By Topic

IT Professional

Issue 4 • July-Aug. 2010

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (719 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2010, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • [Masthead]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2010, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (1006 KB)
    Freely Available from IEEE
  • A Strategy for Successful Consulting

    Publication Year: 2010, Page(s):4 - 6
    Request permission for commercial reuse | PDF file iconPDF (1034 KB) | HTML iconHTML
    Freely Available from IEEE
  • Web-Application Security: From Reactive to Proactive

    Publication Year: 2010, Page(s):7 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Here's a sobering thought for all managers responsible for Web applications: Without proactive consideration for an application's security, attackers can bypass nearly all lower-layer security controls simply by using the application in a way its developers didn't envision. Learn how to address vulnerabilities proactively and early on to avoid the devastating consequences of a successful attack. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lies—Damn Lies—and the Internet

    Publication Year: 2010, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    A symposium paper's results show that even with a strong warning about possible deceptions, people erred on the side of trusting those sending them information. Why? Is this another strange psychological effect of computer-mediated communications? No, but this "truth bias" is ethically important for IT professionals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systems Engineering as a Literate Behavior

    Publication Year: 2010, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (714 KB) | HTML iconHTML

    The recent emphasis on concepts dealing with knowledge management brings an interesting paradox to bear. Networked system federations reinforce growing globalization and nonlinear relationships. Given this, there's a mandate to move away from static architectural constructs toward a nondeterministic, multidisciplinary approach to systems design. The operational concept of a "living ontology" can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction: Cybersecurity

    Publication Year: 2010, Page(s):18 - 19
    Request permission for commercial reuse | PDF file iconPDF (680 KB) | HTML iconHTML
    Freely Available from IEEE
  • Anatomy of an Intrusion

    Publication Year: 2010, Page(s):20 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (709 KB) | HTML iconHTML

    This insider's look at a real, sustained attack against a major, multinational corporation offers lessons learned about how to recognize an attack early, how to respond, and what to do to prevent future attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybersecurity 
  • The Information Assurance Practices of Cloud Computing Vendors

    Publication Year: 2010, Page(s):29 - 37
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1108 KB) | HTML iconHTML

    Cloud computing has fostered many concerns about security, privacy, and business integrity. How do information assurance practices differ based on a cloud vendor's service offering, amount of online traffic, and company size? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion Detection for Grid and Cloud Computing

    Publication Year: 2010, Page(s):38 - 43
    Cited by:  Papers (69)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1057 KB) | HTML iconHTML

    Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. The Grid and Cloud Computing Intrusion Detection System integrates knowledge and behavior analysis to detect intrusions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for RFID Deployment in Supply Chains

    Publication Year: 2010, Page(s):44 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (884 KB) | HTML iconHTML

    The proposed framework shows how the granularity of tagging and deployment scope affect RFID implementation, helping managers identify RFID benefits and barriers and align deployment with their company's business strategy and return-on-investment goals. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vulnerability Trends: Measuring Progress

    Publication Year: 2010, Page(s):51 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (454 KB) | HTML iconHTML

    We analyzed data from the National Vulnerability Database (NVD). Designed and operated by the National Institute of Standards and Technology (NIST) with support from the Department of Homeland Security, the NVD provides fine-grained search capabilities of all publicly reported software vulnerabilities since 1997-a total of 41,810 vulnerabilities for more than 20,000 products. Frequently, a single ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Job-Interview Smart

    Publication Year: 2010, Page(s):54 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    The most important marketing event for careerbased individuals is the job interview. To help identify what it takes to have a successful interview, I emailed a friend of mine who's a senior executive (a division president). This person gets a job offer after practically every interview. He told me that his success stems from his eagerness to get the job, educational background and professional exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nexialism and the Law of Unintended Consequences

    Publication Year: 2010, Page(s):58 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2189 KB) | HTML iconHTML

    What do broken windows, merit systems, and cattle prods have to do with new processes and compliance rules? Can the laws of unintended consequences be used as an advantage? Find out as this nexialist explores the interconnectedness of things. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • COG vs. PPT: Models for Organizational Change

    Publication Year: 2010, Page(s):64 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (612 KB) | HTML iconHTML

    Organizations who have typically attempted to effect strategic change through initiatives aimed at people, processes, or technology are discovering that more meaningful and lasting change is achieved through focus on culture, organization, and governance. IT, as the "enabler," has a unique view across and through the enterprise and can provide the best input to executive leadership on opportunitie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement - Back cover]

    Publication Year: 2010, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Advertisement - Back cover]

    Publication Year: 2010, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services