![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Systems management
"Data Modeling Essentials, Third Edition" provides expert tutelage
for data modelers, business analysts and systems designers at all
levels. Beginning with the basics, this book provides a thorough
grounding in theory before guiding the reader through the various
stages of applied data modeling and database design. Later chapters
address advanced subjects, including business rules, data
warehousing, enterprise-wide modeling and data management.
This book describes how a computer works and explains how the various hardware components are organized and interconnected to provide a platform upon which programs can be executed. It takes a simple, step-by-step approach suitable for first year undergraduates coming to the subject for the first time. The second edition of this book has been thoroughly updated to cover new developments in the field and includes new diagrams and end-of-chapter exercises. It will also be accompanied by a lecturer and student web site which will contain solutions to exercises, further exercises, PowerPoint slides and all the source code used in the book.
Agile is a set of values, principles, techniques, and frameworks for the adaptable, incremental, and efficient delivery of work. Big Data is a rapidly growing field that encompasses crucial aspects of data such as its volume, velocity, variety, and veracity. This book outlines a strategic approach to Big Data that will render a business Agile. It discusses the important competencies required to streamline and focus on the analytics and presents a roadmap for implementing such analytics in business.
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each relating to a "Rule of Information Security" developed through a career of real life experiences. The elements are selected to accelerate the development of CISO skills critical to success. Each segments clearly calls out lessons learned and skills to be developed. The last segment of the book addresses presenting security to senior execs and board members, and provides sample content and materials.
Preparing for and passing the PMP (R) exam is no small feat. Although the number of certified PMP (R)s continues at a phenomenal rate, the exam failure rate remains uncommonly high. PMP (R) Exam Challenge! is designed to help readers pass the exam by giving them an easy-to-use, highly portable publication, containing key relevant topics they are certain to encounter on the exam. Featuring 660 practice questions, this sixth edition completely reflects the PMBOK (R) Guide, Fifth Edition and covers the guide's ten knowledge areas.
Network data are produced automatically by everyday interactions - social networks, power grids, and links between data sets are a few examples. Such data capture social and economic behavior in a form that can be analyzed using powerful computational tools. This book is a guide to both basic and advanced techniques and algorithms for extracting useful information from network data. The content is organized around 'tasks', grouping the algorithms needed to gather specific types of information and thus answer specific types of questions. Examples include similarity between nodes in a network, prestige or centrality of individual nodes, and dense regions or communities in a network. Algorithms are derived in detail and summarized in pseudo-code. The book is intended primarily for computer scientists, engineers, statisticians and physicists, but it is also accessible to network scientists based in the social sciences. MATLAB (R)/Octave code illustrating some of the algorithms will be available at: http://www.cambridge.org/9781107125773.
The Innovation Factory takes a fresh look at the fine art of breakthrough innovation. What makes it unique is that it brings together an experienced scholar and a serial entrepreneur who share the same passion for understanding the processes and theories needed to innovate over and over again. The book marries theory with practical examples focusing on the Concept-Knowledge (C-K) Theory developed by the prestigious school Mines ParisTech. For the first time, you will discover the unknown story of the Swatch watch told by Elmar Mock, the creative engineering force behind the Swatch. In this book, he passionately tells how he helped to create this breakthrough innovation that saved the Swiss watch industry in the 1980s. Gilles Garel, a professor of management, relates this tale of epic innovation to C-K theory and both convincingly argue that organizations can channel creativity to develop breakthrough innovations that disrupt markets. Innovation is not just a case of acquiring aptitude. It is also a question of attitude: Innovators strive to remain creative and active. The book provides an overview of the characteristics and essential strengths of the successful Innovation Factory, Creaholic, based in Switzerland. The example of Creaholic helps readers grasp what breakthrough innovation is truly all about. The book's use of vibrant metaphors helps readers easily digest the ideas and concepts presented. The book concludes with thoughts about future directions for the watch industry.
