0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (44)
  • R250 - R500 (253)
  • R500+ (10,269)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > General

Exam 98-367 Security Fundamentals (Paperback): Microsoft Official Academic Course Exam 98-367 Security Fundamentals (Paperback)
Microsoft Official Academic Course
R2,232 R343 Discovery Miles 3 430 Save R1,889 (85%) Ships in 7 - 13 working days

Students who are beginning studies in technology need a strong foundation in the basics before moving on to more advanced technology courses and certification programs. The Microsoft Technology Associate (MTA) is a new and innovative certification track designed to provide a pathway for future success in technology courses and careers. The MTA program curriculum helps instructors teach and validate fundamental technology concepts and provides students with a foundation for their careers as well as the confidence they need to succeed in advanced studies. Through the use of MOAC MTA titles you can help ensure your students future success in and out of the classroom. Vital fundamentals of security are included such as understanding security layers, authentication, authorization, and accounting. They will also become familair with security policies, network security and protecting the Server and Client.

Exam 98-365 MTA Windows Server Administration Fundamentals (Paperback): Microsoft Official Academic Course Exam 98-365 MTA Windows Server Administration Fundamentals (Paperback)
Microsoft Official Academic Course
R2,233 R344 Discovery Miles 3 440 Save R1,889 (85%) Ships in 7 - 13 working days

Students who are beginning studies in technology need a strong foundation in the basics before moving on to more advanced technology courses and certification programs. The Microsoft Technology Associate (MTA) is a new and innovative certification track designed to provide a pathway for future success in technology courses and careers. The MTA program curriculum helps instructors teach and validate fundamental technology concepts and provides students with a foundation for their careers as well as the confidence they need to succeed in advanced studies. Through the use of MOAC MTA titles you can help ensure your students future success in and out of the classroom. Server fundamentals such as managing Windows Servers (including virtualization) and storage, along with monitoring and troubleshooting servers are included. It also covers such topics as essential naming, directory, and print services. Students also learn of popular Windows Network Services and Applications.

(ISC)2 CISSP Certified Information Systems Securit y Professional Official Study Guide & Practice Tes ts Bundle, 3rd Edition... (ISC)2 CISSP Certified Information Systems Securit y Professional Official Study Guide & Practice Tes ts Bundle, 3rd Edition (Paperback, 3rd Edition)
M. Chapple
R1,759 Discovery Miles 17 590 Ships in 12 - 17 working days

Two bestselling CISSP guides in one serious study set This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC)(2) CISSP Certified Information Systems Security Professional Official Study Guide, 9th Edition with an updated and refined collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam. (ISC)(2) CISSP Study Guide, 9th Edition has been completely updated for the latest 2021 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes four practice exams each with 125 unique questions to help you identify where you need to study more, more than 1000 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam, a searchable glossary in PDF to give you instant access to the key terms you need to know for the exam. Add to that the updated (ISC)(2) CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd edition with 4 more complete 125-question exams and another 100 questions for each of the 8 domains and you'll be as ready as you can be for the CISSP exam. All of the practice questions from both books have been vetted again for 2021 by multiple CISSPs and instructors, retaining only the best questions from previous editions insuring that the questions you practice with give you the best possible preparation. Coverage of all of the exam topics in each book means you'll be ready for: Security and Risk Management Asset Security Security Architecture and Engineering Communication and Network Security Identity and Access Management (IAM) Security Assessment and Testing Security Operations Software Development Security

If It's Smart, It's Vulnerable (Hardcover): M Hypponen If It's Smart, It's Vulnerable (Hardcover)
M Hypponen
R527 Discovery Miles 5 270 Ships in 12 - 17 working days

Reimagine the future of the internet All our devices and gadgets--from our refrigerators to our home security systems, vacuum cleaners, and stereos--are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration of the best--and worst--things the internet has given us. From instant connectivity between any two points on the globe to organized ransomware gangs, the net truly has been a mixed blessing. In this book, the author explores the transformative potential of the future of the internet, as well as those things that threaten its continued existence: government surveillance, censorship, organized crime, and more. Readers will also find: Insightful discussions of how law enforcement and intelligence agencies operate on the internet Fulsome treatments of how money became data and the impact of the widespread use of mobile supercomputing technology Explorations of how the internet has changed the world, for better and for worse Engaging stories from Mikko's 30-year career in infosec Perfect for anyone seeking a thought-provoking presentation of some of the most pressing issues in cybersecurity and technology, If It's Smart, It's Vulnerable will also earn a place in the libraries of anyone interested in the future of the internet.

