0
Your cart

Your cart is empty

Price
  • R50 - R100 (8)
  • R100 - R250 (240)
  • R250 - R500 (798)
  • R500+ (8,195)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Continuous Delivery 2.0 - Business-leading DevOps Essentials (Hardcover): Qiao Liang Continuous Delivery 2.0 - Business-leading DevOps Essentials (Hardcover)
Qiao Liang
R2,692 Discovery Miles 26 920 Ships in 10 - 15 working days

The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. It seems like most of the companies starting an agile transformation never reach the goal of agility, but there are those few that truly become agile and reap incredible benefits by utilizing DevOps as well. This book introduces the theory and practice of the "double-flywheels model" of Continuous Delivery 2.0: Discovery Loop, which allows information technology (IT) organizations to help businesses figure out the most efficacious ways to develop. Additionally, it explores applications of the Verification Loop that allows IT organizations to deliver value quickly and safely with high quality. Along the way, the book provides an array of insights and case studies that dive into all the aspects of software delivery, and how to implement Continuous Delivery in the most economical way for long-run business development. Features Organization culture and software architecture Business requirement management Pipeline and tooling Branching and releasing strategy Automation strategy Configuration and artefacts management Deployment and production healthy The case studies at the end of the book-scenarios in which the author was personally involved-are explored in depth and meticulously detailed in order to represent typical agile transition scenarios that will benefit all readers.

IoT - Security and Privacy Paradigm (Paperback): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Paperback)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R1,602 Discovery Miles 16 020 Ships in 10 - 15 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Enterprise Digital Transformation - Technology, Tools, and Use Cases (Paperback): Peter Augustine, Pethuru Raj, Sathyan... Enterprise Digital Transformation - Technology, Tools, and Use Cases (Paperback)
Peter Augustine, Pethuru Raj, Sathyan Munirathinam
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

Digital transformation (DT) has become a buzzword. Every industry segment across the globe is consciously jumping toward digital innovation and disruption to get ahead of their competitors. In other words, every aspect of running a business is being digitally empowered to reap all the benefits of the digital paradigm. All kinds of digitally enabled businesses across the globe are intrinsically capable of achieving bigger and better things for their constituents. Their consumers, clients, and customers will realize immense benefits with real digital transformation initiatives and implementations. The much-awaited business transformation can be easily and elegantly accomplished with a workable and winnable digital transformation strategy, plan, and execution. There are several enablers and accelerators for realizing the much-discussed digital transformation. There are a lot of digitization and digitalization technologies available to streamline and speed up the process of the required transformation. Industrial Internet of Things (IIoT) technologies in close association with decisive advancements in the artificial intelligence (AI) space can bring forth the desired transitions. The other prominent and dominant technologies toward forming digital organizations include cloud IT, edge/fog computing, real-time data analytics platforms, blockchain technology, digital twin paradigm, virtual and augmented reality (VR/AR) techniques, enterprise mobility, and 5G communication. These technological innovations are intrinsically competent and versatile enough to fulfill the varying requirements for establishing and sustaining digital enterprises. Enterprise Digital Transformation: Technology, Tools, and Use Cases features chapters on the evolving aspects of digital transformation and intelligence. It covers the unique competencies of digitally transformed enterprises, IIoT use cases, and applications. It explains promising technological solutions widely associated with digital innovation and disruption. The book focuses on setting up and sustaining smart factories that are fulfilling the Industry 4.0 vision that is realized through the IIoT and allied technologies.

Practical Security for Agile and DevOps (Paperback): Mark S. Merkow Practical Security for Agile and DevOps (Paperback)
Mark S. Merkow
R2,032 Discovery Miles 20 320 Ships in 10 - 15 working days

This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students' own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text's best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations

The Secret of Apollo - Systems Management in American and European Space Programs (Paperback, New edition): Stephen B. Johnson The Secret of Apollo - Systems Management in American and European Space Programs (Paperback, New edition)
Stephen B. Johnson
R934 Discovery Miles 9 340 Ships in 10 - 15 working days

How does one go about organizing something as complicated as a strategic-missile or space-exploration program? Stephen B. Johnson here explores the answer--systems management--in a groundbreaking study that involves Air Force planners, scientists, technical specialists, and, eventually, bureaucrats. Taking a comparative approach, Johnson focuses on the theory, or intellectual history, of "systems engineering" as such, its origins in the Air Force's Cold War ICBM efforts, and its migration to not only NASA but the European Space Agency.

