![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Systems management
According to the W3C Semantic Web Activity [1]: The Semantic Web provides a common framework that allows data to be shared and reused across appli- tion, enterprise, and community boundaries. This statement clearly explains that the Semantic Web is about data sharing. Currently, the Web uses hyperlinks to connect Web pages. The Semantic Web goes beyond that and focuses on data and envisions the creation of the web of data. On the Semantic Web, anyone can say anything about any resource on the Web. This is fully based on the concept of semantic - notations, where each resource on the Web can have an assigned meaning. This is done through the use of ontologies as a formal and explicit representation of domain concepts and their relationships [2]. Ontologies are formally based on description logics. This enables agents and applications to reason over the data when searching the Web, which has not previously been possible. Web 2. 0 has gradually evolved from letting the Web users play a more active role. Unlike the initial version of the Web, where the users mainly "consumed" content, users are now offered easy-to-use services for content production and publication. Mashups, blogs, wikis, feeds, interface remixes, and social networking/tagging s- tems are examples of these well-known services. The success and wide adoption of Web 2. 0 was in its reliance on social interactions as an inevitable characteristic of the use and life of the Web. In particular, Web 2.
Hypermedia & the Web An Engineering Approach David Lowe, University of Technology, Sydney, Australia Wendy Hall, University of Southampton, UK The rich online world offered through the Web is marred by the chaos which underlies it. At the very early stages of understanding how to harness the power of this new medium, electronic document creators, managers and researchers often spend time on technology innovations at the expense of adopting the sound engineering principles which have paid such dividends in the software industry. Hypermedio & the Web approaches interactive information (concentrating on hypertext documents) as a structure requiring management, quantification and documentation. From analysing the purpose for which a website, CD-ROM or online archive is created, assessing the characteristics and resources needed for the process of building each one, to the assessment of the end product itself, this book attempts to carve out features that are essential to the successful structuring of information in an electronic environment. This is an ambitious book charting an emerging discipline. It is an essential tool to help developers and educators shape and maintain useful and relevant electronic information. 'Hypermedia Engineering hasn't produced many tangible benefits in real-life situations, because very few people practise it. That's why the book is needed.' David Barron, Southampton University 'This book is interesting and excellently fulfills a current need [by] providing an exhaustive and up-to-date vision of the hypermedia field.' Fabio Vitali, University of Bologna 'The strength of this book is its breadth - it covers many of the issues in hypermedia with examples from thetechnical to the managerial. Students could use these as starting points when designing or evaluating hypermedia systems.' David Sharp, Imperial College of Science and Technology 'Information systems developers and managers should find this a helpful guide for developing hypermedia applications.' H Ashman, University of Nottingham Visit our Website at: http: //www.wiley.com/compbooks/
This book constitutes the refereed proceedings of the 12th International Conference on Database and Expert Systems Applications, DEXA 2001, held in Munich, Germany in September 2001. The 93 revised full papers presented were carefully reviewed and selected from 175 submissions. The papers are organized in topical sections on advanced databases, information retrieval, digital libraries, user interfaces, multimedia databases, workflow aspects, active databases, spatial databases, distributed databases, web aspects, knowledge management aspects, datawarehouses, hypermedia, indexing, object-oriented databases, database queries, and transaction processing.
Durch die Weiterentwicklung der kommunikationstechnischen Infrastruktur ergeben sich neue Freiraume bei der Distribuierung von Informations- und Kommunikationssystemen (IKS). Das Buch stellt ein computergestutztes Entscheidungsmodell zur Bestimmung des optimalen Distribuierungsgrades von IKS vor und dokumentiert die Entwicklung eines Prototyps. Die Diskussion der Rahmenbedingungen baut auf einem kybernetischen Unternehmensmodell auf, das es ermoeglicht, die Lebensfahigkeit eines Systems in seiner Umwelt zu untersuchen. Die geforderte Eigenschaft der Rekursivitat des Modells fuhrt zu dem Schluss, dass auch das IKS in einem Unternehmen hinsichtlich seiner Lebensfahigkeit beschrieben werden kann. In der Folge wird die Organisation unter einem strukturellen Aspekt untersucht. Dabei wird die Dimension der Distribuierung und das Distribuierungskontinuum beschrieben. Der Prozess der strategischen Unternehmensplanung, die Ableitung von Informatikprojekten (Projektportfolio) und Informatikzielen und die darin begrundeten Einflusse auf eine Distribuierungsentscheidung bilden den Gegenstand weiterer Untersuchungen. Als dritte Rahmenbedingung wird dann die Bedeutung der Entwicklung von Normen und Standards diskutiert. Dabei steht weniger der technische Aspekt im Vordergrund. Vielmehr werden die Anforderungen untersucht, denen ein IKS genugen muss, wenn der Distributionsgrad nicht von den technischen Moeglichkeiten sondern von anderen Faktoren bestimmt wird. Der zweite Teil der Arbeit beinhaltet eine Beschreibung der logischen Struktur des Prototyps, der Entwicklungsumgebung, der zugrundeliegenden Datenstruktur und der Benutzerschnittstelle anhand einer Beispiel-Konsultation.
