This practical guide will help librarians
develop, budget for, and implement makerspaces;write grant proposals for funding;and understand the mindset behind the maker movement in order to meet patron needs.
Makerspaces: A Practical Guide for Librarians also includes useful case studies, descriptions of equipment and new technologies, and models for planning and assessing projects.
This book invites you to accompany new CIO Jim Barton to better understand the role of IT in your organization. You'll see Jim struggle through a challenging first year, handling (and fumbling) situations that, although fictional, are based on true events.
You can read this book from beginning to end, or treat is as a series of cases. You can also skip around to address your most pressing needs. For example, need to learn about crisis management and security? Read chapters 10-12. You can formulate your own responses to a CIO's obstacles by reading the authors' regular "Reflection" questions.
You'll turn to this book many times as you face IT-related issues in your own career.
“Long live the King” hailed Entertainment Weekly upon publication of Stephen King’s On Writing. Part memoir, part master class by one of the bestselling authors of all time, this superb volume is a revealing and practical view of the writer’s craft, comprising the basic tools of the trade every writer must have. King’s advice is grounded in his vivid memories from childhood through his emergence as a writer, from his struggling early career to his widely reported, near-fatal accident in 1999—and how the inextricable link between writing and living spurred his recovery. Brilliantly structured, friendly and inspiring, On Writing will empower and entertain everyone who reads it—fans, writers, and anyone who loves a great story well told.
This textbook provides a comprehensive introduction to forecasting methods and presents enough information about each method for readers to use them sensibly.
The book is organized into 7 chapters that cover hacking tools such as Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. PowerPoint slides are available for use in class.
This book is an ideal reference for security consultants, beginning InfoSec professionals, and students.Named a 2011 Best Hacking and Pen Testing Book by InfoSec ReviewsEach chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.
Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It considers relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Starting with a definition of cyber warfare, the book’s 15 chapters discuss the following topics: the cyberspace battlefield; cyber doctrine; cyber warriors; logical, physical, and psychological weapons; computer network exploitation; computer network attack and defense; non-state actors in computer network operations; legal system impacts; ethics in cyber warfare; cyberspace challenges; and the future of cyber war.
This book is a valuable resource to those involved in cyber warfare activities, including policymakers, penetration testers, security professionals, network and systems administrators, and college instructors. The information provided on cyber tactics and attacks can also be used to assist in developing improved and more efficient procedures and technical defenses. Managers will find the text useful in improving the overall risk management strategies for their organizations.Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacksDives deeply into relevant technical and factual information from an insider's point of viewDetails the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
Implement and maintain a fully integrated, SOA-based ERP framework across your entire corporation. JD Edwards EnterpriseOne: The Complete Reference explains how to install and administer JD Edwards EnterpriseOne, store BI information in data marts and warehouses, manage servers and portals, and develop customized applications and kernel processes. You'll also learn how to create and distribute packages, use the security workbench, optimize performance, and apply the latest JD Edwards EnterpriseOne updates and tools releases.Set up and configure the JD Edwards EnterpriseOne applications suite Work with Oracle, SQL Server, DB2, MSDE, and SSE data sources Define JD Edwards EnterpriseOne path codes, task views, and environments Deploy the object configuration manager and solution explorer Build client and server packages, media objects, and data warehouses Secure JD Edwards EnterpriseOne using LDAP, single sign-on, and third-party tools Administer portals and Web sites using JD Edwards EnterpriseOne's HTML server and server manager Troubleshoot and tune your system using the performance workbench
Covers Release 8.12
Implementing an enterprise-wide Configuration Management Database (CMDB) is one of the most influential actions an IT organization can take to improve service delivery and bridge the gap between technology and the business. With a well-designed CMDB in place, companies are better positioned to manage and optimize IT infrastructure, applications, and services; automate more IT management tasks; and restrain burgeoning costs. Now, there’s an objective, vendor-independent guide to making a CMDB work in your organization. The CMDB Imperative presents a start-to-finish implementation methodology that works and describes how the CMDB is shifting to the superior Configuration Management System (CMS).
