0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (47)
  • R250 - R500 (215)
  • R500+ (8,035)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

A Guide to Unix Using Linux (CD-ROM, 4th edition): Michael Palmer A Guide to Unix Using Linux (CD-ROM, 4th edition)
Michael Palmer
R1,245 R1,163 Discovery Miles 11 630 Save R82 (7%) Ships in 10 - 15 working days

Written with a clear, straightforward writing style and packed with step-by-step projects for direct, hands-on learning, Guide to UNIX Using Linux, 4E is the perfect resource for learning UNIX and Linux from the ground up. Through the use of practical examples, end-of-chapter reviews, and interactive exercises, novice users are transformed into confident UNIX/Linux users who can employ utilities, master files, manage and query data, create scripts, access a network or the Internet, and navigate popular user interfaces and software. The updated 4th edition incorporates coverage of the latest versions of UNIX and Linux, including new versions of Red Hat, Fedora, SUSE, and Uuntu Linux. A new chapter has also been added to cover basic networking utilities, and several other chapters have been expanded to include additional information on the KDE and GNOME desktops, as well as coverage of the popular OpenOffice.org office suite. With a strong focus on universal UNIX and Linux commands that are transferable to all versions of Linux, this book is a "must-have" for anyone seeking to develop their knowledge of these systems.

Enterprise Digital Transformation - Technology, Tools, and Use Cases (Paperback): Peter Augustine, Pethuru Raj, Sathyan... Enterprise Digital Transformation - Technology, Tools, and Use Cases (Paperback)
Peter Augustine, Pethuru Raj, Sathyan Munirathinam
R1,467 Discovery Miles 14 670 Ships in 10 - 15 working days

Digital transformation (DT) has become a buzzword. Every industry segment across the globe is consciously jumping toward digital innovation and disruption to get ahead of their competitors. In other words, every aspect of running a business is being digitally empowered to reap all the benefits of the digital paradigm. All kinds of digitally enabled businesses across the globe are intrinsically capable of achieving bigger and better things for their constituents. Their consumers, clients, and customers will realize immense benefits with real digital transformation initiatives and implementations. The much-awaited business transformation can be easily and elegantly accomplished with a workable and winnable digital transformation strategy, plan, and execution. There are several enablers and accelerators for realizing the much-discussed digital transformation. There are a lot of digitization and digitalization technologies available to streamline and speed up the process of the required transformation. Industrial Internet of Things (IIoT) technologies in close association with decisive advancements in the artificial intelligence (AI) space can bring forth the desired transitions. The other prominent and dominant technologies toward forming digital organizations include cloud IT, edge/fog computing, real-time data analytics platforms, blockchain technology, digital twin paradigm, virtual and augmented reality (VR/AR) techniques, enterprise mobility, and 5G communication. These technological innovations are intrinsically competent and versatile enough to fulfill the varying requirements for establishing and sustaining digital enterprises. Enterprise Digital Transformation: Technology, Tools, and Use Cases features chapters on the evolving aspects of digital transformation and intelligence. It covers the unique competencies of digitally transformed enterprises, IIoT use cases, and applications. It explains promising technological solutions widely associated with digital innovation and disruption. The book focuses on setting up and sustaining smart factories that are fulfilling the Industry 4.0 vision that is realized through the IIoT and allied technologies.

The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Hardcover): Yves Caseau The Lean Approach to Digital Transformation - From Customer to Code and From Code to Customer (Hardcover)
Yves Caseau
R3,372 Discovery Miles 33 720 Ships in 10 - 15 working days

The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly "customer-centric", from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation - called "exponential information system" to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software "micro-factories" that produce service platforms, which are called "Lean software factories." This "software factory" concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the "lean approach to digital transformation" because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation.