Analytics in Healthcare: An Introduction provides a clear, straightforward roadmap to achieving your goals within the domain of healthcare analytics. Whether you are a student looking for a career path or a staff member within a healthcare organization needing to apply the value that your institution's data can provide, this manual will give you direction. Building on chapters that describe the evolution of healthcare analytics, others then address current and upcoming challenges including productive data mining from electronic health records, data governance, and the DELTA analytics maturity model. An appendix with learning modules for healthcare providers on secondary use of data as well as a comprehensive glossary are unique features of the book. The authors' varied experiences and perspectives demonstrate the range of opportunities where healthcare analytics can be applied to make a difference in the current healthcare climate. As a quick and manageable read, this to-the-point resource serves as an invaluable tool to building your analytics program.
Advanced Fiber Access Networks takes a holistic view of broadband access networks-from architecture to network technologies and network economies. The book reviews pain points and challenges that broadband service providers face (such as network construction, fiber cable efficiency, transmission challenges, network scalability, etc.) and how these challenges are tackled by new fiber access transmission technologies, protocols and architecture innovations. Chapters cover fiber-to-the-home (FTTH) applications as well as fiber backhauls in other access networks such as 5G wireless and hybrid-fiber-coax (HFC) networks. In addition, it covers the network economy, challenges in fiber network construction and deployment, and more. Finally, the book examines scaling issues and bottlenecks in an end-to-end broadband network, from Internet backbones to inside customer homes, something rarely covered in books.
Dimensions of Uncertainty in Communication Engineering is a comprehensive and self-contained introduction to the problems of nonaleatory uncertainty and the mathematical tools needed to solve them. The book gathers together tools derived from statistics, information theory, moment theory, interval analysis and probability boxes, dependence bounds, nonadditive measures, and Dempster-Shafer theory. While the book is mainly devoted to communication engineering, the techniques described are also of interest to other application areas, and commonalities to these are often alluded to through a number of references to books and research papers. This is an ideal supplementary book for courses in wireless communications, providing techniques for addressing epistemic uncertainty, as well as an important resource for researchers and industry engineers. Students and researchers in other fields such as statistics, financial mathematics, and transport theory will gain an overview and understanding on these methods relevant to their field.
Data is an intrinsic part of our daily lives. Everything we do is a data point. Many of these data points are recorded with the intent to help us lead more efficient lives. We have apps that track our workouts, sleep, food intake, and personal finance. We use the data to make changes to our lives based on goals we have set for ourselves. Businesses use vast collections of data to determine strategy and marketing. Data scientists take data, analyze it, and create models to help solve problems. You may have heard of companies having data management teams or chief information officers (CIOs) or chief data officers (CDOs), etc. They are all people who work with data, but their function is more related to vetting data and preparing it for use by data scientists. The jump from personal data usage for self-betterment to mass data analysis for business process improvement often feels bigger to us than it is. In turn, we often think big data analysis requires tools held only by advanced degree holders. Although advanced degrees are certainly valuable, this book illustrates how it is not a requirement to adequately run a data science project. Because we are all already data users, with some simple strategies and exposure to basic analytical software programs, anyone who has the proper tools and determination can solve data science problems. The process presented in this book will help empower individuals to work on and solve data-related challenges. The goal of this book is to provide a step-by-step guide to the data science process so that you can feel confident in leading your own data science project. To aid with clarity and understanding, the author presents a fictional restaurant chain to use as a case study, illustrating how the various topics discussed can be applied. Essentially, this book helps traditional businesspeople solve data-related problems on their own without any hesitation or fear. The powerful methods are presented in the form of conversations, examples, and case studies. The conversational style is engaging and provides clarity.
