0
Your cart

Your cart is empty

Browse All Departments
Price
  • R0 - R50 (1)
  • R50 - R100 (6)
  • R100 - R250 (210)
  • R250 - R500 (798)
  • R500+ (8,250)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities (Hardcover, 1st ed. 2023): Mohd Abdul... Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities (Hardcover, 1st ed. 2023)
Mohd Abdul Ahad, Gabriella Casalino, Bharat Bhushan
R4,636 Discovery Miles 46 360 Ships in 10 - 15 working days

With the rapid penetration of technology in varied application domains, the existing cities are getting connected more seamlessly. Cities becomes smart by inducing ICT in the classical city infrastructure for its management. According to McKenzie Report, about 68% of the world population will migrate towards urban settlements in near future. This migration is largely because of the improved Quality of Life (QoL) and livelihood in urban settlements. In the light of urbanization, climate change, democratic flaws, and rising urban welfare expenditures, smart cities have emerged as an important approach for society's future development. Smart cities have achieved enhanced QoL by giving smart information to people regarding healthcare, transportation, smart parking, smart traffic structure, smart home, smart agronomy, community security etc. Typically, in smart cities data is sensed by the sensor devices and provided to end users for further use. The sensitive data is transferred with the help of internet creating higher chances for the adversaries to breach the data. Considering the privacy and security as the area of prime focus, this book covers the most prominent security vulnerabilities associated with varied application areas like healthcare, manufacturing, transportation, education and agriculture etc. Furthermore, the massive amount of data being generated through ubiquitous sensors placed across the smart cities needs to be handled in an effective, efficient, secured and privacy preserved manner. Since a typical smart city ecosystem is data driven, it is imperative to manage this data in an optimal manner. Enabling technologies like Internet of Things (IoT), Natural Language Processing (NLP), Blockchain Technology, Deep Learning, Machine Learning, Computer vision, Big Data Analytics, Next Generation Networks and Software Defined Networks (SDN) provide exemplary benefits if they are integrated in the classical city ecosystem in an effective manner. The application of Artificial Intelligence (AI) is expanding across many domains in the smart city, such as infrastructure, transportation, environmental protection, power and energy, privacy and security, governance, data management, healthcare, and more. AI has the potential to improve human health, prosperity, and happiness by reducing our reliance on manual labor and accelerating our progress in the sciences and technologies. NLP is an extensive domain of AI and is used in collaboration with machine learning and deep learning algorithms for clinical informatics and data processing. In modern smart cities, blockchain provides a complete framework that controls the city operations and ensures that they are managed as effectively as possible. Besides having an impact on our daily lives, it also facilitates many areas of city management.

Data Hiding Techniques in Windows OS - A Practical Approach to Investigation and Defense (Paperback): Nihad Hassan, Rami Hijazi Data Hiding Techniques in Windows OS - A Practical Approach to Investigation and Defense (Paperback)
Nihad Hassan, Rami Hijazi
R1,054 Discovery Miles 10 540 Ships in 10 - 15 working days

"This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run's on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics - it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows (R) machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows (R) OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows (R). This is your hands-on guide to understand, detect and use today's most popular techniques in hiding and exploring hidden data under Windows (R) machines, covering all Windows (R) versions from XP till Windows (R) 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows (R) functions, techniques are presented in a way to easily implement them directly on your computer.

Advanced Methods of Pharmacokinetic and Pharmacodynamic Systems Analysis (Hardcover, 2004 ed.): David D'Argenio Advanced Methods of Pharmacokinetic and Pharmacodynamic Systems Analysis (Hardcover, 2004 ed.)
David D'Argenio
R5,315 Discovery Miles 53 150 Ships in 18 - 22 working days

