Interpreting the CMMI (R)


Book Description

Written by experienced process improvement professionals who have developed and implemented systems in organizations around the world, Interpreting the CMMI®: A Process Improvement Approach provides you with specific techniques for performing process improvement using the CMMI® and the family of CMM models. Kulpa and Johnson describe the fundamental concepts of the CMMI® model - goals, practices, architecture, and definitions - in everyday language, give real-world examples, and provide a structured approach for implementing the concepts of the CMMI® into any organization. They walk you through the myriad charts and graphs involved in statistical process control and offer recommendations for which tools to use. The book covers roles and responsibilities, people issues, how to generate meaningful documentation, how to overcome resistance to change, and how to track the success of your efforts. It provides examples of plans, policies, processes, procedures, and team charters. The appendices include matrices summarizing the different assessment techniques that have now been approved by the SEI for use, "pros and cons" associated with this model, some of the myths that have arisen from the marketing of the CMMI® effort, and forms and templates. The book comes with a CD-ROM that contains forms and templates that can be downloaded and customized. The authors distill the knowledge gained in their combined 60 years of experience in project management, software engineering, systems engineering, metrics, quality assurance, configuration management, training, documentation, process improvement, and team building. Whether you are new to process improvement or an experienced professional, Interpreting the CMMI®: A Process Improvement Approach saves you time wasted on false starts, false promises by marketers, and failed deadlines.




CMMI for Development


Book Description

CMMI® for Development (CMMI-DEV) describes best practices for the development and maintenance of products and services across their lifecycle. By integrating essential bodies of knowledge, CMMI-DEV provides a single, comprehensive framework for organizations to assess their development and maintenance processes and improve performance. Already widely adopted throughout the world for disciplined, high-quality engineering, CMMI-DEV Version 1.3 now accommodates other modern approaches as well, including the use of Agile methods, Lean Six Sigma, and architecture-centric development. CMMI® for Development, Third Edition, is the definitive reference for CMMI-DEV Version 1.3. The authors have revised their tips, hints, and cross-references, which appear in the margins of the book, to help you better understand, apply, and find information about the content of each process area. The book includes new and updated perspectives on CMMI-DEV in which people influential in the model’s creation, development, and transition share brief but valuable insights. It also features four new case studies and five contributed essays with practical advice for adopting and using CMMI-DEV. This book is an essential resource–whether you are new to CMMI-DEV or are familiar with an earlier version–if you need to know about, evaluate, or put the latest version of the model into practice. The book is divided into three parts. Part One offers the broad view of CMMI-DEV, beginning with basic concepts of process improvement. It introduces the process areas, their components, and their relationships to each other. It describes effective paths to the adoption and use of CMMI-DEV for process improvement and benchmarking, all illuminated with fresh case studies and helpful essays. Part Two, the bulk of the book, details the generic goals and practices and the twenty-two process areas now comprising CMMI-DEV. The process areas are organized alphabetically by acronym for easy reference. Each process area includes goals, best practices, and examples. Part Three contains several useful resources, including CMMI-DEV-related references, acronym definitions, a glossary of terms, and an index.




Investigator's Guide to Steganography


Book Description

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable reference source for the tools and techniques of steganography. The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future. It is an informative and entertaining resource that effectively communicates a general understanding of this complex field.




Official (ISC)2 Guide to the CISSP Exam


Book Description

Candidates for the CISSP exam can now go directly to the source for study materials that are indispensable in achieving certification. The Official (ISC)2 Guide to the CISSP Exam is derived from the actual CBK review course created and administered by the non-profit security consortium (ISC)2. In addition to being an invaluable study guide, this book is detailed enough to serve as an authoritative information security resource. Both of the guide's co-authors are CISSPs, and the entire text has been reviewed and approved by Hal Tipton, Co-Founder and Past President of ISSA and Co-Founder of (ISC)2. The ten subject areas included, each a section from the Common Body of Knowledge (CBK), have been reviewed by multiple CISSPs, all of whom are recognized leaders in their fields. A CISSP certification garners significant respect, signifying that the recipient has demonstrated a higher standard of knowledge, proficiency, and ethics. This book ensures that a student is fully prepared to face the exam's rigorous criteria. It is crafted to match the overall theme of the exam, which emphasizes a general, solutions-oriented knowledge of security that organizations want.




The Complete Project Management Office Handbook


Book Description

Today's project managers find themselves in the dual roles of technical expert and business leader. As project management has evolved, the need has emerged for an organizational entity to manage complexities and ensure alignment with business interests. A project management office (PMO) coordinates technical and business facets of project management and achieves the goals of oversight, control, and support within the project management environment. The Complete Project Management Office Handbook identifies the PMO as the essential business integrator of the people, processes, and tools that manage or influence project performance. This book details how the PMO applies professional project management practices and successfully integrates business interests with project goals, regardless of whether the scope of the PMO is limited to managing specific projects or expanded to the level of a full business unit. People at all levels of the project and business spectrum will benefit from this volume. The Handbook focuses on how to establish PMO functionality to meet the requirements of project stakeholders. It presents 20 pertinent PMO function models, providing guidance for developing PMO operating capability that is applicable to any organization. It also presents these functions relative to five stages of progressive PMO development along a competency continuum, demonstrating potential PMO growth from simple project control up through its alignment within a strategic business framework.




The Hands-On Project Office


Book Description

Economic pressures have forced IT executives to demonstrate the immediate and calculable ROI of new technology deployments. Unfortunately, existing IT service delivery often drifts without serious thought as to how process improvements could lead to higher performance and customer satisfaction. The Hands-On Project Office: Guaranteeing ROI




The Hacker's Handbook


Book Description

This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration.




Software Metrics


Book Description

The modern field of software metrics emerged from the computer modeling and "statistical thinking" services of the 1980s. As the field evolved, metrics programs were integrated with project management, and metrics grew to be a major tool in the managerial decision-making process of software companies. Now practitioners in the software industry have




Organizational Change and Information Systems


Book Description

This book examines a range of issues emerging from the interaction of Information Technologies and organizational systems. It contains a collection of research papers focusing on themes of growing interest in the field of Information Systems, Organization Studies, and Management. The book offers a multidisciplinary view on Information Systems aiming to disseminate academic knowledge. It might be particularly relevant to IT practitioners such as information systems managers, business managers and IT consultants. The volume is divided into six sections, each one focusing on a specific theme. The content of each section is based on a selection of the best papers (original double blind peer reviewed contributions) presented at the annual conference of the Italian chapter of AIS, which has been held in Rome, Italy in September 2012.​




A Practical Approach to WBEM/CIM Management


Book Description

System architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management (WBEM) and its Component Information Model (CIM) provide the architecture, language, interfaces,