Thoroughly updated to reflect the CompTIA (R) Network+ N10-008 exam, Networking Essentials, Sixth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management. Networking Essentials, Sixth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; routing protocols; local, campus, and wide area network configuration; network security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. This edition reflects the latest exam topics and objectives associated with network security and hardening, cloud networking, virtualization, 5G, and other recent advances in wireless technology, infrastructure management, and current hardware and devices. It also explains many new terms now addressed by CompTIA's N10-008 exam. Clear goals are outlined for each chapter, and every concept is introduced in easy-to-understand language that explains how and why networking technologies are used. Each chapter is packed with real-world examples and practical exercises that reinforce all concepts and guide you through using them to configure, analyze, and fix networks. CHALLENGE SIMULATION SOFTWARE provides hands-on experience with entering router and switch commands, setting up functions, and configuring interfaces and protocols WIRESHARK NETWORK PROTOCOL ANALYZER presents techniques and examples of data traffic analysis throughout PROVEN TOOLS FOR MORE EFFECTIVE LEARNING AND NETWORK+ PREP, including chapter outlines, summaries, and Network+ objectives WORKING EXAMPLES IN EVERY CHAPTER to reinforce key concepts and promote mastery KEY TERM DEFINITIONS, LISTINGS, AND EXTENSIVE GLOSSARY to help you master the language of networking QUESTIONS, PROBLEMS, AND CRITICAL THINKING QUESTIONS to help you deepen your understanding
In a world that is awash in ubiquitous technology, even the least tech-savvy know that we must take care how that technology affects individuals and society. That governments and organizations around the world now focus on these issues, that universities and research institutes in many different languages dedicate significant resources to study the issues, and that international professional organizations have adopted standards and directed resources toward ethical issues in technology is in no small part the result of the work of Simon Rogerson. - Chuck Huff, Professor of Social Psychology at Saint Olaf College, Northfield, Minnesota In 1995, Apple launched its first WWW server, Quick Time On-line. It was the year Microsoft released Internet Explorer and sold 7 million copies of Windows 95 in just 2 months. In March 1995, the author Simon Rogerson opened the first ETHICOMP conference with these words: We live in a turbulent society where there is social, political, economic and technological turbulence ... it is causing a vast amount of restructuring within all these organisations which impacts on individuals, which impacts on the way departments are set up, organisational hierarchies, job content, span of control, social interaction and so on and so forth. ... Information is very much the fuel of modern technological change. Almost anything now can be represented by the technology and transported to somewhere else. It's a situation where the more information a computer can process, the more of the world it can actually turn into information. That may well be very exciting, but it is also very concerning. That could be describing today. More than 25 years later, these issues are still at the forefront of how ethical digital technology can be developed and utilised. This book is an anthology of the author's work over the past 25 years of pioneering research in digital ethics. It is structured into five themes: Journey, Process, Product, Future and Education. Each theme commences with an introductory explanation of the papers, their relevance and their interrelationship. The anthology finishes with a concluding chapter which summarises the key messages and suggests what might happen in the future. Included in this chapter are insights from some younger leading academics who are part of the community charged with ensuring that ethical digital technology is realised.
A comprehensive guide to understanding network architecture, communication protocols, and network analysis to build secure applications compatible with the latest versions of C# 8 and .NET Core 3.0 Key Features Explore various network architectures that make distributed programming possible Learn how to make reliable software by writing secure interactions between clients and servers Use .NET Core for network device automation, DevOps, and software-defined networking Book DescriptionThe C# language and the .NET Core application framework provide the tools and patterns required to make the discipline of network programming as intuitive and enjoyable as any other aspect of C# programming. With the help of this book, you will discover how the C# language and the .NET Core framework make this possible. The book begins by introducing the core concepts of network programming, and what distinguishes this field of programming from other disciplines. After this, you will gain insights into concepts such as transport protocols, sockets and ports, and remote data streams, which will provide you with a holistic understanding of how network software fits into larger distributed systems. The book will also explore the intricacies of how network software is implemented in a more explicit context, by covering sockets, connection strategies such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), asynchronous processing, and threads. You will then be able to work through code examples for TCP servers, web APIs served over HTTP, and a Secure Shell (SSH) client. By the end of this book, you will have a good understanding of the Open Systems Interconnection (OSI) network stack, the various communication protocols for that stack, and the skills that are essential to implement those protocols using the C# programming language and the .NET Core framework. What you will learn Understand the breadth of C#'s network programming utility classes Utilize network-layer architecture and organizational strategies Implement various communication and transport protocols within C# Discover hands-on examples of distributed application development Gain hands-on experience with asynchronous socket programming and streams Learn how C# and the .NET Core runtime interact with a hosting network Understand a full suite of network programming tools and features Who this book is forIf you're a .NET developer or a system administrator with .NET experience and are looking to get started with network programming, then this book is for you. Basic knowledge of C# and .NET is assumed, in addition to a basic understanding of common web protocols and some high-level distributed system designs.
