0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (11)
  • R500+ (885)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

A Guide to Selecting Software Measures and Metrics (Hardcover): Capers Jones A Guide to Selecting Software Measures and Metrics (Hardcover)
Capers Jones
R3,702 Discovery Miles 37 020 Ships in 12 - 17 working days

Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major gaps and omissions that need to be filled if data about software development is to be useful for comparisons or estimating future projects. Among the more serious gaps are leaks in reporting about software development efforts that, if not corrected, can distort data and make benchmarks almost useless and possibly even harmful. One of the most common leaks is that of unpaid overtime. Software is a very labor-intensive occupation, and many practitioners work very long hours. However, few companies actually record unpaid overtime. This means that software effort is underreported by around 15%, which is too large a value to ignore. Other sources of leaks include the work of part-time specialists who come and go as needed. There are dozens of these specialists, and their combined effort can top 45% of total software effort on large projects. The book helps software project managers and developers uncover errors in measurements so they can develop meaningful benchmarks to estimate software development efforts. It examines variations in a number of areas that include: Programming languages Development methodology Software reuse Functional and nonfunctional requirements Industry type Team size and experience Filled with tables and charts, this book is a starting point for making measurements that reflect current software development practices and realities to arrive at meaningful benchmarks to guide successful software projects.

Virtualization and Private Cloud with VMware Cloud Suite (Paperback): Lee Chao Virtualization and Private Cloud with VMware Cloud Suite (Paperback)
Lee Chao
R1,945 Discovery Miles 19 450 Ships in 12 - 17 working days

To help readers understand virtualization and cloud computing, this book is designed to cover the theories and concepts enough to understand the cutting-edge technology. Meanwhile, in this book, the reader can gain hands-on skills on VMware Cloud Suite to create a private cloud. With the academic support from VMware, readers can use the VMware supported software to create various virtualized IT infrastructures sophisticated enough for various sized enterprises. Then, the virtualized IT infrastructure can be made available to an enterprise through the private cloud services.

Continuous and Embedded Learning for Organizations (Hardcover): Jon M. Quigley, Shawn P. Quigley Continuous and Embedded Learning for Organizations (Hardcover)
Jon M. Quigley, Shawn P. Quigley
R2,599 Discovery Miles 25 990 Ships in 12 - 17 working days

There is considerable connection between growth of the personnel in the organization and the ability for the company to compete over time. Looking outside for help training may be required but looking within for opportunities for enhanced training and growth, will foster a continually improving and growing organization. This book examines the opportunities for learning, within the organization and its' activities, along with the connection to motivation. Additionally, it provides information on the characteristics of organizations that are able to quickly disseminate, along with approaches for improving this distribution of that learning throughout the organization.

Nonfunctional Requirements in Mobile Application Development (Hardcover): Varun Gupta, Raj Chopra, Durg Chauhan Nonfunctional Requirements in Mobile Application Development (Hardcover)
Varun Gupta, Raj Chopra, Durg Chauhan
R1,761 Discovery Miles 17 610 Ships in 9 - 15 working days

Nonfunctional Requirements in Mobile Application Development is an empirical study that investigates how nonfunctional requirements--as compared with functional requirements--are treated by the software engineers during mobile application development. The book empirically analyzes the contribution of nonfunctional requirements to project parameters such as cost, time, and quality. Such parameters are of prime interest as they determine the survival of organizations in highly dynamic environments. The impact of nonfunctional requirements on project success is analyzed through surveys and case studies, both individually and relative to each other. Sources for data collection include industry, academia, and literature. The book also empirically studies the impact of nonfunctional requirements on the overall business success of both the software development firm and the software procuring firm. Project success is examined to determine if it leads to business success. The book provides rich empirical evidence to place nonfunctional requirements on par with functional requirements to achieve business success in highly competitive markets. This work enhances the body of knowledge through multiple empirical research methods including surveys, case studies, and experimentation to study software engineers' focus on nonfunctional requirements at both project and business levels. The book can guide both computer scientists and business managers in devising theoretical and technical solutions for software release planning to achieve business success.

