166 results (0,21558 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

The DataOps Revolution Delivering the Data-Driven Enterprise

The DataOps Revolution Delivering the Data-Driven Enterprise

DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author’s own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www. kinaesis. com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members. | The DataOps Revolution Delivering the Data-Driven Enterprise

GBP 31.99
1

FinTech The Technology Driving Disruption in the Financial Services Industry

Cognitive Hack The New Battleground in Cybersecurity ... the Human Mind

Securing the Cloud Security Strategies for the Ubiquitous Data Center

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

As we get caught up in the quagmire of Big Data and analytics it remains critically important to be able to reflect and apply insights experience and intuition to your decision-making process. In fact a recent research study at Tel Aviv University found that executives who relied on their intuition were 90 percent accurate in their decisions. Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making focuses on this intuition-based decision making. The book does not discount data-based decision making especially for decisions that are important and complex. Instead it emphasizes the importance of applying intuition gut feel spirituality experiential learning and insight as key factors in the executive decision-making process. Explaining how intuition is a product of past experience learning and ambient factors the text outlines methods that will help to enhance your data-driven decision-making process with intuition-based decision making. The first part of the book the Research Track presents contributions from leading researchers worldwide on the topic of intuition-based decision making as applied to management. In the second part of the book the Practice Track global executives and senior managers in industry government universities and not-for-profits present vignettes that illustrate how they have used their intuition in making key decisions. The research part of the book helps to frame the problem and address leading research in intuition-based decision making. The second part then explains how to apply these intuition-based concepts and issues in your own decision-making process. | Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

GBP 56.99
1

The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects but in the complex relationships inside the operating systems. The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation addresses this complexity. Written from the perspective of the designer of an operating system this book tackles important issues and practical problems on how to understand an operating system completely and systematically. It removes the mystery revealing operating system design guidelines explaining the BIOS code directly related to the operating system and simplifying the relationships and guiding ideology behind it all. Based on the Source Code of a Real Multi-Process Operating System Using the 0. 11 edition source code as a representation of the Linux basic design the book illustrates the real states of an operating system in actual operations. It provides a complete systematic analysis of the operating system source code as well as a direct and complete understanding of the real operating system run-time structure. The author includes run-time memory structure diagrams and an accompanying essay to help readers grasp the dynamics behind Linux and similar software systems. Identifies through diagrams the location of the key operating system data structures that lie in the memory Indicates through diagrams the current operating status information which helps users understand the interrupt state and left time slice of processes Examines the relationship between process and memory memory and file file and process and the kernel Explores the essential association preparation and transition which is the vital part of operating system Develop a System of Your Own This text offers an in-dep | The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

GBP 170.00
1

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location identity and history over wireless connections. Connectivity and Communication — Anything Anywhere and Anytime An examination of the exciting expansion period in this research The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive technical and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies experience reports and best practice it contains information on emerging technologies market opportunities and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs itis a comprehensive technical and practical guide to recent advances in pervasive networked systems. | The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

GBP 56.99
1

The Business Value of Software

The Business Value of Software

In business driving value is a key strategy and typically starts at the top of an organization. In today’s digital age driving software value is also an important and often overlooked key strategy. Executives and the corporate board need to expect the highest level of business value from the software the organization is developing buying and selling. In today’s digital transformation marketplace it is imperative that organizations start driving business value from software development initiatives. For many years the cost of software development challenged organizations with questions such as: How do we allocate software development costs?Should these costs be considered an overhead expense?Are we getting the most value possible for our investment? A fundamental problem has been built into these questions – the focus on cost. In almost every other part of the organization maximizing profit or in the case of a not-for-profit maximizing the funds available provides a clear focus with metrics to determine success or failure. In theory simply aligning software spending with the maximizing profit goals should be sufficient to avoid any questions about value for money. Unfortunately this alignment hasn’t turned out to be so simple and the questions persist particularly at the strategic or application portfolio level. In this book Michael D. S. Harris describes how a software business value culture—one where all stakeholders including technology and business—have a clear understanding of the goals and expected business value from software development. The book shows readers how they can transform software development from a cost or profit center to a business value center. Only a culture of software as a value center enables an organization to constantly maximize business value flow through software development. If your organization is starting to ask how it can change software from a cost-center to a value-center this book is for you. | The Business Value of Software

GBP 42.99
1

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Managing Business Projects The Essentials

Managing Business Projects The Essentials

Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost it is about business projects as opposed to construction or engineering projects. Although many techniques like schedule management apply to both they are usually applied differently. As its title conveys the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects up to $20 million but often below $1 million. Some literature favors large and mega-projects but for every mega-project there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects. This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos. ' Rather it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea which is stated repeatedly is to do the essentials and to do them consistently and well. Strong emphasis is placed on things that happen before around and after the project itself. So while the basic disciplines like engaging with stakeholders managing scope schedules costs risks issues changes and communication are thoroughly explained other important aspects are covered. These include: governance of a project and of a portfolio of projects project selection with its financial and non-financial aspects effective use of the business case through to benefits realization procurement outsourcing and partnership and also the agile mindset that is valuable beyond Agile projects. Besides project managers and sponsors this book is intended for people who are working in business or government at any level or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students although many would benefit from the contents. | Managing Business Projects The Essentials

