0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (5)
  • R500+ (823)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Black Box Testing - Techniques for Functional Testing of Software & Systems (Paperback): B Beizer Black Box Testing - Techniques for Functional Testing of Software & Systems (Paperback)
B Beizer
R1,119 R947 Discovery Miles 9 470 Save R172 (15%) Ships in 18 - 22 working days

From a leading expositor of testing methods, a practical, comprehensive, hands-on guide to the state-of-the-art black-box testing techniques

This book fills a long-standing need in the software and general systems development communities to make the essential aspects of black-box testing available in one comprehensive work. Written by one of the world's most respected figures in the field of testing, it is both a valuable working resource for independent testers and programmers and an excellent practical introduction for students. Dr. Boris Beizer clearly explains the principles behind behavioral testing in general and behind the most important black-box testing techniques in use today, which involve testing a system based on its desired behavior or function and for conformance to its specifications. Then, with fully worked examples, he leads you step-by-step from specifications to finished test cases.

Complete coverage of all important test techniquesæincluding those that apply to object-oriented software

  • Up-to-dateæincluding the most recent breakthroughs in domain testing that now make this technique available to the working tester with no tools needed beyond a calculator or spreadsheet
  • Examples based on the popular off-the-shelf tax preparation packages let you try the techniques on your favorite tax software
  • Includes all necessary IRS tax forms
  • Self-evaluation quizzes help you evaluate your understanding of the material
Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover): Cyrus F Nourani Ecosystems and Technology - Idea Generation and Content Model Processing (Hardcover)
Cyrus F Nourani
R2,697 Discovery Miles 26 970 Ships in 10 - 15 working days

Ecosystems and Technology: Idea Generation and Content Model Processing, presents important new innovations in the area of management and computing. Innovation is the generation and application of new ideas and skills to produce new products, processes, and services that improve economic and social prosperity. This includes management and design policy decisions and encompasses innovation research, analysis, and best practice in enterprises, public and private sector service organizations, government, regional societies and economies. The book, the first volume in the Innovation Management and Computing book series, looks at technology that improves efficiency and idea generation, including systems for business, medical/health, education, and more. The book provides detailed examples to provide readers with current issues, including Venture planning for innovations New technologies supporting innovations systems Competitive business modeling Context-driven innovation modeling The generation of ideas faster The measurement of relevant data Virtual interfaces Business intelligence and content processing Predictive modeling Haptic expression and emotion recognition innovations, with applications to neurocognitive medical science This book provides a wealth of information that will be useful for IT and business professionals, educators, and students in many fields.

Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security... Information Security Management Systems - A Novel Framework and Software as a Tool for Compliance with Information Security Standard (Hardcover)
Heru Susanto, Mohammad Nabil Almunawar
R2,808 Discovery Miles 28 080 Ships in 10 - 15 working days

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances. It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001. The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

Introduction to Healthcare Information - Enabling Technologies (Paperback): Raymond Gensinger Introduction to Healthcare Information - Enabling Technologies (Paperback)
Raymond Gensinger
R2,026 Discovery Miles 20 260 Ships in 10 - 15 working days

Based on HIMSS' highly successful Annual Conference workshop, "Introduction to Healthcare and IT Enabling Technologies: All You Wanted to Know and Were Afraid to Ask," this book is a valuable resource for individuals new to healthcare, healthcare professionals transitioning into the field of information technology, students or anyone wanting a better understanding of the role IT plays within today's healthcare system. The book introduces many enabling technologies currently used within healthcare, including electronic health records, personal health records, medication dispensing devices, bioelectronic equipment and patient identification technologies. In addition, the books contributors--nationally recognized leaders of their organizations' successful IT implementations--explore how external influences, such as the evolving legislative activities in Washington DC, are responsible for the rapid changes facing health IT today. With chapters focused on IT use from bedside to board room, Introduction to Healthcare Information Enabling Technologies examines today's health IT environment from various stakeholder perspectives, including nurses, physicians and the C-Suite--CEO, CFO and CIO. (2010.)

Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover):... Network Programmability with YANG - The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI (Hardcover)
Benoit Claise, Joe Clarke, Jan Lindblad
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

Today, networks must evolve and scale faster than ever. You can't manage everything by hand anymore: You need to automate relentlessly. YANG, along with the NETCONF, RESTCONF, or gRPC/gNMI protocols, is the most practical solution, but most implementers have had to learn by trial and error. Now, Network Programmability with YANG gives you complete and reliable guidance for unlocking the full power of network automation using model-driven APIs and protocols. Authored by three YANG pioneers, this plain-spoken book guides you through successfully applying software practices based on YANG data models. The authors focus on the network operations layer, emphasizing model-driven APIs, and underlying transports. Whether you're a network operator, DevOps engineer, software developer, orchestration engineer, NMS/OSS architect, service engineer, or manager, this guide can help you dramatically improve value, agility, and manageability throughout your network. Discover the value of implementing YANG and Data Model-Driven Management in your network Explore the layers and components of a complete working solution Build a business case where value increases as your solution grows Drill down into transport protocols: NETCONF, RESTCONF, and gNMI/gRPC See how telemetry can establish a valuable automated feedback loop Find data models you can build on, and evaluate models with similar functionality Understand models, metadata, and tools from several viewpoints: architect, operator, module author, and application developer Walk through a complete automation journey: business case, service model, service implementation, device integration, and operation Leverage the authors' experience to design successful YANG models and avoid pitfalls

Effective Processes for Quality Assurance (Paperback): Boyd L. Summers Effective Processes for Quality Assurance (Paperback)
Boyd L. Summers
R1,371 R1,154 Discovery Miles 11 540 Save R217 (16%) Ships in 10 - 15 working days

Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.

Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover): J. J. Stapleton Security without Obscurity - A Guide to Confidentiality, Authentication, and Integrity (Hardcover)
J. J. Stapleton
R3,308 Discovery Miles 33 080 Ships in 9 - 17 working days

The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity fills this need. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. It shares the author's knowledge, insights, and observations about information security based on his experience developing dozens of ISO Technical Committee 68 and ANSI accredited X9 standards. Starting with the fundamentals, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. The text delves beyond the typical cryptographic abstracts of encryption and digital signatures as the fundamental security controls to explain how to implement them into applications, policies, and procedures to meet business and compliance requirements. Providing you with a foundation in cryptography, it keeps things simple regarding symmetric versus asymmetric cryptography, and only refers to algorithms in general, without going too deeply into complex mathematics. Presenting comprehensive and in-depth coverage of confidentiality, integrity, authentication, non-repudiation, privacy, and key management, this book supplies authoritative insight into the commonalities and differences of various users, providers, and regulators in the U.S. and abroad.

Grammars and Automata for String Processing - From Mathematics and Computer Science to Biology, and Back (Hardcover, New):... Grammars and Automata for String Processing - From Mathematics and Computer Science to Biology, and Back (Hardcover, New)
Carlos Martin-Vide, Victor Mitrana
R4,096 Discovery Miles 40 960 Ships in 10 - 15 working days


The volume is devoted to a very young field born at the crossroads of molecular biology, linguistics, computer science, and mathematics. Essentially, the contributions in this volume address the structural (syntactical) view of the domain. In this respect, mathematical linguistics and computer science can offer a large variety of adequate tools for modelling complex macromolecules, for analysing and simulating biological ussues. The common trend so far was that biology influenced mathematics and computer science. Now, more and more approaches are parts of a general process of transferring methods and tools from computer science to biology, which corresponds to the reverse influence. The contribuitions in this volume follow such a new trend.

Principles of Network and System Administration 2e (Paperback, 2nd Edition): M Burgess Principles of Network and System Administration 2e (Paperback, 2nd Edition)
M Burgess
R2,164 Discovery Miles 21 640 Ships in 18 - 22 working days

This is a single, comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day to day administration, maintenance, and support of computer systems and networks. The author approaches both network and system administration from the perspective of the principles that do not change on a day to day basis. He shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements. The new coverage includes Java services and Ipv6.

UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback): P Roques UML in Practice - The Art of Modeling Software Systems Demonstrated Through Worked Examples and Solutions (Paperback)
P Roques
R1,271 R1,059 Discovery Miles 10 590 Save R212 (17%) Ships in 18 - 22 working days

* Offers comprehensive coverage of all major modeling viewpoints
* Provides details of collaboration and class diagrams for filling in the design-level models

Effective Coding with VHDL - Principles and Best Practice (Hardcover): Ricardo Jasinski Effective Coding with VHDL - Principles and Best Practice (Hardcover)
Ricardo Jasinski
R1,489 R1,387 Discovery Miles 13 870 Save R102 (7%) Ships in 9 - 17 working days

A guide to applying software design principles and coding practices to VHDL to improve the readability, maintainability, and quality of VHDL code. This book addresses an often-neglected aspect of the creation of VHDL designs. A VHDL description is also source code, and VHDL designers can use the best practices of software development to write high-quality code and to organize it in a design. This book presents this unique set of skills, teaching VHDL designers of all experience levels how to apply the best design principles and coding practices from the software world to the world of hardware. The concepts introduced here will help readers write code that is easier to understand and more likely to be correct, with improved readability, maintainability, and overall quality. After a brief review of VHDL, the book presents fundamental design principles for writing code, discussing such topics as design, quality, architecture, modularity, abstraction, and hierarchy. Building on these concepts, the book then introduces and provides recommendations for each basic element of VHDL code, including statements, design units, types, data objects, and subprograms. The book covers naming data objects and functions, commenting the source code, and visually presenting the code on the screen. All recommendations are supported by detailed rationales. Finally, the book explores two uses of VHDL: synthesis and testbenches. It examines the key characteristics of code intended for synthesis (distinguishing it from code meant for simulation) and then demonstrates the design and implementation of testbenches with a series of examples that verify different kinds of models, including combinational, sequential, and FSM code. Examples from the book are also available on a companion website, enabling the reader to experiment with the complete source code.

Kya Hai Network Marketing Jaaniyen (Hindi, Paperback): Surya Sinha Kya Hai Network Marketing Jaaniyen (Hindi, Paperback)
Surya Sinha
R596 Discovery Miles 5 960 Ships in 18 - 22 working days
Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback): Surya Sinha Network Marketing Sawal Aapke Jawab Surya Sinha Ke (Hindi, Paperback)
Surya Sinha
R487 Discovery Miles 4 870 Ships in 18 - 22 working days
Network Security with NetFlow  and IPFIX - Big Data Analytics for Information Security (Paperback): Omar Santos Network Security with NetFlow and IPFIX - Big Data Analytics for Information Security (Paperback)
Omar Santos
R1,283 Discovery Miles 12 830 Ships in 18 - 22 working days

A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security Today's world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing. Network Security with NetFlow and IPFIX is a key resource for introducing yourself to and understanding the power behind the Cisco NetFlow solution. Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of numerous books including the CCNA Security 210-260 Official Cert Guide, details the importance of NetFlow and demonstrates how it can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. This book also examines NetFlow's potential as a powerful network security tool. Network Security with NetFlow and IPFIX explores everything you need to know to fully understand and implement the Cisco Cyber Threat Defense Solution. It also provides detailed configuration and troubleshooting guidance, sample configurations with depth analysis of design scenarios in every chapter, and detailed case studies with real-life scenarios. You can follow Omar on Twitter: @santosomar NetFlow and IPFIX basics Cisco NetFlow versions and features Cisco Flexible NetFlow NetFlow Commercial and Open Source Software Packages Big Data Analytics tools and technologies such as Hadoop, Flume, Kafka, Storm, Hive, HBase, Elasticsearch, Logstash, Kibana (ELK) Additional Telemetry Sources for Big Data Analytics for Cyber Security Understanding big data scalability Big data analytics in the Internet of everything Cisco Cyber Threat Defense and NetFlow Troubleshooting NetFlow Real-world case studies

Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover): Maryann Simmons Network Coding & Data Compression - Theory, Applications & Challenges (Hardcover)
Maryann Simmons
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