Leading the Internal Audit Function (Paperback): Lynn Fountain Leading the Internal Audit Function (Paperback)
Lynn Fountain
R1,272 Discovery Miles 12 720 Ships in 12 - 17 working days

While the Institute of Internal Auditors (IIA) has provided standards and guidelines for the practice of internal audit through the International Professional Practice Framework (IPPF), internal auditors and Chief Audit Executives (CAEs) continue to experience difficulties when attempting to balance the requirements of the IPPF with management expectations. The true challenge for any internal auditor is to appropriately apply the Standards while exerting adequate independence and objectivity in the face of management pressure. In Leading the Internal Audit Function, Lynn Fountain presents lessons learned from her extensive experience as an internal auditor, internal audit manager, and CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role. The book identifies more than 50 challenges for auditors and discusses potential alternative actions the auditor can take when they experience a similar challenge. The book explains how to: Build a value-oriented function that abides by the standards and supports the objectives and goals of the organization. Execute the many aspects of the internal audit, including assurance and consulting work. Build a risk-based audit process. Develop and sustain the internal audit team. Develop and manage relationships with management and the audit committee. Manage internal audit's role in corporate governance, compliance, and fraud. Leading the Internal Audit Function includes real-life examples, scenarios, and lessons learned from internal auditors and CAEs to emphasize the importance of carefully managing all aspects of the internal audit. The author summarizes her many lessons learned into ten "commandments" for both CAEs and internal auditors. By following the guidelines in this book, you should be well-equipped to gain management support, perform effective and ethical audits, and uphold IIA Standards.

Project Management Maturity Model (Paperback, 4th edition): J.Kent Crawford Project Management Maturity Model (Paperback, 4th edition)
J.Kent Crawford
R1,229 Discovery Miles 12 290 Ships in 9 - 15 working days

Assisting organizations in improving their project management processes, the Project Management Maturity Model defines the industry standard for measuring project management maturity and agile and adaptive capabilities. Project Management Maturity Model, Fourth Edition provides a roadmap showing organizations how to move to higher levels of organizational behavior, improving project success and organizational performance. It's a comprehensive tool for enhancing project management practices, covering areas critical to organizational improvement, such as the project management office, management oversight, and professional development. It also provides methods for optimizing project management processes and suggestions for deploying the model as a strategic tool in improving business outcomes. New material in each chapter also outlines good practices for implementing adaptive an agile processes. The book also includes the Project Portfolio Management Maturity Model, which covers best practices for determining portfolio maturity, setting short-term priorities, implementing benefits realization management, improving portfolio management processes and tracking progress. The author, J. Kent Crawford, CEO of PM Solutions, describes the basics of project management maturity, including the benefits of assessing maturity, and presents a comprehensive framework for improving organization's processes. Chapters are based on the ten project management knowledge areas specified in the Project Management Institute's standard, the PMBOK (R) Guide. This edition provides new and revised materials based on the PMBOK (R) Guide including a fresh focus on agile and adaptive methods, benefits realization, and organizational change management. Organizations can use this book to: Determine the maturity of your organization's project management processes Gauge readiness for agile transformation Map out a logical path to improve your organization's processes Set priorities for short-term process improvement Track and visualize improvements in project management over time Learn to translate process maturity into business results After an objective assessment, an organization can set its goals for increasing the capability of its processes and develop a plan for reaching those goals. This book is ideal for anyone involved with improving the capability of an organization's project and portfolio management processes.

Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security... Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security Standard (Paperback)
Heru Susanto, Mohammad Nabil Almunawar
R2,542 Discovery Miles 25 420 Ships in 9 - 15 working days

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

Information Technology and Career Education - Proceedings of the 2014 International Conference on Information Technology and... Information Technology and Career Education - Proceedings of the 2014 International Conference on Information Technology and Career Education (ICITCE 2014), Hong Kong, 9-10 October 2014 (Hardcover)
Fun Shao, Wise Shu, Tracy Tian
R4,461 Discovery Miles 44 610 Ships in 12 - 17 working days

Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information Technology and Career Education (ICITCE 2014, Hong Kong, China, 9-10 October 2014). The book is divided into two main topics: information technology and vocational technology. Considerable attention is also paid to electric power, data mining, vocational education and physical education. Information Technology and Career Education will be invaluable to professionals and academics in information and vocational technology, electric and electronic engineering and education science.

Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover): Mounir Kehal, Shahira El Alfy Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover)
Mounir Kehal, Shahira El Alfy
R2,737 Discovery Miles 27 370 Ships in 9 - 15 working days

Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analytics Applying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analytics Developing new products Technopreneurship Disruptive versus incremental innovation The book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.

Program Governance (Hardcover): Muhammad Ehsan Khan Program Governance (Hardcover)
Muhammad Ehsan Khan
R1,859 Discovery Miles 18 590 Ships in 12 - 17 working days

Although program management has received much attention in recent books, program governance remains a relatively new subject. While selected books and standards touch on this important topic, few are devoted to program governance as a subject. This book fills that need. Program Governance provides a thorough understanding of governance while reviewing the underlying theories. The first book dedicated to this subject, it caters to the needs of practitioners, researchers, and students of management and governance. The book provides a holistic view of program governance while covering multiple elements of program governance. Topics covered include the governance structure, governance roles, governance functions, governance mechanisms, factors influencing the governance framework, and different domains of programs that come under the jurisdiction of a governance framework. The book presents the author's own program governance framework, called the Contingent Governance Framework for Programs (CGFPrgTM), which is adaptable to suit different program contexts. This adaptability ensures that the different elements of governance, including structure and mechanisms, are aligned with program requirements. Such alignment results in an efficient and effective environment with an increased probability of program success. The text supplies references to research and case studies to help readers understand key concepts in more detail. It also includes objectives at the end of each chapter to help readers gauge their knowledge of the subject. The book clarifies the linkage/dependencies between program governance and other governance levels, such as international governance and corporate governance, which have a strong influence on governance framework for programs. It also explains the difference between the dynamics of temporary organizations, such as projects and programs, and permanent organizations. This distinct

Implementing SAP CRM - The Guide for Business and Technology Managers (Hardcover): Vivek Kale Implementing SAP CRM - The Guide for Business and Technology Managers (Hardcover)
Vivek Kale
R3,740 Discovery Miles 37 400 Ships in 12 - 17 working days

In today's competitive business environment, most companies realize that the better they can manage their customer relationships, the more successful they will become. Customer Relationship Management (CRM) software systems are key tools for companies to manage the customer-facing processes of their businesses. However, many companies have resisted implementing this most critical customer-oriented application due in large part to the lack of a single-point resource on implementing a CRM system. This book attempts to fill that gap. Implementing SAP (R) CRM will help technologists and managers come to grips with the vision, concept, and technology of CRM. It begins by laying out the groundwork for understanding CRM. It explains the concept and context of CRM and the tangible business benefits of CRM adoption. Demonstrating a professional approach to the evaluation and selection of SAP, it details the critical success factors (CSFs), patterns, and anti-patterns of a successful SAP CRM implementation. CRM implementations can add significant benefit to the company's bottom line only if the company first transforms itself into a customer-centric and customer-responsive enterprise. This book explains what it means to be a customer-centric and responsive enterprise, and provides a framework for business operations based on customer relationships, rather than the traditional four Ps (product, positioning, price, promotion). It further spells out business process reengineering (BPR) strategies to configure internal business processes and operations with SAP CRM to improve customer-facing strategies, services, and relationships.

Empowering Project Teams - Using Project Followership to Improve Performance (Hardcover): Marco Sampietro, Tiziano Villa Empowering Project Teams - Using Project Followership to Improve Performance (Hardcover)
Marco Sampietro, Tiziano Villa
R2,360 Discovery Miles 23 600 Ships in 12 - 17 working days

Although project team members play crucial roles in projects, they often do not possess the required mastery of project management methodologies. As a result, dialog between project managers and team members is not as effective as it can be and can quickly become a source of stress and tension. Empowering Project Teams: Using Project Followership to Improve Performance improves on this situation by presenting the project environment from the perspective of project team members. Re-interpreting project management methodologies and behaviors using a bottom-up approach, it explores the application of project followership in the key stages of project management. It details the methods and techniques that all project team members need to know and outlines the behaviors they should adopt to be successful in each stage of the project. The book is divided into five sections: Introduces and explores the basic concepts of project management and project followership Examines project start-up-the all too often underestimated set of activities that make it possible to make future activities less problematic Highlights the importance of project planning Focuses on execution and control of the project Considers project closure and transfer and explains why this is an ideal time to determine if efforts invested have been rewarded Despite an understanding that project success is directly proportional to the entire team's ability to act as a managerial center of excellence, there has long been a need for a book dedicated to the individuals that participate in projects. Filling this need, this book is an ideal resource for anyone who regularly works as a member of a project team. Complete with case studies in each chapter, the book also includes exercises on the topics covered to facilitate understanding.

