Contents: The Birth of My First Program What Is it Really I Do? Program Roadmap Estimates and Program Financials Why Do It? Benefits, Benefits, Benefits The Prosperity Game for Governance Program Integration Challenges The Long Implementation Phase Benefits Management The Fruits of Growth Reflections Selected Bibliography Glossary Catalog no. K20532, September 2013, 157 pp. Soft Cover, ISBN: 978-1-4665-9181-3 $49.95 / £31.99 Also available as an eBook
Save when you order online at www.crcpress.com
Project Management Leading Virtual Project Teams Adapting Leadership Theories and Communications Techniques to 21st Century Organizations Margaret R. Lee This book addresses the challenges the virtual project management environment poses to traditional methods of leadership and communication. It introduces new approaches for adapting existing leadership theories to e-leadership as well as progressive tools and techniques to improve virtual project communications. The book begins by examining the factors affecting the movement from traditional work environments to virtual organizations. It considers the challenges of leading multicultural, global organizations and reviews what e-leadership means. Illustrating the application of both traditional and new leadership models and theories to virtual project management, the book includes best practices for: • Managing and motivating the multicultural team • Communicating in a distributed work environment • Avoiding social isolation • Cyber-bullying in the virtual environment and e-ethics • Cultural management issues Explaining how traditional leadership theories and models can be applied to contemporary projects, the book details methods virtual project managers can use to enhance virtual communications. The final chapter describes the e-leadership skills and competencies project managers will need to ensure sustainable success in today’s competitive business environment.
Selected Contents:
Applying Guiding Principles of Effective Program Delivery Kerry R. Wills Southington, Connecticut, USA
Applying Guiding Principles of Effective Program Delivery explains what it means to take a consultative approach. Instead of focusing on specific program management techniques, it covers the guiding principles required to make those techniques effective— making it applicable to any program in any industry. It identifies the eight guiding principles of effective program delivery and outlines proven strategies to help program managers succeed in the current environment. • Supplies in-depth coverage of each function of the program office • Highlights leadership, transparency, and influencing stakeholders • Provides proven guidelines for successfully implementing the program management tools covered in the text • Includes case studies based on actual programs in the insurance industry Filled with figures, case studies, and templates, the book illustrates the application of these principles across the various program functions—including financial management, schedule management, and resource management. It includes nine cases studies of actual programs from across several industries that demonstrate the application of these principles and their results. Supplying in-depth coverage of each function of the program office, it also contains 20 templates of the key deliverables outlined in the text. Catalog no. K20360, July 2013, 247 pp. ISBN: 978-1-4665-8789-2, $69.95 / £44.99 Also available as an eBook
Overview e-Leadership for Projects Enhancing Virtual Project Communications Cultural Communication Issues and Effective e-Leadership Virtual Project Leadership Competencies Catalog no. K16755, July 2013, 217 pp. ISBN: 978-1-4665-7688-9, $69.95 / £44.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
35
Project Management Construction Program Management Joseph Delaney President and General Manager, CMS Delany
Although the construction industry is one of the largest enterprises in the United States, widely accepted management principles, such as those contained in PMI®’s Standard for Program Management are still not widely implemented. This book explores how an improved understanding of these principles could boost construction program success rates. It outlines a process-based approach to construction program management that leverages structure to bring order to what can otherwise feel like an overwhelming challenge. The book includes case studies that illustrate the proper implementation of the steps outlined in the book. • Explains how the principles of PMI®’s Standard for Program Management can be effectively implemented on construction programs • Illustrates the difference between strategic (program) and tactical (project) management techniques • Describes the difference between leadership (strategic) and management (tactical) skills • Uses language that’s easy to understand • Shares valuable lessons learned through the use of case studies
PgMP® Exam Challenge! Ginger Levin, PMP, PgMP and J. LeRoy Ward, PMP, PgMP ESI International, New York, New York, USA
“It is a helpful approach to test knowledge areas and determine what areas you need additional preparing for the PgMP certification process. It’s also very portable, which makes it easy to take it along with you and review anywhere” --Nazanin Mehrooz, PM World Journal
Up to date with the third edition of PMI’s Program Management Standard, The PgMP® Exam Challenge! contains more than 300 practice questions to help readers hone their knowledge and test their skills. It covers all five of the program management domains: Strategic Program Management, Program Management Life Cycle, Benefits Management, Stakeholder Management, and Governance. It also examines all of the sub domains of the lifecycle domain. With an easy-to-use format, this is an ideal resource for those preparing to take the PgMP exam.