Advanced Methods of Pharmacokinetic and Pharmocodynamic Systems Analysis Volume 3 is vital to professionals and academicians working in drug development and bioengineering. Both basic and clinical scientists will benefit from this work.
This book contains chapters by leading researchers in pharmacokinetic/pharmacodynamic modeling and will be of interest to anyone involved with the application of pharmacokinetic and pharmacodynamics to drug development.
The use of mathematical modeling and associated computational methods is central to the study of the absorption, distribution and elimination of therapeutic drugs (pharmacokinetics) and to understanding how drugs produce their effects (pharmacodynamics). From its inception, the field of pharmacokinetics and pharmacodynamics has incorporated methods of mathematical modeling, simulation and computation in an effort to better understand and quantify the processes of uptake, disposition and action of therapeutic drugs. These methods for pharmacokinetic/pharmacodynamic systems analysis impact all aspects of drug development. In vitro, animal and human testing, as well as drug therapy are all influenced by these methods. Modeling methodologies developed for studying pharmacokinetic/ pharmacodynamic processes confront many challenges. This is related in part to the severe restrictions on the number and type of measurements that are available from laboratory experiments and clinical trials, as well as the variability in the experiments and the uncertainty associated with the processes themselves.
The contributions are organized in three main areas: Mechanism-Based PK/PD, Pharmacometrics and Pharmacotherapy. Both professionals andacademics will profit from this extensive work.

Parallel Language and Compiler Research in Japan (Hardcover, 1995 ed.): Lubomir Bic, Alexandru Nicolau, Mitsuhisa Sato Parallel Language and Compiler Research in Japan (Hardcover, 1995 ed.)
Lubomir Bic, Alexandru Nicolau, Mitsuhisa Sato
R5,431 Discovery Miles 54 310 Ships in 18 - 22 working days

Parallel Language and Compiler Research in Japan offers the international community an opportunity to learn in-depth about key Japanese research efforts in the particular software domains of parallel programming and parallelizing compilers. These are important topics that strongly bear on the effectiveness and affordability of high performance computing systems. The chapters of this book convey a comprehensive and current depiction of leading edge research efforts in Japan that focus on parallel software design, development, and optimization that could be obtained only through direct and personal interaction with the researchers themselves.

Intelligent Systems and Smart Infrastructure - Proceedings of ICISSI 2022 (Paperback): Brijesh Mishra, Subodh Wairya, Manish... Intelligent Systems and Smart Infrastructure - Proceedings of ICISSI 2022 (Paperback)
Brijesh Mishra, Subodh Wairya, Manish Tiwari, Rakesh Kumar Singh
R1,347 Discovery Miles 13 470 Ships in 10 - 15 working days

This book covers the proceedings of ICISSI 2022 (International Conference on Intelligent Systems and Smart Infrastructure) held at Prayagraj, Uttar Pradesh during April 21-22, 2022. The conference was jointly organised by Shambhunath Institute of Engineering and Technology, Prayagraj UP India, Institute of Engineering and Technology (IET) Lucknow, U.P India, and Manipal University Jaipur, Rajasthan India with an aim to provide a platform for researchers, scientists, technocrats, academicians and engineers to exchange their innovative ideas and new challenges being faced in the field of emerging technologies. The papers presented in the conference have been compiled in form of chapters to focus on the core technological developments in the emerging fields like machine learning, intelligence systems, smart infrastructure, advanced power technology etc.

Handbook on Mobile and Ubiquitous Computing - Status and Perspective (Paperback): Laurence T. Yang, Evi Syukur, Seng W Loke Handbook on Mobile and Ubiquitous Computing - Status and Perspective (Paperback)
Laurence T. Yang, Evi Syukur, Seng W Loke
R1,580 Discovery Miles 15 800 Ships in 9 - 17 working days

Consolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless infrastructures. Supplying an overarching perspective, the book is ideal for researchers, graduate students, and industry practitioners in computer science and engineering interested in recent developments in mobile and ubiquitous computing. It discusses new trends in intelligent systems, reviews sensory input and multimedia information, and examines embedded real-time systems. With coverage that spans security, privacy, and trust, the book is divided into six parts: Mobile and Ubiquitous Computing-illustrates the concepts, design, implementation, and deployment of mobile and ubiquitous systems Smart Environments and Agent Systems-discusses a new trend toward intelligent systems that are completely connected, proactive, intuitive, and constantly available Human-Computer Interaction and Multimedia Computing-describes guidelines for designing multisensory input and output for mobile devices Security, Privacy, and Trust Management-presents an approach to dynamically establish trust between a system and its mobile client in a flexible manner using a multi-agent negotiation mechanism Embedded Real-Time Systems-introduces novel work on how mobile, ubiquitous, and intelligence computing can be realized Networking Sensing and Communications-covers challenges, designs, and prototype solutions for establishing, managing, and maintaining current sensor networks in mobile and ubiquitous computing environments Containing the contributions of more than 70 researchers, practitioners, and academics from around the world, the book brings together the latest research on the subject to provide an understanding of the issues being addressed in the field. Filled with extensive references in each chapter, it provides you with the tools to participate in the design, implementation, and deployment of systems that are connected, proactive, intuitive, and constantly available.

Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover): Steve King Losing the Cybersecurity War - And What We Can Do to Stop It (Hardcover)
Steve King; Edited by Kiren Chaudry
R3,361 Discovery Miles 33 610 Ships in 10 - 15 working days

Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.

Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback): Andrew Jenkinson Digital Blood on Their Hands - The Ukraine Cyberwar Attacks (Paperback)
Andrew Jenkinson
R954 Discovery Miles 9 540 Ships in 10 - 15 working days

- Totally unique, and incredibly damning, concerning information and overview of the world's first Cyberwar. - The first ever Cyberwar and the precursor to the first war in Europe since 1945, it will be discussed for decades to come and go down in history as a defining point. - Will be of interest to all citizens of the world, literally.

Electromagnetic Information Leakage and Countermeasure Technique - Translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao... Electromagnetic Information Leakage and Countermeasure Technique - Translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao (Hardcover, 1st ed. 2019)
Taikang Liu, Yongmei Li
R3,992 Discovery Miles 39 920 Ships in 10 - 15 working days

This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.

Foundations of Quantum Programming (Paperback): Mingsheng Ying Foundations of Quantum Programming (Paperback)
Mingsheng Ying
R2,448 Discovery Miles 24 480 Ships in 10 - 15 working days

Foundations of Quantum Programming discusses how new programming methodologies and technologies developed for current computers can be extended to exploit the unique power of quantum computers, which promise dramatic advantages in processing speed over currently available computer systems. Governments and industries around the globe are now investing vast amounts of money with the expectation of building practical quantum computers. Drawing upon years of experience and research in quantum computing research and using numerous examples and illustrations, Mingsheng Ying has created a very useful reference on quantum programming languages and important tools and techniques required for quantum programming, making the book a valuable resource for academics, researchers, and developers.

Introduction to Open Core Protocol - Fastpath to System-on-Chip Design (Hardcover, 2012): W.David Schwaderer Introduction to Open Core Protocol - Fastpath to System-on-Chip Design (Hardcover, 2012)
W.David Schwaderer
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book introduces Open Core Protocol (OCP) not as a conventional hardware communications protocol but as a meta-protocol: a means for describing and capturing the communications requirements of an IP core, and mapping them to a specific set of signals with known semantics. Readers will learn the capabilities of OCP as a semiconductor hardware interface specification that allows different System-On-Chip (SoC) cores to communicate. The OCP methodology presented enables intellectual property designers to design core interfaces in standard ways. This facilitates reusing OCP-compliant cores across multiple SoC designs which, in turn, drastically reduces design times, support costs, and overall cost for electronics/SoCs."

Multi-Criteria Decision Models in Software Reliability - Methods and Applications (Hardcover): Ashish Mishra, Nguyen Thi Dieu... Multi-Criteria Decision Models in Software Reliability - Methods and Applications (Hardcover)
Ashish Mishra, Nguyen Thi Dieu Linh, Manish Bhardwaj, Carla M. A. Pinto
R4,086 Discovery Miles 40 860 Ships in 10 - 15 working days

This book provides insights into contemporary issues and challenges in multi-criteria decision models. It is a useful guide for identifying, understanding and categorising multi-criteria decision models, and ultimately implementing the analysis for effective decision-making. The use of multi-criteria decision models in software reliability engineering is a relatively new field of study, and this book collects all the latest methodologies, tools and techniques in one single volume. It covers model selection, assessment, resource allocation, release management, up-grade planning, open-source systems, bug tracking system management and defect prediction. Multi-Criteria Decision Models in Software Reliability: Methods and Applications will cater to researchers, academicians, post-graduate students, software developers, software reliability engineers and IT managers.

The design and analysis of parallel algorithms (Hardcover): Justin R. Smith The design and analysis of parallel algorithms (Hardcover)
Justin R. Smith
R3,971 Discovery Miles 39 710 Ships in 10 - 15 working days

This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem independently and simultaneously. This approach has led to solutions of difficult problems in a number of vital fields, including artificial intelligence, image processing, and differential equations. As the first up-to-date summary of the topic, this book will be sought after by researchers, computer science professionals, and advanced students involved in parallel computing and parallel algorithms.

