0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (7)
  • R500+ (828)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Self-Stabilization (Paperback): Shlomi Dolev Self-Stabilization (Paperback)
Shlomi Dolev
R1,139 Discovery Miles 11 390 Ships in 18 - 22 working days

Self-stabilization, an important concept to theoreticians and practitioners in distributed computing and communication networks, refers to a system's ability to recover automatically from unexpected faults. In this book Shlomi Dolev presents the fundamentals of self-stabilization and demonstrates the process of designing self-stabilizing distributed systems. He details the algorithms that can be started in an arbitrary state, allowing the system to recover from the faults that brought it to that state. The book proceeds from the basic concept of self-stabilizing algorithms to advanced applications.

Administering SMS (Paperback): Mark Wilkins Administering SMS (Paperback)
Mark Wilkins
R1,249 R1,057 Discovery Miles 10 570 Save R192 (15%) Ships in 18 - 22 working days

-- The hands-on daily bible for administrators working with SMS on large-scale Microsoft networks. Task-by-task instruction rather than overviews of the software and tools. Other essential tasks are covered in detail to get the network administrator quickly up to speed and on to the next job in their inbox.
-- Special elements in each of the Administering books include:
-- Task-at-a-glance labeled in each chapter Table of Contents
-- Task-oriented section guides propels readers directly to task
-- Walk-throughs provide readers with step-by-step instruction
-- Extensive screenshots and figures enhance the walk-throughs
-- Interactive checklists helps evaluate processes
-- Useful notes highlight key tips and warnings
-- For more information concludes the chapters with additional references
-- Troubleshooting shows the readers how to solve most common problems

Computer Networks and Open Systems: An Application Development Perspective - An Application Development Perspective... Computer Networks and Open Systems: An Application Development Perspective - An Application Development Perspective (Paperback)
L. N. Cassel, R. H. Austing
R4,591 Discovery Miles 45 910 Ships in 18 - 22 working days

Computer Networks and Open Systems: An Application Development Perspective covers principles, theory, and techniques of networks and open systems from a practical perspective, using real system and network applications as its basis. The selection of topics forms a core of material in computer networking, emphasizing methods and the environment for application development. The text aims to make readers immediately comfortable in today's networking environment while equipping them to keep pace in one of the fastest moving and most exciting areas of computer system development. Students will enter the study of networking through their own experience as a network users, and they will have the opportunity to practice the kind of networking tasks they will perform in the workplace. The authors take an application development perspective. This point of view reverses that traditional order of networking topics- instead of proceeding from the Physical Layer upward, the authors move from the Application Layer downward.

Windows 2000 Administration (Paperback): George Spalding Windows 2000 Administration (Paperback)
George Spalding
R1,292 R1,101 Discovery Miles 11 010 Save R191 (15%) Ships in 18 - 22 working days

Implement and manage Microsoft's revolutionary directory-enabled platform.

Plan, deploy, and administer Windows 2000 in your enterprise. Windows 2000 Administration offers expert advice on all installation, migration, and management issues and provides in-depth details on Windows 2000 features, including the Active Directory, Microsoft Management Console (MMC), and Intellimirror. You'll also get complete information on the new security, backup, and disaster recovery options. No network administrator should be without this essential guide.

  • Install, configure, and deploy essential Windows 2000 network services, such as Dynamic DNS and Dynamic Host Configuration Protocol (DHCP)
  • Manage a secure, distributed network using the Active Directory
  • Create and organize AD objects - domains, organizational units (OUs), users, groups, computers, printers, and shared folders
  • Implement the Windows 2000 NTFSv5 File System and the Storage Management features
  • Take advantage of centralized deployment and administration features--offline folders, remote OS install, and the Group Policy-based controls of Intellimirror
  • Administer the entire enterprise from within the MMC
  • Enable remote access with Routing and Remote Access Service (RRAS)
  • Secure your network using Kerberos v5, file encryption, Public Key Infrastructure (PKI) support, and Windows File Protection
  • Backup to Zip drives, CDs, other hard drives or volumes, and tapes
UNIX Backup and Recovery (Paperback): W.Curtis Preston UNIX Backup and Recovery (Paperback)
W.Curtis Preston
R1,289 Discovery Miles 12 890 Ships in 10 - 15 working days

This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities.

