![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
Intelligent IT Outsourcing enables practitioners to focus in on the essential issues that need to be addressed so that the fundamental structure of their sourcing strategy and its implementation is sound. The authors provide insight into the challenges likely to be faced and give detailed advice on how to pre-empt and manage these. IT and outsourcing continue to be problematic, not least because fundamental learning about this subject fails to be applied systematically, and because IT is inherently difficult to manage. The economics are not obvious and emerging technologies have to be addressed, therefore IT goes to the heart of many enterprises and interfaces with multiple business units and processes, and there are continuous skills shortages. Unfortunately complexities are not removed in outsourced situations where additional problems come into play, for example the supplier's capabilities, whether the IT is right for an outsourcing solution, and whether the contract is robust but flexible enough to allow for outsourcing to take place. Objectives need to be realistic, and factors such as whether the internal management is mature and capable enough in this field, and the impact of prohibitive switching costs on behaviour once an outsourcing deal has been signed all have to be taken into account. The authors have built up over two decades of research, advisory and practitioner experience that enables them to distil the fundamental challenges in IT and outsourcing and demonstrate how these can be addressed.
This book is concerned with the ways in which organizations design, build and use information technology systems. In particular it looks at the interaction between these IT-centred activities and the broader management processes within organizations. The authors adopt a critical social science perspective on these issues, and are primarily concerned with advancing theoretical debates on how best to understand the related processes of technological and organizational change. To this end, the book examines and deploys recent work on power/knowledge, actor-network theory and critical organization theory. The result is an account of the nature and significance of information systems in organizations which is an alternative perspective to pragmatic and recipe-based approaches to this topic which dominate much contemporary management literature on IT. This book is intended for academic: Management and social science academics and postgraduate students of IT strategy and organization. Practitioner: Senior managers concerned with IT and strategy issues.
Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major gaps and omissions that need to be filled if data about software development is to be useful for comparisons or estimating future projects. Among the more serious gaps are leaks in reporting about software development efforts that, if not corrected, can distort data and make benchmarks almost useless and possibly even harmful. One of the most common leaks is that of unpaid overtime. Software is a very labor-intensive occupation, and many practitioners work very long hours. However, few companies actually record unpaid overtime. This means that software effort is underreported by around 15%, which is too large a value to ignore. Other sources of leaks include the work of part-time specialists who come and go as needed. There are dozens of these specialists, and their combined effort can top 45% of total software effort on large projects. The book helps software project managers and developers uncover errors in measurements so they can develop meaningful benchmarks to estimate software development efforts. It examines variations in a number of areas that include: Programming languages Development methodology Software reuse Functional and nonfunctional requirements Industry type Team size and experience Filled with tables and charts, this book is a starting point for making measurements that reflect current software development practices and realities to arrive at meaningful benchmarks to guide successful software projects.
To help readers understand virtualization and cloud computing, this book is designed to cover the theories and concepts enough to understand the cutting-edge technology. Meanwhile, in this book, the reader can gain hands-on skills on VMware Cloud Suite to create a private cloud. With the academic support from VMware, readers can use the VMware supported software to create various virtualized IT infrastructures sophisticated enough for various sized enterprises. Then, the virtualized IT infrastructure can be made available to an enterprise through the private cloud services.
By the end of the decade, approximately 50 billion devices will be connected over the internet using multiple services such as online gaming, ultra-high definition videos, and 5G mobile services. The associated data traffic demand in both fixed and mobile networks is increasing dramatically, causing network operators to have to migrate the existing optical networks towards next-generation solutions. The main challenge within this development stems from network operators having difficulties finding cost-effective next-generation optical network solutions that can match future high capacity demand in terms of data, reach, and the number of subscribers to support multiple network services on a common network infrastructure. Design, Implementation, and Analysis of Next Generation Optical Networks: Emerging Research and Opportunities is an essential reference source that discusses the next generation of high capacity passive optical access networks (PON) in terms of design, implementation, and analysis and offers a complete reference of technology solutions for next-generation optical networks. Featuring research on topics such as artificial intelligence, electromagnetic interface, and wireless communication, this book is ideally designed for researchers, engineers, scientists, and students interested in understanding, designing, and analyzing the next generation of optical networks.
