0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (11)
  • R500+ (885)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Information Security - Design, Implementation, Measurement, and Compliance (Hardcover): Timothy P Layton Information Security - Design, Implementation, Measurement, and Compliance (Hardcover)
Timothy P Layton
R3,701 Discovery Miles 37 010 Ships in 12 - 17 working days

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context.

Knowledge Management, Business Intelligence, and Content Management - The IT Practitioner's Guide (Hardcover): Jessica... Knowledge Management, Business Intelligence, and Content Management - The IT Practitioner's Guide (Hardcover)
Jessica Keyes
R3,736 Discovery Miles 37 360 Ships in 12 - 17 working days

Examines the synergy between knowledge management, business intelligence, and content management Refers to detailed information about available toolsets Offers numerous tables and figures that enable quick understanding of the concepts discussed Includes 13 appendices that contain essential guides, templates, checklists, and more Knowledge management (KM) is the identification and analysis of available and required knowledge, and the subsequent planning and control of actions, to develop "knowledge assets" that enable businesses to generate profits and improve their competitive positions. This volume provides the framework for the strategic use of the information intelligence processes - business intelligence, content management, and knowledge management. In nine detailed chapters, the author explains every facet of these three subjects, enabling you to understand these sophisticated business concepts within the framework of information technology. Knowledge Management, Business Intelligence, and Content Management: The IT Practitioner's Guide discusses creation, protection, development, sharing, and management of information and intellectual assets through the use of business intelligence and other knowledge sharing and analytical techniques. About the Author Jessica Keyes is president of New Art Technologies, Inc., a high-technology and management consultancy, and is also founding partner of Manhattan Technology Group. Often a keynote speaker on the topics of competitive strategy, productivity, and quality, she is a founding board of directors member of the New York Software Industry Association, and has recently completed a 2-year term on the Mayor of New York City's Small Business Advisory Council. A noted columnist and correspondent, Keyes is the author of 19 books, including Auerbach Publications' Software Engineering Handbook, Software Configuration Management, and Implementing the IT Balanced Scorecard.

PgMP Exam Practice Test and Study Guide (Hardcover, 4th edition): Ginger Levin, J. LeRoy Ward PgMP Exam Practice Test and Study Guide (Hardcover, 4th edition)
Ginger Levin, J. LeRoy Ward
R5,364 Discovery Miles 53 640 Ships in 12 - 17 working days

PgMP Exam Practice Test and Study Guide, Fourth Edition is the book you need to pass the Program Management Professional (PgMP) exam the first time around. It reflects recent revisions based on PMI's Standard for Program Management - Third Edition (2013).Based on best practices that complement PMI's standards, this is the most comprehensive and up-to-date resource available to help you prepare for the exam with new and changed terminology. It includes a list of the major topics covered on the exam organized by the five performance domains'strategic program management, program life cycle, benefits management, stakeholder management, and governance as presented in the Program Management Professional Examination Content Outline. It also includes helpful tips on how to make the most of the time you have available to prepare for the exam. Just like its bestselling predecessors, this indispensable study guide includes 20 multiple-choice practice questions for each domain along with a comprehensive answer key. The program life cycle domain includes 20 questions for each of the five phases. Each question also has a plainly written rationale for each correct answer with bibliographic references for further study.Two challenging, 170-question practice tests that simulate the actual exam are included in the book and online, so you can retake them as many times as necessary. They also include a rationale and reference.Scores for the online tests are presented as if each question is rated similarly, but this edition also includes a new component: the authors own weighting system for the level of difficulty for each question. This system will show you what they feel meets the exam's criteria for Proficient, Moderately Proficient, and below Proficient. You then will see your scores by domain in both approaches.Supplying an in

Ethics in IT Outsourcing (Paperback): Tandy Gold Ethics in IT Outsourcing (Paperback)
Tandy Gold
R1,737 Discovery Miles 17 370 Ships in 12 - 17 working days

In IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads, Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs, such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro, macro, and corporate level, this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals, corporations, and society Outlines a new corporate capability-the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author's decades of experience working with large firms in IT and outsourcing, this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance, it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal, corporate, and societal decision-making. Readers are invited to participate in the growing dialog of business ethics, and IT outsourcing ethics in particular, at the author's website: www.ethicsinit.com

