![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
This book captures a range of important developments that have occurred in Information Systems over the last forty years, with a particular focus on India and the developing world. Over this time, Information and Communications Technology (ICT) and Information Systems (IS) have come to play a critical role in supporting, complementing and automating managerial decisions, shaping and transforming industries, and contributing to deep societal and economic change. This volume examines a range of topics for those interested in the adoption and use of these technologies across varied situations. It combines empirical studies on the application and impact of IS with commentaries, debates and insights on the transformative role that IT and the IT industry have played, and continue to play, within India as well as globally. The book draws attention to issues and challenges that organizations grapple with in tech-enabled environments, and provides insights on the role of automation and computational techniques. It explores the global impact of the technology revolution on economic growth and development, electronic globalization, and the wider opportunities and challenges of a hi-tech world. The chapters cover various themes such as e-government in India, internet-based distribution systems, internet banking, and use of collaborative IT tools and functions to support virtual teams in the software industry and the business process outsourcing industry. Other chapters focus on methodological advances, such as systems thinking which finds applications in organizational decision-making, and the use of fuzzy logic. This volume will interest professionals and scholars of information technology and information systems, computer studies, IT systems, economics, and business and management studies.
For more than a decade, the focus of information technology has been on capturing and sharing data from a patient within an all-encompassing record (a.k.a. the electronic health record, EHR), to promote improved longitudinal oversight in the care of the patient. There are both those who agree and those who disagree as to whether this goal has been met, but it is certainly evolving. A key element to improved patient care has been the automated capture of data from durable medical devices that are the source of (mostly) objective data, from imagery to time-series histories of vital signs and spot-assessments of patients. The capture and use of these data to support clinical workflows have been written about and thoroughly debated. Yet, the use of these data for clinical guidance has been the subject of various papers published in respected medical journals, but without a coherent focus on the general subject of the clinically actionable benefits of objective medical device data for clinical decision-making purposes. Hence, the uniqueness of this book is in providing a single point-of-capture for the targeted clinical benefits of medical device data--both electronic- health-record-based and real-time--for improved clinical decision-making at the point of care, and for the use of these data to address and assess specific types of clinical surveillance. Clinical Surveillance: The Actionable Benefits of Objective Medical Device Data for Crucial Decision-Making focuses on the use of objective, continuously collected medical device data for the purpose of identifying patient deterioration, with a primary focus on those data normally obtained from both the higher-acuity care settings in intensive care units and the lower-acuity settings of general care wards. It includes examples of conditions that demonstrate earlier signs of deterioration including systemic inflammatory response syndrome, opioid-induced respiratory depression, shock induced by systemic failure, and more. The book provides education on how to use these data, such as for clinical interventions, in order to identify examples of how to guide care using automated durable medical device data from higher- and lower-acuity care settings. The book also includes real-world examples of applications that are of high value to clinical end-users and health systems.
A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.
The book shows how to use Planning by Design (PxD) for developing working models to any type of subject area. Section 1 describes the nature of planning in general, the formula of planning, the features that make it systematic, the essence of PxD, and developing and using the working model. Section 2 demonstrates personal application of creative planning to real life cases and practical working models on different subject areas. The book provides a general planning "master guide" that shows how to develop a working model of any definable subject matter. This objective will be accomplished by introducing the concepts, the process, and the methodology of PxD.
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process. Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise. The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project. The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and building blocks of the data protection regime are enhanced by the new General Data Protection Regulation and therefore the DPO will be very active in passing the message and requirements of the new data protection regime throughout the organization. This book explains the roles and responsiblies of the DPO, as well as highlights the potential cost of getting data protection wrong.
