0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (327)
  • R250 - R500 (866)
  • R500+ (14,041)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Smart Buildings Digitalization - IoT and Energy Efficient Smart Buildings Architecture and Applications (Hardcover): O.V. Gnana... Smart Buildings Digitalization - IoT and Energy Efficient Smart Buildings Architecture and Applications (Hardcover)
O.V. Gnana Swathika, K. Karthikeyan, Sanjeevikumar Padmanaban
R4,024 Discovery Miles 40 240 Ships in 12 - 17 working days

Discusses various aspects of role of Internet of Things (IoT) and Machine Learning in smart buildings. Explains pertinent system architecture focusing on power generation and distribution. Covers power enabling technologies for smart cities. Includes Photovoltaic System Integrated Smart Buildings.

The Integrator - A Change Management Framework for Achieving Agile IT Project Success (Hardcover): Scott Coplan The Integrator - A Change Management Framework for Achieving Agile IT Project Success (Hardcover)
Scott Coplan
R4,453 Discovery Miles 44 530 Ships in 12 - 17 working days

When a $145 million IT project failure pushes Los Angeles to the edge of financial meltdown, the County CEO asks Max McLellan, a harried IT project manager, aka The Integrator, for help. The County Board gives Max 30 days to identify the problem and find a solution. At first Max finds the usual missteps, but something bigger and darker beckons, an explosive source of project failure. He must do something different, rattling ghosts of previous County IT failures, uncloaking crookedness, and exposing truths that shatter careers. With some people rooting for his failure, Max battles to fit all the pieces together with the County team, applying his proven framework to define the problem, plan a solution and execute it successfully. It's common knowledge that barely 50% of IT projects succeed, per a 2017 Project Management Institute report. Equally well-known, approximately 70% of large-scale change management initiatives fail according to a 2017 McKinsey & Co. report. Given the challenge to overcome these low success rates, The Integrator offers a proven narrative on the organizational change framework for achieving Agile IT project management success based on the author's 45+ year client experiences and published research. The Integrator defines change management as the single overarching methodology integrating Agile IT and project management. It does this because all projects are about change - significant organizational and personal change. The people involved - their participation in and understanding and support of these changes - ultimately determine IT projects success or failure. In fact, while all IT projects are about change, successful projects change human behavior. The methodologies included in the framework, described in The Integrator, include: * Change management as defined by AIM (Accelerating Implementation Methodology). * Project management as defined by the Project Management Institute (PMI) Guide to the Project Management Body of Knowledge (PMBOK Guide) standard. * IT management as derived from the Institute of Electrical Engineers (IEEE) Guide to the Software Engineering Body of Knowledge (SWEBOK) standard. * Agile as defined by the Agile Alliance's Agile Manifesto. Written by a certified Project Management Professional and accredited change management practitioner, The Integrator chronicles the challenges involved in applying this framework in a real-world setting to achieve successful project implementation.

Strategic Cyber Deterrence - The Active Cyber Defense Option (Hardcover): Scott Jasper Strategic Cyber Deterrence - The Active Cyber Defense Option (Hardcover)
Scott Jasper
R2,568 Discovery Miles 25 680 Ships in 12 - 17 working days

According to the FBI, about 4000 ransomware attacks happen every day. In the United States alone, victims lost $209 million to ransomware in the first quarter of 2016. Even worse is the threat to critical infrastructure, as seen by the malware infections at electrical distribution companies in Ukraine that caused outages to 225,000 customers in late 2015. Further, recent reports on the Russian hacks into the Democratic National Committee and subsequent release of emails in a coercive campaign to apparently influence the U.S. Presidential Election have brought national attention to the inadequacy of cyber deterrence. The U.S. government seems incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces the alternative strategy of active cyber defense. It examines the array of malicious actors operating in the domain, their methods of attack, and their motivations. It also provides answers on what is being done, and what could be done, by the government and industry to convince malicious actors that their attacks will not succeed and that risk of repercussions exists. Traditional deterrence strategies of retaliation, denial and entanglement appear to lack the necessary conditions of capability, credibly, and communications due to these malicious actors' advantages in cyberspace. In response, the book offers the option of adopting a strategy of active cyber defense that combines internal systemic resilience to halt cyber attack progress with external disruption capacities to thwart malicious actors' objectives. It shows how active cyber defense is technically capable and legally viable as an alternative strategy for the deterrence of cyber attacks.

