Flylib.com
Strategies for Information Technology Governance
ISBN: 1591402840
EAN: 2147483647
Year: 2002
Pages: 182
Authors:
Wim Grembergen
BUY ON AMAZON
Section I - IT Governance Frameworks
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Section II - Performance Management as IT Governance Mechanism
Assessing Business-IT Alignment Maturity
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Section III - Other IT Governance Mechanisms
Managing IT Functions
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
Section IV - IT Governance in Action
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Strategies for Information Technology Governance
ISBN: 1591402840
EAN: 2147483647
Year: 2002
Pages: 182
Authors:
Wim Grembergen
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
The Spiral Model
Literature Review
Lessons Learned from OO Projects
Reliability, Availability, and Defect Rate
Establishing the Alignment Principle
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Legal, Regulations, Compliance, and Investigations
Appendix A Answers to Assessment Questions
Appendix F Security Control Catalog
Appendix G Control Baselines
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Layouts
Dialogs
Scales, Sliders, and Progress Bars
Other Important SWT Components
Drawing Diagrams with Draw2D
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Summary
Route Plan Configuration Process
Negotiating Device Security Mode
Cisco VT Advantage Overview
MySQL Clustering
Installing MySQL-Max
Adding Tables
Backup and Recovery
Indexes
B Management Commands
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Triggers
Indirect Privilege Escalation
Attacking Oracle PL/SQL Web Applications
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies