42 results (0,20249 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Human Dimensions of Cybersecurity

The Sensible Guide to Program Management Professional (PgMP) Success

The Sensible Guide to Program Management Professional (PgMP) Success

A Sensible Guide to Program Management Professional (PgMP)® Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management – 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating facilitating managing and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts processes and tools that form the foundation of today’s program management? Since program management is still an emerging profession with professionals often working in different ways what does this mean for a standard exam? More specifically how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts processes and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern this book differs from other study guides by describing the author’s personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern this book contains 420 practice questions access to an online exam simulator and an online PgMP community and a time-tested approach for passing the PgMP exam. | The Sensible Guide to Program Management Professional (PgMP)® Success

GBP 52.99
1

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched new variants of it are already on the way. IT Security teams in businesses and corporations are struggling daily to fight off any cyberthreats that they are experiencing. On top of this they are also asked by their CIO or CISO to model what future Cyberattacks could potentially look like and ways as to how the lines of defenses can be further enhanced. IT Security teams are overburdened and are struggling to find ways in order to keep up with what they are being asked to do. Trying to model the cyberthreat landscape is a very laborious process because it takes a lot of time to analyze datasets from many intelligence feeds. What can be done to accomplish this Herculean task? The answer lies in Artificial Intelligence (AI). With AI an IT Security team can model what the future Cyberthreat landscape could potentially look like in just a matter of minutes. As a result this gives valuable time for them not only to fight off the threats that they are facing but to also come up with solutions for the variants that will come out later. Practical AI for Cybersecurity explores the ways and methods as to how AI can be used in cybersecurity with an emphasis upon its subcomponents of machine learning computer vision and neural networks. The book shows how AI can be used to help automate the routine and ordinary tasks that are encountered by both penetration testing and threat hunting teams. The result is that security professionals can spend more time finding and discovering unknown vulnerabilities and weaknesses that their systems are facing as well as be able to come up with solid recommendations as to how the systems can be patched up quickly.

GBP 44.99
1

Project Management Methodologies Governance and Success Insight from Traditional and Transformative Research

Project Management Methodologies Governance and Success Insight from Traditional and Transformative Research

With all signs pointing to an increased use of and interest in project-based work in modern organizations the better scholars are able to make sense of the current state of the field through theory development and empirical investigation the more successful projects promise to become. This book is a welcome addition to our field and will be I am sure an important work and source for future reference well into the future. —Dr. Jeffrey Pinto Pennsylvania State UniversityThe goal of practicing project managers and scholars alike lies in solving the puzzle of how to manage projects toward successful completion. However understanding what comprises project success—seemingly such an innocent question—has come to represent one of the most challenging problems for project managers and scholars. Who determines success? At what point in time is success best measured? How do diverse stakeholders define success? What happens when their perspectives collide? What is the difference between project success and project management success? These are surprisingly complex problems. For every principle or rule posited a brief investigation reveals that there are numerous exceptions muddying the waters and making these ideas increasingly opaque. Project Management Methodologies Governance and Success addresses this challenge head-on putting into proper context the critical issues that shape our understanding of the project management research process. Employing a concept referred to as philosophical triangulation the book shows how to overcome the weaknesses or intrinsic biases that disrupt and minimize the impact of so much organizational research. It places organizational governance and success within their proper context allowing scholars to identify the best methods for investigating project-based work. It links together in a cogent manner the diverse themes of research theory and design projects and project success and organizational governance. In effect this book demonstrates that to fully understand how to undertake research in projects theory and method are inextricably interwoven. | Project Management Methodologies Governance and Success Insight from Traditional and Transformative Research

