| |College of Information Systems & Technology |
| |CMGT/554 Version 2 |
| |IT Infrastructure |
Copyright © 2010, 2009 by University of Phoenix. All rights reserved.
Course Description
This course focuses on the managerial level of knowledge and terminology for telecommunications and computer networks. This course covers the concepts and application of the Internet; server and storage architectures; and regulatory considerations.
Policies
Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents:
• University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum.
University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality.
Course Materials
Fitzgerald, J. & Dennis, A. (2009). Business data communications & networking (10th ed.). Hoboken, NJ: Wiley.
Iniewski, K., McCrosky, C., & Minoli, D. (2008). Network infrastructure and architecture: Designing high-availability networks. Hoboken, NJ: Wiley-Interscience.
Turban, E. & Volonino, L. (2009). Information technology for management: Improving performance in the digital
References: Aird, C. L. & Sappenfield, D. (2009, June). IT the 'enabler ' of global outsourcing. Financial Executive, 25(5), 62. Chtioui, T. (2009, Spring). Understanding the impact of ERP standardization on business process performance. International Journal of Business, 14(2), 54-58. Fein, G. (2010). Lockheed Martin, IronKey develop An Ironclad solution to USB security. Defense Daily, 245(27), 4. Fogliata, P. & Mussini, M. T. (2008, Summer). Intelligence-ready network infrastructure: An ecosystem to control third-party intelligence distribution close to nomadic users. Bell Labs Technical Journal, 13(2), 105-116. Gilmer, B. (2008, Janurary). Understanding the basics. Broadcast Engineering, 50(1), 30-34. Hunter, P. (2008, April 12). Whooshing up the WAN Engineering & Technology, 3(6), 54-57. Jones, S. (2008, March 3). Communication conundrum Engineering & Technology, 3(5), 42-44. Lawniczak, A. T., & Xiongwen, T. (2007). Complex dynamics of CA like model of data networks. Journal of Celluar Automata, 2(2), 10. Madeira, E. R. M. & Schulze, B. (2009, June). Managing networks and services of the future. Journal of Network and Systems Management. 17(1/2), Murphy, D Musthaler, L. (2010, April 16). Verifying identity in customer-not-present situations. Network World. Schwartz, K. D. (2008, Janurary 21). SMBS feed on social networking input to grow eWeek, 25(3), 43. Sledgianowski, D., Tafti, M. H. A. & Kierstead, J. (2008, ). SME ERP system sourcing strategies: a case study Industrial Management and Data Systems, 108(4), 421. Vashista, A. (2008, Janurary). Finance and the elements of change Business Finance, 14(1), 40. Wienclaw, R. A. (2009). Networks in business Networks in Business -- Research Starters Business, 1-5. Zeidner, R. (2008, November). Employee Networking HR Magazine, 53(11), 56-60.