23 results (0,16511 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

The Total CISSP Exam Prep Book Practice Questions Answers and Test Taking Tips and Techniques

GBP 160.00
1

Intelligent Data Analytics IoT and Blockchain

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test or ethical hack from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools which are required to complete a penetration test. The book covers a wide range of tools including Backtrack Linux Google reconnaissance MetaGooFil dig Nmap Nessus Metasploit Fast Track Autopwn Netcat and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools it details a four-step methodology for conducting an effective penetration test or hack. Providing an accessible introduction to penetration testing and hacking the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

GBP 170.00
1

Social Media and Crowdsourcing Application and Analytics

Social Media and Crowdsourcing Application and Analytics

Social media and crowdsourcing are important tools for solving complex problems. The benefit of crowdsourcing is that it leverages the power of human intelligence cost effectively and with less time. Social Media and Crowdsourcing: Application and Analytics examines the concepts of social media and crowdsourcing as well as their analytical aspects. It explores how these technologies contribute to the real world and examines such applications as promoting social good agriculture healthcare tourism disaster management education crime control and cultural heritage. The book also looks at ethical issues in crowdsourcing and future scenarios and challenges for policy. Highlights of the book include the following: A crowdsourcing application in agriculture Crowdsourcing outline for a contemporary aided medicinal backup system Crowdsourcing-based recommendation in the tourism industry Crowdsourcing mechanisms for reviving cultural heritage Expanding the overarching concept of utilizing social media and crowdsourcing to solve various real-life problems this book discusses how to bring together the wisdom of crowds for various decision-making problems in agriculture disaster management and healthcare. It addresses the various ethical issues arising out of various crowdsourcing-based applications. It puts forward diverse methodologies to involve crowdsourcing in education to implement new strategies to enhance learning outcomes. This book also addresses various problem-solving techniques for recommender applications in the travel and tourism industry. Providing a systematic discussion of the many sectors using crowdsourcing as an essential part of social innovation this book is a theoretical and methodological look at the application of social media. | Social Media and Crowdsourcing Application and Analytics

GBP 89.99
1

C++ Template Metaprogramming in Practice A Deep Learning Framework

C++ Template Metaprogramming in Practice A Deep Learning Framework

Using the implementation of a deep learning framework as an example C++ Template Metaprogramming in Practice: A Deep Learning Framework explains the application of metaprogramming in a relatively large project and emphasizes ways to optimize systems performance. The book is suitable for developers with a basic knowledge of C++. Developers familiar with mainstream deep learning frameworks can also refer to this book to compare the differences between the deep learning framework implemented with metaprogramming and compile-time computing with deep learning frameworks using object-oriented methods. Consisting of eight chapters the book starts with two chapters discussing basic techniques of metaprogramming and compile-time computing. The rest of the book’s chapters focus on the practical application of metaprogramming in a deep learning framework. It examines rich types and systems expression templates and writing complex meta-functions as well as such topics as: Heterogeneous dictionaries and policy templates An introduction to deep learning Type system and basic data types Operations and expression templates Basic layers Composite and recurrent layers Evaluation and its optimization Metaprogramming can construct flexible and efficient code. For C++ developers who are familiar with object-oriented programming the main difficulty in learning and mastering C++ metaprogramming is establishing the thinking mode of functional programming. The meta-programming approach involved at compile time is functional which means that the intermediate results of the construction cannot be changed and the impact may be greater than expected. This book enables C++ programmers to develop a functional mindset and metaprogramming skills. The book also discusses the development cost and use cost of metaprogramming and provides workarounds for minimizing these costs. | C++ Template Metaprogramming in Practice A Deep Learning Framework

GBP 99.99
1

Ready Technology Fast-Tracking New Business Technologies

Practical Data Mining Techniques and Applications

Practical Data Mining Techniques and Applications

Data mining techniques and algorithms are extensively used to build real-world applications. A practical approach can be applied to data mining techniques to build applications. Once deployed an application enables the developers to work on the users’ goals and mold the algorithms with respect to users’ perspectives. Practical Data Mining Techniques and Applications focuses on various concepts related to data mining and how these techniques can be used to develop and deploy applications. The book provides a systematic composition of fundamental concepts of data mining blended with practical applications. The aim of this book is to provide access to practical data mining applications and techniques to help readers gain an understanding of data mining in practice. Readers also learn how relevant techniques and algorithms are applied to solve problems and to provide solutions to real-world applications in different domains. This book can help academicians to extend their knowledge of the field as well as their understanding of applications based on different techniques to gain greater insight. It can also help researchers with real-world applications by diving deeper into the domain. Computing science students application developers and business professionals may also benefit from this examination of applied data science techniques. By highlighting an overall picture of the field introducing various mining techniques and focusing on different applications and research directions using these methods this book can motivate discussions among academics researchers professionals and students to exchange and develop their views regarding the dynamic field that is data mining.