CCNA 200-301 Network Simulator (Digital product license key): Sean Wilkins CCNA 200-301 Network Simulator (Digital product license key)
Sean Wilkins
R2,967 Discovery Miles 29 670 Ships in 12 - 17 working days

CCNA Interactive Learning: More than 300 labs More than 4,000 hands-on tasks Four Kinds of Labs: Skill Builders Subnetting Exercises Configuration Scenarios Troubleshooting Scenarios The CCNA 200-301 Network Simulator is a single-user software package. It helps you develop and improve hands-on configuration and troubleshooting skills without the investment in expensive lab hardware. This state-of-the-art, interactive simulation software enables you to practice your networking skills with more than 300 structured labs designed to help you learn by doing, the most effective method of learning. Experience realistic network device responses as you perform each lab, which include detailed instructions, topology diagrams, critical-thinking questions, hints, and answers. Working through the labs, you will quickly become proficient with all the common Cisco IOS version 15 router and switch commands on the CCNA exam. Unlike other simulators on the market, the lab scenarios included in the CCNA 200-301 Network Simulator are far more complex, challenging you to learn how to perform real-world network configuration and troubleshooting tasks. Master the hands-on skills needed to succeed on the CCNA exam, including: Network fundamentals Network access IP connectivity IP services Security fundamentals IP Subnetting Skill Builders: These 175+ labs are narrowly focused, enabling you to practice your configuration skills on a single topic. Coverage includes: Interface settings and status Router and Switch CLI Exec Mode and config process Telnet, Ping, Traceroute, and terminal history Switch IP address, connectivity, and forwarding PC IP commands Configuring IP addresses Subnet Zero IP addressing and IPv6 address configuration CDP and LLDP VLANs and Trunking Router-on-a-stick STP and MLS Static and Dynamic EtherChannel Wireless LAN Controllers Connected, static, and default routes OSPF SSH NAT NTP Router and switch security fundamentals ACL CHCP Dynamic ARP Port security IOS backup Subnetting Exercises: These 80 labs help you to perform subnetting calculations quickly and accurately, a critical skill for success on the CCNA exam. Topics covered include: IPv4 and IPv6 subnet ID calculation IP address rejection IP route selection VLSM overlaps IPv6 EUI-64 calculation Selecting VLSM routes Configuration Scenarios: These 40+ labs are more broadly focused, combining multiple technologies into configuration scenarios that mimic real-world environments. These labs are longer and more complex,challenging you to put your configuration skills to the test. Topics covered include: IP and MAC comparisons Switch IP connectivity and security Subnetting and addressing IP addressing and configuration IPv6 configuraiton Switch interfaces and forwarding VLAN trunking STP analysis, configuration, and prediction Wireless LAN Controllers Static routing Configuring default routes OSPF Router-on-a-stick to MLS SSH and Telnet NAT ACL Password recovery Rebuilding a configuration Troubleshooting Scenarios: These 18 labs present typical troubleshooting scenarios and require you to explore the misconfigured network, isolate the issues, and correct the problems. These are very complicated and realistic scenarios that truly test your ability to perform the job of a network engineer. Topics covered include: Switch forwarding Path analysis and troubleshooting IPv4/IPv6 addressing IP routing OSPF VLAN troubleshooting STP Network discovery Port security System requirements: Operating Systems: Windows 10 (32/64 bit) Windows 8.1 (32/64 bit) Mac OS 10.15 (Catalina) Mac OS 10.14 (Mojave) Mac OS 10.13 (High Sierra) Free Storage Space: 1 GB (minimum) System memory (RAM): 4 GB (minimum) Processor: i3 3.4 GHz (minimum) and above Software Pre-requisites: Node JS 10 PDF reader Monitor resolution: Minimum resolution: 1024 X 768 Best viewed: 1280 X 800 and above Internet speed: 2 Mbps (minimum) is needed only during software activation, reporting feedback and receiving updates. After activation, Internet is not needed for accessing the labs in the application. Language: English (US)

