0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (125)
  • R250 - R500 (452)
  • R500+ (1,354)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > General

Blockchain for Information Security and Privacy (Hardcover): Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar... Blockchain for Information Security and Privacy (Hardcover)
Chandan Trivedi, Sweta Gupta, Udai Pratap Rao, Piyush Kumar Shukla, Zelalem Sintayehu Shibeshi
R3,361 Discovery Miles 33 610 Ships in 10 - 15 working days

Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promising element for IoT security in manufacturing, finance, healthcare, supply chain, identity management, e-governance, defence, education, banking, and trading. Blockchain has the potential to secure IoT through repetition, changeless capacity, and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security, trust, and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security, trust, and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e.g., vehicle web, power web, cloud internet, and edge computing), this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives, efficiency, limitations, computational complexity, and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

Coaching Online - A Practical Guide (Paperback): Kate Anthony, DeeAnna Merz Nagel Coaching Online - A Practical Guide (Paperback)
Kate Anthony, DeeAnna Merz Nagel
R976 Discovery Miles 9 760 Ships in 10 - 15 working days

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.

Coaching Online - A Practical Guide (Hardcover): Kate Anthony, DeeAnna Merz Nagel Coaching Online - A Practical Guide (Hardcover)
Kate Anthony, DeeAnna Merz Nagel
R4,200 Discovery Miles 42 000 Ships in 10 - 15 working days

Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilises technological means of communication with clients, mentors, and everyone else associated with their practice. The book offers up-to-the-minute practical and ethical information from two world-expert coaches, leaning on their combined 50 years of experience and study. It covers the practice of online coaching via email, chat, audio/telephone and video methods, as well as the ethics of online coaching (including an ethical framework), case material, supervision, mentoring and training, and a look into the future of the coaching profession in light of technological developments and the culture of cyberspace. Whether you are a coach-in-training or established Coaching Master, this book is an accessible and invaluable tool for taking and maintaining your coaching services online.

Social Media In Sport: Theory And Practice (Hardcover): Gashaw Abeza, Norman O'Reilly, Jimmy Sanderson, Evan Frederick Social Media In Sport: Theory And Practice (Hardcover)
Gashaw Abeza, Norman O'Reilly, Jimmy Sanderson, Evan Frederick
R3,564 Discovery Miles 35 640 Ships in 18 - 22 working days

This book enables students to grasp the holistic enterprise of social media as it pertains to social, legal, marketing, and management issues. The book also helps students better understand the research process in social media scholarship and make connections with academic research and applied practice in sport studies.

Blockchain and IoT Integration - Approaches and Applications (Hardcover): Kavita Saini Blockchain and IoT Integration - Approaches and Applications (Hardcover)
Kavita Saini
R3,091 Discovery Miles 30 910 Ships in 10 - 15 working days

As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However, the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain, an encrypted, distributed computer filing system, can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable, secure, and permanent method of recording data processed by "smart" machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids, smart cities, and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems

The Art of Invisibility - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data... The Art of Invisibility - The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (Paperback)
Kevin D. Mitnick, Robert Vamosi; Foreword by Mikko Hypponen 1
R496 R462 Discovery Miles 4 620 Save R34 (7%) Ships in 18 - 22 working days

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Digital Wellbeing - Implications for Psychological Research (Paperback, New edition): Dana Rad, Valentina Emilia Balas, Vasile... Digital Wellbeing - Implications for Psychological Research (Paperback, New edition)
Dana Rad, Valentina Emilia Balas, Vasile Doru Marineanu, Roxana Maier
R1,450 Discovery Miles 14 500 Ships in 10 - 15 working days

In today's society where the development of digital technologies is emerging, it is important to take into consideration the development of individual wellbeing when it comes to engagement with the digital environment. This book represents one of the first scientific attempts to understand how the rapid deployment of digital technologies and their uptake by society have modified our relationships with ourselves, each other, and our environment. As a result, our individual and social wellbeing are now intimately connected with the state of our information environment and the digital technologies that mediate our interaction with it, which poses pressing ethical questions concerning the impact of digital technologies on our wellbeing that need to be addressed.

