0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (6)
  • R500+ (837)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Healthcare Informatics - Improving Efficiency through Technology, Analytics, and Management (Paperback): Stephan P. Kudyba Healthcare Informatics - Improving Efficiency through Technology, Analytics, and Management (Paperback)
Stephan P. Kudyba
R1,451 Discovery Miles 14 510 Ships in 10 - 15 working days

Healthcare Informatics: Improving Efficiency through Technology, Analytics, and Management supplies an understanding of the different types of healthcare service providers, corresponding information technologies, analytic methods, and data issues that play a vital role in transforming the healthcare industry. All of these elements are reshaping the various activities such as workflow and processes of hospitals, healthcare systems, ACOs, and patient analytics, including hot spotting, risk stratification, and treatment effectiveness. A follow-up to Healthcare Informatics: Improving Efficiency and Productivity, this latest book includes new content that examines the evolution of Big Data and how it is revolutionizing the healthcare industry. It presents strategies for achieving national goals for the meaningful use of health information technology and includes sound project management principles and case illustrations for technology roll-out, such as Computer Physician Order Entry (CPOE) for optimal utilization. The book describes how to enhance process efficiency by linking technologies, data, and analytics with strategic initiatives to achieve success. It explains how to leverage data resources with analytics to enhance decision support for care providers through in-depth descriptions of the array of analytic methods that are used to create actionable information, including Business Intelligence, Six Sigma, Data, and Text Mining.

The Complete Project Management Office Handbook (Paperback, 3rd edition): Gerard M. Hill The Complete Project Management Office Handbook (Paperback, 3rd edition)
Gerard M. Hill
R1,451 Discovery Miles 14 510 Ships in 10 - 15 working days

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support. Illustrating the implications of project management in today's organizations, The Complete Project Management Office Handbook, Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization, this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs, purpose, and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists, detailed process steps, and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management, but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs, the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate "quick-wins" and early PMO-based accomplishments in their organization.

Information Security Management Handbook, Volume 7 (Hardcover, 6th edition): Richard O'Hanley, James S. Tiller Information Security Management Handbook, Volume 7 (Hardcover, 6th edition)
Richard O'Hanley, James S. Tiller
R4,243 Discovery Miles 42 430 Ships in 10 - 15 working days

Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals Updates its bestselling predecessors with new developments in information security and the (ISC)2 (R) CISSP (R) CBK (R) Provides valuable insights from leaders in the field on the theory and practice of computer security technology Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover): Frank Siepmann Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Hardcover)
Frank Siepmann
R1,875 Discovery Miles 18 750 Ships in 10 - 15 working days

With cloud computing quickly becoming a standard in today s IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments requiring a change in how we evaluate risk and protect information, processes, and people.
Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization.
Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization.
Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics.
By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.

How Things Work - The Computer Science Edition (Hardcover): Charles F. Bowman How Things Work - The Computer Science Edition (Hardcover)
Charles F. Bowman
R3,655 Discovery Miles 36 550 Ships in 10 - 15 working days

It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.

The DataOps Revolution - Delivering the Data-Driven Enterprise (Hardcover): Simon Trewin The DataOps Revolution - Delivering the Data-Driven Enterprise (Hardcover)
Simon Trewin
R2,574 Discovery Miles 25 740 Ships in 10 - 15 working days

DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author's own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches, the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story, which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action, enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www.kinaesis.com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members.

Business Process Reengineering - An ICT Approach (Paperback): Heru Susanto, Fang-Yie Leu, Chin Kang Chen Business Process Reengineering - An ICT Approach (Paperback)
Heru Susanto, Fang-Yie Leu, Chin Kang Chen
R2,456 Discovery Miles 24 560 Ships in 10 - 15 working days

This volume shows how ICT (information and communications technology) can play the role of a driver of business process reengineering (BPR). ICT can aid in enabling improvement in BPR activity cycles as it provides many components that enhance performance that can lead to competitive advantages. IT can interface with BPR to improve business processes in terms of communication, inventory management, data management, management information systems, customer relationship management, computer-aided design, computer-aided manufacturing (CAM), and computer-aided engineering. This volume explores these issues in depth.