Cyber Security Politics - Socio-Technological Transformations and Political Fragmentation (Hardcover): Myriam Dunn Cavelty,... Cyber Security Politics - Socio-Technological Transformations and Political Fragmentation (Hardcover)
Myriam Dunn Cavelty, Andreas Wenger
R4,023 Discovery Miles 40 230 Ships in 12 - 17 working days

This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. Structured along two broad themes and providing empirical examples for how socio-technical changes and political responses interact, the first part of the book looks at the current use of cyber space in conflictual settings, while the second focuses on political responses by state and non-state actors in an environment defined by uncertainties. Within this, it highlights four key debates that encapsulate the complexities and paradoxes of cyber security politics from a Western perspective - how much political influence states can achieve via cyber operations and what context factors condition the (limited) strategic utility of such operations; the role of emerging digital technologies and how the dynamics of the tech innovation process reinforce the fragmentation of the governance space; how states attempt to uphold stability in cyberspace and, more generally, in their strategic relations; and how the shared responsibility of state, economy, and society for cyber security continues to be re-negotiated in an increasingly trans-sectoral and transnational governance space. This book will be of much interest to students of cyber security, global governance, technology studies, and international relations. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.

Cyber-Physical Systems and Industry 4.0 - Practical Applications and Security Management (Hardcover): Dinesh Goyal, Shanmugam... Cyber-Physical Systems and Industry 4.0 - Practical Applications and Security Management (Hardcover)
Dinesh Goyal, Shanmugam Balamurugan, Karthikrajan Senthilnathan, Iyswarya Annapoorani, Mohammad Israr
R3,476 Discovery Miles 34 760 Ships in 12 - 17 working days

The book provides a broad outlook on the applications of cyber-physical systems along with case studies and examples in healthcare, automotive electronics, industrial automation, environment monitoring, agriculture, and applications in civil and mechanical sectors. Topics include using an energy management system in smart grids, implementing an intelligent traffic management system, warehouse tracking and monitoring, medical cyber-physical systems security, remote healthcare monitoring, and more.

Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Paperback):... Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Paperback)
Ravi Das
R1,258 Discovery Miles 12 580 Ships in 12 - 17 working days

The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given equipment that has not been properly secured or must use personal devices to perform office work. The proliferation of videoconferencing has brought about new types of cyber-attacks. When the pandemic struck, many organizations found they had no, or old and unworkable, business continuity and disaster recovery plans. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic reviews the COVID-19 pandemic and related information security issues. It then develops a series of lessons learned from this reviews and explains how organizations can prepare for the next global mega disaster. The following presents some of the key lessons learned: The lack of vetting for third party suppliers and vendors The lack of controls surrounding data privacy, especially as it relates to the personal identifiable information (PPI) data sets The intermingling of home and corporate networks The lack of a secure remote workforce The emergence of supply chain attacks (e.g., Solar Winds) To address the issues raised in these lessons learned, CISOs and their security teams must have tools and methodologies in place to address the following: The need for incident response, disaster recovery, and business continuity plans The need for effective penetration testing The importance of threat hunting The need for endpoint security The need to use the SOAR model The importance of a zero-trust framework This book provides practical coverage of these topics to prepare information security professionals for any type of future disaster. The COVID-19 pandemic has changed the entire world to unprecedented and previously unimaginable levels. Many businesses, especially in the United States, were completely caught off guard, and they had no concrete plans put into place, from a cybersecurity standpoint, for how to deal with this mega disaster. This how-to book fully prepares CIOs, CISOs, and their teams for the next disaster, whether natural or manmade, with the various lessons that have been learned thus far from the COVID-19 pandemic.

Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Hardcover):... Business Recovery and Continuity in a Mega Disaster - Cybersecurity Lessons Learned from the COVID-19 Pandemic (Hardcover)
Ravi Das
R3,295 Discovery Miles 32 950 Ships in 12 - 17 working days