Although interest in Spatial Decision Support Systems (SDSS) continues to grow rapidly in a wide range of disciplines, students, planners, managers, and the research community have lacked a book that covers the fundamentals of SDSS along with the advanced design concepts required for building SDSS. Filling this need, Spatial Decision Support Systems: Principles and Practices provides a comprehensive examination of the various aspects of SDSS evolution, components, architecture, and implementation. It integrates research from a variety of disciplines, including the geosciences, to supply a complete overview of SDSS technologies and their application from an interdisciplinary perspective. This groundbreaking reference provides thorough coverage of the roots of SDSS. It explains the core principles of SDSS, how to use them in various decision making contexts, and how to design and develop them using readily available enabling technologies and commercial tools. The book consists of four major parts, each addressing different topic areas in SDSS: Presents an introduction to SDSS and the evolution of SDSS Covers the essential and optional components of SDSS Focuses on the design and implementation of SDSS Reviews SDSS applications from various domains and disciplines-investigating current challenges and future directions The text includes numerous detailed case studies, example applications, and methods for tailoring SDSS to your work environment. It also integrates sample code segments throughout. Addressing the technical and organizational challenges that affect the success or failure of SDSS, the book concludes by considering future directions of this rapidly emerging field of study.
Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However, the number of both cybersecurity and privacy breach incidents are soaring, which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture, making individuals more cybersecurity-conscious as well. However, it is unknown if employees' security behavior at work can be extended to their security behavior at home and personal life. On the one hand, information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand, information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals, librarians, archivists, record managers, students, and professionals in related disciplines. This book is written especially for educators preparing courses in information security, cybersecurity, and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations, threats, and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all, the book addresses the ongoing challenges of cybersecurity. In particular, it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people's security behavior.
The International Conference on Communications, Management, and Information Technology (ICCMIT'16) provides a discussion forum for scientists, engineers, educators and students about the latest discoveries and realizations in the foundations, theory, models and applications of systems inspired on nature, using computational intelligence methodologies, as well as in emerging areas related to the three tracks of the conference: Communication Engineering, Knowledge, and Information Technology. The best 25 papers to be included in the book will be carefully reviewed and selected from numerous submissions, then revised and expanded to provide deeper insight into trends shaping future ICT.
Thanks to the advancement of faster processors within communication devices, there has been a rapid change in how information is modulated, multiplexed, managed, and moved. While formulas and functions are critical in creating the granular components and operations of individual technologies, understanding the applications and their purposes in the business environment only requires a basic scientific background. The third edition of Introduction to Communications Technologies: A Guide for Non-Engineers helps students in telecommunications business programs become familiar with and stay abreast of the ever-changing technology surrounding their industry. Used in the core curriculum at Ball State University's graduate professional program in Information and Communication Sciences, this textbook is designed for graduate and undergraduate students who do not necessarily have a high level of technical expertise, but need to have some understanding of the technical functions of information and communication technologies to prepare them for working in a corporate environment. See What's New in the Third Edition: Significant updates to the following chapters: Modulation Schemes; Signaling Formats, Multiplexing, and Digital Transmission; Packet Switching and Local Area Networks; Mobile Wireless Technologies; Network Security and Management Added coverage of OFDMA, Metro Ethernet, 5G pre-standard configuration, 'apps' on mobile devices, and VoIP core switching New chapters on Big Data and the Cloud Avoiding complicated equations and the need for calculus gymnastics, this textbook provides non-engineering students with a firm background and a broad understanding of the knowledge necessary to work within the fast-paced and ever-changing communications industry.
The international conference "Sustainable Collaboration in Business, Technology, Information and Innovation (SCBTII) 2019" has brought together academics, professionals, entrepreneurs, researchers, learners, and other related groups from around the world who have a special interest in theories and practices in the development of the field of digital economy for global competitiveness. Considering that, at present, technology and industry 4.0 are still a leading trend and offer great opportunities for global businesses, the rise of industry 4.0 makes competition in the business world more attractive, yet fierce. Opportunities and challenges for business development in industry 4.0 are becoming firm and it also provides businesses the possibility to compete globally. Companies that desire to enter this global competition should pay attention to customer benefits and business fairness in order to achieve sustainability in this digital economy. This proceedings volume contains selected papers from this conference and presents opportunities to communicate and exchange new ideas and experiences. Moreover, the conference provided opportunities, both for the presenters and the participants, to establish research relations, and find global partners for future collaboration.
