0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (340)
  • R250 - R500 (934)
  • R500+ (16,279)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback): Abu Sayed Mahfuz Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback)
Abu Sayed Mahfuz
R1,238 Discovery Miles 12 380 Ships in 9 - 15 working days

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software. The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. It covers the major areas of software management, software life cycle, and life cycle processes. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. It also examines what a tester or test lead needs to do before and during test execution and how to report after completing the test execution. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit. This section also discusses the definition, measurement, and metrics of reliability based on standards and quality metrics methodology CMM models. It discusses the ISO 15504 standard, CMMs, PSP, and TSP and includes an appendix containing a software process improvement sample document.

Cyber Security: Essential Principles to Secure Your Organisation (Paperback): IT Governance Cyber Security: Essential Principles to Secure Your Organisation (Paperback)
IT Governance
R363 Discovery Miles 3 630 Ships in 12 - 17 working days

Cyber Security - Essential principles to secure your organisation takes you through the fundamentals of cyber security, the principles that underpin it, vulnerabilities and threats, and how to defend against attacks. Organisations large and small experience attacks every day, from simple phishing emails to intricate, detailed operations masterminded by criminal gangs, and for every vulnerability fixed, another pops up, ripe for exploitation. Cyber security doesn't have to cost vast amounts of money or take a short ice age to implement. No matter the size of your organisation, improving cyber security helps protect your data and that of your clients, improving business relations and opening the door to new opportunities. This pocket guide will take you through the essentials of cyber security - the principles that underpin it, vulnerabilities and threats and the attackers who use them, and how to defend against them - so you can confidently develop a cyber security programme. Cyber Security - Essential principles to secure your organisation Covers the key differences between cyber and information security; Explains how cyber security is increasingly mandatory and how this ties into data protection, e.g. the Data Protection Act 2018 and the GDPR (General Data Protection Regulation); Focuses on the nature of the problem, looking at technical, physical and human threats and vulnerabilities; Explores the importance of security by design; Gives guidance on why security should be balanced and centralised; and Introduces the concept of using standards and frameworks to manage cyber security. No matter the size of your organisation, cyber security is no longer optional - it is an essential component of business success and a critical defence against the risks of the information age. The only questions left are to decide when and where your journey will begin. Start that journey now - buy this book today!

Network Marketing Survival (Paperback): Jim Stephens Network Marketing Survival (Paperback)
Jim Stephens
R213 Discovery Miles 2 130 Ships in 12 - 17 working days
Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback): IT Governance Iso/Iec 27701:2019: An Introduction to Privacy Information Management (Paperback)
IT Governance
R364 Discovery Miles 3 640 Ships in 12 - 17 working days

ISO/IEC 27701:2019: An introduction to privacy information management offers a concise introduction to the Standard, aiding those organisations looking to improve their privacy information management regime, particularly where ISO/IEC 27701:2019 is involved.

The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback):... The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback)
Damilare D. Fagbemi, David Wheeler, J.C. Wheeler
R1,372 Discovery Miles 13 720 Ships in 12 - 17 working days

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

Project Management Methodologies, Governance and Success - Insight from Traditional and Transformative Research (Paperback):... Project Management Methodologies, Governance and Success - Insight from Traditional and Transformative Research (Paperback)
Robert Joslin
R1,363 Discovery Miles 13 630 Ships in 12 - 17 working days

With all signs pointing to an increased use of and interest in project-based work in modern organizations, the better scholars are able to make sense of the current state of the field through theory development and empirical investigation, the more successful projects promise to become. This book is a welcome addition to our field and will be, I am sure, an important work and source for future reference well into the future. -Dr. Jeffrey Pinto, Pennsylvania State University The goal of practicing project managers and scholars alike lies in solving the puzzle of how to manage projects toward successful completion. However, understanding what comprises project "success"-seemingly such an innocent question-has come to represent one of the most challenging problems for project managers and scholars. Who determines success? At what point in time is success best measured? How do diverse stakeholders define success? What happens when their perspectives collide? What is the difference between project success and project management success? These are surprisingly complex problems. For every principle or rule posited, a brief investigation reveals that there are numerous exceptions, muddying the waters and making these ideas increasingly opaque. Project Management Methodologies, Governance and Success addresses this challenge head-on, putting into proper context the critical issues that shape our understanding of the project management research process. Employing a concept referred to as "philosophical triangulation," the book shows how to overcome the weaknesses or intrinsic biases that disrupt and minimize the impact of so much organizational research. It places organizational governance and success within their proper context allowing scholars to identify the best methods for investigating project-based work. It links together in a cogent manner the diverse themes of research theory and design, projects and project success, and organizational governance. In effect, this book demonstrates that to fully understand how to undertake research in projects, theory and method are inextricably interwoven.

Military Applications of Data Analytics (Paperback): Kevin Huggins Military Applications of Data Analytics (Paperback)
Kevin Huggins
R1,353 Discovery Miles 13 530 Ships in 12 - 17 working days

Military organizations around the world are normally huge producers and consumers of data. Accordingly, they stand to gain from the many benefits associated with data analytics. However, for leaders in defense organizations-either government or industry-accessible use cases are not always available. This book presents a diverse collection of cases that explore the realm of possibilities in military data analytics. These use cases explore such topics as: Context for maritime situation awareness Data analytics for electric power and energy applications Environmental data analytics in military operations Data analytics and training effectiveness evaluation Harnessing single board computers for military data analytics Analytics for military training in virtual reality environments A chapter on using single board computers explores their application in a variety of domains, including wireless sensor networks, unmanned vehicles, and cluster computing. The investigation into a process for extracting and codifying expert knowledge provides a practical and useful model for soldiers that can support diagnostics, decision making, analysis of alternatives, and myriad other analytical processes. Data analytics is seen as having a role in military learning, and a chapter in the book describes the ongoing work with the United States Army Research Laboratory to apply data analytics techniques to the design of courses, evaluation of individual and group performances, and the ability to tailor the learning experience to achieve optimal learning outcomes in a minimum amount of time. Another chapter discusses how virtual reality and analytics are transforming training of military personnel. Virtual reality and analytics are also transforming monitoring, decision making, readiness, and operations. Military Applications of Data Analytics brings together a collection of technical and application-oriented use cases. It enables decision makers and technologists to make connections between data analytics and such fields as virtual reality and cognitive science that are driving military organizations around the world forward.

Creating Smart Enterprises - Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies (Paperback): Vivek Kale Creating Smart Enterprises - Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies (Paperback)
Vivek Kale
R1,380 Discovery Miles 13 800 Ships in 12 - 17 working days

"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.

Benefits Realization Management - Strategic Value from Portfolios, Programs, and Projects (Paperback): Carlos Eduardo Martins... Benefits Realization Management - Strategic Value from Portfolios, Programs, and Projects (Paperback)
Carlos Eduardo Martins Serra
R1,364 Discovery Miles 13 640 Ships in 12 - 17 working days

Benefits realization management (BRM) is a key part of governance, because it supports the strategic creation of value and provides the correct level of prioritization and executive support to the correct initiatives. Because of its relevance to the governance process, BRM has a strong influence over project success and is a link between strategic planning and strategy execution. This book guides portfolio, program, and project managers through the process of benefits realization management so they can maximize business value. It discusses why and how programs and projects are expected to enable value creation, and it explains the role of BRM in value creation. The book provides a flexible framework for: Translating business strategy drivers into expected benefits and explains the subsequent composition of a program and project portfolio that can realize expected benefits Planning the benefits realization expected from programs and projects and then making it happen Keeping programs and projects on track Reviewing and evaluating the benefits achieved or expected against the original baselines and the current expectations. To help project, program, and portfolio managers on their BRM journey, as well as to support business managers in executing business strategies, the book identifies key organizational responsibilities and roles involved in BRM practices, and it provides a simple reference that can be mapped against any organizational structure. A detailed and comprehensive case study illustrates each phase of the BRM framework as it links business strategy to project work, benefits, and business value. Each chapter ends with a series questions that provide a BRM self-assessment. The book concludes with a set of templates and detailed instructions to ensure successful deployment of BRM.

CBAP (R) Certification and BABOK (R) Study Guide (Paperback): Hans Jonasson CBAP (R) Certification and BABOK (R) Study Guide (Paperback)
Hans Jonasson
R1,377 Discovery Miles 13 770 Ships in 12 - 17 working days

The book covers all knowledge areas from the BABOK (R), Third Edition, and is designed to be a study guide for the CBAP (R) certification from IIBA (TM). It includes over 300 sample questions. It is also usable for those seeking the PMI-PBA (R) certification. This book is a complete business analysis handbook combining the latest standards from the BABOK (R) case study examples and exercises with solutions. It has usable tools and techniques, as well as templates ready to be used to develop solid requirements to be the cornerstone for any successful product development.

Applications of Machine Learning in Big-Data Analytics and Cloud Computing (Hardcover): Subhendu Kumar Pani, Somanath Tripathy,... Applications of Machine Learning in Big-Data Analytics and Cloud Computing (Hardcover)
Subhendu Kumar Pani, Somanath Tripathy, George Jandieri, Sumit Kundu, Talal Ashraf Butt
R2,833 Discovery Miles 28 330 Ships in 9 - 15 working days

Cloud Computing and Big Data technologies have become the new descriptors of the digital age. The global amount of digital data has increased more than nine times in volume in just five years and by 2030 its volume may reach a staggering 65 trillion gigabytes. This explosion of data has led to opportunities and transformation in various areas such as healthcare, enterprises, industrial manufacturing and transportation. New Cloud Computing and Big Data tools endow researchers and analysts with novel techniques and opportunities to collect, manage and analyze the vast quantities of data. In Cloud and Big Data Analytics, the two areas of Swarm Intelligence and Deep Learning are a developing type of Machine Learning techniques that show enormous potential for solving complex business problems. Deep Learning enables computers to analyze large quantities of unstructured and binary data and to deduce relationships without requiring specific models or programming instructions. This book introduces the state-of-the-art trends and advances in the use of Machine Learning in Cloud and Big Data Analytics. The book will serve as a reference for Data Scientists, systems architects, developers, new researchers and graduate level students in Computer and Data science. The book will describe the concepts necessary to understand current Machine Learning issues, challenges and possible solutions as well as upcoming trends in Big Data Analytics.

CISM Certified Information Security Manager Study Guide (Paperback): M. Chapple CISM Certified Information Security Manager Study Guide (Paperback)
M. Chapple
R1,101 Discovery Miles 11 010 Ships in 12 - 17 working days

Sharpen your information security skills and grab an invaluable new credential with this unbeatable study guide As cybersecurity becomes an increasingly mission-critical issue, more and more employers and professionals are turning to ISACA's trusted and recognized Certified Information Security Manager qualification as a tried-and-true indicator of information security management expertise. In Wiley's Certified Information Security Manager (CISM) Study Guide, you'll get the information you need to succeed on the demanding CISM exam. You'll also develop the IT security skills and confidence you need to prove yourself where it really counts: on the job. Chapters are organized intuitively and by exam objective so you can easily keep track of what you've covered and what you still need to study. You'll also get access to a pre-assessment, so you can find out where you stand before you take your studies further. Sharpen your skills with Exam Essentials and chapter review questions with detailed explanations in all four of the CISM exam domains: Information Security Governance, Information Security Risk Management, Information Security Program, and Incident Management. In this essential resource, you'll also: Grab a head start to an in-demand certification used across the information security industry Expand your career opportunities to include rewarding and challenging new roles only accessible to those with a CISM credential Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone prepping for the challenging CISM exam or looking for a new role in the information security field, the Certified Information Security Manager (CISM) Study Guide is an indispensable resource that will put you on the fast track to success on the test and in your next job.

Implementing Service Level Objectives - A Practical Guide to SLIs, SLOs, and Error Budgets (Paperback): Alex Hidalgo Implementing Service Level Objectives - A Practical Guide to SLIs, SLOs, and Error Budgets (Paperback)
Alex Hidalgo
R1,266 R1,111 Discovery Miles 11 110 Save R155 (12%) Ships in 12 - 17 working days

Although service-level objectives (SLOs) continue to grow in importance, there's a distinct lack of information about how to implement them. Practical advice that does exist usually assumes that your team already has the infrastructure, tooling, and culture in place. In this book, recognized SLO expert Alex Hidalgo explains how to build an SLO culture from the ground up. Ideal as a primer and daily reference for anyone creating both the culture and tooling necessary for SLO-based approaches to reliability, this guide provides detailed analysis of advanced SLO and service-level indicator (SLI) techniques. Armed with mathematical models and statistical knowledge to help you get the most out of an SLO-based approach, you'll learn how to build systems capable of measuring meaningful SLIs with buy-in across all departments of your organization. Define SLIs that meaningfully measure the reliability of a service from a user's perspective Choose appropriate SLO targets, including how to perform statistical and probabilistic analysis Use error budgets to help your team have better discussions and make better data-driven decisions Build supportive tooling and resources required for an SLO-based approach Use SLO data to present meaningful reports to leadership and your users

How Cyber Security Can Protect Your Business - A Guide for All Stakeholders (Paperback): IT Governance How Cyber Security Can Protect Your Business - A Guide for All Stakeholders (Paperback)
IT Governance
R363 Discovery Miles 3 630 Ships in 12 - 17 working days

Summary Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape. Gives strategic, business-focused guidance and advice relevant to C-suite executives. Provides an effective and efficient framework for managing cyber governance, risk and compliance. Explains what is required to implement an effective cyber security strategy. Description With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously. Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue. Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation. How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy. The pocket guide: Gives readers a greater understanding of cyber governance, risk and compliance; Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape; Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response; Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way; Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and Includes a checklist to help readers focus on their higher-priority cyber areas. Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language. Kick-start your journey to becoming cyber secure - buy this pocket guide today!

MCA Microsoft Certified Associate Azure Network Engineer Study Guide - Exam AZ-700 (Paperback): P Udayakumar MCA Microsoft Certified Associate Azure Network Engineer Study Guide - Exam AZ-700 (Paperback)
P Udayakumar
R1,079 Discovery Miles 10 790 Ships in 12 - 17 working days

Prepare to take the NEW Exam AZ-700 with confidence and launch your career as an Azure Network Engineer Not only does MCA Microsoft Certified Associate Azure Network Engineer Study Guide: Exam AZ-700 help you prepare for your certification exam, it takes a deep dive into the role and responsibilities of an Azure Network Engineer, so you can learn what to expect in your new career. You'll also have access to additional online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossary of important terms. Prepare smarter with Sybex's superior interactive online learning environment and test bank. Exam AZ-700, Designing and Implementing Microsoft Azure Networking Solutions, measures your ability to design, implement, manage, secure, and monitor technical tasks such as hybrid networking; core networking infrastructure; routing; networks; and private access to Azure services. With this in-demand certification, you can qualify for jobs as an Azure Network Engineer, where you will work with solution architects, cloud administrators, security engineers, application developers, and DevOps engineers to deliver Azure solutions. This study guide covers 100% of the objectives and all key concepts, including: Design, Implement, and Manage Hybrid Networking Design and Implement Core Networking Infrastructure Design and Implement Routing Secure and Monitor Networks Design and Implement Private Access to Azure Services If you're ready to become the go-to person for recommending, planning, and implementing Azure networking solutions, you'll need certification with Exam AZ-700. This is your one-stop study guide to feel confident and prepared on test day. Trust the proven Sybex self-study approach to validate your skills and to help you achieve your career goals!

Smart Grid in IoT-Enabled Spaces - The Road to Intelligence in Power (Paperback): Fadi Al-Turjman Smart Grid in IoT-Enabled Spaces - The Road to Intelligence in Power (Paperback)
Fadi Al-Turjman
R1,364 Discovery Miles 13 640 Ships in 12 - 17 working days

Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among these advances, intelligent and energy-efficient services are gaining considerable interest. The use of the smart grid is increasing day after day around us and is not only used in saving energy but also in our daily life for intelligent health, traffic, and even farming systems. The grid enabled with IoT features is also expected to communicate with cellular networks smoothly in the next-generation networks (6G and beyond). This will open the door for other interesting research areas. In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grids, combining technical aspects with the most up-to-date theory. It investigates the grid under varying and potential emerging paradigms such as edge/fog computing, in addition to big data aspects considerations in the IoT era. With comprehensive surveys and case studies, this book explores basic and high-level grid aspects in the emerging smart city paradigm, which makes it especially attractive to researchers, academics, and higher-level students. This authored book can be used by computer science undergraduate and postgraduate students, researchers and practitioners, city administrators, policymakers, and government regulators.

Security and Organization within IoT and Smart Cities (Paperback): Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq Security and Organization within IoT and Smart Cities (Paperback)
Kayhan Ghafoor, Kevin Curran, Linghe Kong, Ali Safa Sadiq
R1,364 Discovery Miles 13 640 Ships in 12 - 17 working days

This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.

MOOC Learning Platform Development (Paperback): Varun Gupta, Durg Singh Chauhan, Thomas Hanne MOOC Learning Platform Development (Paperback)
Varun Gupta, Durg Singh Chauhan, Thomas Hanne
R558 Discovery Miles 5 580 Ships in 12 - 17 working days

The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses. The book proposes a flexible online platform. This solution provides flexibility in distance learning processes including course enrollment, learning, evaluation, and outcome of degrees. The proposed system not only gives students freedom to choose their courses in accordance with their needs but also use earned credit towards online degrees of any university of their choice.

Securing the Cloud - Security Strategies for the Ubiquitous Data Center (Paperback): Curtis Franklin Jr., Brian Chee Securing the Cloud - Security Strategies for the Ubiquitous Data Center (Paperback)
Curtis Franklin Jr., Brian Chee
R1,358 Discovery Miles 13 580 Ships in 12 - 17 working days

This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.

Implementing Project and Program Benefit Management (Paperback): Kenn Dolan Implementing Project and Program Benefit Management (Paperback)
Kenn Dolan
R1,364 Discovery Miles 13 640 Ships in 12 - 17 working days

One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple constraints (time-cost-quality) towards some of the more fundamental questions: What is the purpose of this investment? What are the specific advantages expected? Are these benefits worth the investment? Implementing Project and Program Benefit Management is written for executives and practitioners within the portfolio, program, and project environment. It guides them through the important work that must be addressed as the investment progresses towards the realization of benefits. The processes discussed cover the strategic elements of benefits realization as well as the more detailed requirements, which are the domain of the program delivery teams and the operational users. Using real cases to explain complex situations, operational teams and wider groups of stakeholders, including communities affected by infrastructure projects, will be able to engage in the conversation with the sponsors and delivery teams. Covering an area of program and project management that is rapidly becoming more widely valued, this book blends theory with practical experience to present a clear process flow to managing the benefits life cycle. Best practices are defined, and pitfalls and traps are identified to enable practitioners to apply rigor and structure to this crucial discipline.

Agilizing the Enterprise - Collaborative Leadership, Dynamic Strategy, and Organizational Flexibility (Paperback): Joseph Raynus Agilizing the Enterprise - Collaborative Leadership, Dynamic Strategy, and Organizational Flexibility (Paperback)
Joseph Raynus
R1,358 Discovery Miles 13 580 Ships in 12 - 17 working days

Are you still searching for the workplace that deserves someone like you? Do you really have a good understanding about what is going on out there, in the business world? In this book, we will discuss the importance of agility and how it affects the solutions that are being delivered by an organization. We will also talk about how a blend of strategic innovation, visionary leadership, and organizational agility go hand in hand to ensure the success of an organization. Enterprise agility is not a far-fetched possibility. Once the problems of the organization are identified, with the right tools and effort, the agility, efficiency, and effectiveness of an organization, as well as the processes that the success of the organization are based on, can all be maximized. This book will broaden your thinking and will help you expand your horizons.

PMI-PBA (R) Exam Practice Test and Study Guide (Paperback): Brian Williamson PMI-PBA (R) Exam Practice Test and Study Guide (Paperback)
Brian Williamson
R1,383 Discovery Miles 13 830 Ships in 12 - 17 working days

The PMI-PBA (R) Exam Practice Test and Study Guide attempts to address all your questions and concerns by providing two of the most sought-after study aids: memory maps and practice questions. The systematic use of memory maps helps aid in the efficient recall of information and can boost confidence during the exam. Well-crafted practice questions are fantastic study aids that can be used to track your progress as you learn new concepts, introduce you to the complex sentence structure that is likely to appear on the exam, and concentrate your studies by domain, essentially preparing you to pass the very challenging PMI-PBA (R) Exam in the allotted four hours. In addition to study hints and exam topics, this book provides references to tools and techniques that should be incorporated into your work immediately. For each of the five domains outlined in the PMI Professional in Business Analysis (PMI-PBA) (R) Examination Content Outline 2013 (the ECO), twenty practice questions test your knowledge. Also included is a challenging 200-question practice exam, which is representative of the actual exam. To enhance your studies, a timed, online simulated exam is also provided. At the end of the simulated exam, you can see your score per the number of questions you answered correctly. These exam questions are crafted to foster learning and reinforce content; they are not obscure or overly complicated, but rather are representative of the actual exam. Knowing what to do must be translated into doing what you know. This book helps you prepare for the PMI-PBA (R) exam by instilling knowledge and encouraging critical thinking. As a result, the skills attained can lead to improved project success and outcomes, and you'll have a much stronger understanding of the material, along with the tools and techniques of business analysis. PMI-PBA (R) is a registered trademark of the Project Management Institute.

Quantifying Software - Global and Industry Perspectives (Paperback): Capers Jones Quantifying Software - Global and Industry Perspectives (Paperback)
Capers Jones
R1,402 Discovery Miles 14 020 Ships in 12 - 17 working days

Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many millions of dollars. Software is also the target of frequent and increasingly serious cyber-attacks. Among the reasons for these software problems is a chronic lack of reliable quantified data. This reference provides quantified data from many countries and many industries based on about 26,000 projects developed using a variety of methodologies and team experience levels. The data has been gathered between 1970 and 2017, so interesting historical trends are available. Since current average software productivity and quality results are suboptimal, this book focuses on "best in class" results and shows not only quantified quality and productivity data from best-in-class organizations, but also the technology stacks used to achieve best-in-class results. The overall goal of this book is to encourage the adoption of best-in-class software metrics and best-in-class technology stacks. It does so by providing current data on average software schedules, effort, costs, and quality for several industries and countries. Because productivity and quality vary by technology and size, the book presents quantitative results for applications between 100 function points and 100,000 function points. It shows quality results using defect potential and DRE metrics because the number one cost driver for software is finding and fixing bugs. The book presents data on cost of quality for software projects and discusses technical debt, but that metric is not standardized. Finally, the book includes some data on three years of software maintenance and enhancements as well as some data on total cost of ownership.

Enterprise Performance Intelligence and Decision Patterns (Paperback): Vivek Kale Enterprise Performance Intelligence and Decision Patterns (Paperback)
Vivek Kale
R1,363 Discovery Miles 13 630 Ships in 12 - 17 working days

"Vivek Kale has written a great book on performance management that focuses on decision-making; on continuous, incremental improvement; and on identifying common patterns in becoming a more intelligent organization." -James Taylor, CEO of Decision Management Solutions and author of Real-World Decision Modeling with DMN "Introducing the concepts of decision patterns and performance intelligence, Vivek Kale has written another important book on the issues faced by contemporary organizations."-Gary Cokins, author of Predictive Business Analytics and Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics Enterprise Performance Intelligence and Decision Patterns unravels the mystery of enterprise performance intelligence (EPI) and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what EPI means, what it can do, and application areas where it is practical to use. The need to be responsive to evolving customer needs and desires creates organizational structures where business intelligence (BI) and decision making is pushed out to operating units that are closest to the scene of the action. Closed-loop decision making resulting from a combination of on-going performance management with on-going BI can lead to an effective responsive enterprise; hence, the need for performance intelligence (PI). This pragmatic book: Introduces the technologies such as data warehousing, data mining, analytics, and business intelligence systems that are a first step toward enabling data-driven enterprises. Details decision patterns and performance decision patterns that pave the road for performance intelligence applications. Introduces the concepts, principles, and technologies related to performance measurement systems. Describes the concepts and principles related to balance scorecard systems (BCS). Introduces aspects of performance intelligence for the real-time enterprises. Enterprise Performance Intelligence and Decision Patterns shows how a company can design and implement instruments ranging from decision patterns to PI systems that can enable continuous correction of business unit behavior so companies can enhance levels of productivity and profitability.

Computational Intelligence Applications in Business Intelligence and Big Data Analytics (Paperback): Vijayan Sugumaran, Arun... Computational Intelligence Applications in Business Intelligence and Big Data Analytics (Paperback)
Vijayan Sugumaran, Arun Kumar Sangaiah, Arunkumar Thangavelu
R1,376 Discovery Miles 13 760 Ships in 12 - 17 working days

There are a number of books on computational intelligence (CI), but they tend to cover a broad range of CI paradigms and algorithms rather than provide an in-depth exploration in learning and adaptive mechanisms. This book sets its focus on CI based architectures, modeling, case studies and applications in big data analytics, and business intelligence. The intended audiences of this book are scientists, professionals, researchers, and academicians who deal with the new challenges and advances in the specific areas mentioned above. Designers and developers of applications in these areas can learn from other experts and colleagues through this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,493 R1,199 Discovery Miles 11 990
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
The Pentester BluePrint - Starting a…
PL Wylie Paperback R555 Discovery Miles 5 550
The Gathering Cloud
J. R. Carpenter Paperback R378 Discovery Miles 3 780
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R1,171 R832 Discovery Miles 8 320
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,305 R1,172 Discovery Miles 11 720
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, … Hardcover R2,892 Discovery Miles 28 920
Cisco CyberOps Associate CBROPS 200-201…
Omar Santos Hardcover R1,368 Discovery Miles 13 680
Transforming Your Business with AWS…
P Abdoulaye Paperback R715 Discovery Miles 7 150

 

Partners