41 results (0,22055 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Agile Software Development

How to Win at CRM Strategy Implementation Management

Data Analytics Applications in Latin America and Emerging Economies

Human Dimensions of Cybersecurity

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership is a must read for anyone involved in international business. It enables beginners to avoid common pitfalls and seasoned executives will recognize many of their own mistakes and benefit from the frameworks Dr. Kraljevic provides. — Professor Sibrandes Poppema President University of Groningen NetherlandsI just cannot stop recommending this book to ever so many people—my academic colleagues industry colleagues friends in the government former students students young CEOs of start-ups that I mentor and my media friends. The book is very special deep with several gems of ideas told in absorbing narrative; neither a text book nor a cook book but a candid sincere and extremely effective set of real world lessons for so many global citizens. Dr. Kraljevic uses personal examples from across continents in diverse industry settings. All I can say is this: Go grab the book on a Thursday night and you will have a wonderful weekend reading this amazing book. — Professor S. Sadagopan Director International Institute of Information Technology of Bangalore India Everything I know about international markets I owe it to Zlática. — Sue Payne Former ExxonMobil Area Manager U. S. & Mexico As the global village rapidly expands understanding borderless leadership becomes a prerequisite for international success in this 21st century. Kraljevic brings her vast and unique worldly experiences to open your mind with practical treasures thoughtful how-to models and conceptual insights. Find out about the human fractal on your journey to becoming a borderless leader. — Lane Sloan Former President Shell Chemical Company USA Studies consistently show that international partnerships between organizations fail to generate expected results at a significant cost. The leading cause behind this failure is lack of trust among people at all levels within organizations. Borderless Leadership explores the disparity that exists between the ways that the West and other cultures conduct business. The book’s premise is that if one cannot control the events or circumstances one must learn how to control reactions to new environments. Using real-life examples the book illustrates how to build trust and rapport with business partners across borders and establish relationships that help businesses grow. The book is about achieving success with and through total strangers as you progress from awareness to understanding and from understanding to acquiring internalizing and applying new knowledge so you bring your approach to life up to date. Only then can you transform obstacles into unsuspected opportunities that will have a positive impact on your personal and business success. | Borderless Leadership Global Skills for Personal and Business Success

GBP 42.99
1

The Insider Threat Assessment and Mitigation of Risks

Acquiring Card Payments

Effective Methods for Software Engineering

Effective Methods for Software Engineering

Software is important because it is used by a great many people in companies and institutions. This book presents engineering methods for designing and building software. Based on the author’s experience in software engineering as a programmer in the defense and aerospace industries this book explains how to ensure a software that is programmed operates according to its requirements. It also shows how to develop operate and maintain software engineering capabilities by instilling an engineering discipline to support programming design builds and delivery to customers. This book helps software engineers to:Understand the basic concepts standards and requirements of software engineering. Select the appropriate programming and design techniques. Effectively use software engineering tools and applications. Create specifications to comply with the software standards and requirements. Utilize various methods and techniques to identify defects. Manage changes to standards and requirements. Besides providing a technical view this book discusses the moral and ethical responsibility of software engineers to ensure that the software they design and program does not cause serious problems. Software engineers tend to be concerned with the technical elegance of their software products and tools whereas customers tend to be concerned only with whether a software product meets their needs and is easy and ready to use. This book looks at these two sides of software development and the challenges they present for software engineering. A critical understanding of software engineering empowers developers to choose the right methods for achieving effective results. Effective Methods for Software Engineering guides software programmers and developers to develop this critical understanding that is so crucial in today’s software-dependent society.

