0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (7)
  • R500+ (829)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Project Management Lessons Learned - A Continuous Process Improvement Framework (Hardcover): Mel Bost Project Management Lessons Learned - A Continuous Process Improvement Framework (Hardcover)
Mel Bost
R2,156 Discovery Miles 21 560 Ships in 10 - 15 working days

Lessons Learned is an important phase in project management. This is when organizations can pave the way for future project success by documenting mistakes so they are not repeated and recording best practices so they are repeated. This book covers the important role a project management office (PMO) plays in promoting lessons learned. Project managers learn how to improve processes by applying lessons learned. The book emphasizes "actionability," or producing a process improvement that can be acted upon by anyone in the PMO or project team.

Technology in Context - Technology Assessment for Managers (Hardcover): Ernest Braun Technology in Context - Technology Assessment for Managers (Hardcover)
Ernest Braun
R5,607 Discovery Miles 56 070 Ships in 10 - 15 working days

Most managers know very little about the technology they introduce into their firms, often preferring to leave such decisions to a small band of technological 'experts'. As a result large amounts of time and money are often wasted on inappropriate and inefficient systems. The cost of retraining and reorganising can also be prohibitive if the new technology does not deliver the desired results. In a business environment where technology is of increasing importance, the non-technical manager cannot afford to remain in the dark. Technology in Context provides a toolkit of approaches to this difficult subject. Subjects covered include: * the fundamental concepts required for the management of technology * the gathering of information in a firm to support strategic decisions on technology * technology assessment in the public domain * the wider social implications of technology * problems associated with technology, from the danger of environmental degradation to employment and skills.

The Site Reliability Workbook - Practical ways to implement SRE (Paperback): Betsy Beyer, Niall Richard Murphy, David Rensin,... The Site Reliability Workbook - Practical ways to implement SRE (Paperback)
Betsy Beyer, Niall Richard Murphy, David Rensin, Kent Kawahara, Stephen Thorne
R1,355 R1,101 Discovery Miles 11 010 Save R254 (19%) Ships in 9 - 17 working days

In 2016, Google's Site Reliability Engineering book ignited an industry discussion on what it means to run production services today-and why reliability considerations are fundamental to service design. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment. This new workbook not only combines practical examples from Google's experiences, but also provides case studies from Google's Cloud Platform customers who underwent this journey. Evernote, The Home Depot, The New York Times, and other companies outline hard-won experiences of what worked for them and what didn't. Dive into this workbook and learn how to flesh out your own SRE practice, no matter what size your company is. You'll learn: How to run reliable services in environments you don't completely control-like cloud Practical applications of how to create, monitor, and run your services via Service Level Objectives How to convert existing ops teams to SRE-including how to dig out of operational overload Methods for starting SRE from either greenfield or brownfield

Evolving Innovation Ecosystems - A Guide to Open Idea Transformation in the Age of Future Tech (Hardcover): Carol L. Stimmel Evolving Innovation Ecosystems - A Guide to Open Idea Transformation in the Age of Future Tech (Hardcover)
Carol L. Stimmel
R2,471 Discovery Miles 24 710 Ships in 10 - 15 working days

While emerging technologies create massive opportunity, especially for investors and companies that seek more adaptable forms of economic growth than currently available, value is held inert by traditional approaches, patents, and other closed systems. Yet, open data, content, and information may be the key to mass innovation for future technologies, although they bring difficult challenges to private-industry models that depend on the established ideas of intellectual property. It is from this foundational observation that OpenXFORM (a blending of the words Open and the engineering abbreviation for Transformation) was developed and is explored and described in this book. The intent of the model design is to synthesize an approach to the process of innovation, inspired by natural systems and human-centric design processes. OpenXFORM describes how an open system of innovation can adapt to the unregulated world of information, data, and content; can decompose its own information to release to the open world; and can discover ways to find the points of synergy among the studied and tested methodologies that put human relationships first. This book presents an explicit innovation process that shows how to move from a breakthrough idea through a process that encourages innovative thinkers to test their assumptions, validate hypotheses, and tune and tweak their ideas, not only to drive solutions for users but also to meet the strategic goals of their companies. The anatomy of innovation through OpenXFORM contains the process for moving ideas from a flight of fancy to an explicit concept that is ready to produce.