GBP 150.00
1

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

A Technical Guide to IPSec Virtual Private Networks

A Standard for Enterprise Project Management

A Standard for Enterprise Project Management

Providing structured yet adaptable models of project success within an organization A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. It also supplies an inventory of practical policies procedures techniques and templates for consistent management of projects. The book first discusses project authorization and initiation followed by analysis and planning. It then covers execution control and closure. Each phase contains an explanation and an illustration of how to optimize success. Throughout the text the author refers to numerous appendices that constitute both blank and completed templates. He provides details on how to use these tools with an emphasis on balancing the benefits of standardization and the need for flexibility. The accompanying downloadable resources encompass a color version of the book with four bonus features: Quick start with Project 2003 that offers a one-page tutorial and three pages of screen prints designed to quickly generate readable and concise project plans Complex project readiness grid that suggests how to manage intricate interrelationships in a project or program environment Project management competency development grid that outlines a program for developing key skills among project managers within an organization Traceability matrix that illustrates how various levels of requirements and final solutions are interrelated This book offers a painless guide to quickly getting business initiatives out of the clouds and onto the ground. Blending the rigor and discipline of project management with the thoroughness of business analysis it shows how to successfully build complement and enhance project management and business analysis in any organization.

GBP 160.00
1

Ethics and the Internal Auditor's Political Dilemma Tools and Techniques to Evaluate a Company's Ethical Culture

Cyber Security Essentials

Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats tactics and procedures. To accomplish this the team of security professionals from VeriSign‘s iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security the book: Covers attacker methods and motivations exploitation trends malicious code techniques and the latest threat vectors Addresses more than 75 key security concepts in a series of concise well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‘s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

GBP 160.00
1

Project Management in Small and Medium-Sized Enterprises A European Perspective

Project Management in Small and Medium-Sized Enterprises A European Perspective

The growing importance of projects in organizations combined with difficulties in their implementation is accompanied by the need for professional knowledge in the field of project management. It results from the complexity of project management problems and the difficulty of knowledge that must be applied. However surprisingly little is known about this topic especially in the context of European small and medium-sized enterprises (SMEs). Project Management in Small and Medium-Sized Enterprises: A European Perspective attempts to fill this specific research gap. The book analyses the process of managing projects being implemented by small and medium-sized firms from Europe identifies organizational processes and verifies which elements of these processes require improvement. It concentrates on issues around the multifaceted characteristics of project management with particular emphasis on the process of managing European small and medium enterprises. The book is the result of many years of empirical research and consists of two main parts: A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy. A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy Verification and development of such model procedures in the management of projects so that the SME enterprises’ functioning will be efficient and effective. There is a close relationship between the two parts. The theoretical part is the foundation on which practical considerations are later carried out. Integrating theoretical and practical issues the book introduces new content to the literature and has the practical value of indicating how to manage projects in SMEs in the European Union. It also examines the decision-making processes related to project management in these organizations. | Project Management in Small and Medium-Sized Enterprises A European Perspective

GBP 89.99
1

Enterprise Architecture for Strategic Management of Modern IT Solutions

Enterprise Architecture for Strategic Management of Modern IT Solutions

The popularity of enterprise architecture (EA) has increased in the last two decades in both business and academic domains. Despite the cumulative interest from all sectors the implementation and practice of EA have been entangled with numerous challenges and complexities. Consequently some organisations continue to theorise the concept which has ramifications on practice and ROI. This has led to many studies that have been conducted to understand the complexities impacting the implementation and practice of EA in organisations. Yet the trajectory of some convolutions remain a mystery in many quarters. This attributes to the struggle to articulate the value of EA in many environments. Hence many organisations find it difficult to apply EA for strategic management of modern information technology (IT) solutions. Enterprise Architecture for strategic Management of Modern IT Solutions provides guidance on how to employ EA in deploying and managing IT solutions from pragmatic and implementable perspectives. Until now implementation and practice of EA have been slow despite its growing popularity and interest from all sectors. This book employs sociotechnical theories such as actor-network theory (ANT) and structuration theory (ST) as lenses to examine and explain why and how challenges and complexities exist and derail the implementation or practice of EA in organisations. This serves to enable practitioners and readers to gain fresh insights on why the challenges exist and how they can be addressed in creating collaborative capabilities for business enhancement sustainability and competitiveness. The book provides detailed insights on how to apply EA for organisational purposes from three main fronts. First it explains the implications that lack of understanding of EA have on organisational activities and processes. Second it examines the challenges and complexities that hinder the implementation and practice of EA in organisations. Third it proposes models and frameworks on how EA can be applied for strategic management of modern IT solutions in organisations. Written for postgraduates researchers academics and professionals in the fields of EA IT and information systems this book provides a valuable resource that will enable and enhance implementation and practice of EA including future studies.