Exploring the history and politics of aerospace development and weapons procurement, Johnson examines how scientists and engineers created the systems management process to coordinate large-scale technology development, and how managers and military officers gained control of that process. "Those funding the race demanded results," Johnson explains. "In response, development organizations created what few expected and what even fewer wanted--a bureaucracy for innovation. To begin to understand this apparent contradiction in terms, we must first understand the exacting nature of space technologies and the concerns of those who create them."

Nonlinear Optical Communication Networks (Hardcover): E. Iannone Nonlinear Optical Communication Networks (Hardcover)
E. Iannone
R4,828 Discovery Miles 48 280 Ships in 18 - 22 working days

What telecommunications professionals need to know about nonlinear optical communication systems
This book responds to the need for a coherent approach to nonlinear optical communication systems. It gives telecommunications researchers and engineers a handle on the unique problems presented by the proliferation of optical technologies in telecommunications in recent years and provides problem-solving strategies for various network functions and operations.
The product of a collaborative effort by four well-known researchers in telecommunications transmission systems, this volume covers design basics, network performance, and state-of-the-art system analysis tools and is supplemented with hundreds of illustrations as well as appendices containing the necessary mathematical derivations. It details:
* Design principles of the network transmission layer with optical technologies and fiber nonlinearities in place.
* Performance evaluation for a variety of optical transmission systems operating under nonlinear propagation regimes.
* Local area networks, regional networks, and geographical networks--their potential transmission capacity and possible problems.
* Examples of effective design from the most promising nonlinear optical transmission systems.
* The methodology for design and analysis of a generic system

Industry 4.0 - Challenges, Trends, and Solutions in Management and Engineering (Paperback): Carolina Machado, J. Paulo Davim Industry 4.0 - Challenges, Trends, and Solutions in Management and Engineering (Paperback)
Carolina Machado, J. Paulo Davim
R4,494 Discovery Miles 44 940 Ships in 10 - 15 working days

Industry 4.0 is a challenge for today's businesses. It's a concept that encompasses the technological innovations of automation, control, and information technology, as it's applied to manufacturing processes. It's a new topic that recently emerged in academia and industry, with few books that target both management and engineering. This book will cover the new advances and the way to manage competitive organizations. The chapters will include terms of theory, evidence, and/or methodology, and significantly advance social scientific research. This book: Focuses on the latest and most recent research findings occurring on the topic of Industry 4.0 Presents the ways companies around the world are facing today's technological challenges Assists researchers and practitioners in selecting the correct options and strategies to manage competitive organizations Provides recent advances in international studies Encompasses the main technological innovations in the fields of automation, control, and information technology applied to the manufacturing processes Industry 4.0: Challenges, Trends, and Solutions in Manangment and Engineering is designed to increase the knowledge and effectiveness of all managers and engineers in all organizations and activity sectors Carolina Machado has been teaching in the Human Resources Management subjects since 1989 at University of Minho, Portugal. She has been an associate professor since 2004, with experience and research interest areas in the field of Human Resource Management, International Human Resource Management, Human Resource Management in SMEs, Training and Development, Emotional Intelligence, Management Change, Knowledge Management, and Management/HRM in the Digital Age. She is head of the Department of Management and head of the Human Resources Management Work Group at University of Minho, as well as chief editor of the International Journal of Applied Management Sciences and Engineering (IJAMSE). J. Paulo Davim is a professor at the Department of Mechanical Engineering of the University of Aveiro, Portugal. He has more than 30 years of teaching and research experience in Manufacturing, Materials, Mechanical, and Industrial Engineering, with special emphasis in Machining & Tribology. He has also interest in Management, Engineering Education, and Higher Education for Sustainability. He has worked as evaluator of projects for ERC (European Research Council) and other international research agencies.