Building Organizational Intelligence - A Knowledge Management Primer (Paperback, 3rd Edition): Jay Liebowitz Building Organizational Intelligence - A Knowledge Management Primer (Paperback, 3rd Edition)
Jay Liebowitz
R831 Discovery Miles 8 310 Ships with 15 working days

"Sharing knowledge is power." If ever there were a field to which this applies, it is the knowledge management industry. And in today's highly-competitive, fast-paced business world, corporations, businesses and organizations in both the public and private sectors are constantly searching for new cutting-edge methods and techniques for creating, storing, capturing, managing, organizing, distributing, combining, and retrieving knowledge. But the task of accomplishing such functions is not as simple as it sounds. Jay Liebowitz's Building Organizational Intelligence: A Knowledge Management Primer gives executives, managers, systems analysts, and other knowledge-management professionals the competitive edge they need in achieving that task. In a concise and easy-to-read format, the book describes the concepts, techniques, methodologies, and tools associated with those functions, and includes mini-case studies and vignettes of how industry is developing and applying these functions towards building organizational intelligence.

What's more, the book is packaged with a limited functionality version of "WisdomBuilder," the first in a family of knowledge-management tools that provide a fully integrated solution to the information management and analysis dilemma. Able to run under Windows 95, 98 and NT, "WisdomBuilder" solves the information overload problem by reducing the time and cost of extracting information and other research knowledge from disorganized repositories of heterogeneous data.

Table of Contents

What is Organizational Intelligence? Creating Knowledge. Capturing and Storing Knowledge. Transforming Individual Learning Into Organizational Learning. Combining, Transferring, and Distributing Knowledge. Building A Continuous Learning Culture. Culture: The Key Ingredient. Developing A Knowledge Management Capability

Assessing Knowledge Management Through A Knowledge Audit. Augmenting Organizational Intelligence. Role and Skills for Knowledge Management-Questionnaire. Appendix A: The Intelligent Agent-Based Knowledge Management System for Supporting Multimedia Systems Design on The Web. Appendices

Strategic Information Management - Theory and Practice (Paperback, 5th edition): Robert D. Galliers, Dorothy E. Leidner, Boyka... Strategic Information Management - Theory and Practice (Paperback, 5th edition)
Robert D. Galliers, Dorothy E. Leidner, Boyka Simeonova
R1,703 Discovery Miles 17 030 Ships in 9 - 17 working days

Today, there are few in senior management positions who can afford to ignore modern information technology, and few individuals who would prefer to be without it. Modern IT is key to organizational performance; yet we often assume the benefits will occur without forethought or effort. As managerial tasks become more complex, so the nature of the required information systems changes - from structured, routine support to ad hoc, unstructured, complex enquiries at the highest levels of management. If taken for granted, serious implications can arise for organizations. This fifth edition of Strategic Information Management has been brought fully up to date with recent developments in the management of information systems, including digital transformation strategy, the issues surrounding big data and algorithmic decision-making. The book provides a rich source of material reflecting recent thinking on the key issues facing executives, drawing from a wide range of contemporary articles written by leading experts in North America, Europe, and Australia. Combining theory with practice, each section is fully introduced, includes further reading and questions for further discussion. Designed for MBA, master's level students, and advanced undergraduate students taking courses in information systems management, it also provides a wealth of information and references for researchers.

Operational Assessment of IT (Hardcover): Steve Katzman Operational Assessment of IT (Hardcover)
Steve Katzman
R4,223 Discovery Miles 42 230 Ships in 10 - 15 working days

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization's business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks, resource programs, or infrastructure, the book focuses on organizational processes. Throughout the book, the author presents concerns and environments encountered throughout his career to demonstrate issues and explain how you, too, can successfully implement the tools presented in the book. The assessment process reviews the economics as well as the effectiveness and efficiency of the process. Whether your organization is profit-based, not-for-profit, or even governmental, you cannot provide services or products at a continuous loss. For an operational assessment to be of value, the ultimate goal must be to insure that the business unit process is effective and efficient and employs the financial assets and resources appropriately or helps the business unit make adjustments to improve the operation and use resources more efficiently and economically. After reading this book, you will be able to devise more efficient and economical ways to meet your customers' requirements, no matter who or where your customers are. You will learn that the goal of any process is to service or supply customers with what they want. The book provides tools and techniques that will assist you in gaining a 360-degree view of the process so that you can help the business unit improve the delivery of a quality product or a service to the customer.

Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover): John McCumber Assessing and Managing Security Risk in IT Systems - A Structured Methodology (Hardcover)
John McCumber
R2,293 Discovery Miles 22 930 Ships in 10 - 15 working days

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

Embedded Systems Design - An Introduction to Processes, Tools and Techniques (Paperback): Arnold S Berger Embedded Systems Design - An Introduction to Processes, Tools and Techniques (Paperback)
Arnold S Berger
R366 Discovery Miles 3 660 Ships in 4 - 6 working days

This is a primer on the development process for embedded systems designed to teach the specialised aspects of writing software in this enviroment that are not covered in standard coursework for software developers and electrical engineers. It traces the software and hardware methodologies and the intergration of the two disciplines in the lifecycle. The guide details the steps necessary for designing and producing embedded systems and discusses the key methods and technologies for each phase of the process: specification, partition, design, integration, validation, release, maintenance and upgrade.

The Lean IT Field Guide - A Roadmap for Your Transformation (Paperback): Michael A Orzen, Thomas A. Paider The Lean IT Field Guide - A Roadmap for Your Transformation (Paperback)
Michael A Orzen, Thomas A. Paider
R1,548 Discovery Miles 15 480 Ships in 10 - 15 working days

How many IT books have you read that are long on theory and short on practical application? They are interesting, but not very impactful. They provide a framework from which to think and understand, but lack a process from which to act. Addressing this urgent need for the IT community, The Lean IT Field Guide explains how to initiate, execute, and sustain a lean IT transformation. Illuminating a clear path to lean IT, the authors integrate more than two decades of combined experience to provide you with a proven method for creating and sustaining a true lean IT workplace. This field guide not only highlights the organizational techniques of more agile and lean processes, but also the leadership work required to help management adopt these new approaches. Based on proven methods from different industries, including banking, manufacturing, insurance, food and beverage, and logistics, the book details a clear model that covers all the components you need to achieve and sustain a favorable work environment and culture in support of lean IT. Filled with anecdotes and case studies from actual businesses, the book includes pictures, templates, and examples that illustrate the application of the lean methods discussed.

Information Technology - Proceedings of the 2014 International Symposium on Information Technology (ISIT 2014), Dalian, China,... Information Technology - Proceedings of the 2014 International Symposium on Information Technology (ISIT 2014), Dalian, China, 14-16 October 2014 (Hardcover)
Yi Wan, Liangshan Shao, Lipo Wang, Jinguang Sun
R5,801 Discovery Miles 58 010 Ships in 10 - 15 working days

These proceedings of the symposium ISIT 2014 aim to be a platform for international exchange of the state-of-the-art research and practice in information technology. The contributions cover a wide variety of topics, ranging from theoretical and analytical studies to various applications.

Simple Statistical Methods for Software Engineering - Data and Patterns (Hardcover): C. Ravindranath Pandian, Murali  Kumar Simple Statistical Methods for Software Engineering - Data and Patterns (Hardcover)
C. Ravindranath Pandian, Murali Kumar
R3,954 Discovery Miles 39 540 Ships in 10 - 15 working days

Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler solutions that are just as effective and connect with the intuition of problem solvers. Sharing valuable insights into software engineering problems and solutions, the book not only explains the required statistical methods, but also provides many examples, review questions, and case studies that provide the understanding required to apply those methods to real-world problems. After reading this book, practitioners will possess the confidence and understanding to solve day-to-day problems in quality, measurement, performance, and benchmarking. By following the examples and case studies, students will be better prepared able to achieve seamless transition from academic study to industry practices. Includes boxed stories, case studies, and illustrations that demonstrate the nuances behind proper application Supplies historical anecdotes and traces statistical methods to inventors and gurus Applies basic statistical laws in their simplest forms to resolve engineering problems Provides simple techniques for addressing the issues software engineers face The book starts off by reviewing the essential facts about data. Next, it supplies a detailed review and summary of metrics, including development, maintenance, test, and agile metrics. The third section covers the fundamental laws of probability and statistics and the final section presents special data patterns in the form of tailed mathematical distributions. In addition to selecting simpler and more flexible tools, the authors have also simplified several standard techniques to provide you with the set of intellectual tools al

Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Hardcover): Brij B. Gupta Computer and Cyber Security - Principles, Algorithm, Applications, and Perspectives (Hardcover)
Brij B. Gupta
R4,841 Discovery Miles 48 410 Ships in 10 - 15 working days