Asynchronous On-Chip Networks and Fault-Tolerant Techniques (Hardcover): Wei Song, Guangda Zhang Asynchronous On-Chip Networks and Fault-Tolerant Techniques (Hardcover)
Wei Song, Guangda Zhang
R2,360 Discovery Miles 23 600 Ships in 10 - 15 working days

Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications. As a promising alternative to the widely used synchronous on-chip networks for multicore processors, asynchronous on-chip networks can be vulnerable to faults even if they can deliver the same performance with much lower energy and area compared with their synchronous counterparts - faults can not only corrupt data transmission but also cause a unique type of deadlock. By adopting a new redundant code along with a dynamic fault detection and recovery scheme, the authors demonstrate that asynchronous on-chip networks can be efficiently hardened to tolerate both transient and permanent faults and overcome fault-caused deadlocks. This book will serve as an essential guide for researchers and students studying interconnection networks, fault-tolerant computing, asynchronous system design, circuit design and on-chip networking, as well as for professionals interested in designing fault-tolerant and high-throughput asynchronous circuits.

The Big Book of Drones (Hardcover): Ralph DeFrangesco, Stephanie DeFrangesco The Big Book of Drones (Hardcover)
Ralph DeFrangesco, Stephanie DeFrangesco
R1,871 Discovery Miles 18 710 Ships in 10 - 15 working days

Drones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist. For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down. Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.

Applications And Trends In Fintech Ii: Cloud Computing, Compliance, And Global Fintech Trends (Hardcover): David Kuo Chuen Lee,... Applications And Trends In Fintech Ii: Cloud Computing, Compliance, And Global Fintech Trends (Hardcover)
David Kuo Chuen Lee, Joseph Lim, Kok Fai Phoon, Yu Wang
R2,376 Discovery Miles 23 760 Ships in 18 - 22 working days

This book is the second part of Applications and Trends in Fintech, which serves as a comprehensive guide to the advanced topics in fintech, including the deep learning and natural language processing algorithms, blockchain design thinking, token economics, cybersecurity, cloud computing and quantum computing, compliance and risk management, and global fintech trends. Readers will gain knowledge about the applications of fintech in finance and its latest developments as well as trends.This fifth volume covers global fintech trends and emerging technologies such as cloud computing and quantum computing, as well as the compliance and risk management frameworks for fintech companies. Together with the first part in applications and trends (fourth volume), these two books will deepen readers' understanding of the fintech fundamentals covered in previous volumes through various applications and analysis of impacts and trends.Bundle set: Global Fintech Institute-Chartered Fintech Professional Set I

The Integrator - A Change Management Framework for Achieving Agile IT Project Success (Paperback): Scott Coplan The Integrator - A Change Management Framework for Achieving Agile IT Project Success (Paperback)
Scott Coplan
R1,350 Discovery Miles 13 500 Ships in 10 - 15 working days

When a $145 million IT project failure pushes Los Angeles to the edge of financial meltdown, the County CEO asks Max McLellan, a harried IT project manager, aka The Integrator, for help. The County Board gives Max 30 days to identify the problem and find a solution. At first Max finds the usual missteps, but something bigger and darker beckons, an explosive source of project failure. He must do something different, rattling ghosts of previous County IT failures, uncloaking crookedness, and exposing truths that shatter careers. With some people rooting for his failure, Max battles to fit all the pieces together with the County team, applying his proven framework to define the problem, plan a solution and execute it successfully. It's common knowledge that barely 50% of IT projects succeed, per a 2017 Project Management Institute report. Equally well-known, approximately 70% of large-scale change management initiatives fail according to a 2017 McKinsey & Co. report. Given the challenge to overcome these low success rates, The Integrator offers a proven narrative on the organizational change framework for achieving Agile IT project management success based on the author's 45+ year client experiences and published research. The Integrator defines change management as the single overarching methodology integrating Agile IT and project management. It does this because all projects are about change - significant organizational and personal change. The people involved - their participation in and understanding and support of these changes - ultimately determine IT projects success or failure. In fact, while all IT projects are about change, successful projects change human behavior. The methodologies included in the framework, described in The Integrator, include: * Change management as defined by AIM (Accelerating Implementation Methodology). * Project management as defined by the Project Management Institute (PMI) Guide to the Project Management Body of Knowledge (PMBOK Guide) standard. * IT management as derived from the Institute of Electrical Engineers (IEEE) Guide to the Software Engineering Body of Knowledge (SWEBOK) standard. * Agile as defined by the Agile Alliance's Agile Manifesto. Written by a certified Project Management Professional and accredited change management practitioner, The Integrator chronicles the challenges involved in applying this framework in a real-world setting to achieve successful project implementation.

