![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses. The book proposes a flexible online platform. This solution provides flexibility in distance learning processes including course enrollment, learning, evaluation, and outcome of degrees. The proposed system not only gives students freedom to choose their courses in accordance with their needs but also use earned credit towards online degrees of any university of their choice.
The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world. The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities, the book details the role of various technologies, standards, protocols, and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendors Considers service-oriented architecture and event-driven architecture for smart city applications Explains how to leverage big data analytics for smart city enhancement and improved decision making Includes case studies of intelligent cities, smart homes, buildings, transports, healthcare systems, and airports The authors explore the convergence of cloud computing and enterprise architecture and present valuable information on next-generation cloud computing. They also cover the various architectural types, including enterprise-scale integration, security, management, and governance. The book concludes by explaining the various security requirements of intelligent cities as well as the threats and vulnerabilities of the various components that form the basis of the intelligent city framework, including cloud, big data, Internet of Things, and mobile technologies.
First Published in 2005. Routledge is an imprint of Taylor & Francis, an informa company.
A pandemic does not only bring health concerns for society but also significantly affects individuals and government and business operations. Recently, COVID-19 has substantially hampered conventional businesses and organizations worldwide. Digital technology can help achieve business continuity and overcome challenges caused by pandemic situations. Digital innovation is the application of digital technology to existing business problems. Ideas such as digital transformation and digitization are closely related to digital innovation. In this pandemic period, many businesses recognize that they need to transform, innovate, and adopt new technologies to stay competitive. However, digital transformation is an inherently complex process, and the time pressure to adopt quickly may result in further complexities for organizations in fostering digital technologies. Digital Innovations for Pandemics: Concepts, Challenges, Constraints, and Opportunities presents the potential of digital responses to the COVID-19 pandemic. It explores new digital concepts for learning and teaching, provides an overview of organizational responses to the crisis through digital technologies, and examines digital solutions developed to manage the crisis. Examining how information systems researchers can contribute to these global efforts, this book seeks to showcase how consumers, citizens, entrepreneurs, organizations, institutions, and governments are leveraging new and emerging digital innovations to disrupt and transform value creation in the pandemic era. It captures the breadth of digital innovations carried out to handle the pandemic and looks at the use of digital technologies to strengthen various processes. The book features the following: Solutions on how digital technologies enable responses to a global crisis An analysis of information systems used during the management of the COVID-19 pandemic New concepts for digital business and innovative content models for different sectors This book is written for advanced undergraduate students, postgraduate students, researchers, and scholars in the field of digital business, education, and healthcare. It includes theoretical chapters and case studies from leading scholars and practitioners on the technology-adoption practices of non-government organizations (NGOs), government, and business.
Strong stakeholder engagement is perhaps the most critical factor for achieving successful program execution in our fast-paced world. Many program managers get stuck in the "science" of program management, spending vast amounts of effort on tasks, charts, and metrics. Program managers who emphasize activities around relationship building and stakeholder engagement usually have the best chance for program success. This book focuses on how to engage your stakeholders in the right way, and keep them engaged throughout the course of your program. The first section of the book covers stakeholder engagement in the program definition phase, including how to identify key stakeholders, gain their trust, and build relationships through effective communication. The second section moves to the project execution phase. It explains how to drive stakeholder engagement through the use of performance metrics, effective meeting management, and informal program governance. In the last section, the author explains how to keep stakeholders engaged through the program closure phase. This section covers the operational readiness review, including transition plans, new process documentation and training, new technology rollout, and cultural readiness assessment. It also provides best practices and tips for holding the post-launch review and lessons learned session. The book concludes with a case study of a fictitious company, followed by discussion questions that allow you to apply the knowledge you have gained in this book.
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a "Rule of Information Security" developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.
With cloud computing quickly becoming a standard in today s IT
environments, many security experts are raising concerns regarding
security and privacy in outsourced cloud environments requiring a
change in how we evaluate risk and protect information, processes,
and people.
The Innovation Factory takes a fresh look at the fine art of breakthrough innovation. What makes it unique is that it brings together an experienced scholar and a serial entrepreneur who share the same passion for understanding the processes and theories needed to innovate over and over again. The book marries theory with practical examples focusing on the Concept-Knowledge (C-K) Theory developed by the prestigious school Mines ParisTech. For the first time, you will discover the unknown story of the Swatch watch told by Elmar Mock, the creative engineering force behind the Swatch. In this book, he passionately tells how he helped to create this breakthrough innovation that saved the Swiss watch industry in the 1980s. Gilles Garel, a professor of management, relates this tale of epic innovation to C-K theory and both convincingly argue that organizations can channel creativity to develop breakthrough innovations that disrupt markets. Innovation is not just a case of acquiring aptitude. It is also a question of attitude: Innovators strive to remain creative and active. The book provides an overview of the characteristics and essential strengths of the successful Innovation Factory, Creaholic, based in Switzerland. The example of Creaholic helps readers grasp what breakthrough innovation is truly all about. The book's use of vibrant metaphors helps readers easily digest the ideas and concepts presented. The book concludes with thoughts about future directions for the watch industry.