Expert CMDB industry analyst Glenn O’Donnell and leading-edge architect and practitioner Carlos Casanova first review the drivers behind a CMDB and the technical, economic, cultural, and political obstacles to success. Drawing on the experiences of hundreds of organizations, they present indispensable guidance on architecting and customizing CMDB solutions to your specific environment. They’ll guide you through planning, implementation, transitioning into production, day-to-day operation and maintenance, and much more. Coverage includes
Defining the tasks and activities associated with configuration management Understanding the CMDB’s role in ITIL and the relationship between CMDBs and ITIL v3’s CMS Building software models that accurately represent each entity in your IT environment Ensuring information accuracy via change management and automated discovery Understanding the state of the CMDB market and selling the CMDB within your organization Creating federated CMDB architectures that successfully balance autonomy with centralized control Planning a deployment strategy that sets appropriate priorities and reflects a realistic view of your organization’s maturity Integrating systems and leveraging established and emerging standards Previewing the future of the CMDB/CMS and how it will be impacted by key trends such as virtualization, SOA, mobility, convergence, and “flexi-sourcing”
After introducing Windows Server 2008 R2, the book explains its installation and configuration processes followed by its networking. It also examines different features, such as the active directory, internet information services 7.5, Hyper-V, and PowerShell V2. It discusses securing Windows Server 2008 R2 files and its print services, remote desktop services, high-availability and recovery features, and monitoring and troubleshooting; in addition, their delta changes are discussed in the final chapter. The book also explores the features that influence both Windows Server 2008 R2 and Windows 7. These features allow the server operating system to work with Windows 7. One feature is the BranchCache, which offers users who open files across a Wide Area Network a better end-user experience by caching copy in the branch office when a document or intranet Web site is opened for the first time. Another feature is DirectAccess, which is the new remote connectivity solution for Windows networks.Features information on how to plan, deploy, and administrate Windows Server 2008 R2 using best practice guidanceProvides in-depth coverage of Hyper-V, DirectAccess, Remote Desktop Services, Active Directory, and BranchCacheIncludes Delta Changes to allow experienced administrators to quickly gain insight to changes between Windows Server 2008 and Windows Server 2008 R2
Using the Association of College and Research Libraries' Information Literacy Competency Standards for Higher Education as a framework, this much-needed sourcebook covers all the major facets of the information literacy process. For students, it is a ready-to-use guide that explains what information literacy is, why it is so important, and how to put it to use in both print and online research. For teachers, it is a helpful classroom resource that can serve as the basis for an information literacy course, a supplemental text, or a handy reference for research in any subject.
Gain the skills and knowledge required to implement and support healthcare IT (HIT) systems in various clinical and healthcare business settings. Healthcare Information Technology Exam Guide for CompTIA Healthcare IT Technician and HIT Pro Certifications prepares IT professionals to transition into HIT with coverage of topics ranging from health data standards to project management.
This valuable resource also serves as a study tool for the CompTIA Healthcare IT Technician exam (Exam HIT-001) and for any of the six Healthcare Information Technology Professional (HIT Pro) exams offered by the Office of the National Coordinator for Health Information Technology. You’ll get complete coverage of all official objectives for these challenging exams. Chapter summaries highlight what you’ve learned and chapter review questions test your knowledge of specific topics.