An Introduction to Design Science (Hardcover, 2nd ed. 2021): Paul Johannesson, Erik Perjons An Introduction to Design Science (Hardcover, 2nd ed. 2021)
Paul Johannesson, Erik Perjons
R1,758 Discovery Miles 17 580 Ships in 18 - 22 working days

This book is an introductory text on design science, intended to support both graduate students and researchers in structuring, undertaking and presenting design science work. It builds on established design science methods as well as recent work on presenting design science studies and ethical principles for design science, and also offers novel instruments for visualizing the results, both in the form of process diagrams and through a canvas format. While the book does not presume any prior knowledge of design science, it provides readers with a thorough understanding of the subject and enables them to delve into much deeper detail, thanks to extensive sections on further reading. Design science in information systems and technology aims to create novel artifacts in the form of models, methods, and systems that support people in developing, using and maintaining IT solutions. This work focuses on design science as applied to information systems and technology, but it also includes examples from, and perspectives of, other fields of human practice. Chapter 1 provides an overview of design science and outlines its ties with empirical research. Chapter 2 discusses the various types and forms of knowledge that can be used and produced by design science research, while Chapter 3 presents a brief overview of common empirical research strategies and methods. Chapter 4 introduces a methodological framework for supporting researchers in doing design science research as well as in presenting their results. This framework includes five core activities, which are described in detail in Chapters 5 to 9. Chapter 10 discusses how to communicate design science results, while Chapter 11 compares the proposed methodological framework with methods for systems development and shows how they can be combined. Chapter 12 discusses how design science relates to research paradigms, in particular to positivism and interpretivism, and Chapter 13 discusses ethical issues and principles for design science research. The new Chapter 14 showcases a study on digital health consultations and illustrates the whole process in one comprehensive example. Also added to this 2nd edition are a number of sections on practical guidelines for carrying out basic design science tasks, a discussion on design thinking and its relationship to design science, and the description of artefact classifications. Eventually, both the references in each chapter and the companion web site were updated to reflect recent findings.

Explainable Artificial Intelligence for Smart Cities (Hardcover): Mohamed Lahby, Utku Kose, Akash Kumar Bhoi Explainable Artificial Intelligence for Smart Cities (Hardcover)
Mohamed Lahby, Utku Kose, Akash Kumar Bhoi
R2,951 Discovery Miles 29 510 Ships in 10 - 15 working days

Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of this book is to focus on Explainable Artificial Intelligence (XAI) in smart city development. As recently designed, advanced smart systems require intense use of complex computational solutions (i.e., Deep Learning, Big Data, IoT architectures), the mechanisms of these systems become 'black-box' to users. As this means that there is no clear clue about what is going on within these systems, anxieties regarding ensuring trustworthy tools also rise. In recent years, attempts have been made to solve this issue with the additional use of XAI methods to improve transparency levels. This book provides a timely, global reference source about cutting-edge research efforts to ensure the XAI factor in smart city-oriented developments. The book includes both positive and negative outcomes, as well as future insights and the societal and technical aspects of XAI-based smart city research efforts. This book contains nineteen contributions beginning with a presentation of the background of XAI techniques and sustainable smart-city applications. It then continues with chapters discussing XAI for Smart Healthcare, Smart Education, Smart Transportation, Smart Environment, Smart Urbanization and Governance, and Cyber Security for Smart Cities.

Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback): Uttam Ghosh, Danda B. Rawat, Raja Datta,... Internet of Things and Secure Smart Environments - Successes and Pitfalls (Paperback)
Uttam Ghosh, Danda B. Rawat, Raja Datta, Al-Sakib Khan Pathan
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

The main goal of Internet of Things (IoT) is to make secure, reliable, and fully automated smart environments. However, there are many technological challenges in deploying IoT. This includes connectivity and networking, timeliness, power and energy consumption dependability, security and privacy, compatibility and longevity, and network/protocol standards. Internet of Things and Secure Smart Environments: Successes and Pitfalls provides a comprehensive overview of recent research and open problems in the area of IoT research. Features: Presents cutting edge topics and research in IoT Includes contributions from leading worldwide researchers Focuses on IoT architectures for smart environments Explores security, privacy, and trust Covers data handling and management (accumulation, abstraction, storage, processing, encryption, fast retrieval, security, and privacy) in IoT for smart environments This book covers state-of-the-art problems, presents solutions, and opens research directions for researchers and scholars in both industry and academia.