Advances in Computers, Volume 103 (Hardcover): Atif Memon Advances in Computers, Volume 103 (Hardcover)
Atif Memon
R4,195 Discovery Miles 41 950 Ships in 10 - 15 working days

Advances in Computers, the latest volume in the series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.

Artificial Intelligence Perspective for Smart Cities (Paperback): Sezer Bozkus Kahyaoglu, Vahap Tecim Artificial Intelligence Perspective for Smart Cities (Paperback)
Sezer Bozkus Kahyaoglu, Vahap Tecim
R1,136 Discovery Miles 11 360 Ships in 10 - 15 working days

1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.

Emerging Technologies for Combatting Pandemics - AI, IoMT, and Analytics (Hardcover): M.Rubaiyat Hossain Mondal, Utku Kose,... Emerging Technologies for Combatting Pandemics - AI, IoMT, and Analytics (Hardcover)
M.Rubaiyat Hossain Mondal, Utku Kose, V.B. Surya Prasath, Prajoy Podder, Subrato Bharati, …
R3,662 Discovery Miles 36 620 Ships in 10 - 15 working days

Unique selling point: The Internet of Things (IoT), AI, and analytics are studied on how they can combat pandemics Core audience: Researchers and medical informatics professionals Place in the market: Academic reference title on timely topic also appealing to professionals

Advances in Mobile Health Technology - A Research Perspective (Hardcover): Sinjini Mitra Advances in Mobile Health Technology - A Research Perspective (Hardcover)
Sinjini Mitra
R3,638 Discovery Miles 36 380 Ships in 10 - 15 working days

The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.

Advances in Mobile Health Technology - A Research Perspective (Paperback): Sinjini Mitra Advances in Mobile Health Technology - A Research Perspective (Paperback)
Sinjini Mitra
R1,454 Discovery Miles 14 540 Ships in 10 - 15 working days

The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.

Secrets of a Cyber Security Architect (Paperback): Brook S. E. Schoenfield Secrets of a Cyber Security Architect (Paperback)
Brook S. E. Schoenfield
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"? Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him. Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers: What security architecture is and the areas of expertise a security architect needs in practice The relationship between attack methods and the art of building cyber defenses Why to use attacks and how to derive a set of mitigations and defenses Approaches, tricks, and manipulations proven successful for practicing security architecture Starting, maturing, and running effective security architecture programs Secrets of the trade for the practicing security architecture Tricks to surmount typical problems Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback):... The IoT Architect's Guide to Attainable Security and Privacy - The IoT Architect's Guide to Attainable (Paperback)
Damilare D. Fagbemi, David Wheeler, J.C. Wheeler
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

Acquiring Card Payments (Paperback): Ilya Dubinsky Acquiring Card Payments (Paperback)
Ilya Dubinsky
R1,471 Discovery Miles 14 710 Ships in 10 - 15 working days

This book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustive detail. Instead, this book provides an overview, justification, and logic behind each message of the protocol and leaves the task of listing all fields and their formats to the standard document itself. The chapter on EMV contact transactions is comprehensive to fully explain this complex topic in order to provide a basis for understanding EMV contactless transaction. A guide to behind-the-scenes business processes, relevant industry standards, best practices, and cryptographic algorithms, Acquiring Card Payments covers the essentials so readers can master the standards and latest developments of card payment systems and technology

Implementing Project and Program Benefit Management (Paperback): Kenn Dolan Implementing Project and Program Benefit Management (Paperback)
Kenn Dolan
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple constraints (time-cost-quality) towards some of the more fundamental questions: What is the purpose of this investment? What are the specific advantages expected? Are these benefits worth the investment? Implementing Project and Program Benefit Management is written for executives and practitioners within the portfolio, program, and project environment. It guides them through the important work that must be addressed as the investment progresses towards the realization of benefits. The processes discussed cover the strategic elements of benefits realization as well as the more detailed requirements, which are the domain of the program delivery teams and the operational users. Using real cases to explain complex situations, operational teams and wider groups of stakeholders, including communities affected by infrastructure projects, will be able to engage in the conversation with the sponsors and delivery teams. Covering an area of program and project management that is rapidly becoming more widely valued, this book blends theory with practical experience to present a clear process flow to managing the benefits life cycle. Best practices are defined, and pitfalls and traps are identified to enable practitioners to apply rigor and structure to this crucial discipline.