The Systems Librarian - Designing Roles, Defining Skills (Paperback): The Systems Librarian - Designing Roles, Defining Skills (Paperback)
R1,089 Discovery Miles 10 890 Ships in 18 - 22 working days

What is a systems librarian? Both history and practice indicate a wide variation in the field, strong commitments to local arrangements and a lack of functional standards. Library administrators and managers struggle with the broad requirements of the position, weighing the skill sets of degree holding professionals and the non-MLS technologists. Systems librarians are often designers, planners, implementors, consultants, technology representatives or facilitators. This text provides an assessment of what system librarianship is and what it can be, outlining the type of training needed for people to fill these positions, and illustrates challenges for libraries - and systems librarians - in computing and networking.

Black Box Testing - Techniques for Functional Testing of Software & Systems (Paperback): B Beizer Black Box Testing - Techniques for Functional Testing of Software & Systems (Paperback)
B Beizer
R1,119 R947 Discovery Miles 9 470 Save R172 (15%) Ships in 18 - 22 working days

From a leading expositor of testing methods, a practical, comprehensive, hands-on guide to the state-of-the-art black-box testing techniques

This book fills a long-standing need in the software and general systems development communities to make the essential aspects of black-box testing available in one comprehensive work. Written by one of the world's most respected figures in the field of testing, it is both a valuable working resource for independent testers and programmers and an excellent practical introduction for students. Dr. Boris Beizer clearly explains the principles behind behavioral testing in general and behind the most important black-box testing techniques in use today, which involve testing a system based on its desired behavior or function and for conformance to its specifications. Then, with fully worked examples, he leads you step-by-step from specifications to finished test cases.

Complete coverage of all important test techniquesæincluding those that apply to object-oriented software

  • Up-to-dateæincluding the most recent breakthroughs in domain testing that now make this technique available to the working tester with no tools needed beyond a calculator or spreadsheet
  • Examples based on the popular off-the-shelf tax preparation packages let you try the techniques on your favorite tax software
  • Includes all necessary IRS tax forms
  • Self-evaluation quizzes help you evaluate your understanding of the material
Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover)
Cyrus F Nourani
R2,697 Discovery Miles 26 970 Ships in 10 - 15 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security... Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security Standard (Hardcover)
Heru Susanto, Mohammad Nabil Almunawar
R2,808 Discovery Miles 28 080 Ships in 10 - 15 working days

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

Effective Coding with VHDL - Principles and Best Practice (Hardcover): Ricardo Jasinski Effective Coding with VHDL - Principles and Best Practice (Hardcover)
Ricardo Jasinski
R1,489 R1,387 Discovery Miles 13 870 Save R102 (7%) Ships in 9 - 17 working days

A guide to applying software design principles and coding practices to VHDL to improve the readability, maintainability, and quality of VHDL code. This book addresses an often-neglected aspect of the creation of VHDL designs. A VHDL description is also source code, and VHDL designers can use the best practices of software development to write high-quality code and to organize it in a design. This book presents this unique set of skills, teaching VHDL designers of all experience levels how to apply the best design principles and coding practices from the software world to the world of hardware. The concepts introduced here will help readers write code that is easier to understand and more likely to be correct, with improved readability, maintainability, and overall quality. After a brief review of VHDL, the book presents fundamental design principles for writing code, discussing such topics as design, quality, architecture, modularity, abstraction, and hierarchy. Building on these concepts, the book then introduces and provides recommendations for each basic element of VHDL code, including statements, design units, types, data objects, and subprograms. The book covers naming data objects and functions, commenting the source code, and visually presenting the code on the screen. All recommendations are supported by detailed rationales. Finally, the book explores two uses of VHDL: synthesis and testbenches. It examines the key characteristics of code intended for synthesis (distinguishing it from code meant for simulation) and then demonstrates the design and implementation of testbenches with a series of examples that verify different kinds of models, including combinational, sequential, and FSM code. Examples from the book are also available on a companion website, enabling the reader to experiment with the complete source code.

