0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (868)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

DevOps with OpenShift - Cloud Deployments Made Easy (Paperback): Stefano Picozzi, Mike Hepburn, Noel E O'Connor DevOps with OpenShift - Cloud Deployments Made Easy (Paperback)
Stefano Picozzi, Mike Hepburn, Noel E O'Connor
R1,027 R694 Discovery Miles 6 940 Save R333 (32%) Ships in 12 - 17 working days

For many organizations, a big part of DevOps' appeal is software automation using infrastructure-as-code techniques. This book presents developers, architects, and infra-ops engineers with a more practical option. You'll learn how a container-centric approach from OpenShift, Red Hat's cloud-based PaaS, can help your team deliver quality software through a self-service view of IT infrastructure. Three OpenShift experts at Red Hat explain how to configure Docker application containers and the Kubernetes cluster manager with OpenShift's developer- and operational-centric tools. Discover how this infrastructure-agnostic container management platform can help companies navigate the murky area where infrastructure-as-code ends and application automation begins. Get an application-centric view of automation-and understand why it's important Learn patterns and practical examples for managing continuous deployments such as rolling, A/B, blue-green, and canary Implement continuous integration pipelines with OpenShift's Jenkins capability Explore mechanisms for separating and managing configuration from static runtime software Learn how to use and customize OpenShift's source-to-image capability Delve into management and operational considerations when working with OpenShift-based application workloads Install a self-contained local version of the OpenShift environment on your computer

Technology in Context - Technology Assessment for Managers (Hardcover): Ernest Braun Technology in Context - Technology Assessment for Managers (Hardcover)
Ernest Braun
R5,436 Discovery Miles 54 360 Ships in 12 - 17 working days

Most managers know very little about the technology they introduce into their firms, often preferring to leave such decisions to a small band of technological 'experts'. As a result large amounts of time and money are often wasted on inappropriate and inefficient systems. The cost of retraining and reorganising can also be prohibitive if the new technology does not deliver the desired results. In a business environment where technology is of increasing importance, the non-technical manager cannot afford to remain in the dark. Technology in Context provides a toolkit of approaches to this difficult subject. Subjects covered include: * the fundamental concepts required for the management of technology * the gathering of information in a firm to support strategic decisions on technology * technology assessment in the public domain * the wider social implications of technology * problems associated with technology, from the danger of environmental degradation to employment and skills.

The Routledge Companion to Management Information Systems (Hardcover): Robert Galliers, Mari-Klara Stein The Routledge Companion to Management Information Systems (Hardcover)
Robert Galliers, Mari-Klara Stein
R6,500 Discovery Miles 65 000 Ships in 12 - 17 working days

The field of Information Systems has been evolving since the first application of computers in organizations in the early 1950s. Focusing on information systems analysis and design up to and including the 1980s, the field has expanded enormously, with our assumptions about information and knowledge being challenged, along with both intended and unintended consequences of information technology. This prestige reference work offers students and researchers a critical reflection on major topics and current scholarship in the evolving field of Information Systems. This single-volume survey of the field is organized into four parts. The first section deals with Disciplinary and Methodological Foundations. The second section deals with Development, Adoption and Use of MIS - topics that formed the centrepiece of the field of IS in the last century. The third section deals with Managing Organizational IS, Knowledge and Innovation, while the final section considers emerging and continuing issues and controversies in the field - IS in Society and a Global Context. Each chapter provides a balanced overview of current knowledge, identifying issues and discussing relevant debates. This prestigious book is required reading for any student or researcher in Management Information Systems, academics and students covering the breadth of the field, and established researchers seeking a single-volume repository on the current state of knowledge, current debates and relevant literature.

