0%

Book Description

Need-to-know Technologies for a Successful Future provides the necessary knowledge you must have to succeed in your career. It is meant to introduce you to the terms and technologies that you need to know to be successful in business and jobs related to technology. This unusual book was designed to teach a motivated reader about hundreds of technologies and business processes that are important today if you want to succeed. Its goal is to give you a broad understanding of an amazing array of topics. This book is a preparation for life in business today. It’s not an encyclopedia, but it is arranged to make digesting this information as efficient and effective as possible.

It caters to two audiences: those who need to know the basics of technology and business to get a high paying job and those who need to know about technology to do their job more effectively, especially as managers. It is not too deep, but covers a broad spectrum of content that you may need to know. As such, it is a starting point for more investigation if a specific area is of interest. It is the perfect book for someone planning to become a programmer or IT specialist who does not yet have the proper background. For managers, it addresses the topics you need to know to talk intelligently to your IT staff and programmers, to vendors and to designers. You will learn the basics of hundreds of technologies that impact business today. If you are just looking to begin or change a career or going to college and you want a broad understanding or what can be expected of you when you are faced with getting a job or will want to learn at school, then that is the role of this book.

As people have turned to the internet as their primary source of information, this has led to major gaps in the knowledge of workers at all levels. You have to know what you need to know to be able to learn what you need to know. If you know specifically what you are looking for and are not too worried about detail, then searching online or watching YouTube videos can be a quick solution. But, if you want to learn to program, go into any technical profession or learn what you need to know to be a manager today, then the internet is a poor solution. We are inefficient time-wasting learners and will burn massive amounts of time searching the net for piecemeal information. Need-to-know Technologies for a Successful Future is the solution to this problem.

Jim Keogh, an assistant professor at New York University and a faculty member at Saint Peter’s University in Jersey City, New Jersey, as well as a former faculty member and chair of the e-commerce track of study at Columbia University, delves into the technological knowledge you must have to get a job or advance in your career including understanding computer technology, artificial intelligence, the Cloud, and new horizons in integrated computer technology.

