Friday, January 23, 2009

PeopleSoft HRMS Reporting or The Security Risk Assessment Handbook

PeopleSoft HRMS Reporting

Author: Adam T Bromwich


2161B-7

Make your company's PeopleSoft investment pay off! Create the accurate, insightful reports you need, first time, every time, with PeopleSoft HRMS Reporting-the only complete guide to PeopleSoft reporting.

  • The Complete and Authoritative Guide to Retrieving Data from PeopleSoft's Human Resource Management System

PeopleSoft specialist Adam Bromwich presents authoritative guidance on the successful design of PeopleSoft HRMS databases and reports for superior performance, ease of use, and value. Learn how the PeopleSoft database is organized-functionally and technically; review its key tables; and understand how PeopleSoft's online capabilities are linked to the relational database beneath them.

Discover how you can:

  • Access your data directly, using Structured Query Language (SQL) and via PeopleSoft's powerful Structured Query Reports (SQR) language
  • Design better tables and reports for HR, Payroll, and Benefits
  • Construct more comprehensive queries
  • Avoid expensive pitfalls in PeopleSoft table design

Bromwich reveals the hidden decisions PeopleSoft HR developers must make. How does calculating a payroll affect paycheck data? When does an effective dated table cause major headaches? Where is the accurate data stored and which tables should be left alone? You'll find common routines for retrieving functional data, techniques for slashing costly debugging and maintenance, and much more.

PeopleSoft HRMS Reporting is the only independent guide to real-world PeopleSoft reporting. And it's based on the unmatched experience of one of the world's leading PeopleSoftexperts.



See also: Making Governance Work or The Midwives Book

The Security Risk Assessment Handbook

Author: Douglas J Landoll

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations. This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin. The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations.



Table of Contents:
1Introduction1
2Information security risk assessment basics27
3Project definition41
4Security risk assessment preparation77
5Data gathering115
6Administrative data gathering151
7Technical data gathering215
8Physical data gathering285
9Security risk analysis353
10Security risk mitigation367
11Security risk assessment reporting377
12Security risk assessment project management389
13Security risk assessment approaches415

1 comment:

  1. Thanks for the Post.Please check out this website for the Largest Collection of Peoplesoft Interview Questions and Answers.Hope it helps the job-seekers.

    More than 1200 Peoplesoft Interview Questions and Answers

    Thanks
    Priyanka

    ReplyDelete