Age Of Agency - Rise With A.I. (Paperback): Kerushan Govender Age Of Agency - Rise With A.I. (Paperback)
Kerushan Govender
R350 R280 Discovery Miles 2 800 Save R70 (20%) Ships in 5 - 10 working days

Do you feel overwhelmed by the AI wave? Worried that it could cost you your job, harm your business, or even take over? AI has pervaded our lives and is aggressively disrupting business. No person today can afford to ignore AI.

Age of Agency is your companion, helping you leverage AI's capabilities to power your productivity and success. By understanding AI, you will learn to use it as a tool for personal career growth and business success.

Former Microsoft executive Kerushan Govender demystifies AI, emphasising the importance of human agency. Reconnect with the needs of humanity and learn the importance of care as a differentiator in an AI world. Avoid the potential pitfalls of excessive reliance on the technology.

Age of Agency is a blueprint for ensuring human agency outpaces computer agency. It boldly pits the limits of machine learning against the infinity of human ability. With this survival guide, you’ll uncover ways to connect with humanity on a deeper level, going beyond anything AI can do.

Ready to become AI-savvy, with your humanity as your differentiator? Dive into the future with the confidence to ride the wave of today’s AI revolution.

Mastering VMware NSX for vSphere (Paperback): ES Sena Sosa Mastering VMware NSX for vSphere (Paperback)
ES Sena Sosa
R1,037 Discovery Miles 10 370 Ships in 12 - 17 working days

A clear, comprehensive guide to VMware's latest virtualization solution Mastering VMware NSX for vSphere is the ultimate guide to VMware's network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform's many features. More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow--and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform's full functionality so you can: Step up security at the application level Automate security and networking services Streamline infrastructure for better continuity Improve compliance by isolating systems that handle sensitive data VMware's NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly--and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.

People-Centric Skills - Interpersonal and Communication Skills for Financial Professionals (Paperback, 2nd Edition): Danny M.... People-Centric Skills - Interpersonal and Communication Skills for Financial Professionals (Paperback, 2nd Edition)
Danny M. Goldberg
R590 R428 Discovery Miles 4 280 Save R162 (27%) Ships in 7 - 13 working days

Use your interpersonal and communication skills as a financial professional to work successfully with clients Embark on a journey to further develop your career when you read People-Centric Skills Interpersonal and Communication Skills for Financial Professionals, 2nd Edition. Business leaders consider employee communication skills and critical thinking abilities as essential elements for success. In their work, all professionals must communicate clearly and rely on their interpersonal skills to be successful. This second edition of People-Centric Skills shares the fictional story of Dalton Zimmer, executive coach and public speaker. Dalton, all the while juggling his business, kids and social life, provides coaching and communication strategies for handling challenging situations faced by his clients. This insightful narrative will help you expand communication and soft skills as a CPA, auditor, financial planner or other financial professional. As Generation Z is entering the work force, the communication gap between Z and Boomers or Generation X is widening significantly. New to the second edition, you'll find a discussion of communication between generations and how to bridge them as a financial professional. You can be a more people-centric leader as you engage with a wide range of clients and associates. This book can be a first step to improving interpersonal and communication skills as you continue to develop in your career.

The Big Book of Drones (Paperback): Ralph DeFrangesco, Stephanie DeFrangesco The Big Book of Drones (Paperback)
Ralph DeFrangesco, Stephanie DeFrangesco
R863 Discovery Miles 8 630 Ships in 9 - 15 working days

Drones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist. For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down. Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.