IT and European Bank Performance (Hardcover): E. Beccalli IT and European Bank Performance (Hardcover)
E. Beccalli
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

Does IT spending really boost bank performance? It is widely accepted that technological developments have had a major impact on reshaping both front- and back-office operations, but there still remains some doubt as to whether the massive spending on IT by banks has improved performance or productivity in this sector. Elena Beccalli provides a useful insight into the effects of IT investments on European bank performance, drawing on new empirical evidence that academics, bankers, and IT consultants alike will find to be a fascinating contribution to this ongoing strategic debate.

Embedded Systems Design for High-Speed Data Acquisition and Control (Hardcover, 2015 ed.): Maurizio Di Paolo Emilio Embedded Systems Design for High-Speed Data Acquisition and Control (Hardcover, 2015 ed.)
Maurizio Di Paolo Emilio
R3,918 Discovery Miles 39 180 Ships in 10 - 15 working days

This book serves as a practical guide for practicing engineers who need to design embedded systems for high-speed data acquisition and control systems. A minimum amount of theory is presented, along with a review of analog and digital electronics, followed by detailed explanations of essential topics in hardware design and software development. The discussion of hardware focuses on microcontroller design (ARM microcontrollers and FPGAs), techniques of embedded design, high speed data acquisition (DAQ) and control systems. Coverage of software development includes main programming techniques, culminating in the study of real-time operating systems. All concepts are introduced in a manner to be highly-accessible to practicing engineers and lead to the practical implementation of an embedded board that can be used in various industrial fields as a control system and high speed data acquisition system.

Architecture Principles - The Cornerstones of Enterprise Architecture (Hardcover, Edition.): Danny Greefhorst, Erik Proper Architecture Principles - The Cornerstones of Enterprise Architecture (Hardcover, Edition.)
Danny Greefhorst, Erik Proper
R3,987 Discovery Miles 39 870 Ships in 10 - 15 working days

Danny Greefhorst is a principal consultant and owner of ArchiXL, and works for clients in the financial and public sector. Danny acts as an IT architect and IT consultant, and is TOGAF 9 certified. He has extensive experience with the definition and implementation of enterprise architectures, application architectures and technical architectures. In addition, he coaches organizations in setting up and executing their architecture function, and is active as an instructor for several classes on architecture. Before starting ArchiXL he worked as a principal consultant at Yellowtail, as a senior IT architect at IBM Business Consulting Services and as a researcher at the Software Engineering Research Centre. Danny is active in the architecture community and regularly publishes on IT and architecture related topics. He is the chairman of the governing board of Via Nova Architectura, a portal and electronic magazine on enterprise architecture. He is also a member of the governing board of the architecture department of the Dutch Computer Science Association (Ngi).

Erik (H.A.) Proper is a senior research manager at the Public Research Centre -- Henri Tudor in Luxembourg, where he leads Services-oriented Enterprise Engineering programme. He also holds a chair in Information Systems at the Radboud University Nijmegen in the Netherlands. Erik has a mixed industrial and academic background. In the past, Erik worked for companies such as Asymetrix, InfoModeller, Origin, ID Research, Ordina and Capgemini, while interleaving this with his work at research institutions such as the Radboud University of Nijmegen, Queensland University of Technology, the Distributed Systems Technology Centre, and the University of Queensland. His general research drive is the modeling of systems. He applies this drive mainly in the fields of service science, enterprise modeling, enterprise engineering and enterprise architecting. He was co-initiator of the ArchiMate project, and currently also serves on the board of the ArchiMate forum of The Open Group. Erik is also one of the editors in chief of Springer's series on enterprise engineering.

Exploiting Linked Data and Knowledge Graphs in Large Organisations (Hardcover, 1st ed. 2017): Jeff Z. Pan, Guido Vetere, Jose... Exploiting Linked Data and Knowledge Graphs in Large Organisations (Hardcover, 1st ed. 2017)
Jeff Z. Pan, Guido Vetere, Jose Manuel Gomez- Perez, Honghan Wu
R4,997 Discovery Miles 49 970 Ships in 10 - 15 working days