In this book, new developments in network coding and data compression are examined. The first chapter proposes a new multipath transmission scheme that employs network coding at the source for rate-delay adaptation. The second chapter presents the theory, applications and challenges of a physical-layer network coding technique that promises significant improvement to the spectral efficiency and interference mitigation challenges in future heterogenous cellular and wireless networks. In this third chapter, network and distributed turbo coding based HARQ protocol are examined for wireless broadcasting systems. The last three chapters included in this book present three models that are based on Data Envelopment Analysis (DEA) methodology to appropriately evaluate the efficiency of multicast energy and further minimizes energy transmission in wireless networks without affecting the overall network performance; the development of methods of experimental statistical modeling of physical laws and the cascade scheme of data compression in multimode fibre systems.

SAP MM: Interview Questions, Answers, and Explanations (Paperback): Jordan Schliem SAP MM: Interview Questions, Answers, and Explanations (Paperback)
Jordan Schliem
R792 Discovery Miles 7 920 Ships in 18 - 22 working days

The Comprehensive Guide for SAP MM Consultants and Managers SAP MM Certification Questions, Answers, and Explanations! It's clear that MM is one of the core modules in SAP, but finding relevant resources can be difficult. SAP MM Interview Questions, Answers, and Explanations will guide you through your learning process. From helping to assess the skills you will need for your team to how to choose a project resource, SAP MM Interview Questions will put you on the path to understanding what resources really know. The book is organized around three areas of the MM module: configuration, troubleshooting, and production support. Each question includes everything you need to know to master the interview or properly evaluate a candidate. More than just a rehash of SAP documentation and sales presentations, each question is based on project knowledge and experience gained on successful high-profile SAP MM implementation projects.;Key interview topics include: - The most important MM Configuration to know - Common MM Implementation Scenarios - MM Certification Exam Questions - Consumption Based Planning - Warehouse Management - Material Master Creation and Planning - Purchasing Document Inforecords

Data Modeling Essentials (Paperback, 3rd edition): Graeme Simsion, Graham Witt Data Modeling Essentials (Paperback, 3rd edition)
Graeme Simsion, Graham Witt
R2,343 Discovery Miles 23 430 Ships in 18 - 22 working days

"Data Modeling Essentials, Third Edition" provides expert tutelage for data modelers, business analysts and systems designers at all levels. Beginning with the basics, this book provides a thorough grounding in theory before guiding the reader through the various stages of applied data modeling and database design. Later chapters address advanced subjects, including business rules, data warehousing, enterprise-wide modeling and data management.
The third edition of this popular book retains its distinctive hallmarks of readability and usefulness, but has been given significantly expanded coverage and reorganized for greater reader comprehension. Authored by two leaders in the field, "Data Modeling Essentials, Third Edition" is the ideal reference for professionals and students looking for a real-world perspective.
- Thorough coverage of the fundamentals and relevant theory.
- Recognition and support for the creative side of the process.
- Expanded coverage of applied data modeling includes new chapters on logical and physical database design.
- New material describing a powerful technique for model verification.
- Unique coverage of the practical and human aspects of modeling, such as working with business specialists, managing change, and resolving conflict.
- Extensive online component including course notes and other teaching aids (www.mkp.com).
UML diagrams now available! Visit the companion site for more details.
Click here to view a book review by Steve Hoberman!

Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.):... Business Continuity Planning - A Step-by-Step Guide With Planning Forms on CD-ROM, 3rd Edition (Paperback, 3rd Enlarged ed.)
Kenneth L Fulmer; Edited by Philip Jan Rothstein
R1,168 Discovery Miles 11 680 Ships in 18 - 22 working days

Your businessa survival depends on a solid business continuity and disaster recover plan. If you are overwhelmed by the very thought of creating a continuity plan for your business, this is the book for you.

It acknowledges the day-to-day realities of running an enterprise or any size by taking you step-by-step through the generally accepted abest practices, a enabling you to construct an appropriately sized recovery plan. It will neither overwhelm you nor break the bank and it will get your business continuity program running surprisingly fast and with a lot less effort than you expect. The author uses straightforward, jargon-free writing and supplements it with checklists, tables and worksheets to illustrate the easiest path to your destination.

