Skip to Main Content
USA
Select regional store:
Learn for less: Save 25% on high-quality instructor-led and self-paced foundation training | Find out more

We're sorry but that page cannot be found

Please use the links above to find what you were looking for.

You may not have been able to visit your page because of:

   1. An out-of-date bookmark/favourite
   2. A search engine that has an out-of-date listing
   3. A mistyped address
   4. You have no access to this page
   5. The requested resource was not found.
   6. An error has occurred while processing your request.

Are you looking for:

21st Century Chinese Cyberwarfare
Overview

Understand China's cyberwarfare

21st Century Chinese Cyberwarfare presents the salient information regarding the use of cyberwarfare doctrine by the People's Republic of China to promote its own interests and enforce its will on other nations. It draws from a combination of business, cultural, historical, and linguistic sources, as well as the author's personal experience, to attempt to explain China to the uninitiated.

The author argues that the threat of Chinese cyberwarfare can no longer be ignored, that it is a clear and present danger to organizations of all shapes and sizes, and that it will be economically, societally and culturally damaging for the nations that are targeted.


Product overview

Those that will benefit from the book include: law enforcement agencies, international information security professionals, IT professionals, military professionals, government policy makers and corporate managers. In particular, the book discusses:

  • Statistics of the Chinese cyber threat
  • Chinese government cyber initiatives
  • Understanding the key motivators for government-sponsored cyberwarfare
  • Commercial enterprises as a cyber threat vector
  • Nationalistic threats of Chinese hackers

Contents

  1. The Chinese Cyberthreat
  2. Evolution of Chinese Cyberwarfare
  3. Chinese Unrestricted Warfare
  4. Principles of Warfare – West versus East
  5. Nature of Information Warfare
  6. Chinese Cyberwarfare Doctrines
  7. China's SIGINT Capabilities
  8. Chinese IW Capabilities
  9. The Chinese IW Organizational Structure
  10. Chinese Commercial Enterprises
  11. Commercial Objectives of Chinese Cyberattacks
  12. Chinese Civilian Hackers
  13. The Chinese Cyberthreat: Conclusions
  • Appendix A: China & the Internet – A history
  • Appendix B: Chinese Cyberactivism in the Spotlight
  • Appendix C: China's Informization Campaign
  • Appendix D: General Wang Pufeng's Challenge of Information Warfare
  • Appendix E: Chinese Hacker Website Resources
  • Appendix F: Huawei's Statement on Establishing a Global Cybersecurity Assurance System
About the author

Lieutenant Colonel William Hagestad

Lieutenant Colonel William Hagestad is recognized internationally as an expert on the Chinese People's Liberation Army and government information warfare. He advises international intelligence organizations, military flag officers, and multi-national commercial enterprises on their internal IT security governance and external security policies. He currently speaks both domestically and internationally on the Chinese cyber threat.

50 Top IT Project Management Challenges
Overview

A summary of the challenges facing today’s IT project manager

Discussions on project management forums highlight many of the challenges facing a project manager during the course of a project. Unclear requirements, scope creep, and undefined roles are well-trodden issues that can derail a project. Other challenges are less obvious, often more subtle, but equally destructive.


Facing up to the challenges

This book offers a focused and concise summary of 50 challenges facing today’s IT project manager. The authors draw on years of practical experience (rather than classroom theory) to outline these challenges and offer useful tips and advice on how to deal with them.


Challenge and response

Readers of this book will be better equipped to respond to key project management challenges, including

  • Building the team—getting the right resources, matching skills/knowledge, defining roles and responsibilities.
  • Project scope—clarifying assumptions, avoiding ambiguity, getting the time/cost estimates right.
  • Politics—communicating with management and stakeholders, dealing with conflict, handling interference and micro-managing.
  • Risk awareness—identifying inside/outside influences, recognizing inbound and outbound dependencies.
  • Time management—using the right planning tools, balancing work versus meetings.
  • Failure—handling the blame game, protecting the team, rescuing the project.

This book condenses into a handy summary much of the information and advice that can be found in project management-related books and discussion forums. It is an ideal reference for anyone involved in IT project management, from professional service organizations (PSO) and project management offices (PMO) through to active project managers and studying graduates.  