Digital Twin Technology (Hardcover): Gopal Chaudhary, Manju Khari, Mohamed Elhoseny Digital Twin Technology (Hardcover)
Gopal Chaudhary, Manju Khari, Mohamed Elhoseny
R3,364 Discovery Miles 33 640 Ships in 18 - 22 working days

Most of the business sectors consider the Digital Twin concept as the next big thing in the industry. A current state analysis of their digital counterparts helps in the prediction of the future of physical assets. Organizations obtain better insights on their product performance through the implementation of Digital Twins, and the applications of the technology are frequently in sectors such as manufacturing, automobile, retail, health care, smart cities, industrial IoT, etc. This book explores the latest developments and covers the significant challenges, issues, and advances in Digital Twin Technology. It will be an essential resource for anybody involved in related industries, as well as anybody interested in learning more about this nascent technology. This book includes: The future, present, and past of Digital Twin Technology. Digital twin technologies across the Internet of Drones, which developed various perceptive and autonomous capabilities, towards different control strategies such as object detection, navigation, security, collision avoidance, and backup. These approaches help to deal with the expansive growth of big data solutions. The recent digital twin concept in agriculture, which offers the vertical framing by IoT installation development to enhance the problematic food supply situation. It also allows for significant energy savings practices. It is highly required to overcome those challenges in developing advanced imaging methods of disease detection & prediction to achieve more accuracy in large land areas of crops. The welfare of upcoming archetypes such as digitalization in forensic analysis. The ideas of digital twin have arisen to style the corporeal entity and associated facts reachable software and customers over digital platforms. Wind catchers as earth building: Digital Twins vs. green sustainable architecture.

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,740 Discovery Miles 17 400 Ships in 10 - 15 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Assessing and Insuring Cybersecurity Risk (Hardcover): Ravi Das Assessing and Insuring Cybersecurity Risk (Hardcover)
Ravi Das
R4,630 Discovery Miles 46 300 Ships in 10 - 15 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Social Media Analytics for User Behavior Modeling - A Task Heterogeneity Perspective (Paperback): Arun Reddy Nelakurthi,... Social Media Analytics for User Behavior Modeling - A Task Heterogeneity Perspective (Paperback)
Arun Reddy Nelakurthi, Jingrui He
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

Winner of the "Outstanding Academic Title" recognition by Choice for the 2020 OAT Awards. The Choice OAT Award represents the highest caliber of scholarly titles that have been reviewed by Choice and conveys the extraordinary recognition of the academic community. In recent years social media has gained significant popularity and has become an essential medium of communication. Such user-generated content provides an excellent scenario for applying the metaphor of mining any information. Transfer learning is a research problem in machine learning that focuses on leveraging the knowledge gained while solving one problem and applying it to a different, but related problem. Features: Offers novel frameworks to study user behavior and for addressing and explaining task heterogeneity Presents a detailed study of existing research Provides convergence and complexity analysis of the frameworks Includes algorithms to implement the proposed research work Covers extensive empirical analysis Social Media Analytics for User Behavior Modeling: A Task Heterogeneity Perspective is a guide to user behavior modeling in heterogeneous settings and is of great use to the machine learning community.

Blockchain for Healthcare Systems - Challenges, Privacy, and Securing of Data (Hardcover): Sheikh Mohammad Idrees, Parul... Blockchain for Healthcare Systems - Challenges, Privacy, and Securing of Data (Hardcover)
Sheikh Mohammad Idrees, Parul Agarwal, M. Afshar Alam
R3,651 Discovery Miles 36 510 Ships in 10 - 15 working days

Talks about securing healthcare data using Blockchain and Cryptography Discusses challenges and solutions for Blockchain technology in the healthcare sector Presents digital transformation of the healthcare sector using different technologies Covers the handling of healthcare data/medical records using Blockchain technology Explores managing the medical supply chain using Blockchain technology

Cyber Forensics - Examining Emerging and Hybrid Technologies (Paperback): Albert J. Marcella Cyber Forensics - Examining Emerging and Hybrid Technologies (Paperback)
Albert J. Marcella
R1,515 Discovery Miles 15 150 Ships in 10 - 15 working days