CompTIA A+ Complete Study Guide: Core 1 Exam 220-1 101 and Core 2 Exam 220-1102 5th Edition (Paperback, 5th Edition): Q Docter CompTIA A+ Complete Study Guide: Core 1 Exam 220-1 101 and Core 2 Exam 220-1102 5th Edition (Paperback, 5th Edition)
Q Docter
R1,197 Discovery Miles 11 970 Ships in 12 - 17 working days

The Fifth Edition of the CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 offers accessible and essential test preparation material for the popular A+ certification. Providing full coverage of all A+ exam objectives and competencies covered on the latest Core 1 and Core 2 exams, the book ensures you'll have the skills and knowledge to confidently succeed on the test and in the field as a new or early-career computer technician. The book presents material on mobile devices, hardware, networking, virtualization and cloud computing, network, hardware, and software troubleshooting, operating systems, security, and operational procedures. Comprehensive discussions of all areas covered by the exams will give you a head start as you begin your career as a computer technician. This new edition also offers: Accessible and easy-to-follow organization perfect to prepare you for one of the most popular certification exams on the market today Opportunities to practice skills that are in extraordinary demand in the IT industry Access to the Sybex online test bank, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone prepping for the Core 1 and Core 2 A+ exams, CompTIA A+ Complete Study Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 is a must-have resource for new and early-career computer technicians seeking to improve their skills and increase their efficacy in the field.

Generic and Energy-Efficient Context-Aware Mobile Sensing (Paperback): Ozgur Yurur, Chi Harold Liu Generic and Energy-Efficient Context-Aware Mobile Sensing (Paperback)
Ozgur Yurur, Chi Harold Liu
R1,847 Discovery Miles 18 470 Ships in 12 - 17 working days

Elaborating on the concept of context awareness, this book presents up-to-date research and novel framework designs for context-aware mobile sensing. Generic and Energy-Efficient Context-Aware Mobile Sensing proposes novel context-inferring algorithms and generic framework designs that can help readers enhance existing tradeoffs in mobile sensing, especially between accuracy and power consumption. The book presents solutions that emphasize must-have system characteristics such as energy efficiency, accuracy, robustness, adaptability, time-invariance, and optimal sensor sensing. Numerous application examples guide readers from fundamental concepts to the implementation of context-aware-related algorithms and frameworks. Covering theory and practical strategies for context awareness in mobile sensing, the book will help readers develop the modeling and analysis skills required to build futuristic context-aware framework designs for resource-constrained platforms. Includes best practices for designing and implementing practical context-aware frameworks in ubiquitous/mobile sensing Proposes a lightweight online classification method to detect user-centric postural actions Examines mobile device-based battery modeling under the scope of battery nonlinearities with respect to variant loads Unveils a novel discrete time inhomogeneous hidden semi-Markov model (DT-IHS-MM)-based generic framework to achieve a better realization of HAR-based mobile context awareness Supplying theory and equation derivations for all the concepts discussed, the book includes design tips for the implementation of smartphone programming as well as pointers on how to make the best use of MATLAB® for the presentation of performance analysis. Coverage includes lightweight, online, and unsupervised pattern recognition methods; adaptive, time-variant, and optimal sensory sampling strategies; and energy-efficient, robust, and inhomogeneous context-aware framework designs. Researchers will learn the latest modeling and analysis research on mobile sensing. Students will gain access to accessible reference material on mobile sensing theory and practice. Engineers will gain authoritative insights into cutting-edge system designs.