GBP 52.99
1

Cybertax Managing the Risks and Results

Cybertax Managing the Risks and Results

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C’s for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance sales human resources and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks such as sales finances resources and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leaderships’ attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization. | Cybertax Managing the Risks and Results

GBP 14.99
1

Business Strategies for the Next-Generation Network

Business Strategies for the Next-Generation Network

Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies the NGN is not being planned as the next-generation Internet. In its intention and architecture it is more accurately described as Broadband-ISDN release 2. 0. The NGN transition is hard for both practitioners and observers to understand because it weaves together a number of distinct strands: the development of a new architecture and technology base including advanced IT automation systems the development of a portfolio of ‘new wave’ products and services which exploits the power of the new network the design of a new kind of organization which can utilize the higher levels of automation in the NGN and reduce costs and the development of an effective transition plan which can smoothly move operators from their current legacy networks systems and processes to the NGN future. The book begins with a review of the failures of previous attempts by carriers to retool for the future. It describes in detail the technologies and capabilities supporting “new wave’” services focusing particularly on multimedia interactive services TV and Video-on-Demand. The author looks at the IMS layer and how it interworks both downwards into the QoS-enabled IP transport layer and upwards to enable new kinds of applications. However equal attention is addressed to the business models of players in the value chain carriers service providers broadcasters and production companies. The author then examines how carriers have attempted to remodel themselves as IP companies along the dimensions of people processes and IT automation systems describing the lessons to be learned from numerous failures. He identifies more innovativebusiness models exploresPeer-to-Peer networking and reviews the prospects for | Business Strategies for the Next-Generation Network

GBP 54.99
1

The Complete Project Management Office Handbook

The Complete Project Management Office Handbook

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight control and support. Illustrating the implications of project management in today’s organizations The Complete Project Management Office Handbook Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs purpose and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists detailed process steps and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate quick-wins and early PMO-based accomplishments in their organization.

GBP 42.99
1

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives in-depth explanations of each topic and accurate practice questions. Each chapter includes exam tips that highlight key exam information hands-on exercises a summary that serves as a quick review and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily it also serves as an ideal on-the-job reference. Richard E. Cascarino MBA CIA CISM CFE CRMA is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa Europe the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA and the Association of Certified Fraud Examiners where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand author of the book Internal Auditing: An Integrated Approach now in its third edition. This book is extensively used as a university textbook worldwide. In addition he is the author of the Auditor's Guide to IT Auditing Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE the Ultimate Resource.

GBP 36.99
1

The Complete Guide for CPP Examination Preparation

GBP 31.99
1

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

As the twelfth most populous nation the Philippines’ diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security—post 9/11. Issues previously considered social or public are now viewed as security issues. Food production is now analyzed in the context of food security and environmental degradation is now a part of environmental security. This broadened perspective is not unique to the Philippines but—thanks to the island nation’s long struggle with issues of Muslim radicalism democracy and globalization—it serves as a model worth studying. And no one is better positioned to take on this study than Rommel C. Banlaoi Chairman and Executive Director of the Philippine Institute for Peace Violence and Terrorism Research. In Philippine Security in the Age of Terror: National Regional and Global Challenges in the Post-9/11 World Banlaoi illustrates the increasing complexity of the issues. Divided into three sections the book explores why a nation’s security can no longer be just about its military or only about what is happening within its borders. Section I reviews issues specific to the Philippine people including politics national identity globalization and local and military security. Section II moves to bilateral security issues to report on security interests and collaborations with the United States China and Australia—as well as with India Japan and Russia. Section III examines selected global regional and multilateral issues such as maritime security piracy and the ASEAN Regional Forum. The comprehensive approach and coverage within the book reflects the author’s diverse interests as a scholar of politics security terrorism and international relations. More importantly it documents an intellectual journey that national policymakers across the world need to consider if they hope to achieve the shift in thinking that will promote the well-being of the world’s populations as the strategic centerpiece of any war on terrorism. | Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

GBP 56.99
1

Core Software Security Security at the Source

Core Software Security Security at the Source

. an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. . Readers are armed with firm solutions for the fight against cyber threats. —Dr. Dena Haritos Tsamitis. Carnegie Mellon University. a must read for security specialists software developers and software engineers. . should be part of every security professional’s library. —Dr. Larry Ponemon Ponemon Institute. the definitive how-to guide for software security professionals. Dr. Ransome Anmol Misra and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. . A must-have for anyone on the front lines of the Cyber War . —Cedric Leighton Colonel USAF (Ret. ) Cedric Leighton AssociatesDr. Ransome Anmol Misra and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! —Eric S. Yuan Zoom Video CommunicationsThere is much publicity regarding network security but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards in which we conduct our digital lives. In response security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative innovative people who write software. Core Software Security expounds developer-centric software security a holistic process to engage creativity for security. As long as software is developed by humans it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development which lies at the heart of our cyber infrastructure. Whatever development method is employed software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people process and technology Highlights the key success factors deliverables and metrics for each phase of the SDL Examines cost efficiencies optimized performance and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors' website at http://www. androidinsecurity. com/ | Core Software Security Security at the Source

