![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
Modeling complex systems is a difficult challenge and all too often one in which modelers are left to their own devices. Using a multidisciplinary approach, The Art of Software Modeling covers theory, practice, and presentation in detail. It focuses on the importance of model creation and demonstrates how to create meaningful models. Presenting three self-contained sections, the text examines the background of modeling and frameworks for organizing information. It identifies techniques for researching and capturing client and system information and addresses the challenges of presenting models to specific audiences. Using concepts from art theory and aesthetics, this broad-based approach encompasses software practices, cognitive science, and information presentation. The book also looks at perception and cognition of diagrams, view composition, color theory, and presentation techniques. Providing practical methods for investigating and organizing complex information, The Art of Software Modeling demonstrates the effective use of modeling techniques to improve the development process and establish a functional, useful, and maintainable software system.
Project success requires a solid understanding and proper implementation of the tools, techniques, and principles of project management. A reference for both the novice and expert project manager, The Project Manager's Emergency Kit provides you with everything you will need to get your project off to a solid start and overcome any emergencies that may arise during the project life cycle. It supplies you with over 200 project management tools, techniques, and principles arranged in alphabetical order. The text provides guidance on how to complete projects on time and within budget while meeting the needs of your customers. It presents easy-to-follow project planning steps covering the responsibilities, work breakdown structures, time and cost estimating, scheduling, resource allocation, and budgeting. The Project Manager's Emergency Kit provides you with straightforward guidelines that will help you overcome any challenges that may arise and deliver a product or service that will satisfy everyone who has a stake in the outcome of your project.
Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.A Hacker's Guide to Project Management acts as a guide through this maze. It's aimed specifically at those managing a project or leading a team for the first time, but it will also help more experienced managers who are either new to software development, or dealing with a new part of the software life-cycle. This book:describes the process of software development, how projects can fail and how to avoid those failuresoutlines the key skills of a good project manager, and provides practical advice on how to gain and deploy those skillstakes the reader step-by-step through the main stages of the project, explaining what must be done, and what must be avoided at each stagesuggests what to do if things start to go wrong!The book will also be useful to designers and architects, describing important design techniques, and discussing the important discipline of Software Architecture.This new edition:has been fully revised and updated to reflect current best practices in software developmentincludes a range of different life-cycle models and new design techniquesnow uses the Unified Modelling Language throughout
It is essential for a corporation to not only survive but thrive in today's global outsourcing environment. The Insider's Guide to Outsourcing Risks and Rewards is a comprehensive and accessible resource that assists an organization in deciding whether it will benefit from pursuing-or not pursuing-such an endeavor. The author, an 18-year veteran of the IT industry, is an experienced consultant, software developer, manager, and entrepreneur. Providing an authoritative and unbiased view, he helps the reader navigate through a number of offshore outsourcing issues related to software management and international business. He examines the potential benefits derived from offshore outsourcing, as well as the possible pitfalls and how to avoid them as they apply to an organization's particular situation. Offering a unique combination of technical and political insight, The Insider's Guide to Outsourcing Risks and Rewards is the one resource to have when trying to figure out your organization's next step.
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context.
Examines the synergy between knowledge management, business intelligence, and content management Refers to detailed information about available toolsets Offers numerous tables and figures that enable quick understanding of the concepts discussed Includes 13 appendices that contain essential guides, templates, checklists, and more Knowledge management (KM) is the identification and analysis of available and required knowledge, and the subsequent planning and control of actions, to develop "knowledge assets" that enable businesses to generate profits and improve their competitive positions. This volume provides the framework for the strategic use of the information intelligence processes - business intelligence, content management, and knowledge management. In nine detailed chapters, the author explains every facet of these three subjects, enabling you to understand these sophisticated business concepts within the framework of information technology. Knowledge Management, Business Intelligence, and Content Management: The IT Practitioner's Guide discusses creation, protection, development, sharing, and management of information and intellectual assets through the use of business intelligence and other knowledge sharing and analytical techniques. About the Author Jessica Keyes is president of New Art Technologies, Inc., a high-technology and management consultancy, and is also founding partner of Manhattan Technology Group. Often a keynote speaker on the topics of competitive strategy, productivity, and quality, she is a founding board of directors member of the New York Software Industry Association, and has recently completed a 2-year term on the Mayor of New York City's Small Business Advisory Council. A noted columnist and correspondent, Keyes is the author of 19 books, including Auerbach Publications' Software Engineering Handbook, Software Configuration Management, and Implementing the IT Balanced Scorecard.
Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies among component pieces of strategic intelligence, and demonstrates how executives can best use this internal and external information toward making better decisions. Divided into two major parts, the book first discusses the convergence of knowledge management (KM), business intelligence (BI), and competitive intelligence (CI) into what the author defines as strategic intelligence. The second part of the volume describes case studies written by recognized experts in the fields of KM, BI, and CI. The case studies include strategic scenarios at Motorola, AARP, Northrop Grumman, and other market leaders. About the Editor Jay Liebowitz, D.Sc., is a full professor in the Graduate Division of Business and Management and program director for the Graduate Certificate in Competitive Intelligence at Johns Hopkins University. The first knowledge management officer at NASA Goddard Space Flight Center, he also served as the Robert W. Deutsch Distinguished Professor of Information Systems at the University of Maryland-Baltimore County, professor of Management Science at George Washington University, and Chaired Professor of Artificial Intelligence (AI) at the U.S. Army War College. A founder and chairperson of The World Congress on Expert Systems, he is a Fulbright Scholar, IEEE-USA Federal Communications Commission Executive Fellow, and Computer Educator ofthe Year (International Association for Computer Information Systems).
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
Hawthorne wrote much of his major fiction in the decade that the theories of Charles Marie Francois Fourier crossed the Atlantic and contributed to a wave of communitarian experimentation in the American North. Famously, Hawthorne briefly lived and worked at Brook Farm, a Transcendentalist commune that formally "converted" to Fourierism when he had left and was embroiled in litigation to recover money he had invested in the community. In his fiction, Hawthorne responded directly to Fourierism and its critique of capitalism. He used his experiences at Brook Farm as the inspiration for "The Blithedale Romance," and in "The House of the Seven Gables" cast one of the principal characters as a recovering Fourierist. In "The Scarlet Letter" he engaged with Fourierist debates on marriage and the regulation of desire. ""Somewhat on the" "Community-System"" examines these interventions, and argues that Hawthorne's fiction both seeks to contain Fourierism and responds to its allure. Moreover, in formulating alternative, morally acceptable utopias (ones that are predicated on middle-class marriage), Hawthorne's fiction appropriates key aspects of Fourierist theory
Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4) Shelving Guide: Business & Management The backbone of any organisation is its management system. It must reflect the needs of the organisation and the requirements of its customers. Compliance with legal requirements and ethical environmental practices contributes towards the sustainability of the management system. Whatever the state of maturity of the management, this book, one of three, provides useful guidance to design, implement, maintain and improve its effectiveness and is intended to provide readers with practical "how to" methods for integrating quality, safety and environmental management processes. This volume sets out procedures and flowcharts to show how the integration of these processes can be achieved. Separated into management procedures, core procedures, support procedures and assurance procedures and complemented by practical examples, this book is an invaluable resource for complete systems development and integration. This book, along with its two companion volumes, is a practical guide for real managers, designed to help them manage their business more effectively and gain competitive advantage. Titus De Silva is a consultant in management skills development, pharmacy practice, quality management and food safety and an advisor to the newly established National Medicines Regulatory Authority (NMRA) in Sri Lanka.
Architecture for the Commons dives into an analysis of how the tectonics of a building is fundamentally linked to the economic organizations that allow them to exist. By tracing the origins and promises of current technological practices in design, the book provides an alternative path, one that reconsiders the means of achieving complexity through combinatorial strategies. This move requires reconsidering serial production with crowdsourcing and user content in mind. The ideas presented will be explored through the design research developed within Plethora Project, a design practice that explores the use of video game interfaces as a mechanism for participation and user design. The research work presented throughout the book seeks to align with a larger project that is currently taking place in many different fields: The Construction of the Commons. By developing both the ideological and physical infrastructure, the project of the Commons has become an antidote to current economic practices that perpetuate inequality. The mechanisms of the production and governance of the Commons are discussed, inviting the reader to get involved and participate in the discussion. The current political and economic landscape calls for a reformulation of our current economic practices and alternative value systems that challenge the current market monopolies. This book will be of great interest not only to architects and designers studying the impact of digital technologies in the field of design but also to researchers studying novel techniques for social participation and cooperating of communities through digital networks. The book connects principles of architecture, economics and social sciences to provide alternatives to the current production trends.