Evolving Innovation Ecosystems - A Guide to Open Idea Transformation in the Age of Future Tech (Hardcover): Carol L. Stimmel Evolving Innovation Ecosystems - A Guide to Open Idea Transformation in the Age of Future Tech (Hardcover)
Carol L. Stimmel
R2,378 Discovery Miles 23 780 Ships in 12 - 17 working days

While emerging technologies create massive opportunity, especially for investors and companies that seek more adaptable forms of economic growth than currently available, value is held inert by traditional approaches, patents, and other closed systems. Yet, open data, content, and information may be the key to mass innovation for future technologies, although they bring difficult challenges to private-industry models that depend on the established ideas of intellectual property. It is from this foundational observation that OpenXFORM (a blending of the words Open and the engineering abbreviation for Transformation) was developed and is explored and described in this book. The intent of the model design is to synthesize an approach to the process of innovation, inspired by natural systems and human-centric design processes. OpenXFORM describes how an open system of innovation can adapt to the unregulated world of information, data, and content; can decompose its own information to release to the open world; and can discover ways to find the points of synergy among the studied and tested methodologies that put human relationships first. This book presents an explicit innovation process that shows how to move from a breakthrough idea through a process that encourages innovative thinkers to test their assumptions, validate hypotheses, and tune and tweak their ideas, not only to drive solutions for users but also to meet the strategic goals of their companies. The anatomy of innovation through OpenXFORM contains the process for moving ideas from a flight of fancy to an explicit concept that is ready to produce.

Managing Multiple Projects - Planning, Scheduling, and Allocating Resources for Competitive Advantage (Paperback): Lowell Dye Managing Multiple Projects - Planning, Scheduling, and Allocating Resources for Competitive Advantage (Paperback)
Lowell Dye
R1,915 Discovery Miles 19 150 Ships in 12 - 17 working days

"Details time-efficient and cost-effective strategies to evaluate, select, prioritize, plan, and manage multiple projects. Presents proven methods and practical applications for the development of successful project portfolios and prosperous multiproject environments. Provides useful models and scheduling frameworks for increasecd quality and productivity."

Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover): Maryann Simmons Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover)
Maryann Simmons
R3,732 Discovery Miles 37 320 Ships in 12 - 17 working days

In this book, new developments in network coding and data compression are examined. The first chapter proposes a new multipath transmission scheme that employs network coding at the source for rate-delay adaptation. The second chapter presents the theory, applications and challenges of a physical-layer network coding technique that promises significant improvement to the spectral efficiency and interference mitigation challenges in future heterogenous cellular and wireless networks. In this third chapter, network and distributed turbo coding based HARQ protocol are examined for wireless broadcasting systems. The last three chapters included in this book present three models that are based on Data Envelopment Analysis (DEA) methodology to appropriately evaluate the efficiency of multicast energy and further minimizes energy transmission in wireless networks without affecting the overall network performance; the development of methods of experimental statistical modeling of physical laws and the cascade scheme of data compression in multimode fibre systems.

Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover): John McCumber Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover)
John McCumber
R2,225 Discovery Miles 22 250 Ships in 12 - 17 working days

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

Simple Statistical Methods for Software Engineering - Data and Patterns (Hardcover): C. Ravindranath Pandian, Murali  Kumar Simple Statistical Methods for Software Engineering - Data and Patterns (Hardcover)
C. Ravindranath Pandian, Murali Kumar
R3,749 Discovery Miles 37 490 Ships in 12 - 17 working days

Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler solutions that are just as effective and connect with the intuition of problem solvers. Sharing valuable insights into software engineering problems and solutions, the book not only explains the required statistical methods, but also provides many examples, review questions, and case studies that provide the understanding required to apply those methods to real-world problems. After reading this book, practitioners will possess the confidence and understanding to solve day-to-day problems in quality, measurement, performance, and benchmarking. By following the examples and case studies, students will be better prepared able to achieve seamless transition from academic study to industry practices. Includes boxed stories, case studies, and illustrations that demonstrate the nuances behind proper application Supplies historical anecdotes and traces statistical methods to inventors and gurus Applies basic statistical laws in their simplest forms to resolve engineering problems Provides simple techniques for addressing the issues software engineers face The book starts off by reviewing the essential facts about data. Next, it supplies a detailed review and summary of metrics, including development, maintenance, test, and agile metrics. The third section covers the fundamental laws of probability and statistics and the final section presents special data patterns in the form of tailed mathematical distributions. In addition to selecting simpler and more flexible tools, the authors have also simplified several standard techniques to provide you with the set of intellectual tools al