Cloud Data Centers and Cost Modeling - A Complete Guide To Planning, Designing and Building a Cloud Data Center (Paperback):... Cloud Data Centers and Cost Modeling - A Complete Guide To Planning, Designing and Building a Cloud Data Center (Paperback)
Caesar Wu, Rajkumar Buyya
R2,409 R2,146 Discovery Miles 21 460 Save R263 (11%) Ships in 10 - 15 working days

Cloud Data Centers and Cost Modeling establishes a framework for strategic decision-makers to facilitate the development of cloud data centers. Just as building a house requires a clear understanding of the blueprints, architecture, and costs of the project; building a cloud-based data center requires similar knowledge. The authors take a theoretical and practical approach, starting with the key questions to help uncover needs and clarify project scope. They then demonstrate probability tools to test and support decisions, and provide processes that resolve key issues. After laying a foundation of cloud concepts and definitions, the book addresses data center creation, infrastructure development, cost modeling, and simulations in decision-making, each part building on the previous. In this way the authors bridge technology, management, and infrastructure as a service, in one complete guide to data centers that facilitates educated decision making.

Continuous Delivery 2.0 - Business-leading DevOps Essentials (Hardcover): Qiao Liang Continuous Delivery 2.0 - Business-leading DevOps Essentials (Hardcover)
Qiao Liang
R2,551 Discovery Miles 25 510 Ships in 10 - 15 working days

The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. It seems like most of the companies starting an agile transformation never reach the goal of agility, but there are those few that truly become agile and reap incredible benefits by utilizing DevOps as well. This book introduces the theory and practice of the "double-flywheels model" of Continuous Delivery 2.0: Discovery Loop, which allows information technology (IT) organizations to help businesses figure out the most efficacious ways to develop. Additionally, it explores applications of the Verification Loop that allows IT organizations to deliver value quickly and safely with high quality. Along the way, the book provides an array of insights and case studies that dive into all the aspects of software delivery, and how to implement Continuous Delivery in the most economical way for long-run business development. Features Organization culture and software architecture Business requirement management Pipeline and tooling Branching and releasing strategy Automation strategy Configuration and artefacts management Deployment and production healthy The case studies at the end of the book-scenarios in which the author was personally involved-are explored in depth and meticulously detailed in order to represent typical agile transition scenarios that will benefit all readers.

Next-Generation Enterprise Security and Governance (Hardcover): Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland Next-Generation Enterprise Security and Governance (Hardcover)
Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland
R2,573 Discovery Miles 25 730 Ships in 10 - 15 working days

The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises' advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today's age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance. Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network. In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.

Cloud Computing Networking - Theory, Practice, and Development (Hardcover): Lee Chao Cloud Computing Networking - Theory, Practice, and Development (Hardcover)
Lee Chao
R2,790 Discovery Miles 27 900 Ships in 9 - 17 working days

Cloud computing is the most significant technology transformation since the introduction of the Internet in the early 1990s. As more and more companies and educational institutions plan to adopt a cloud-based IT infrastructure, today's job market requires IT professionals who understand cloud computing and have hands-on experience developing cloud-based networks. Cloud Computing Networking: Theory, Practice, and Development covers the key networking and system administration concepts as well as the vital hands-on skills you need to master cloud technology. This book is designed to help you quickly get started in deploying cloud services for a real-world business. It provides detailed step-by-step instructions for creating a fully functioning cloud-based IT infrastructure using the Microsoft Azure cloud platform. In this environment, you can develop cloud services collaboratively or individually. The book enhances your hands-on skills through numerous lab activities. In these lab activities, you will learn to Implement the following services in a cloud environment: Active Directory, DHCP, DNS, and Certificate Services Configure Windows Server so it can route IP traffic Implement IP Security Policy and Windows Firewall with Advanced Security tools Create a point-to-site connection between Microsoft Azure and a local computer Create a site-to-site connection between Microsoft Azure and an on-premises network Develop a hybrid cloud that integrates Microsoft Azure with a private cloud created on a local network Cloud Computing Networking: Theory, Practice, and Development includes numerous examples, figures, and screen shots to help you understand the information. Each chapter concludes with a summary of the major topics and a set of review questions. With this book, you will soon have the critical knowledge and skills to develop and manage cloud-based networks.