This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support. Illustrating the implications of project management in today's organizations, The Complete Project Management Office Handbook, Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization, this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs, purpose, and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists, detailed process steps, and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management, but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs, the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate "quick-wins" and early PMO-based accomplishments in their organization.
Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals Updates its bestselling predecessors with new developments in information security and the (ISC)2 (R) CISSP (R) CBK (R) Provides valuable insights from leaders in the field on the theory and practice of computer security technology Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.
Healthcare Informatics: Improving Efficiency through Technology, Analytics, and Management supplies an understanding of the different types of healthcare service providers, corresponding information technologies, analytic methods, and data issues that play a vital role in transforming the healthcare industry. All of these elements are reshaping the various activities such as workflow and processes of hospitals, healthcare systems, ACOs, and patient analytics, including hot spotting, risk stratification, and treatment effectiveness. A follow-up to Healthcare Informatics: Improving Efficiency and Productivity, this latest book includes new content that examines the evolution of Big Data and how it is revolutionizing the healthcare industry. It presents strategies for achieving national goals for the meaningful use of health information technology and includes sound project management principles and case illustrations for technology roll-out, such as Computer Physician Order Entry (CPOE) for optimal utilization. The book describes how to enhance process efficiency by linking technologies, data, and analytics with strategic initiatives to achieve success. It explains how to leverage data resources with analytics to enhance decision support for care providers through in-depth descriptions of the array of analytic methods that are used to create actionable information, including Business Intelligence, Six Sigma, Data, and Text Mining.
This volume shows how ICT (information and communications technology) can play the role of a driver of business process reengineering (BPR). ICT can aid in enabling improvement in BPR activity cycles as it provides many components that enhance performance that can lead to competitive advantages. IT can interface with BPR to improve business processes in terms of communication, inventory management, data management, management information systems, customer relationship management, computer-aided design, computer-aided manufacturing (CAM), and computer-aided engineering. This volume explores these issues in depth.
Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems impacting corporate information risk management. It explains what the problems are, how and why they have manifested, and outlines powerful solutions. Ian Tibble delves into more than a decade of experience working with close to 100 different Fortune 500s and multinationals to explain how a gradual erosion of skills has placed corporate information assets on a disastrous collision course with automated malware attacks and manual intrusions. Presenting a complete journal of hacking feats and how corporate networks can be compromised, the book covers the most critical aspects of corporate risk information risk management.
The book provides a rare glimpse at the untold stories of what goes on behind the closed doors of private corporations. It details the tools and products that are used, typical behavioral traits, and the two types of security experts that have existed since the mid-nineties the hackers and the consultants that came later. Answering some of the most pressing questions about network penetration testing and cloud computing security, this book provides you with the understanding and tools needed to tackle today 's risk management issues as well as those on the horizon.
This book constitutes the refereed post-conference proceedings of the 15th IFIP WG 5.1 International Conference on Product Lifecycle Management, PLM 2018, held in Turin, Spain, in July 2018. The 72 revised full papers presented were carefully reviewed and selected from 82 submissions. The papers are organized in the following topical sections: building information modeling; collaborative environments and new product development; PLM for digital factories and cyber physical systems; ontologies and data models; education in the field of industry 4.0; product-service systems and smart products; lean organization for industry 4.0; knowledge management and information sharing; PLM infrastructure and implementation; PLM maturity, implementation and adoption; 3D printing and additive manufacturing; and modular design and products and configuration and change management.
The examination of social questions is a relatively new development in goegraphy, but social geography has now blossomed into a fully fledged sub-discipline which has in fact influenced significantly all other areas of geography. This book, first published in 1987, presents an overview of recent developments in all the major branches of social geography. As such it provides a valuable introduction to te subject, a review of the latest state of the art and a pointer to future research directions.
Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, Managing an Information Security and Privacy Awareness and Training Program, Second Edition provides authoritative coverage of nearly everything needed to create an effective training program that is compliant with applicable laws, regulations, and policies. Written by Rebecca Herold, a well-respected information security and privacy expert named one of the "Best Privacy Advisers in the World" multiple times by Computerworld magazine as well as a "Top 13 Influencer in IT Security" by IT Security Magazine, the text supplies a proven framework for creating an awareness and training program. It also:
Complete with case studies and examples from a range of businesses and industries, this all-in-one resource provides the holistic and practical understanding needed to identify and implement the training and awareness methods best suited to, and most effective for, your organization. Praise for: The first edition was outstanding. The new second edition is
even better ... the definitive and indispensable guide for
information security and privacy awareness and training
professionals, worth every cent. As with the first edition, we
recommend it unreservedly..
