![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders. Securing an IT Organization through Governance, Risk Management, and Audit introduces two internationally recognized bodies of knowledge: Control Objectives for Information and Related Technology (COBIT 5) from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF). Emphasizing the processes directly related to governance, risk management, and audit, the book provides details of a cybersecurity framework (CSF), mapping each of the CSF steps and activities to the methods defined in COBIT 5. This method leverages operational risk understanding in a business context, allowing the information and communications technology (ICT) organization to convert high-level enterprise goals into manageable, specific goals rather than unintegrated checklist models. The real value of this methodology is to reduce the knowledge fog that frequently engulfs senior business management, and results in the false conclusion that overseeing security controls for information systems is not a leadership role or responsibility but a technical management task. By carefully reading, implementing, and practicing the techniques and methodologies outlined in this book, you can successfully implement a plan that increases security and lowers risk for you and your organization.
This book is the proceedings of the Workshop on the Performance Engineering of Computer and Telecommunications Systems. The workshop Was held at Liverpool John Moores University, England on the 5th and 6th September 1995. The workshop follows a series organised by the British Computer Society (BCS) Special Interest Group on Performance Engineering. The workshop addressed most techniques and experieI1ces in the Engineering of Computer and Telecommunications Systems that provide a guaranteed quality of service. Techniques such as measurements, simulation, and analytical models and their applications to ATM networks, Multimedia Systems, Distributed Systems, Access and Wide Area Networks were presented. In addition a number of papers dealt with advances in the development of analytical models, simulation architectures and the application of formal methods, stich as Process Algebra, to the specification and building of performance biased computer systems. The book is suitable for systems designers, engineers, researchers and postgraduate students interested in the design and implementation of Computer Systems, Networks and Telecommunications. Many people assisted in the arrangements and success of this workshop. I would like to thank them all and in particular the reviewers. I would also like to particularly thank our industrial sponsors GPT Public Networks Group, Liverpool and BICC Cables, Chester, England for their generous financial and material support.
Advanced Antenna Systems for 5G Network Deployments: Bridging the Gap between Theory and Practice provides a comprehensive understanding of the field of advanced antenna systems (AAS) and how they can be deployed in 5G networks. The book gives a thorough understanding of the basic technology components, the state-of-the-art multi-antenna solutions, what support 3GPP has standardized together with the reasoning, AAS performance in real networks, and how AAS can be used to enhance network deployments.
Debugging has always been a costly part of software development, and many attempts have been made to provide automatic computer support for this task.Automated debugging has seen major develoments over the last decade. Onesuccessful development is algorithmic debugging, which originated in logic programming but was later generalized to concurrent, imperative, and lazy functional languages. Important advances have also been made in knowledge-based program debugging, and in approaches to automated debugging based on static and dynamic program slicing based on dataflow and dependence analysis technology. This is the first collected volume of papers on automated debugging and presents latest developments, tutorial papers, and surveys.
This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan is required for compliance with government regulations, industry standards such as PCI DSS, and certifications such as ISO 27001. This book will help organizations meet those compliance requirements.
Originally created for agile software development, scrum provides project managers with the flexibility needed to meet ever-changing consumer demands. Presenting a modified version of the agile software development framework, Scrum Project Management introduces Scrum basics and explains how to apply this adaptive technique to effectively manage a wide range of programs and complex projects. The book provides proven planning methods for controlling project scope and ensuring your project stays on schedule. It includes scrum tracking methods to help your team maintain a focus on improving throughput and streamlining communications. It also demonstrates how to: Combine traditional project management methods with scrum Adapt the familiar work breakdown structure to create scrum backlogs and sprints Use a scrum of scrums to manage programs Apply earned value management, critical path, and PERT in the context of scrum Having successfully deployed and implemented scrum across multiple companies and departments, the authors provide valuable insight into how they achieved their past successes and how they overcame the trials involved with the deployment of a scrum environment. Throughout the text they discuss improvisation, creative problem solving, and emergent phenomena-detailing the methods needed to ensure your team achieves project success.
Project Management: Theory and Practice, Third Edition gives students a broad and real flavor of project management. Bringing project management to life, it avoids being too sterilely academic and too narrowly focused on a particular industry view. It takes a model-based approach towards project management commonly used in all industries. The textbook aligns with the latest version of the Project Management Institute's Project Management Body of Knowledge (PMBOK (R)) Guide, which is considered to be the de facto standard for project management. However, it avoids that standard's verbiage and presents students with readable and understandable explanations. Core chapters align with the Project Management Institute's model as well as explain how this model fits real-world projects. The textbook can be used as companion to the standard technical model and help those studying for various project management certifications. The textbook takes an in-depth look at the following areas important to the standard model: Work Breakdown Structures (WBS) Earned Value Management (EVM) Enterprise project management Portfolio management (PPM) Professional responsibility and ethics Agile life cycle The text begins with a background section (Chapters 1-9) containing material outside of the standard model structure but necessary to prepare students for the 10 standard model knowledge areas covered in the chapters that follow. The text is rounded out by eight concluding chapters that explain advanced planning approaches models and projects' external environments. Recognizing that project management is an evolving field, the textbook includes section written by industry experts who share their insight and expertise on cutting-edge topics. It prepares students for upcoming trends and changes in project management while providing an overview of the project management environment today. In addition to guiding students through current models and standards, Project Management: Theory and Practice, Third Edition prepares students for the future by stimulating their thinking beyond the accepted pragmatic view.
Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies among component pieces of strategic intelligence, and demonstrates how executives can best use this internal and external information toward making better decisions. Divided into two major parts, the book first discusses the convergence of knowledge management (KM), business intelligence (BI), and competitive intelligence (CI) into what the author defines as strategic intelligence. The second part of the volume describes case studies written by recognized experts in the fields of KM, BI, and CI. The case studies include strategic scenarios at Motorola, AARP, Northrop Grumman, and other market leaders. About the Editor Jay Liebowitz, D.Sc., is a full professor in the Graduate Division of Business and Management and program director for the Graduate Certificate in Competitive Intelligence at Johns Hopkins University. The first knowledge management officer at NASA Goddard Space Flight Center, he also served as the Robert W. Deutsch Distinguished Professor of Information Systems at the University of Maryland-Baltimore County, professor of Management Science at George Washington University, and Chaired Professor of Artificial Intelligence (AI) at the U.S. Army War College. A founder and chairperson of The World Congress on Expert Systems, he is a Fulbright Scholar, IEEE-USA Federal Communications Commission Executive Fellow, and Computer Educator of the Year (International Association for Computer Information Systems).
A valuable tool for establishing and maintaining system reliability, overall equipment effectiveness (OEE) has proven to be very effective in reducing unscheduled downtime for companies around the world. So much so that OEE is quickly becoming a requirement for improving quality and substantiating capacity in leading organizations, as well as a required area of study for the ISO/TS 16949. Breaking down the methodology from a historical perspective, The OEE Primer: Understanding Overall Equipment Effectiveness, Reliability, and Maintainability explores the overall effectiveness of machines and unveils novel methods that focus on design improvement-including hazard analysis, rate of change of failure (ROCOF) analysis, failure rate finite element analysis (FEA), and theory of inventive problem solving (TRIZ). It covers loss of effectiveness, new machinery, electrical maintenance issues, Weibull distribution, measurement techniques, and mechanical and electrical reliability. The book also: Discusses Reliability and Maintainability (R&M), not as tools to be used in specific tasks, rather as a discipline Covers the application of OEE as an overall improvement tool Assesses existing and new equipment from classical, reliability, and maintainability perspectives Includes downloadable resources with more than 100 pages of appendices and additional resources featuring statistical tables, outlines, case studies, guidelines, and standards Introducing the classical approach to improvement, this book provides an understanding of exactly what OEE is and how it can be best applied to address capacity issues. Highlighting mechanical and electrical opportunities throughout, the text includes many tables, forms, and examples that clearly illustrate and enhance the material presented.
This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of recent research in design issues affecting the development of strategic multipath routing protocols that support multimedia data traffic in WMSN from an IoT perspective, plus detailed analysis on the appropriate traffic models.
Once again the wide-ranging and rapid developments in microcomputer technology of the last few years have meant that a detailed revision of The librarian's guide to microcomputers for information management was required, if it was to fulfil its objectives of providing a single source of information on the process of automating with a microcomputer. For this new edition, we have taken into account not only the developments in hardware, but also the growing sophistication and power of software, and the growing sophistication of library and information service managers. The latter are more and more familiar with the use, or at least the principles, of microcomputers, and it no longer seems necessary to spell out certain details. We have, where relevant, indicated sources of more detailed information, particularly of practical applications, and so we hope that the changes we have made will ensure that this book remains of value to practitioner and student alike. ACKNOWLEDGEMENTS We remain, as always, grateful to those who have written or spoken about their experiences with microcomputers and have described applications. We would also like to thank the referees who commented of the book, and provided useful suggestions and on a first draft amendments. Mandy and Lindesay once again patiently accepted our absence during the writing of this edition.