A Comprehensive Guide to Enterprise Mobility (Paperback): Jithesh Sathyan, Anoop N, Navin Narayan, Shibu Kizhakke Vallathai A Comprehensive Guide to Enterprise Mobility (Paperback)
Jithesh Sathyan, Anoop N, Navin Narayan, Shibu Kizhakke Vallathai
R1,682 Discovery Miles 16 820 Ships in 12 - 17 working days

Although enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility has resulted in a lack of books on the subject. A Comprehensive Guide to Enterprise Mobility fills this void. It supplies authoritative guidance on all aspects of enterprise mobility-from technical aspects and applications to implementation. The book introduces basic concepts such as enterprise mobility adoption strategy and user requirements in mobility. Illustrating the technical aspects of enterprise mobility, it analyzes the key features and challenges in developing mobility solutions for various domains. The text is organized into four sections: Mobility Concepts: supplies a solid foundation in enterprise mobility, from strategy definition to deployment of enterprise mobility solutions Mobile Solutions and Case Studies: introduces readers to the applications of enterprise mobility across a wide range of industry sectors Mobile Application Development: supplies an overview of popular mobile platforms and mobile programming languages Technology Considerations in Mobility: details hybrid and supporting technologies in enterprise mobility The book's case studies illustrate the complete lifecycle in the development of mobility solutions, including the high level requirements, architecture, and design principles for each use case. Demonstrating how to put the concepts covered into practice, the text details the application of mobility solutions across various domains, including the healthcare, retail, airline, and pharmaceutical industries.

BYOD for Healthcare (Paperback): Jessica Keyes BYOD for Healthcare (Paperback)
Jessica Keyes
R1,772 Discovery Miles 17 720 Ships in 12 - 17 working days

With 70 percent of organizations already adopting bring your own device (BYOD) and Gartner expecting this number to increase to 90 percent by the end of 2014, it is not a question of if, or when, it's a question of will you be ready. BYOD for Healthcare provides authoritative guidance to help you thrive during the healthcare BYOD (hBYOD) revolution. Jessica Keyes, president of New Art Technologies, Inc., professor at the University of Liverpool, and former managing director of R&D for the New York Stock Exchange, supplies an understanding of these new end users, their demands, and the strategic and tactical ramifications of these demands. Maintaining a focus on the healthcare industry, the book considers the broad range of technical considerations, including selection, connectivity, training, support, and security. It examines the integration of BYOD to current health IT, legal, regulatory, and ethical issues. It also covers risk assessment and mitigation strategies for an hBYOD environment that are in line with medical laws, regulations, ethics, and the HIPAA and HITECH Acts. The text discusses BYOD security and provides time-saving guidance on how to configure your hBYOD environment. It also considers how BYOD impacts resource management, certification of EMR/EHR software, health informatics, and health information exchange. The book covers content and data management, risk assessment, and performance measurement and management. It includes a set of Quick Start guides with tips for assessing costs, cloud integration, and legal issues. It also contains a robust appendix with information on everything from security settings for Apple iOS devices to a sample employee mobile device agreement.

Strategic Intelligence - Business Intelligence, Competitive Intelligence, and Knowledge Management (Hardcover, New title): Jay... Strategic Intelligence - Business Intelligence, Competitive Intelligence, and Knowledge Management (Hardcover, New title)
Jay Liebowitz
R3,092 Discovery Miles 30 920 Ships in 12 - 17 working days

Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies among component pieces of strategic intelligence, and demonstrates how executives can best use this internal and external information toward making better decisions. Divided into two major parts, the book first discusses the convergence of knowledge management (KM), business intelligence (BI), and competitive intelligence (CI) into what the author defines as strategic intelligence. The second part of the volume describes case studies written by recognized experts in the fields of KM, BI, and CI. The case studies include strategic scenarios at Motorola, AARP, Northrop Grumman, and other market leaders. About the Editor Jay Liebowitz, D.Sc., is a full professor in the Graduate Division of Business and Management and program director for the Graduate Certificate in Competitive Intelligence at Johns Hopkins University. The first knowledge management officer at NASA Goddard Space Flight Center, he also served as the Robert W. Deutsch Distinguished Professor of Information Systems at the University of Maryland-Baltimore County, professor of Management Science at George Washington University, and Chaired Professor of Artificial Intelligence (AI) at the U.S. Army War College. A founder and chairperson of The World Congress on Expert Systems, he is a Fulbright Scholar, IEEE-USA Federal Communications Commission Executive Fellow, and Computer Educator ofthe Year (International Association for Computer Information Systems).