About the author

Premanand Doraiswamy

Premanand Doraiswamy has over 14 years’ experience working in IT project management with Fortune 500 companies in various industries and is the author of IT Project Management – 30 Steps to Success, also published by IT Governance.

Premi Shiv

Premi Shiv is a quality assurance specialist with 7 years’ experience in IT processes and management solutions. With an optimistic approach and organizational skills, she has carved a niche in quality assurance.

Agile Productivity Unleashed, Second Edition
Overview

Be part of the Agile revolution

In this new edition of her award-winning book, Jamie Lynn Cooke reveals the secrets of the Agile methodologies that have revolutionized the way that many of the world’s most successful companies operate. Written for business professionals and managers, the book explains the core principles of Agile, shows why these approaches work, and demonstrates how to use Agile to significantly increase productivity, quality, and customer satisfaction in any industry.


Benefits of Agile for your organization:

  • Proven methods for meeting every project deadline
  • More accurate status reporting with substantially less paperwork
  • A highly responsive adaptive management framework with minimal overheads
  • Greater staff motivation, innovation, and value creation
  • Significantly more efficient use of limited resources and time
  • Strategies for leveraging internal and external changes in the organization, including changing market conditions
  • Better customer relationships, more compelling product development and higher quality outputs through direct stakeholder engagement
  • More effective use of available budgets to deliver real productivity gains across a range of business activities.

The key business value of 12 Agile Principles explained

Agile Productivity Unleashed presents the range of proven Agile methods, including Scrum®, Kanban, Feature Driven Development (FDD), and the Dynamic Systems Development Method® (DSDM®) in clear business language. The author then devotes a chapter to explaining each of the 12 Agile Principles that make these approaches consistently successful and details how to use these methods to tackle the core challenges faced by every organization.


Will it work for me?

The book concludes by presenting an in-depth case study that compares Agile with traditional approaches for achieving three common business objectives, followed by step-by-step guidelines to make Agile work for your organization, and a range of resources for further reading.


Contents

  1. Agile in a Nutshell;
  2. Why is Agile So Effective?
  3. Why Don't More Organizations Use Agile?
  4. Agile Sounds Good, But...
  5. Responsive Planning
  6. Business-value-driven Work
  7. Hands-on Business Outputs
  8. Real-time Customer Feedback
  9. Immovable Deadlines
  10. Management by Self-motivation
  11. "Just-in-time" Communication
  12. Immediate Status Tracking
  13. Waste Management
  14. Constantly Measurable Quality
  15. Rearview Mirror Checking
  16. Continuous Improvement
  17. Selecting Agile Approaches That Best Meet Your Needs
  18. Introducing Agile Within Your Organization
  19. Using Agile Tools
  20. Expanding the Use of Agile in Your Organization
About the author

Jamie Lynn Cooke

Jamie Lynn Cooke has 24 years of experience as a senior business analyst and solutions consultant, working with more than 130 public and private sector organizations throughout Australia, Canada, and the United States. She has been working hands-on with Agile approaches since 2003.

Agile - An Executive guide, Second edition
Overview

The true power of Agile methods is not technology; it is business value generation.

Use Agile methods to turn your IT challenges into high-value returns

All too often, IT solutions are plagued by budget overruns, missed deadlines, low-quality outputs, and dissatisfied users. Agile methods are proven, common-sense approaches for substantially increasing the relevance, quality, flexibility, and bottom-line business value of your software solutions.


Quantify and measure the benefits that Agile methods can deliver to your organization.

Agile methodologies such as Scrum, DSDM, FDD, Lean, XP, and Kanban are proven approaches for applying the finite resources of an organization to deliver high business-value software solutions on time and within allocated budgets.

These methodologies protect organizations from wasting their IT budgets by replacing large upfront financial commitments with incremental investment based on the ongoing business value of the delivered software. They encourage ongoing collaboration with key stakeholders, empower staff to regularly deliver fully functional and fully tested capabilities, and ensure that the IT solutions delivered are responsive to ongoing organizational and market changes.


Product overview

Read this guide and:

  • Understand the ten core business benefits of Agile and how they can significantly improve your organization:
  • At the heart of Agile methods are ten core business benefits that enable organizations to maximize their IT investments, including better risk management, ongoing control of budget expenditure, better alignment with business requirements, and substantially higher quality IT solutions. Agile: An Executive Guide details each of these benefits from a strategic senior management perspective and identifies which of the most popular Agile methods do (and do not) deliver these benefits.

