0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (865)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

The Renaissance of Legacy Systems - Method Support for Software-System Evolution (Paperback, Softcover reprint of the original... The Renaissance of Legacy Systems - Method Support for Software-System Evolution (Paperback, Softcover reprint of the original 1st ed. 1999)
Ian Warren; Contributions by D. Avallone, M. Breuer, J Favaro, J Ransom, …
R1,495 Discovery Miles 14 950 Ships in 10 - 15 working days

Many antiquated or legacy systems are still in operation today because they are critical to the organizations continued operations or are prohibitively expensive to replace. This book guides practitioners in managing the process of legacy system evolution. The author introduces a comprehensive method for managing a software evolution project, from its conception to the deployment of the resulting system. The book helps managers answer two critical decisions: What is the best way to evolve a particular legacy system? and How can the legacy system be migrated to a selected target architecture?

Professional Issues in Software Engineering (Paperback, 3rd edition): Frank Bott, Allison Coleman, Diane Rowland Professional Issues in Software Engineering (Paperback, 3rd edition)
Frank Bott, Allison Coleman, Diane Rowland
R2,410 Discovery Miles 24 100 Ships in 12 - 17 working days


Nowadays software engineers not only have to worry about the technical knowledge needed to do their job, but they are increasingly having to know about the legal, professional and commercial context in which they must work. With the explosion of the Internet and major changes to the field with the introduction of the new Data Protection Act and the legal status of software engineers, it is now essential that they have an appreciation of a wide variety of issues outside the technical.
Equally valuable to both students and practitioners, it brings together the expertise and experience of leading academics in software engineering, law, industrial relations, and health and safety, explaining the central principles and issues in each field and shows how they apply to software engineering.
Key Features:
* new and updated edition of a highly successful textbook for students and professional software engineers
* most other books on the subject look at specific languages in software engineering - this looks at specific issues in the context of software engineering
* covers the major changes that have occurred in recent years in the field
Professional Issues in Software Engineering covers all the key issues that students and professionals should have to think about. These include:
* commercial and financial frameworks
* the effect of new technology on employment
* the safety and reliability of computer systems
* health and safety in the workplace
* intellectual property rights in software
* computer contracts
* computer misuse

Advances in Databases and Information Systems - Second East European Symposium, ADBIS '98, Poznan, Poland, September 7-10,... Advances in Databases and Information Systems - Second East European Symposium, ADBIS '98, Poznan, Poland, September 7-10, 1998, Proceedings (Paperback, 1998 ed.)
Witold Litwin, Tadeusz Morzy, Gottfried Vossen
R1,562 Discovery Miles 15 620 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second East European Symposium on Advances in Databases and Information systems, ADBIS '98, held in Poznan, Poland in September 1998.
The 25 revised full papers presented were selected from a total of 90 submissions and six extended abstracts within a special section. "East meets West." The papers are organized in topical sections on query languges, optimization, collaborative systems, schema integration, storage and version management, object systems, knowledge discovery and the Web, and systems design.

Business Process Oriented Implementation of Standard Software - How to Achieve Competitive Advantage Efficiently and... Business Process Oriented Implementation of Standard Software - How to Achieve Competitive Advantage Efficiently and Effectively (Hardcover, 2nd ed. 1999)
Mathias Kirchmer
R1,662 Discovery Miles 16 620 Ships in 10 - 15 working days

Companies must confront an increasingly competitive environment with lean, flexible and market oriented structures. Therefore companies organize themselves according to their business processes. These processes are more and more often designed, implemented and managed based on standard software, mostly ERP or SCM packages. This is the first book delivering a complete description of a business driven implementation of standard software packages, accelerated by the use of reference models and other information models. The use of those models ensures best quality results and speeds up the software implementation. The book discusses how companies can optimize business processes and realize strategic goals with the implementation of software like SAP R/3, Oracle, Baan or Peoplesoft. It also includes the post implementation activities. The book cites numerous case studies and outlines each step of a process oriented implementation, including the goals, procedures and necessary methods and tools.

System Configuration Management - ECOOP'98 SCM-8 Symposium, Brussels, Belgium, July 20-21, 1998, Proceedings (Paperback,... System Configuration Management - ECOOP'98 SCM-8 Symposium, Brussels, Belgium, July 20-21, 1998, Proceedings (Paperback, 1998 ed.)
Boris Magnusson
R1,572 Discovery Miles 15 720 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Symposium on System Configuration Management, SCM-8, held in conjunction with ECOOP'98 in Brussels, Belgium, in July 1998.
The volume presents 17 revised full papers carefully reviewed and selected for presentation; also included is a tutorial lecture; approximately half of the papers come from industry. The book is divided into sections on industrial experience, experimental systems, product data management and system configuration management, formal approaches, cooperative systems, and Web-based applications.