C2 Re-envisioned - The Future of the Enterprise (Hardcover): Marius S. Vassiliou, David S Alberts, Jonathan Russell Agre C2 Re-envisioned - The Future of the Enterprise (Hardcover)
Marius S. Vassiliou, David S Alberts, Jonathan Russell Agre
R2,027 Discovery Miles 20 270 Ships in 12 - 17 working days

Command and Control (C2) is the set of organizational and technical attributes and processes by which an enterprise marshals and employs human, physical, and information resources to solve problems and accomplish missions.C2 Re-envisioned: The Future of the Enterprise identifies four interrelated megatrends that are individually and collectively shaping the state of the art and practice of C2 as well as the mission challenges we face. These megatrends the book examines are: Big Problems -manifested in part as increasing complexity of both endeavors and enterprises, as military establishments form coalitions with each other, and partnerships with various civilian agencies and non-governmental organizations Robustly Networked Environments-enabled by the extremely broad availability of advanced information and communications technologies (ICT) that place unprecedented powers of information creation, processing, and distribution in the hands of almost anyone who wants them-friend and foe alike Ubiquitous Data-the unprecedented volumes of raw and processed information with which human actors and C2 systems must contend Organizational alternatives-as decentralized, net-enabled approaches to C2 have been made more feasible by technology. The book analyzes historical examples and experimental evidence to determine the critical factors that make C2 go wrong and how to get it right. Successful enterprises in the future will be those that can reconfigure their approaches in an agile manner. Offering fresh perspectives on this subject of critical importance, this book provides the understanding you will need to choose your organizational approaches to suit the mission and the conditions at hand.

Securing Systems - Applied Security Architecture and Threat Models (Hardcover): Brook S. E. Schoenfield Securing Systems - Applied Security Architecture and Threat Models (Hardcover)
Brook S. E. Schoenfield
R3,756 Discovery Miles 37 560 Ships in 12 - 17 working days

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

Principles of Network and System Administration 2e (Paperback, 2nd Edition): M Burgess Principles of Network and System Administration 2e (Paperback, 2nd Edition)
M Burgess
R1,814 Discovery Miles 18 140 Ships in 9 - 15 working days

This is a single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day to day administration, maintenance, and support of computer systems and networks. The author approaches both network and system administration from the perspective of the principles that do not change on a day to day basis. He shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements. The new coverage includes Java services and Ipv6.

Outsourcing - A CIO's Perspective (Paperback): Oakie D. Williams Outsourcing - A CIO's Perspective (Paperback)
Oakie D. Williams
R1,841 Discovery Miles 18 410 Ships in 12 - 17 working days

As global competition grows more fierce, companies continue to look for ways to increase their competitive edge without jeopardizing profit margins. Today's corporations are starting to realize the competitive advantage that Information Technology (IT) can bring to a company. These corporations are also realizing that staying current with technology requires a great deal of effort, risk, and expense. This is one of the primary reasons CEO's are considering outsourcing as an alternative. Written by a CIO who has successfully maneuvered through the outsourcing process, Outsourcing: A CIO's Perspective addresses the realistic expectations and the most commonly asked questions about IT outsourcing, while reviewing it's advantages and disadvantages. This text identifies key elements that can be used to assess the feasibility of securing a profitable and manageable outsourcing agreement. It provides a convincing case that even if the final decision is to not outsource, the result of the process will identify potential business improvement opportunities.

Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover): Douglas J Landoll Information Security Policies, Procedures, and Standards - A Practitioner's Reference (Hardcover)
Douglas J Landoll
R3,867 Discovery Miles 38 670 Ships in 12 - 17 working days

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

SDN and NFV Simplified - A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization... SDN and NFV Simplified - A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization (Paperback)
Jim Doherty
R834 Discovery Miles 8 340 Ships in 12 - 17 working days

A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization The simple, visual, at-a-glance guide to SDN and NFV: Core concepts, business drivers, key technologies, and more! SDN (Software Defined Networks) and NFV (Network Function Virtualization) are today's hottest areas of networking. Many executives, investors, sales professionals, and marketers need a solid working understanding of these technologies, but most books on the subject are written specifically for network engineers and other technical experts. SDN and NFV Simplified fills that gap, offering highly visual, "at-a-glance" explanations of SDN, NFV, and their underlying virtualizations. Built around an illustrated, story-telling approach, this answers the questions: Why does this technology matter? How does it work? Where is it used? What problems does it solve? Through easy, whiteboard-style infographics, you'll learn: how virtualization enables SDN and NFV; how datacenters are virtualized through clouds; how networks can also be virtualized; and how to maximize security, visibility, and Quality of Experience in tomorrow's fully-virtualized environments. Step by step, you'll discover why SDN and NFV technologies are completely redefining both enterprise and carrier networks, and driving the most dramatic technology migration since IP networking. That's not all: You'll learn all you need to help lead this transformation. Learn how virtualization establishes the foundation for SDN and NFV Review the benefits of VMs, the role of hypervisors, and the management of virtual resources Discover how cloud technologies enable datacenter virtualization Understand the roles of networking gear in virtualized datacenters See VMWare VMotion and VXLAN at work in the virtualized datacenter Understand multitenancy and the challenges of "communal living" Learn how core network functions and appliances can be virtualized Ensure performance and scalability in virtualized networks Compare modern approaches to network virtualization, including OpenFlow, VMWare Nicera, Cisco Inseieme, and OpenStack Walk through the business case for SDN, NFV, and the Cloud Discover how the Software Defined Network (SDN) solves problems previously left unaddressed Understand SDN controllers-and who's fighting to control your network Use SDN and NFV to improve integration and say goodbye to "truck rolls" Enforce security, avoid data leakage, and protect assets through encryption Provide for effective monitoring and consistent Quality of Experience (QoE) Learn how SDN and NFV will affect you-and what's next

Quick Changeover for Operators - The SMED System (Paperback): Shigeo Shingo Quick Changeover for Operators - The SMED System (Paperback)
Shigeo Shingo
R1,056 Discovery Miles 10 560 Ships in 9 - 15 working days

The powerful knowledge contained in this book can make your workplace more productive, your job simpler, and everything more satisfying. It's about how to do equipment or product changeovers in record time--often in less than 10 minutes. The method you'll learn here is called SMED, short for "Single-Minute Exchange of Die" (the "single" here means a single-digit number of minutes).

Developed from a longer book, "A Revolution in Manufacturing: The SMED System" (cat no. PP9903), written for managers, this book is written for frontline production and assembly associates. It presents an overview of the reasons why SMED is important for companies and employees, sets out the three basic stages of SMED, and then devotes a separate chapter to each of these stages. The first chapter of the book is like an "owner's manual" that tells you how to get the most out of your reading time by using the margin assists, summaries, and other features of the book to help pull out exactly what you need.

One of the most effective ways to use this book is to read and discuss it with other employees. The authors planned the book so that it can be used this way, organizing the book into chunks of information that can be covered in a series of short sessions. Each chapter includes reflection questions to stimulate group discussion. A "Learning Package "is also available (catalog no.PP7126), which includes a leader's guide, overhead transparencies to summarize major points, and color slides showing examples of SMED applications in different kinds of companies.

