Certified Enterprise Architect All-in-One Exam Guide


Book Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This effective study guide offers comprehensive coverage of topics comprising the enterprise architecture body of knowledge. This unique resource provides detailed coverage and lays out actionable methodologies and best practices to create and maintain successful EA models, artifacts and building blocks. It helps prepare readers to take any of the various EA certification exams and academic courses in enterprise architecture. This highly effective self-study guide offers comprehensive coverage of all topics in the enterprise architecture body of knowledge. Written by a team of experienced academics, practitioners, and professionals, the book takes a holistic look at the practice of enterprise architecture. You will get actionable methodologies and best practices and learn how to develop, deploy, and maintain successful enterprise architecture models, artifacts, and building blocks. Designed to help you prepare for certification, the Certified Enterprise Architect All-in-One Exam Guide also serves as an essential on-the-job reference. Coverage includes: • Enterprise architecture foundation concepts • Planning the enterprise architecture • Enterprise architecture development, governance, and maintenance • Defense frameworks • Viewpoints and views • The Zachman Framework • The Open Group Architecture Framework (TOGAF) • The Common Approach to Federal Enterprise Architecture • FEAF2 • Comparison of frameworks • Case Study integrated throughout the text • And much more




Enterprise Architecture as Strategy


Book Description

Enterprise architecture defines a firm's needs for standardized tasks, job roles, systems, infrastructure, and data in core business processes. This book explains enterprise architecture's vital role in enabling - or constraining - the execution of business strategy. It provides frameworks, case examples, and more.




The Business Architecture Quick Guide: A Brief Guide for Gamechangers


Book Description

Maybe you heard someone mention business architecture in a passing conversation or in a planning meeting? Perhaps you've heard stories of a financial services company in Scandinavia, government agencies in the UK, a bank in the Netherlands, a global shipping company, or a major U.S. airline using business architecture to enact strategic change or drive business transformation. Or perhaps in-house strategy, transformation, planning, product, or customer experience teams have suggested you adopt or support in-house business architecture efforts. The business architecture drumbeat is steadily growing louder, yet you still cannot figure out what people are talking about. Well, the wait is over. The Business Architecture Quick Guide will help you sort through the noise and disinformation, focus on the benefits, and take the next steps. The Quick Guide has a singularly focused purpose: to demystify business architecture for those business professionals likely to benefit from it the most. The Quick Guide represents the collective experiences of a worldwide community of practice, courtesy of the Business Architecture Guild(R), and not just another opinion piece or the musings of a single individual. Look no further for the answers on business architecture; they are right here in this "little big book for game changers." The Quick Guide will point you to a wealth of additional resources that will enable you to take the next steps and begin to reap the benefits that other organizations are already achieving. Either way, you will no longer be left out of the discussion and ready to take action the next time the topic of business architecture enters the conversation.




DAMA-DMBOK


Book Description

Defining a set of guiding principles for data management and describing how these principles can be applied within data management functional areas; Providing a functional framework for the implementation of enterprise data management practices; including widely adopted practices, methods and techniques, functions, roles, deliverables and metrics; Establishing a common vocabulary for data management concepts and serving as the basis for best practices for data management professionals. DAMA-DMBOK2 provides data management and IT professionals, executives, knowledge workers, educators, and researchers with a framework to manage their data and mature their information infrastructure, based on these principles: Data is an asset with unique properties; The value of data can be and should be expressed in economic terms; Managing data means managing the quality of data; It takes metadata to manage data; It takes planning to manage data; Data management is cross-functional and requires a range of skills and expertise; Data management requires an enterprise perspective; Data management must account for a range of perspectives; Data management is data lifecycle management; Different types of data have different lifecycle requirements; Managing data includes managing risks associated with data; Data management requirements must drive information technology decisions; Effective data management requires leadership commitment.




The Cybersecurity Body of Knowledge


Book Description

The Cybersecurity Body of Knowledge explains the content, purpose, and use of eight knowledge areas that define the boundaries of the discipline of cybersecurity. The discussion focuses on, and is driven by, the essential concepts of each knowledge area that collectively capture the cybersecurity body of knowledge to provide a complete picture of the field. This book is based on a brand-new and up to this point unique, global initiative, known as CSEC2017, which was created and endorsed by ACM, IEEE-CS, AIS SIGSEC, and IFIP WG 11.8. This has practical relevance to every educator in the discipline of cybersecurity. Because the specifics of this body of knowledge cannot be imparted in a single text, the authors provide the necessary comprehensive overview. In essence, this is the entry-level survey of the comprehensive field of cybersecurity. It will serve as the roadmap for individuals to later drill down into a specific area of interest. This presentation is also explicitly designed to aid faculty members, administrators, CISOs, policy makers, and stakeholders involved with cybersecurity workforce development initiatives. The book is oriented toward practical application of a computing-based foundation, crosscutting concepts, and essential knowledge and skills of the cybersecurity discipline to meet workforce demands. Dan Shoemaker, PhD, is full professor, senior research scientist, and program director at the University of Detroit Mercy’s Center for Cyber Security and Intelligence Studies. Dan is a former chair of the Cybersecurity & Information Systems Department and has authored numerous books and journal articles focused on cybersecurity. Anne Kohnke, PhD, is an associate professor of cybersecurity and the principle investigator of the Center for Academic Excellence in Cyber Defence at the University of Detroit Mercy. Anne’s research is focused in cybersecurity, risk management, threat modeling, and mitigating attack vectors. Ken Sigler, MS, is a faculty member of the Computer Information Systems (CIS) program at the Auburn Hills campus of Oakland Community College in Michigan. Ken’s research is in the areas of software management, software assurance, and cybersecurity.