Once you have the basic structure in place, you can refer back to this guide time and time again to build on your business continuity plan as your business evolves. The simplicity of this reference and the accompanying materials on CD-ROM will allay your concerns and allow you to confidently devote more time and resources to this critical process. As you move through the steps, you will see the practical and measurable results of a business that is becoming more resilient, more agile, and better prepared to take advantage of the next business change.

Computer Organisation and Architecture - An Introduction (Paperback, 2nd ed. 2003): B.S. Chalk, Antony Carter, Robert Hind Computer Organisation and Architecture - An Introduction (Paperback, 2nd ed. 2003)
B.S. Chalk, Antony Carter, Robert Hind
R2,701 Discovery Miles 27 010 Ships in 18 - 22 working days

This book describes how a computer works and explains how the various hardware components are organized and interconnected to provide a platform upon which programs can be executed. It takes a simple, step-by-step approach suitable for first year undergraduates coming to the subject for the first time. The second edition of this book has been thoroughly updated to cover new developments in the field and includes new diagrams and end-of-chapter exercises. It will also be accompanied by a lecturer and student web site which will contain solutions to exercises, further exercises, PowerPoint slides and all the source code used in the book.

The CISO Journey - Life Lessons and Concepts to Accelerate Your Professional Development (Hardcover): Eugene Fredriksen The CISO Journey - Life Lessons and Concepts to Accelerate Your Professional Development (Hardcover)
Eugene Fredriksen
R3,793 Discovery Miles 37 930 Ships in 10 - 15 working days

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a "Rule of Information Security" developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.

PMP Exam Challenge! (Paperback, 6th edition): J. LeRoy Ward, Ginger Levin PMP Exam Challenge! (Paperback, 6th edition)
J. LeRoy Ward, Ginger Levin
R1,487 Discovery Miles 14 870 Ships in 10 - 15 working days

Preparing for and passing the PMP (R) exam is no small feat. Although the number of certified PMP (R)s continues at a phenomenal rate, the exam failure rate remains uncommonly high. PMP (R) Exam Challenge! is designed to help readers pass the exam by giving them an easy-to-use, highly portable publication, containing key relevant topics they are certain to encounter on the exam. Featuring 660 practice questions, this sixth edition completely reflects the PMBOK (R) Guide, Fifth Edition and covers the guide's ten knowledge areas.

Software-Defined Data Infrastructure Essentials - Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft... Software-Defined Data Infrastructure Essentials - Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft (Hardcover)
Greg Schulz
R3,995 Discovery Miles 39 950 Ships in 10 - 15 working days

Software-Defined Data Infrastructures Essentials provides fundamental coverage of physical, cloud, converged, and virtual server storage I/O networking technologies, trends, tools, techniques, and tradecraft skills. From webscale, software-defined, containers, database, key-value store, cloud, and enterprise to small or medium-size business, the book is filled with techniques, and tips to help develop or refine your server storage I/O hardware, software, and services skills. Whether you are new to data infrastructures or a seasoned pro, you will find this comprehensive reference indispensable for gaining as well as expanding experience with technologies, tools, techniques, and trends. We had a front row seat watching Greg present live in our education workshop seminar sessions for ITC professionals in the Netherlands material that is in this book. We recommend this amazing book to expand your converged and data infrastructure knowledge from beginners to industry veterans. -Gert and Frank Brouwer, Brouwer Storage Consultancy Software-Defined Data Infrastructures Essentials provides the foundational building blocks to improve your craft in serval areas including applications, clouds, legacy, and more. IT professionals, as well as sales professionals and support personnel, stand to gain a great deal by reading this book.-Mark McSherry, Oracle Regional Sales Manager Looking to expand your data infrastructure IQ? From CIOS to operations, sales to engineering, this book is a comprehensive reference, a must read for IT infrastructure professionals, beginners to seasoned experts.-Tom Becchetti, Advisory Systems Engineer Greg Schulz has provided a complete 'toolkit' for storage management along with the background and framework for the storage or data infrastructure professional or those aspiring to become one.-Greg Brunton, Experienced Storage and Data Management Professional

Security and Auditing of Smart Devices - Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Hardcover):... Security and Auditing of Smart Devices - Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Hardcover)
Sajay Rai, Philip Chukwuma, Richard Cozart
R2,092 Discovery Miles 20 920 Ships in 10 - 15 working days

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.

