|
Showing 1 - 20 of
20 matches in All Departments
Drawing from a range of materials, including religious texts, women's literature, field interviews, historical archives, critical theories, and rap music, this book offers important critiques of the way religious and feminist knowledge is constructed. This text looks at white feminist theology and its misunderstanding of Native North American women, Chinese footbinding, and veiling by Muslim women, as well as the Jewish emancipation in France, the symbolic dissection of black women by rap and sermons, and the potential to rewrite and reclaim religious stories. This important reassessment of religious studies offers new visions for the development of anti-colonialist, anti-racist, and anti-sexist discourses of liberation.
|
CTOs at Work (Paperback, 1st ed.)
Scott E. Donaldson, Stanley G. Siegel, Gary Donaldson
|
R1,444
R1,168
Discovery Miles 11 680
Save R276 (19%)
|
Ships in 10 - 15 working days
|
Scott Donaldson, Stanley Siegel and Gary Donaldson interview many
of the world's most influential chief technology officers in CTOs
at Work, offering a brand-new companion volume to the highly
acclaimed bestseller Founders at Work by Jessica Livingston and
Peter Seibel's best-selling Coders at Work, both from Apress. As
the words at work suggest, the authors focus on how their
interviewees tackle the day-to-day work of the CTO while revealing
much more: how they got there, how they manage and allocate
projects, and how they interact with business units and ensure that
their companies take advantage of technologies, teamwork, and
software development practices to respond to organizational needs
and improve employee productivity. Surveying a variety of unique
corporations, CTOs at Work offers insights into the present and
future of CTOs in organizations around the world.What you'll learn
* How many chief technical officers from the world's leading
corporations do their job, and the skills they consider most
essential for carrying out their work effectively * Interesting
applications of technology and software development used to
increase productivity or profitability in today's leading
organizations * The technology- and business-related challenges and
opportunities that CTOs foresee in years to come Who this book is
for Anyone interested in how a CTO views the use of technologies in
an organization and leads its software development initiatives.
This book is especially useful for managers, developers, and IT
personnel charged with using automation to increase productivity.
Indeed, it's not just for aspiring CTOs, but also for project
managers, software engineers, and application developers who want a
better understanding of the strategies their senior IT executives
employ to make their organizations as productive and competitive as
possible. Table of Contents * SAIC * CA Technologies * Johns
Hopkins University Applied Physics Laboratory * Polar Star
Consulting * BPL Global * NPR * Mind Over Machines * Gartner, Inc.*
Springer * TinEye/Idee * MAPA Group * Johnson & Johnson, Vertex
Pharmaceuticals * Gerson Lehrman Group
Preventing Stress in Organizations: How to Develop Positive
Managersoffers an innovative, evidence-based approach to help
managers prevent and reduce workplace stress in their staff. *
Winner of the 2013 BPS Book Award - Practitioner Text category *
Provides information on the critical skills managers must develop
in order to prevent stress in their staff, and the key ongoing
behaviours that promote a healthy work environment * Shows
practitioners in occupational psychology, HR, Health and Safety and
related professions how positive management can be integrated into
an organizationa s existing practices and processes * Serves as an
essential guide for managers themselves on how to incorporate
proven stress management skills into their everyday interactions
with team members * Balances rigorous research grounding with
real-world vignettes, case studies and exercises
|
Romeo & Juliet (Paperback)
E. Donaldson, N. Hayes, M Van Niekerk
|
R168
R152
Discovery Miles 1 520
Save R16 (10%)
|
Ships in 6 - 10 working days
|
Features include extra exam support for English Home and First
Additional Language students; includes an accessible comic-style
version of the play, useful notes on the characters, themes and
imagery and a clear summary of the plot; exam-style contextual and
essay questions and answers help learners practise for exams and
assess their understanding.
Use the methodology in this study guide to design, manage, and
operate a balanced enterprise cybersecurity program that is
pragmatic and realistic in the face of resource constraints and
other real-world limitations. This guide is an instructional
companion to the book Enterprise Cybersecurity: How to Build a
Successful Cyberdefense Program Against Advanced Threats. The study
guide will help you understand the book's ideas and put them to
work. The guide can be used for self-study or in the classroom.
Enterprise cybersecurity is about implementing a cyberdefense
program that will succeed in defending against real-world attacks.