Business Process Management (Paperback): Akhil Kumar Business Process Management (Paperback)
Akhil Kumar
R1,936 Discovery Miles 19 360 Ships in 12 - 17 working days

This book introduces students to business process management, an approach that aims to align the organization's business processes with the demands of the marketplace. Processes serve as a coordination mechanism, and the aim of business process management is to improve the organization's effectiveness and efficiency in adapting to change, and maintaining competitive advantage. In Business Process Management, Kumar argues for the value of looking at businesses as a collection of processes that cut across departments, and for breaking down functional silos. The book provides an overview of the basic concepts in this field before moving on to more advanced topics such as process verification, flexible processes, process security and evaluation, resource assignment, and social networks. One chapter of the book is also devoted to process analytics. The book concludes with an examination of the future directions of the discipline. Blending a strong grounding in current research with a focus on concepts and tools, Business Process Management is an accessible textbook full of practical examples and cases that will appeal to upper level students.

Cyberspace and Cybersecurity (Hardcover, 2nd edition): George Kostopoulos Cyberspace and Cybersecurity (Hardcover, 2nd edition)
George Kostopoulos
R2,402 Discovery Miles 24 020 Ships in 12 - 17 working days

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such as cyber risks in mobile telephony, steganography, cybersecurity as an added value, ransomware defense, review of recent cyber laws, new types of cybercrime, plus new chapters on digital currencies and encryption key management.

Computational Intelligence Applications in Business Intelligence and Big Data Analytics (Hardcover): Vijayan Sugumaran, Arun... Computational Intelligence Applications in Business Intelligence and Big Data Analytics (Hardcover)
Vijayan Sugumaran, Arun Kumar Sangaiah, Arunkumar Thangavelu
R3,171 Discovery Miles 31 710 Ships in 12 - 17 working days

There are a number of books on computational intelligence (CI), but they tend to cover a broad range of CI paradigms and algorithms rather than provide an in-depth exploration in learning and adaptive mechanisms. This book sets its focus on CI based architectures, modeling, case studies and applications in big data analytics, and business intelligence. The intended audiences of this book are scientists, professionals, researchers, and academicians who deal with the new challenges and advances in the specific areas mentioned above. Designers and developers of applications in these areas can learn from other experts and colleagues through this book.

Information Systems - What Every Business Student Needs to Know, Second Edition (Hardcover, 2nd edition): Efrem G. Mallach Information Systems - What Every Business Student Needs to Know, Second Edition (Hardcover, 2nd edition)
Efrem G. Mallach
R5,334 Discovery Miles 53 340 Ships in 12 - 17 working days

Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students on the job. Review questions, discussion questions, and summaries are also included. This second edition is updated to include new technology, along with a new running case study. Key features: Single-mindedly for business students who are not technical specialists Doesn't try to prepare IS professionals; other courses will do that Stresses the enabling technologies and application areas that matter the most today Based on the author's real-world experience Up to date regarding technology and tomorrow's business needs This is the book the author-and, more importantly, his students-wishes he had when he started teaching. Dr. Mallach holds degrees in engineering from Princeton and MIT, and in business from Boston University. He worked in the computer industry for two decades, as Director of Strategic Planning for a major computer firm and as co-founder/CEO of a computer marketing consulting firm. He taught information systems in the University of Massachusetts (Lowell and Dartmouth) business schools for 18 years, then at Rhode Island College following his retirement. He consults in industry and serves as Webmaster for his community, in between hiking and travel with his wife.

The Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover): Pethuru Raj, Anupama C. Raman The Internet of Things - Enabling Technologies, Platforms, and Use Cases (Hardcover)
Pethuru Raj, Anupama C. Raman
R3,890 Discovery Miles 38 900 Ships in 12 - 17 working days

As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and the technology that enables them, which includes: Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement Platforms A chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection, storage, translation, real-time processing, mining, and analysis, all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail, and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements, promising applications, and roles of cloud computing and data analytics. The book also examines smart homes, smart cities, and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter.

Culturally Tuning Change Management (Hardcover): Risto Gladden Culturally Tuning Change Management (Hardcover)
Risto Gladden
R2,207 Discovery Miles 22 070 Ships in 12 - 17 working days

Managing change across cultures can be tricky, and universal approaches to change management may not serve their purpose in every cultural setting. This book examines the cultural dimensions that can influence the perceptions of and reactions to change in different cultural contexts and highlights the benefits of developing and applying cultural mindfulness when planning and running cross-cultural change initiatives. It offers practical advice to project and change management teams and leaders for developing Cultural Intelligence, tailoring plans to consider any cultural variables that could be barriers to (or catalysts for) effective change, and applying facilitating strategies.