Software-Defined Data Infrastructures Essentials provides fundamental coverage of physical, cloud, converged, and virtual server storage I/O networking technologies, trends, tools, techniques, and tradecraft skills. From webscale, software-defined, containers, database, key-value store, cloud, and enterprise to small or medium-size business, the book is filled with techniques, and tips to help develop or refine your server storage I/O hardware, software, and services skills. Whether you are new to data infrastructures or a seasoned pro, you will find this comprehensive reference indispensable for gaining as well as expanding experience with technologies, tools, techniques, and trends. We had a front row seat watching Greg present live in our education workshop seminar sessions for ITC professionals in the Netherlands material that is in this book. We recommend this amazing book to expand your converged and data infrastructure knowledge from beginners to industry veterans. -Gert and Frank Brouwer, Brouwer Storage Consultancy Software-Defined Data Infrastructures Essentials provides the foundational building blocks to improve your craft in serval areas including applications, clouds, legacy, and more. IT professionals, as well as sales professionals and support personnel, stand to gain a great deal by reading this book.-Mark McSherry, Oracle Regional Sales Manager Looking to expand your data infrastructure IQ? From CIOS to operations, sales to engineering, this book is a comprehensive reference, a must read for IT infrastructure professionals, beginners to seasoned experts.-Tom Becchetti, Advisory Systems Engineer Greg Schulz has provided a complete 'toolkit' for storage management along with the background and framework for the storage or data infrastructure professional or those aspiring to become one.-Greg Brunton, Experienced Storage and Data Management Professional
The U.S. economy thrives on the development of new products, new systems, and new processes. Usually, these advances start as a flash of inspiration by highly creative individuals. It is complex and difficult to go from initial inspiration to a final product, process, or system. So it is not surprising that approximately one out of every four development programs fails. A development program or project in trouble is distinct from a program encountering typical development difficulties. Such a program or project can appear to be in free fall. This book identifies the essential fundamentals for executing a program or project turnaround effectively. These fundamentals include: Clearly identifying the next critical accomplishment needed for success Assigning responsibility for each program task to one person Capitalizing on colocation and face-to-face communication Recruiting problem solvers Wining commitment from team members Using team accomplishments to propel high team morale The guidance provided in this book is applicable to all program or project genres, including manufacturing, nonprofit work, education, medicine, investment management, and municipal management. Software has become a great part of both providing product functionality and assisting with managing product development. A special chapter devoted to software development dispels common misconceptions and provides guidance for turning around this special type of project or program. This book is a highly valuable source of insight for a wide range of readers, including management professionals, business students, and executive managers. Every member of a product or project development team will find its recommendations to be of high value.
Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an organization culture where security concerns are inherent in all aspects of organization development and management. While there is not a single one-size-fits-all security program that will suddenly make your organization more secure, this book provides security professionals and non-security managers with an approach to protecting their organizations from insider threats.
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the IT organization but for the IT auditors as well. This book will serve as a guide to IT and Audit professionals on how to manage, secure and audit smart device. It provides guidance on the handling of corporate devices and the Bring Your Own Devices (BYOD) smart devices.
Written for those starting a career in IT or whose career is well advanced, this career guide shows how to blaze a path to success through the jungle of modern IT. With a career spanning five decades, the author shares lessons he learned the hard way so readers do not have to learn them the hard way. By emphasizing the importance of business processes and applications to IT, this book explains how to understand the value and positioning of hardware and software technology in order to make appropriate decisions. It addresses the importance of IT architecture and the roles service and systems management play. It also explains service level agreements (SLAs) and provides sample SLAs. Readers learn how to conduct IT assessments using SWOT (strengths, weaknesses, opportunities, and threats) analysis. It also shows how to use root-cause analysis (RCA) to detect the sources of failure and poor performance. An overview of risk management and the steps involved in developing a business continuity plan are also included. The book looks at all facets of an IT professional's career. It explains how to build an IT team and examines the roles and responsibilities within the team. It shows how to provide professional customer care to IT clients. Business executives recognize the importance of IT, and this book shows technology professionals how to thrive in the business world. It covers: Making effective presentations Report and proposal writing Negotiating and persuasion skills Running productive meetings Time and stress management The book also discusses such important career skills as listening, continual and incremental learning, and communicating at all levels. From its templates and checklists to its comprehensive and holistic view of a successful IT career, this book is an indispensable guide for every professional working in IT today and tomorrow.