Glaser on Health Care IT - Perspectives from the Decade that Defined Health Care Information Technology (Hardcover): John P.... Glaser on Health Care IT - Perspectives from the Decade that Defined Health Care Information Technology (Hardcover)
John P. Glaser
R2,595 Discovery Miles 25 950 Ships in 10 - 15 working days

John Glaser has been an astute observer and recognized leader in the health care industry for over thirty years. He has written a regular column for Hospitals & Health Networks in which he comments on a wide range of topics, including improving organizational performance through health information technology (HIT), changes in HIT architecture, challenges in leveraging data, and the evolution of the role of IT leadership. Glaser on Health Care IT: Perspectives from the Decade that Defined Health Care Information Technology is a collection of some of the most widely read articles that have been published in H&HN Daily, H&HN Weekly, and Most Wired Online in the past decade (2005-2015). The columns are dated to show their original publication dates, and the material is organized into four broad themes: HIT Applications and Analytics Challenges Improving Organizational Performance through HIT IT Management Challenges HIT Industry Observations Each section offers readers an intimate look at the myriad issues associated with getting IT "right" and the organizational performance gains that can be achieved in doing so. Moreover, the book examines the power and potential of the technologies available to health care providers today, as well as the transformative nature of those we have yet to fully embrace. From seasoned CIOs and consultants to software developers and nurses, this book provides invaluable insights and guidance to all those seeking to make the delivery of care safer, more effective, and more efficient through the application of health care IT. Foreword by Russ Branzell, President and CEO, College of Healthcare Information Management Executives (CHIME) Co-published with Health Forum, Inc.

Connected Medical Devices - Integrating Patient Care Data in Healthcare Systems (Paperback): John Zaleski Connected Medical Devices - Integrating Patient Care Data in Healthcare Systems (Paperback)
John Zaleski
R2,572 Discovery Miles 25 720 Ships in 10 - 15 working days

Within a healthcare enterprise, patient vital signs and other automated measurements are communicated from connected medical devices to end-point systems, such as electronic health records, data warehouses and standalone clinical information systems. Connected Medical Devices: Integrating Patient Care Data in Healthcare Systems explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients. The book begins with a comprehensive overview of the types of medical devices in use today and the ways in which those devices interact, before examining factors such as interoperability standards, patient identification, clinical alerts and regulatory and security considerations. Offering lessons learned from his own experiences managing MDI rollouts in both operating room and intensive care unit settings, the author provides practical guidance for healthcare stakeholders charged with leading an MDI rollout. Topics include working with MDI solution providers, assembling an implementation team and transitioning to go-live. Special features in the book include a glossary of acronyms used throughout the book and sample medical device planning and testing tools.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Programming Logic & Design…
Joyce Farrell Paperback R1,310 R1,216 Discovery Miles 12 160
Software Project Management for…
Zaigham Mahmood Hardcover R2,713 Discovery Miles 27 130
Emerging Technologies for Semantic Work…
Jorg Rech, Bjorn Decker, … Hardcover R4,591 Discovery Miles 45 910
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad Hardcover R3,940 Discovery Miles 39 400
Building Web Applications with C# and…
Dudley W. Gill Hardcover R5,415 Discovery Miles 54 150
TRIZ - The Theory of Inventive Problem…
Denis Cavallucci Hardcover R4,047 Discovery Miles 40 470
Mathematics, Computer Science and Logic…
Peter Paule Hardcover R1,408 Discovery Miles 14 080
Essential Java for Scientists and…
Brian Hahn, Katherine Malan Paperback R1,266 Discovery Miles 12 660
Advances in Computers, Volume 105
Atif Memon Hardcover R3,927 Discovery Miles 39 270
Advances in Computers, Volume 124
Suyel Namasudra Hardcover R3,941 Discovery Miles 39 410

 

Partners