GBP 44.99
1

The Human Change Management Body of Knowledge (HCMBOK )

The Human Change Management Body of Knowledge (HCMBOK )

I am happy to recommend this work. I believe in the principles presented in it and identify with its context. Due to the lack of knowledge on the subject in the market it is a topic that must be made known. The book should be in the library of all project and change managers. — Paul Dinsmore PMI FellowEvery manager should integrate HCMBOK® practices into their project management methodology in order to fully develop their work. This book addresses a simple and practical way that the critical component in organizational change management can be applied to projects of all kinds: the human factor. — Bruno Machado Director Project Management Office Grupo Anima EducaçãoWe live in a time of change speed and an avalanche of information. It is still very difficult for most companies to change their organizational culture efficiently. This book makes us reflect upon the crucial element in any change and which most managers do not place in the foreground—the people. — Joyce Meyer CEO iDigoIn today's constantly changing world the Project Manager must have sensitivity to how people react to change. Knowing a method that provides a structured way to take care of the human aspect is a key factor in the success of any project! HCMBOK® offers a simple and practical approach to managing change which can be easily incorporated into the project management routine providing amazing results. — Pedro Augusto Cardoso da Silva Engineering Director METRÔRIO This reference starts by presenting the concept of change management its players strategies and applicable models. In the second part the book covers the set of good practices methodology and tools known as the HCMBOK®— Human Change Management Body of Knowledge. The third part introduces the concept of the Change Management Office (CMO) and its relation to the strategic planning of an organization. The book concludes with the competencies essential for a change manager an approach to agile methodologies and a model for managing cultural change. | The Human Change Management Body of Knowledge (HCMBOK®)

GBP 44.99
1

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book you will learn how to create a working practical control structure that will ensure the ongoing day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning all the way down to basic technology operation.

GBP 42.99
1

The Concept of Enterprise Architecture from Theory to Practice

The Concept of Enterprise Architecture from Theory to Practice

Even though the field of enterprise architecture (EA) has matured many organisations still struggle with its development and implementation particularly those organisations involved in continuous transformational cycles and subjected to different environmental trends. This book is intended to assist organisations in getting a grip on the factors influencing EA implementation and gaining a deeper understanding of why things happen the way they do in the practice of EA. It is a comprehensive and definitive resource that is useful to both business professionals and academics. The book presents an approach for the development implementation or institutionalisation of EA that is independent of any method or other architecture frameworks. It can be applied directly using a realistic selection of organizational variables. The approach has two distinctive features that support EA even in complex environments: From both technical and non-technical perspectives it identifies influencing factors and how they manifest in the practice of EA in an organization It offers linear and practical mechanisms for developing and implementing EA to fortify the practice of the concept in an organisation This approach represents a significant contribution to EA. Starting with descriptions for EA the book offers deepened models and frameworks for the development and implementation of EA at the domain level. It also covers factors upon which a model is built for the institutionalisation of the concept. Additionally the book discusses the implications of EA for sponsors architects and other stakeholders responsible for EA development implementation and institutionalisation. | The Concept of Enterprise Architecture from Theory to Practice

GBP 54.99
1

The Sensible Guide to Program Management Professional (PgMP) Success

The Sensible Guide to Program Management Professional (PgMP) Success

A Sensible Guide to Program Management Professional (PgMP)® Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management – 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating facilitating managing and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts processes and tools that form the foundation of today’s program management? Since program management is still an emerging profession with professionals often working in different ways what does this mean for a standard exam? More specifically how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts processes and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern this book differs from other study guides by describing the author’s personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern this book contains 420 practice questions access to an online exam simulator and an online PgMP community and a time-tested approach for passing the PgMP exam. | The Sensible Guide to Program Management Professional (PgMP)® Success

GBP 52.99
1

The Insider Threat Assessment and Mitigation of Risks

The Web Accessibility Project Development and Testing Best Practices

The Web Accessibility Project Development and Testing Best Practices

Approximately 15% of the global population is affected by some sort of disability according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software’s and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design development and extensive accessibility testing which are essential for most of the customer-facing websites. In a fast-paced world incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit accessibility functional tests and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book developers can help their organizations rise to a whole new level of accessibility adherence innovation and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users. | The Web Accessibility Project Development and Testing Best Practices

GBP 66.99
1

The Internet of Things Enabling Technologies Platforms and Use Cases

The Internet of Things Enabling Technologies Platforms and Use Cases

As more and more devices become interconnected through the Internet of Things (IoT) there is an even greater need for this book which explains the technology the internetworking and applications that are making IoT an everyday reality. The book begins with a discussion of IoT ecosystems and the technology that enables them which includes:Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement PlatformsA chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection storage translation real-time processing mining and analysis all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices mobile technology wearables RFID sensors and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements promising applications and roles of cloud computing and data analytics. The book also examines smart homes smart cities and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter. | The Internet of Things Enabling Technologies Platforms and Use Cases

GBP 44.99
1