0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (824)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Connected Medical Devices - Integrating Patient Care Data in Healthcare Systems (Paperback): John Zaleski Connected Medical Devices - Integrating Patient Care Data in Healthcare Systems (Paperback)
John Zaleski
R2,572 Discovery Miles 25 720 Ships in 10 - 15 working days

Within a healthcare enterprise, patient vital signs and other automated measurements are communicated from connected medical devices to end-point systems, such as electronic health records, data warehouses and standalone clinical information systems. Connected Medical Devices: Integrating Patient Care Data in Healthcare Systems explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients. The book begins with a comprehensive overview of the types of medical devices in use today and the ways in which those devices interact, before examining factors such as interoperability standards, patient identification, clinical alerts and regulatory and security considerations. Offering lessons learned from his own experiences managing MDI rollouts in both operating room and intensive care unit settings, the author provides practical guidance for healthcare stakeholders charged with leading an MDI rollout. Topics include working with MDI solution providers, assembling an implementation team and transitioning to go-live. Special features in the book include a glossary of acronyms used throughout the book and sample medical device planning and testing tools.

Frontiers in Enterprise Integration (Hardcover, New): Li D. Xu Frontiers in Enterprise Integration (Hardcover, New)
Li D. Xu
R5,884 R5,516 Discovery Miles 55 160 Save R368 (6%) Ships in 10 - 15 working days

Enterprise Information Systems (EIS) integrate and support business processes across functional boundaries in a supply chain environment, and have become increasingly popular over the last 15 years. In recent years, more and more enterprises world-wide have adopted EIS such as Enterprise Resource Planning (ERP) for running their businesses. Previously, information systems such as CAD, CAM, MRPII and CRM were widely used for partial functional integration within a business organization. With global operation, global supply chain, and fierce competition in place, there is a need for suitable EIS such as ERP, E-Business or E-Commerce systems to integrate extended enterprises in a supply chain environment with the objective of achieving efficiency, competency, and competitiveness. As a result, there is a growing demand for researching EIS to provide insights into challenges, issues, and solutions related to the design, implementation and management of EIS.
The papers in Frontiers in Enterprise Integration were selected from two premier international conferences: the International Forum of Information Systems Frontiers-Xian International Symposium (IFISF), June 29-30, 2006, Xian, China and the IFIP TC 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (Confenis 2007), October 14-16, Beijing, China. Both events provided an excellent opportunity for EIS academicians and practitioners in the world to gather and exchange ideas, and present original research in their fields. Advances in Enterprise Information Systems will be invaluable to scientists, researchers and professionals in EIS.

Grammars and Automata for String Processing - From Mathematics and Computer Science to Biology, and Back (Hardcover, New):... Grammars and Automata for String Processing - From Mathematics and Computer Science to Biology, and Back (Hardcover, New)
Carlos Martin-Vide, Victor Mitrana
R4,096 Discovery Miles 40 960 Ships in 10 - 15 working days


The volume is devoted to a very young field born at the crossroads of molecular biology, linguistics, computer science, and mathematics. Essentially, the contributions in this volume address the structural (syntactical) view of the domain. In this respect, mathematical linguistics and computer science can offer a large variety of adequate tools for modelling complex macromolecules, for analysing and simulating biological ussues. The common trend so far was that biology influenced mathematics and computer science. Now, more and more approaches are parts of a general process of transferring methods and tools from computer science to biology, which corresponds to the reverse influence. The contribuitions in this volume follow such a new trend.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,637 Discovery Miles 26 370 Ships in 10 - 15 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Hardcover, New): James S. Tiller CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Hardcover, New)
James S. Tiller
R4,092 Discovery Miles 40 920 Ships in 10 - 15 working days

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker's perspective and presents a comprehensive framework to help you meet the objectives of penetration testing-including deliverables and the final report.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pearson Edexcel AS and A level…
Paperback  (1)
R458 Discovery Miles 4 580
Prostate Cancer, An Issue of PET…
Harshad R Kulkarni, Abass Alavi Hardcover R1,636 Discovery Miles 16 360
Transforming the Living Legacy of Trauma
Janina Fisher Paperback  (1)
R760 R664 Discovery Miles 6 640
PET/CT Imaging in Tracers Beyond FDG, An…
Mohsen Beheshti Hardcover R1,662 Discovery Miles 16 620
Alternatives to Domestic Violence - A…
Kevin A. Fall, Shareen Howard Hardcover R4,230 Discovery Miles 42 300
Real World Health Care Data Analysis…
Douglas Faries, Xiang Zhang, … Hardcover R2,526 Discovery Miles 25 260
Evidence-Based Vascular Neuroimaging, An…
Ajay Malhotra, Dheeraj Gandhi Hardcover R1,938 Discovery Miles 19 380
Making an Impact on Mental Health - The…
James N. Kirby, Paul Gilbert Paperback R1,294 Discovery Miles 12 940
The Mystery of Transformation
Murray Stein Hardcover R1,010 Discovery Miles 10 100
Multimodal Optical Diagnostics of Cancer
Valery V Tuchin, Jurgen Popp, … Hardcover R4,126 Discovery Miles 41 260

 

Partners