![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies
This book offers a straight-forward guide to the fundamental work of governing bodies and the people who serve on them. The aim is of the book is to help every member serving on a governing body understand and improve their contribution to the entity and governing body they serve. The book is rooted in research, including five years' work by the author as a Research Fellow of Nuffield College, Oxford.
Unique selling point: Combines theory with practice and applications for advanced intelligent healthcare informatics Core audience: Researchers and academics in healthcare informatics and machine learning Place in the market: Reference work
Cloud computing is the most significant technology transformation since the introduction of the Internet in the early 1990s. As more and more companies and educational institutions plan to adopt a cloud-based IT infrastructure, today's job market requires IT professionals who understand cloud computing and have hands-on experience developing cloud-based networks. Cloud Computing Networking: Theory, Practice, and Development covers the key networking and system administration concepts as well as the vital hands-on skills you need to master cloud technology. This book is designed to help you quickly get started in deploying cloud services for a real-world business. It provides detailed step-by-step instructions for creating a fully functioning cloud-based IT infrastructure using the Microsoft Azure cloud platform. In this environment, you can develop cloud services collaboratively or individually. The book enhances your hands-on skills through numerous lab activities. In these lab activities, you will learn to Implement the following services in a cloud environment: Active Directory, DHCP, DNS, and Certificate Services Configure Windows Server so it can route IP traffic Implement IP Security Policy and Windows Firewall with Advanced Security tools Create a point-to-site connection between Microsoft Azure and a local computer Create a site-to-site connection between Microsoft Azure and an on-premises network Develop a hybrid cloud that integrates Microsoft Azure with a private cloud created on a local network Cloud Computing Networking: Theory, Practice, and Development includes numerous examples, figures, and screen shots to help you understand the information. Each chapter concludes with a summary of the major topics and a set of review questions. With this book, you will soon have the critical knowledge and skills to develop and manage cloud-based networks.
This new volume illustrates the diverse applications of IoT. The volume addresses the crucial issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. The volume looks at the application of IoT in medical technology and healthcare, including the design of IoT-based mobile healthcare units and a blockchain technique based smart health record system. Other topics include a blended IoT-enabled learning approach through a study employing clustering techniques, an IoT-enabled garbage disposal system with an advanced message notification system through an android application, IoT-based self-healing concrete that uses bacteria and environmental waste, an IoT-enabled trash-the-ash application that regulates flow, and more. The fresh and innovative advances that demonstrate computational intelligence and IoT in practice that are discussed in this volume will be informative for academicians, scholars, scientists, industry professionals, policymakers, government and non-government organizations, and others.
Unique selling point:* Focuses on the relationship between organizational culture and change effectiveness with a focus on communication systemsCore audience:* Intended for IT and business management professionals Place in the market:* Will go alongside the main author's other books to give a full picture of IT systems being utilised within business management
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks-including a new chapter on cloud vulnerabilities and risk management-from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.
* The book provides an end-to-end view of the Zero Trust approach across organization's digital estates that includes Strategy, Business Imperatives, Architecture, Solutions, Human Elements, Implementation Approach etc that could significantly benefit large, small and medium enterprises who want to learn adapt and implement Zero Trust in their organization. * The book's scope will be primarily benefited for the Business Decision Makars, Security leadership and organizational change agent who wants to adopt and implement "Zero Trust" Security approach and architecture across their digital estate. * After reading this book, readers will be in a better position to strategize, plan and design a credible and defensible Zero Trust security architecture and solution for their organization, understand the relevance of human elements and implement a stepwise journey that delivers significantly improved security and streamlined operations.
It's All Analytics! The Foundations of AI, Big Data and Data Science Landscape for Professionals in Healthcare, Business, and Government (978-0-367-35968-3, 325690) Professionals are challenged each day by a changing landscape of technology and terminology. In recent history, especially in the last 25 years, there has been an explosion of terms and methods that automate and improve decision-making and operations. One term, "analytics," is an overarching description of a compilation of methodologies. But AI (artificial intelligence), statistics, decision science, and optimization, which have been around for decades, have resurged. Also, things like business intelligence, online analytical processing (OLAP) and many, many more have been born or reborn. How is someone to make sense of all this methodology and terminology? This book, the first in a series of three, provides a look at the foundations of artificial intelligence and analytics and why readers need an unbiased understanding of the subject. The authors include the basics such as algorithms, mental concepts, models, and paradigms in addition to the benefits of machine learning. The book also includes a chapter on data and the various forms of data. The authors wrap up this book with a look at the next frontiers such as applications and designing your environment for success, which segue into the topics of the next two books in the series.
Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.