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

C2 Re-envisioned - The Future of the Enterprise (Hardcover): Marius S. Vassiliou, David S Alberts, Jonathan Russell Agre C2 Re-envisioned - The Future of the Enterprise (Hardcover)
Marius S. Vassiliou, David S Alberts, Jonathan Russell Agre
R2,099 Discovery Miles 20 990 Ships in 10 - 15 working days

Command and Control (C2) is the set of organizational and technical attributes and processes by which an enterprise marshals and employs human, physical, and information resources to solve problems and accomplish missions.C2 Re-envisioned: The Future of the Enterprise identifies four interrelated megatrends that are individually and collectively shaping the state of the art and practice of C2 as well as the mission challenges we face. These megatrends the book examines are: Big Problems -manifested in part as increasing complexity of both endeavors and enterprises, as military establishments form coalitions with each other, and partnerships with various civilian agencies and non-governmental organizations Robustly Networked Environments-enabled by the extremely broad availability of advanced information and communications technologies (ICT) that place unprecedented powers of information creation, processing, and distribution in the hands of almost anyone who wants them-friend and foe alike Ubiquitous Data-the unprecedented volumes of raw and processed information with which human actors and C2 systems must contend Organizational alternatives-as decentralized, net-enabled approaches to C2 have been made more feasible by technology. The book analyzes historical examples and experimental evidence to determine the critical factors that make C2 go wrong and how to get it right. Successful enterprises in the future will be those that can reconfigure their approaches in an agile manner. Offering fresh perspectives on this subject of critical importance, this book provides the understanding you will need to choose your organizational approaches to suit the mission and the conditions at hand.

Project Planning and Project Success - The 25% Solution (Hardcover): Pedro Serrador Project Planning and Project Success - The 25% Solution (Hardcover)
Pedro Serrador
R1,984 Discovery Miles 19 840 Ships in 10 - 15 working days

Project planning is generally accepted as an important contributor to project success. However, is there research that affirms the positive impact of project planning and gives guidance on how much effort should be spent on planning? To answer these questions, this book looks at current literature and new research of this under-studied area of project management. The author presents his findings from an extensive review of project planning literature that covers more than 270 sources. He also discusses new research that analyzes data from more than 1,300 global projects. The book confirms that the time spent on planning activities reduces risk and significantly increases the chances of project success. It also concludes that there can be too much planning and shows that the optimum ratio of planning to effort is 25%. The book examines the impact of project planning on different industries. It discusses research in the construction and information technology (IT) industries, and presents a case study of how to plan and track a software development project. The book also looks at the impact of geography on project planning and success. Intended as a basic tool in the library of any project manager or general manager, this book brings to light project planning techniques and information that have never been published previously. It is an important resource on how to plan projects properly and propel your career forward.

Securing Systems - Applied Security Architecture and Threat Models (Hardcover): Brook S. E. Schoenfield Securing Systems - Applied Security Architecture and Threat Models (Hardcover)
Brook S. E. Schoenfield
R3,961 Discovery Miles 39 610 Ships in 10 - 15 working days

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system's existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis: When should the security architect begin the analysis? At what points can a security architect add the most value? What are the activities the architect must execute? How are these activities delivered? What is the set of knowledge domains applied to the analysis? What are the outputs? What are the tips and tricks that make security architecture risk assessment easier? To help you build skill in assessing architectures for security, the book presents six sample assessments. Each assessment examines a different type of system architecture and introduces at least one new pattern for security analysis. The goal is that after you've seen a sufficient diversity of architectures, you'll be able to understand varied architectures and can better see the attack surfaces and prescribe security solutions.

Outsourcing - A CIO's Perspective (Paperback): Oakie D. Williams Outsourcing - A CIO's Perspective (Paperback)
Oakie D. Williams
R1,889 Discovery Miles 18 890 Ships in 10 - 15 working days

As global competition grows more fierce, companies continue to look for ways to increase their competitive edge without jeopardizing profit margins. Today's corporations are starting to realize the competitive advantage that Information Technology (IT) can bring to a company. These corporations are also realizing that staying current with technology requires a great deal of effort, risk, and expense. This is one of the primary reasons CEO's are considering outsourcing as an alternative. Written by a CIO who has successfully maneuvered through the outsourcing process, Outsourcing: A CIO's Perspective addresses the realistic expectations and the most commonly asked questions about IT outsourcing, while reviewing it's advantages and disadvantages. This text identifies key elements that can be used to assess the feasibility of securing a profitable and manageable outsourcing agreement. It provides a convincing case that even if the final decision is to not outsource, the result of the process will identify potential business improvement opportunities.