The ICT Malaise - A Diagnosis and Cure for the Dysfunctional Information and Communication Technologies Service-Delivery... The ICT Malaise - A Diagnosis and Cure for the Dysfunctional Information and Communication Technologies Service-Delivery Workflow (Hardcover)
Nadine Fruin
R953 Discovery Miles 9 530 Ships in 9 - 15 working days

"A valuable, practical guide for navigating through ICT turbulence and dynamics. A lighthouse for the human side of ICT." Erik van de Loo, Director Executive Masters in Change, INSEAD Professor of Organisational Behaviour, INSEAD Business School "The ICT Malaise is a different and thorough point of view on the dysfunctional approach the world has taken to information and technology. In an era of exponential changes where humans are rendered obsolete at the same pace of technology, it is fundamental to go back to basics on why we lead and innovate in the first place." Silvio Rugolo, VP, Global Sales, BMC Software, Digital Service Operations We hurtle ahead with technology, apps, and the newest innovation in a world that already demands a constant online presence and availability. You are included if you quickly adapt the newest technology and excluded if you wait too long. Information and communication technology (ICT) service providers, suppliers, and customers all try to make sense and make the most money out of technology developments and constant innovation with the help of frameworks, methodologies, best-practice approaches, and models. They continuously improve, align, integrate, and optimize, but unfortunately do not apply the same drive to safeguarding quality. This book leads the reader along a path of critical thinking, reflecting, and contemplating while offering alternative ways for service providers, customers, and suppliers to interact with each other. In addition, it encourages them to conduct their business in such a way that customers, service providers, and suppliers achieve satisfaction. The author implies a different mindset, a new way of interacting and a surprising approach to the many frameworks, models, and methodologies being introduced ceaselessly. While reading this book, IT professionals receive practical guidelines for using these newfound methodologies and models to help build and maintain healthy business relations while ensuring quality delivery of products and services. Readers will be surprised by how much more satisfying and less stressful their work environment becomes!

Network Science (Hardcover): Albert-Laszlo Barabasi Network Science (Hardcover)
Albert-Laszlo Barabasi; As told to Marton Posfai
R1,475 Discovery Miles 14 750 Ships in 9 - 15 working days

Networks are everywhere, from the internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network science.

The Executive MBA in Information Security (Hardcover): Jr., John J. Trinckes The Executive MBA in Information Security (Hardcover)
Jr., John J. Trinckes
R4,013 Discovery Miles 40 130 Ships in 12 - 17 working days

According to the Brookings Institute, an organization s information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of information security programs, it is essential for those in key leadership positions to possess a solid understanding of the constantly evolving fundamental concepts of information security management. Developing this knowledge and keeping it current however, requires the time and energy that busy executives like you simply don t have.

Supplying a complete overview of key concepts, The Executive MBA in Information Security provides the tools needed to ensure your organization has an effective and up-to-date information security management program in place. This one-stop resource provides a ready-to use security framework you can use to develop workable programs and includes proven tips for avoiding common pitfalls so you can get it right the first time.

Allowing for quick and easy reference, this time-saving manual provides those in key leadership positions with a lucid understanding of:

  • The difference between information security and IT security
  • Corporate governance and how it relates to information security
  • Steps and processes involved in hiring the right information security staff
  • The different functional areas related to information security
  • Roles and responsibilities of the chief information security officer (CISO)

Presenting difficult concepts in a straightforward manner, this concise guide allows you to get up to speed, quickly and easily, on what it takes to develop a rock-solid information security management program that is as flexible as it is secure.

