Data Management Data management books:
Data management books
Read a wide selection of free sample chapters from industry-renowned data management books. This library is regularly updated with excerpts from books about business intelligence (BI), compliance and security, enterprise data integration (EDI), data warehousing, data quality, data governance and other data management topics. Both business and IT professionals can benefit from these valuable resources, so please spread the word about the SearchDataManagement.com chapter download library.
New in this guide
- Why lean integration is important to data integration systems (Enterprise data integration)
- Making business transaction processing and applications work (Data warehousing - DBMS)
Browse excerpts from business intelligence (BI) books. Find a guide on how to effectively use business intelligence in the enterprise, read about common BI mistakes and learn about dashboard design and implementation.
Read excerpts from data quality and data governance books. Find out data governance and data stewardship best practices and learn from data quality management horror stories. Browse a chapter on data quality assurance or check out a guide on data governance roles and policies.
Get the latest data warehousing and database management systems (DBMS)information. Read guides on data modeling and better understand the different roles of database administrators (DBAs). Peruse a chapter on defining business requirements for data warehousing projects or check out an excerpt from The The Data Warehouse Toolkit.
Check out sample chapters from enterprise data integration (EDI) books. Find valuable information about master data management (MDM) and customer data integration (CDI) implementation, read about service-oriented architecture (SOA) and business rules, or find tips for enterprise resource planning (ERP) for IT managers.
Find out more about compliance and security by reading or downloading excerpts from security books. Polish your knowledge of Sarbanes-Oxley compliance requirements, browse a non-technical guide to information security (written by a former hacker!) and read a sample chapter about data protection and information lifecycle management (ILM).