The Debates Shaping Spectrum Policy (Hardcover): Martin Sims The Debates Shaping Spectrum Policy (Hardcover)
Martin Sims
R2,353 Discovery Miles 23 530 Ships in 10 - 15 working days

What debates have caused spectrum policy to change course and which will determine its future direction? This book examines these issues through a series of chapters from a range of notable experts. The backdrop is a period of turbulent change in what was once a quiet backwater. The past quarter century has seen wireless connectivity go from nice-to-have luxury to the cornerstone of success as nations battle for leadership of the digital economy. The change has been reflected in the crucial role now played by market's mechanisms in a field once dominated by administrative decisions. Spectrum policy's goals have moved far beyond the efficient use of the airwaves to include encouraging economic development, investment, innovation, sustainability and digital inclusivity. Are historic procedures still appropriate in the face of this multiplicity of demands? Are market mechanisms like auctions still the best way to deliver what has become essential infrastructure? Does the process of international coordination need to change? Is spectrum policy's effectiveness limited by the power of global economic forces? Can it reduce rather than add to global warming? Where does 6G and AI fit in? Is public perception the new spectrum policy battle ground? These are all issues examined in The Debates Shaping Spectrum Policy.

Security and its Challenges in the 21st Century (Hardcover): C Guerrier Security and its Challenges in the 21st Century (Hardcover)
C Guerrier
R3,736 Discovery Miles 37 360 Ships in 10 - 15 working days

By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society. This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020's California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.

The Security Hippie (Paperback): Barak Engel The Security Hippie (Paperback)
Barak Engel
R1,118 Discovery Miles 11 180 Ships in 10 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover): Gizem Ozbayrac Enterprise Agility - A Practical Guide to Agile Business Management (Hardcover)
Gizem Ozbayrac
R3,218 Discovery Miles 32 180 Ships in 10 - 15 working days

Despite the astonishing technological developments in our times, it is surprising how little has changed in the way organizations are structured and managed. However, organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies, Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility, including applied processes, lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution, project agility and describes how waterfall project management is transformed into scrum, which can have positive effects on project timelines, scope and budget, as well as team motivation. The second phase of agility, organizational agility, is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility, including structures, roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally, the latest phase, enterprise agility, transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales, marketing, HR, finance etc.) and by presenting the positive impact generated on the company's overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author's over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey, with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development, it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility.

Making Data Work - Enabling Digital Transformation, Empowering People and Advancing Organisational Success (Hardcover): Edosa... Making Data Work - Enabling Digital Transformation, Empowering People and Advancing Organisational Success (Hardcover)
Edosa Odaro
R3,235 Discovery Miles 32 350 Ships in 10 - 15 working days

In this book, Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption-fear. Fear of the unknown, fear of the intangible, fear of the investment needed and, yes, fear of losing your job to a machine. With his talent for distilling clarity from complexity, Edosa tackles this and many other challenges. -Tim Carmichael, Chief Data Officer, Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data, information and knowledge across organisations. Yet, rather than being stuck with endless polarising debates such as breaking down silos, it shifts focus back towards the ultimate "to what end." -Jacky Wright, Chief Digital Officer (CDO), Microsoft US If you care about AI transformation, empowering people or advancing organisational success in an increasingly digital world, then you should read this book. -Yomi Ibosiola, Chief Data and Analytics Officer, Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when-at the end of a critical investment in an artificial intelligence project that had been meant to save money-it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer's production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to "make data work" for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation, empower people, and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes, where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities.