Coverage includes:Healthcare Organizational Behavior Healthcare Regulatory Requirements Healthcare Business Operations Healthcare IT Security, Privacy, and Confidentiality Healthcare IT Operations Electronic content includes:
Complete MasterExam practice testing engine, featuring seven practice exams, one for each exam: CompTIA Healthcare IT Technician HIT Pro Clinician/Practitioner Consultant HIT Pro Implementation Manager HIT Pro Implementation Support Specialist HIT Pro Practice Workflow & Information Management Redesign Specialist HIT Pro Technical/Software Support Staff HIT Pro Trainer
Plus:Detailed answers with explanations Score Report performance assessment tool
Predictive analytics and Data Mining techniques covered: Exploratory Data Analysis, Visualization, Decision trees, Rule induction, k-Nearest Neighbors, Naïve Bayesian, Artificial Neural Networks, Support Vector machines, Ensemble models, Bagging, Boosting, Random Forests, Linear regression, Logistic regression, Association analysis using Apriori and FP Growth, K-Means clustering, Density based clustering, Self Organizing Maps, Text Mining, Time series forecasting, Anomaly detection and Feature selection. Implementation files can be downloaded from the book companion site at www.LearnPredictiveAnalytics.comDemystifies data mining concepts with easy to understand languageShows how to get up and running fast with 20 commonly used powerful techniques for predictive analysisExplains the process of using open source RapidMiner toolsDiscusses a simple 5 step process for implementing algorithms that can be used for performing predictive analyticsIncludes practical use cases and examples
Degunking Windows 7 is the fast, affordable way to keep your computer running quickly and efficiently. Over time, Windows PCs can slow down due to unnecessary programs, files, errors, and other "gunk." This book's proven Degunking 12-Step Program shows you how to organize your hard disk, load and run only the programs and processes you need, and restore the speed, responsiveness, and reliability your PC had when it was brand new. This do-it-yourself guide puts the practical information the expert PC technicians know directly into your hands, saving you lots of time and money!
Degunking Windows 7 shows you how to:Remove unwanted data and programs Organize your file system Unclutter your desktop, start menu, and taskbar Optimize your hard drive Tune up and secure Internet Explorer Organize your email Secure your computer Clean up and secure your network Fix problems with media Optimize syncing Resolve lingering software and hardware issues Back up precious files
In this completely revised and updated second edition, Renni Browne and Dave King teach you, the writer, how to apply the editing techniques they have developed to your own work. Chapters on dialogue, exposition, point of view, interior monologue, and other techniques take you through the same processes an expert editor would go through to perfect your manuscript. Each point is illustrated with examples, many drawn from the hundreds of books Browne and King have edited.
Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods.
Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.Provides a holistic approach to OSINT and Web recon, showing you how to fit all the data together into actionable intelligenceFocuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many moreCovers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gatherIncludes hands-on technical examples and case studies, as well as a Python chapter that shows you how to create your own information-gathering tools and modify existing APIs
The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.Learn about information security without wading through a huge textbookCovers both theoretical and practical aspects of information securityProvides a broad view of the information security field in a concise mannerAll-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues
The first three chapters provide an overview of the Guided Inquiry design framework, identify the eight phases of the Guided Inquiry process, summarize the research that grounds Guided Inquiry, and describe the five tools of inquiry that are essential to implementation. The following chapters detail the eight phases in the Guided Inquiry design process, providing examples at all levels from pre-K through 12th grade and concluding with recommendations for building Guided Inquiry in your school.
The book is for pre-K–12 teachers, school librarians, and principals who are interested in and actively designing an inquiry approach to curricular learning that incorporates a wide range of resources from the library, the Internet, and the community. Staff of community resources, museum educators, and public librarians will also find the book useful for achieving student learning goals.
This book examines the impact of new technologies on children's experiences of books and libraries, and demonstrates how librarians can adapt to new technologies and integrate library services into the lives of today's children. From Boardbook to Facebook: Children's Services in an Interactive Age draws on current research to illuminate how children's use of media has changed in recent years and suggests ways in which new technologies can be integrated into library services now and in the future.
Aspiring digital businesses need overall IT agility, not just development team agility. In Agile IT Organization Design , IT management consultant and ThoughtWorks veteran Sriram Narayan shows how to infuse agility throughout your organization. Drawing on more than fifteen years’ experience working with enterprise clients in IT-intensive industries, he introduces an agile approach to “Business–IT Effectiveness” that is as practical as it is valuable.
The author shows how structural, political, operational, and cultural facets of organization design influence overall IT agility—and how you can promote better collaboration across diverse functions, from sales and marketing to product development, and engineering to IT operations. Through real examples, he helps you evaluate and improve organization designs that enhance autonomy, mastery, and purpose: the key ingredients for a highly motivated workforce.