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organization Key Features Build complex Python-based applications with IoT Explore different concepts, technologies, and tradeoffs in the IoT architectural stack Delve deep into each element of the IoT design-from sensors to the cloud Book DescriptionThe Internet of Things (IoT) is the fastest growing technology market. Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. We'll begin our journey with an introduction to Raspberry Pi and quickly jump right into Python programming. We'll learn all concepts through multiple projects, and then reinforce our learnings by creating an IoT robot car. We'll examine modern sensor systems and focus on what their power and functionality can bring to our system. We'll also gain insight into cloud and fog architectures, including the OpenFog standards. The Learning Path will conclude by discussing three forms of prevalent attacks and ways to improve the security of our IoT infrastructure. By the end of this Learning Path, we will have traversed the entire spectrum of technologies needed to build a successful IoT system, and will have the confidence to build, secure, and monitor our IoT infrastructure. This Learning Path includes content from the following Packt products: Internet of Things Programming Projects by Colin Dow Internet of Things for Architects by Perry Lea What you will learn Build a home security dashboard using an infrared motion detector Receive data and display it with an actuator connected to the Raspberry Pi Build an IoT robot car that is controlled via the Internet Use IP-based communication to easily and quickly scale your system Explore cloud protocols, such as Message Queue Telemetry Transport (MQTT) and CoAP Secure communication with encryption forms, such as symmetric key Who this book is forThis Learning Path is designed for developers, architects, and system designers who are interested in building exciting projects with Python by understanding the IoT ecosphere, various technologies, and tradeoffs. Technologists and technology managers who want to develop a broad view of IoT architecture, will also find this Learning Path useful. Prior programming knowledge of Python is a must.
Enhance your skills in expert module development, deployment, security, DevOps, and cloud Key Features A step-by-step guide to get you started with PowerShell Core 6.0 Harness the capabilities of PowerShell Core 6.0 to perform simple to complex administration tasks Learn core administrative concepts such as scripting, pipelines, and DSC Book DescriptionBeginning with an overview of the different versions of PowerShell, Learn PowerShell Core 6.0 introduces you to VSCode and then dives into helping you understand the basic techniques in PowerShell scripting. You will cover advanced coding techniques, learn how to write reusable code as well as store and load data with PowerShell. This book will help you understand PowerShell security and Just Enough Administration, enabling you to create your own PowerShell repository. The last set of chapters will guide you in setting up, configuring, and working with Release Pipelines in VSCode and VSTS, and help you understand PowerShell DSC. In addition to this, you will learn how to use PowerShell with Windows, Azure, Microsoft Online Services, SCCM, and SQL Server. The final chapter will provide you with some use cases and pro tips. By the end of this book, you will be able to create professional reusable code using security insight and knowledge of working with PowerShell Core 6.0 and its most important capabilities. What you will learn Get to grips with Powershell Core 6.0 Explore basic and advanced PowerShell scripting techniques Get to grips with Windows PowerShell Security Work with centralization and DevOps with PowerShell Implement PowerShell in your organization through real-life examples Learn to create GUIs and use DSC in production Who this book is forIf you are a Windows administrator or a DevOps user who wants to leverage PowerShell to automate simple to complex tasks, then this book is for you. Whether you know nothing about PowerShell or just enough to get by, this guide will give you what you need to go to take your scripting to the next level. You'll also find this book useful if you're a PowerShell expert looking to expand your knowledge in areas such as PowerShell Security and DevOps.