This is an edited book based on the selected submissions made to the conference titled "International Conference in Smart Cities". The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across all domains, typically supported by ICT and open data.
Within a healthcare enterprise, patient vital signs and other automated measurements are communicated from connected medical devices to end-point systems, such as electronic health records, data warehouses and standalone clinical information systems. Connected Medical Devices: Integrating Patient Care Data in Healthcare Systems explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients. The book begins with a comprehensive overview of the types of medical devices in use today and the ways in which those devices interact, before examining factors such as interoperability standards, patient identification, clinical alerts and regulatory and security considerations. Offering lessons learned from his own experiences managing MDI rollouts in both operating room and intensive care unit settings, the author provides practical guidance for healthcare stakeholders charged with leading an MDI rollout. Topics include working with MDI solution providers, assembling an implementation team and transitioning to go-live. Special features in the book include a glossary of acronyms used throughout the book and sample medical device planning and testing tools.
Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis. Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes. Bringing together concepts across software engineering with a project management perspective, Applied Software Risk Management: A Guide for Software Project Managers presents a rigorous, scientific method for identifying, analyzing, and resolving risk.
Do you spend a lot of time during the design process wondering what
users really need? Do you hate those endless meetings where you
argue how the interface should work? Have you ever developed
something that later had to be completely redesigned?
At the foundation of today's leading-edge manufacturing companies is a common vision for virtual, distributed enterprise in an agile environment where organizations can swiftly and cost-effectively bring products from concept to production - and respond dynamically to changes in customer and market requirements. Totally Integrated Enterprises: A Framework and Methodology for Business and Technology Improvement provides a framework and a methodology for understanding and mapping current enterprise configurations as well as for designing the revised architecture needed for the totally integrated enterprise. It also helps you select the MRPII, MES, APS, SCM, or ERP software most appropriate for your needs and for achieving total enterprise integration.
Throughout successive generations of information technology, the importance of the performance evaluation of software, computer architectures, and computer networks endures. For example, the performance issues of transaction processing systems and redundant arrays of independent disks replace the virtual memory and input-output problems of the 70s. ATM performance issues supercede those associated with electronic telephony of the 70s. As performance issues evolve with the technologies, so must our approach to evaluation. In System Performance Evaluation: Methodologies and Applications, top academic and industrial experts review the major issues now faced in this arena. In a series of structured, focused chapters, they present the state-of-the-art in performance methodologies and applications. They address developments in analytical modeling and its interaction with detailed analysis of measurement data. They also discuss performance evaluation methodologies for large-scale software systems - in general and in the context of critical applications, such as nuclear reactor control and air transportation systems. With its particular emphasis on network performance for wireless networks, the Internet, and ATM networking, System Performance Evaluation becomes the ideal vehicle for professionals in computer architecture, networking, and software engineering to stay up-to-date and proficient in this essential aspect of information technology.
After the Y2K Fireworks focuses on the business and technical aspects of surviving the year 2000 problem - from an author conversant with both business (particularly financial) and computer professionals.
PgMP (R) Exam Practice Test and Study Guide, Fourth Edition is the book you need to pass the Program Management Professional (PgMP (R)) exam the first time around. It reflects recent revisions based on PMI (R)'s Standard for Program Management - Third Edition (2013).Based on best practices that complement PMI (R)'s standards, this is the most comprehensive and up-to-date resource available to help you prepare for the exam with new and changed terminology. It includes a list of the major topics covered on the exam organized by the five performance domains-strategic program management, program life cycle, benefits management, stakeholder management, and governance-as presented in the Program Management Professional Examination Content Outline. It also includes helpful tips on how to make the most of the time you have available to prepare for the exam. Just like its bestselling predecessors, this indispensable study guide includes 20 multiple-choice practice questions for each domain along with a comprehensive answer key. The program life cycle domain includes 20 questions for each of the five phases. Each question also has a plainly written rationale for each correct answer with bibliographic references for further study. Two challenging, 170-question practice tests that simulate the actual exam are included in the book and online, so you can retake them as many times as necessary. They also include a rationale and reference. Scores for the online tests are presented as if each question is rated similarly, but this edition also includes a new component: the authors' own weighting system for the level of difficulty for each question. This system will show you what they feel meets the exam's criteria for Proficient, Moderately Proficient, and below Proficient. You then will see your scores by domain in both approaches. Supplying an insider's look at the questions, terminology, and sentence construction you will encounter on the day of the exam, this indispensable study tool is designed to help you pass the exam and achieve the highly sought after PgMP (R) certification.