Practical Software Maintenance - Best Practices For Managing Your Software Investment (Paperback): TM Pigoski Practical Software Maintenance - Best Practices For Managing Your Software Investment (Paperback)
TM Pigoski
R2,133 R1,483 Discovery Miles 14 830 Save R650 (30%) Out of stock

The amount of time and expense spent debugging, customizing, updating, and maintaining software far outstrips the amount spent buying it. This book provides a simple and straightforward introduction to software maintenance activities that work. It is the first book to cover software transition--the process of moving the product from developer to maintainer. Written by one of the world's foremost experts on software maintenance, it draws on real world case studies to explore basic do's and don'ts, IEEE and ISO requirements, organizational issues, and the often sticky issue of metrics. Other topics addressed include object-oriented software and client/server software, corporate education and training programs, creative cost controls, and more.

Linux Universe - Installation and Configuration (Paperback, Softcover reprint of the original 3rd ed. 1997): Robert Bach Linux Universe - Installation and Configuration (Paperback, Softcover reprint of the original 3rd ed. 1997)
Robert Bach; Stefan Strobel, Rainer Maurer, Stefan Middendorf
R2,017 R1,069 Discovery Miles 10 690 Save R948 (47%) Ships in 12 - 17 working days

Hailed in previous editions for its user-friendliness, this third edition of Linux Universe contains the newest Linux Kernel 2.0.25 on two fully configured CD-ROMs for easy installation. The new edition contains several powerful new features, including Java SDK (binary), Xemacs, Netatalk (Appletalk connectivity), and IP firewall administration tools.
"The graphical configuration utility is simple to use and seems to work well. It works quickly and intelligently. When filling out the networking configuration, for example, it guesses most of the information once you type in the IP address." -LINUX JOURNAL

Project Management Theory and Practice, Third Edition (Hardcover, 3rd New edition): Gary L. Richardson, Brad M. Jackson Project Management Theory and Practice, Third Edition (Hardcover, 3rd New edition)
Gary L. Richardson, Brad M. Jackson
R2,607 Discovery Miles 26 070 Ships in 12 - 17 working days

Project Management: Theory and Practice, Third Edition gives students a broad and real flavor of project management. Bringing project management to life, it avoids being too sterilely academic and too narrowly focused on a particular industry view. It takes a model-based approach towards project management commonly used in all industries. The textbook aligns with the latest version of the Project Management Institute's Project Management Body of Knowledge (PMBOK (R)) Guide, which is considered to be the de facto standard for project management. However, it avoids that standard's verbiage and presents students with readable and understandable explanations. Core chapters align with the Project Management Institute's model as well as explain how this model fits real-world projects. The textbook can be used as companion to the standard technical model and help those studying for various project management certifications. The textbook takes an in-depth look at the following areas important to the standard model: Work Breakdown Structures (WBS) Earned Value Management (EVM) Enterprise project management Portfolio management (PPM) Professional responsibility and ethics Agile life cycle The text begins with a background section (Chapters 1-9) containing material outside of the standard model structure but necessary to prepare students for the 10 standard model knowledge areas covered in the chapters that follow. The text is rounded out by eight concluding chapters that explain advanced planning approaches models and projects' external environments. Recognizing that project management is an evolving field, the textbook includes section written by industry experts who share their insight and expertise on cutting-edge topics. It prepares students for upcoming trends and changes in project management while providing an overview of the project management environment today. In addition to guiding students through current models and standards, Project Management: Theory and Practice, Third Edition prepares students for the future by stimulating their thinking beyond the accepted pragmatic view.