Modeling, Evaluating, and Predicting IT Human Resources Performance (Paperback): Konstantina Richter, Reiner R. Dumke Modeling, Evaluating, and Predicting IT Human Resources Performance (Paperback)
Konstantina Richter, Reiner R. Dumke
R1,560 Discovery Miles 15 600 Ships in 12 - 17 working days

Numerous methods exist to model and analyze the different roles, responsibilities, and process levels of information technology (IT) personnel. However, most methods neglect to account for the rigorous application and evaluation of human errors and their associated risks. This book fills that need. Modeling, Evaluating, and Predicting IT Human Resources Performance explains why it is essential to account for the human factor when determining the various risks in the software engineering process. The book presents an IT human resources evaluation approach that is rooted in existing research and describes how to enhance existing approaches through strict use of software measurement and statistical principles and criteria. Discussing IT human factors from a risk assessment point of view, the book identifies, analyzes, and evaluates the basics of IT human performance. It details the IT human factors required to achieve desired levels of human performance prediction. It also provides a rigorous investigation of existing human factors evaluation methods, including IT expertise and Big Five, in combination with powerful statistical methods, such as failure mode and effect analysis (FMEA) and design of experiment (DoE). Supplies an overview of existing methods of human risk evaluation Provides a detailed analysis of IT role-based human factors using the well-known Big Five method for software engineering Models the human factor as a risk factor in the software engineering process Summarizes emerging trends and future directions In addition to applying well-known human factors methods to software engineering, the book presents three models for analyzing psychological characteristics. It supplies profound analysis of human resources within the various software processes, including development, maintenance, and application under consideration of the Capability Maturity Model Integration (CMMI) process level five.

Phonetics - The Science of Speech (Paperback): Martin J. Ball, Joan Rahilly Phonetics - The Science of Speech (Paperback)
Martin J. Ball, Joan Rahilly
R1,159 Discovery Miles 11 590 Ships in 9 - 15 working days

In their comprehensive new introduction to phonetics, Ball and Rahilly offer a detailed explanation of the process of speech production, from the anatomical initiation of sounds and their modification in the larynx, through to the final articulation of vowels and consonants in the oral and nasal tracts. This textbook is one of the few to give a balanced account of segmental and suprasegmental aspects of speech, showing clearly that the communication chain is incomplete without accurate production of both individual speech sounds (segmental features) and aspects such as stress and intonation (suprasegmental features). Throughout the book the authors provide advice on transcription, primarily using the International Phonetic Alphabet (IPA). Students are expertly guided from basic attempts to record speech sounds on paper, to more refined accounts of phonetic detail in speech. The authors go on to explain acoustic phonetics in a manner accessible both to new students in phonetics, and to those who wish to advance their knowledge of key pursuits in the area, including the sound spectrograph. They describe how speech waves can be measured, as well as considering how they are heard and decoded by listeners, discussing both physiological and neurological aspects of hearing and examining the methods of psychoacoustic experimentation. A range of instrumentation for studying speech production is also presented. The next link is acoustic phonetics, the study of speech transmission. Here the authors introduce the basic concepts of sound acoustics and the instrumentation used to analyse the characteristics of speech waves. Finally, the chain is completed by examining auditory phonetics, and providing a fascinating psychoacoustic experimentation, used to determine what parts of the speech signal are most crucial for listener understanding. The book concludes with a comprehensive survey and description of modern phonetic instrumentation, from the sound spectrograph to magnetic resonance imaging (MRI).

Cognitive Risk (Paperback): James Bone, Jessie H Lee Cognitive Risk (Paperback)
James Bone, Jessie H Lee
R1,102 Discovery Miles 11 020 Ships in 9 - 15 working days

Unique selling point: • This book combines risk management, cybersecurity and behavioral and decision science in one book with case studies, mitigation plans, and a new risk framework to address cognitive risks. Core audience: • Corporate and government risk, audit, IT security and compliance organisations Place in the market: • Cognitive Risks differs from competitive books by reframing the role of human behavior in risk.

5G-Enabled Internet of Things (Paperback): Yulei Wu, Haojun Huang, Cheng-Xiang Wang, Yi Pan 5G-Enabled Internet of Things (Paperback)
Yulei Wu, Haojun Huang, Cheng-Xiang Wang, Yi Pan
R1,394 Discovery Miles 13 940 Ships in 9 - 15 working days

How the enabling technologies in 5G as an integral or as a part can seamlessly fuel the IoT revolution is still very challenging. This book presents the state-of-the-art solutions to the theoretical and practical challenges stemming from the integration of 5G enabling technologies into IoTs in support of a smart 5G-enabled IoT paradigm, in terms of network design, operation, management, optimization, privacy and security, and applications. In particular, the technical focus covers a comprehensive understanding of 5G-enabled IoT architectures, converged access networks, privacy and security, and emerging applications of 5G-eabled IoT.