Ecosystems and Technology - Idea Generation and Content Model Processing (Paperback): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Paperback)
Cyrus F Nourani
R2,461 Discovery Miles 24 610 Ships in 10 - 15 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

Product Lifecycle Management to Support Industry 4.0 - 15th IFIP WG 5.1 International Conference, PLM 2018, Turin, Italy, July... Product Lifecycle Management to Support Industry 4.0 - 15th IFIP WG 5.1 International Conference, PLM 2018, Turin, Italy, July 2-4, 2018, Proceedings (Hardcover, 1st ed. 2018)
Paolo Chiabert, Abdelaziz Bouras, Frederic Noel, Jose Rios
R2,823 Discovery Miles 28 230 Ships in 18 - 22 working days

This book constitutes the refereed post-conference proceedings of the 15th IFIP WG 5.1 International Conference on Product Lifecycle Management, PLM 2018, held in Turin, Spain, in July 2018. The 72 revised full papers presented were carefully reviewed and selected from 82 submissions. The papers are organized in the following topical sections: building information modeling; collaborative environments and new product development; PLM for digital factories and cyber physical systems; ontologies and data models; education in the field of industry 4.0; product-service systems and smart products; lean organization for industry 4.0; knowledge management and information sharing; PLM infrastructure and implementation; PLM maturity, implementation and adoption; 3D printing and additive manufacturing; and modular design and products and configuration and change management.

Security De-Engineering - Solving the Problems in Information Risk Management (Paperback): Ian Tibble Security De-Engineering - Solving the Problems in Information Risk Management (Paperback)
Ian Tibble
R2,045 Discovery Miles 20 450 Ships in 10 - 15 working days

As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems impacting corporate information risk management. It explains what the problems are, how and why they have manifested, and outlines powerful solutions.

Ian Tibble delves into more than a decade of experience working with close to 100 different Fortune 500s and multinationals to explain how a gradual erosion of skills has placed corporate information assets on a disastrous collision course with automated malware attacks and manual intrusions. Presenting a complete journal of hacking feats and how corporate networks can be compromised, the book covers the most critical aspects of corporate risk information risk management.

  • Outlines six detrimental security changes that have occurred in the past decade
  • Examines automated vulnerability scanners and rationalizes the differences between their perceived and actual value
  • Considers security products including intrusion detection, security incident event management, and identity management

The book provides a rare glimpse at the untold stories of what goes on behind the closed doors of private corporations. It details the tools and products that are used, typical behavioral traits, and the two types of security experts that have existed since the mid-nineties the hackers and the consultants that came later. Answering some of the most pressing questions about network penetration testing and cloud computing security, this book provides you with the understanding and tools needed to tackle today 's risk management issues as well as those on the horizon.

Social Geography (Routledge Revivals) - Progress and Prospect (Hardcover): Michael Pacione Social Geography (Routledge Revivals) - Progress and Prospect (Hardcover)
Michael Pacione
R3,709 R3,386 Discovery Miles 33 860 Save R323 (9%) Ships in 10 - 15 working days

The examination of social questions is a relatively new development in goegraphy, but social geography has now blossomed into a fully fledged sub-discipline which has in fact influenced significantly all other areas of geography. This book, first published in 1987, presents an overview of recent developments in all the major branches of social geography. As such it provides a valuable introduction to te subject, a review of the latest state of the art and a pointer to future research directions.

CyRM - Mastering the Management of Cybersecurity (Hardcover): David X. Martin CyRM - Mastering the Management of Cybersecurity (Hardcover)
David X. Martin
R1,856 Discovery Miles 18 560 Ships in 10 - 15 working days

Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.

Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition): Rebecca Herold Managing an Information Security and Privacy Awareness and Training Program (Hardcover, 2nd edition)
Rebecca Herold
R3,958 Discovery Miles 39 580 Ships in 10 - 15 working days

Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:

  • Lists the laws and associated excerpts of the specific passages that require training and awareness
  • Contains a plethora of forms, examples, and samples in the book's 22 appendices
  • Highlights common mistakes that many organizations make
  • Directs readers to additional resources for more specialized information
  • Includes 250 awareness activities ideas and 42 helpful tips for trainers

Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization.

Praise for:

The first edition was outstanding. The new second edition is even better ... the definitive and indispensable guide for information security and privacy awareness and training professionals, worth every cent. As with the first edition, we recommend it unreservedly..
-NoticeBored.com

Cloud Reliability Engineering - Technologies and Tools (Hardcover): Rathnakar Achary, Pethuru Raj Cloud Reliability Engineering - Technologies and Tools (Hardcover)
Rathnakar Achary, Pethuru Raj
R3,103 Discovery Miles 31 030 Ships in 10 - 15 working days

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book's chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.