With cloud computing quickly becoming a standard in today's IT environments, many security experts are raising concerns regarding security and privacy in outsourced cloud environments-requiring a change in how we evaluate risk and protect information, processes, and people. Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud explains how to address the security risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book will be especially helpful to managers challenged with an outsourcing situation-whether preparing for it, living it day to day, or being tasked to safely bring back information systems to the organization. Many factors can play into the success or failure of an outsourcing initiative. This book not only provides the technical background required, but also the practical information about outsourcing and its mechanics. By describing and analyzing outsourcing industry processes and technologies, along with their security and privacy impacts, this book provides the fundamental understanding and guidance you need to keep your information, processes, and people secure when IT services are outsourced.
This volume contains the proceedings of the conference on Fundamentals of Computation Theory held in Szeged, Hungary, August 21-25, 1989. The conference is the seventh in the series of the FCT conferences initiated in 1977 in Poznan-Kornik, Poland. The papers collected in this volume are the texts of invited contributions and shorter communications falling into one of the following sections: - Efficient Computation by Abstract Devices: Automata, Computability, Probabilistic Computations, Parallel and Distributed Computing; - Logics and Meanings of Programs: Algebraic and Categorical Approaches to Semantics, Computational Logic, Logic Programming, Verification, Program Transformations, Functional Programming; - Formal Languages: Rewriting Systems, Algebraic Language Theory; - Computational Complexity: Analysis and Complexity of Algorithms, Design of Efficient Algorithms, Algorithms and Data Structures, Computational Geometry, Complexity Classes and Hierarchies, Lower Bounds.
s. LNCIS 129
The volume contains selected contributions from the scientific programme of the 5th International Meeting of Young Computer Scientists (IMYCS '88) held at Smolenice Castle (Czechoslovakia), November 14-18, 1988. It is divided into five chapters which approach the three crucial notions of contemporary theoretical computer science - machines, languages, and complexity - from different perspectives. The first chapter contains contributions dealing with problems of decidability, hierarchy, and complexity. Papers concerning different types and problems of automata theory form the second chapter. The contributions in the third chapter cover the large field of algorithmics from the study of program complexity to the domain of computational geometry. The two contributions of the fourth chapter are devoted to logic programming and inductive inference. The final chapter deals with problems of cryptography and contains the text of the IMYCS '88 tutorial on cryptography and data security delivered by A. Salomaa. The book will be a useful source for orientation in contemporary theoretical computer science and related fields such as software engineering and artificial intelligence for researchers and graduate students.
"Vivek Kale has written a great book on performance management that focuses on decision-making; on continuous, incremental improvement; and on identifying common patterns in becoming a more intelligent organization." -James Taylor, CEO of Decision Management Solutions and author of Real-World Decision Modeling with DMN "Introducing the concepts of decision patterns and performance intelligence, Vivek Kale has written another important book on the issues faced by contemporary organizations."-Gary Cokins, author of Predictive Business Analytics and Performance Management: Integrating Strategy Execution, Methodologies, Risk, and Analytics Enterprise Performance Intelligence and Decision Patterns unravels the mystery of enterprise performance intelligence (EPI) and explains how it can transform the operating context of business enterprises. It provides a clear understanding of what EPI means, what it can do, and application areas where it is practical to use. The need to be responsive to evolving customer needs and desires creates organizational structures where business intelligence (BI) and decision making is pushed out to operating units that are closest to the scene of the action. Closed-loop decision making resulting from a combination of on-going performance management with on-going BI can lead to an effective responsive enterprise; hence, the need for performance intelligence (PI). This pragmatic book: Introduces the technologies such as data warehousing, data mining, analytics, and business intelligence systems that are a first step toward enabling data-driven enterprises. Details decision patterns and performance decision patterns that pave the road for performance intelligence applications. Introduces the concepts, principles, and technologies related to performance measurement systems. Describes the concepts and principles related to balance scorecard systems (BCS). Introduces aspects of performance intelligence for the real-time enterprises. Enterprise Performance Intelligence and Decision Patterns shows how a company can design and implement instruments ranging from decision patterns to PI systems that can enable continuous correction of business unit behavior so companies can enhance levels of productivity and profitability.
This book discusses business architecture as a basis for aligning efforts with outcomes. It views BA as complementary to enterprise architecture, where the focus of technological initiatives and inventories is to understand and improve business organization, business direction, and business decision-making. This book provides a practical, long-term view on BA. Based on the authors' consulting experience and industrial research, the material in this book is a valuable addition to the thought processes around BA and EA. The lead author has direct and practical experience with large clients in applying APQC capability framework for undertaking multiple enterprise-wide capability assessments.