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

A Simple Guide to Technology and Analytics (Hardcover): Brian J Evans A Simple Guide to Technology and Analytics (Hardcover)
Brian J Evans
R2,166 Discovery Miles 21 660 Ships in 10 - 15 working days

Everyday technology is constantly changing, and it's hard to keep up with it at times. What is all this talk about automation, STEM, analytics and super-computers, and how will it really affect my daily life at work and in the home? This book is a simple guide to everyday technology and analytics written in plain language. It starts with explaining how computer networks are increasing in speed so fast that we can do more in less time than ever before. It explains the analytical jargon in plain English and why robotics in the home will be aided by the new technology of the quantum computer. Richly furnished with over 200 illustrations, photos and with minimal equations, A Simple Guide to Technology and Analytics is a ready reference book for those times when you don't really understand the technology and analytics being talked about. It explains complicated topics such as automated character recognition in a very simple way, and has simple exercises for the reader to fully understand the technology (with answers at the back). It even has explanations on how home appliances work, which are very useful the next time you go shopping for a microwave or TV. Even the Glossary at the back can be used as a quick look-up explanation for those on the go.

Cyber Forensics - Examining Emerging and Hybrid Technologies (Hardcover): Albert J. Marcella Cyber Forensics - Examining Emerging and Hybrid Technologies (Hardcover)
Albert J. Marcella
R3,531 Discovery Miles 35 310 Ships in 10 - 15 working days

Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts. As emerging and hybrid technologies continue to influence daily business decisions, the proactive use of cyber forensics to better assess the risks that the exploitation of these technologies pose to enterprise-wide operations is rapidly becoming a strategic business objective. This book moves beyond the typical, technical approach to discussing cyber forensics processes and procedures. Instead, the authors examine how cyber forensics can be applied to identifying, collecting, and examining evidential data from emerging and hybrid technologies, while taking steps to proactively manage the influence and impact, as well as the policy and governance aspects of these technologies and their effect on business operations. A world-class team of cyber forensics researchers, investigators, practitioners and law enforcement professionals have come together to provide the reader with insights and recommendations into the proactive application of cyber forensic methodologies and procedures to both protect data and to identify digital evidence related to the misuse of these data. This book is an essential guide for both the technical and non-technical executive, manager, attorney, auditor, and general practitioner who is seeking an authoritative source on how cyber forensics may be applied to both evidential data collection and to proactively managing today's and tomorrow's emerging and hybrid technologies. The book will also serve as a primary or supplemental text in both under- and post-graduate academic programs addressing information, operational and emerging technologies, cyber forensics, networks, cloud computing and cybersecurity.

National Security in the New World Order - Government and the Technology of Information (Paperback): Andrea Monti, Raymond Wacks National Security in the New World Order - Government and the Technology of Information (Paperback)
Andrea Monti, Raymond Wacks
R1,231 Discovery Miles 12 310 Ships in 10 - 15 working days

This important new book explores contemporary concerns about the protection of national security. It examines the role, influence, and impact of Big Tech on politics, power, and individual rights. The volume considers the manner in which digital technology and its business models have shaped public policy and charts its future course. In this vital text for legislators and policymakers, Andrea Monti and Raymond Wacks draw on several case studies to analyse the changing nature of national security and revisit the traditional idea of the sovereignty of the State. They highlight some of the limitations of the conventional understanding of public policy, national security, and the rule of law to reveal the role of digital technology as an enabler as well as discriminator in governance and social disorder. Further, the chapters in the book explore the tenuous balance between individual freedom and national security; the key role of data protection in safeguarding digital data; Big Tech's appropriation of national security policy; the debate relating to datagathering technologies and encryption; and offers an unsettling answer to the question 'what is a leak?' A stimulating read, this key text will be of immense interest to scholars of politics, cyberculture, and national security, as well as to policy analysts, lawyers, and journalists.

Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover):... Rising from the Mailroom to the Boardroom - Unique Insights for Governance, Risk, Compliance, and Audit Leaders (Hardcover)
Bruce Turner
R2,107 Discovery Miles 21 070 Ships in 10 - 15 working days

Boards and business leaders expect their key advisors to deliver fresh insights, and increasingly expect them to demonstrate foresight. To achieve what is expected, it is crucial to understand the dynamics of conversations in the boardroom and around the audit committee table. This book provides those unique perspectives. The journey from the 'mailroom to the boardroom' follows the story of a young banker who moved into the internal auditing profession as part of the 'new breed', then rose through the ranks into senior leadership and chief audit executive roles, before assuming audit committee and board roles that had an immense influence on governance, risk, compliance, and audit professionals. Success does not always follow a smooth and uneventful trajectory, and this story reflects insights from both the ups and the downs of the journey. Each chapter shares insights, better practices, case studies, practical examples, and real-life challenges and draws them together into 101 building blocks, each one providing crucial career-long learnings. The storytelling provides insights to people at all levels on the importance of positioning oneself to step into leadership roles, helps them understand how to evaluate and pursue potential career growth opportunities, provides tips on how to holistically manage and advance their career, and inspires higher-level thinking that enhances governance, risk, compliance and audit practices.

Social Responsibility as Academic Learning Course at the University (Paperback, New edition): Ayseli Usluata Social Responsibility as Academic Learning Course at the University (Paperback, New edition)
Ayseli Usluata
R731 Discovery Miles 7 310 Ships in 10 - 15 working days

The globalizing world needs responsible young generations who will be agents of social development; so universities are faced with the need to design innovative educational approaches and include academic learning courses that encourage young students to develop awareness and critical thinking. The opportunities to share love, kindness and respect with the local people and all living beings and to exchange ideas, experiences, different perspectives and perceptions through interaction with the students of a university in a different country help to develop mutual learning.

Quality of Life - An Interdisciplinary Perspective (Hardcover): Shruti Tripathi, Rashmi Rai, Ingrid Van Rompay-Bartels Quality of Life - An Interdisciplinary Perspective (Hardcover)
Shruti Tripathi, Rashmi Rai, Ingrid Van Rompay-Bartels
R3,067 Discovery Miles 30 670 Ships in 10 - 15 working days

Highlights cultural differences in terms of Quality of Life Provides a guide to the current field of global well-being and to future research Suggests improvements in Quality of Life Recognizes the presence of cultural differences resulting from social status, age, gender, class, race, and ethnicity Offers background information for governments, professionals, and policy makers

Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback): Abu Sayed Mahfuz Software Quality Assurance - Integrating Testing, Security, and Audit (Paperback)
Abu Sayed Mahfuz
R1,319 Discovery Miles 13 190 Ships in 10 - 15 working days

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and contribute quality to projects and applications. The practical synopsis on common testing tools helps readers who are in testing jobs or those interested in pursuing careers as testers. It also helps test leaders, test managers, and others who are involved in planning, estimating, executing, and maintaining software. The book is divided into four sections: The first section addresses the basic concepts of software quality, validation and verification, and audits. It covers the major areas of software management, software life cycle, and life cycle processes. The second section is about testing. It discusses test plans and strategy and introduces a step-by-step test design process along with a sample test case. It also examines what a tester or test lead needs to do before and during test execution and how to report after completing the test execution. The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. The fourth and final section provides examples of security issues along with a security policy document and addresses the planning aspects of an information audit. This section also discusses the definition, measurement, and metrics of reliability based on standards and quality metrics methodology CMM models. It discusses the ISO 15504 standard, CMMs, PSP, and TSP and includes an appendix containing a software process improvement sample document.

The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Hardcover):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Hardcover)
Te Wu
R4,368 Discovery Miles 43 680 Ships in 10 - 15 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback):... The Sensible Guide to Program Management Professional (PgMP) (R) Success - Including 420 Practice Exam Questions (Paperback)
Te Wu
R1,760 Discovery Miles 17 600 Ships in 10 - 15 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

Thinking. The Heart of the Media (Hardcover, New edition): Jacek Dabala Thinking. The Heart of the Media (Hardcover, New edition)
Jacek Dabala
R1,008 Discovery Miles 10 080 Ships in 10 - 15 working days

In a unique, and at times highly polemical way, the author demonstrates how the media generally influences thinking and what kind of content they put into peoples' heads. He aims to encourage a better understanding of oneself, one's environment, and the world but above all, a better understanding of freedom, the condition of democracy - or dictatorship. This is probably the first book in the media and communication studies which, through scientific provocation, makes the readers delve deeply into their intelligence, teaches them how to use it, and allows them to decide whether they have a weak, average, or insightful mind. The book sets one of the most important trends: it tells how the media think and how they shape their audiences.