This book shows IT managers how to identify, mitigate and manage risks in an IT outsourcing exercise. The book explores current trends and highlights key issues and changes that are taking place within outsourcing. Attention is given to identifying the drivers and related risks of outsourcing by examining recently published and existing concepts of IT outsourcing. Founded on academic theory and empirical and quantitative information, this book: * Incorporates the complete risk identification and mitigation life cycle * Highlights the concept of core competency * Looks at motivating factors and working relationships of the buyer and supplier * Provides background to understand the risks as a result of 'human factors' as defined by the agency theory * Reviews the areas of risk that influence the decision to outsource the IT function * Examines the forces that determine the equilibrium in the risk profiles for the buyer and supplier
Information Technology and Career Education contains the contributions presented at the 2014 International Conference on Information Technology and Career Education (ICITCE 2014, Hong Kong, China, 9-10 October 2014). The book is divided into two main topics: information technology and vocational technology. Considerable attention is also paid to electric power, data mining, vocational education and physical education. Information Technology and Career Education will be invaluable to professionals and academics in information and vocational technology, electric and electronic engineering and education science.
There is considerable connection between growth of the personnel in the organization and the ability for the company to compete over time. Looking outside for help training may be required but looking within for opportunities for enhanced training and growth, will foster a continually improving and growing organization. This book examines the opportunities for learning, within the organization and its' activities, along with the connection to motivation. Additionally, it provides information on the characteristics of organizations that are able to quickly disseminate, along with approaches for improving this distribution of that learning throughout the organization.
In today's competitive business environment, most companies realize that the better they can manage their customer relationships, the more successful they will become. Customer Relationship Management (CRM) software systems are key tools for companies to manage the customer-facing processes of their businesses. However, many companies have resisted implementing this most critical customer-oriented application due in large part to the lack of a single-point resource on implementing a CRM system. This book attempts to fill that gap. Implementing SAP (R) CRM will help technologists and managers come to grips with the vision, concept, and technology of CRM. It begins by laying out the groundwork for understanding CRM. It explains the concept and context of CRM and the tangible business benefits of CRM adoption. Demonstrating a professional approach to the evaluation and selection of SAP, it details the critical success factors (CSFs), patterns, and anti-patterns of a successful SAP CRM implementation. CRM implementations can add significant benefit to the company's bottom line only if the company first transforms itself into a customer-centric and customer-responsive enterprise. This book explains what it means to be a customer-centric and responsive enterprise, and provides a framework for business operations based on customer relationships, rather than the traditional four Ps (product, positioning, price, promotion). It further spells out business process reengineering (BPR) strategies to configure internal business processes and operations with SAP CRM to improve customer-facing strategies, services, and relationships.
Although program management has received much attention in recent books, program governance remains a relatively new subject. While selected books and standards touch on this important topic, few are devoted to program governance as a subject. This book fills that need. Program Governance provides a thorough understanding of governance while reviewing the underlying theories. The first book dedicated to this subject, it caters to the needs of practitioners, researchers, and students of management and governance. The book provides a holistic view of program governance while covering multiple elements of program governance. Topics covered include the governance structure, governance roles, governance functions, governance mechanisms, factors influencing the governance framework, and different domains of programs that come under the jurisdiction of a governance framework. The book presents the author's own program governance framework, called the Contingent Governance Framework for Programs (CGFPrgTM), which is adaptable to suit different program contexts. This adaptability ensures that the different elements of governance, including structure and mechanisms, are aligned with program requirements. Such alignment results in an efficient and effective environment with an increased probability of program success. The text supplies references to research and case studies to help readers understand key concepts in more detail. It also includes objectives at the end of each chapter to help readers gauge their knowledge of the subject. The book clarifies the linkage/dependencies between program governance and other governance levels, such as international governance and corporate governance, which have a strong influence on governance framework for programs. It also explains the difference between the dynamics of temporary organizations, such as projects and programs, and permanent organizations. This distinct
Although project team members play crucial roles in projects, they often do not possess the required mastery of project management methodologies. As a result, dialog between project managers and team members is not as effective as it can be and can quickly become a source of stress and tension. Empowering Project Teams: Using Project Followership to Improve Performance improves on this situation by presenting the project environment from the perspective of project team members. Re-interpreting project management methodologies and behaviors using a bottom-up approach, it explores the application of project followership in the key stages of project management. It details the methods and techniques that all project team members need to know and outlines the behaviors they should adopt to be successful in each stage of the project. The book is divided into five sections: Introduces and explores the basic concepts of project management and project followership Examines project start-up-the all too often underestimated set of activities that make it possible to make future activities less problematic Highlights the importance of project planning Focuses on execution and control of the project Considers project closure and transfer and explains why this is an ideal time to determine if efforts invested have been rewarded Despite an understanding that project success is directly proportional to the entire team's ability to act as a managerial center of excellence, there has long been a need for a book dedicated to the individuals that participate in projects. Filling this need, this book is an ideal resource for anyone who regularly works as a member of a project team. Complete with case studies in each chapter, the book also includes exercises on the topics covered to facilitate understanding.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective.