Multi-Agent Systems. Theories, Languages and Applications - 4th Australian Workshop on Distributed Artificial Intelligence,... Multi-Agent Systems. Theories, Languages and Applications - 4th Australian Workshop on Distributed Artificial Intelligence, Brisbane, QLD, Australia, July 13, 1998, Proceedings (Paperback, 1998 ed.)
Chengqi Zhang, Dickson Lukose
R1,564 Discovery Miles 15 640 Ships in 10 - 15 working days

This volume contains revisedversions of selected papers presented at the Fourth Australian Workshop on Distributed Arti?cial Intelligence (DAK 91), together with a set of invited papers. Each paper has been reviewed by at least two program committee members. The workshop was held in Brisbane, Queensland, Australia on July 17,1992. The goalof the workshopwas to promoteresearchin distributed arti?cial intelligence and multi-agent systems, both nationally and internationally. Thepapers covera widerangeofissuesin the?eldof distributed arti?cial intelligence and multi-agent systems, such as theories, languages, and applications. Manypeoplecontributedtothesuccessofthis workshop. Wewouldliketothank all the authors who submitted papers to the workshop. Many thanks also to the members of the programme committee who diligently reviewed all the papers submitted. Finally, we thank the editorial sta? of Springer-Verlag for publishing this contribution to the Lecture Notes in Arti?cial Intelligence series. October 1998 Chengqi Zhang and Dickson Lukose Programme Committee Chengqi Zhang (Co-Chair) University of New England, Australia Dickson Lukose (Co-Chair) Brightware Inc., USA Victor Lesser University of Massachusetts, USA Je?rey S. Rosenschein Hebrew University, Israel Toshiharu Sugawara NTT Basic Research Labs, Japan Rose Dieng ACACIA Project, INRIA, France Norbert Glaser CRIN-INRIA Lorraine, France Sascha Ossowski Rey Juan Carlos Univ, Spain Michael Luck University of Warwick, UK Mark d Inverno University of Westminster, UK Tim Norman University of London, UK Douglas Norrie University of Calgary, Canada Bernard Moulin Laval University, Canada Zhisheng Huang University of London, UK Minjie Zhang Edith Cowan University, Australia Brahim Chaib-draa Laval University, Canada Table of Contents TeamFormationbySelf-InterestedMobileAgents . . . . . . . . . . . . . . . . . . . . . . . . . ."

Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover): Ken E. Sigler, James L. Rainey, III Securing an IT Organization through Governance, Risk Management, and Audit (Hardcover)
Ken E. Sigler, James L. Rainey, III
R2,222 Discovery Miles 22 220 Ships in 12 - 17 working days

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders. Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models. The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.

Computational Intelligence for Decision Support (Hardcover, Annotated Ed): Zhengxin Chen Computational Intelligence for Decision Support (Hardcover, Annotated Ed)
Zhengxin Chen
R6,345 Discovery Miles 63 450 Ships in 12 - 17 working days

Intelligent decision support relies on techniques from a variety of disciplines, including artificial intelligence and database management systems. Most of the existing literature neglects the relationship between these disciplines. By integrating AI and DBMS, Computational Intelligence for Decision Support produces what other texts don't: an explanation of how to use AI and DBMS together to achieve high-level decision making.

Threading relevant disciplines from both science and industry, the author approaches computational intelligence as the science developed for decision support. The use of computational intelligence for reasoning and DBMS for retrieval brings about a more active role for computational intelligence in decision support, and merges computational intelligence and DBMS. The introductory chapter on technical aspects makes the material accessible, with or without a decision support background. The examples illustrate the large number of applications and an annotated bibliography allows you to easily delve into subjects of greater interest.

The integrated perspective creates a book that is, all at once, technical, comprehensible, and usable. Now, more than ever, it is important for science and business workers to creatively combine their knowledge to generate effective, fruitful decision support. Computational Intelligence for Decision Support makes this task manageable.

The CIO's Guide to Information Security Incident Management (Hardcover): Matthew William Arthur Pemble, Wendy Fiona Goucher The CIO's Guide to Information Security Incident Management (Hardcover)
Matthew William Arthur Pemble, Wendy Fiona Goucher
R1,916 Discovery Miles 19 160 Ships in 12 - 17 working days

This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan is required for compliance with government regulations, industry standards such as PCI DSS, and certifications such as ISO 27001. This book will help organizations meet those compliance requirements.