You’ll find “close range” coverage of team design, accountability, alignment, project finance, tooling, metrics, organizational norms, communication, and culture. For each, you’ll gain a deeper understanding of where your organization stands, and clear direction for making improvements. Ready to optimize the performance of your IT organization or digital business? Here are practical solutions for the long term, and for right now.Govern for value over predictability Organize for responsiveness, not lowest cost Clarify accountability for outcomes and for decisions along the way Strengthen the alignment of autonomous teams Move beyond project teams to capability teams Break down tool-induced silos Choose financial practices that are free of harmful side effects Create and retain great teams despite today’s “talent crunch” Reform metrics to promote (not prevent) agility Evolve culture through improvements to structure, practices, and leadership—and careful, deliberate interventions
Get peak performance from your SAP ERP infrastructure using the detailed implementation, maintenance, and support information in this comprehensive resource. SAP Basis Administration Handbook, NetWeaver Edition delivers integrated management strategies covering both ABAP and Java stacks. Discover how to deploy components, accurately size throughout, configure Oracle databases, back up your system, and repair performance problems. Career trends, certification requirements, and marketable SAP Basis skills are also discussed in this practical guide.
Essential Skills for SAP Professionals:Plan, prepare, and install SAP NetWeaver Application Server Set up, configure, and troubleshoot Java and ABAP stacks Establish server infrastructure and efficiently balance workloads Incorporate transport management and software logistics Resolve performance issues and startup problems Access SAP support infrastructure through SAP Service Marketplace Manage and back up Oracle databases using BR*TOOLS Perform system copies, stack upgrades, and OS/DB migrations
Entity Information Life Cycle for Big Datawalks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This book explains big data’s impact on MDM and the critical role of entity information management system (EIMS) in successful MDM. Expert authors Dr. John R. Talburt and Dr. Yinle Zhou provide a thorough background in the principles of managing the entity information life cycle and provide practical tips and techniques for implementing an EIMS, strategies for exploiting distributed processing to handle big data for EIMS, and examples from real applications. Additional material on the theory of EIIM and methods for assessing and evaluating EIMS performance also make this book appropriate for use as a textbook in courses on entity and identity management, data management, customer relationship management (CRM), and related topics.Explains the business value and impact of entity information management system (EIMS) and directly addresses the problem of EIMS design and operation, a critical issue organizations face when implementing MDM systemsOffers practical guidance to help you design and build an EIM system that will successfully handle big dataDetails how to measure and evaluate entity integrity in MDM systems and explains the principles and processes that comprise EIMProvides an understanding of features and functions an EIM system should have that will assist in evaluating commercial EIM systemsIncludes chapter review questions, exercises, tips, and free downloads of demonstrations that use the OYSTER open source EIM system Executable code (Java .jar files), control scripts, and synthetic input data illustrate various aspects of CSRUD life cycle such as identity capture, identity update, and assertions
Archive Stories brings together ethnographies of the archival world, most of which are written by historians. Some contributors recount their own experiences. One offers a moving reflection on how the relative wealth and prestige of Western researchers can gain them entry to collections such as Uzbekistan’s newly formed Central State Archive, which severely limits the access of Uzbek researchers. Others explore the genealogies of specific archives, from one of the most influential archival institutions in the modern West, the Archives nationales in Paris, to the significant archives of the Bakunin family in Russia, which were saved largely through the efforts of one family member. Still others explore the impact of current events on the analysis of particular archives. A contributor tells of researching the 1976 Soweto riots in the politically charged atmosphere of the early 1990s, just as apartheid in South Africa was coming to an end. A number of the essays question what counts as an archive—and what counts as history—as they consider oral histories, cyberspace, fiction, and plans for streets and buildings that were never built, for histories that never materialized.