Practical Data Security - Applied Information Technology (Hardcover): John Gordon Practical Data Security - Applied Information Technology (Hardcover)
John Gordon
R2,941 Discovery Miles 29 410 Ships in 12 - 17 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Standard for Auditing Computer Applications (Hardcover, 2nd edition): Martin Krist Standard for Auditing Computer Applications (Hardcover, 2nd edition)
Martin Krist
R4,882 Discovery Miles 48 820 Ships in 12 - 17 working days

A Standard for Auditing Computer Applications is a dynamic new resource for evaluating all aspects of automated business systems and systems environments. At the heart of A Standard for Auditing Computer Applications system is a set of customizable workpapers that provide blow-by-blow coverage of all phases of the IT audit process for traditional mainframe, distributed processing, and client/server environments.A Standard for Auditing Computer Applications was developed by Marty Krist, an acknowledged and respected expert in IT auditing. Drawing upon his more than twenty years of auditing experience with leading enterprise organizations, worldwide, Marty walks you step-by-step through the audit process for system environments and specific applications and utilities. He clearly spells out what you need to look for and where to look for it, and he provides expert advice and guidance on how to successfully address a problem when you find one.When you order A Standard for Auditing Computer Applications, you receive a powerful package containing all the forms, checklists, and templates you'll ever need to conduct successful audits on downloadable resources. Designed to function as a handy, on-the-job resource, the book follows a concise, quick-access format. It begins with an overview of the general issues inherent in any IT review. This is followed by a comprehensive review of the audit planning process. The remainder of the book provides you with detailed, point-by-point breakdowns along with proven tools for:evaluating systems environments-covers all the bases, including IT administration, security, backup and recovery planning, systems development, and moreEvaluating existing controls for determining hardware and software reliabilityAssessing the new system development processEvaluating all aspects of individual applications, from I/O, processing and logical and physical security to documentation, training, and programmed proceduresAssessing specific applications and utilities, including e-mail, groupware, finance and accounting applications, CAD, R&D, production applications, and more

Somewhat on the Community System - Representations of Fourierism in the Works of Nathaniel Hawthorne (Hardcover, New): Andrew... Somewhat on the Community System - Representations of Fourierism in the Works of Nathaniel Hawthorne (Hardcover, New)
Andrew Loman
R3,988 Discovery Miles 39 880 Ships in 12 - 17 working days

Hawthorne wrote much of his major fiction in the decade that the theories of Charles Marie Francois Fourier crossed the Atlantic and contributed to a wave of communitarian experimentation in the American North. Famously, Hawthorne briefly lived and worked at Brook Farm, a Transcendentalist commune that formally "converted" to Fourierism when he had left and was embroiled in litigation to recover money he had invested in the community. In his fiction, Hawthorne responded directly to Fourierism and its critique of capitalism. He used his experiences at Brook Farm as the inspiration for "The Blithedale Romance," and in "The House of the Seven Gables" cast one of the principal characters as a recovering Fourierist. In "The Scarlet Letter" he engaged with Fourierist debates on marriage and the regulation of desire. ""Somewhat on the" "Community-System"" examines these interventions, and argues that Hawthorne's fiction both seeks to contain Fourierism and responds to its allure. Moreover, in formulating alternative, morally acceptable utopias (ones that are predicated on middle-class marriage), Hawthorne's fiction appropriates key aspects of Fourierist theory

Reducing Risk with Software Process Improvement (Hardcover): Louis Poulin Reducing Risk with Software Process Improvement (Hardcover)
Louis Poulin
R3,092 Discovery Miles 30 920 Ships in 12 - 17 working days

Reducing Risk with Software Process Improvement recommends the critical practices that aid in the successful delivery of software products and services. The author describes the observations that he made over a period of ten years in IT projects and organizations. He focuses on the areas of software development and maintenance, highlighting the most frequently encountered problems that occur due to poor processes. The author derives recommendations from 40 comprehensive assessments of IT organizations. This book details the potential or real problems each organization experienced, and offers anecdotes on how these problems resulted from deficient practices, what their impacts were, and how improving specific practices benefitted the organizations. This volume provides valuable advice for project and application managers looking to minimize the number of crises they have to deal with, and for IT practitioners seeking the practical solutions that lead to career advancement. It benefits customers who need to know what to look for before purchasing IT products or services, and helps investors analyze the efficiency of IT companies before making investment decisions.