Enterprise Master Data Management


Book Description

The Only Complete Technical Primer for MDM Planners, Architects, and Implementers Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data, improve corresponding business processes, and maximize its value in SOA environments. Enterprise Master Data Management provides an authoritative, vendor-independent MDM technical reference for practitioners: architects, technical analysts, consultants, solution designers, and senior IT decisionmakers. Written by the IBM ® data management innovators who are pioneering MDM, this book systematically introduces MDM’s key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA. Drawing on their experience with cutting-edge projects, the authors introduce MDM patterns, blueprints, solutions, and best practices published nowhere else—everything you need to establish a consistent, manageable set of master data, and use it for competitive advantage. Coverage includes How MDM and SOA complement each other Using the MDM Reference Architecture to position and design MDM solutions within an enterprise Assessing the value and risks to master data and applying the right security controls Using PIM-MDM and CDI-MDM Solution Blueprints to address industry-specific information management challenges Explaining MDM patterns as enablers to accelerate consistent MDM deployments Incorporating MDM solutions into existing IT landscapes via MDM Integration Blueprints Leveraging master data as an enterprise asset—bringing people, processes, and technology together with MDM and data governance Best practices in MDM deployment, including data warehouse and SAP integration




Business Architecture


Book Description




Enterprise Architecture for Global Companies in a Digital IT Era


Book Description

This book investigates solutions incorporated by architecture boards in global enterprises to resolve issues and mitigate related architecture risks, while also proposing and implementing an adaptive integrated digital architecture framework (AIDAF) and related models and approaches/platforms, which can be applied in companies to promote IT strategies using cloud/mobile IT/digital IT. The book is divided into three main parts, the first of which (Chapters 1–2) addresses the background and motivation for AIDAF aligned with digital IT strategies. The second part (Chapter 3) provides an overview of strategic enterprise architecture (EA) frameworks for digital IT, elaborates on the essential elements of EA frameworks in the digital IT era, and advocates using AIDAF, models for architecture assessment/risk management, knowledge management on digital platforms. In turn, the third part (Chapters 4–7) demonstrates the application and benefits of AIDAF and related models, as shown in three case studies. “I found this book to be a very nice contribution to the EA community of practice. I can recommend this book as a textbook for digital IT strategists/practitioners, EA practitioners, students in universities and graduate schools.” (From the Foreword by Scott A. Bernard) “In this new age of the digital information society, it is necessary to advocate a new EA framework. This book provides state-of-the art knowledge and practices about EA frameworks beneficial for IT practitioners, IT strategists, CIO, IT architects, and even students. It serves as an introductory textbook for all who drive the information society in this era.”(From the Foreword by Jun Murai)




The Complete Business Process Handbook


Book Description

The Complete Business Process Handbook is the most comprehensive body of knowledge on business processes with revealing new research. Written as a practical guide for Executives, Practitioners, Managers and Students by the authorities that have shaped the way we think and work with process today. It stands out as a masterpiece, being part of the BPM bachelor and master degree curriculum at universities around the world, with revealing academic research and insight from the leaders in the market. This book provides everything you need to know about the processes and frameworks, methods, and approaches to implement BPM. Through real-world examples, best practices, LEADing practices and advice from experts, readers will understand how BPM works and how to best use it to their advantage. Cases from industry leaders and innovators show how early adopters of LEADing Practices improved their businesses by using BPM technology and methodology. As the first of three volumes, this book represents the most comprehensive body of knowledge published on business process. Following closely behind, the second volume uniquely bridges theory with how BPM is applied today with the most extensive information on extended BPM. The third volume will explore award winning real-life examples of leading business process practices and how it can be replaced to your advantage. Learn what Business Process is and how to get started Comprehensive historical process evolution In-depth look at the Process Anatomy, Semantics and Ontology Find out how to link Strategy to Operation with value driven BPM Uncover how to establish a way of Thinking, Working, Modelling and Implementation Explore comprehensive Frameworks, Methods and Approaches How to build BPM competencies and establish a Center of Excellence Discover how to apply Social BPM, Sustainable and Evidence based BPM Learn how Value & Performance Measurement and Management Learn how to roll-out and deploy process Explore how to enable Process Owners, Roles and Knowledge Workers Discover how to Process and Application Modelling Uncover Process Lifecycle, Maturity, Alignment and Continuous Improvement Practical continuous improvement with the way of Governance Future BPM trends that will affect business Explore the BPM Body of Knowledge




The DAMA Dictionary of Data Management


Book Description

A glossary of over 2,000 terms which provides a common data management vocabulary for IT and Business professionals, and is a companion to the DAMA Data Management Body of Knowledge (DAMA-DMBOK). Topics include: Analytics & Data Mining Architecture Artificial Intelligence Business Analysis DAMA & Professional Development Databases & Database Design Database Administration Data Governance & Stewardship Data Management Data Modeling Data Movement & Integration Data Quality Management Data Security Management Data Warehousing & Business Intelligence Document, Record & Content Management Finance & Accounting Geospatial Data Knowledge Management Marketing & Customer Relationship Management Meta-Data Management Multi-dimensional & OLAP Normalization Object-Orientation Parallel Database Processing Planning Process Management Project Management Reference & Master Data Management Semantic Modeling Software Development Standards Organizations Structured Query Language (SQL) XML Development