By Topic

IT Professional

Issue 3 • May-June 2009

Filter Results

Displaying Results 1 - 23 of 23
  • Front Cover

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (1838 KB)
    Freely Available from IEEE
  • IEEE Computer Society advertisement

    Publication Year: 2009, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (1032 KB)
    Freely Available from IEEE
  • IT Professional Masthead

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (2260 KB)
    Freely Available from IEEE
  • Is IT for Geeks Only?

    Publication Year: 2009, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (2792 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Computer Society Information

    Publication Year: 2009, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Virtual Service Grids: Integrating IT with Business Processes

    Publication Year: 2009, Page(s):7 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (929 KB) | HTML iconHTML

    The alignment of information technology and business has shifted significantly since computing's mainframe era. The high costs of mainframe technology meant that only the largest organizations could afford it, and applications were relatively few. Business was expected to adapt to the technology. This all changed in the 1990s. Industry's widespread adoption of PCs, especially Intel x86-based syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest Editor's Introduction: Cybersecurity in a Falling Economy

    Publication Year: 2009, Page(s):12 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    As organizations suffer through a declining economy, many will be forced to make security cutbacks they wouldn't ordinarily consider to be acceptable. IT leaders and managers making security cuts must ensure that their cyberdefense continues to meet organizational obligations to protect enterprise cyberspace and corporate assets. This special issue looks at the various trade-offs involved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyberattacks: Why, What, Who, and How

    Publication Year: 2009, Page(s):14 - 21
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (904 KB) | HTML iconHTML

    As computers, information systems, and networking have become increasingly ubiquitous, cybersecurity has become even more critical for the continuity of basic business operations. This article analyzes the challenges associated with cybersecurity, including attack patterns and trends. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Ancient Fortress to Modern Cyberdefense

    Publication Year: 2009, Page(s):22 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1346 KB) | HTML iconHTML

    Establishing an effective enterprise cyberdefense mechanism is conceptually similar to building a fortress city in ancient times. The authors describe the parallels by comparing observation towers, fortified walls, gates, alarms, guards, and cyberdefense. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Security of Enterprise VoIP Networks

    Publication Year: 2009, Page(s):30 - 36
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3550 KB) | HTML iconHTML

    The deployment of unified communications in enterprises has become increasingly common in the past few years, but as organizations invest resources to ensure quality of service and meet delivery schedules, they often overlook security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IT Professional Call for Papers

    Publication Year: 2009, Page(s): 37
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Useful Cybersecurity Metrics

    Publication Year: 2009, Page(s):38 - 45
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (943 KB) | HTML iconHTML

    Measuring cybersecurity is difficult, but other disciplines can offer important lessons and techniques for building a system that can help test hypotheses about system security. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Critical Characteristics of Metasystems: Toward Defining Metasystems' Governance Mechanism

    Publication Year: 2009, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    To effectively design, integrate, and understand the functional operations of metasystems, researchers and practitioners need a standard definition and common understanding of metasystems as an extended system-of-systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Certification: Who Dares?

    Publication Year: 2009, Page(s):50 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1056 KB) | HTML iconHTML

    The authors discuss the pros and cons of IT certification by exploring why so much attention is focused on it, as well as the different kinds of certifications that are available, current changes in requirements, and where IT professionals can get certified. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for Papers

    Publication Year: 2009, Page(s): 53
    Request permission for commercial reuse | PDF file iconPDF (8207 KB)
    Freely Available from IEEE
  • Professional Essence

    Publication Year: 2009, Page(s):54 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1481 KB) | HTML iconHTML

    The IT profession might need to commit itself to protecting the public interest, and members of the profession might need to accept this ethical obligation as a requirement of belonging to the profession. But the key to being accepted as a professional by the public is to consistently demonstrate your trustworthy nature, and that requires a commitment to acting with trustworthy intentions and work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Insecure IT: Practical Risk Assessment

    Publication Year: 2009, Page(s):57 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (307 KB) | HTML iconHTML

    Risk assessment involves gathering and evaluating risk information so that enterprise stakeholders can make mitigation decisions. Once we identify the risks, we can rank the probability of each one's occurrence and its impact on the organization. Some risks are more likely to occur than others, and different risks can affect an organization in different ways, so a practical risk assessment can hel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Cyberspace: Answering the Call for Intelligent Action

    Publication Year: 2009, Page(s):60 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    As information technology permeates all societal layers and its use crosses increasingly national boundaries, information security has become of paramount importance. Understanding what motivates information security is part of the hard work in planning the mechanisms that will assure it. Arguably, ubiquitous networking—for a wide range of personal, commerce, enterprise, and national purpo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • People Smart

    Publication Year: 2009, Page(s):64 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    To truly succeed in our careers, we must go beyond just being accepted and knowing how to interface—we need people to like us and be willing to help us, and we need to build a successful network of professional contacts. To achieve these goals, we shouldn't outwardly appear to be aggressive, even if we're aggressive in our objective—rather, we should be generous and magnanimous. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Never Let a Serious Crisis Go to Waste

    Publication Year: 2009, Page(s): 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB) | HTML iconHTML

    Right now CEOs and board members are under the microscope. The typical CIO, usually struggling for higher visibility and true C-level status, is now in the enviable position of being just outside the scope of C-level witch hunts. At present, the CIO is a functionary—the plumber-in-chief! Previously, we would have cringed at these characterizations, but when there are water shortages, the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE CS Press advertisement

    Publication Year: 2009, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (1760 KB)
    Freely Available from IEEE
  • Computing Now advertisement

    Publication Year: 2009, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (9098 KB)
    Freely Available from IEEE

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services