Kirjojen hintavertailu. Mukana 12 137 715 kirjaa ja 12 kauppaa.

Kirjailija

Heru Susanto

Kirjat ja teokset yhdessä paikassa: 6 kirjaa, julkaisuja vuosilta 2018-2021, suosituimpien joukossa Information Security Management Systems. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

6 kirjaa

Kirjojen julkaisuhaarukka 2018-2021.

Information Security Management Systems

Information Security Management Systems

Heru Susanto; Mohammad Nabil Almunawar

Apple Academic Press Inc.
2021
nidottu
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001.The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.
Business Process Reengineering

Business Process Reengineering

Heru Susanto; Fang-Yie Leu; Chin Kang Chen

Apple Academic Press Inc.
2021
nidottu
This volume shows how ICT (information and communications technology) can play the role of a driver of business process reengineering (BPR). ICT can aid in enabling improvement in BPR activity cycles as it provides many components that enhance performance that can lead to competitive advantages. IT can interface with BPR to improve business processes in terms of communication, inventory management, data management, management information systems, customer relationship management, computer-aided design, computer-aided manufacturing (CAM), and computer-aided engineering. This volume explores these issues in depth.
The Emerging Technology of Big Data

The Emerging Technology of Big Data

Heru Susanto; Fang-Yie Leu; Chin Kang Chen

Apple Academic Press Inc.
2021
nidottu
Big Data is now highly regarded and accepted as a useful tool to help organizations manage their data and information effectively and efficiently. This new volume, The Emerging Technology of Big Data: Its Impact as a Tool for ICT Development, looks at the new technology that has emerged to meet the growing need and demand and studies the impact of Big Data in several areas of today’s society, including social media, business process re-engineering, science, e-learning, higher education, business intelligence, and green computing. In today’s modern society, information system (IS) through Big Data contributes to the success of organizations because it provides a solid foundation for increasing both efficiency and productivity. Many business organizations and educational institutions realize that compliance with Big Data will affect their prospects for success. Everyday, the amount of data collected from digital tools grows tremendously. As the amount of data increases, the use of IS becomes more and more essential.The book looks at how large datasets and analytics have slowly crept into the world of education and discusses methods of teaching and learning and the collection of student-learning data.The final chapter of the book considers the environmental impacts of ICT and emphasizes green ICT awareness as a corporate strategy through information systems. The global ICT industry accounts for approximately 2 percent of global carbon dioxide (CO2) emissions, and the manufacture, shipping, and disposal of ICT equipment also contributes environmentally. This chapter addresses these issues. The information provided here will be valuable information for education professionals, businesses, faculty, scientists and researchers, and others.
The Emerging Technology of Big Data

The Emerging Technology of Big Data

Heru Susanto; Fang-Yie Leu; Chin Kang Chen

Apple Academic Press Inc.
2019
sidottu
Big Data is now highly regarded and accepted as a useful tool to help organizations manage their data and information effectively and efficiently. This new volume, The Emerging Technology of Big Data: Its Impact as a Tool for ICT Development, looks at the new technology that has emerged to meet the growing need and demand and studies the impact of Big Data in several areas of today’s society, including social media, business process re-engineering, science, e-learning, higher education, business intelligence, and green computing. In today’s modern society, information system (IS) through Big Data contributes to the success of organizations because it provides a solid foundation for increasing both efficiency and productivity. Many business organizations and educational institutions realize that compliance with Big Data will affect their prospects for success. Everyday, the amount of data collected from digital tools grows tremendously. As the amount of data increases, the use of IS becomes more and more essential.The book looks at how large datasets and analytics have slowly crept into the world of education and discusses methods of teaching and learning and the collection of student-learning data.The final chapter of the book considers the environmental impacts of ICT and emphasizes green ICT awareness as a corporate strategy through information systems. The global ICT industry accounts for approximately 2 percent of global carbon dioxide (CO2) emissions, and the manufacture, shipping, and disposal of ICT equipment also contributes environmentally. This chapter addresses these issues. The information provided here will be valuable information for education professionals, businesses, faculty, scientists and researchers, and others.
Business Process Reengineering

Business Process Reengineering

Heru Susanto; Fang-Yie Leu; Chin Kang Chen

Apple Academic Press Inc.
2019
sidottu
This volume shows how ICT (information and communications technology) can play the role of a driver of business process reengineering (BPR). ICT can aid in enabling improvement in BPR activity cycles as it provides many components that enhance performance that can lead to competitive advantages. IT can interface with BPR to improve business processes in terms of communication, inventory management, data management, management information systems, customer relationship management, computer-aided design, computer-aided manufacturing (CAM), and computer-aided engineering. This volume explores these issues in depth.
Information Security Management Systems

Information Security Management Systems

Heru Susanto; Mohammad Nabil Almunawar

Apple Academic Press Inc.
2018
sidottu
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001.The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.