Unique selling point: Exploration of the societal and ethical issues surrounding the use and development of digital technology Core audience: IT managers and executives; academic researchers; students of IT Place in the market: Professional title with appeal to academics and students
Written by an author that has real world experience in launching a cyber consulting company. Comprehensive coverage ranging all the way from the legal formation to be used to which segment of the Cybersecurity Industry should be targeted. Explains how CISOs can market their services and get key customers.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.
The volume addresses a selection of diverse topics in such areas as: machine learning based intelligent systems for healthcare applications of artificial intelligence the Internet of Things, intelligent data analytics techniques, intelligent network systems and applications, and inequalities and process control systems.
This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that demonstrate to an international community of health and IT experts how to bring the right stakeholders together and bridge classic divides between software architects and clinical end users, health system decision-makers and standard authors.
This book highlights the essence of information technology in the modern digital world in relation to improvements and threats to organisations and e-business in the era of the digital economy. Rapid IT development has created modern business proposals such as digital and virtual currencies, crowdfunding, peer-to-peer lending, mobile banking, online investing and new payment systems. This allows organisations and firms to increase competitiveness by using financial products and services, thus increasing their value. Information technology users receive significant timesaving and a choice of investment options. At the same time, there is a new challenge for regulators who must monitor how this or that technology affects the financial sector. The authors have collected and systematised information on the models of using information technology in e-business as well as issues of applying information technology in smart organisations and public institutions. The book addresses the issues of risk management in organizations and the problems of personal and social risks resulting from the use of information technology. In addition, the book presents a review of e-commerce sectors and models as well as e-commerce tools, international payment systems and modern money systems. Risks, threats and security rules for using banking services, e-commerce and payment systems are reviewed and systematised.
Managers in organisations must make rational decisions. Rational decision making is the opposite of intuitive decision making. It is a strict procedure utilising objective knowledge and logic. It involves identifying the problem to solve, gathering facts, identifying options and outcomes, analysing them, considering all the relationships and selecting the decision. Rational decision making requires support: methods and software tools. The identification of the problem to solve needs methods that would measure and evaluate the current situation. Identification and evaluation of options and analysis of the available possibilities involves analysis and optimisation methods. Incorporating intuition into rational decision making needs adequate methods that would translate ideas or observed behaviours into hard data. Communication, observation and opinions recording is hardly possible today without adequate software. Information and data that form the input, intermediate variables and the output must be stored, managed and made accessible in a user-friendly manner. Rational Decisions in Organisations: Theoretical and Practical Aspects presents selected recent developments in the support of the widely understood rational decision making in organisations, illustrated through case studies. The book shows not only the variety of perspectives involved in decision making, but also the variety of domains where rational decision support systems are needed. The case studies present decision making by medical doctors, students and managers of various universities, IT project teams, construction companies, banks and small and large manufacturing companies. Covering the richness of relationships in which the decisions should and must be taken, the book illustrates how modern organisations operate in chains and networks; they have multiple responsibilities, including social, legal, business and ethical duties. Nowadays, managers in organisations can make transparent decisions and consider a multitude of stakeholders and their diverse features, incorporating diverse criteria, using multiple types and drivers of information and decision-making patterns, and referring to numerous lessons learned. As the book makes clear, the marriage of theoretical ideas with the possibilities offered by technology can make the decisions in organisations more rational and, at the same time, more human.
This book addresses the important role of communication within the context of performing an audit, project, or review (i.e., planning, detailed testing, and reporting). Intended for audit, information security, enterprise, and operational risk professionals at all levels, including those just starting out, Say What!? Communicate with Tact and Impact: What to Say to Get Results at Any Point in an Audit contains an array of practical and time-tested approaches that foster efficient and effective communication at any point during an engagement. The practical and memorable techniques are culled from author Ann M. Butera's CRP experience as a trusted advisor who has taught thousands of professionals how to develop and hone their interpersonal, communication, and empathic skills. Those familiar with the Five Tier Competency ModelTM she developed will recognize these techniques as a deep dive on the competencies comprising Tier 3: Project Management and Tier 5: Managing Constituent Relations. The author discusses the following behaviors in one's dealings with executives, process owners, control performers, and colleagues: Demonstrating executive presence Becoming the trusted advisor Influencing others Communicating with tact, confidence, and impact Facilitating productive meetings and discussions Overcoming resistance and objections Managing and resolving conflict Knowing when to let a topic go and move on This book is a guide for professionals who want to interact proactively and persuasively with those they work with, audit, or review. It describes techniques that can be used during virtual, in-person, telephone, or video conferences (as opposed to emails, workpapers, and reports). It provides everyone (newer associates in particular) with the interpersonal skills needed to (1) develop and build relationships with their internal constituents and clients, (2) facilitate conversations and discussions before and during meetings, and (3) handle impromptu questions with confidence and executive presence and make positive first impressions. The topics and techniques discussed are accompanied by case studies, examples, and exercises to give the readers the opportunity to develop plans to bridge the gap between theory and practice. The readers can use the book as a reliable resource when subject matter experts or training guides are not readily available.