Empowered or Left Behind - Use of Technology During COVID-19 (Hardcover): DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan Empowered or Left Behind - Use of Technology During COVID-19 (Hardcover)
DeeDee M. Bennett Gayle, Xiaojun (Jenny) Yuan
R1,420 Discovery Miles 14 200 Ships in 9 - 15 working days

This book is timely and discusses the effects from the pandemic. Written for longevity, and may be useful to compare this pandemic and the response to future events. The book is written for academia: social sciences, public health, information science, emergency management, and policy fields, and is easier informational reading for the layperson.

The Adventurous and Practical Journey to a Large-Scale Enterprise Solution - Threading the Way to Implementing an ERP through... The Adventurous and Practical Journey to a Large-Scale Enterprise Solution - Threading the Way to Implementing an ERP through MIDRP Practice (Hardcover)
FANAP Studies & Research Center
R2,971 Discovery Miles 29 710 Ships in 9 - 15 working days

The high failure rate of enterprise resource planning (ERP) projects is a pressing concern for both academic researchers and industrial practitioners. The challenges of an ERP implementation are particularly high when the project involves designing and developing a system from scratch. Organizations often turn to vendors and consultants for handling such projects but, every aspect of an ERP project is opaque for both customers and vendors. Unlocking the mysteries of building a large-scale ERP system, The Adventurous and Practical Journey to a Large-Scale Enterprise Solution tells the story of implementing an applied enterprise solution. The book covers the field of enterprise resource planning by examining state-of-the-art concepts in software project management methodology, design and development integration policy, and deployment framework, including: A hybrid project management methodology using waterfall as well as a customized Scrum-based approach A novel multi-tiered software architecture featuring an enhanced flowable process engine A unique platform for coding business processes efficiently Integration to embed ERP modules in physical devices A heuristic-based framework to successfully step into the Go-live period Written to help ERP project professionals, the book charts the path that they should travel from project ideation to systems implementation. It presents a detailed, real-life case study of implementing a large-scale ERP and uses storytelling to demonstrate incorrect and correct decisions frequently made by vendors and customers. Filled with practical lessons learned, the book explains the ins and outs of adopting project methodologies. It weaves a tale that features both real-world and scholarly aspects of an ERP implementation.

Digital Project Practice for New Work and Industry 4.0 (Paperback): Tobias Endress Digital Project Practice for New Work and Industry 4.0 (Paperback)
Tobias Endress
R1,322 Discovery Miles 13 220 Ships in 9 - 15 working days

New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community. Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how: Industry 4.0 might influence the potential demand for "Digital Unions" Industry 4.0, and lean production, and their applications can change industrial practices Open Banking presents new approaches and new business models Work structures and systems can empower employees' work self-management This book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit. In essence, this book cover appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.

The Active Defender - Immersion in the Offensive Security Mindset (Paperback): Catherine J. Ullman The Active Defender - Immersion in the Offensive Security Mindset (Paperback)
Catherine J. Ullman
R532 Discovery Miles 5 320 Ships in 12 - 17 working days

Immerse yourself in the offensive security mindset to better defend against attacks In The Active Defender: Immersion in the Offensive Security Mindset, Principal Technology Architect, Security, Dr. Catherine J. Ullman delivers an expert treatment of the Active Defender approach to information security. In the book, you’ll learn to understand and embrace the knowledge you can gain from the offensive security community. You’ll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment. The author immerses you in the hacker mindset and the offensive security culture to better prepare you to defend against threats of all kinds. You’ll also find: Explanations of what an Active Defender is and how that differs from traditional defense models Reasons why thinking like a hacker makes you a better defender Ways to begin your journey as an Active Defender and leverage the hacker mindset An insightful and original book representing a new and effective approach to cybersecurity, The Active Defender will be of significant benefit to information security professionals, system administrators, network administrators, and other tech professionals with an interest or stake in their organization’s information security.