Cost-Based, Charge-Based, and Contractual Payment Systems (Hardcover): Duane C. Abbey Cost-Based, Charge-Based, and Contractual Payment Systems (Hardcover)
Duane C. Abbey
R5,184 Discovery Miles 51 840 Ships in 12 - 17 working days

The fourth book in the Healthcare Payment System series, Cost-Based, Charge-Based, and Contractual Payment Systems compares cost-based systems, charge-based payment approaches, and contractually-based payment processes with fee-schedule payment systems and prospective payment systems. Supplying readers with a clear understanding of important background material on the different types of healthcare providers, it covers the basics of cost-based, charge-based, and contractual payment systems. The book illustrates essential concepts with a series of simple case studies making it ideal for anyone interested in learning more about the specific systems and processes used for payment in healthcare services. It discusses Medicare cost-based payment systems, Medicare payment approaches, and includes an appendix that outlines the various Medicare payment systems. Demystifying contractual language, it outlines managed care contracts and also: Delves into the intricacies involved with adjudication of claims Considers capitated payment systems Addresses healthcare costs and cost-based reimbursement systems Examines charge-based and contractual payment systems Describes where healthcare payment systems are headed in the future Since compliance is inherent throughout the process of providing services, filling claims, and receiving payment, the book examines the range of compliance concerns, including statutory, contractual, and overpayment issues. Using numerous examples to illustrate the processes used for capitated contract arrangements, the book includes coverage of claim adjustment, managed care contracts, and the various combinations of payment systems used by third-party administrators.

Six Sigma Software Development (Hardcover, 2nd edition): Christine B. Tayntor Six Sigma Software Development (Hardcover, 2nd edition)
Christine B. Tayntor
R4,929 Discovery Miles 49 290 Ships in 12 - 17 working days

Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development. Removing the mystique surrounding this technique, Six Sigma Software Development, Second Edition demonstrates how Six Sigma tools and concepts can be used to enhance the system development process. Revised and updated, this second edition clearly explains Six Sigma concepts and their application, maps Six Sigma concepts and tools to all aspects of system development, and proposes the use of Six Sigma tools to evaluate and improve the overall performance of the IT department. In addition to classic Six Sigma, the book introduces Design for Six Sigma (DFSS) and illustrates when and how its tools and techniques can be used to increase the robustness and reliability of a new system. It also shows how the judicious application of lean tools can reduce the complexity of IT processes, thus shortening the time needed to translate customer requirements into completed systems and increasing customer satisfaction.

Borderless Leadership - Global Skills for Personal and Business Success (Hardcover): Zlatica Kraljevic Borderless Leadership - Global Skills for Personal and Business Success (Hardcover)
Zlatica Kraljevic
R1,875 Discovery Miles 18 750 Ships in 12 - 17 working days