Valuing Data - An Open Framework (Paperback): Dewey Ray Valuing Data - An Open Framework (Paperback)
Dewey Ray
R1,511 Discovery Miles 15 110 Ships in 10 - 15 working days

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple challenges arise for senior management: namely, questions such as "How much is our data worth?" "Are we storing our data in the most cost-effective way?" "Are we managing our data effectively and efficiently?" "Do we know which data is most important?" "Are we extracting business insight from the right data?" "Are our data adding to the value of our business?" "Are our data a liability?" "What is the potential for monetizing our data?" and "Do we have an appropriate risk management plan in place to protect our data?" To answer these value-based questions, data must be treated with the same rigor and discipline as other tangible and intangible assets. In other words, corporate data should be treated as a potential asset and should have its own asset valuation methodology that is accepted by the business community, the accounting and valuation community, and other important stakeholder groups. Valuing Data: An Open Framework is a first step in that direction. Its purpose is to: Provide the reader with some background on the nature of data Present the common categories of business data Explain the importance of data management Report the current thinking on data valuation Offer some business reasons to value data Present an "open framework"-along with some proposed methods-for valuing data The book does not aim to prescribe exactly how data should be valued monetarily, but rather it is a "starting point" for a discussion of data valuation with the objective of developing a stakeholder consensus, which, in turn, will become accepted standards and practices.

Internet Video Culture in China - YouTube, Youku, and the Space in Between (Paperback): Marc L. Moskowitz Internet Video Culture in China - YouTube, Youku, and the Space in Between (Paperback)
Marc L. Moskowitz
R1,371 Discovery Miles 13 710 Ships in 10 - 15 working days

Examining Internet culture in the People's Republic of China, Taiwan, Hong Kong, and the US, this book analyzes videos which entertain both English and Chinese-speaking viewers to gain a better understanding of cultural similarities and differences. Each of the chapters in the volume studies streaming videos from YouTube and its Chinese counterparts, Todou and Youku, with the book using a combination of interpretative analysis of content, commentary, and ethnographic interviews. Employing a diverse range of examples, from Michael Jackson musical mash-ups of Cultural Revolution visuals, to short clips of Hitler ranting about twenty-first century issues with Chinese subtitles, this book goes on to explore the ways in which traditional beliefs regarding gender, romance, religion, and politics intersect. Looking at how these issues have changed over the years in response to new technologies and political economies, it also demonstrates how they engage in regional, transnational, and global dialogues. Comparing and incorporating the production of videos with traditional media, such as television and cinema, Internet Video Culture in China will be useful to students and scholars of Internet and digital anthropology, as well as Cultural Studies and Chinese Studies more generally.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
India and the Silk Road - Exploring…
Nasir Raza Khan Hardcover R1,395 Discovery Miles 13 950
Becoming
Michelle Obama Hardcover  (6)
R729 R633 Discovery Miles 6 330
200 Kakuro and 200 Calcudoku 9x9 Hard…
Basford Holmes Paperback R274 Discovery Miles 2 740
The Politics of Transatlantic Trade…
Jean-frederic Morin, Tereza Novotna, … Paperback R1,386 Discovery Miles 13 860
200 Kakuro - Sukrokuro 100 - 100 Number…
Basford Holmes Paperback R273 Discovery Miles 2 730
Donald Trump's New World Order - U.S…
T. Hamid Al-Bayati Hardcover R3,680 Discovery Miles 36 800
Breaking Glass - Broken Barriers…
Joyce Verplank Hatton Paperback R818 R727 Discovery Miles 7 270
Shackled - One Woman's Dramatic Triumph…
Mariam Ibraheem, Eugene Bach Paperback R406 R385 Discovery Miles 3 850
The Light We Carry - Overcoming In…
Michelle Obama Hardcover  (1)
R399 R368 Discovery Miles 3 680
Honours and Awards to Women - The…
Norman G. Gooding Hardcover R925 Discovery Miles 9 250

 

Partners