According to the Brookings Institute, an organization s information and other intangible assets account for over 80 percent of its market value. As the primary sponsors and implementers of information security programs, it is essential for those in key leadership positions to possess a solid understanding of the constantly evolving fundamental concepts of information security management. Developing this knowledge and keeping it current however, requires the time and energy that busy executives like you simply don t have. Supplying a complete overview of key concepts, The Executive MBA in Information Security provides the tools needed to ensure your organization has an effective and up-to-date information security management program in place. This one-stop resource provides a ready-to use security framework you can use to develop workable programs and includes proven tips for avoiding common pitfalls so you can get it right the first time. Allowing for quick and easy reference, this time-saving manual provides those in key leadership positions with a lucid understanding of:
Presenting difficult concepts in a straightforward manner, this concise guide allows you to get up to speed, quickly and easily, on what it takes to develop a rock-solid information security management program that is as flexible as it is secure.
Executives should not necessarily know the intricacies of project management, but they should know how project management, as a discipline, can benefit the organization in implementing its strategies and realizing its vision. The only way that executives can effectively apply project management to realize these goals is to have sound knowledge of the project management discipline. The purpose of this book is to provide executives with a comprehensive overview of the discipline of project management. It focuses on the benefits of project management to an organization. The goal is to provide executives with a view as to how project management can deliver organizational strategies. The various chapters focus on specific aspects within the project management discipline and how each aspect should be managed from a business perspective. The book covers the entire spectrum of project management from a management and leadership perspective. The focus is not necessarily on what needs to be done from a project management perspective, but on what organizations and senior executives can do to facilitate projects. The book covers: The value of project management Project management as a strategic enabler Project, program, and portfolio management The role of the project management office in the successful delivery of projects, programs, and portfolios The benefits of project deliverables bring Sustainability of the organization Governance and the role of the project sponsor. The book concludes with a comprehensive portfolio, program, and project management framework. This holistic framework enables organizations to achieve value from project management and realize strategic goals.
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner. Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book- -Focuses on setting the right road map so that you can be most effective in your information security implementations -Discusses cost-effective staffing, the single biggest expense to the security organization -Presents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectively -Identifies high-risk areas, focusing limited resources on the most imminent and severe threats -Describes how to manage the key access controls when faced with manual user management, how to automate user management tasks in a cost effective manner, and how to deal with security breaches Demonstrating strategies to maximize a limited security budget without compromising the quality of risk management initiatives, Information Security Cost Management helps you save your organization time and money. It provides the tools required to implement policies, processes, and training that are crucial to the success of a company's security.