The COVID-19 pandemic has had so many unprecedented consequences. The great global shift from office work to remote work is one such consequence, with which many information security professionals are struggling. Office workers have been hastily given equipment that has not been properly secured or must use personal devices to perform office work. The proliferation of videoconferencing has brought about new types of cyber-attacks. When the pandemic struck, many organizations found they had no, or old and unworkable, business continuity and disaster recovery plans. Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the COVID-19 Pandemic reviews the COVID-19 pandemic and related information security issues. It then develops a series of lessons learned from this reviews and explains how organizations can prepare for the next global mega disaster. The following presents some of the key lessons learned: The lack of vetting for third party suppliers and vendors The lack of controls surrounding data privacy, especially as it relates to the personal identifiable information (PPI) data sets The intermingling of home and corporate networks The lack of a secure remote workforce The emergence of supply chain attacks (e.g., Solar Winds) To address the issues raised in these lessons learned, CISOs and their security teams must have tools and methodologies in place to address the following: The need for incident response, disaster recovery, and business continuity plans The need for effective penetration testing The importance of threat hunting The need for endpoint security The need to use the SOAR model The importance of a zero-trust framework This book provides practical coverage of these topics to prepare information security professionals for any type of future disaster. The COVID-19 pandemic has changed the entire world to unprecedented and previously unimaginable levels. Many businesses, especially in the United States, were completely caught off guard, and they had no concrete plans put into place, from a cybersecurity standpoint, for how to deal with this mega disaster. This how-to book fully prepares CIOs, CISOs, and their teams for the next disaster, whether natural or manmade, with the various lessons that have been learned thus far from the COVID-19 pandemic.

The Tactile Internet (Hardcover): T Ali-Yahiya The Tactile Internet (Hardcover)
T Ali-Yahiya
R4,094 R3,811 Discovery Miles 38 110 Save R283 (7%) Ships in 12 - 17 working days

The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data. This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet. As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed. Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance.

Cognitive Internet of Things - Enabling Technologies, Platforms, and Use Cases (Paperback): Pethuru Raj, Anupama C. Raman,... Cognitive Internet of Things - Enabling Technologies, Platforms, and Use Cases (Paperback)
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
R2,330 Discovery Miles 23 300 Ships in 9 - 15 working days

The Internet of Things (IoT) concept is defined as a flexible and futuristic network where all the different types of devices and smart objects can become seamlessly connected to each other and can actively participate in all types of processes which are happening around us. The grand objective of making physical, mechanical, electrical, and electronic devices to use the deeper and extreme connectivity and service-enablement techniques is to make them intelligent in their deeds, decisions, and deals. Cognitive IoT is the application of cognitive computing technologies to the data which is generated by the connected devices of the IoT ecosystem. Cognition means thinking; however, computers are not yet fully capable of mimicking human like thought. However, the present-day computer systems can perform some functions which are like the capability of human beings to think. Cognitive Internet of Things: Enabling Technologies, Platforms, and Use Cases explains the concepts surrounding Cognitive IoT. It also looks at the use cases and such supporting technologies as artificial intelligence and machine learning that act as key enablers of Cognitive IoT ecosystem. Different Cognitive IoT enabled platforms like IBM Watson and other product specific use cases like Amazon Alexa are covered in depth. Other highlights of the book include: Demystifying the cognitive computing paradigm Delineating the key capabilities of cognitive cloud environments Deep learning algorithms for cognitive IoT solutions Natural language processing (NLP) methods for cognitive IoT systems Designing a secure infrastructure for cognitive IoT platforms and applications

Networked and Event-Triggered Control Approaches in Cyber-Physical Systems (Hardcover): Jinhui Zhang, Yuanqing Xia, Zhongqi... Networked and Event-Triggered Control Approaches in Cyber-Physical Systems (Hardcover)
Jinhui Zhang, Yuanqing Xia, Zhongqi Sun, Duanduan Chen
R2,341 Discovery Miles 23 410 Ships in 12 - 17 working days

The insertion of communication networks in feedback control loops complicates analysis and synthesis of cyber-physical systems (CPSs), and network-induced uncertainties may degrade system control performance. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization, and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plants with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPSs. It would also prove useful for graduate students in the fields of science, engineering, and computer science.

Intelligent System Algorithms and Applications in Science and Technology (Hardcover): Sunil Pathak, Pramod Kumar Bhatt, Sanjay... Intelligent System Algorithms and Applications in Science and Technology (Hardcover)
Sunil Pathak, Pramod Kumar Bhatt, Sanjay Kumar Singh, Ashutosh Tripathi, Pankaj Kumar Pandey
R4,135 Discovery Miles 41 350 Ships in 12 - 17 working days

The volume addresses a selection of diverse topics in such areas as: machine learning based intelligent systems for healthcare applications of artificial intelligence the Internet of Things, intelligent data analytics techniques, intelligent network systems and applications, and inequalities and process control systems.