In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems. This book covers the scope of parallel programming for modern high performance computing systems. It first discusses selected and popular state-of-the-art computing devices and systems available today, These include multicore CPUs, manycore (co)processors, such as Intel Xeon Phi, accelerators, such as GPUs, and clusters, as well as programming models supported on these platforms. It next introduces parallelization through important programming paradigms, such as master-slave, geometric Single Program Multiple Data (SPMD) and divide-and-conquer. The practical and useful elements of the most popular and important APIs for programming parallel HPC systems are discussed, including MPI, OpenMP, Pthreads, CUDA, OpenCL, and OpenACC. It also demonstrates, through selected code listings, how selected APIs can be used to implement important programming paradigms. Furthermore, it shows how the codes can be compiled and executed in a Linux environment. The book also presents hybrid codes that integrate selected APIs for potentially multi-level parallelization and utilization of heterogeneous resources, and it shows how to use modern elements of these APIs. Selected optimization techniques are also included, such as overlapping communication and computations implemented using various APIs. Features: Discusses the popular and currently available computing devices and cluster systems Includes typical paradigms used in parallel programs Explores popular APIs for programming parallel applications Provides code templates that can be used for implementation of paradigms Provides hybrid code examples allowing multi-level parallelization Covers the optimization of parallel programs
It takes 17 years on average to bring new medical treatments ideas into evidence-based clinical practice. The growing replicability crisis in science further delays these "new miracles." Blockchain can improve science and accelerate medical research while bringing a new layer of trust to healthcare. This book is about science, its value to medicine, and how we can use blockchain to improve the quality and impact of both. The book looks at science and medicine from an insider's perspective and describes the processes, successes, shortcomings and opportunities in an accessible way for a broad audience. It weaves this a non-technical look at the emerging world of blockchain technology; what it is, where it is useful, and how it can improve science and medicine. It lays out a roadmap for this application to transform how we develop knowledge about health and medicine to improve our lives. In the first part, Blockchain isn't Tech, the authors look at blockchain/distributed ledger technology along with critical trade-offs and current explorations of its utility. They give an overview of use cases for the technology across industries, including finance, manufacturing and healthcare, with interviews and insights from leaders across government, academia, and tech/health industry both big and start-up. In the second part, Science is Easy, the authors look at science as a process and how this drives advancement in medicine. They shed a light on some of science's shortcomings, including the reproducibility crisis and problems with misaligned incentives (i.e. publish or perish). They apply a breakdown of critical components to the functional steps in the scientific process and outline how the open science movement is looking to improve these, while highlighting the limit of these fixes with current technology, incentives and structure of science. In the third part, DAO of Science, the authors look at how blockchain applied to open science can impact medical research. They examine how this distributed approach can provide better quality science, value-based research and faster medical miracles. Finally, they provide a vision of the future of distributed medical research and give a roadmap of steps to get there.
The calculus of IT support for the banking, securities, and insurance industries has changed dramatically and rapidly over the past few years. Consolidation and deregulation are creating opportunities and challenges never before seen. Unheard of just a few years ago, e-commerce has given birth to new infrastructures and departments needed to support them. And the Internet/Intranet/Extranet triple-whammy is the most critical component of most financial IT shops. At the same time, new intelligent agents stand ready to take on such diverse functions as customer profiling and data mining. Get a handle on all these new and newer ripples with Financial Services Information Systems. Here, in this exhaustive new guide and reference book, industry guru Jessica Keyes gives you the no-nonsense scoop on not just the tried and true IT tools of today, but also the up-and-coming "hot" technologies of tomorrow, and how to plan for them. Financial Services Information Systems addresses challenges and solutions associated with: supporting the self-service revolution by servicing kiosks and ATMs efficiently and economically, straight-through processing for the securities industry, outsourcing business communications in the insurance industry, distributed integration as a cost-effective alternative to data warehousing, and putting inbound fax automation to work in financial organizations.