Information Security and Privacy - Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997... Information Security and Privacy - Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings (Paperback, 1997 ed.)
Vijav Varadharajan, Josef Pieprzyk, Yi Mu
R1,648 Discovery Miles 16 480 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second Australasian Conference on Information Security and Privacy, ACISP'97, held in Sydney, NSW, Australia, in July 1997.
The 20 revised full papers presented were carefully selected for inclusion in the proceedings. The book is divided into sections on security models and access control, network security, secure hardware and implementation issues, cryptographic functions and ciphers, authentication codes and secret sharing systems, cryptanalysis, key escrow, security protocols and key management, and applications.

Advanced Information Systems Engineering - 9th International Conference, CAiSE'97, Barcelona, Catalonia, Spain, June... Advanced Information Systems Engineering - 9th International Conference, CAiSE'97, Barcelona, Catalonia, Spain, June 16-20, 1997, Proceedings (Paperback, 1997 ed.)
Antoni Olive, Joan A. Pastor
R1,717 Discovery Miles 17 170 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Advanced Information Systems Engineering, CAiSE'97, held in Barcelona, Spain, in June 1997. The volume presents 30 revised full papers selected from a total of 112 submissions; also included is one invited contribution. The book is divided into topical sections on requirements engineering; information systems design; methods, environments, and tools; distributed information systems; and workflow systems.

Computer Performance Evaluation Modelling Techniques and Tools - 9th International Conference, St. Malo, France, June 3-6, 1997... Computer Performance Evaluation Modelling Techniques and Tools - 9th International Conference, St. Malo, France, June 3-6, 1997 Proceedings (Paperback, 1997 ed.)
Raymond Marie, Brigitte Plateau, Maria Calzarossa, Gerardo Rubino
R1,585 Discovery Miles 15 850 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Modeling Techniques and Tools for Computer Performance Evaluation, held in St. Malo, France, in June 1997.
The volume presents 17 revised full papers carefully selected by the program committee for the proceedings; also included is an extended abstract of an invited talk. The collection of papers presented represents state-of-the-art work in computer performance evaluation. Among the issues addressed are fully distributed systems, statistical multiplexing for high-speed networks, and implications of the concept of dependability.

Life Cycle Management For Dependability (Paperback, Softcover reprint of the original 1st ed. 1997): T. Anderson Life Cycle Management For Dependability (Paperback, Softcover reprint of the original 1st ed. 1997)
T. Anderson; Edited by Felix Redmill, Chris Dale
R2,863 Discovery Miles 28 630 Ships in 10 - 15 working days

Dependability has always been an vital attribute of operational systems, regardless of whether they are highly-specialised (like electricity generating plants) or more general-purpose (like domestic appliances). This volume provides a highly-readable overview of the topic, concentrating on dependability as a life-cycle management issue rather than as a technical subject. Specifically avoiding technical language and complex mathematics, it is designed to be accessible to readers at all levels. It will be of particular interest to project managers and software engineers in industries where dependability is of particular importance, such as aerospace, process control, and mining. It will also provide useful reading material for students taking courses with modules in dependability. Felix Redmill and Chris Dale have both worked in industry for over 15 years, and now run successful consultancy businesses.

Fault-Tolerant Parallel and Distributed Systems (Hardcover, 1998 ed.): Dimiter R. Avresky, David R. Kaeli Fault-Tolerant Parallel and Distributed Systems (Hardcover, 1998 ed.)
Dimiter R. Avresky, David R. Kaeli
R4,589 Discovery Miles 45 890 Ships in 10 - 15 working days

The most important use of computing in the future will be in the context of the global "digital convergence" where everything becomes digital and every thing is inter-networked. The application will be dominated by storage, search, retrieval, analysis, exchange and updating of information in a wide variety of forms. Heavy demands will be placed on systems by many simultaneous re quests. And, fundamentally, all this shall be delivered at much higher levels of dependability, integrity and security. Increasingly, large parallel computing systems and networks are providing unique challenges to industry and academia in dependable computing, espe cially because of the higher failure rates intrinsic to these systems. The chal lenge in the last part of this decade is to build a systems that is both inexpensive and highly available. A machine cluster built of commodity hardware parts, with each node run ning an OS instance and a set of applications extended to be fault resilient can satisfy the new stringent high-availability requirements. The focus of this book is to present recent techniques and methods for im plementing fault-tolerant parallel and distributed computing systems. Section I, Fault-Tolerant Protocols, considers basic techniques for achieving fault-tolerance in communication protocols for distributed systems, including synchronous and asynchronous group communication, static total causal order ing protocols, and fail-aware datagram service that supports communications by time."