While we often know what should be done, the resources to do it
often are not sufficient. The reality is that the Cybersecurity
Conundrum-what the defenders request, what the frameworks specify,
and what the budget allows versus what the attackers exploit-gets
in the way of what needs to be done. Cyberattacks in the headlines
affecting millions of people show that this conundrum fails more
often than we would prefer. Cybersecurity professionals want to
implement more than what control frameworks specify, and more than
what the budget allows. Ironically, another challenge is that even
when defenders get everything that they want, clever attackers are
extremely effective at finding and exploiting the gaps in those
defenses, regardless of their comprehensiveness. Therefore, the
cybersecurity challenge is to spend the available budget on the
right protections, so that real-world attacks can be thwarted
without breaking the bank. People involved in or interested in
successful enterprise cybersecurity can use this study guide to
gain insight into a comprehensive framework for coordinating an
entire enterprise cyberdefense program. What You'll Learn Know the
methodology of targeted attacks and why they succeed Master the
cybersecurity risk management process Understand why cybersecurity
capabilities are the foundation of effective cyberdefenses Organize
a cybersecurity program's policy, people, budget, technology, and
assessment Assess and score a cybersecurity program Report
cybersecurity program status against compliance and regulatory
frameworks Use the operational processes and supporting information
systems of a successful cybersecurity program Create a data-driven
and objectively managed cybersecurity program Discover how
cybersecurity is evolving and will continue to evolve over the next
decade Who This Book Is For Those involved in or interested in
successful enterprise cybersecurity (e.g., business professionals,
IT professionals, cybersecurity professionals, and students). This
guide can be used in a self-study mode. The book can be used by
students to facilitate note-taking in the classroom and by
Instructors to develop classroom presentations based on the
contents of the original book, Enterprise Cybersecurity: How to
Build a Successful Cyberdefense Program Against Advanced Threats.
The objective of APM Best Practices: Realizing Application
Performance Management is to establish reliable application
performance management (APM) practices-to demonstrate value, to do
it quickly, and to adapt to the client circumstances. It's
important to balance long-term goals with short-term deliverables,
but without compromising usefulness or correctness. The successful
strategy is to establish a few reasonable goals, achieve them
quickly, and then iterate over the same topics two more times, with
each successive iteration expanding the skills and capabilities of
the APM team. This strategy is referred to as "Good, Better, Best".
The application performance monitoring marketplace is very focused
on ease of installation, rapid time to usefulness, and overall ease
of use. But these worthy platitudes do not really address the
application performance management processes that ensure that you
will deploy effectively, synergize on quality assurance test plans,
triage accurately, and encourage collaboration across the
application life cycle that ultimately lowers overall application
cost and ensures a quality user experience. These are also fine
platitudes but these are the ones that are of interest to your
application sponsors. These are the ones for which you need to show
value. This CA Press book employs this iterative approach, adapted
pragmatically for the realities of your organizational and
operational constraints, to realize a future state that your
sponsors will find useful, predictable and manageable-and something
that they will want to fund. In the meantime, you will learn the
useful techniques needed to set up and maintain a useful
performance management system utilizing best practices regardless
of the software provider(s).
|
Cellar Door (Paperback)
Trevor E. Donaldson
bundle available
|
R327
Discovery Miles 3 270
|
Ships in 10 - 15 working days
|
Several unpublished short stories and a short screenplay. Also
includes the Teaser for a TV Pilot I wrote in 2012.
This is a new release of the original 1942 edition.
The very first Anthology of Ichor from UnEarthed Press. Includes
featured authors: Ryan Kinkor Jamie Marriage, Phil Richardson Paul
DeCirce. Beware, the devil is watching you.
Kessinger Publishing is the place to find hundreds of thousands of
rare and hard-to-find books with something of interest for
everyone!
WARNING CONTENTS UNDER PRESSURE These pages contain the secrets of
heathen gods, steam-powered zombies, and plagued nosferatu. While
the mad golem rages beneath the will of an old god, other more
complex automatons study the finesse of human emotion. These and
other tales from the minds of: Kevin James Breaux Cynthia Ray Erik
T. Johnson Bill Albert Marc Sorondo Amanda Lawrence Auverigne A.J.
French Gerry Huntman Anthony Bell L.T. Getty Adrian Chamberlin
Bruce Memblatt Michael Fletcher Garrett Ashley Including novellas
by: Jeffrey Hale S.M. Sawyer
Kessinger Publishing is the place to find hundreds of thousands of
rare and hard-to-find books with something of interest for
everyone!
Donaldson presents new paradigms of interpretation that help to
bring the often oppositional stances of First versus Third World
and traditional versus postmodern feminism into a more constructive
relationship. She situates contemporary theoretical debates about
reading, writing, and the politics of identity within the context
of historical colonialism--primarily under the English in the
nineteenth century.
|
|