GBP 42.99
1

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

Most academics still wrestle with the publish or perish phenomenon. Based on Dr. Liebowitz’s 25 years serving as the editor-in-chief of a leading international journal along with insights from some of the most knowledgeable journal editors this book shares key lessons learned to help new professors doctoral students and practitioner–scholars increase their chances of being published in selective refereed international journals. It focuses on the key practices needed to ensure journal publication with interesting cases and helpful tips sprinkled throughout the book. A Guide to Publishing for Academics provides useful knowledge from leading journal editors of both traditional and online journals as well as various tiers of journals. Although the focus is mainly in the business and IT areas much of the guidance provided can cross into other fields. The book contains interesting vignettes and do’s and don’ts so that potential authors can understand what goes on behind the scenes once the manuscript arrives on the journal editor’s desk. The book provides constructive guidance on choosing what and where to publish what to consider when writing a title for a paper how to prepare and submit journal manuscripts and how to position a paper for publication. It also has valuable information for current and future journal editors including models of editing and editorial boards editorial coaching advice and editing smart practices. With the information in this book the next generation of academics and practitioner–scholars will be well equipped to overcome the publish or perish phenomenon. | A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

GBP 56.99
1

Software Configuration Management

A Technical Guide to IPSec Virtual Private Networks

Electronically Stored Information The Complete Guide to Management Understanding Acquisition Storage Search and Retrieval Second Edition

Bankers Like Us Dispatches from an Industry in Transition

Bankers Like Us Dispatches from an Industry in Transition

This book will resonate with anyone no matter where you reside on this journey whether newbie or old guard. If you want to be part of this change you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate then I suggest you think about stepping aside. — Curt Queyrouze President Coastal Community Bank The world is going digital and so is banking—in fits starts and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about not by external heroes and saviours not by a generation yet to be born but people just like us. People who understand the industry and its quirks. Bankers who have the grit determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a ‘this is who we are’ piece including the author’s trench credentials. It then presents an overview of corporate culture (this is what we deal with and a few ideas on how to handle it) as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds and a hopeful look-ahead on what a team of principled dedicated folks can do despite everything. | Bankers Like Us Dispatches from an Industry in Transition

GBP 29.99
1

Technologies for Sustainable Global Higher Education

Technologies for Sustainable Global Higher Education

Digital technologies are influencing the way we learn live work and exist in different contexts of society in the digital age. There are a variety of learning systems that support innovative digital approaches and universities and organizations around the world are investing in building their own e-learning platforms. Digital technologies are enabling wider access to education and new markets for student recruitment resulting in increased income prospects for global higher education institutions. Technology enables numerous data and information sources which give greater access to information and data. It also enables highly virtual environments which impact teaching and the classroom. The widespread use and application of digital technologies in the teaching and learning process provoke pedagogical inquiry and mediation. It is in this context that Technologies for Sustainable Global Higher Education focuses on analyzing the application of digital technologies in the teaching–learning process. The chapters in this edited collection seek to answer questions relevant to the context of higher education such as: What is the concept of digital technologies? How is digital technology used to mediate the learning process? What technologies are used to qualify education in higher education? This book provides answers to these questions by focusing on issues central to improving education through digital technologies digital learning and pedagogical practices in digital education. It also provides case studies of higher education institutions.

GBP 110.00
1

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

In this book Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption—fear. Fear of the unknown fear of the intangible fear of the investment needed and yes fear of losing your job to a machine. With his talent for distilling clarity from complexity Edosa tackles this and many other challenges. —Tim Carmichael Chief Data Officer Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data information and knowledge across organisations. Yet rather than being stuck with endless polarising debates such as breaking down silos it shifts focus back towards the ultimate to what end. —Jacky Wright Chief Digital Officer (CDO) Microsoft US If you care about AI transformation empowering people or advancing organisational success in an increasingly digital world then you should read this book. —Yomi Ibosiola Chief Data and Analytics Officer Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when—at the end of a critical investment in an artificial intelligence project that had been meant to save money—it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer’s production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to make data work for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation empower people and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities. | Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

GBP 44.99
1

How to Win at CRM Strategy Implementation Management

Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide

Transhumanism Artificial Intelligence the Cloud Robotics Electromagnetic Fields Intelligence Communities Rail Transportation Open-Source Intelligence (OSINT)—all this and more is discussed in Cyber Crime Investigator’s Field Guide Third Edition. Many excellent hardware and software products exist to protect our data communications systems but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws rules and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed along with information about how cyberspace works and the tools that reveal the who where what when why and how in the investigation of cybercrime. Features New focus area on rail transportation OSINT medical devices and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive the call arrival on site chain of custody and more This book offers a valuable Q&A by subject area an extensive overview of recommended reference materials and a detailed case study. Appendices highlight attack signatures Linux commands Cisco firewall commands port numbers and more. | Cyber Crime Investigator's Field Guide