.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. Contents
  6. Chapter 1: Talking Intelligently About Technology
    1. More than Companies and Industries
    2. Make Your Life Easier
    3. From Idea to Reality
    4. Finer Details of Your Idea
    5. The Business Case
    6. The Project
    7. Project Management
    8. The Project Team
      1. Virtual Project Teams
      2. Shared Values
      3. Relationship Capital
      4. The Project Sponsor and the Steering Committee
    9. The Project Plan
      1. Project Phases, Milestones, and Deliverables
      2. Work Package: Tasks and Subtasks
      3. Sequencing Tasks
      4. Duration
      5. The Schedule
      6. Resources
      7. The Resource List
      8. Resource Usage
    10. Cost to Bring an Idea to Reality
    11. Tools to Manage Development
    12. Change Management
    13. Risk and Managing Risk
    14. Your Idea Is Delivered
    15. Simple Project: No Need for Complex Project Management
      1. The Focus Board
      2. The Scrum
      3. Sprint
      4. Daily Scrum
      5. Backlog Grooming
      6. The Project Team
    16. Extremely Quick, Changing Needs
      1. Rapid Planning
    17. The Design Process: Sketch the Idea
    18. Pseudo Code
    19. Object Oriented Design and Programming
    20. Data Capture
  7. Chapter 2: Talking Intelligently About Communication Networks
    1. The Neighborhood of Networks
    2. Converting the Message
    3. Catching a Wave
    4. Analog and Digital Waves
    5. At the Speed of Light
    6. From the Keyboard to the Communications Network
    7. Protocols
    8. Packets
    9. A Closer Look at Communication Networks
    10. Network Addresses
    11. The Internet
    12. Web Server
    13. A Behind-the-Scenes Look at Email
      1. SMTP
      2. POP3
      3. Internet Mail Access Protocol Server
    14. Attachment
    15. The Intranet
    16. Wi-Fi
    17. Cell Phone Technology
    18. Transmission
    19. Virtual Private Network (VPN)
    20. Network Administration
    21. Network Operating System
    22. Network Monitoring
  8. Chapter 3: Talking Intelligently About Computers
    1. Larger Computers
    2. A Box of Switches
    3. Building Blocks of a Computer
      1. The Central Processing Unit (CPU)
      2. The Process Control Block
      3. Memory Management
      4. Device Management
      5. Measuring the Processor
      6. (Kind of) Doing More Than One Thing at the Same Time
      7. How the Processor Makes Decisions
    4. Memory
      1. The RAM Divide
      2. Types of RAM
      3. Types of ROM
      4. Video Memory
      5. Inside a Memory Chip
      6. Memory Errors: Few and Far Between
    5. BIOS and Starting the Computer
      1. Changing BIOS Options
    6. The Operating System
      1. Behind the Scenes of Running a Program
      2. Interrupts
    7. The Keyboard
    8. The Mouse
    9. Touchscreens
    10. Permanent Secondary Storage
      1. Saving Data to a Disk
      2. Important Measurements of a Disk Drive
      3. Deleting a File
      4. Disk Fragmentation
      5. Compact Disc (CD) and Digital Optical Disc (DVD)
      6. Flash Storage
    11. Monitors
      1. Inside Look at LCD Monitors
      2. Landscape, Portrait, or Multiple Monitors
  9. Chapter 4: About Computer Applications
    1. Application Architecture
      1. Tier Architecture
    2. Inside an Application
    3. From Pseudo Code to a Program
      1. High-Level Programming Languages
      2. Breaking Down a Program into Parts
      3. Function at Work
      4. Decisions, Decisions, Decisions
      5. Feeling Loopy
    4. Sharing Parts of Programs
      1. The Tool Box: Integrated Development Environment
    5. A GUI Program
    6. Web Applications
      1. Cascading Style Sheets (CSS)
      2. JavaScript
    7. Mobile Apps
      1. Building an App
      2. Creating a Dynamic Webpage
    8. Testing the Application
  10. Chapter 5: Data and Databases
    1. Storing Data
      1. Memory and Disk
    2. Developing a Database Application
      1. More About Structured Data
    3. Database Management System (DBMS)
    4. Data Modeling
    5. Relational Database
      1. The Relational Database Advantage
      2. Referential Integrity
      3. Relational Database Design
      4. Normalization
      5. Index
    6. Structured Query Language (SQL)
      1. SQL Basics
      2. Creating a Table
      3. Automatically Validating Data
      4. Modifying the Database
      5. Creating an Index
      6. Insert Data
      7. Pattern Matching
      8. Searching for Ranges
      9. Changing Values
      10. Deleting a Row
    7. Calculating Values in a Column
      1. Remove Duplicates
    8. Organizing Data
    9. Joining Together Tables
      1. Writing SQL
  11. Chapter 6: Talking Intelligently About Cybersecurity
    1. Challenges of Cybersecurity
    2. Cybersecurity Audit
      1. Database Access Points
    3. Physical Access
      1. Biometrics
      2. Handwriting
      3. Hands and Fingers
      4. Voice Prints
      5. Iris Scanning
      6. Fingerprints
      7. Veins
      8. Facial
      9. Password
      10. Access Rights
      11. Disabling Services
    4. Proxy Server
      1. Demilitarized Zone (DMZ)
    5. Firewall
      1. Firewall Controls Traffic Flow
      2. Configuring a Firewall
      3. Breaking Through the Firewall
    6. Encryption
      1. Classes of Information and the Need For Protection
      2. Categories of Encryption
      3. Digital Certificates, SSL and TLS
      4. Hash Value
      5. Cyclic Redundancy Check and Checksum
    7. Wireless Network Security
      1. Bluetooth Security
    8. Hacking
      1. Computer Viruses
      2. Inside a Computer Virus
      3. Rootkit
