Read IT Manager's Handbook: Getting Your New Job Done Online
Authors: Bill Holtsnider,Brian D. Jaffe
Tags: #Business & Economics, #Information Management, #Computers, #Information Technology, #Enterprise Applications, #General, #Databases, #Networking
working with auditors,
242–243
Authentication
challenge–response,
219
identity management,
220
methods,
220
security solutions,
219–220
SSO,
156
,
219–220
two-factor,
219
Authorization levels, security solutions,
218–219
Automated alerts, as proactive solution,
269
Automated reports, as proactive solution,
269
Automatic Call Distribution (ACD),
282
Availability, CIA model,
208
Awareness training, users,
271
B
Baby boomers, generation differences,
58
t
,
60
t
Backdoor Trojans,
224
Background checks,
97
,
223
Backup tapes, disaster recovery plan,
256
Basel Committee on Banking Supervision (BCBS),
229
Basel II,
229–230
BCBS,
See
Basel Committee on Banking Supervision (BCBS)
BCP,
See
Business Continuity Planning (BCP)
Benefit plan enrollment, intranet uses,
294–295
Benevolent dictator,
141
BestBuy,
225
Bidding, vendor management,
175
Bill 198 (Ontario, Canada),
228
Billing and invoicing, cloud computing,
151
BlackBerry (RIM),
296
Black-hat hackers,
208
,
211–212
Black List,
154
Bliley, Thomas,
231
Blogs, as connectedness technology,
289
Bloomberg, Michael,
4
Body language,
33
,
92
Boss relationship
with IT Manager,
17–18
view of users,
265
“Breaking the ice,”,
15
Brin, Sergey,
95
,
209
Bring Your Own (BYO) Policy,
273
,
288–289
Brute force method,
27
Budgeting factors
department workload,
170
hardware maintenance,
172–173
key factors,
170–173
software maintenance,
171
staff,
171
technological change,
171
Budgeting issues,
See also
Cost considerations
Money
first 100 days,
26
intranet uses,
294–295
kick-off meeting,
116
off-track projects,
125–126
project funding,
131
Budgeting process
approval,
165–166
budget reviewers,
164–165
chargebacks,
164
estimations,
165
items,
162–163
items to tracks,
162–163
overview,
161–167
revisions,
166–167
tracking,
166–167
Burnout
associated problems,
36
avoiding/monitoring,
36–37
employees,
36
Business Applications
OS selection,
138
as software type,
136
Business Continuity Planning (BCP)
basic issues,
261
and compliance,
243
definition,
260
disaster recovery,
260–261
Business-related degrees, candidate selection,
96
Business Software Alliance,
145
Buy
vs.
lease decision
basic considerations,
168–170
operating
vs.
capital lease,
169
person deciding,
170
pros and cons,
169
,
169
t
BYO,
See
Bring Your Own (BYO) Policy
C
Call centers,
183
,
278
Call tracking
Help Desk,
278–279
,
282
knowledge base,
279
user satisfaction surveys,
280
Candidate selection
ability to learn,
94
background checks,
97
business-related degrees,
96
certification value,
94–95
common mistakes,
98–99
education,
95–97
education’s direct value,
96
education’s indirect value,
96
hard sciences-related degree,
97
high-volume response,
85
interview guidelines,
86
level of interview,
84
list narrowing,
84–86
multiple interviewers,
88–89
multiple perspectives,
89
b
non-technical questions,
87–88
off-limits questions,
88
overqualified candidates,
85–86
professional references,
97–98
profile/personality tests,
90
b
project teams,
126
question preparation,
87–88
rank criteria,
93–94
reference checks,
97–98
remote interviews,
91–92
requirements flexibility,
93–94
résumé reviews,
83–84
salary range,
99–101
similar experience,
92–93
skill set,
92
soft sciences-related degrees,
97
technical courses,
97
technical interviews,
89–93
telephone screening,
84
30 qualified candidates,
85
CAP,
See
Certified Authorization Professional (CAP)
Capability Maturity Model Integration (CMMI),
240
Capital expenditure
company policies,
168
details,
167–168
gray areas,
168
vs.
operating expense,
115
,
167–168
Capital investment, vendor evaluation matrix,
177
Capital lease,
169
CareerBuilder.com,
77
Carrier connections, technical environment,
191–192
Casper (JAMF),
143
,
280
Catastrophic disasters, DR plan,
259
CERT,
211
Certificates, security defenses,
222
Certification
checking value,
95
employee training,
41
job requirement flexibility,
94
position description,
74
project manager,
105
value,
94–95
Certified Authorization Professional (CAP),
223
Certified Information Systems Security Professional (CISSP),
41
,
223
Certified Novell Engineer (CNE),
41
,
94
Certified Secure Software Lifecycle Professional (CSSLP),
223
Chain letters, e-mail management,
153–154
Challenge–response authentication,
219
Change Request (CR),
212
Chargebacks,
164
Chatter.com, as connectedness technology,
289
Chemistry, Four C’s of Hiring,
70
Chief Security Officer (CSO),
212
CIA,
See
Confidentiality, Integrity, Availability (CIA) model
Circumstance, Four C’s of Hiring,
69
CISSP,
See
Certified Information Systems Security Professional (CISSP)
Clause 49 (India),
228
CLERP-9 (Australia),
228
,
233
Client/server software type,
136
Clinton, Bill,
126–127
Closeout Report
additional accomplishments,
122
bad news,
122
follow-up activities,
122
as project plan guide,
112
writing,
121–122
Cloud computing
basic considerations,
150–152
benefits and challenges,
152
t
non-perpetual licensing,
146
overview,
148–152
private
vs.
public,
149–150
pros and cons,
150
t