Cybercrime and Cybersecurity in the Global South - Concepts, Strategies and Frameworks for Greater Resilience (Hardcover):... Cybercrime and Cybersecurity in the Global South - Concepts, Strategies and Frameworks for Greater Resilience (Hardcover)
Charlette Donalds, Corlane Barclay, Kweku-Muata Osei-Bryson
R3,163 Discovery Miles 31 630 Ships in 12 - 17 working days

The Global South is recognized as one of the fastest growing regions in terms of Internet population as well as the region that accounts for the majority of Internet users. However, It cannot be overlooked that with increasing connectivity to and dependence on Internet-based platforms and services, so too is the potential increased for information and cybersecurity threats and attacks. Further, it has long been established that micro, small, and medium enterprises (MSMEs) play a key role in national economies, serving as important drivers of economic growth in Global South economies. Yet, little is known about information security, cybersecurity and cybercrime issues and strategies contextualized to these developing economies and MSMEs. Cybercrime and Cybersecurity in the Global South: Concepts, Strategies and Frameworks for Greater Resilience examines the prevalence, nature, trends and impacts of cyber-related incidents on Global South economies. It further explores cybersecurity challenges, potential threats, and risks likely faced by MSMEs and governments of the Global South. A major thrust of this book is to offer tools, techniques, and legislative frameworks that can improve the information, data, and cybersecurity posture of Global South governments and MSMEs. It also provides evidence-based best practices and strategies relevant to the business community and general Information Communication Technology (ICT) users in combating and preventing cyber-related incidents. Also examined in this book are case studies and experiences of the Global South economies that can be used to enhance students' learning experience. Another important feature of this book is that it outlines a research agenda to advance the scholarship of information and cybersecurity in the Global South. Features: Cybercrime in the Caribbean Privacy and security management Cybersecurity compliance behaviour Developing solutions for managing cybersecurity risks Designing an effective cybersecurity programme in the organization for improved resilience The cybersecurity capability maturity model for sustainable security advantage Cyber hygiene practices for MSMEs A cybercrime classification ontology

IoT Security Paradigms and Applications - Research and Practices (Paperback): Sudhir Kumar Sharma, Bharat Bhushan, Narayan C... IoT Security Paradigms and Applications - Research and Practices (Paperback)
Sudhir Kumar Sharma, Bharat Bhushan, Narayan C Debnath
R1,786 Discovery Miles 17 860 Ships in 12 - 17 working days

Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment

Socioeconomic and Legal Implications of Electronic Intrusion (Hardcover): Dionysios Politis Socioeconomic and Legal Implications of Electronic Intrusion (Hardcover)
Dionysios Politis
R5,307 Discovery Miles 53 070 Ships in 12 - 17 working days

In the information society, electronic intrusion has become a new form of trespassing often causing significant problems and posing great risks for individuals and businesses. ""Socioeconomic and Legal Implications of Electronic Intrusion"" focuses on abusive and illegal practices of penetration in the sphere of private communications. A leading international reference source within the field, this book provides legal and political practitioners, academicians, and intrusion researchers with expert knowledge into global theft and spam perspectives, identity theft and fraud, and electronic crime issues.

Marx and the Robots - Networked Production, AI and Human Labour (Hardcover): Florian Butollo, Sabine Nuss Marx and the Robots - Networked Production, AI and Human Labour (Hardcover)
Florian Butollo, Sabine Nuss; Translated by Jan-Peter Herrmann
R2,923 R2,048 Discovery Miles 20 480 Save R875 (30%) Ships in 12 - 17 working days

Marxist discourse around automation has recently become waylaid with breathless techno-pessimist dystopias and fanciful imaginations of automated luxury communism. This collection of essays by both established veterans of the field and new voices is a refreshingly sober materialist reflection on recent technological developments within capitalist production. It covers a broad range of digital aspects now proliferating across our work and lives, including chapters on the digitalisation of agriculture, robotics in the factory and the labour process on crowdworking platforms. It looks to how 20th century Marxist predictions of the 'workerless factory' are, or are not, coming true, and how 'Platform Capitalism' should be understood and critiqued. Through rich empirical, theoretical and historical material, this book is necessary reading for those wanting a clear overview of our digital world.