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."- Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."- Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."- Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."- Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems
Oracle 11i E-Business Suite from the Front Lines is the first book to compile the tips, techniques, and practical advice for administering Oracle E-Business Suite 11i. The author examines Active Directory Utilities, patching, cloning, and the new features that 11i brings to the market. The book benefits those with limited experience with Oracle Application but with more extensive background in Oracle Database Administration. This volume is valuable to systems administrators or DBAs who have experience with older versions of Oracle Financials and want to expand their knowledge to include the changes inherent in 11i. The book details the steps in installing a new 11i environment, and explains the process of upgrading from a 10.7 or an 11.0.3 release. It also explores the techniques and results of migrating from one maintenance release of 11i to another. This analysis offers you real-world hints and recommendations to help you with day-to-day tuning, troubleshooting, and maintenance and will help you deliver reliable service to your end users. It is also a helpful tool that enables managers and co-workers to understand the daily challenges that Apps DBAs face.
When you invest in expensive technology and systems, you want to get the most out of them. Process improvement has been used for years as an effective strategy to reduce costs, shorten cycle times, improve quality, and increase user satisfaction in other areas of business such as Quality, Manufacturing, and Engineering. While there are many books available on process improvement and process re-engineering, few of them address the unique processes within information systems as clearly and succinctly as A Practical Guide to Information Systems Improvement. Process Improvement for IS Tailored specifically for IS processes, A Practical Guide to Information Systems Process Improvement provides a step-by-step method for creating a world class Information System organization. The authors introduce process management and highlight its application to information systems. The book outlines a practical, complete, and easy-to-understand method for improving or re-engineering the processes within the Information Systems organization - simplifying process improvement so that you can begin to use it immediately. Avoid common pitfalls and mistakes The evolving business environment puts new demands on your Information Systems. E-commerce, changing technology, ERP, and globalization are just a few of the areas that will benefit from process improvement. This easy-to-follow guide includes a corresponding process model for each step that serves as a starting point for process improvement effort. It provides a checklist to ensure your new process meets all the requirements for its particular purpose and identifies pitfalls and mistakes to avoid.
ERP Systems for Manufacturing Supply Chains: Applications, Configuration, and Performance provides insight into the core architecture, modules, and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems, the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module's structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises, as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However, there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system's core modules and functions, this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility, as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies.
The Project Management Office (PMO) is a rapidly emerging concept in project management that has evolved in terms of its application, sophistication, and proven results. Most literature on the subject focuses on a specific facet or purpose of PMO. The Advanced Project Management Office: A Comprehensive Look at Function and Implementation provides an all-inclusive description of the PMO and allows project management professionals to select the features most appropriate and relevant to the issues at hand, while keeping the full PMO picture in perspective. The authors illustrate how the PMO can be used to reduce costs of projects, decrease time to market for new products, increase corporate profits, and ensure project success. This reference covers all aspects of PMO in a format that is easy to read and understand. It discusses the motivations for adopting a PMO, including project performance, project manager competency, the organizational desire to excel, and much more. Both short-term and long-term functions are identified and discussed. WBS-like structures are developed for use in the process of evaluating project performance during the life-cycle of the project. Ideal for senior project management professionals and as an advanced project management training program, the book presents two related models that deal with the evaluation of project performance from the vantage point of the client as well as the project team. With so many industries becoming project team driven, The Advanced Project Management Office will help project managers ensure project success and improve their company's bottom line. Check out a video of Ginger Levin discussing The Advanced Project Management Office: http://www.youtube.com/watch?feature=youtu.be&v=TRgVjR4v130&gl=GB
Project Managers leading massive IT projects--defined as projects rolling out deliverables across geographic boundaries with budgets ranging well into the millions--need a unique level of expertise and an arsenal of personal and professional skills to successfully accomplish their tasks. Large IT initiatives inherently contain business conditions, technology quirks, and participant and managerial agendas that make them exceedingly difficult to execute. Complex IT Project Management: Sixteen Steps to Success reveals a project management process that the author has proven to be successful in many complex real-world projects. Each step is presented in its logical sequence, with the connections between management methods and project goals clearly defined. The author often refers to the successful tactics he employed, providing you with a strategy to overcome the challenges found in even the most intricate IT projects. This book stands as the perfect tool for project managers at all levels of experience who plan to tackle a high-profile initiative. It also serves as a guide for project sponsors searching for the right manager, and for consultants recommending best practices for the workplace.