Continuous and Embedded Learning for Organizations (Paperback): Jon M. Quigley, Shawn P. Quigley Continuous and Embedded Learning for Organizations (Paperback)
Jon M. Quigley, Shawn P. Quigley
R1,338 Discovery Miles 13 380 Ships in 9 - 15 working days

There is considerable connection between growth of the personnel in the organization and the ability for the company to compete over time. Looking outside for help training may be required but looking within for opportunities for enhanced training and growth, will foster a continually improving and growing organization. This book examines the opportunities for learning, within the organization and its' activities, along with the connection to motivation. Additionally, it provides information on the characteristics of organizations that are able to quickly disseminate, along with approaches for improving this distribution of that learning throughout the organization.

Software Security - Concepts & Practices (Hardcover): Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan Software Security - Concepts & Practices (Hardcover)
Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan
R3,570 Discovery Miles 35 700 Ships in 9 - 15 working days

Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Features The book presents the implementation of a unique socio-technical solution for real-time cybersecurity awareness. It provides comprehensible knowledge about security, risk, protection, estimation, knowledge and governance. Various emerging standards, models, metrics, continuous updates and tools are described to understand security principals and mitigation mechanism for higher security. The book also explores common vulnerabilities plaguing today's web applications. The book is aimed primarily at advanced undergraduates and graduates studying computer science, artificial intelligence and information technology. Researchers and professionals will also find this book useful.

Blockchain - A Hype or a Hoax? (Paperback): Kapil Sharma Blockchain - A Hype or a Hoax? (Paperback)
Kapil Sharma
R1,100 Discovery Miles 11 000 Ships in 9 - 15 working days

Blockchain: A Hype or a Hoax? fills a gap in the book market to provide material that is not only technical but also caters to business readers. This book was written to keep in mind various stakeholders and the current gap in blockchain education as well as use case implementation. This book reviews blockchain technology, discusses why proof of concept fails, offers examples of use cases that have been successful and that have failed and articulates a framework that should be used before deciding whether blockchain is the right technology for transformation. It uses strategic models and frameworks to assist organisations to see a fit score for their specific use cases. This book provides guidance on how to create a blockchain strategy and a business case to pitch for the budget. It also includes a case study to apply the knowledge on practical use cases for blockchain and a technical overview of most of the blockchain use cases in the market including crypto, non-fungible tokens, decentralised finance, and decentralised autonomous organisations, as well as financial and non-financial industry use cases. This book also provides a detailed overview of most of the mainstream blockchain products currently available in the market. It also offers guidance on how readers can best educate themselves on blockchain technology that is available through commercial and free resources. It concludes with a clear direction on selecting blockchain to solve real-life use cases that are best fit. A financial and non-financial value-adding framework is discussed throughout this book to assist business leaders, programme managers, product managers and information technology leaders to make strategic choices, and business cases and develop strategies for digital transformation through the use of blockchain. The distinctive feature of this book is the critical analysis of blockchain from a technology and business perspective. This is the first book to focus on business, technology and blockchain selection framework. The most unique feature of this book would be to apply Michael Porter's competitive advantage strategy theory on blockchain use cases and their impact on companies. This book is aimed at technology students, technology professionals, blockchain and fintech consultant and business leaders. It will also be useful for readers who are building a business case to adopt blockchain into an organisation or are seeking to grow their knowledge of blockchain and improve their fintech strategy.