      4. Computer Virus Protection
      5. Macro Virus
      6. Keylogger
      7. Denial of Service
    9. Wi-Fi Access Points
      1. Identity Theft
      2. Cookie Theft
      3. Network Sniffing
      4. Detecting a Hacker
    10. Mobile Computing Device
  12. Chapter 7: Risk Management and Disaster Recovery
    1. Disaster
    2. Risk Assessment
      1. Disaster-Based Risk Assessment
      2. Asset-Based Risk Assessment
      3. Business Impact Analysis
      4. Legacy Systems
      5. Points of Failure
      6. Recovery Point Objective (RPO) and Recovery Time Objective (RTO)
      7. Data Synchronization Point
      8. Unseen Fail Points
      9. Disaster Recovery
      10. Disaster Recovery Team
      11. Disaster Recovery Plan
      12. Elements of a Disaster Recovery Plan
      13. Assumptions
      14. Risk Tolerance
      15. Risk Management
      16. Detail Analysis Is Critical
      17. Low-Level Focus
      18. Disaster Recovery Options
      19. Service Level of Agreement
    3. Disaster Recovery Operations
      1. Emergency Operations Center (EOC)
      2. Downtime Procedures
      3. Contact Lists
      4. Disaster Drills
  13. Chapter 8: Vendor Negotiations and Management
    1. Procurement
      1. Procurement Process
      2. Finding a Vendor
      3. Contacting Vendors
      4. The Proposal
      5. Risks of Procurement
    2. Negotiation
      1. Preparing for Negotiations
      2. Negotiation Strategy
      3. Value
      4. Do the Math
      5. Payment
      6. General Contractor
      7. Face-to-Face Negotiation
      8. Negotiating Terms
      9. Terminate Negotiation
    3. Conflict Resolution
      1. Fact Finder, Mediator, and Arbitrator
      2. Suing
      3. The List
      4. Stages of Adoption
    4. Contract
      1. Elements of a Contract
      2. Breach of Contract
      3. Industry Standard
      4. Contract Interpretation
      5. The Uniform Commercial Code (UCC) in the US
      6. United Nations Convention on Contracts for the International Sales of Goods (CISG)
      7. Warranty
      8. Remedies
      9. Modifying a Contract
      10. Memorandum of Understanding
      11. Contract Termination
    5. Working the Contract
      1. Reasonableness
      2. Penalty Clause and Performance Incentives
      3. The Contract Manager
      4. Service-Level Agreement
  14. Chapter 9: The Importance of Cloud Computing
    1. It Can Rain Too
    2. Governmental Access
    3. The Cloud and Data Science
  15. The Cloud Services
  16. The Private Cloud
  17. The Public Cloud
  18. Hybrid Clouds
  19. Why Implement a Cloud?
  20. Why Not Use the Cloud?
    1. Mitigating Risk
  21. The Cloud Life Cycle
  22. Cloud Architecture
    1. Serverless Computing
    2. DevOps
  23. The DevOps Maturity Model
  24. Compliance
  25. Cloud Security
    1. Levels of Security
  26. Chapter 10: Decision Support Systems, Data Analysis, and Big Data
    1. The Decision Process
      1. Business Intelligence
    2. Data and Business Analytics
    3. Technology Supports the Decision Maker
      1. Simon’s Decision-Making Process
      2. Business Reporting
      3. Performance Dashboard
    4. Models and How Models Are Used to Help Make Decisions
      1. Mathematical Models
      2. Certainty and Uncertainty
      3. Decision Tree
      4. Search
      5. Simulation Model
      6. Automated Decision Systems and Expert Systems
    5. Knowledge Management and Collaborative Systems
    6. Data Warehousing and Data Mining
    7. Text Analytics, Text Mining, and Sentiment Analysis
    8. Web Analytics, Web Mining, and Social Analytics
    9. Big Data and Analytics
  27. Chapter 11: Forensic Computing and How People Can Be Tracked
    1. Protecting Your Computing Device
    2. The Legal Environment
      1. Criminal Trial
      2. Civil Trial
      3. Decisions and Appeals
      4. Evidence
    3. A Computer Forensics Investigation
      1. Types of Computer Forensics Investigations
      2. Tools of Computer Forensics
      3. Legal Consequences of Computer Forensics
    4. Conducting a Computer Forensics Investigation
    5. Preserving Data Using Write Blockers
    6. Hashing
      1. Hexadecimal Level of Investigation
    7. Offset: Locating Data
    8. Mounting: Hiding Data
      1. Bit Shifting
      2. Bit Flipping
      3. Live Data Acquisition
      4. Remote Acquisition
      5. Deleted Data
    9. Anti-Forensics Tools
    10. Cell Phones
  28. Appendix A: Information Technology Auditing
    1. The Information Technology Audit Process
    2. Auditing Technology
    3. Controls
    4. COBIT
    5. The Audit Charter
      1. The Audit Committee
    6. Preplanning the Audit
      1. Audit Restrictions
    7. The Audit Planning
    8. Tasks and Subtasks
      1. Duration
      2. Dependencies
      3. Critical Path
      4. Resources
      5. Resource Cost
      6. Cost of the Audit
    9. Responsibilities of the Auditor and Auditee
    10. Audit Risk Assessment
      1. Types of Risks
    11. Audit Quality Control
      1. Techniques to Ensure a Quality Audit
    12. Data Collection
      1. Review Existing Controls
      2. Evidence Life Cycle
    13. Identifying Evidence
      1. Grading Evidence
      2. Material Relevance
      3. Competency of the Evidence Provider
      4. Evidence Independence
      5. Recording Evidence
      6. Analysis of the Evidence
    14. Preparing Audit Documentation
    15. Audit Samples
      1. Statistical Sampling
      2. Non-statistical Sampling
      3. Compliance Testing
      4. Substantive Testing
    16. Reporting Audit Findings
      1. The Audit Report and Stakeholders
    17. Detecting Irregularities
  29. Index
3.12.71.237