Presents practical recommendations for reaching and maintaining HIPAA compliance Contains contributed articles from HIPAA experts-consultants, employees of covered entities, and members of the standards bodies-who have worked first-hand with the standards and requirements Covers HIPAA program fundamentals including Due Diligence, workforce education, issues analysis, and internal control structures and requirements Addresses the standards of performance, execution, and due care that must be met to establish compliance Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA Program Reference Handbook explains all aspects of HIPAA including system design, implementation, compliance, liability, transactions, security, and privacy, focusing on pragmatic action instead of theoretic approaches. The book is organized into five parts. The first discusses programs and processes, covering program design and implementation, a review of legislation, human dynamics, the roles of Chief Privacy and Chief Security Officers, and many other foundational issues. The Handbook continues by analyzing product policy, technology, and process standards, and what entities need to do to reach compliance. It then focuses on HIPAA legal impacts, including liability associated with senior management and staff within an organization. A section on transactions and interactions discusses the intricacies of the transaction types, standards, methods, and implementations required by HIPAA, covering the flow of payments and patient information among healthcare and service providers, payers, agencies, and other organizations. The book concludes with a discussion of security and pri
This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.
This introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.
What is the business model for making money on the Internet and how does it function? The answer to this question will determine the shape of the Internet over the near term. As the Internet business model continues to evolve, so will Internet management. And with the demise of the Internet greatly exaggerated, it will continue to be a driving force for business in the future. Keeping you up-to-date with the latest thinking in this field, New Directions in Internet Management gives you an encyclopedia of Internet management know-how.
"Details the most recent advances in Laboratory Information Management Systems. Offers contemporary approaches to system development, design, and installation; system customization; software and hardware compatibility; quality assurance and regulatory requirements; and resource utilization."
A Standard for Auditing Computer Applications is a dynamic new resource for evaluating all aspects of automated business systems and systems environments. At the heart of A Standard for Auditing Computer Applications system is a set of customizable workpapers that provide blow-by-blow coverage of all phases of the IT audit process for traditional mainframe, distributed processing, and client/server environments.A Standard for Auditing Computer Applications was developed by Marty Krist, an acknowledged and respected expert in IT auditing. Drawing upon his more than twenty years of auditing experience with leading enterprise organizations, worldwide, Marty walks you step-by-step through the audit process for system environments and specific applications and utilities. He clearly spells out what you need to look for and where to look for it, and he provides expert advice and guidance on how to successfully address a problem when you find one.When you order A Standard for Auditing Computer Applications, you receive a powerful package containing all the forms, checklists, and templates you'll ever need to conduct successful audits on downloadable resources. Designed to function as a handy, on-the-job resource, the book follows a concise, quick-access format. It begins with an overview of the general issues inherent in any IT review. This is followed by a comprehensive review of the audit planning process. The remainder of the book provides you with detailed, point-by-point breakdowns along with proven tools for:evaluating systems environments-covers all the bases, including IT administration, security, backup and recovery planning, systems development, and moreEvaluating existing controls for determining hardware and software reliabilityAssessing the new system development processEvaluating all aspects of individual applications, from I/O, processing and logical and physical security to documentation, training, and programmed proceduresAssessing specific applications and utilities, including e-mail, groupware, finance and accounting applications, CAD, R&D, production applications, and more
Project Management: Theory and Practice, Third Edition gives students a broad and real flavor of project management. Bringing project management to life, it avoids being too sterilely academic and too narrowly focused on a particular industry view. It takes a model-based approach towards project management commonly used in all industries. The textbook aligns with the latest version of the Project Management Institute's Project Management Body of Knowledge (PMBOK (R)) Guide, which is considered to be the de facto standard for project management. However, it avoids that standard's verbiage and presents students with readable and understandable explanations. Core chapters align with the Project Management Institute's model as well as explain how this model fits real-world projects. The textbook can be used as companion to the standard technical model and help those studying for various project management certifications. The textbook takes an in-depth look at the following areas important to the standard model: Work Breakdown Structures (WBS) Earned Value Management (EVM) Enterprise project management Portfolio management (PPM) Professional responsibility and ethics Agile life cycle The text begins with a background section (Chapters 1-9) containing material outside of the standard model structure but necessary to prepare students for the 10 standard model knowledge areas covered in the chapters that follow. The text is rounded out by eight concluding chapters that explain advanced planning approaches models and projects' external environments. Recognizing that project management is an evolving field, the textbook includes section written by industry experts who share their insight and expertise on cutting-edge topics. It prepares students for upcoming trends and changes in project management while providing an overview of the project management environment today. In addition to guiding students through current models and standards, Project Management: Theory and Practice, Third Edition prepares students for the future by stimulating their thinking beyond the accepted pragmatic view.