GBP 99.99
1

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

Telecommunications Cost Management

Telecommunications Cost Management

Our world is rapidly becoming an Internet-based world with tens of millions of homes millions of businesses and within a short period of time possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users ranging from individual professionals to networking managers and administrators is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to advanced topics in subnetting network address translation and configuring workstations servers and routers. The book contains network tools that prepare you for testing and troubleshooting and highlights the need for techniques that conserve the use of IP addressing as well as the creation of a next generation IP addressing structure. While structured on a chapter by chapter basis wherever possible each chapter was written to be independent making the book convenient and easy to use in a hectic work environment. While you may find it possible to design a network or configure a workstation to operate without a detailed knowledge of IP addressing the end results are not very efficient. And in the quickly changing global business environment inefficiency wastes your time and money both valuable resources for gaining and maintaining the competitive edge. With The ABCs of IP Addressing you get the comprehensive coverage of applications and protocols that help you do your job faster and more effectively. | Telecommunications Cost Management

GBP 160.00
1

The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects but in the complex relationships inside the operating systems. The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation addresses this complexity. Written from the perspective of the designer of an operating system this book tackles important issues and practical problems on how to understand an operating system completely and systematically. It removes the mystery revealing operating system design guidelines explaining the BIOS code directly related to the operating system and simplifying the relationships and guiding ideology behind it all. Based on the Source Code of a Real Multi-Process Operating System Using the 0. 11 edition source code as a representation of the Linux basic design the book illustrates the real states of an operating system in actual operations. It provides a complete systematic analysis of the operating system source code as well as a direct and complete understanding of the real operating system run-time structure. The author includes run-time memory structure diagrams and an accompanying essay to help readers grasp the dynamics behind Linux and similar software systems. Identifies through diagrams the location of the key operating system data structures that lie in the memory Indicates through diagrams the current operating status information which helps users understand the interrupt state and left time slice of processes Examines the relationship between process and memory memory and file file and process and the kernel Explores the essential association preparation and transition which is the vital part of operating system Develop a System of Your Own This text offers an in-dep | The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

GBP 170.00
1

Blockchain and IoT Integration Approaches and Applications

Blockchain and IoT Integration Approaches and Applications

As technology continues to advance and the interconnection of various devices makes our lives easier it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms turn on or off the lights and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain an encrypted distributed computer filing system can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable secure and permanent method of recording data processed by smart machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids smart cities and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems | Blockchain and IoT Integration Approaches and Applications

GBP 100.00
1

Technologies for Sustainable Global Higher Education

Technologies for Sustainable Global Higher Education

Digital technologies are influencing the way we learn live work and exist in different contexts of society in the digital age. There are a variety of learning systems that support innovative digital approaches and universities and organizations around the world are investing in building their own e-learning platforms. Digital technologies are enabling wider access to education and new markets for student recruitment resulting in increased income prospects for global higher education institutions. Technology enables numerous data and information sources which give greater access to information and data. It also enables highly virtual environments which impact teaching and the classroom. The widespread use and application of digital technologies in the teaching and learning process provoke pedagogical inquiry and mediation. It is in this context that Technologies for Sustainable Global Higher Education focuses on analyzing the application of digital technologies in the teaching–learning process. The chapters in this edited collection seek to answer questions relevant to the context of higher education such as: What is the concept of digital technologies? How is digital technology used to mediate the learning process? What technologies are used to qualify education in higher education? This book provides answers to these questions by focusing on issues central to improving education through digital technologies digital learning and pedagogical practices in digital education. It also provides case studies of higher education institutions.

GBP 110.00
1

Making Your Data Center Energy Efficient

Making Your Data Center Energy Efficient

Detailing powerful methods for reducing the energy costs associated with operating a data center Making Your Data Center Energy Efficient examines both equipment and building facilities. It reviews the rationale for conserving energy and demonstrates how conservation and careful equipment selection can lead to significant improvements to your bottom line. For those not well-versed in financial or energy terms the first two chapters provide a detailed discussion of the terms associated with different types of energy as well as how to compute the return on investment for energy conservation efforts. The text includes tables of monthly expenses associated with operating equipment that will help you convert problems into simple table lookup processes. Among the money-saving topics discussed it considers: How to minimize the energy consumption of a wide range of devices A little-understood topic that can make a big impact on energy costs general heating and cooling Techniques required to effectively monitor different types of meters Phantom energy usage and methods for minimizing its cost to your organization Recognizing that most readers may not have direct control over the selection of a furnace or hot water heater the book provides you with the ability to recognize the efficiencies and inefficiencies of various types of devices so you can provide input into the decision-making process. From replacing lighting to consolidation and virtualization it provides you with the well-rounded understanding needed to properly manage all aspects of the energy consumed in your data center.