Advances in Applications of Computational Intelligence and the Internet of Things - Cryptography and Network Security in IoT... Advances in Applications of Computational Intelligence and the Internet of Things - Cryptography and Network Security in IoT (Hardcover)
Rajdeep Chowdhury, S. K. Niranjan
R3,813 Discovery Miles 38 130 Ships in 10 - 15 working days

This new volume illustrates the diverse applications of IoT. The volume addresses the crucial issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. The volume looks at the application of IoT in medical technology and healthcare, including the design of IoT-based mobile healthcare units and a blockchain technique based smart health record system. Other topics include a blended IoT-enabled learning approach through a study employing clustering techniques, an IoT-enabled garbage disposal system with an advanced message notification system through an android application, IoT-based self-healing concrete that uses bacteria and environmental waste, an IoT-enabled trash-the-ash application that regulates flow, and more. The fresh and innovative advances that demonstrate computational intelligence and IoT in practice that are discussed in this volume will be informative for academicians, scholars, scientists, industry professionals, policymakers, government and non-government organizations, and others.

Stochastic Networked Control Systems - Stabilization and Optimization under Information Constraints (Hardcover, 2013 ed.):... Stochastic Networked Control Systems - Stabilization and Optimization under Information Constraints (Hardcover, 2013 ed.)
Serdar Yuksel, Tamer Basar
R4,094 Discovery Miles 40 940 Ships in 18 - 22 working days

Networked control systems are increasingly ubiquitous today, with applications ranging from vehicle communication and adaptive power grids to space exploration and economics. The optimal design of such systems presents major challenges, requiring tools from various disciplines within applied mathematics such as decentralized control, stochastic control, information theory, and quantization.

A thorough, self-contained book, "Stochastic Networked Control Systems: Stabilization and Optimization under Information Constraints" aims to connect these diverse disciplines with precision and rigor, while conveying design guidelines to controller architects. Unique in the literature, it lays a comprehensive theoretical foundation for the study of networked control systems, and introduces an array of concrete tools for work in the field. Salient features included:

. Characterization, comparison and optimal design of information structures in static and dynamic teams. Operational, structural and topological properties of information structures in optimal decision making, with a systematic program for generating optimal encoding and control policies. The notion of signaling, and its utilization in stabilization and optimization of decentralized control systems.

. Presentation of mathematical methods for stochastic stability of networked control systems using random-time, state-dependent drift conditions and martingale methods.

. Characterization and study of information channels leading to various forms of stochastic stability such as stationarity, ergodicity, and quadratic stability; and connections with information and quantization theories. Analysis of various classes of centralized and decentralized control systems.

. Jointly optimal design of encoding and control policies over various information channels and under general optimization criteria, including a detailed coverage of linear-quadratic-Gaussian models.

. Decentralized agreement and dynamic optimization under information constraints.

This monograph is geared toward a broad audience of academic and industrial researchers interested in control theory, information theory, optimization, economics, and applied mathematics. It could likewise serve as a supplemental graduate text. The reader is expected to have some familiarity with linear systems, stochastic processes, and Markov chains, but the necessary background can also be acquired in part through the four appendices included at the end.

. Characterization, comparison and optimal design of information structures in static and dynamic teams. Operational, structural and topological properties of information structures in optimal decision making, with a systematic program for generating optimal encoding and control policies. The notion of signaling, and its utilization in stabilization and optimization of decentralized control systems.

. Presentation of mathematical methods for stochastic stability of networked control systems using random-time, state-dependent drift conditions and martingale methods.

. Characterization and study of information channels leading to various forms of stochastic stability such as stationarity, ergodicity, and quadratic stability; and connections with information and quantization theories. Analysis of various classes of centralized and decentralized control systems.

. Jointly optimal design of encoding and control policies over various information channels and under general optimization criteria, including a detailed coverage of linear-quadratic-Gaussian models.

. Decentralized agreement and dynamic optimization under information constraints.

This monograph is geared toward a broad audience of academic and industrial researchers interested in control theory, information theory, optimization, economics, and applied mathematics. It could likewise serve as a supplemental graduate text. The reader is expected to have some familiarity with linear systems, stochastic processes, and Markov chains, but the necessary background can also be acquired in part through the four appendices included at the end.