Selected Contents:
• Reflects the third edition of PMI's Program Management Standard (2013) • Includes more than 300 questions to help readers hone their knowledge and test their skills • Covers all five of the program management domains • Examines all sub domains in the Life Cycle domain
Process-Based Management Approach
Selected Contents:
• Explores the differences and similarities between program management principles included in the PMI® Body of Knowledge and the CMAA® (Construction Management Association of America)
Program Management Process Groups Initiation Process Planning Process Execution Process The Closure Process Catalog no. K16673, July 2013, 199 pp. ISBN: 978-1-4665-7504-2, $79.95 / £49.99 Also available as an eBook
Introduction Strategic Program Management Benefits Management Stakeholder Engagement Governance Program Management Life Cycle Initiating Planning Executing Monitoring and Controlling Closing Catalog no. K21191, June 2013, 544 pp. Soft Cover, ISBN: 978-1-4822-0208-3 $49.95 / £31.99 Also available as an eBook
36
Save when you order online at www.crcpress.com
Project Management Implementing Program Management
PMP® Exam Challenge! Sixth Edition J. LeRoy Ward, PMP, PgMP and Ginger Levin, PMP, PgMP ESI International, New York, New York, USA
Templates and Forms Aligned with the Standard for Program Management, Third Edition (2013) and Other Best Practices Ginger Levin Project Management Consultant, Lighthouse Point, Florida, USA
Allen R. Green Science Applications International Corporation, Frederick, Maryland, USA
Preparing for and passing the PMP exam is no small feat. Although the number of certified PMP®s continues at a phenomenal rate, the exam failure rate remains uncommonly high. PMP® Exam Challenge! is designed to help you pass the exam by giving you an easy-to-use, highly portable publication, containing key relevant topics you are certain to encounter on your exam. Featuring 660 practice questions, this sixth edition completely reflects the PMBOK® Guide, Fifth Edition and covers the guide’s ten knowledge areas. ®
• Reflects the PMBOK® Guide, Fifth Edition • Includes 660 practice test questions • Covers the newest knowledge area—Stakeholder Management Featuring an entirely new section on Program Stakeholder Managememt, the book uses a flash-card format to help readers drill through the essential points of the PMBOK Guide. The pages are tabbed so readers can go directly to the knowledge area they need to study. Each page has plenty of white space that can be used for notes. The answers lists the five project management process groups—Initiating, Planning, Executing, Monitoring and Controlling, and Closing. These references help readers answer questions that test their knowledge of when certain events or action take place during the project management life cycle. Catalog no. K20985, June 2013, 636 pp. Soft Cover, ISBN: 978-1-4665-9982-6 $49.95 / £31.99 Also available as an eBook
Based on PMI’s Standard for Program Management— Third Edition (2013) and other best practices, the updated edition of this bestselling reference provides a program management methodology consisting of reports, forms, templates, and documents. It includes identifiable documents referenced in the latest Standard for Program Management as well as other helpful ones omitted from prior editions. The authors have updated the templates and forms in this book to complement what is included in the Third Edition and to include what they feel are best practices for managing programs. • Provides a program management methodology consisting of reports, forms, templates, and documents • Deals with the full program management life cycle—pre-program preparation, program initiation, program set-up, delivery of program benefits, and closing phases—to support the documentation requirements for your programs • Includes templates that can be customized for each organization's unique requirements • Filled with best practices that complement PMI's Program Management Standard The book deals with the full program management life cycle—program definition, program benefits delivery, and program closure—to support the documentation requirements for your programs. The authors have updated the templates and forms in this book to complement what is included in the Third Edition and to include what they feel are best practices for managing programs. Catalog no. K20851, June 2013, 328 pp. ISBN: 978-1-4665-9771-6, $79.95 / £49.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
37
Project Management PMP® Exam Practice Test and Study Guide
PgMP® Exam Practice Test and Study Guide
Ninth Edition
Ginger Levin
Fourth Edition
J. LeRoy Ward, PMP, PgMP ESI International, New York, New York, USA
Ginger Levin Project Management Consultant, Lighthouse Point, Florida, USA
PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiplechoice practice questions in each of the ten knowledge areas and in the professional and social responsibilities domain. It presents a 200-question practice test that simulates the actual PMP exam, fully referenced answers keyed to the five project management process groups, and a study matrix to help readers key in on areas that require further study. • Updated to reflect the PMBOK® Guide, Fifth Edition • Presents more than 400 practice test questions with fully referenced answers • Covers the newest knowledge area: Stakeholder Management • Includes a study matrix to help readers key in on specific areas that require further study