The Project Manager's Emergency Kit (Paperback): PMP, Ralph L. Kliem The Project Manager's Emergency Kit (Paperback)
PMP, Ralph L. Kliem
R1,779 Discovery Miles 17 790 Ships in 10 - 15 working days

Project success requires a solid understanding and proper implementation of the tools, techniques, and principles of project management. A reference for both the novice and expert project manager, The Project Manager's Emergency Kit provides you with everything you will need to get your project off to a solid start and overcome any emergencies that may arise during the project life cycle. It supplies you with over 200 project management tools, techniques, and principles arranged in alphabetical order. The text provides guidance on how to complete projects on time and within budget while meeting the needs of your customers. It presents easy-to-follow project planning steps covering the responsibilities, work breakdown structures, time and cost estimating, scheduling, resource allocation, and budgeting. The Project Manager's Emergency Kit provides you with straightforward guidelines that will help you overcome any challenges that may arise and deliver a product or service that will satisfy everyone who has a stake in the outcome of your project.

Hacker's Guide to Project Management (Hardcover, 2nd edition): Andrew Johnston Hacker's Guide to Project Management (Hardcover, 2nd edition)
Andrew Johnston
R5,062 Discovery Miles 50 620 Ships in 10 - 15 working days

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.A Hacker's Guide to Project Management acts as a guide through this maze. It's aimed specifically at those managing a project or leading a team for the first time, but it will also help more experienced managers who are either new to software development, or dealing with a new part of the software life-cycle. This book:describes the process of software development, how projects can fail and how to avoid those failuresoutlines the key skills of a good project manager, and provides practical advice on how to gain and deploy those skillstakes the reader step-by-step through the main stages of the project, explaining what must be done, and what must be avoided at each stagesuggests what to do if things start to go wrong!The book will also be useful to designers and architects, describing important design techniques, and discussing the important discipline of Software Architecture.This new edition:has been fully revised and updated to reflect current best practices in software developmentincludes a range of different life-cycle models and new design techniquesnow uses the Unified Modelling Language throughout

Building in Security at Agile Speed (Hardcover): James Ransome, Brook Schoenfield Building in Security at Agile Speed (Hardcover)
James Ransome, Brook Schoenfield
R1,832 Discovery Miles 18 320 Ships in 10 - 15 working days

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. -Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. -Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. -George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today's technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.

Security without Obscurity - A Guide to Cryptographic Architectures (Paperback): Jeff Stapleton Security without Obscurity - A Guide to Cryptographic Architectures (Paperback)
Jeff Stapleton
R1,373 Discovery Miles 13 730 Ships in 10 - 15 working days

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

The Insider's Guide to Outsourcing Risks and Rewards (Paperback): Johann Rost The Insider's Guide to Outsourcing Risks and Rewards (Paperback)
Johann Rost
R1,722 Discovery Miles 17 220 Ships in 10 - 15 working days

It is essential for a corporation to not only survive but thrive in today's global outsourcing environment. The Insider's Guide to Outsourcing Risks and Rewards is a comprehensive and accessible resource that assists an organization in deciding whether it will benefit from pursuing-or not pursuing-such an endeavor. The author, an 18-year veteran of the IT industry, is an experienced consultant, software developer, manager, and entrepreneur. Providing an authoritative and unbiased view, he helps the reader navigate through a number of offshore outsourcing issues related to software management and international business. He examines the potential benefits derived from offshore outsourcing, as well as the possible pitfalls and how to avoid them as they apply to an organization's particular situation. Offering a unique combination of technical and political insight, The Insider's Guide to Outsourcing Risks and Rewards is the one resource to have when trying to figure out your organization's next step.

Cyberspace and Cybersecurity (Paperback, 2nd edition): George Kostopoulos Cyberspace and Cybersecurity (Paperback, 2nd edition)
George Kostopoulos
R1,421 Discovery Miles 14 210 Ships in 10 - 15 working days

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Hardcover):... Integrating Business Management Processes - Volume 3: Harmonising Quality, Food Safety and Environmental Processes (Hardcover)
Titus De Silva
R4,002 Discovery Miles 40 020 Ships in 10 - 15 working days

Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4) Shelving Guide: Business & Management The backbone of any organisation is its management system. It must reflect the needs of the organisation and the requirements of its customers. Compliance with legal requirements and ethical environmental practices contributes towards the sustainability of the management system. Whatever the state of maturity of the management, this book, one of three, provides useful guidance to design, implement, maintain and improve its effectiveness and is intended to provide readers with practical "how to" methods for integrating quality, safety and environmental management processes. This volume sets out procedures and flowcharts to show how the integration of these processes can be achieved. Separated into management procedures, core procedures, support procedures and assurance procedures and complemented by practical examples, this book is an invaluable resource for complete systems development and integration. This book, along with its two companion volumes, is a practical guide for real managers, designed to help them manage their business more effectively and gain competitive advantage. Titus De Silva is a consultant in management skills development, pharmacy practice, quality management and food safety and an advisor to the newly established National Medicines Regulatory Authority (NMRA) in Sri Lanka.