Learn how to hack systems like black hat hackers and secure them like security experts Key Features Understand how computer systems work and their vulnerabilities Exploit weaknesses and hack into machines to test their security Learn how to secure systems from hackers Book DescriptionThis book starts with the basics of ethical hacking, how to practice hacking safely and legally, and how to install and interact with Kali Linux and the Linux terminal. You will explore network hacking, where you will see how to test the security of wired and wireless networks. You'll also learn how to crack the password for any Wi-Fi network (whether it uses WEP, WPA, or WPA2) and spy on the connected devices. Moving on, you will discover how to gain access to remote computer systems using client-side and server-side attacks. You will also get the hang of post-exploitation techniques, including remotely controlling and interacting with the systems that you compromised. Towards the end of the book, you will be able to pick up web application hacking techniques. You'll see how to discover, exploit, and prevent a number of website vulnerabilities, such as XSS and SQL injections. The attacks covered are practical techniques that work against real systems and are purely for educational purposes. At the end of each section, you will learn how to detect, prevent, and secure systems from these attacks. What you will learn Understand ethical hacking and the different fields and types of hackers Set up a penetration testing lab to practice safe and legal hacking Explore Linux basics, commands, and how to interact with the terminal Access password-protected networks and spy on connected clients Use server and client-side attacks to hack and control remote computers Control a hacked system remotely and use it to hack other systems Discover, exploit, and prevent a number of web application vulnerabilities such as XSS and SQL injections Who this book is forLearning Ethical Hacking from Scratch is for anyone interested in learning how to hack and test the security of systems like professional hackers and security experts.
Automation through Chef Opscode provides an in-depth understanding of Chef, which is written in Ruby and Erlang for configuration management, cloud infrastructure management, system administration, and network management. Targeted at administrators, consultants, and architect, the book guides them through the advanced features of the tool which are necessary for infrastructure automation, devops automation, and reporting. The book presumes knowledge of Ruby and Erlang which are used as reference languages for creating recipes and cookbooks and as a refresher on them to help the reader get on speed with the flow of book. The book provides step by step instructions on installation and configuration of Chef, usage scenarios of Chef, in infrastructure automation by providing common scenarios like virtual machine provisioning, OS configuration for Windows, Linux, and Unix, provisioning and configuration of web servers like Apache along with popular databases like MySQL. It further elaborates on the creation of recipes, and cookbooks, which help in deployment of servers and applications to any physical, virtual, or cloud location, no matter the size of the infrastructure. The books covers advanced features like LWRPs and Knife and also contains several illustrative sample cookbooks on MySQL, Apache, and CouchDB deployment using a step by step approach.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Bestselling CompTIA A+ author Mike Meyers provides hands-on, step-by-step labs-updated for the 2012 release of Exam 220-801-so you can practice the IT skills essential for your successMike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Hardware Lab Manual, Fourth Edition contains more than 75 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to certification exam objectives, ensuring direct correspondence to Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting Hardware, Fourth Edition. Lab solutions are only available to instructors and are not printed inside the book. The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons guide you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the key term quiz helps to build your vocabulary.
This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The minimum version of Vim required for each hack is clearly indicated. If you are a Vim user who wants to get more out of this legendary text editor, this book is for you. It focuses on making life easier for intermediate to experienced Vim users.
A quick guide to better IT Service Management Many organisations rely on a mishmash of different technologies and ad hoc working practices to deliver products and services. This makes it very difficult to make changes, measure effectiveness and improve service levels. Better for you, better for your customers Employing a structured IT Service Management system will enable your organisation to identify how to improve the service you deliver to your customers. The international standard for IT Service management is ISO/IEC 20000. Achieving compliance with this standard brings real operational benefits and shows new and potential customers that your organisation is efficient, reliable and trustworthy. The ISO/IEC 20000 standard This pocket guide is a handy reference to the key information on ISO/IEC 20000. It features an overview of the purpose of the standard and shows how to use it. It explains qualification programmes, certification schemes and the interrelationship of ISO20000 with other standards, such as ISO27001. The overall emphasis of the guide is on ISO20000's customer-driven approach to ensure your IT service management processes align with the needs of your business.