Contributors. Tony Ballantyne, Marilyn Booth, Antoinette Burton, Ann Curthoys, Peter Fritzsche, Durba Ghosh, Laura Mayhall, Jennifer S. Milligan, Kathryn J. Oberdeck, Adele Perry, Helena Pohlandt-McCormick, John Randolph, Craig Robertson, Horacio N. Roque Ramírez, Jeff Sahadeo, Reneé Sentilles
This book is a guide for the savvy manager who wants to capitalize on this technological revolution. It begins with a high-level example of how an average person might interact with a service-oriented architecture, and progresses to more detail, discussing technical forces driving adoption and how to manage technology, culture and personnel issues that can arise during adoption. An extensive reference section provides quick access to commonly used terms and concepts.Broad, non-technical explanation of a technical topic for managers at all levelsOnly web services book to cover data management and software engineering perspectives; excellent resource for all members of IT teamsProvides a set of leadership principles and suggested applications for using this technology
The second edition features two new chapters on digital curation and cooperative collection development. Additional updates include helpful information on infographics, more budgeting formulas, and a section on core collections, as well as content covering eBooks, electronic storage, and digital rights management. Chapters discuss subjects such as marketing the collection to patrons, book repair, and handling censorship issues when collections are challenged.
Cyber security is not just a technical subject that can be resolved like any other IT-related problem—it is a ‘risk’ that can be mitigated by creating awareness and getting the right combination of technology and practices based on careful analysis. This book combines insights on cybersecurity from academic research, media reports, vendor reports, practical consultation and research experience.
The first section of the book discusses motivation and types of cybercrimes that can take place. The second lists the major types of threats that users might encounter. The third discusses the impact, trend and role of the government in combating cybercrime. The fourth section of the book tells the readers about ways to protect themselves and secure their data/information stored in computers and the cyberspace. It concludes by offering suggestions for building a secure cyber environment.
Enter Plot Versus Character. This hands-on guide to creating a well-rounded novel embraces both of these crucial story components. You'll learn to: Create layered characters by considering personality traits, natural attributes, and backgrounds Develop your character's emotional journey and tie it to your plot's inciting incident Construct a three-act story structure that can complement and sustain your character arc Expose character backstory in a manner that accentuates plot points Seamlessly intertwine plot and character to create a compelling page-turner filled with characters to whom readers can't help but relateAnd much more Filled with helpful examples and friendly instruction, Plot Versus Character takes the guesswork out of creating great fiction by giving you the tools you need to inject life into your characters and momentum into your plots.
By some estimates, 40 percent of IT budgets are devoted to integration. However, most organizations still attack integration on a project-by-project basis, causing unnecessary expense, waste, risk, and delay. They struggle with integration “hairballs”: complex point-to-point information exchanges that are expensive to maintain, difficult to change, and unpredictable in operation.
The solution is Lean Integration. This book demonstrates how to use proven “lean” techniques to take control over the entire integration process. John Schmidt and David Lyle show how to establish “integration factories” that leverage the powerful benefits of repeatability and continuous improvement across every integration project you undertake.
Drawing on their immense experience, Schmidt and Lyle bring together best practices; solid management principles; and specific, measurable actions for streamlining integration development and maintenance.
Whether you’re an IT manager, project leader, architect, analyst, or developer, this book will help you systematically improve the way you integrate—adding value that is both substantial and sustainable.
Coverage includesTreating integration as a business strategy and implementing management disciplines that systematically address its people, process, policy, and technology dimensions Providing maximum business flexibility and supporting rapid change without compromising stability, quality, control, or efficiency Applying improvements incrementally without “Boiling the Ocean” Automating processes so you can deliver IT solutions faster–while avoiding the pitfalls of automation Building in both data and integration quality up front, rather than inspecting quality in later More than a dozen in-depth case studies that show how real organizations are applying Lean Integration practices and the lessons they’ve learned
Visit integrationfactory.com for additional resources, including more case studies, best practices, templates, software demos, and reference links, plus a direct connection to lean integration practitioners worldwide.
In Make a Scene, author Jordan E. Rosenfeld takes you through the fundamentals of strong scene construction and explains how other essential fiction-writing techniques, such as character, plot, and dramatic tension, must function within the framework of individual scenes in order to provide substance and structure to the overall story. You'll learn how to: Craft an opening scene that hooks readers and foreshadows supporting scenes Develop various scene types - from the suspenseful to the dramatic to the contemplative - that are distinct and layered Tailor character and plot around specific scene types to better convey the nuances of your storyline Create resonating climactic and final scenes that stay with readers long after they've finished your work