This book addresses the topic of exploiting enterprise-linked data with a particular focus on knowledge construction and accessibility within enterprises. It identifies the gaps between the requirements of enterprise knowledge consumption and "standard" data consuming technologies by analysing real-world use cases, and proposes the enterprise knowledge graph to fill such gaps. It provides concrete guidelines for effectively deploying linked-data graphs within and across business organizations. It is divided into three parts, focusing on the key technologies for constructing, understanding and employing knowledge graphs. Part 1 introduces basic background information and technologies, and presents a simple architecture to elucidate the main phases and tasks required during the lifecycle of knowledge graphs. Part 2 focuses on technical aspects; it starts with state-of-the art knowledge-graph construction approaches, and then discusses exploration and exploitation techniques as well as advanced question-answering topics concerning knowledge graphs. Lastly, Part 3 demonstrates examples of successful knowledge graph applications in the media industry, healthcare and cultural heritage, and offers conclusions and future visions.

SystemVerilog for Design Second Edition - A Guide to Using SystemVerilog for Hardware Design and Modeling (Hardcover, 2nd ed.... SystemVerilog for Design Second Edition - A Guide to Using SystemVerilog for Hardware Design and Modeling (Hardcover, 2nd ed. 2006)
Stuart Sutherland; Foreword by P. Moorby; Simon Davidmann, Peter Flake
R6,016 Discovery Miles 60 160 Ships in 10 - 15 working days

SystemVerilog is a rich set of extensions to the IEEE 1364-2001 Verilog Hardware Description Language (Verilog HDL). These extensions address two major aspects of HDL-based design. First, modeling very large designs with concise, accurate, and intuitive code. Second, writing high-level test programs to efficiently and effectively verify these large designs. The first edition of this book addressed the first aspect of the SystemVerilog extensions to Verilog. Important modeling features were presented, such as two-state data types, enumerated types, user-degined types, structures, unions, and interfaces. Emphasis was placed on the proper usage of these enhancements for simulation and synthesis.

Grid Computing - The Savvy Manager's Guide (Paperback): Pawel Plaszczak, Richard Wellner Jr. Grid Computing - The Savvy Manager's Guide (Paperback)
Pawel Plaszczak, Richard Wellner Jr.
R1,276 Discovery Miles 12 760 Ships in 10 - 15 working days

A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.
Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company s culture.
Grid Computing has an Online Companion at www.savvygrid.com with contents, details, community forum, and latest updates for the material.
* Sketches the history of grid computing, showing how it made the leap from academia to business.
* Examines the criteria you'll need to meet to make your network "grid-enabled."
* Explains how a grid-based solution can be made to meet key organizational requirements, including security, scheduling, data storage, and fault-tolerance.
* Surveys the approaches currently available and helps you choose the one that will best meet your needs, both now and in the future.
* Focuses heavily on the competitive advantages you can reap from grid computing, and provides advice on convincing your organization to adopt grid computing and making a successful transition."

Explainable Artificial Intelligence for Smart Cities (Hardcover): Mohamed Lahby, Utku Kose, Akash Kumar Bhoi Explainable Artificial Intelligence for Smart Cities (Hardcover)
Mohamed Lahby, Utku Kose, Akash Kumar Bhoi
R3,092 Discovery Miles 30 920 Ships in 10 - 15 working days

Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of this book is to focus on Explainable Artificial Intelligence (XAI) in smart city development. As recently designed, advanced smart systems require intense use of complex computational solutions (i.e., Deep Learning, Big Data, IoT architectures), the mechanisms of these systems become 'black-box' to users. As this means that there is no clear clue about what is going on within these systems, anxieties regarding ensuring trustworthy tools also rise. In recent years, attempts have been made to solve this issue with the additional use of XAI methods to improve transparency levels. This book provides a timely, global reference source about cutting-edge research efforts to ensure the XAI factor in smart city-oriented developments. The book includes both positive and negative outcomes, as well as future insights and the societal and technical aspects of XAI-based smart city research efforts. This book contains nineteen contributions beginning with a presentation of the background of XAI techniques and sustainable smart-city applications. It then continues with chapters discussing XAI for Smart Healthcare, Smart Education, Smart Transportation, Smart Environment, Smart Urbanization and Governance, and Cyber Security for Smart Cities.

