CMMI Scampi Distilled


Book Description

Part of The SEI Series in Software Engineering, this book offers a concise andpractical guide to the standard CMMI appraisal method. This method is veryimportant, as it is used to determine an organization's capability and maturitylevels (which are often used as criteria in awarding government and defenseorientedbids). SCAMPI specifically stands for: The Standard CMMI AppraisalMethod for Process Improvement. These authors have considerable experiencein helping their organizations appraise their respective levels of maturity inrelation to the CMMI. In this handy new book, they impart their advice on notonly achieving an accurate assessment, but also what next steps need to betaken for further process improvement.




IT Governance: Policies and Procedures, 2020 Edition


Book Description

IT Governance: Policies & Procedures, 2020 Edition is the premier decision-making reference to help you to devise an information systems policy and procedure program uniquely tailored to the needs of your organization. Not only does it provide extensive sample policies, but this valuable resource gives you the information you need to develop useful and effective policies for your unique environment. IT Governance: Policies & Procedures provides fingertip access to the information you need on: Policy and planning Documentation Systems analysis and design And more! Previous Edition: IT Governance: Policies & Procedures, 2019 Edition ISBN 9781543802221




The IT4ITTM reference architecture, Version 2.0


Book Description

The Open Group IT4IT Reference Architecture, Version 2.0, an Open Group Standard, provides a vendor-neutral, technology-agnostic, and industry-agnostic reference architecture for managing the business of IT. The Open Group IT4IT Reference Architecture standard comprises a reference architecture and a value chain-based operating model. The IT Value Chain has four value streams supported by a reference architecture to drive efficiency and agility. The four value streams are: Strategy to Portfolio Request to Fulfill Requirement to Deploy Detect to Correct Each IT Value Stream is centered on a key aspect of the service model, the essential data objects (information model), and functional components (functional model) that support it. Together, the four value streams play a vital role in helping IT control the service model as it advances through its lifecycle. The IT4IT Reference Architecture: Provides prescriptive guidance on the specification of and interaction with a consistent service model backbone (common data model/context) Supports real-world use-cases driven by the Digital Economy (e.g., Cloud-sourcing, Agile, DevOps, and service brokering) Embraces and complements existing process frameworks and methodologies (e.g., ITIL®, CoBIT®, SAFe, and TOGAF®) by taking a data-focused implementation model perspective, essentially specifying an information model across the entire value chain The audience for this standard is: IT Professionals who are responsible for delivering services in a way that is flexible, traceable, and cost-effective IT Professionals / Practitioners who are focused on instrumenting the IT management landscape IT Leaders who are concerned about their operating model Enterprise Architects who are responsible for IT business transformation Topics covered include: An introduction to the standard and the purpose of the IT4IT work Key terminology of the standard An introduction for executives and others introducing the IT Value Chain and IT4IT Reference Architecture concepts IT4IT Core, which defines the structure of the IT4IT standard as well as the process and document structure used by the IT4IT standard The Strategy to Portfolio (S2P) Value Stream The Requirement to Deploy (R2D) Value Stream The Request to Fulfill (R2F) Value Stream The Detect to Correct (D2C) Value Stream Background information on the standard.




Data Governance


Book Description




The Complete Guide for CISA Examination Preparation


Book Description

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives, in-depth explanations of each topic, and accurate practice questions. Each chapter includes exam tips that highlight key exam information, hands-on exercises, a summary that serves as a quick review, and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference. Richard E. Cascarino, MBA, CIA, CISM, CFE, CRMA, is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa, Europe, the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa, was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA, and the Association of Certified Fraud Examiners, where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office, Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand, author of the book Internal Auditing: An Integrated Approach, now in its third edition. This book is extensively used as a university textbook worldwide. In addition, he is the author of the Auditor's Guide to IT Auditing, Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE, the Ultimate Resource.




Introduction to Software Process Improvement


Book Description

This textbook is a systematic guide to the steps in setting up a Capability Maturity Model Integration (CMMI) improvement initiative. Readers will learn the project management practices necessary to deliver high-quality software solutions to the customer on time and on budget. The text also highlights how software process improvement can achieve specific business goals to provide a tangible return on investment. Topics and features: supplies review questions, summaries and key topics for each chapter, as well as a glossary of acronyms; describes the CMMI model thoroughly, detailing the five maturity levels; provides a broad overview of software engineering; reviews the activities and teams required to set up a CMMI improvement initiative; examines in detail the implementation of CMMI in a typical organization at each of the maturity levels; investigates the various tools that support organizations in improving their software engineering maturity; discusses the SCAMPI appraisal methodology.




TOGAF® 9 Certified Study Guide - 2nd Edition


Book Description

The TOGAF 9 certification program is a knowledge-based certification program. It has two levels, leading to certification for TOGAF 9 Foundation and TOGAF 9 Certified, respectively. The purpose of certification to TOGAF 9 Certified is to provide validation that, in addition to the knowledge and comprehension of TOGAF 9 Foundation level, the Candidate is able to analyze and apply this knowledge. The learning objectives at this level therefore focus on application and analysis in addition to knowledge and comprehension. This Study Guide supports students in preparation for the TOGAF 9 Part 2 Examination, leading to TOGAF 9 Certified.




CMMI Implementation Guide


Book Description




CMMI Distilled


Book Description

This edition is especially appropriate for executives and managers who need to understand why process improvement is valuable, why CMMI is a tool of choice, and how to maximize the return on their efforts and investments.




The IT4ITTM Standard, Version 3.0


Book Description

This publication is the specification of The Open Group IT4IT Standard, Version 3.0, a standard of The Open Group. It describes a reference architecture that can be used to manage the business of Information Technology (IT) and the associated end-to-end lifecycle management of Digital Products. It is intended to provide a prescriptive Target Architecture and clear guidance for the transformation of existing technology management practices for a faster, scalable, automated, and practical approach to deploying product-based investment models and providing an unprecedented level of operational control and measurable value. This foundational IT4IT Reference Architecture is independent of specific technologies, vendors, organization structures, process models, and methodologies. It can be mapped to any existing technology landscape. It is flexible enough to accommodate the continuing evolution of operational and management paradigms for technology. It addresses every Digital Product lifecycle phase from investment decision-making to end-of-life. The IT4IT Standard addresses a critical gap in the Digital Transformation toolkit: the need for a unifying architectural model that describes and connects the capabilities, value streams, functions, and operational data needed to manage a Digital Product Portfolio at scale. The IT4IT Standard provides an approach to making digital investment decisions and managing digital outcomes that is particularly useful for: • C-level executives responsible for Digital Transformation, as a top-down view of digital value creation • Product Managers and Product Marketing Managers whose portfolios include significant digital content, as a way to integrate marketing priorities with product delivery practices • Governance, risk, and compliance practitioners, as a guide to controlling a modern digital landscape • Enterprise and IT Architects, as a template for IT tool rationalization and for governing end-to-end technology management architectures • Technology buyers, as the basis for Requests for Information (RFIs) and Requests for Proposals (RFPs) and as a template for evaluating product completeness • Consultants and assessors, as a guide for evaluating current practice against a well-defined standard • Technology vendors, as a guide for product design and customer integrations • Technical support staff, as a guide for automating and scaling up support services to deal with modern technology deployment velocity