The Data Model Resource Book, Vol 1 - A Library of Universal Data Models for All Enterprises (Paperback, Rev ed): Len Silverston The Data Model Resource Book, Vol 1 - A Library of Universal Data Models for All Enterprises (Paperback, Rev ed)
Len Silverston
R1,796 Discovery Miles 17 960 Ships in 12 - 17 working days

A quick and reliable way to build proven databases for core business functions
Industry experts raved about The Data Model Resource Book when it was first published in March 1997 because it provided a simple, cost-effective way to design databases for core business functions. Len Silverston has now revised and updated the hugely successful First Edition, while adding a companion volume to take care of more specific requirements of different businesses. Each volume is accompanied by a CD-ROM, which is sold separately. Each CD-ROM provides powerful design templates discussed in the books in a ready-to-use electronic format, allowing companies and individuals to develop the databases they need at a fraction of the cost and a third of the time it would take to build them from scratch.
Updating the data models from the First Edition CD-ROM, this resource allows database developers to quickly load a core set of data models and customize them to support a wide range of business functions.

Enterprise Architecture for Strategic Management of Modern IT Solutions (Hardcover): Tiko Iyamu Enterprise Architecture for Strategic Management of Modern IT Solutions (Hardcover)
Tiko Iyamu
R3,096 Discovery Miles 30 960 Ships in 12 - 17 working days

The popularity of enterprise architecture (EA) has increased in the last two decades, in both business and academic domains. Despite the cumulative interest from all sectors, the implementation and practice of EA have been entangled with numerous challenges and complexities. Consequently, some organisations continue to theorise the concept, which has ramifications on practice and ROI. This has led to many studies that have been conducted, to understand the complexities impacting the implementation and practice of EA in organisations. Yet, the trajectory of some convolutions remain a mystery in many quarters. This attributes to the struggle to articulate the value of EA in many environments. Hence many organisations find it difficult to apply EA for strategic management of modern information technology (IT) solutions. Enterprise Architecture for strategic Management of Modern IT Solutions provides guidance on how to employ EA in deploying and managing IT solutions from pragmatic and implementable perspectives. Until now, implementation and practice of EA have been slow, despite its growing popularity and interest from all sectors. This book employs sociotechnical theories such as actor-network theory (ANT) and structuration theory (ST) as lenses to examine and explain why and how challenges and complexities exist and derail the implementation or practice of EA in organisations. This serves to enable practitioners and readers to gain fresh insights on why the challenges exist and how they can be addressed in creating collaborative capabilities for business enhancement, sustainability, and competitiveness. The book provides detailed insights on how to apply EA for organisational purposes, from three main fronts. First, it explains the implications that lack of understanding of EA have on organisational activities and processes. Second, it examines the challenges and complexities that hinder the implementation and practice of EA in organisations. Third, it proposes models and frameworks on how EA can be applied for strategic management of modern IT solutions in organisations. Written for postgraduates, researchers, academics, and professionals in the fields of EA, IT, and information systems, this book provides a valuable resource that will enable and enhance implementation and practice of EA including future studies.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R1,187 Discovery Miles 11 870 Ships in 12 - 17 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

Information Security Cost Management (Hardcover): Ioana V. Bazavan, Ian Lim Information Security Cost Management (Hardcover)
Ioana V. Bazavan, Ian Lim
R3,093 Discovery Miles 30 930 Ships in 12 - 17 working days

While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- -Focuses on setting the right road map so that you can be most effective in your information security implementations -Discusses cost-effective staffing, the single biggest expense to the security organization -Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively -Identifies high-risk areas, focusing limited resources on the most imminent and severe threats -Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.

The HIPAA Program Reference Handbook (Hardcover, New): Ross A. Leo The HIPAA Program Reference Handbook (Hardcover, New)
Ross A. Leo
R4,308 Discovery Miles 43 080 Ships in 12 - 17 working days

Presents practical recommendations for reaching and maintaining HIPAA compliance Contains contributed articles from HIPAA experts-consultants, employees of covered entities, and members of the standards bodies-who have worked first-hand with the standards and requirements Covers HIPAA program fundamentals including Due Diligence, workforce education, issues analysis, and internal control structures and requirements Addresses the standards of performance, execution, and due care that must be met to establish compliance Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA Program Reference Handbook explains all aspects of HIPAA including system design, implementation, compliance, liability, transactions, security, and privacy, focusing on pragmatic action instead of theoretic approaches. The book is organized into five parts. The first discusses programs and processes, covering program design and implementation, a review of legislation, human dynamics, the roles of Chief Privacy and Chief Security Officers, and many other foundational issues. The Handbook continues by analyzing product policy, technology, and process standards, and what entities need to do to reach compliance. It then focuses on HIPAA legal impacts, including liability associated with senior management and staff within an organization. A section on transactions and interactions discusses the intricacies of the transaction types, standards, methods, and implementations required by HIPAA, covering the flow of payments and patient information among healthcare and service providers, payers, agencies, and other organizations. The book concludes with a discussion of security and pri

How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Hardcover, 2nd edition): Simon... How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Hardcover, 2nd edition)
Simon Bell, Trevor Wood-Harper
R3,997 Discovery Miles 39 970 Ships in 12 - 17 working days

This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.