Creating Smart Enterprises - Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies (Paperback): Vivek Kale Creating Smart Enterprises - Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies (Paperback)
Vivek Kale
R1,490 Discovery Miles 14 900 Ships in 10 - 15 working days

"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is required reading for those that want to stay relevant and win, and optional for those that don't." -Peter Fingar, Author of Cognitive Computing and business technology consultant Creating Smart Enterprises unravels the mystery of social media, mobile, analytics and big data, cloud, and Internet of Things (SMACT) computing and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what SMACT really means, what it can do for smart enterprises, and application areas where it is practical to use them. All IT professionals who are involved with any aspect of a SMACT computing project will profit by using this book as a roadmap to make a more meaningful contribution to the success of their computing initiatives. This pragmatic book: Introduces the VUCA (volatility, uncertainty, complexity, and ambiguity) business ecosystem confronted by the businesses today. Describes the challenges of defining business and IT strategies and of aligning them as well as their impact on enterprise governance. Provides a very wide treatment of the various components of SMACT computing, including the Internet of Things (IoT) and its constituting technologies like RFID, wireless networks, sensors, and wireless sensor networks (WSNs). This book addresses the key differentiator of SMACT computing environments and solutions that combine the power of an elastic infrastructure with analytics. The SMACT environment is cloud-based and inherently mobile. Information management processes can analyze and discern recurring patterns in colossal pools of operational and transactional data. Analytics, big data, and IoT computing leverage and transform these data patterns to help create successful, smart enterprises.

Big Data and Analytics Applications in Government - Current Practices and Future Opportunities (Paperback): Gregory Richards Big Data and Analytics Applications in Government - Current Practices and Future Opportunities (Paperback)
Gregory Richards
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

Within this context, big data analytics (BDA) can be an important tool given that many analytic techniques within the big data world have been created specifically to deal with complexity and rapidly changing conditions. The important task for public sector organizations is to liberate analytics from narrow scientific silos and expand it across internally to reap maximum benefit across their portfolios of programs. This book highlights contextual factors important to better situating the use of BDA within government organizations and demonstrates the wide range of applications of different BDA techniques. It emphasizes the importance of leadership and organizational practices that can improve performance. It explains that BDA initiatives should not be bolted on but should be integrated into the organization's performance management processes. Equally important, the book includes chapters that demonstrate the diversity of factors that need to be managed to launch and sustain BDA initiatives in public sector organizations.

Benefits Realization Management - Strategic Value from Portfolios, Programs, and Projects (Paperback): Carlos Eduardo Martins... Benefits Realization Management - Strategic Value from Portfolios, Programs, and Projects (Paperback)
Carlos Eduardo Martins Serra
R1,475 Discovery Miles 14 750 Ships in 10 - 15 working days

Benefits realization management (BRM) is a key part of governance, because it supports the strategic creation of value and provides the correct level of prioritization and executive support to the correct initiatives. Because of its relevance to the governance process, BRM has a strong influence over project success and is a link between strategic planning and strategy execution. This book guides portfolio, program, and project managers through the process of benefits realization management so they can maximize business value. It discusses why and how programs and projects are expected to enable value creation, and it explains the role of BRM in value creation. The book provides a flexible framework for: Translating business strategy drivers into expected benefits and explains the subsequent composition of a program and project portfolio that can realize expected benefits Planning the benefits realization expected from programs and projects and then making it happen Keeping programs and projects on track Reviewing and evaluating the benefits achieved or expected against the original baselines and the current expectations. To help project, program, and portfolio managers on their BRM journey, as well as to support business managers in executing business strategies, the book identifies key organizational responsibilities and roles involved in BRM practices, and it provides a simple reference that can be mapped against any organizational structure. A detailed and comprehensive case study illustrates each phase of the BRM framework as it links business strategy to project work, benefits, and business value. Each chapter ends with a series questions that provide a BRM self-assessment. The book concludes with a set of templates and detailed instructions to ensure successful deployment of BRM.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin Paperback R2,896 Discovery Miles 28 960
TI-83 Plus Calculator
BarCharts Inc Fold-out book or chart R229 Discovery Miles 2 290
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues Paperback R4,669 Discovery Miles 46 690
Microsoft Windows 10 Tips & Tricks
Joan Lambert Fold-out book or chart R229 Discovery Miles 2 290
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,201 Discovery Miles 12 010
Essential Windows 10: 1st Anniversary…
Kevin Wilson Paperback R431 R271 Discovery Miles 2 710

 

Partners