Integrating Business Management Processes: Volume 3: Harmonising Quality, Food Safety and Environmental Processes (978-0-367-48547-4) Shelving Guide: Business & Management The backbone of any organisation is its management system. It must reflect the needs of the organisation and the requirements of its customers. Compliance with legal requirements and ethical environmental practices contributes towards the sustainability of the management system. Whatever the state of maturity of the management, this book, one of three, provides useful guidance to design, implement, maintain and improve its effectiveness and is intended to provide readers with practical "how to" methods for integrating quality, safety and environmental management processes. This volume sets out procedures and flowcharts to show how the integration of these processes can be achieved. Separated into management procedures, core procedures, support procedures and assurance procedures and complemented by practical examples, this book is an invaluable resource for complete systems development and integration. This book, along with its two companion volumes, is a practical guide for real managers, designed to help them manage their business more effectively and gain competitive advantage. Titus De Silva is a consultant in management skills development, pharmacy practice, quality management and food safety and an advisor to the newly established National Medicines Regulatory Authority (NMRA) in Sri Lanka.
Architecture for the Commons dives into an analysis of how the tectonics of a building is fundamentally linked to the economic organizations that allow them to exist. By tracing the origins and promises of current technological practices in design, the book provides an alternative path, one that reconsiders the means of achieving complexity through combinatorial strategies. This move requires reconsidering serial production with crowdsourcing and user content in mind. The ideas presented will be explored through the design research developed within Plethora Project, a design practice that explores the use of video game interfaces as a mechanism for participation and user design. The research work presented throughout the book seeks to align with a larger project that is currently taking place in many different fields: The Construction of the Commons. By developing both the ideological and physical infrastructure, the project of the Commons has become an antidote to current economic practices that perpetuate inequality. The mechanisms of the production and governance of the Commons are discussed, inviting the reader to get involved and participate in the discussion. The current political and economic landscape calls for a reformulation of our current economic practices and alternative value systems that challenge the current market monopolies. This book will be of great interest not only to architects and designers studying the impact of digital technologies in the field of design but also to researchers studying novel techniques for social participation and cooperating of communities through digital networks. The book connects principles of architecture, economics and social sciences to provide alternatives to the current production trends.
First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.
Inclusive Development of Society contains papers that were originally presented at the 2018 International Congress on Management and Technology in Knowledge, Service, Tourism & Hospitality (SERVE 2018), held 6-7 October and 15-16 December 2018 in Kuta, Bali, Indonesia and 18-19 October, 2018 at The Southern Federal University, Rostov-on-don, Russia. The contributions deal with various interdisciplinary research topics, particularly in the fields of social sciences, economics and the arts. The papers focus especially on such topics as language, cultural studies, economics, behavior studies, political sciences, media and communication, psychology and human development. The theoretical research studies included here should provide a solid foundation for the development of new tools that explore the possibilities of developing tourism, hospitality, service industries in Knowledge Economic Era, and the empirical papers will advance our knowledge regarding the impact of information technologies in organizations' and institutions' practices. These proceedings should be of interest to academics and professionals in the wider field of social sciences, including disciplines such as education, psychology, tourism and knowledge management.
Medical Services Professionals (MSPs) hold a unique place in the healthcare industry. Medical Staff leaders, practitioners and providers rely on MSPs to ensure qualitative regulatory compliance, performance improvement, accreditation, credentialing and governance for physicians, practitioners, and other healthcare providers. MSPs ensure the design, implementation, and maintenance of current industry practices to promote quality patient care. Their roles are rapidly changing due to competition, increased government influence, and vast changes in technology that demand for service delivery improvements worldwide. The successful MSP will require a formal professional development plan, comprised of skills and knowledge for both personal and career choices as the industry moves into the future. This book is presented in an easy to read format and contains a series of building blocks, "points" to navigate career progression logically. Each point highlights solutions for MSPs to test and apply with real-life stories interspersed to illustrate points. This book contains a helpful glossary, sample job descriptions, and terms specific to the MSP.