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- Focuses on setting the right road map so that you can be most effective in your information security implementations Discusses cost-effective staffing, the single biggest expense to the security organization Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively Identifies high-risk areas, focusing limited resources on the most imminent and severe threats Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.
Systems Engineering for Business Process Change: New Directions is
a collection of papers resulting from an EPSRC managed research
programme set up to investigate the relationships between Legacy IT
Systems and Business Processes. The papers contained in this volume
report the results from the projects funded by the programme, which
ran between 1997 and 2001. An earlier volume, published in 2000,
reported interim results.
For companies to be successful, the management of an organization needs to understand how competence evolves and how it can be utilized and linked to the organization's goals. When executive managers understand this, there is a higher probability that the people working in the organization will be more satisfied with their working situation. Satisfaction increases because competence will likely be central in the organization, with focus on motivating people to develop new competence, healthy internal mobility, and organizational learning. Positively managing competence in most cases leads to a win-win situation for the company and the individual. This book describes how we as individuals, as well as organizations, can be efficient in the development and utilization of competence. It takes two perspectives of competence and connects them in a project-intensive and knowledge-intensive context. The first perspective is the "Lemon," which focuses on individual competence and the role of organizational culture. The Lemon framework takes the concept of competence based on knowledge and experience and explains how a person can apply knowledge and experience to different contexts. It changes the concept of competence from being static to being agile and dynamic. The second perspective of competence is the "Loop," which models how organizations can manage not only to the benefit of organizational strategies and goals but also to an individual's future career. The Lemon and the Loop are the basic tools to make competence and performance management agile and effective. This book presents practical ways to acquire new knowledge and skills. One method is REPI (Reflection, Elaboration, Practicing/Participation, and Investigation), which can be used for training, coaching, competence development, agile performance management, and much more. Readers of the book are given new insight into the concept of competence and how both people and organizations ca
Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis. Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes. Bringing together concepts across software engineering with a project management perspective, Applied Software Risk Management: A Guide for Software Project Managers presents a rigorous, scientific method for identifying, analyzing, and resolving risk.
This book shows executive, project, program, and portfolio managers how ethical behavior can ensure that an organization has proper governance. Improper governance and unethical behavior have led to such well-known financial disasters as Enron and Madoff Investments. The book arms managers with two important tools: Small Sins Allowed (SSA) and Line of Impunity (LoI), which together can be the foundation for renewed and vigorous corporate governance. SSA is a powerful tool that helps managers establish a level above which adherence to ethical standards is expected. LoI aids managers in identifying ethical fault lines that may exist in a company and helps to keep unethical behavior in check. |
You may like...
Technology Integration and Foundations…
Shuyan Wang, Taralynn Hartsell
Hardcover
R4,500
Discovery Miles 45 000
Governance of Picture Archiving and…
Carrison K.S. Tong, Eric T.T. Wong
Hardcover
R5,612
Discovery Miles 56 120
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,896
Discovery Miles 28 960
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
Network Classification for Traffic…
Zahir Tari, Adil Fahad, …
Hardcover
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
|