The Security Hippie (Hardcover): Barak Engel The Security Hippie (Hardcover)
Barak Engel
R3,290 Discovery Miles 32 900 Ships in 12 - 17 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Mathematical Foundations of Computer Networking (Paperback): Srinivasan Keshav Mathematical Foundations of Computer Networking (Paperback)
Srinivasan Keshav
R2,667 R1,643 Discovery Miles 16 430 Save R1,024 (38%) Ships in 12 - 17 working days

"To design future networks that are worthy of society's trust, we must put the 'discipline' of computer networking on a much stronger foundation. This book rises above the considerable minutiae of today's networking technologies to emphasize the long-standing mathematical underpinnings of the field." -Professor Jennifer Rexford, Department of Computer Science, Princeton University "This book is exactly the one I have been waiting for the last couple of years. Recently, I decided most students were already very familiar with the way the net works but were not being taught the fundamentals-the math. This book contains the knowledge for people who will create and understand future communications systems." -Professor Jon Crowcroft, The Computer Laboratory, University of Cambridge The Essential Mathematical Principles Required to Design, Implement, or Evaluate Advanced Computer Networks Students, researchers, and professionals in computer networking require a firm conceptual understanding of its foundations. Mathematical Foundations of Computer Networking provides an intuitive yet rigorous introduction to these essential mathematical principles and techniques. Assuming a basic grasp of calculus, this book offers sufficient detail to serve as the only reference many readers will need. Each concept is described in four ways: intuitively; using appropriate mathematical notation; with a numerical example carefully chosen for its relevance to networking; and with a numerical exercise for the reader. The first part of the text presents basic concepts, and the second part introduces four theories in a progression that has been designed to gradually deepen readers' understanding. Within each part, chapters are as self-contained as possible. The first part covers probability; statistics; linear algebra; optimization; and signals, systems, and transforms. Topics range from Bayesian networks to hypothesis testing, and eigenvalue computation to Fourier transforms. These preliminary chapters establish a basis for the four theories covered in the second part of the book: queueing theory, game theory, control theory, and information theory. The second part also demonstrates how mathematical concepts can be applied to issues such as contention for limited resources, and the optimization of network responsiveness, stability, and throughput.

Economic and Business Management (Hardcover): Xiaoxia Huang, Feng Zhang Economic and Business Management (Hardcover)
Xiaoxia Huang, Feng Zhang
R4,456 Discovery Miles 44 560 Ships in 12 - 17 working days

With the rapid development and drastic change of the world economy, "Digital Finance", "Internet Finance", "Science and Technology Finance" have become new hotspots, which also represent the future trend of economy development in the era of big data. Enterprises are facing more uncertainty, opportunities coexist with challenges. There are more possibilities for economic development and enterprise management to accelerate the integration of cutting-edge research results, to deepen hot topics discussion and to promote opinion exchanges among academic and business circles. The Sixth International Conference on Economic and Business Management (FEBM2021) was successfully held online on October 16-17, 2021, and aimed to provide a platform for researchers, engineers, academics as well as industry professionals from all over the world to present their latest research findings and development activities in economic and business management. These proceedings include 51 accepted articles selected from 94 submissions.

Enterprise Agility - A Practical Guide to Agile Business Management (Paperback): Gizem Ozbayrac Enterprise Agility - A Practical Guide to Agile Business Management (Paperback)
Gizem Ozbayrac
R1,400 Discovery Miles 14 000 Ships in 12 - 17 working days

Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.

Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover): Gizem Ozbayrac Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover)
Gizem Ozbayrac
R3,285 Discovery Miles 32 850 Ships in 12 - 17 working days

Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.

Mobile Clouds - Exploiting Distributed Resources in Wireless, Mobile and Social Networks (Hardcover): FHP Fitzek Mobile Clouds - Exploiting Distributed Resources in Wireless, Mobile and Social Networks (Hardcover)
FHP Fitzek
R2,262 Discovery Miles 22 620 Ships in 12 - 17 working days

Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, "UCLA, USA"

This book discusses and explores the concept of "mobile cloud," creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas.

A "mobile cloud "is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for "mobile clouds "are also discussed, highlighting the key role of network coding. "Mobile clouds "have the potential to enhance communications performance, improve utilization of resources and create flexible platforms to share resources in very novel ways.

Energy efficient aspects of "mobile clouds "are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple examples of "mobile" "clouds "applications, based on both existing commercial initiatives as well as proof-of-concept test-beds. Visions and prospects are also discussed, paving the way for further development. As mobile networks and social networks become more and more reliant on each other, the concept of resource sharing takes a wider and deeper meaning, creating the foundations for a global real-time multidimensional resource pool, the underlying infrastructure for shareconomy. Above all, this is an inspiring book for anyone who is concerned about the future of wireless and mobile communications networks and their relationship with Social networks.