GBP 160.00
1

Securing IoT in Industry 4.0 Applications with Blockchain

Securing IoT in Industry 4.0 Applications with Blockchain

The Industry 4. 0 revolution is changing the world around us. Artificial intelligence and machine learning automation and robotics big data Internet of Things augmented reality virtual reality and creativity are the tools of Industry 4. 0. Improved collaboration is seen between smart systems and humans which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4. 0 Applications with Blockchain examines the role of IoT in Industry 4. 0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications architecture technologies tools and programming languages. It then examines blockchain and cybersecurity as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4. 0 systems The evolution of the Industrial Internet of Things (IIoT) its proliferation and market share and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT) including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications including smart contracts transferring financial instruments and Public Key Infrastructure An overview of the structure and working of a blockchain including the types evolution benefits and applications of blockchain to industries A framework of technologies designed to shield networks computers and data from malware vulnerabilities and unauthorized activities An explanation of the automation system employed in industries along with its classification functionality flexibility limitations and applications

GBP 115.00
1

Applied Edge AI Concepts Platforms and Industry Use Cases

Applied Edge AI Concepts Platforms and Industry Use Cases

The strategically sound combination of edge computing and artificial intelligence (AI) results in a series of distinct innovations and disruptions enabling worldwide enterprises to visualize and realize next-generation software products solutions and services. Businesses individuals and innovators are all set to embrace and experience the sophisticated capabilities of Edge AI. With the faster maturity and stability of Edge AI technologies and tools the world is destined to have a dazzling array of edge-native people-centric event-driven real-time service-oriented process-aware and insights-filled services. Further on business workloads and IT services will become competent and cognitive with state-of-the-art Edge AI infrastructure modules AI algorithms and models enabling frameworks integrated platforms accelerators high-performance processors etc. The Edge AI paradigm will help enterprises evolve into real-time and intelligent digital organizations. Applied Edge AI: Concepts Platforms and Industry Use Cases focuses on the technologies processes systems and applications that are driving this evolution. It examines the implementation technologies; the products processes platforms patterns and practices; and use cases. AI-enabled chips are exclusively used in edge devices to accelerate intelligent processing at the edge. This book examines AI toolkits and platforms for facilitating edge intelligence. It also covers chips algorithms and tools to implement Edge AI as well as use cases. FEATURES The opportunities and benefits of intelligent edge computing Edge architecture and infrastructure AI-enhanced analytics in an edge environment Encryption for securing information An Edge AI system programmed with Tiny Machine learning algorithms for decision making An improved edge paradigm for addressing the big data movement in IoT implementations by integrating AI and caching to the edge Ambient intelligence in healthcare services and in development of consumer electronic systems Smart manufacturing of unmanned aerial vehicles (UAVs) AI edge computing and blockchain in systems for environmental protection Case studies presenting the potential of leveraging AI in 5G wireless communication | Applied Edge AI Concepts Platforms and Industry Use Cases

GBP 99.99
1

A Software Development Approach for Driving Competitiveness in Small Firms

A Software Development Approach for Driving Competitiveness in Small Firms

The COVID-19 Pandemic has forced many businesses to accelerate their digital transformation strategies to continue to meet the changing needs of their customers. This has resulted in significant growth in the global software market. However for decades managing software product quality has been a major challenge for many software development firms. This low success rate is due mainly to the development and delivery of low-quality software products. In addition to the direct costs associated with poor-quality software software flaws can also raisesecurity concerns as hackers can gain complete control of various devices and data such as mobile phones computers or the operational transactions of businesses. These security and privacy breaches are currently occurring with great frequency. Although producers and consumers of software products spend vast amounts of money developing and purchasing these products in many cases the promised benefits of user satisfaction efficiency productivity and profitability are not realized. In more severe circumstances software development firms have failed and face the threat of going bankrupt being acquired or suffering closure because customers are demanding high-quality software products that they consistently fail to deliver. Small and medium enterprises (SMEs) operating within the software development industry have a more critical need to produce high-quality software since they are less able to absorb both the cost and the reputational impact of producing low-quality output. A Software Development Approach for Driving Competitiveness in Small Firms provides some cost-efficient options that can help SMEs increase the likelihood that their software will be of high quality. It tells the story of the entrepreneurial journey that small firms should take to deliver high-quality software products. By utilizing practical examples and providing several recommended solutions to decrease the likelihood of producing low-quality software the book outlines how mobilizing people processes and technology are integral to the software development process and emphasizes why process maturity is the most influential factor in software development in small and medium enterprises.

GBP 89.99
1