  • Identify which Agile methods align with the specific needs of your organization and your projects:
  • Agile: An Executive Guide provides you with tools to assess your organizational culture, structure, and dynamic in order to determine whether Agile methods are suitable to your specific needs. Plus, it provides you with the tools to select those Agile methods that are the best fit for your organization and your projects.

  • Get the essential information you need to successfully implement Agile within your organization:
  • Agile: An Executive Guide is full of practical advice, including detailed guidelines to help you choose the right kick-off point for Agile within your organization, avoid common traps, monitor and measure your investment, and broaden the use of Agile methods into other areas of your organization. It includes step-by-step guidelines, interactive tools, and targeted questionnaires to help you and your staff successfully implement these methods.

Agile: An Executive Guide describes Agile methods in clear business language written specifically for professionals. It will help you make realistic business-driven decisions on whether Agile methods are appropriate for your organization, whether you are looking to reduce your IT overheads, provide better software solutions to your clients, or have more control over your IT expenditures. This guide provides practical, proven ways to introduce, incorporate, and leverage Agile methods to maximize your business returns.

Agile methods have been helping organizations turn their IT overheads into high-value returns for over 20 years. Buy this pocket guide today and turn your IT budgets into real, measurable, high-value results for your organization.

About the author

Jamie Lynn Cooke

Jamie Lynn Cooke has 25 years of experience as a senior business analyst, project manager, and solutions consultant, working with over 130 public and private sector organizations throughout Australia, Canada, and the United States.

Jamie has been working hands-on with Agile methods since 2003 and has researched hundreds of books and articles on Agile topics. She is a signatory to the Agile Manifesto, has attended numerous Agile seminars, and has worked with prominent consultants to promote Agile methods to numerous organizations worldwide.

She is also a well-regarded speaker on both business and technology topics, most recently presenting on topics such as Getting Management and Customer Support for Using Agile and When is Agile Not the Answer? at the Business Process Modelling World Conference in Brisbane, Australia and at the AgileCanberra professional forums.

She is the author of Agile Productivity Unleashed: Proven Approaches for Achieving Real Productivity Gains in Any Organization, a book written specifically to explain Agile methods in non-technical business terms to managers and executives outside of the IT industry; Everything you want to know about Agile: How to get Agile results in a less-than-Agile organization, which gives readers strategies for aligning Agile work within the reporting, budgeting, staffing and governance constraints of their organization; and The Power of the Agile Business Analyst: 30 surprising ways a business analyst can add value to your Agile development team, which details 30 core activities that Agile business analysts can undertake to ensure that Agile development teams deliver the highest possible business value solutions for the organization.

An Introduction to Hacking & Crimeware - A Pocket Guide
Overview

Defend your business, protect your livelihood, safeguard your future.

Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits to create malware are now readily available to anyone wishing to defraud and do damage. For your business to survive and thrive, it is vital to stay informed about the threats and the risks, and arm yourself against them. 

"An Introduction to Hacking and Crimeware by Victoria Loewengart should be a mandatory read for those professionals in cyber security - both in the public and private sectors. The information is valuable, well researched, timely and provides actionable steps to counter these threats"

- Fred Bowditch, Columbus Ohio Police - Retired Lt - Homeland Security, Bowditch Consulting, LLC


Fighting back

In this pocket guide, the author:

  • Defines exactly what crimeware is – both intentional and unintentional – and gives specific, up-to-date examples to help you identify the risks and protect your business
  • Explores the increasing use of COTS tools as hacking tools, exposing the enemy’s tactics gives practical suggestions as to how you can fight back
  • Provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business
About the author

Victoria Loewengart

Victoria Loewengart is a partner and co-founder of two organisations: AKOTA Technologies (www.akotatech.com) and Technology and Business Insider (www.insidertalk.net). She has more than 25 years' experience in cyberspace development, management and exploration. For much of her career, Victoria has worked in support of military and intelligence agencies, which is where she became fascinated with all aspects of cybersecurity and intelligence technologies, and she has conducted extensive research in this area.

top
This website uses cookies. View our cookie policy
SAVE 25% ON
FOUNDATION
TRAINING
Loading...