"Borderless Leadership is a must read for anyone involved in international business. It enables beginners to avoid common pitfalls, and seasoned executives will recognize many of their own mistakes and benefit from the frameworks Dr. Kraljevic provides." - Professor Sibrandes Poppema, President, University of Groningen, Netherlands "I just cannot stop recommending this book to ever so many people-my academic colleagues, industry colleagues, friends in the government, former students, students, young CEOs of start-ups that I mentor, and my media friends. The book is very special, deep with several gems of ideas, told in absorbing narrative; neither a text book nor a cook book but a candid, sincere, and extremely effective set of real world lessons for so many global citizens. Dr. Kraljevic uses personal examples from across continents, in diverse industry settings. All I can say is this: Go, grab the book on a Thursday night, and you will have a wonderful weekend reading this amazing book." - Professor S. Sadagopan, Director, International Institute of Information Technology of Bangalore, India "Everything I know about international markets, I owe it to Zlatica." - Sue Payne, Former ExxonMobil Area Manager U.S. & Mexico "As the global village rapidly expands, understanding borderless leadership becomes a prerequisite for international success in this 21st century. Kraljevic brings her vast and unique worldly experiences to open your mind with practical treasures, thoughtful how-to models, and conceptual insights. Find out about the human fractal on your journey to becoming a borderless leader." - Lane Sloan, Former President, Shell Chemical Company, USA Studies consistently show that international partnerships between organizations fail to generate expected results at a significant cost. The leading cause behind this failure is lack of trust among people at all levels within organizations. Borderless Leadership explores the disparity that exists between the ways that the West and other cultures conduct business. The book's premise is that if one cannot control the events or circumstances, one must learn how to control reactions to new environments. Using real-life examples, the book illustrates how to build trust and rapport with business partners across borders and establish relationships that help businesses grow. The book is about achieving success with and through total strangers as you progress from awareness to understanding and from understanding to acquiring, internalizing, and applying new knowledge so you bring your approach to life up to date. Only then can you transform obstacles into unsuspected opportunities that will have a positive impact on your personal and business success.

Random Graphs and Complex Networks (Hardcover): Remco van der Hofstad Random Graphs and Complex Networks (Hardcover)
Remco van der Hofstad
R1,554 Discovery Miles 15 540 Ships in 12 - 17 working days

This rigorous introduction to network science presents random graphs as models for real-world networks. Such networks have distinctive empirical properties and a wealth of new models have emerged to capture them. Classroom tested for over ten years, this text places recent advances in a unified framework to enable systematic study. Designed for a master's-level course, where students may only have a basic background in probability, the text covers such important preliminaries as convergence of random variables, probabilistic bounds, coupling, martingales, and branching processes. Building on this base - and motivated by many examples of real-world networks, including the Internet, collaboration networks, and the World Wide Web - it focuses on several important models for complex networks and investigates key properties, such as the connectivity of nodes. Numerous exercises allow students to develop intuition and experience in working with the models.

Practical Hacking Techniques and Countermeasures (Hardcover): Mark D Spivey Practical Hacking Techniques and Countermeasures (Hardcover)
Mark D Spivey
R4,882 Discovery Miles 48 820 Ships in 12 - 17 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Information Technology - An Introduction for Today's Digital World (Paperback, 2nd edition): Richard Fox Information Technology - An Introduction for Today's Digital World (Paperback, 2nd edition)
Richard Fox
R2,345 Discovery Miles 23 450 Ships in 9 - 15 working days

This revised edition has more breadth and depth of coverage than the first edition. Information Technology: An Introduction for Today's Digital World introduces undergraduate students to a wide variety of concepts that they will encounter throughout their IT studies and careers. The features of this edition include: Introductory system administration coverage of Windows 10 and Linux (Red Hat 7), both as general concepts and with specific hands-on instruction Coverage of programming and shell scripting, demonstrated through example code in several popular languages Updated information on modern IT careers Computer networks, including more content on cloud computing Improved coverage of computer security Ancillary material that includes a lab manual for hands-on exercises Suitable for any introductory IT course, this classroom-tested text presents many of the topics recommended by the ACM Special Interest Group on IT Education (SIGITE). It offers a far more detailed examination of the computer and IT fields than computer literacy texts, focusing on concepts essential to all IT professionals - from system administration to scripting to computer organization. Four chapters are dedicated to the Windows and Linux operating systems so that students can gain hands-on experience with operating systems that they will deal with in the real world.

The Lean IT Expert - Leading the Transformation to High Performance IT (Hardcover): Niels Loader The Lean IT Expert - Leading the Transformation to High Performance IT (Hardcover)
Niels Loader
R1,559 Discovery Miles 15 590 Ships in 12 - 17 working days