Although backup and recovery seems as simple as copying bits from point to point, it is far more challenging to implement properly when considering the details involved. This book captures the decades of backup and storage experience that Gareth Fraser-King and Guy Bunker have in the industry and make them ideally suited to provide the insights and questions you should be asking of your backup vendor or provider.Pat Hanavan, Vice President, Symantec Corporation
The Ultimate Learning Guide for SAP BW Consultants With Certification Review Questions, Answers, and Explanations! It's clear that SAP BW is one of the most challenging areas in SAP. And learning can be difficult. SAP BW Ultimate Interview Questions, Answers, and Explanations guides you through your learning process. From helping you to assess your BW skills to evaluating candidates for a job, SAP BW Interview Questions will put you on the path to understanding what you really need to know. The book is organized around five areas of SAP BW: Extraction, Modeling and Configuration, Transformation and Administration, Presentation and Analysis, and finally, Performance Tuning. More than just a rehash of SAP documentation and sales presentations, each question is based on project knowledge and experience gained on successful high-profile SAP implementations.;Key interview topics include: - The most important BW settings to know - BW tables and transaction code quick references - Certification Examination Questions - Extraction, Modeling and Configuration - Transformations and Administration - Performance Tuning, Tips & Tricks, and FAQ - Everything a BW resource needs to know before an interview
This book is perfect for any network administrator looking to push their servers to improved performance or to perform uncustomary tasks. Provides undocumented techniques for installation, networking, multimedia tools, disk checking, migration (single and multiCPUs), backup, IIS tuning, Active Directory, memory, upgrades, and much more.
First Practical Guide to Integrating Risk Management, Business Continuity Management and Corporate Governance From Two World-Renowned BCM Pioneers Who Have Served on the British Standards Institution (BSI) Team Creating a British and International Standard for Risk Management. The U.S. Department of Homeland Security (DHS) is currently developing disaster preparedness standards for businesses. DHS is incorporating language from the British Standards Institution (BSI) because it "provides a management systems approach to business continuity and integrates risk management disciplines and processes." The two authors of this now classic text in the field have been directly involved in developing those BSI standards. Here they bring you a distillation of their worldwide experience in pioneering the integration of the disciplines of risk management and business continuity. This practical guide is endorsed by: * * * The Business Continuity Institute * * * The Institute for Risk Management * * * Disaster Recovery Institute International It includes numerous helpful features: * * * Chapter objectives, summaries and bibliographies; charts, sample forms, checklists throughout * * * Plentiful case studies, in boxed text, drawn from enterprises around the globe, including the UK, US, Europe, Australia, Asia, etc. * * * Boxed inserts summarizing key concepts * * * Glossy of 150 risk management and business continuity terms * * * Timely topics, including stakeholder management, supplier management, outsourcing, the people factor, technology recovery, and communication, both internally and externally. * * * Wide range of challenges, including supply chain disruptions, media and brand attack, product contamination and product recall, bomb threats, chemical and biological threats, etc. * * * Instructions for designing/executing team exercises with role playing to rehearse scenarios * * * Guidance on how to develop a business continuity plan, including a Business Impact Analysis * * * Ideal for senior undergraduate, MBA, certificate, corporate training programs; in use at 50+ campuses worldwide * * * Instructor Materials on CD, including PowerPoint slides and syllabus for 12-week course with lecture outlines/notes, quizzes, reading assignments, discussion topics, projects * * * Authors with extensive international experience in all aspects of risk management and business continuity, having worked with organizations in a combined total of 50 countries The authors' message is that risk management has become a strategic tool in managing all risk across an organization, and that BCM forms one more important tool in a much wider and coordinated risk management program. They are now complementary disciplines that must be understood and supported by your organization as a whole, including CEO's, directors, non- executive directors, risk managers, continuity managers, internal and external auditors, investment managers, compliance managers, finance directors, human resource managers, project managers, regulators, corporate trainers and other stakeholders. After discussing the relationship between risk management and BCM, the authors take the reader through the business continuity management cycle: how to understand the organization and its culture; continuity strategies; how to develop and implement a business continuity response, including developing a Business Impact Analysis; building and embedding a business continuity culture; testing/exercising a plan, along with benchmarking, maintenance and audit. "This book is a must read for those senior managers, risk managers and continuity managers who have the vision to see both the new opportunities and the new responsibilities of business continuity management." - George J. Mitchell, Chairman, DLA Piper Rudnick Gray Cary; Former Senate Majority Leader and U.S. Senator for Maine. |
You may like...
Biomaterials for 3D Tumor Modeling
Subhas C. Kundu, Rui L. Reis
Paperback
R5,967
Discovery Miles 59 670
Learning and Teaching Writing Online…
Mary Deane, Teresa Guasch
Hardcover
R3,964
Discovery Miles 39 640
Handbook of Post-Traumatic Therapy
John F. Sommer, Mary Beth Williams
Hardcover
|