0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (7)
  • R500+ (825)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Glaser on Health Care IT - Perspectives from the Decade that Defined Health Care Information Technology (Hardcover): John P.... Glaser on Health Care IT - Perspectives from the Decade that Defined Health Care Information Technology (Hardcover)
John P. Glaser
R2,595 Discovery Miles 25 950 Ships in 10 - 15 working days

John Glaser has been an astute observer and recognized leader in the health care industry for over thirty years. He has written a regular column for Hospitals & Health Networks in which he comments on a wide range of topics, including improving organizational performance through health information technology (HIT), changes in HIT architecture, challenges in leveraging data, and the evolution of the role of IT leadership. Glaser on Health Care IT: Perspectives from the Decade that Defined Health Care Information Technology is a collection of some of the most widely read articles that have been published in H&HN Daily, H&HN Weekly, and Most Wired Online in the past decade (2005-2015). The columns are dated to show their original publication dates, and the material is organized into four broad themes: HIT Applications and Analytics Challenges Improving Organizational Performance through HIT IT Management Challenges HIT Industry Observations Each section offers readers an intimate look at the myriad issues associated with getting IT "right" and the organizational performance gains that can be achieved in doing so. Moreover, the book examines the power and potential of the technologies available to health care providers today, as well as the transformative nature of those we have yet to fully embrace. From seasoned CIOs and consultants to software developers and nurses, this book provides invaluable insights and guidance to all those seeking to make the delivery of care safer, more effective, and more efficient through the application of health care IT. Foreword by Russ Branzell, President and CEO, College of Healthcare Information Management Executives (CHIME) Co-published with Health Forum, Inc.

Frontiers in Enterprise Integration (Hardcover, New): Li D. Xu Frontiers in Enterprise Integration (Hardcover, New)
Li D. Xu
R5,884 R5,516 Discovery Miles 55 160 Save R368 (6%) Ships in 10 - 15 working days

Enterprise Information Systems (EIS) integrate and support business processes across functional boundaries in a supply chain environment, and have become increasingly popular over the last 15 years. In recent years, more and more enterprises world-wide have adopted EIS such as Enterprise Resource Planning (ERP) for running their businesses. Previously, information systems such as CAD, CAM, MRPII and CRM were widely used for partial functional integration within a business organization. With global operation, global supply chain, and fierce competition in place, there is a need for suitable EIS such as ERP, E-Business or E-Commerce systems to integrate extended enterprises in a supply chain environment with the objective of achieving efficiency, competency, and competitiveness. As a result, there is a growing demand for researching EIS to provide insights into challenges, issues, and solutions related to the design, implementation and management of EIS.
The papers in Frontiers in Enterprise Integration were selected from two premier international conferences: the International Forum of Information Systems Frontiers-Xian International Symposium (IFISF), June 29-30, 2006, Xian, China and the IFIP TC 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (Confenis 2007), October 14-16, Beijing, China. Both events provided an excellent opportunity for EIS academicians and practitioners in the world to gather and exchange ideas, and present original research in their fields. Advances in Enterprise Information Systems will be invaluable to scientists, researchers and professionals in EIS.

Grammars and Automata for String Processing - From Mathematics and Computer Science to Biology, and Back (Hardcover, New):... Grammars and Automata for String Processing - From Mathematics and Computer Science to Biology, and Back (Hardcover, New)
Carlos Martin-Vide, Victor Mitrana
R4,096 Discovery Miles 40 960 Ships in 10 - 15 working days


The volume is devoted to a very young field born at the crossroads of molecular biology, linguistics, computer science, and mathematics. Essentially, the contributions in this volume address the structural (syntactical) view of the domain. In this respect, mathematical linguistics and computer science can offer a large variety of adequate tools for modelling complex macromolecules, for analysing and simulating biological ussues. The common trend so far was that biology influenced mathematics and computer science. Now, more and more approaches are parts of a general process of transferring methods and tools from computer science to biology, which corresponds to the reverse influence. The contribuitions in this volume follow such a new trend.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,637 Discovery Miles 26 370 Ships in 10 - 15 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Hardcover, New): James S. Tiller CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Hardcover, New)
James S. Tiller
R4,092 Discovery Miles 40 920 Ships in 10 - 15 working days

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker's perspective and presents a comprehensive framework to help you meet the objectives of penetration testing-including deliverables and the final report.

Microcomputer Systems, Installation and Maintenance (Paperback, 2nd illustrated edition): Robert Philip Beales Microcomputer Systems, Installation and Maintenance (Paperback, 2nd illustrated edition)
Robert Philip Beales
R1,157 Discovery Miles 11 570 Out of stock

The interest in PCs and computer technology has spawned a host of courses in microcomputer technology (both traditional FE courses and more adult retraining). This title was written for the demands of such courses at advanced FE level, in particular the CG 7361. The emphasis is on practical aspects of hardware handling, and line diagrams and photographs help the reader to identify component parts. Suitable for structured study or interested enthusiasts, the theory and practice is covered in breadth, whilst workbook-type fill-in sections should benefit teachers when lesson-planning.

PC and Mac engineer's handbook (Paperback): Steve Heath PC and Mac engineer's handbook (Paperback)
Steve Heath
R1,779 Discovery Miles 17 790 Out of stock
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Future Internet - Alternative…
Jenifer Winter, Ryota Ono Hardcover R1,440 Discovery Miles 14 400
Tactile Internet - with…
Frank H. P. Fitzek, Shu-Chen Li, … Paperback R2,596 Discovery Miles 25 960
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang Paperback R2,606 Discovery Miles 26 060
Randomly Deployed Wireless Sensor…
XI Chen Paperback R3,004 Discovery Miles 30 040
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
A Study of Black Hole Attack Solutions…
Elahe Fazeldehkordi, I.S. Dr. Amiri, … Paperback R1,277 Discovery Miles 12 770
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, … Paperback R2,667 Discovery Miles 26 670
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,327 Discovery Miles 53 270
Wireless Communication Networks…
Hailong Huang, Andrey V. Savkin, … Paperback R2,763 Discovery Miles 27 630
Autonomic Network Management Principles…
Nazim Agoulmine Paperback R1,840 Discovery Miles 18 400

 

Partners