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations.
Recent changes in healthcare delivery as mandated by the Patient Protection and Affordable Care Act are forcing providers to focus on technology as a way to improve the health of the population, while engaging patients and encouraging them to take accountability for maintaining their own health. One way of doing this is through the use of mobile health (mhealth) technologies that allow physicians to monitor patients in real time and access important medical records from anywhere. Connecting millions of patients with caregivers like never before, mhealth technology is changing healthcare delivery for good. Emerging Technologies in Healthcare provides detailed descriptions of the latest mhealth technologies. It outlines the role of mhealth for self-care and remote care and describes the differences between telemedicine, telehealth, and telecare. The book justifies the use of mhealth technology for meeting regulatory standards of care and explains how analytics and social media are being used to improve the delivery of healthcare. It addresses healthcare reform and risk management in healthcare and concludes by discussing future directions for healthcare technologies. The book is written by a leader in the application of analytics in the healthcare industry. Her extensive background in nursing and hospital administration provides her with the opportunity to share unique insights on how to apply technology and innovation to improve the management of today's healthcare systems.
From the Foreword: "This book lays out much of what we've learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn't to predict the future but to help you design and build a network that will be ready for whatever that future holds. Because if there's one thing the last decade has taught us, it's that network demand will always exceed expectations. This book will help you get ready." -Randall Stephenson, Chairman, CEO, and President of AT&T "Software is changing the world, and networks too. In this in-depth book, AT&T's top networking experts discuss how they're moving software-defined networking from concept to practice, and why it's a business imperative to do this rapidly." -Urs Hoelzle, SVP Cloud Infrastructure, Google "Telecom operators face a continuous challenge for more agility to serve their customers with a better customer experience and a lower cost. This book is a very inspiring and vivid testimony of the huge transformation this means, not only for the networks but for the entire companies, and how AT&T is leading it. It provides a lot of very deep insights about the technical challenges telecom engineers are facing today. Beyond AT&T, I'm sure this book will be extremely helpful to the whole industry." -Alain Maloberti, Group Chief Network Officer, Orange Labs Networks "This new book should be read by any organization faced with a future driven by a "shift to software." It is a holistic view of how AT&T has transformed its core infrastructure from hardware based to largely software based to lower costs and speed innovation. To do so, AT&T had to redefine their technology supply chain, retrain their workforce, and move toward open source user-driven innovation; all while managing one of the biggest networks in the world. It is an amazing feat that will put AT&T in a leading position for years to come." -Jim Zemlin, Executive Director, The Linux Foundation This book is based on the lessons learned from AT&T's software transformation journey starting in 2012 when rampant traffic growth necessitated a change in network architecture and design. Using new technologies such as NFV, SDN, Cloud, and Big Data, AT&T's engineers outlined and implemented a radical network transformation program that dramatically reduced capital and operating expenditures. This book describes the transformation in substantial detail. The subject matter is of great interest to telecom professionals worldwide, as well as academic researchers looking to apply the latest techniques in computer science to solving telecom's big problems around scalability, resilience, and survivability.
With this book, managers and decision makers are given the tools to make more informed decisions about big data purchasing initiatives. Big Data Analytics: A Practical Guide for Managers not only supplies descriptions of common tools, but also surveys the various products and vendors that supply the big data market. Comparing and contrasting the different types of analysis commonly conducted with big data, this accessible reference presents clear-cut explanations of the general workings of big data tools. Instead of spending time on HOW to install specific packages, it focuses on the reasons WHY readers would install a given package. The book provides authoritative guidance on a range of tools, including open source and proprietary systems. It details the strengths and weaknesses of incorporating big data analysis into decision-making and explains how to leverage the strengths while mitigating the weaknesses. Describes the benefits of distributed computing in simple terms Includes substantial vendor/tool material, especially for open source decisions Covers prominent software packages, including Hadoop and Oracle Endeca Examines GIS and machine learning applications Considers privacy and surveillance issues The book further explores basic statistical concepts that, when misapplied, can be the source of errors. Time and again, big data is treated as an oracle that discovers results nobody would have imagined. While big data can serve this valuable function, all too often these results are incorrect, yet are still reported unquestioningly. The probability of having erroneous results increases as a larger number of variables are compared unless preventative measures are taken. The approach taken by the authors is to explain these concepts so managers can ask better questions of their analysts and vendors as to the appropriateness of the methods used to arrive at a conclusion. Because the world of science and medicine has been grappling with similar issues in the publication of studies, the authors draw on their efforts and apply them to big data.