GBP 56.99
1

Vulnerability Management

Vulnerability Management

Vulnerability management (VM) has been around for millennia. Cities tribes nations and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today we identify vulnerabilities in our software systems infrastructure and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps especially those that are inherent in a larger organization. Completely updated the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective. This book is a guide for security practitioners security or network engineers security officers and CIOs seeking understanding of VM and its role in the organization. To serve various audiences it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy although serving the executive well provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

GBP 44.99
1

Financial Literacy Education Addressing Student Business and Government Needs

Business Analysis Requirements and Project Management A Guide for Computing Students

Business Analysis Requirements and Project Management A Guide for Computing Students

IT projects emerge from a business need. In practice software developers must accomplish two big things before an IT project can begin: find out what you need to do (i. e. analyse business requirements) and plan out how to do it (i. e. project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis Requirements and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS) the Gantt chart and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice. | Business Analysis Requirements and Project Management A Guide for Computing Students

GBP 48.99
1

PMI-PBA Exam Practice Test and Study Guide

PMI-PBA Exam Practice Test and Study Guide

The PMI-PBA® Exam Practice Test and Study Guide attempts to address all your questions and concerns by providing two of the most sought-after study aids: memory maps and practice questions. The systematic use of memory maps helps aid in the efficient recall of information and can boost confidence during the exam. Well-crafted practice questions are fantastic study aids that can be used to track your progress as you learn new concepts introduce you to the complex sentence structure that is likely to appear on the exam and concentrate your studies by domain essentially preparing you to pass the very challenging PMI-PBA® Exam in the allotted four hours. In addition to study hints and exam topics this book provides references to tools and techniques that should be incorporated into your work immediately. For each of the five domains outlined in the PMI Professional in Business Analysis (PMI-PBA)® Examination Content Outline 2013 (the ECO) twenty practice questions test your knowledge. Also included is a challenging 200-question practice exam which is representative of the actual exam. To enhance your studies a timed online simulated exam is also provided. At the end of the simulated exam you can see your score per the number of questions you answered correctly. These exam questions are crafted to foster learning and reinforce content; they are not obscure or overly complicated but rather are representative of the actual exam. Knowing what to do must be translated into doing what you know. This book helps you prepare for the PMI-PBA® exam by instilling knowledge and encouraging critical thinking. As a result the skills attained can lead to improved project success and outcomes and you’ll have a much stronger understanding of the material along with the tools and techniques of business analysis. PMI-PBA® is a registered trademark of the Project Management Institute.

GBP 42.99
1

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

As the twelfth most populous nation the Philippines’ diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security—post 9/11. Issues previously considered social or public are now viewed as security issues. Food production is now analyzed in the context of food security and environmental degradation is now a part of environmental security. This broadened perspective is not unique to the Philippines but—thanks to the island nation’s long struggle with issues of Muslim radicalism democracy and globalization—it serves as a model worth studying. And no one is better positioned to take on this study than Rommel C. Banlaoi Chairman and Executive Director of the Philippine Institute for Peace Violence and Terrorism Research. In Philippine Security in the Age of Terror: National Regional and Global Challenges in the Post-9/11 World Banlaoi illustrates the increasing complexity of the issues. Divided into three sections the book explores why a nation’s security can no longer be just about its military or only about what is happening within its borders. Section I reviews issues specific to the Philippine people including politics national identity globalization and local and military security. Section II moves to bilateral security issues to report on security interests and collaborations with the United States China and Australia—as well as with India Japan and Russia. Section III examines selected global regional and multilateral issues such as maritime security piracy and the ASEAN Regional Forum. The comprehensive approach and coverage within the book reflects the author’s diverse interests as a scholar of politics security terrorism and international relations. More importantly it documents an intellectual journey that national policymakers across the world need to consider if they hope to achieve the shift in thinking that will promote the well-being of the world’s populations as the strategic centerpiece of any war on terrorism. | Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