How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Paperback, 2nd edition): Simon... How to Set Up Information Systems - A Non-specialist's Guide to the Multiview Approach (Paperback, 2nd edition)
Simon Bell, Trevor Wood-Harper
R1,744 Discovery Miles 17 440 Ships in 12 - 17 working days

This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.

Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Paperback): Karl Cox Business Analysis, Requirements, and Project Management - A Guide for Computing Students (Paperback)
Karl Cox
R1,558 Discovery Miles 15 580 Ships in 12 - 17 working days

IT projects emerge from a business need. In practice, software developers must accomplish two big things before an IT project can begin: find out what you need to do (i.e., analyse business requirements) and plan out how to do it (i.e., project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis, Requirements, and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS), the Gantt chart, and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development, which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices, the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice.

New Directions in Internet Management (Hardcover, 2 Ed): Sanjiv Purba New Directions in Internet Management (Hardcover, 2 Ed)
Sanjiv Purba
R4,078 Discovery Miles 40 780 Ships in 12 - 17 working days

What is the business model for making money on the Internet and how does it function? The answer to this question will determine the shape of the Internet over the near term. As the Internet business model continues to evolve, so will Internet management. And with the demise of the Internet greatly exaggerated, it will continue to be a driving force for business in the future. Keeping you up-to-date with the latest thinking in this field, New Directions in Internet Management gives you an encyclopedia of Internet management know-how.
Most Internet-related books present in-depth coverage of one particular technology or application. Not this one. It provides you with a strategic and tactical view of the entire Internet landscape, what the technologies and applications are, how they work together, and how to plan for them. You get advice from battle-scarred experts on everything from choosing the right Web database to finding a reliable Web consultant, from security to performance management. Detailed and instructive case studies, examples, and hundreds illustrations supplement the coverage. Focusing exclusively on the management aspects of Internet development and maintenance, New Directions in Internet Management shows you how to leverage Internet technology while abiding by time-honored business practices.

Laboratory Information Management Systems, Second Edition, (Paperback, 2nd edition): Christine Paszko, Elizabeth Turner Laboratory Information Management Systems, Second Edition, (Paperback, 2nd edition)
Christine Paszko, Elizabeth Turner
R3,984 Discovery Miles 39 840 Ships in 12 - 17 working days

"Details the most recent advances in Laboratory Information Management Systems. Offers contemporary approaches to system development, design, and installation; system customization; software and hardware compatibility; quality assurance and regulatory requirements; and resource utilization."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R495 R468 Discovery Miles 4 680
Software Security - Concepts & Practices
Suhel Ahmad Khan, Rajeev Kumar, … Hardcover R3,640 Discovery Miles 36 400
Software Deployment, Updating, and…
Bill Stackpole, Patrick Hanrion Paperback R1,827 Discovery Miles 18 270
Zero Trust Journey Across the Digital…
Abbas Kudrati, Binil A. Pillai Paperback R1,414 Discovery Miles 14 140
Technology Innovation - Models…
Angelo Bonomi Hardcover R1,429 Discovery Miles 14 290
Practical Security for Agile and DevOps
Mark S. Merkow Paperback R1,854 Discovery Miles 18 540
What To Do When You Get Hacked - A…
Shimon Brathwaite Paperback R1,202 Discovery Miles 12 020
Acquiring Card Payments
Ilya Dubinsky Paperback R1,359 Discovery Miles 13 590
Intelligent IT Outsourcing
Sara Cullen, Leslie Willcocks Paperback R1,806 Discovery Miles 18 060
The Adventurous and Practical Journey to…
FANAP Studies & Research Center Hardcover R3,029 Discovery Miles 30 290

 

Partners