Capturing Upside Risk - Finding and Managing Opportunities in Projects (Hardcover): David Hillson Capturing Upside Risk - Finding and Managing Opportunities in Projects (Hardcover)
David Hillson
R1,264 Discovery Miles 12 640 Ships in 12 - 17 working days

With more than three decades of experience as a thought-leader and expert practitioner, PMI Fellow Dr. David Hillson shares practical insight into how upside risks can be identified, assessed, and managed as opportunities. After reviewing the benefits of identifying opportunities, the book steps through the opportunity identification and management process in detail, describing proven tools and techniques as well as specific tips to make them work in practice. The book places opportunity management in the context of traditional risk management, providing a familiar pathway that leads project managers to discover new benefits and successes. David Hillson is one of the foremost authorities on risk management. With his latest book he presents a strong case for managing opportunities. As with all of David's books, the style of writing is engaging and easy to understand. There are many nuggets of wisdom in this book, as well as a hands-on approach to leveraging opportunity management as a way of improving project performance. - Cyndi Snyder Dionisio, PMI Fellow, Coronado CA, USA. (Chair of the PMBOK (R) Guide, Sixth Edition) I enjoyed reading this book, which is precise, clear, logical, and persuasive. The clarity of thought and expression explains why David is such a sought-after speaker. This book is a must-read for project risk practitioners, as well as for project professionals who are serious about addressing all the risks on their project, including the good ones. - Dr Dale Cooper, Cammeray NSW, Australia. (Director, Broadleaf Capital International) At last, a clear and valuable book linking both sides of the coin in risk management: threats and opportunities. David Hillson truly engages the reader on how to deal with these two types of risk in projects, sharing his wisdom and extensive experience in creating value from risk management. Anyone who has to manage risk in real-world projects should read this book to enhance their opportunity management skills. - Professor Salim Al-Harthi, Muscat, Oman. (Director of Risk Management Office, Sultan Qaboos University) It is vital for value creation in business and in life that we consider uncertainties that would have upside impacts on our objectives (opportunities), as well as downside impacts (threats). Business gets confused between opportunities where there is a binary choice to take or not, and true uncertain opportunities that can be seized, or left to chance. David has persevered in helping us understand this and this important book is a must-read for all leaders who want to create value through the proactive management of risk. - Dr Ruth Murray-Webster, Wakefield, UK. (Partner, Beyond the Deal LLP and Editor, APM Body of Knowledge, 7th Edition) As project managers, we always seem to focus on threats, negative risks. David Hillson, one of the foremost thought-leaders on risk management, explains approaches to identify and manage opportunities, positive risks and how this will help achieve project success. As with his previous books, David provides a structured approach with examples, tools, and techniques. An excellent resource for all project managers in today's world. - Peter Monkhouse, Toronto ON, Canada. (Past Chair PMI Board of Directors)

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Complete Lego Minifigure Catalog…
Christopher Bartneck Hardcover R2,149 R1,884 Discovery Miles 18 840
Typical and Atypical Child and…
Stephen Von Tetzchner Paperback R647 Discovery Miles 6 470
Saying It
Mieke Bal, Michelle Williams Gamaker, … Book R211 Discovery Miles 2 110
Dadders, Can I Pet the Whales?
John A Dukes Hardcover R574 Discovery Miles 5 740
Nikon D780 For Dummies
D Sahlin Paperback R739 R571 Discovery Miles 5 710
How to Thrive and Survive in Your…
Marjan Glavac, Paul Jackson Paperback R513 Discovery Miles 5 130
Canon EOS Rebel T7/2000D For Dummies
J.A. King Paperback R682 R534 Discovery Miles 5 340
The Burrell Collection: Renaissance of a…
Bridget McConnell, Duncan Dornan, … Hardcover R848 Discovery Miles 8 480
Introducing Auguste Rodin
Pippa Stephenson-Sit Paperback R345 Discovery Miles 3 450
A Brush With Cancer; 10 Years of…
Jenna Benn Shersher Hardcover R2,275 R1,814 Discovery Miles 18 140

 

Partners