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Paperback)
Brij B. Gupta
R1,444 Discovery Miles 14 440 Ships in 10 - 15 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Architecture for the Commons - Participatory Systems in the Age of Platforms (Hardcover): Jose Sanchez Architecture for the Commons - Participatory Systems in the Age of Platforms (Hardcover)
Jose Sanchez
R4,203 Discovery Miles 42 030 Ships in 10 - 15 working days

Architecture for the Commons dives into an analysis of how the tectonics of a building is fundamentally linked to the economic organizations that allow them to exist. By tracing the origins and promises of current technological practices in design, the book provides an alternative path, one that reconsiders the means of achieving complexity through combinatorial strategies. This move requires reconsidering serial production with crowdsourcing and user content in mind. The ideas presented will be explored through the design research developed within Plethora Project, a design practice that explores the use of video game interfaces as a mechanism for participation and user design. The research work presented throughout the book seeks to align with a larger project that is currently taking place in many different fields: The Construction of the Commons. By developing both the ideological and physical infrastructure, the project of the Commons has become an antidote to current economic practices that perpetuate inequality. The mechanisms of the production and governance of the Commons are discussed, inviting the reader to get involved and participate in the discussion. The current political and economic landscape calls for a reformulation of our current economic practices and alternative value systems that challenge the current market monopolies. This book will be of great interest not only to architects and designers studying the impact of digital technologies in the field of design but also to researchers studying novel techniques for social participation and cooperating of communities through digital networks. The book connects principles of architecture, economics and social sciences to provide alternatives to the current production trends.

Rethinking Information Systems in Organizations - Integrating Organizational Problem Solving (Hardcover): John Paul Kawalek Rethinking Information Systems in Organizations - Integrating Organizational Problem Solving (Hardcover)
John Paul Kawalek
R5,491 Discovery Miles 54 910 Ships in 10 - 15 working days

In Rethinking Information Systems in Organizations John Paul Kawalek challenges the current orthodoxy of information systems and proposes new alternatives. Bold and ambitious, this book tackles the thorny issues of integration of disciplines, cross over of functions, and negotiation of epistemological divides in IS. Historically, the IS discipline has struggled to embrace and integrate technical as well as organizational knowledge, skills and methods. Kawalek argues that there are now a new set of imperatives that will irrecoverably change IS, affecting the way many organizations deploy and access their information and technology. This book defines how the traditional practices of Information Systems are required to integrate into a process of organizational problem-solving. An essential read for students of business information systems, organizational theory and research methods, Kawalek's work also provides core methodological principles on organizational change and problem solving, and presents an effective rationale for their use in Information Systems contexts.

Practical Data Security - Applied Information Technology (Paperback): John Gordon Practical Data Security - Applied Information Technology (Paperback)
John Gordon
R1,036 Discovery Miles 10 360 Ships in 10 - 15 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Study of Black Hole Attack Solutions…
Elahe Fazeldehkordi, I.S. Dr. Amiri, … Paperback R1,277 Discovery Miles 12 770
Randomly Deployed Wireless Sensor…
XI Chen Paperback R3,004 Discovery Miles 30 040
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Managing Complex Technical Projects - A…
Ian Faulconbridge, Michael Ryan Hardcover R2,643 Discovery Miles 26 430
Tactile Internet - with…
Frank H. P. Fitzek, Shu-Chen Li, … Paperback R2,596 Discovery Miles 25 960
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,327 Discovery Miles 53 270
A Primer For Disaster Recovery Planning…
Charlotte J. Haitt Paperback R1,762 Discovery Miles 17 620
Autonomic Network Management Principles…
Nazim Agoulmine Paperback R1,840 Discovery Miles 18 400
Handbook of Network and System…
Jan Bergstra, Mark Burgess Hardcover R4,654 Discovery Miles 46 540
Channel Coding: Theory, Algorithms, and…
David Declercq, Marc Fossorier, … Paperback R3,340 R3,126 Discovery Miles 31 260

 

Partners