Handbook of e-Business Security (Paperback): Joao Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman,... Handbook of e-Business Security (Paperback)
Joao Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
R1,492 Discovery Miles 14 920 Ships in 10 - 15 working days

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

FinTech - The Technology Driving Disruption in the Financial Services Industry (Paperback, 3rd Edition): Parag Y Arjunwadkar FinTech - The Technology Driving Disruption in the Financial Services Industry (Paperback, 3rd Edition)
Parag Y Arjunwadkar
R1,472 Discovery Miles 14 720 Ships in 10 - 15 working days

Everything that we know about the world of finance is changing before us. Innovation is happening constantly, despite the protests of the traditional financial industry. With all the new technology that we have today, it is almost mind-blowing to think about the kind of technology that we will have in another ten years or so. The change is going to keep coming, the only thing we can do is get on board with it. This book introduces the basics of FinTech and equips readers with the knowledge to get on the cutting edge of age we live in today.

Table of Contents

Part 1: Evolution of Financial Services. 1. Financial Services. 2. Collapse of "Too Big to Collapse." 3. Green Shoots Transforming the Way Financial Services Are Managed. 4. First-Generation Disruptions. 5. Emergence of Unicorns. 6. Fintechs as an Established Industry. Part 2: Fintechs: Unchartered Territory for Traditional Business. 7.Challenging Goliaths of Banking Industry. 8. Replacing Wallets. 9. Homecoming of a Safe Way of Leading Your Life. 10. Keeping Fraudsters Away. 11. Skin in the Game (Guaranteed Returns). 12. Transforming the Experience. 13. Collapse of the Great Wall. 14. Thinking Like Me. Part 3: Techtonic Shift in Technology Propelling Fintech Innovations. 15. Emergence of App Stores. 16. Cloud. 17. Big Data and Hadoop. 18. IoT. 19. Blockchain. 20. Artificial Intelligence. 21. Opening the APIs. Part 4: Fintech Revolution Is Everywhere. 22. USA. 23. Europe. 24. The Dragon and Tiger Countries. 25. Innovations in the Sahara and Amazons of the World. Part 5: Funding the Fintechs. 26.Large Banks Funding Fintechs. 27. Convergence of Telecom and Retail to Banking Using the Fintech Route. 28. Institutional Investors Jumping into the Fray. 29. Self-funded Fintechs. 30. Crowd-Sourced Fintechs. Part 6: The Road Ahead for Fintechs. 31. Disruptions a Hype or Reality. 32. Let the Orders Flow. Making Money for Investors. 33. Being Legally Compliant. 34. Becoming the Torch Bearer to a More Simplified Financial Services Industry.

Data Analytics for IT Networks - Developing Innovative Use Cases (Paperback): John Garrett Data Analytics for IT Networks - Developing Innovative Use Cases (Paperback)
John Garrett
R1,278 R1,194 Discovery Miles 11 940 Save R84 (7%) Ships in 10 - 15 working days

One of the hottest trends in the networking industry is to apply analytics to improve performance, security, and value. Everyone's talking about integrating analytics in networks. But successfully doing so requires a deep understanding of both networking and data, and that's a rare combination. This book's author, John Garrett, is currently Analytics Technical Lead for Cisco Advanced Services, where he draws on his MS in Predictive Analytics to develop analytics use cases for many of Cisco's most sophisticated customers. In Computer Networking Data Analytics, Garrett illuminates the data of networking, revealing the power of the information that's already available in your environment. Next, he introduces powerful techniques for using that information to accelerate innovation, and build a better network. Garrett walks step-by-step through a wide spectrum of common networking analytics techniques and scenarios, illuminating the insights underlying them, and helping you adapt them for your own environment. He concludes with several end-to-end case studies demonstrating how his team has developed high-value use cases for some of Cisco's largest customers. These end-to-end use cases can serve as repeatable templates for developing your own solutions in areas ranging from advanced troubleshooting and self-healing to service assurance. They will help you drive more value from telemetry, event analytics, network infrastructure metadata, and all the information you have.