Managers in organisations must make rational decisions. Rational decision making is the opposite of intuitive decision making. It is a strict procedure utilising objective knowledge and logic. It involves identifying the problem to solve, gathering facts, identifying options and outcomes, analysing them, considering all the relationships and selecting the decision. Rational decision making requires support: methods and software tools. The identification of the problem to solve needs methods that would measure and evaluate the current situation. Identification and evaluation of options and analysis of the available possibilities involves analysis and optimisation methods. Incorporating intuition into rational decision making needs adequate methods that would translate ideas or observed behaviours into hard data. Communication, observation and opinions recording is hardly possible today without adequate software. Information and data that form the input, intermediate variables and the output must be stored, managed and made accessible in a user-friendly manner. Rational Decisions in Organisations: Theoretical and Practical Aspects presents selected recent developments in the support of the widely understood rational decision making in organisations, illustrated through case studies. The book shows not only the variety of perspectives involved in decision making, but also the variety of domains where rational decision support systems are needed. The case studies present decision making by medical doctors, students and managers of various universities, IT project teams, construction companies, banks and small and large manufacturing companies. Covering the richness of relationships in which the decisions should and must be taken, the book illustrates how modern organisations operate in chains and networks; they have multiple responsibilities, including social, legal, business and ethical duties. Nowadays, managers in organisations can make transparent decisions and consider a multitude of stakeholders and their diverse features, incorporating diverse criteria, using multiple types and drivers of information and decision-making patterns, and referring to numerous lessons learned. As the book makes clear, the marriage of theoretical ideas with the possibilities offered by technology can make the decisions in organisations more rational and, at the same time, more human.
Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.
Project or program health checks provide tremendous value to businesses and pay for themselves by multiples of magnitude. No matter how well a project or program is performing, there are always activities that can provide better value, reduce costs, or introduce more innovation. IT project and program health checks can help organizations reach their goals and dramatically improve Return on Investment (ROI). IT Project Health Checks: Driving Successful Implementation and Multiples of Business Value offers a proven approach for evaluating IT projects or programs in order to determine how they are performing and how the eventual outcome for the initiative is currently trending. The project or program health checks provide a set of techniques that produce actionable recommendations that can be applied for any combination of the following outcomes: Drive more business and technical value from a program Set a project or program back on track for successful implementation as defined by executive management Rescue a program that is heading towards failure Act as additional insurance for initiatives that are too important to fail Protect executive careers by creating transparency within the inner workings of complex initiatives. The book shows how a review can quickly identify whether an initiative needs to be rescued even when the project team is not aware that it is hurtling towards failure. It also provides techniques for driving business value even when a project team believes it's been stretched as much as possible. Other outcomes covered in this book include: Objectively develop a project Health-Check Scorecard that establishes how well a project is doing and the direction it is headed Demonstrate how to drive business value from an IT program regardless of how well or badly it is tracking Provide surgical advice to improve a project's outcome How to use the many templates and sample deliverables to get a quick start on your own health check. Designed to provide significant value to any member of a project team, program team, stakeholders, sponsors, business users, system integrators, trainers, and IT professionals, this book can help find opportunities to drive multiples of business value and exceed project success metrics.
The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly "customer-centric", from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation - called "exponential information system" to designate an open IS (in particular on its borders), capable of interfacing and combining with external services, positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology, such as Artificial Intelligence and Machine Learning. 3. Building software "micro-factories" that produce service platforms, which are called "Lean software factories." This "software factory" concept covers the integration of agile methods, tooling and continuous integration and deployment practices, a customer-oriented product approach, and a platform approach based on modularity, as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book, they are linked to other concepts such as agile methods, product development according to lean principles, software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the "lean approach to digital transformation" because the two underlying frameworks, Lean Startup and Lean Software Factory, are directly inspired by Lean, in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book -- it provides the framework for customer orientation and the love of a job well done, which are the conditions for the success of a digital transformation. |
You may like...
Full-Duplex Wireless Communications…
Tho Le-Ngoc, Ahmed Masmoudi
Hardcover
R3,731
Discovery Miles 37 310
Quantitative Genetics in the Wild
Anne Charmantier, Dany Garant, …
Hardcover
R4,652
Discovery Miles 46 520
Mammals of the South-West Pacific
Tyrone Lavery, Tim Flannery
Hardcover
R3,892
Discovery Miles 38 920
|