Inform-IT, Knowledge Center for Service Management, focuses on the development, promotion and distribution of knowledge in the field of IT (Service) Management. Its core business is developing IT Management books, conferences and knowledge portals. Over 70 different titles have been published under Inform-IT's editorial guidance, in up to 17 languages. Inform-IT works with thousands of expert authors and reviewers from all over the world, and cooperates with member-based or not-for-profit organizations like itSMF, ISACA and EXIN.
Numerous organisations spend their energy and funding on implementing ITIL practices. Most of them spend their time reinventing a wheel that was already created many times before in previous ITIL expeditions. If you're facing this challenge, you'll be interested in avoiding excessive cost. Although plenty of external guidance is available in the form of ITIL consultancies, you'll need to have a decent idea of what to expect in the course of your own ITIL expedition before you go for it.
'Service Level Management and the Service Manager' is the second book of a series of (initially) six books that provide background considerations, theory, instructions, and practical guidance for setting up organization structures in the context of improvement projects.
The book 'The ISM Method: Past, Present and Future of IT Service Management' describes a revolutionary approach on how to successfully implement IT service management (ITSM) in an easier, faster, cheaper, and especially more effective way.
The introduction book to a series of (initially) six books that will provide background considerations, theory, instructions, and practical guidance for setting up organization structures in the context of improvement projects.
This new title, 'Information Security Economics' explores the economic aspects of information security, whilst explaining how best to work with them, in order to achieve an optimized ROI on security investments. It considers ways in which information security metrics can be utilized to support security initiatives, and how requirements can be prioritized by organizations, in order to maximize returns within a commercial environment which may have limited resources.