0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (6)
  • R500+ (823)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

Frontiers in Enterprise Integration (Hardcover, New): Li D. Xu Frontiers in Enterprise Integration (Hardcover, New)
Li D. Xu
R5,884 R5,516 Discovery Miles 55 160 Save R368 (6%) Ships in 10 - 15 working days

Enterprise Information Systems (EIS) integrate and support business processes across functional boundaries in a supply chain environment, and have become increasingly popular over the last 15 years. In recent years, more and more enterprises world-wide have adopted EIS such as Enterprise Resource Planning (ERP) for running their businesses. Previously, information systems such as CAD, CAM, MRPII and CRM were widely used for partial functional integration within a business organization. With global operation, global supply chain, and fierce competition in place, there is a need for suitable EIS such as ERP, E-Business or E-Commerce systems to integrate extended enterprises in a supply chain environment with the objective of achieving efficiency, competency, and competitiveness. As a result, there is a growing demand for researching EIS to provide insights into challenges, issues, and solutions related to the design, implementation and management of EIS.
The papers in Frontiers in Enterprise Integration were selected from two premier international conferences: the International Forum of Information Systems Frontiers-Xian International Symposium (IFISF), June 29-30, 2006, Xian, China and the IFIP TC 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (Confenis 2007), October 14-16, Beijing, China. Both events provided an excellent opportunity for EIS academicians and practitioners in the world to gather and exchange ideas, and present original research in their fields. Advances in Enterprise Information Systems will be invaluable to scientists, researchers and professionals in EIS.

Grammars and Automata for String Processing - From Mathematics and Computer Science to Biology, and Back (Hardcover, New):... Grammars and Automata for String Processing - From Mathematics and Computer Science to Biology, and Back (Hardcover, New)
Carlos Martin-Vide, Victor Mitrana
R4,096 Discovery Miles 40 960 Ships in 10 - 15 working days


The volume is devoted to a very young field born at the crossroads of molecular biology, linguistics, computer science, and mathematics. Essentially, the contributions in this volume address the structural (syntactical) view of the domain. In this respect, mathematical linguistics and computer science can offer a large variety of adequate tools for modelling complex macromolecules, for analysing and simulating biological ussues. The common trend so far was that biology influenced mathematics and computer science. Now, more and more approaches are parts of a general process of transferring methods and tools from computer science to biology, which corresponds to the reverse influence. The contribuitions in this volume follow such a new trend.

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover): Dan... A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) (Hardcover)
Dan Shoemaker, Anne Kohnke, Ken Sigler
R2,637 Discovery Miles 26 370 Ships in 10 - 15 working days

A Guide to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2.0) presents a comprehensive discussion of the tasks, knowledge, skill, and ability (KSA) requirements of the NICE Cybersecurity Workforce Framework 2.0. It discusses in detail the relationship between the NICE framework and the NIST's cybersecurity framework (CSF), showing how the NICE model specifies what the particular specialty areas of the workforce should be doing in order to ensure that the CSF's identification, protection, defense, response, or recovery functions are being carried out properly. The authors construct a detailed picture of the proper organization and conduct of a strategic infrastructure security operation, describing how these two frameworks provide an explicit definition of the field of cybersecurity. The book is unique in that it is based on well-accepted standard recommendations rather than presumed expertise. It is the first book to align with and explain the requirements of a national-level initiative to standardize the study of information security. Moreover, it contains knowledge elements that represent the first fully validated and authoritative body of knowledge (BOK) in cybersecurity. The book is divided into two parts: The first part is comprised of three chapters that give you a comprehensive understanding of the structure and intent of the NICE model, its various elements, and their detailed contents. The second part contains seven chapters that introduce you to each knowledge area individually. Together, these parts help you build a comprehensive understanding of how to organize and execute a cybersecurity workforce definition using standard best practice.

CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Hardcover, New): James S. Tiller CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Hardcover, New)
James S. Tiller
R4,092 Discovery Miles 40 920 Ships in 10 - 15 working days

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker's perspective and presents a comprehensive framework to help you meet the objectives of penetration testing-including deliverables and the final report.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Next Generation Wireless LAN
Timothy Kolaya Hardcover R1,518 Discovery Miles 15 180
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,018 Discovery Miles 10 180
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin Paperback R2,896 Discovery Miles 28 960
Managing Resources for Futuristic…
Tariq Umer Hardcover R5,327 Discovery Miles 53 270
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang Paperback R2,606 Discovery Miles 26 060
Auditing Information Systems
Mario Piattini Paperback R3,545 Discovery Miles 35 450
Flash Memory Integration - Performance…
Jalil Boukhobza, Pierre Olivier Hardcover R1,831 Discovery Miles 18 310
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, … Paperback R2,667 Discovery Miles 26 670
A Primer For Disaster Recovery Planning…
Charlotte J. Haitt Paperback R1,409 Discovery Miles 14 090
Meeting People via WiFi and Bluetooth
Joshua Schroeder, Henry Dalziel Paperback R777 Discovery Miles 7 770

 

Partners