Introduction to Healthcare Information - Enabling Technologies (Paperback): Raymond Gensinger Introduction to Healthcare Information - Enabling Technologies (Paperback)
Raymond Gensinger
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

Based on HIMSS' highly successful Annual Conference workshop, "Introduction to Healthcare and IT Enabling Technologies: All You Wanted to Know and Were Afraid to Ask," this book is a valuable resource for individuals new to healthcare, healthcare professionals transitioning into the field of information technology, students or anyone wanting a better understanding of the role IT plays within today's healthcare system. The book introduces many enabling technologies currently used within healthcare, including electronic health records, personal health records, medication dispensing devices, bioelectronic equipment and patient identification technologies. In addition, the books contributors--nationally recognized leaders of their organizations' successful IT implementations--explore how external influences, such as the evolving legislative activities in Washington DC, are responsible for the rapid changes facing health IT today. With chapters focused on IT use from bedside to board room, Introduction to Healthcare Information Enabling Technologies examines today's health IT environment from various stakeholder perspectives, including nurses, physicians and the C-Suite--CEO, CFO and CIO. (2010.)

Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover): Mounir Kehal, Shahira El Alfy Data Analytics in Marketing, Entrepreneurship, and Innovation (Hardcover)
Mounir Kehal, Shahira El Alfy
R2,468 R894 Discovery Miles 8 940 Save R1,574 (64%) Ships in 9 - 17 working days

Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analytics Applying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analytics Developing new products Technopreneurship Disruptive versus incremental innovation The book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.

Mobile Networks and Management - First International Conference, MONAMI 2009, Athens, Greece, October 13-14, 2009. Revised... Mobile Networks and Management - First International Conference, MONAMI 2009, Athens, Greece, October 13-14, 2009. Revised Selected Papers (Paperback, Edition.)
Kostas Pentikousis, Oliver Blume, Ramon Aguero, Symeon Papavassiliou
R1,911 R1,617 Discovery Miles 16 170 Save R294 (15%) Out of stock

The First International ICST Conference on Mobile Networks and Management (MONAMI) was held in Athens, Greece during October 13-14, 2009, hosted by the National Technical University of Athens. Through what we hope will be a long-lasting series of events, this new international conference aims at bringing together top - searchers, academics, and practitioners specializing in the area of mobile network management. Multiaccess and resource management, mobility management, and n- work management have emerged as core topics in the design, deployment, and ope- tion of current and future networks. Yet, they are treated as separate, isolated domains with very little interaction between the experts in these fields and lack cro- pollination. MONAMI 2009 offered the opportunity to leading researchers, industry professionals, and academics to meet and discuss the latest advances in these areas and present results related to technologies for true plug-and-play networking, efficient use of all infrastructure investments, and access competition. MONAMI 2009 featured eight full papers and five short papers, which were - lected after a thorough peer-review process based on their relevance to the scope of the conference and their technical merit. The overall acceptance rate was 50%. The contributing authors covered a range of topics in mobile networks and their mana- ment that are currently of high interest in the wireless research area.

Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover):... Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover)
Benoit Claise, Joe Clarke, Jan Lindblad
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

Today, networks must evolve and scale faster than ever. You can't manage everything by hand anymore: You need to automate relentlessly. YANG, along with the NETCONF, RESTCONF, or gRPC/gNMI protocols, is the most practical solution, but most implementers have had to learn by trial and error. Now, Network Programmability with YANG gives you complete and reliable guidance for unlocking the full power of network automation using model-driven APIs and protocols. Authored by three YANG pioneers, this plain-spoken book guides you through successfully applying software practices based on YANG data models. The authors focus on the network operations layer, emphasizing model-driven APIs, and underlying transports. Whether you're a network operator, DevOps engineer, software developer, orchestration engineer, NMS/OSS architect, service engineer, or manager, this guide can help you dramatically improve value, agility, and manageability throughout your network. Discover the value of implementing YANG and Data Model-Driven Management in your network Explore the layers and components of a complete working solution Build a business case where value increases as your solution grows Drill down into transport protocols: NETCONF, RESTCONF, and gNMI/gRPC See how telemetry can establish a valuable automated feedback loop Find data models you can build on, and evaluate models with similar functionality Understand models, metadata, and tools from several viewpoints: architect, operator, module author, and application developer Walk through a complete automation journey: business case, service model, service implementation, device integration, and operation Leverage the authors' experience to design successful YANG models and avoid pitfalls