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker's perspective and presents a comprehensive framework to help you meet the objectives of penetration testing-including deliverables and the final report.
All organizations, whether for profit, not for profit, or government, face issues of information technology management. While the concerns involved may differ from organization to organization, the principles of good information technology management remain the same. Using a compilation of articles on various topics relating to technology management, Handbook of Technology Management in Public Administration addresses the management, implementation, and integration of technology across a wide variety of disciplines. The book highlights lessons learned to assist you in solving contemporary problems and avoiding pitfalls. It discusses the creation of innovative paradigms, new boundaries, diversity frameworks, and operational breakthroughs emanating from technology. It also raises questions about the productivity, violence, and intrusions of technology into the personal, organizational, and social environments as we move forward. This book identifies the potential ethical, legal, and social implications of technology from electronic signatures to genetic screenings to privacy interventions to industrial applications. It raises issues, problems, and concerns arising from technology and its effects on nurturing or nullifying the foundations of life and liberty in a constitutional democracy. With the development of new tools and techniques, technology promises to make organizations more productive and efficient. Handbook of Technology Management in Public Administration identifies effective technology management approaches while balancing the repercussions of technological growth.
Economics and technology have dramatically re-shaped the landscape of software development. It is no longer uncommon to find a software development team dispersed across countries or continents. Geographically distributed development challenges the ability to clearly communicate, enforce standards, ensure quality levels, and coordinate tasks. Global Software Development Handbook explores techniques that can bridge distances, create cohesion, promote quality, and strengthen lines of communication. The book introduces techniques proven successful at international electronics and software giant Siemens AG. It shows how this multinational uses a high-level process framework that balances agility and discipline for globally distributed software development. The authors delineate an organizational structure that not only fosters team building, but also achieves effective collaboration among the central and satellite teams. The handbook explores the issues surrounding quality and the processes required to realize quality in a distributed environment. Communication is a tremendous challenge, especially for teams separated by several time zones, and the authors elucidate how to uncover patterns of communication among these teams to determine effective strategies for managing communication. The authors analyze successful and failed projects and apply this information to how a project can be successful with distributed teams. They also provide lightweight processes that can be dynamically adapted to the demands of any project.
UML for Developing Knowledge Management Systems provides knowledge engineers the framework in which to identify types of knowledge and where this knowledge exists in an organization. It also shows ways in which to use a standard recognized notation to capture, or model, knowledge to be used in a knowledge management system (KMS). This volume enables knowledge engineers, systems analysts, designers, developers, and researchers to understand the concept of knowledge modeling with Unified Modeling Language (UML). It offers a guide to quantifying, qualifying, understanding, and modeling knowledge by providing a reusable framework that can be adopted for KMS implementation. Following a brief history of knowledge management, the book discusses knowledge acquisition and the types of knowledge that can be discovered within a domain. It offers an overview of types of models and the concepts behind them. It then reviews UML and how to apply UML to model knowledge. The book concludes by defining and applying the Knowledge Acquisition framework via a real-world case study. |
![]() ![]() You may like...
Advances in Cancer Research, Volume 152
Paul B. Fisher, Kenneth D. Tew
Hardcover
Groundwater Prospecting and Management
H.P. Patra, Shyamal Kumar Adhikari, …
Hardcover
R4,236
Discovery Miles 42 360
Flow and Creep in the Solar System…
David B. Stone, S. K. Runcorn
Hardcover
R8,585
Discovery Miles 85 850
Decision Aid Models for Disaster…
Begona Vitoriano, Javier Montero, …
Hardcover
Induction Soundings of the Earth's…
Vladimir Semenov, Maxim Petrishchev
Hardcover
R3,119
Discovery Miles 31 190
|