Selected Contents: Acronyms Introduction Project Integration Management Project Scope Management Project Time Management Project Cost Management Project Quality Management Project Human Resource Management Project Communications Management Project Risk Management Project Procurement Management Project Stakeholder Management Practice Test References Answer Sheet Appendix: Study Matrix Answer Key Catalog no. K21206, June 2013, 536 pp. Soft Cover, ISBN: 978-1-4822-0224-3 $69.95 / £44.99 Also available as an eBook
38
Project Management Consultant, Lighthouse Point, Florida, USA
J. LeRoy Ward ESI International, New York, New York, USA
Up to date with the third edition of PMI’s Standard for Program Management, this is the most comprehensive resource available to help prepare readers for the PgMP® Exam. Updated with new and changed terminology, this edition incorporates the concepts from the five performance domains. The book features practical study hints, a list of major topics covered on the exam, and a bibliographic reference for further study. The two challenging, 170-question practice tests are available in the book and online so readers can retake the practice tests as many times necessary. • Reflects the third edition of PMI's Program Management Standard • Includes two challenging, 170-question practice tests that are available in the book and online • Supplies an insider's look at the questions, phrases, terminology, and sentence construction of the actual PgMP® exam • Provides study hints, a list of major topics covered on the exam, and multiple-choice practice questions for each domain • Includes a comprehensive answer key and a bibliographic reference for further study
Selected Contents: Introduction Strategic Program Management Initiating the Program Planning the Program Executing the Program Controlling the Program Closing the Program Benefits Management Stakeholder Management Governance Practice Test 1 Practice Test 2 References Catalog no. K21134, June 2013, 400 pp. Soft Cover, ISBN: 978-1-4822-0135-2 $69.95 / £44.99 Also available as an eBook
Save when you order online at www.crcpress.com
Project Management Business Analysis for Business Intelligence
Leading Effective Virtual Teams Overcoming Time and Distance to Achieve Exceptional Results Nancy M. Settle-Murphy “… I particularly enjoyed the practical tips that can be applied to almost any kind of virtual team. Nancy knows what works and shares it with us in a way that is both easy to read and apply. She covers the gamut, from building trust to cross-cultural tripwires, in a way that will work for virtual teams, whatever their makeup.” —Dr. Penny Pullan, Director, Making Projects Work Ltd.
• Explains how to influence without authority, motivate and galvanize a virtual team for top performance • Details how to blend asynchronous and synchronous communication tools to get the most out of any virtual team • Discusses how to build trust and cultivate relationships across a virtual team • Addresses how to navigate cross-cultural and generational differences in the absence of visual cues The book presents practical tips to help leaders engage and motivate their geographically dispersed project team members. The ideas in this book are based on Nancy Settle-Murphy’s decades of experience working as a change management consultant, facilitator, and trainer for project teams around the world. Designed to be read section by section in any order, this book shares approaches and techniques to help you address some of the toughest challenges virtual team leaders face. Catalog no. K15492, December 2012, 236 pp. Soft Cover, ISBN: 978-1-4665-5786-4 $49.95 / £31.99 Also available as an eBook
Bert Brijs Aligning your business intelligence (BI) infrastructure with your strategy process can help to enhance your organization's responsiveness to changing environments and create added value for investments in BI infrastructure and development. This book explains how to use business intelligence to improve your analysis activities and provides a framework for developing data models and solutions that fit your organization’s strategy. Offering the concepts, tools, and background required for success, the book details the infrastructure required for carrying out successful business intelligence activities. • Offers the concepts, tools, and background required for successful business intelligence projects • Explains the role of business intelligence in successful strategy implementation • Details the infrastructure required for carrying out business intelligence activities • Supplies tools to enhance the value of business analysis activities and planning business intelligence projects • Demonstrates how to use continuous improvement to create a strategic knowledge organization The book details a framework based on time-tested theories, empirical data, and the author’s experience analyzing strategic processes in dozens of organizations across a range of industries—including financial, logistics, food production, health, telecom, government, and retail. Providing you with the tools to achieve enduring success, the book can help your organization develop successful BI projects and finetune them to match the strategic decision making process in your organization. Catalog no. K12718, October 2012, 400 pp. ISBN: 978-1-4398-5834-9, $89.95 / £57.99 Also available as an eBook
For more information and complete contents, visit www.crcpress.com
39
Only on CRCPress.com
A groundbreaking web-based community that offers you access to the latest news, books, events, and videos of preeminent CRC Press authors. 4 Engage with esteemed authors in your subject area 4 Find out about the latest author videos, events, and speaking engagements 4 Discover new authors, their books, news, and videos 4 Link to all the online information, author blogs, and websites at www.crcpress.com/authors
Connect with CRC Featured Authors today. Visit crcpress.com/authors to check it out.
www.crcpress.com