Effective Processes for Quality Assurance (Paperback): Boyd L. Summers Effective Processes for Quality Assurance (Paperback)
Boyd L. Summers
R1,371 R1,258 Discovery Miles 12 580 Save R113 (8%) Ships in 10 - 15 working days

Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.

Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover): J. J. Stapleton Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover)
J. J. Stapleton
R3,308 Discovery Miles 33 080 Ships in 9 - 17 working days

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics. Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.

Principles of Network and System Administration 2e (Paperback, 2nd Edition): M Burgess Principles of Network and System Administration 2e (Paperback, 2nd Edition)
M Burgess
R2,164 Discovery Miles 21 640 Ships in 18 - 22 working days

This is a single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day to day administration, maintenance, and support of computer systems and networks. The author approaches both network and system administration from the perspective of the principles that do not change on a day to day basis. He shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements. The new coverage includes Java services and Ipv6.

UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback): P Roques UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback)
P Roques
R1,271 R1,059 Discovery Miles 10 590 Save R212 (17%) Ships in 18 - 22 working days

* Offers comprehensive coverage of all major modeling viewpoints
* Provides details of collaboration and class diagrams for filling in the design-level models

Kya Hai Network Marketing Jaaniyen (Hindi, Paperback): Surya Sinha Kya Hai Network Marketing Jaaniyen (Hindi, Paperback)
Surya Sinha
R576 Discovery Miles 5 760 Ships in 18 - 22 working days
Network Security with NetFlow  and IPFIX - Big Data Analytics for Information Security (Paperback): Omar Santos Network Security with NetFlow and IPFIX - Big Data Analytics for Information Security (Paperback)
Omar Santos
R1,283 Discovery Miles 12 830 Ships in 18 - 22 working days

A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Network Security with NetFlow and IPFIX is a key resource for introducing yourself to and understanding the power behind the Cisco NetFlow solution. Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of numerous books including the CCNA Security 210-260 Official Cert Guide, details the importance of NetFlow and demonstrates how it can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This book also examines NetFlow's potential as a powerful network security tool. Network Security with NetFlow and IPFIX explores everything you need to know to fully understand and implement the Cisco Cyber Threat Defense Solution. It also provides detailed configuration and troubleshooting guidance, sample configurations with depth analysis of design scenarios in every chapter, and detailed case studies with real-life scenarios. You can follow Omar on Twitter: @santosomar NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies

Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback): Surya Sinha Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback)
Surya Sinha
R464 Discovery Miles 4 640 Ships in 18 - 22 working days
Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover): Maryann Simmons Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover)
Maryann Simmons
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

In this book, new developments in network coding and data compression are examined. The first chapter proposes a new multipath transmission scheme that employs network coding at the source for rate-delay adaptation. The second chapter presents the theory, applications and challenges of a physical-layer network coding technique that promises significant improvement to the spectral efficiency and interference mitigation challenges in future heterogenous cellular and wireless networks. In this third chapter, network and distributed turbo coding based HARQ protocol are examined for wireless broadcasting systems. The last three chapters included in this book present three models that are based on Data Envelopment Analysis (DEA) methodology to appropriately evaluate the efficiency of multicast energy and further minimizes energy transmission in wireless networks without affecting the overall network performance; the development of methods of experimental statistical modeling of physical laws and the cascade scheme of data compression in multimode fibre systems.

Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.):... Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.)
Kenneth L Fulmer; Edited by Philip Jan Rothstein
R1,168 Discovery Miles 11 680 Ships in 18 - 22 working days

Your businessa survival depends on a solid business continuity and disaster recover plan. If you are overwhelmed by the very thought of creating a continuity plan for your business, this is the book for you.