Transaction Management Support for Cooperative Applications (Hardcover, 1998 ed.): Rolf A.De By, Wolfgang Klas, J. Veijalainen Transaction Management Support for Cooperative Applications (Hardcover, 1998 ed.)
Rolf A.De By, Wolfgang Klas, J. Veijalainen
R4,485 Discovery Miles 44 850 Ships in 10 - 15 working days

Transaction Management Support for Cooperative Applications integrates Computer-Supported Cooperative Work (CSCW), Workflow Management Systems (WFMS), and Transaction Processing (TP) Technologies by first presenting a rigorous analysis of requirements presented by diverse classes of cooperative applications, ranging from cooperative authoring, through design for manufacturing, to interorganizational workflows, and then goes on to introduce a language that is suitable for the specification of cooperative activities. This language is based on a formal model and provides a collection of tools that allow the users to reason about the correctness of specifications, rather than relying on mechanisms that detect possible violations at run-time. The transaction model introduced in this monograph combines the use of private work spaces that allow individual participants to work independently, with synchronization mechanisms that allow them to combine their work to form a coherent whole. Finally, this monograph shows how the new transactional concepts developed in the project can be mapped into the transaction manager of an object-oriented database management system to provide a clean and efficient implementation. Transaction Management Support for Cooperative Applications summarizes the state of the art of key technologies in cooperative activities and transactions. This book will be extremely useful to students, researchers, and technology developers in the areas of Computer-Supported Cooperative Work (CSCW), Workflow Management Systems (WFMS), and Transaction Processing (TP) Technologies, and is suitable as a text or reference for a graduate-level course on Database Systems or ComputerSupported Cooperative Work.

VLSI: Integrated Systems on Silicon - IFIP TC10 WG10.5 International Conference on Very Large Scale Integration 26-30 August... VLSI: Integrated Systems on Silicon - IFIP TC10 WG10.5 International Conference on Very Large Scale Integration 26-30 August 1997, Gramado, RS, Brazil (Hardcover, 1997 ed.)
Ricardo A Reis, Luc Claesen
R9,854 Discovery Miles 98 540 Ships in 10 - 15 working days

This book contains the papers that have been presented at the ninth Very Large Scale Integrated Systems conference VLSI'97 that is organized biannually by IFIP Working Group 10.5. It took place at Hotel Serra Azul, in Gramado Brazil from 26-30 August 1997. Previous conferences have taken place in Edinburgh, Trondheim, Vancouver, Munich, Grenoble and Tokyo. The papers in this book report on all aspects of importance to the design of the current and future integrated systems. The current trend towards the realization of versatile Systems-on-a-Chip require attention of embedded hardware/software systems, dedicated ASIC hardware, sensors and actuators, mixed analog/digital design, video and image processing, low power battery operation and wireless communication. The papers as presented in Jhis book have been organized in two tracks, where one is dealing with VLSI System Design and Applications and the other presents VLSI Design Methods and CAD. The following topics are addressed: VLSI System Design and Applications Track * VLSI for Video and Image Processing. * Microsystem and Mixed-mode design. * Communication And Memory System Design * Cow-voltage & Low-power Analog Circuits. * High Speed Circuit Techniques * Application Specific DSP Architectures. VLSI Design Methods and CAD Track * Specification and Simulation at System Level. * Synthesis and Technology Mapping. * CAD Techniques for Low-Power Design. * Physical Design Issues in Sub-micron Technologies. * Architectural Design and Synthesis. * Testing in Complex Mixed Analog and Digital Systems.

Dependable Computing - EDCC-2 - Second European Dependable Computing Conference, Taormina, Italy, October 2 - 4, 1996.... Dependable Computing - EDCC-2 - Second European Dependable Computing Conference, Taormina, Italy, October 2 - 4, 1996. Proceedings (Paperback, 1996 ed.)
Andrzej Hlawiczka, Joao G. S. Silva, Luca Simoncini
R1,713 Discovery Miles 17 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second European Dependable Computing Conference, EDCC-2, held in Taormina, Italy, in October 1996.
The book presents 26 revised full papers selected from a total of 66 submissions based on the reviews of 146 referees. The papers are organized in sections on distributed fault tolerance, fault injection, modelling and evaluation, fault-tolerant design, basic hardware models, testing, verification, replication and distribution, and system level diagnosis.