Software is important because it is used by a great many people in companies and institutions. This book presents engineering methods for designing and building software. Based on the author's experience in software engineering as a programmer in the defense and aerospace industries, this book explains how to ensure a software that is programmed operates according to its requirements. It also shows how to develop, operate, and maintain software engineering capabilities by instilling an engineering discipline to support programming, design, builds, and delivery to customers. This book helps software engineers to: Understand the basic concepts, standards, and requirements of software engineering. Select the appropriate programming and design techniques. Effectively use software engineering tools and applications. Create specifications to comply with the software standards and requirements. Utilize various methods and techniques to identify defects. Manage changes to standards and requirements. Besides providing a technical view, this book discusses the moral and ethical responsibility of software engineers to ensure that the software they design and program does not cause serious problems. Software engineers tend to be concerned with the technical elegance of their software products and tools, whereas customers tend to be concerned only with whether a software product meets their needs and is easy and ready to use. This book looks at these two sides of software development and the challenges they present for software engineering. A critical understanding of software engineering empowers developers to choose the right methods for achieving effective results. Effective Methods for Software Engineering guides software programmers and developers to develop this critical understanding that is so crucial in today's software-dependent society.
"The AntiPatterns authors have clearly been there and done that when it comes to managing software development efforts. I resonated with one insight after another, having witnessed too many wayward projects myself. The experience in this book is palpable." —John Vlissides, IBM Research "This book allows managers, architects, and developers to learn from the painful mistakes of others. The high-level AntiPatterns on software architecture are a particularly valuable contribution to software engineering. Highly recommended!" —Kyle Brown Author of The Design Patterns Smalltalk Companion "AntiPatterns continues the trend started in Design Patterns. The authors have discovered and named common problem situations resulting from poor management or architecture control, mistakes which most experienced practitioners will recognize. Should you find yourself with one of the AntiPatterns, they even provide some clues on how to get yourself out of the situation." —Gerard Meszaros, Chief Architect, Object Systems Group Are you headed into the software development mine field? Follow someone if you can, but if you’re on your own—better get the map! AntiPatterns is the map. This book helps you navigate through today’s dangerous software development projects. Just look at the statistics:
This new edition of Risk Management: Concepts and Guidance supplies a look at risk in light of current information, yet remains grounded in the history of risk practice. Taking a holistic approach, it examines risk as a blend of environmental, programmatic, and situational concerns. Supplying comprehensive coverage of risk management tools, practices, and protocols, the book presents powerful techniques that can enhance organizational risk identification, assessment, and management-all within the project and program environments. Updated to reflect the Project Management Institute's A Guide to the Project Management Body of Knowledge (PMBOK (R) Guide), Fifth Edition, this edition is an ideal resource for those seeking Project Management Professional and Risk Management Professional certification. Emphasizing greater clarity on risk practice, this edition maintains a focus on the ability to apply "planned clairvoyance" to peer into the future. The book begins by analyzing the various systems that can be used to apply risk management. It provides a fundamental introduction to the basics associated with particular techniques, clarifying the essential concepts of risk and how they apply in projects. The second part of the book presents the specific techniques necessary to successfully implement the systems described in Part I. The text addresses project risk management from the project manager's perspective. It adopts PMI's perspective that risk is both a threat and an opportunity, and it acknowledges that any effective risk management practice must look at the potential positive events that may befall a project, as well as the negatives.Providing coverage of the concepts that many project management texts ignore, such as the risk response matrix and risk models, the book includes appendices filled with additional reference materials and supporting details that simplifying some of the most complex aspects of risk management. |
You may like...
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
Computational Inference and Control of…
Vlado Menkovski
Hardcover
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,896
Discovery Miles 28 960
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,018
Discovery Miles 10 180
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
Flash Memory Integration - Performance…
Jalil Boukhobza, Pierre Olivier
Hardcover
R1,831
Discovery Miles 18 310
|