It acknowledges the day-to-day realities of running an enterprise or any size by taking you step-by-step through the generally accepted abest practices, a enabling you to construct an appropriately sized recovery plan. It will neither overwhelm you nor break the bank and it will get your business continuity program running surprisingly fast and with a lot less effort than you expect. The author uses straightforward, jargon-free writing and supplements it with checklists, tables and worksheets to illustrate the easiest path to your destination.

Once you have the basic structure in place, you can refer back to this guide time and time again to build on your business continuity plan as your business evolves. The simplicity of this reference and the accompanying materials on CD-ROM will allay your concerns and allow you to confidently devote more time and resources to this critical process. As you move through the steps, you will see the practical and measurable results of a business that is becoming more resilient, more agile, and better prepared to take advantage of the next business change.

SAP MM: Interview Questions, Answers, and Explanations (Paperback): Jordan Schliem SAP MM: Interview Questions, Answers, and Explanations (Paperback)
Jordan Schliem
R792 Discovery Miles 7 920 Ships in 18 - 22 working days

The Comprehensive Guide for SAP MM Consultants and Managers SAP MM Certification Questions, Answers, and Explanations! It's clear that MM is one of the core modules in SAP, but finding relevant resources can be difficult. SAP MM Interview Questions, Answers, and Explanations will guide you through your learning process. From helping to assess the skills you will need for your team to how to choose a project resource, SAP MM Interview Questions will put you on the path to understanding what resources really know. The book is organized around three areas of the MM module: configuration, troubleshooting, and production support. Each question includes everything you need to know to master the interview or properly evaluate a candidate. More than just a rehash of SAP documentation and sales presentations, each question is based on project knowledge and experience gained on successful high-profile SAP MM implementation projects.;Key interview topics include: - The most important MM Configuration to know - Common MM Implementation Scenarios - MM Certification Exam Questions - Consumption Based Planning - Warehouse Management - Material Master Creation and Planning - Purchasing Document Inforecords

Computer Organisation and Architecture - An Introduction (Paperback, 2nd ed. 2003): B.S. Chalk, Antony Carter, Robert Hind Computer Organisation and Architecture - An Introduction (Paperback, 2nd ed. 2003)
B.S. Chalk, Antony Carter, Robert Hind
R2,701 Discovery Miles 27 010 Ships in 18 - 22 working days

This book describes how a computer works and explains how the various hardware components are organized and interconnected to provide a platform upon which programs can be executed. It takes a simple, step-by-step approach suitable for first year undergraduates coming to the subject for the first time. The second edition of this book has been thoroughly updated to cover new developments in the field and includes new diagrams and end-of-chapter exercises. It will also be accompanied by a lecturer and student web site which will contain solutions to exercises, further exercises, PowerPoint slides and all the source code used in the book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Crack the Maths Code Study Guide Grade…
Sedzani Brian Godzwana Paperback R295 R270 Discovery Miles 2 700
The Craft of La Fontaine
Maya Slater Hardcover R5,599 Discovery Miles 55 990
Power Maths 2nd Edition Practice Book 2B
Tony Staneff, Josh Lury Paperback R132 Discovery Miles 1 320
Queer Virgins and Virgin Queans on the…
Mary Bly Hardcover R4,646 Discovery Miles 46 460
Neri&Hu Design and Research Office…
Neri&Hu Design And Research Office Hardcover R1,083 Discovery Miles 10 830
Platinum Instamaths: Grade 6 CAPS
H. Barry, W. Colyn, … Paperback  (3)
R116 Discovery Miles 1 160
Architectural Ragtime - The Houses of…
Michael D Alcorn, Christopher R Dimattei Hardcover R2,172 Discovery Miles 21 720
Pearson Edexcel GCSE (9-1) Mathematics…
Paperback R546 Discovery Miles 5 460
The Complete Letters of Lady Mary…
Mary Wortley Montagu Hardcover R2,303 Discovery Miles 23 030
Middleton & Rowley - Forms of…
David Nicol Hardcover R1,633 Discovery Miles 16 330

 

Partners