Cloud Computing Solutions Architect - A Hands-On Approach: A Competency-based Textbook for Universities and a Guide for AWS... Cloud Computing Solutions Architect - A Hands-On Approach: A Competency-based Textbook for Universities and a Guide for AWS Cloud Certification and Beyond (Hardcover)
Arshdeep Bahga, Vijay Madisetti
R2,301 Discovery Miles 23 010 Ships in 18 - 22 working days
Social Networking Communities and e-Dating Services - Concepts and Implications (Hardcover): Celia T. Romm, Kristina Setzekorn Social Networking Communities and e-Dating Services - Concepts and Implications (Hardcover)
Celia T. Romm, Kristina Setzekorn
R4,973 Discovery Miles 49 730 Ships in 18 - 22 working days

E-dating is now among the largest global e-commerce sectors, allowing for interaction that was once not possible. Despite its dominance in the e-commerce market and society, it is almost completely absent from the information systems research literature. Social Networking Communities and E-Dating Services: Concepts and Implications rectifies the absence of e-dating literature in the academic community by incorporating research from around the world, addressing the many aspects of e-dating and establishing it as a new research discipline. This unique collection of high quality international articles contributes toward the legitimization of e-dating as an area of research in e-commerce.

Economic and Business Management (Hardcover): Xiaoxia Huang, Feng Zhang Economic and Business Management (Hardcover)
Xiaoxia Huang, Feng Zhang
R4,365 Discovery Miles 43 650 Ships in 10 - 15 working days

With the rapid development and drastic change of the world economy, "Digital Finance", "Internet Finance", "Science and Technology Finance" have become new hotspots, which also represent the future trend of economy development in the era of big data. Enterprises are facing more uncertainty, opportunities coexist with challenges. There are more possibilities for economic development and enterprise management to accelerate the integration of cutting-edge research results, to deepen hot topics discussion and to promote opinion exchanges among academic and business circles. The Sixth International Conference on Economic and Business Management (FEBM2021) was successfully held online on October 16-17, 2021, and aimed to provide a platform for researchers, engineers, academics as well as industry professionals from all over the world to present their latest research findings and development activities in economic and business management. These proceedings include 51 accepted articles selected from 94 submissions.

Social Media and the Contemporary City (Hardcover): Eric Sauda, Ginette Wessel, Alireza Karduni Social Media and the Contemporary City (Hardcover)
Eric Sauda, Ginette Wessel, Alireza Karduni
R4,210 Discovery Miles 42 100 Ships in 10 - 15 working days

The widespread adoption of smartphones has led to an explosion of mobile social media data, more than a billion messages per day that continuously track location, content, and time. Social Media in the Contemporary City focuses on the effects of social media on local communities and urban space in a variety of political and economic settings related to social activism, informal economic activity, public art, and global extremism. The book covers events ranging from Banksy art installations, mobile food trucks, and underground restaurants, to a Black Lives Matter protest, the Christchurch mosque shootings, and the Pulse nightclub shooting. The interplay between urban space, local community, and social media in each case study requires diverse methodologies that are both computational (i.e. machine learning, social network analysis, and natural language processing) and ethnographic (i.e. semi-structured interviews, thematic analysis, and site analysis). The book views social media not as a replacement for the local community or urban space but rather as a translation of the uses and meanings of all three realms. The book will be of interest to students, researchers, and instructors in a number of disciplines including urban design/planning, media studies, geography, and communications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Confronting Inequality - The South…
Michael Nassen Smith Paperback R293 Discovery Miles 2 930
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R160 R143 Discovery Miles 1 430
100 Mandela Moments
Kate Sidley Paperback R260 R232 Discovery Miles 2 320
Light Through The Bars - Understanding…
Babychan Arackathara Paperback R30 R28 Discovery Miles 280
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, … Paperback R350 R317 Discovery Miles 3 170
Rebels And Rage - Reflecting On…
Adam Habib Paperback R325 Discovery Miles 3 250
The Colonizer And The Colonized
Albert Memmi Paperback R303 Discovery Miles 3 030
A Tango With Death - Tolletjie Botha And…
Giancarlo Coccia Paperback R566 Discovery Miles 5 660
40 Lives In 40 Days - Experiencing God's…
John MacArthur Hardcover R397 R360 Discovery Miles 3 600
Madam & Eve: Family Meeting
Stephen Francis Paperback R220 R203 Discovery Miles 2 030

 

Partners