This comprehensive reference uses a formal and standard evaluation technique to show the strengths and weakness of more than 60 software development methodologies such as agile, DevOps, RUP, Waterfall, TSP, XP and many more. Each methodology is applied to an application of 1000 function points using the Java language. Each methodology produces a characteristic set of results for development schedules, productivity, costs, and quality. The intent of the book is to show readers the optimum kinds of methodologies for the projects they are concerned with and to warn them about counter indications and possible harm from unsuitable methodologies.
eWork and eBusiness in Architecture, Engineering and Construction 2016 collects the papers presented at the 11th European Conference on Product & Process Modelling (ECPPM 2016, Cyprus, 7-9 September 2016), The contributions cover complementary thematic areas that hold great promise for the advancement of research and technological development in the modelling of complex engineering systems, encompassing a substantial number of high quality contributions on a large spectrum of topics pertaining to ICT deployment instances in AEC/FM, including: * Information and Knowledge Management * Construction Management * Description Logics and Ontology Application in AEC * Risk Management * 5D/nD Modelling, Simulation and Augmented Reality * Infrastructure Condition Assessment * Standardization of Data Structures * Regulatory and Legal Aspects * Multi-Model and distributed Data Management * System Identification * Industrialized Production, Smart Products and Services * Interoperability * Smart Cities * Sustainable Buildings and Urban Environments * Collaboration and Teamwork * BIM Implementation and Deployment * Building Performance Simulation * Intelligent Catalogues and Services
This book's author, Byron Love, admits proudly to being an IT geek. However, he had found that being an IT geek was limiting his career path and his effectiveness. During a career of more than 31 years, he has made the transition from geek to geek leader. He hopes this book helps other geeks do the same. This book addresses leadership issues in the IT industry to help IT practitioners lead from the lowest level. Unlike other leadership books that provide a one-size-fits-all approach to leadership, this book focuses on the unique challenges that IT practitioners face. IT project managers may manage processes and technologies, but people must be led. The IT industry attracts people who think in logical ways-analytical types who have a propensity to place more emphasis on tasks and technology than on people. This has led to leadership challenges such as poor communication, poor relationship management, and poor stakeholder engagement. Critical IT projects and programs have failed because IT leaders neglect the people component of "people, process, and technology." Communications skills are key to leadership. This book features an in-depth discussion of the communications cycle and emotional intelligence, providing geek leaders with tools to improve their understanding of others and to help others understand them. To transform a geek into a geek leader, this book also discusses: Self-leadership skills so geek leaders know how to lead others by leading themselves first Followership and how to cultivate it among team members How a geek leader's ability to navigate disparate social styles leads to greater credibility and influence Integrating leadership into project management processes The book concludes with a case study to show how to put leadership principles and practices into action and how an IT geek can transform into an effective IT geek leader.
Software testing is at a very important crossroad, where it is going back to the roots on certain fronts while moving inexorably forward. For instance, test automation is growing in prominence, but manual testing is becoming a niche; we are increasingly collaborating with the developers, breaking the bounds of unrealistic independence in testing, and bringing in true conscious quality. At such an important stage, it is important to take stock of the past, present, and future to define both the direction the discipline will take as well as the careers it will entail for testers. This book looks at a range of topics covering where we are in the product development landscape today, what are the varied disciplines at play, what are the influencing factors bringing in a change in software testing, why is such change important, what did the past look like, what is current decade turning out to be like, and where are we heading. As for future, it looks at it both from near-term and long-term perspectives. It also considers whether the testing fraternity is ready to take on such changes and are empowered enough to do so, or are there gaps that need to be filled. The book closes with perspectives from industry experts on what is in store for the software testing discipline and community in the coming years. After reading the book, you will be confident that you can take on what is in store for testers in the coming years. You will also be positioned to help the industry move to the next level, and influence change not just amongst testers but also in the product engineering industry level as a whole. |
You may like...
Intelligent Systems for Information…
B. Bouchon-Meunier, L. Foulloy, …
Hardcover
R3,257
Discovery Miles 32 570
A Study of Black Hole Attack Solutions…
Elahe Fazeldehkordi, I.S. Dr. Amiri, …
Paperback
R1,277
Discovery Miles 12 770
Technology Integration and Foundations…
Shuyan Wang, Taralynn Hartsell
Hardcover
R4,500
Discovery Miles 45 000
Meeting People via WiFi and Bluetooth
Joshua Schroeder, Henry Dalziel
Paperback
R777
Discovery Miles 7 770
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, …
Paperback
R2,763
Discovery Miles 27 630
|