Handbook of e-Business Security (Hardcover): Joao Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman,... Handbook of e-Business Security (Hardcover)
Joao Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
R3,321 Discovery Miles 33 210 Ships in 12 - 17 working days

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

Performance Engineering of Computer and Telecommunications Systems - Proceedings of UKPEW'95, Liverpool John Moores... Performance Engineering of Computer and Telecommunications Systems - Proceedings of UKPEW'95, Liverpool John Moores University, UK. 5 - 6 September 1995 (Paperback, Softcover reprint of the original 1st ed. 1996)
Madjid Merabti, Michael Carew, Frank Ball
R2,902 Discovery Miles 29 020 Ships in 10 - 15 working days

This book is the proceedings of the Workshop on the Performance Engineering of Computer and Telecommunications Systems. The workshop Was held at Liverpool John Moores University, England on the 5th and 6th September 1995. The workshop follows a series organised by the British Computer Society (BCS) Special Interest Group on Performance Engineering. The workshop addressed most techniques and experieI1ces in the Engineering of Computer and Telecommunications Systems that provide a guaranteed quality of service. Techniques such as measurements, simulation, and analytical models and their applications to ATM networks, Multimedia Systems, Distributed Systems, Access and Wide Area Networks were presented. In addition a number of papers dealt with advances in the development of analytical models, simulation architectures and the application of formal methods, stich as Process Algebra, to the specification and building of performance biased computer systems. The book is suitable for systems designers, engineers, researchers and postgraduate students interested in the design and implementation of Computer Systems, Networks and Telecommunications. Many people assisted in the arrangements and success of this workshop. I would like to thank them all and in particular the reviewers. I would also like to particularly thank our industrial sponsors GPT Public Networks Group, Liverpool and BICC Cables, Chester, England for their generous financial and material support.

Multimedia-enabled Sensors in IoT - Data Delivery and Traffic Modelling (Hardcover): Fadi Al-Turjman Multimedia-enabled Sensors in IoT - Data Delivery and Traffic Modelling (Hardcover)
Fadi Al-Turjman
R2,414 Discovery Miles 24 140 Ships in 12 - 17 working days

This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of recent research in design issues affecting the development of strategic multipath routing protocols that support multimedia data traffic in WMSN from an IoT perspective, plus detailed analysis on the appropriate traffic models.

Scrum Project Management (Paperback): Kim H Pries, Jon M. Quigley Scrum Project Management (Paperback)
Kim H Pries, Jon M. Quigley
R1,895 Discovery Miles 18 950 Ships in 12 - 17 working days

Originally created for agile software development, scrum provides project managers with the flexibility needed to meet ever-changing consumer demands. Presenting a modified version of the agile software development framework, Scrum Project Management introduces Scrum basics and explains how to apply this adaptive technique to effectively manage a wide range of programs and complex projects. The book provides proven planning methods for controlling project scope and ensuring your project stays on schedule. It includes scrum tracking methods to help your team maintain a focus on improving throughput and streamlining communications. It also demonstrates how to: Combine traditional project management methods with scrum Adapt the familiar work breakdown structure to create scrum backlogs and sprints Use a scrum of scrums to manage programs Apply earned value management, critical path, and PERT in the context of scrum Having successfully deployed and implemented scrum across multiple companies and departments, the authors provide valuable insight into how they achieved their past successes and how they overcame the trials involved with the deployment of a scrum environment. Throughout the text they discuss improvisation, creative problem solving, and emergent phenomena-detailing the methods needed to ensure your team achieves project success.

Automated and Algorithmic Debugging - First International Workshop, AADEBUG '93, Linkoeping, Sweden, May 3-5, 1993.... Automated and Algorithmic Debugging - First International Workshop, AADEBUG '93, Linkoeping, Sweden, May 3-5, 1993. Proceedings (Paperback, 1993 ed.)
Peter A Fritzson
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

Debugging has always been a costly part of software development, and many attempts have been made to provide automatic computer support for this task.Automated debugging has seen major develoments over the last decade. Onesuccessful development is algorithmic debugging, which originated in logic programming but was later generalized to concurrent, imperative, and lazy functional languages. Important advances have also been made in knowledge-based program debugging, and in approaches to automated debugging based on static and dynamic program slicing based on dataflow and dependence analysis technology. This is the first collected volume of papers on automated debugging and presents latest developments, tutorial papers, and surveys.

Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Paperback): Frank Siepmann Managing Risk and Security in Outsourcing IT Services - Onshore, Offshore and the Cloud (Paperback)
Frank Siepmann
R1,814 Discovery Miles 18 140 Ships in 12 - 17 working days

With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people. Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation-whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization. Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics. By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.

The OEE Primer - Understanding Overall Equipment Effectiveness, Reliability, and Maintainability (Hardcover): D. H Stamatis The OEE Primer - Understanding Overall Equipment Effectiveness, Reliability, and Maintainability (Hardcover)
D. H Stamatis
R5,657 Discovery Miles 56 570 Ships in 12 - 17 working days

A valuable tool for establishing and maintaining system reliability, overall equipment effectiveness (OEE) has proven to be very effective in reducing unscheduled downtime for companies around the world. So much so that OEE is quickly becoming a requirement for improving quality and substantiating capacity in leading organizations, as well as a required area of study for the ISO/TS 16949. Breaking down the methodology from a historical perspective, The OEE Primer: Understanding Overall Equipment Effectiveness, Reliability, and Maintainability explores the overall effectiveness of machines and unveils novel methods that focus on design improvement-including hazard analysis, rate of change of failure (ROCOF) analysis, failure rate finite element analysis (FEA), and theory of inventive problem solving (TRIZ). It covers loss of effectiveness, new machinery, electrical maintenance issues, Weibull distribution, measurement techniques, and mechanical and electrical reliability. The book also: Discusses Reliability and Maintainability (R&M), not as tools to be used in specific tasks, rather as a discipline Covers the application of OEE as an overall improvement tool Assesses existing and new equipment from classical, reliability, and maintainability perspectives Includes downloadable resources with more than 100 pages of appendices and additional resources featuring statistical tables, outlines, case studies, guidelines, and standards Introducing the classical approach to improvement, this book provides an understanding of exactly what OEE is and how it can be best applied to address capacity issues. Highlighting mechanical and electrical opportunities throughout, the text includes many tables, forms, and examples that clearly illustrate and enhance the material presented.

Information Management Technology - A librarian's guide (Paperback, Softcover reprint of the original 1st ed. 1991): Paul... Information Management Technology - A librarian's guide (Paperback, Softcover reprint of the original 1st ed. 1991)
Paul F. Burton, J. Howard Petrie
R1,502 Discovery Miles 15 020 Ships in 10 - 15 working days

Once again the wide-ranging and rapid developments in microcomputer technology of the last few years have meant that a detailed revision of The librarian's guide to microcomputers for information management was required, if it was to fulfil its objectives of providing a single source of information on the process of automating with a microcomputer. For this new edition, we have taken into account not only the developments in hardware, but also the growing sophistication and power of software, and the growing sophistication of library and information service managers. The latter are more and more familiar with the use, or at least the principles, of microcomputers, and it no longer seems necessary to spell out certain details. We have, where relevant, indicated sources of more detailed information, particularly of practical applications, and so we hope that the changes we have made will ensure that this book remains of value to practitioner and student alike. ACKNOWLEDGEMENTS We remain, as always, grateful to those who have written or spoken about their experiences with microcomputers and have described applications. We would also like to thank the referees who commented of the book, and provided useful suggestions and on a first draft amendments. Mandy and Lindesay once again patiently accepted our absence during the writing of this edition.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The History of the Reformation of the…
Gilbert Burnet Paperback R726 Discovery Miles 7 260
Polsslag
Marie Lotz Paperback  (1)
R370 R347 Discovery Miles 3 470
The Dance Tree
Kiran Millwood Hargrave Paperback R385 R349 Discovery Miles 3 490
AFH Kundai Monozone A Dress (Black)
R550 R450 Discovery Miles 4 500
Musical Instruments of the Bible
Jeremy Montagu Hardcover R1,729 Discovery Miles 17 290
AFH Double Flare Dress
R1,450 Discovery Miles 14 500
The Edge
David Baldacci Paperback R410 R389 Discovery Miles 3 890
Before We Were Yours
Lisa Wingate Paperback  (1)
R305 R272 Discovery Miles 2 720
Vloek
Rudie van Rensburg Paperback R454 Discovery Miles 4 540
Duty Calls at Goodwill House - The BRAND…
Fenella J Miller Hardcover R652 Discovery Miles 6 520

 

Partners