Today, there are few in senior management positions who can afford to ignore modern information technology, and few individuals who would prefer to be without it. Modern IT is key to organizational performance; yet we often assume the benefits will occur without forethought or effort. As managerial tasks become more complex, so the nature of the required information systems changes - from structured, routine support to ad hoc, unstructured, complex enquiries at the highest levels of management. If taken for granted, serious implications can arise for organizations. This fifth edition of Strategic Information Management has been brought fully up to date with recent developments in the management of information systems, including digital transformation strategy, the issues surrounding big data and algorithmic decision-making. The book provides a rich source of material reflecting recent thinking on the key issues facing executives, drawing from a wide range of contemporary articles written by leading experts in North America, Europe, and Australia. Combining theory with practice, each section is fully introduced, includes further reading and questions for further discussion. Designed for MBA, master's level students, and advanced undergraduate students taking courses in information systems management, it also provides a wealth of information and references for researchers.
This technical dictionary will define all of the most-used words in the embedded systems field - over 2500. Designed to serve both the technical and non-technical audience, this book defines advanced terms in two steps. The first step is a general, contextual definition that will serve the needs of less technical readers. The second step is in terms that are appropriate to a serious technical reader. Some terms reference an appendix of even more detailed white papers.
Managing a software development project is a complex process. There
are lots of deliverables to produce, standards and procedures to
observe, plans and budgets to meet, and different people to manage.
Project management doesn't just start and end with designing and
building the system. Once you've specified, designed and built (or
bought) the system it still needs to be properly tested, documented
and settled into the live environment. This can seem like a maze to
the inexperienced project manager, or even to the experienced
project manager unused to a particular environment.
The book will also be useful to designers and architects, describing important design techniques, and discussing the important discipline of Software Architecture. This new edition:
'Making IT Count: from strategy to implementation' focuses on the practical elements of delivering Information Technology strategy. Studies regularly show that over half of Information Technology strategies are never implemented, or are unsuccessful in delivering the desired results, and that a significant percentage of strategies implemented were never in the original plans. The linkage between strategy development and delivery needs a very clear focus; this is the key topic that the authors address. The book highlights eight major fallacies in managing IT, and eighteen better practices. It then details how to draw up strategy, instigate navigation techniques and make sourcing decisions. Change and delivery are a major focus, as is infrastructure development. Caselets and full length case studies of organizations such as General Electric, Siemens, Colonial Mutual, Charles Schwab, Macquarie Bank, ICI, United Airlines, Norwich Union, Walgreens and Dell and have been included to show how strategies have been successfully implemented and managed.
This new edition has been updated with information relevant to the newest Basic Stamp, the BS2P, and revised to present more advanced projects. The result is a superb hands-on teaching text with dozens of completely new projects in addition to enhanced projects that take advantage of its latest features. (Computer Books - Languages/Programming)
The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses. The book proposes a flexible online platform. This solution provides flexibility in distance learning processes including course enrollment, learning, evaluation, and outcome of degrees. The proposed system not only gives students freedom to choose their courses in accordance with their needs but also use earned credit towards online degrees of any university of their choice.
Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts-which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition, support, and maintenance Examines hardware and software warranty and support models Considers finance and accounting issues for maintenance and support Spells out technology product details Explains postwarranty support and maintenance Provides the understanding to better negotiate with vendor sales teams Illustrating the types of problems typically experienced during product use, the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term, this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating. |
You may like...
Integrating environmental and climate…
Organisation for Economic Co-operation and Development,Development Assistance Committee
Paperback
R2,093
Discovery Miles 20 930
Geographical distribution of financial…
Organisation for Economic Co-operation and Development,Development Assistance Committee
Paperback
R6,917
Discovery Miles 69 170
Italy 2019
Organisation for Economic Co-operation and Development,Development Assistance Committee
Paperback
R989
Discovery Miles 9 890
Finite Time and Cooperative Control of…
Yuanqing Xia, Jinhui Zhang, …
Hardcover
R4,052
Discovery Miles 40 520
|