Cyberspace, Data Analytics, and Policing (Hardcover): David Skillicorn Cyberspace, Data Analytics, and Policing (Hardcover)
David Skillicorn
R2,135 Discovery Miles 21 350 Ships in 10 - 15 working days

Cyberspace is changing the face of crime. For criminals it has become a place for rich collaboration and learning, not just within one country; and a place where new kinds of crimes can be carried out, and a vehicle for committing conventional crimes with unprecedented range, scale, and speed. Law enforcement faces a challenge in keeping up and dealing with this new environment. The news is not all bad - collecting and analyzing data about criminals and their activities can provide new levels of insight into what they are doing and how they are doing it. However, using data analytics requires a change of process and new skills that (so far) many law enforcement organizations have had difficulty leveraging. Cyberspace, Data Analytics, and Policing surveys the changes that cyberspace has brought to criminality and to policing with enough technical content to expose the issues and suggest ways in which law enforcement organizations can adapt. Key Features: Provides a non-technical but robust overview of how cyberspace enables new kinds of crime and changes existing crimes. Describes how criminals exploit the ability to communicate globally to learn, form groups, and acquire cybertools. Describes how law enforcement can use the ability to collect data and apply analytics to better protect society and to discover and prosecute criminals. Provides examples from open-source data of how hot spot and intelligence-led policing can benefit law enforcement. Describes how law enforcement can exploit the ability to communicate globally to collaborate in dealing with trans-national crime.

Blockchain and IoT Integration - Approaches and Applications (Hardcover): Kavita Saini Blockchain and IoT Integration - Approaches and Applications (Hardcover)
Kavita Saini
R3,091 Discovery Miles 30 910 Ships in 10 - 15 working days

As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems

The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Paperback, 4th... The CPHIMS Review Guide, 4th Edition - Preparing for Success in Healthcare Information and Management Systems (Paperback, 4th edition)
Mara Daiker; Healthcare Information & Management Systems Society (HIMSS)
R4,782 Discovery Miles 47 820 Ships in 10 - 15 working days

Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

Embedded Systems Security - Practical Methods for Safe and Secure Software and Systems Development (Paperback): David... Embedded Systems Security - Practical Methods for Safe and Secure Software and Systems Development (Paperback)
David Kleidermacher, Mike Kleidermacher
R1,323 Discovery Miles 13 230 Ships in 10 - 15 working days

The ultimate resource for making embedded systems reliable, safe, and secure

Embedded Systems Security provides:

A broad understanding of security principles, concerns, and technologies

Proven techniques for the efficient development of safe and secure embedded software

A study of the system architectures, operating systems and hypervisors, networking, storage, and cryptographic issues that must be considered when designing secure embedded systems

Nuggets of practical advice and numerous case studies throughout

Written by leading authorities in the field with 65 years of embedded security experience: one of the original developers of the world s only Common Criteria EAL 6+ security certified software product and a lead designer of NSA certified cryptographic systems.

This book is indispensable for embedded systems and security professionals, new and experienced.

An important contribution to the understanding of the security of embedded systems. The Kleidermachers are experts in their field. As the Internet of things becomes reality, this book helps business and technology management as well as engineers understand the importance of "security from scratch." This book, with its examples and key points, can help bring more secure, robust systems to the market.

Dr. Joerg Borchert, Vice President, Chip Card & Security, Infineon Technologies North America Corp.; President and Chairman, Trusted Computing Group

Embedded Systems Security provides real-world examples of risk and exploitation; most importantly the book offers clear insight into methods used to counter vulnerabilities to build true, native security into technology.

Adriel Desautels, President and CTO, Netragard, LLC.

Security of embedded systems is more important than ever. The growth in networking is just one reason. However, many embedded systems developers have insufficient knowledge of how to achieve security in their systems. David Kleidermacher, a world-renowned expert in this field, shares in this book his knowledge and long experience with other engineers. A very important book at the right time.