Digital transformation is a business concern; it is no longer just IT that must get things done. The disruptive force of start-ups focusing on IT-based services that can be consumed through mobile devices cannot be underestimated -- These start-ups eat away at the high-margin services provided by incumbents, leaving lower margin products and services that are rapidly being commoditized. This is happening in all industry sectors and it is the ones who are best able to adjust, innovate, and improve their service offerings that will survive. The question is: What do you need to do to ensure that your organization is one of the survivors? The core of the solution to the problem is to radically improve the way the IT organization works together with the business. To be clear, the digital transformation of your business depends on that relatively small group of people in the basement, or other out-of-the-way location, who make sure that your IT services work. So, building a cooperative model is vital for the success of the business. Which model has proven its worth in many industries? It is the application of Lean principles that gives organizations an advantage in delivering their products and services to their customers. Transforming your organization to high performance is, above all, a people-based movement with the acquisition and, most importantly, application of knowledge and skills necessary for the high performance way of working at its core. In teams, from boardroom to work floor, building a new way of thinking and acting is essential. This book aims to give insight into the reasons why you and your organization must consciously act to apply Lean principles to your IT organization. It explains the phases organizations go through as they start out with their initial attempts to gain advantages from Lean tools to the phase in which they reap the strategic benefits of Lean applied to IT. The real work of the transformation is described from two different perspectives: Leadership and Team. This book describes a complete set of principles, practices and tools In order to make the right decisions along the winding route of your transformation. The people who will guide, support and drive your transformation are the leaders and tem members who understand and apply those principles, practice and tools: your Lean IT Experts.

Embedded Systems Dictionary (Paperback, New): Jack Ganssle Embedded Systems Dictionary (Paperback, New)
Jack Ganssle
R1,510 Discovery Miles 15 100 Ships in 12 - 17 working days

This technical dictionary will define all of the most-used words in the embedded systems field - over 2500. Designed to serve both the technical and non-technical audience, this book defines advanced terms in two steps. The first step is a general, contextual definition that will serve the needs of less technical readers. The second step is in terms that are appropriate to a serious technical reader. Some terms reference an appendix of even more detailed white papers.

Hacker's Guide to Project Management (Paperback, 2nd edition): Andrew Johnston Hacker's Guide to Project Management (Paperback, 2nd edition)
Andrew Johnston
R1,798 Discovery Miles 17 980 Ships in 12 - 17 working days

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.
A Hacker's Guide to Project Management acts as a guide through this maze. It's aimed specifically at those managing a project or leading a team for the first time, but it will also help more experienced managers who are either new to software development, or dealing with a new part of the software life-cycle.
This book:

  • describes the process of software development, how projects can fail and how to avoid those failures

  • outlines the key skills of a good project manager, and provides practical advice on how to gain and deploy those skills

  • takes the reader step-by-step through the main stages of the project, explaining what must be done, and what must be avoided at each stage

  • suggests what to do if things start to go wrong!

The book will also be useful to designers and architects, describing important design techniques, and discussing the important discipline of Software Architecture.
This new edition:
  • has been fully revised and updated to reflect current best practices in software development

  • includes a range ofdifferent life-cycle models and new design techniques

  • now uses the Unified Modelling Language throughout

  • Fully revised and updated to reflect developments in the field
  • Modified structure to represent the iterative and incremental development methods which are now more common than the past 'waterfall' approaches
  • New content added that describes and advises on the major advances in software engineering in the last 8 years
Making IT Count - Strategy, Delivery, Infrastructure (Paperback): Nancy Olson, Leslie Willcocks, Peter Petherbridge Making IT Count - Strategy, Delivery, Infrastructure (Paperback)
Nancy Olson, Leslie Willcocks, Peter Petherbridge
R1,808 Discovery Miles 18 080 Ships in 12 - 17 working days

'Making IT Count: from strategy to implementation' focuses on the practical elements of delivering Information Technology strategy. Studies regularly show that over half of Information Technology strategies are never implemented, or are unsuccessful in delivering the desired results, and that a significant percentage of strategies implemented were never in the original plans. The linkage between strategy development and delivery needs a very clear focus; this is the key topic that the authors address. The book highlights eight major fallacies in managing IT, and eighteen better practices. It then details how to draw up strategy, instigate navigation techniques and make sourcing decisions. Change and delivery are a major focus, as is infrastructure development. Caselets and full length case studies of organizations such as General Electric, Siemens, Colonial Mutual, Charles Schwab, Macquarie Bank, ICI, United Airlines, Norwich Union, Walgreens and Dell and have been included to show how strategies have been successfully implemented and managed.