Throughout successive generations of information technology, the importance of the performance evaluation of software, computer architectures, and computer networks endures. For example, the performance issues of transaction processing systems and redundant arrays of independent disks replace the virtual memory and input-output problems of the 70s. ATM performance issues supercede those associated with electronic telephony of the 70s. As performance issues evolve with the technologies, so must our approach to evaluation. In System Performance Evaluation: Methodologies and Applications, top academic and industrial experts review the major issues now faced in this arena. In a series of structured, focused chapters, they present the state-of-the-art in performance methodologies and applications. They address developments in analytical modeling and its interaction with detailed analysis of measurement data. They also discuss performance evaluation methodologies for large-scale software systems - in general and in the context of critical applications, such as nuclear reactor control and air transportation systems. With its particular emphasis on network performance for wireless networks, the Internet, and ATM networking, System Performance Evaluation becomes the ideal vehicle for professionals in computer architecture, networking, and software engineering to stay up-to-date and proficient in this essential aspect of information technology.
"Data Modeling Essentials, Third Edition" provides expert tutelage
for data modelers, business analysts and systems designers at all
levels. Beginning with the basics, this book provides a thorough
grounding in theory before guiding the reader through the various
stages of applied data modeling and database design. Later chapters
address advanced subjects, including business rules, data
warehousing, enterprise-wide modeling and data management.
DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author's own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches, the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story, which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action, enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www.kinaesis.com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members.
It's axiomatic to state that people fear what they do not understand, and this is especially true when it comes to technology. However, despite their prevalence, computers remain shrouded in mystery, and many users feel apprehensive when interacting with them. Smartphones have only exacerbated the issue. Indeed, most users of these devices leverage only a small fraction of the power they hold in their hands. How Things Work: The Computer Science Edition is a roadmap for readers who want to overcome their technophobia and harness the full power of everyday technology. Beginning with the basics, the book demystifies the mysterious world of computer science, explains its fundamental concepts in simple terms, and answers the questions many users feel too intimidated to ask. By the end of the book, readers will understand how computers and smart devices function and, more important, how they can make these devices work for them. To complete the picture, the book also introduces readers to the darker side of modern technology: security and privacy concerns, identity theft, and threats from the Dark Web.
Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book's chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.
Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still, achieving security remains a human endeavor, a core part of designing, generating and verifying software. Dr. James Ransome and Brook S.E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately, humans generate software security. People collectively act through a particular and distinct set of methodologies, processes, and technologies that the authors have brought together into a newly designed, holistic, generic software development lifecycle facilitating software security at Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video Communications, Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. -Jennifer Sunshine Steffens, CEO of IOActive Both practical and strategic, Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical, but deeply human elements of agile ways of working. -Jorgen Hesselberg, author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. -George K Tsantes, CEO of Cyberphos, former partner at Accenture and Principal at EY Detailing the people, processes, and technical aspects of software security, Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed, managed, and exploited by humans. This book presents a step-by-step process for software security that uses today's technology, operational, business, and development methods with a focus on best practice, proven activities, processes, tools, and metrics for any size or type of organization and development practice.
Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.
In Rethinking Information Systems in Organizations John Paul Kawalek challenges the current orthodoxy of information systems and proposes new alternatives. Bold and ambitious, this book tackles the thorny issues of integration of disciplines, cross over of functions, and negotiation of epistemological divides in IS. Historically, the IS discipline has struggled to embrace and integrate technical as well as organizational knowledge, skills and methods. Kawalek argues that there are now a new set of imperatives that will irrecoverably change IS, affecting the way many organizations deploy and access their information and technology. This book defines how the traditional practices of Information Systems are required to integrate into a process of organizational problem-solving. An essential read for students of business information systems, organizational theory and research methods, Kawalek's work also provides core methodological principles on organizational change and problem solving, and presents an effective rationale for their use in Information Systems contexts. |
You may like...
A Study of Black Hole Attack Solutions…
Elahe Fazeldehkordi, I.S. Dr. Amiri, …
Paperback
R1,277
Discovery Miles 12 770
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
Managing Complex Technical Projects - A…
Ian Faulconbridge, Michael Ryan
Hardcover
R2,643
Discovery Miles 26 430
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Channel Coding: Theory, Algorithms, and…
David Declercq, Marc Fossorier, …
Paperback
|