Prof. Dr.-Ing. Matthias Sturm, Leipzig University of Applied Sciences; Chairman, Embedded World Conference steering board
Gainan understanding of the operating systems, microprocessors, and network security critical issues that must be considered when designing secure embedded systemsContains nuggets of practical and simple advice on critical issues highlightedthroughout the textShort and to -the- point real case studies included to demonstrate embedded systems security in practice"

Internet of Things - Energy, Industry, and Healthcare (Hardcover): Arun Kumar Rana, Ayodeji Olalekan Salau, Sharad Sharma,... Internet of Things - Energy, Industry, and Healthcare (Hardcover)
Arun Kumar Rana, Ayodeji Olalekan Salau, Sharad Sharma, Shubham Tayal, Swati Gupta
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

Reviews IoT software architecture and middleware, data processing and management, security, privacy and reliability, architectures, protocols, technologies, algorithms, and smart objects, sensors, and actuators Explores IoT as it applies to energy, including energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues Examines IoT as it applies to healthcare including biomedical image and signal analysis, and disease prediction and diagnosis Examines IoT as it applies to smart industry including architecture, blockchain, and Industry 4.0 Discusses different ways to create a better IoT network or IoT platform

Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover): Karl Cox Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Hardcover)
Karl Cox
R4,346 Discovery Miles 43 460 Ships in 10 - 15 working days

IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.

High Performance Computing for Intelligent Medical Systems (Hardcover): Varun Bajaj, Irshad Ahmad Ansari High Performance Computing for Intelligent Medical Systems (Hardcover)
Varun Bajaj, Irshad Ahmad Ansari
R3,266 Discovery Miles 32 660 Ships in 10 - 15 working days
Smart Sensor Networks Using AI for Industry 4.0 - Applications and New Opportunities (Hardcover): Soumya Ranjan Nayak, Biswa... Smart Sensor Networks Using AI for Industry 4.0 - Applications and New Opportunities (Hardcover)
Soumya Ranjan Nayak, Biswa Mohan Sahoo, Muthukumaran Malarvel, Jibitesh Mishra
R3,655 Discovery Miles 36 550 Ships in 10 - 15 working days

Provides a structured look, at the unique characteristic for smart sensor networks to resolving the issues of many real-world applications in a broad range of areas such as Smart Healthcare, Engineering, Scientific Research, Social Media, Industrial Automation and more Offers a systematic look at the unique characteristics of AI based wireless sensor networks through their usage in a broad range of areas Delivers recent trends and core concepts in both analytics and application in smart sensor networks using AI Explores the development and application of AI and evolutionary computing as applied to wireless sensor networks Focuses on stepwise discussion, exhaustive literature review, detailed analysis and discussion, rigorous experimentation result and an application-oriented approach.

Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover): Ann M. Butera Say What!? Communicate with Tact and Impact - What to Say to Get Results at Any Point in an Audit (Hardcover)
Ann M. Butera
R1,990 Discovery Miles 19 900 Ships in 10 - 15 working days

This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.

Securing Mobile Devices and Technology (Paperback): Kutub Thakur, Al-Sakib Khan Pathan Securing Mobile Devices and Technology (Paperback)
Kutub Thakur, Al-Sakib Khan Pathan
R1,663 Discovery Miles 16 630 Ships in 10 - 15 working days

This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.

Modelling Transitions - Virtues, Vices, Visions of the Future (Paperback): Enayat A. Moallemi, Fjalar J de Haan Modelling Transitions - Virtues, Vices, Visions of the Future (Paperback)
Enayat A. Moallemi, Fjalar J de Haan
R1,388 Discovery Miles 13 880 Ships in 10 - 15 working days

Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
PowerShell - The Ultimate Beginners…
Mark Reed Hardcover R567 R521 Discovery Miles 5 210
A Hobbyist's Guide to THEA500 Mini
Holger Wessling Hardcover R929 Discovery Miles 9 290
Edsger Wybe Dijkstra - His Life, Work…
Krzysztof R. Apt, Tony Hoare Hardcover R2,920 Discovery Miles 29 200
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin Paperback R2,896 Discovery Miles 28 960
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright Paperback R1,491 Discovery Miles 14 910
Canon EOS 5D Mark IV Camera User Guide…
Mike Jacobs Paperback R249 R75 Discovery Miles 750
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
A Primer For Disaster Recovery Planning…
Charlotte J. Haitt Paperback R1,409 Discovery Miles 14 090
TI-83 Plus Calculator
BarCharts Inc Fold-out book or chart R229 Discovery Miles 2 290
Media Ownership and Concentration in…
Eli M. Noam Hardcover R3,786 Discovery Miles 37 860

 

Partners