PgMP Exam Challenge! (Hardcover): J Leroy Ward Pmp Pgmp, Ginger Levin, PMP, PgMP PgMP Exam Challenge! (Hardcover)
J Leroy Ward Pmp Pgmp, Ginger Levin, PMP, PgMP
R5,236 Discovery Miles 52 360 Ships in 12 - 17 working days

Up to date with the third edition of PMI's Program Management Standard, The PgMP(R) Exam Challenge! contains more than 300 practice questions to help readers hone their knowledge and test their skills. It covers all five of the program management domains: Strategic Program Management, Program Management Life Cycle, Benefits Management, Stakeholder Management, and Governance. It also examines all of the sub domains of the lifecycle domain. With an easy-to-use format, this is an ideal resource for those preparing to take the PgMP exam.

Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover): Gilbert Held Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Gilbert Held
R4,915 Discovery Miles 49 150 Ships in 12 - 17 working days

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your

PMP Exam Challenge! (Hardcover, 6th edition): J. LeRoy Ward, Ginger Levin PMP Exam Challenge! (Hardcover, 6th edition)
J. LeRoy Ward, Ginger Levin
R5,250 Discovery Miles 52 500 Ships in 12 - 17 working days

Preparing for and passing the PMP(R) exam is no small feat. Although the number of certified PMP(R)s continues at a phenomenal rate, the exam failure rate remains uncommonly high. PMP(R) Exam Challenge! is designed to help you pass the exam by giving you an easy-to-use, highly portable publication, containing key relevant topics you are certain to encounter on your exam. Featuring 660 practice questions, this sixth edition completely reflects the PMBOK(R) Guide, Fifth Edition and covers the guide's ten knowledge areas.

Impact of Healthcare Informatics on Quality of Patient Care and Health Services (Hardcover): Divya Srinivasan  Sridhar Impact of Healthcare Informatics on Quality of Patient Care and Health Services (Hardcover)
Divya Srinivasan Sridhar
R5,181 Discovery Miles 51 810 Ships in 12 - 17 working days

Recent healthcare reform and its provisions have pushed health information technology (HIT) into the forefront. Higher life expectancies, fewer medical errors, lower costs, and improved transparency are all possible through HIT.Taking an integrated approach, Impact of Healthcare Informatics on Quality of Patient Care and Health Services examines the various types of organizations, including nonprofit hospitals, for-profit hospitals, community health centers, and government hospitals. By doing so, it provides you with a comparative perspective of how different organizations adapt and use the technology.The first part of the book covers the basics of HIT. It explains the significant changes that the Health Information Technology for Economic and Clinical Health Act (HITECH) and the Health Insurance Portability and Accountability Act (HIPAA) will bring about for stakeholders. This section includes coverage of key organizational cultural factors, management changes that will result from HIT, hospital financing changes that may take effect, a cost-benefit analysis of electronic medical records (EMRs), and the numerous organizational behavior changes stimulated by HIT.The second part of the book focuses on the broader community: the patient, the physician, government, and how HIT will impact each. These chapters cover quality of care and cost impacts on the patient from HIT, changes for patients of varying socioeconomic statuses, physician perceptions of HIT, medical malpractice lawsuits involving the use of HIT, bioterrorism, and use of EMRs. The book also includes a discussion about mobile health, and how a rapidly growing mobile health generation is changing the face of healthcare as we know it.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,056 Discovery Miles 10 560
Blockchain - A Hype or a Hoax?
Kapil Sharma Paperback R1,121 Discovery Miles 11 210
Continuous and Embedded Learning for…
Jon M. Quigley, Shawn P. Quigley Paperback R1,364 Discovery Miles 13 640
PKI Implementation and Infrastructures
Julian Ashbourn Paperback R1,110 Discovery Miles 11 100
Practical Core Software Security - A…
James F Ransome, Anmol Misra, … Paperback R2,301 Discovery Miles 23 010
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Cryptocurrency Concepts, Technology, and…
Jay Liebowitz Paperback R1,422 Discovery Miles 14 220
Intelligent IT Outsourcing
Sara Cullen, Leslie Willcocks Paperback R1,806 Discovery Miles 18 060
Big Data for Big Decisions - Building a…
Krishna Pera Paperback R1,360 Discovery Miles 13 600
The Adventurous and Practical Journey to…
FANAP Studies & Research Center Hardcover R3,029 Discovery Miles 30 290

 

Partners