GBP 56.99
1

Blockchain and IoT Integration Approaches and Applications

Blockchain and IoT Integration Approaches and Applications

As technology continues to advance and the interconnection of various devices makes our lives easier it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms turn on or off the lights and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain an encrypted distributed computer filing system can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable secure and permanent method of recording data processed by smart machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids smart cities and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems | Blockchain and IoT Integration Approaches and Applications

GBP 100.00
1

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

This is an important book. Ethics is not an easy topic and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . Use this book as a practical resource an informative and educational source of material in developing expertise but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines professional journals and online blogs. These are synthesised into a blueprint which addresses in a practical manner the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15 became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world of what has happened and what might happen as digital technology continues to pervade.

GBP 52.99
1

Ethics of Data and Analytics Concepts and Cases

Ethics of Data and Analytics Concepts and Cases

The ethics of data and analytics in many ways is no different than any endeavor to find the right answer. When a business chooses a supplier funds a new product or hires an employee managers are making decisions with moral implications. The decisions in business like all decisions have a moral component in that people can benefit or be harmed rules are followed or broken people are treated fairly or not and rights are enabled or diminished. However data analytics introduces wrinkles or moral hurdles in how to think about ethics. Questions of accountability privacy surveillance bias and power stretch standard tools to examine whether a decision is good ethical or just. Dealing with these questions requires different frameworks to understand what is wrong and what could be better. Ethics of Data and Analytics: Concepts and Cases does not search for a new different answer or to ban all technology in favor of human decision-making. The text takes a more skeptical ironic approach to current answers and concepts while identifying and having solidarity with others. Applying this to the endeavor to understand the ethics of data and analytics the text emphasizes finding multiple ethical approaches as ways to engage with current problems to find better solutions rather than prioritizing one set of concepts or theories. The book works through cases to understand those marginalized by data analytics programs as well as those empowered by them. Three themes run throughout the book. First data analytics programs are value-laden in that technologies create moral consequences reinforce or undercut ethical principles and enable or diminish rights and dignity. This places an additional focus on the role of developers in their incorporation of values in the design of data analytics programs. Second design is critical. In the majority of the cases examined the purpose is to improve the design and development of data analytics programs. Third data analytics artificial intelligence and machine learning are about power. The discussion of power—who has it who gets to keep it and who is marginalized—weaves throughout the chapters theories and cases. In discussing ethical frameworks the text focuses on critical theories that question power structures and default assumptions and seek to emancipate the marginalized. | Ethics of Data and Analytics Concepts and Cases

GBP 56.99
1

Principles of Mobile Computing and Communications

Cybertax Managing the Risks and Results

Cybertax Managing the Risks and Results

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C’s for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance sales human resources and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks such as sales finances resources and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leaderships’ attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization. | Cybertax Managing the Risks and Results

GBP 14.99
1

Securing the Cloud Security Strategies for the Ubiquitous Data Center

Introduction to Mobile Communications Technology Services Markets

Introduction to Mobile Communications Technology Services Markets

The traditionally separate Fixed Mobile and Internet sectors have been evolving recently toward a single sector offering numerous implications for those involved in technology and business. It is therefore essential for telecommunication professionals to get a keen grasp of where the industry is heading. Providing a solid foundation in the industry Introduction to Mobile Communications: Technology Services Markets explores the core requirements of modern mobile telecommunications-from markets to technology. It explains how wireless systems work how mobility is supported the underlying infrastructure and what interactions are needed among the different functional components. The book also examines how mobile communications are evolving in order to meet the changing needs of users. The information provided in the book comes primarily from the four core modules of the Certificate in Mobile Communications Distance Learning program run by the Informa Telecoms Academy in London. Designed by a highly experienced training development team the program examines the complex and fascinating world of mobile communications. Designed to give a broad picture of mobile communications the book provides an excellent grounding for those involved in both business and engineering-leaving them much better equipped to fulfill roles within their current or prospective companies | Introduction to Mobile Communications Technology Services Markets

GBP 56.99
1