Inform-IT, Knowledge Center for Service Management, focuses on the development, promotion and distribution of knowledge in the field of IT (Service) Management. Its core business is developing IT Management books, conferences and knowledge portals. Over 70 different titles have been published under Inform-IT's editorial guidance, in up to 17 languages.
Inform-IT works with thousands of expert authors and reviewers from all over the world, and cooperates with member-based or not-for-profit organizations like itSMF, ISACA and EXIN.
This innovative book focuses primarily on the architecture of a service management environment followed by guidance on how to manage the restoration of services. Implementing incident management is a challenge and this book describes solutions to integrate this seamlessly within the structure of best practice frameworks.
Numerous organisations spend their energy and funding on implementing ITIL practices. Most of them spend their time reinventing a wheel that was already created many times before in previous ITIL expeditions. If you're facing this challenge, you'll be interested in avoiding excessive cost. Although plenty of external guidance is available in the form of ITIL consultancies, you'll need to have a decent idea of what to expect in the course of your own ITIL expedition before you go for it.
'Service Level Management and the Service Manager ' is the second book of a series of (initially) six books that provide background considerations, theory, instructions, and practical guidance for setting up organization structures in the context of improvement projects.
The introduction book to a series of (initially) six books that will provide background considerations, theory, instructions, and practical guidance for setting up organization structures in the context of improvement projects.
This new title, 'Information Security Economics' explores the economic aspects of information security, whilst explaining how best to work with them, in order to achieve an optimized ROI on security investments. It considers ways in which information security metrics can be utilized to support security initiatives, and how requirements can be prioritized by organizations, in order to maximize returns within a commercial environment which may have limited resources.