Managing IoT Systems for Institutions and Cities (Paperback): Chuck Benson Managing IoT Systems for Institutions and Cities (Paperback)
Chuck Benson
R2,194 Discovery Miles 21 940 Ships in 10 - 15 working days

This book defines what IoT Systems manageability looks like and what the associated resources and costs are of that manageability. It identifies IoT Systems performance expectations and addresses the difficult challenges of determining actual costs of IoT Systems implementation, operation, and management across multiple institutional organizations. It details the unique challenges that cities and institutions have in implementing and operating IoT Systems.

Computational Intelligence Applications in Business Intelligence and Big Data Analytics (Hardcover): Vijayan Sugumaran, Arun... Computational Intelligence Applications in Business Intelligence and Big Data Analytics (Hardcover)
Vijayan Sugumaran, Arun Kumar Sangaiah, Arunkumar Thangavelu
R3,389 Discovery Miles 33 890 Ships in 10 - 15 working days

There are a number of books on computational intelligence (CI), but they tend to cover a broad range of CI paradigms and algorithms rather than provide an in-depth exploration in learning and adaptive mechanisms. This book sets its focus on CI based architectures, modeling, case studies and applications in big data analytics, and business intelligence. The intended audiences of this book are scientists, professionals, researchers, and academicians who deal with the new challenges and advances in the specific areas mentioned above. Designers and developers of applications in these areas can learn from other experts and colleagues through this book.

Culturally Tuning Change Management (Hardcover): Risto Gladden Culturally Tuning Change Management (Hardcover)
Risto Gladden
R2,276 Discovery Miles 22 760 Ships in 10 - 15 working days

Managing change across cultures can be tricky, and universal approaches to change management may not serve their purpose in every cultural setting. This book examines the cultural dimensions that can influence the perceptions of and reactions to change in different cultural contexts and highlights the benefits of developing and applying cultural mindfulness when planning and running cross-cultural change initiatives. It offers practical advice to project and change management teams and leaders for developing Cultural Intelligence, tailoring plans to consider any cultural variables that could be barriers to (or catalysts for) effective change, and applying facilitating strategies.

Information Systems - What Every Business Student Needs to Know, Second Edition (Hardcover, 2nd edition): Efrem G. Mallach Information Systems - What Every Business Student Needs to Know, Second Edition (Hardcover, 2nd edition)
Efrem G. Mallach
R5,507 Discovery Miles 55 070 Ships in 10 - 15 working days

Most information systems textbooks overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students on the job. Review questions, discussion questions, and summaries are also included. This second edition is updated to include new technology, along with a new running case study. Key features: Single-mindedly for business students who are not technical specialists Doesn't try to prepare IS professionals; other courses will do that Stresses the enabling technologies and application areas that matter the most today Based on the author's real-world experience Up to date regarding technology and tomorrow's business needs This is the book the author-and, more importantly, his students-wishes he had when he started teaching. Dr. Mallach holds degrees in engineering from Princeton and MIT, and in business from Boston University. He worked in the computer industry for two decades, as Director of Strategic Planning for a major computer firm and as co-founder/CEO of a computer marketing consulting firm. He taught information systems in the University of Massachusetts (Lowell and Dartmouth) business schools for 18 years, then at Rhode Island College following his retirement. He consults in industry and serves as Webmaster for his community, in between hiking and travel with his wife.

Handbook of e-Business Security (Hardcover): Joao Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman,... Handbook of e-Business Security (Hardcover)
Joao Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
R3,536 Discovery Miles 35 360 Ships in 10 - 15 working days

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,327 Discovery Miles 53 270
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, … Paperback R2,667 Discovery Miles 26 670
Tactile Internet - with…
Frank H. P. Fitzek, Shu-Chen Li, … Paperback R2,596 Discovery Miles 25 960
XML in Data Management - Understanding…
Peter Aiken, M. David Allen Paperback R1,150 Discovery Miles 11 500
Channel Coding: Theory, Algorithms, and…
David Declercq, Marc Fossorier, … Paperback R3,340 R3,126 Discovery Miles 31 260
Securing the Information Infrastructure
Joseph Migga Kizza, Florence Migga Kizza Hardcover R2,630 Discovery Miles 26 300
Meeting People via WiFi and Bluetooth
Joshua Schroeder, Henry Dalziel Paperback R777 Discovery Miles 7 770
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin Paperback R2,896 Discovery Miles 28 960
Antipatterns - Managing Software…
Colin J. Neill, Philip A. Laplante, … Hardcover R2,479 Discovery Miles 24 790

 

Partners