Asynchronous On-Chip Networks and Fault-Tolerant Techniques (Hardcover): Wei Song, Guangda Zhang Asynchronous On-Chip Networks and Fault-Tolerant Techniques (Hardcover)
Wei Song, Guangda Zhang
R2,355 Discovery Miles 23 550 Ships in 9 - 15 working days

Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications. As a promising alternative to the widely used synchronous on-chip networks for multicore processors, asynchronous on-chip networks can be vulnerable to faults even if they can deliver the same performance with much lower energy and area compared with their synchronous counterparts - faults can not only corrupt data transmission but also cause a unique type of deadlock. By adopting a new redundant code along with a dynamic fault detection and recovery scheme, the authors demonstrate that asynchronous on-chip networks can be efficiently hardened to tolerate both transient and permanent faults and overcome fault-caused deadlocks. This book will serve as an essential guide for researchers and students studying interconnection networks, fault-tolerant computing, asynchronous system design, circuit design and on-chip networking, as well as for professionals interested in designing fault-tolerant and high-throughput asynchronous circuits.

The Security Hippie (Paperback): Barak Engel The Security Hippie (Paperback)
Barak Engel
R1,089 Discovery Miles 10 890 Ships in 9 - 15 working days

The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.

Big Data for Big Decisions - Building a Data-Driven Organization (Paperback): Krishna Pera Big Data for Big Decisions - Building a Data-Driven Organization (Paperback)
Krishna Pera
R1,334 Discovery Miles 13 340 Ships in 9 - 15 working days

Building a data-driven organization (DDO) is an enterprise-wide initiative that may consume and lock up resources for the long term. Understandably, any organization considering such an initiative would insist on a roadmap and business case to be prepared and evaluated prior to approval. This book presents a step-by-step methodology in order to create a roadmap and business case, and provides a narration of the constraints and experiences of managers who have attempted the setting up of DDOs. The emphasis is on the big decisions - the key decisions that influence 90% of business outcomes - starting from decision first and reengineering the data to the decisions process-chain and data governance, so as to ensure the right data are available at the right time, every time. Investing in artificial intelligence and data-driven decision making are now being considered a survival necessity for organizations to stay competitive. While every enterprise aspires to become 100% data-driven and every Chief Information Officer (CIO) has a budget, Gartner estimates over 80% of all analytics projects fail to deliver intended value. Most CIOs think a data-driven organization is a distant dream, especially while they are still struggling to explain the value from analytics. They know a few isolated successes, or a one-time leveraging of big data for decision making does not make an organization data-driven. As of now, there is no precise definition for data-driven organization or what qualifies an organization to call itself data-driven. Given the hype in the market for big data, analytics and AI, every CIO has a budget for analytics, but very little clarity on where to begin or how to choose and prioritize the analytics projects. Most end up investing in a visualization platform like Tableau or QlikView, which in essence is an improved version of their BI dashboard that the organization had invested into not too long ago. The most important stakeholders, the decision-makers, are rarely kept in the loop while choosing analytics projects. This book provides a fail-safe methodology for assured success in deriving intended value from investments into analytics. It is a practitioners' handbook for creating a step-by-step transformational roadmap prioritizing the big data for the big decisions, the 10% of decisions that influence 90% of business outcomes, and delivering material improvements in the quality of decisions, as well as measurable value from analytics investments. The acid test for a data-driven organization is when all the big decisions, especially top-level strategic decisions, are taken based on data and not on the collective gut feeling of the decision makers in the organization.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Kali Linux Penetration Testing Bible
G Khawaja Paperback R736 Discovery Miles 7 360
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Privacy and Legal Issues in Cloud…
Anne S.Y. Cheung, Rolf H. Weber Paperback R1,357 Discovery Miles 13 570
Building Microservices
Sam Newman Paperback R1,212 Discovery Miles 12 120
Network+ Guide to Networks
Jill West, Jean Andrews, … Paperback R1,305 R1,172 Discovery Miles 11 720
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl Paperback R1,192 R924 Discovery Miles 9 240
Data Communications and Computer…
Curt. White Hardcover R990 R499 Discovery Miles 4 990
Linux Command Line and Shell Scripting…
R. Blum Paperback R1,192 R924 Discovery Miles 9 240
Networking All-in-One For Dummies, 8th…
D. Lowe Paperback R1,171 R832 Discovery Miles 8 320
Guide to Networking Essentials
Greg Tomsho Paperback R1,337 R1,199 Discovery Miles 11 990

 

Partners