Key Features: Provides fundamental ideas and promising concepts for exploiting opportunistic cooperation and cognition in wireless and mobile networksGives clear definitions of "mobile clouds "from different perspectivesAssociates mobile and wireless networks with social networks, creating a vast fertile ground for novel developments in both research and practical applicationsConsiders research directions, emerging trends and visions

This book is an excellent resource for wireless/networking researchers in industry and academia, students and mobile phone programmers. Managers interested in new technology developments, service providers, network operators, and those working in the gaming industry will also find the book insightful.

Principles of Information Security (Paperback, 7th edition): Herbert Mattord, Michael Whitman Principles of Information Security (Paperback, 7th edition)
Herbert Mattord, Michael Whitman
R1,278 R1,193 Discovery Miles 11 930 Save R85 (7%) Ships in 10 - 15 working days

Discover the latest trends, developments and technology in information security with Whitman/Mattord's market-leading PRINCIPLES OF INFORMATION SECURITY, 7th Edition. Designed specifically to meet the needs of information systems students like you, this edition's balanced focus addresses all aspects of information security, rather than simply offering a technical control perspective. This overview explores important terms and examines what is needed to manage an effective information security program. A new module details incident response and detection strategies. In addition, current, relevant updates highlight the latest practices in security operations as well as legislative issues, information management toolsets, digital forensics and the most recent policies and guidelines that correspond to federal and international standards. MindTap digital resources offer interactive content to further strength your success as a business decision-maker.

Smart Innovation of Web of Things (Paperback): Aarti Jain, Ruben Gonzalez Crespo, Manju Khari Smart Innovation of Web of Things (Paperback)
Aarti Jain, Ruben Gonzalez Crespo, Manju Khari
R3,859 Discovery Miles 38 590 Ships in 12 - 17 working days

The Web of Things (WoT) is a concept that describes approaches, programming tools and software architectural systems, which interface networks of real-world objects with the World Wide Web. The book is organized into 11 chapters, each focusing on a unique wireless technological aspect of the Web of Things, and it aims to comprehensively cover each of its various applications, including: A strong emphasis on WoT problems and solutions, identifying the main open issues, innovations and latest technologies behind WoT A blend of theoretical and simulation-based problems for better understanding of the concepts behind WoT Various exemplifying applications in which the use of WoT is very attractive and an inspiration for future applications The book will be useful to researchers, software developers and undergraduate and postgraduate students, as well as practitioners.

Cloud Computing Solutions Architect - A Hands-On Approach: A Competency-based Textbook for Universities and a Guide for AWS... Cloud Computing Solutions Architect - A Hands-On Approach: A Competency-based Textbook for Universities and a Guide for AWS Cloud Certification and Beyond (Hardcover)
Arshdeep Bahga, Vijay Madisetti
R2,491 Discovery Miles 24 910 Ships in 10 - 15 working days
Security and its Challenges in the 21st Century (Hardcover): C Guerrier Security and its Challenges in the 21st Century (Hardcover)
C Guerrier
R4,098 R3,814 Discovery Miles 38 140 Save R284 (7%) Ships in 12 - 17 working days

By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society. This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020's California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Milestones in Dance in the USA
Elizabeth McPherson Hardcover R4,317 Discovery Miles 43 170
Problem Solving in Soil Mechanics
A. Aysen Hardcover R2,713 Discovery Miles 27 130
Roberson Liquid Metal Acrylic Paint…
R305 Discovery Miles 3 050
Tucked-Away Treasures - 14 Patchwork…
Paula Barnes, Mary Ellen Robison Paperback R653 R585 Discovery Miles 5 850
Viruses and Interferon - Current…
Karen Mossman Hardcover R5,690 Discovery Miles 56 900
Economic and Environmental Regulation of…
Steven Truxal Hardcover R4,444 Discovery Miles 44 440
The Oral Microbiome - Methods and…
Guy R. Adami Paperback R3,147 Discovery Miles 31 470
The 1935 Republican River Flood
Joy Hayden Paperback R544 R503 Discovery Miles 5 030
Revival Breakthrough - Preparing for…
James W. Goll Paperback R423 R396 Discovery Miles 3 960
Examining the Psychological Foundations…
Eugene Subbotsky Hardcover R3,856 Discovery Miles 38 560

 

Partners