GBP 42.99
1

The Internet of Things and Big Data Analytics Integrated Platforms and Industry Use Cases

The Internet of Things and Big Data Analytics Integrated Platforms and Industry Use Cases

This book comprehensively conveys the theoretical and practical aspects of IoT and big data analytics with the solid contributions from practitioners as well as academicians. This book examines and expounds the unique capabilities of the big data analytics platforms in capturing cleansing and crunching IoT device/sensor data in order to extricate actionable insights. A number of experimental case studies and real-world scenarios are incorporated in this book in order to instigate our book readers. This bookAnalyzes current research and development in the domains of IoT and big data analyticsGives an overview of latest trends and transitions happening in the IoT data analytics spaceIllustrates the various platforms processes patterns and practices for simplifying and streamlining IoT data analytics The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases examines and accentuates how the multiple challenges at the cusp of IoT and big data can be fully met. The device ecosystem is growing steadily. It is forecast that there will be billions of connected devices in the years to come. When these IoT devices resource-constrained as well as resource-intensive interact with one another locally and remotely the amount of multi-structured data generated collected and stored is bound to grow exponentially. Another prominent trend is the integration of IoT devices with cloud-based applications services infrastructures middleware solutions and databases. This book examines the pioneering technologies and tools emerging and evolving in order to collect pre-process store process and analyze data heaps in order to disentangle actionable insights. | The Internet of Things and Big Data Analytics Integrated Platforms and Industry Use Cases

GBP 42.99
1

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Bankers Like Us Dispatches from an Industry in Transition

Bankers Like Us Dispatches from an Industry in Transition

This book will resonate with anyone no matter where you reside on this journey whether newbie or old guard. If you want to be part of this change you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate then I suggest you think about stepping aside. — Curt Queyrouze President Coastal Community Bank The world is going digital and so is banking—in fits starts and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about not by external heroes and saviours not by a generation yet to be born but people just like us. People who understand the industry and its quirks. Bankers who have the grit determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a ‘this is who we are’ piece including the author’s trench credentials. It then presents an overview of corporate culture (this is what we deal with and a few ideas on how to handle it) as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds and a hopeful look-ahead on what a team of principled dedicated folks can do despite everything. | Bankers Like Us Dispatches from an Industry in Transition

GBP 29.99
1

Quantifying Software Global and Industry Perspectives

Quantifying Software Global and Industry Perspectives

Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many millions of dollars. Software is also the target of frequent and increasingly serious cyber-attacks. Among the reasons for these software problems is a chronic lack of reliable quantified data. This reference provides quantified data from many countries and many industries based on about 26 000 projects developed using a variety of methodologies and team experience levels. The data has been gathered between 1970 and 2017 so interesting historical trends are available. Since current average software productivity and quality results are suboptimal this book focuses on best in class results and shows not only quantified quality and productivity data from best-in-class organizations but also the technology stacks used to achieve best-in-class results. The overall goal of this book is to encourage the adoption of best-in-class software metrics and best-in-class technology stacks. It does so by providing current data on average software schedules effort costs and quality for several industries and countries. Because productivity and quality vary by technology and size the book presents quantitative results for applications between 100 function points and 100 000 function points. It shows quality results using defect potential and DRE metrics because the number one cost driver for software is finding and fixing bugs. The book presents data on cost of quality for software projects and discusses technical debt but that metric is not standardized. Finally the book includes some data on three years of software maintenance and enhancements as well as some data on total cost of ownership. | Quantifying Software Global and Industry Perspectives

GBP 42.99
1

Software Engineering with UML

Electronically Stored Information The Complete Guide to Management Understanding Acquisition Storage Search and Retrieval Second Edition

ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

ERP Systems for Manufacturing Supply Chains: Applications Configuration and Performance provides insight into the core architecture modules and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module’s structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system’s core modules and functions this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies. | ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

GBP 42.99
1

Security without Obscurity A Guide to PKI Operations

Ethics and Governance in Project Management Small Sins Allowed and the Line of Impunity

The DataOps Revolution Delivering the Data-Driven Enterprise

The DataOps Revolution Delivering the Data-Driven Enterprise

DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author’s own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www. kinaesis. com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members. | The DataOps Revolution Delivering the Data-Driven Enterprise

GBP 31.99
1

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives in-depth explanations of each topic and accurate practice questions. Each chapter includes exam tips that highlight key exam information hands-on exercises a summary that serves as a quick review and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily it also serves as an ideal on-the-job reference. Richard E. Cascarino MBA CIA CISM CFE CRMA is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa Europe the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA and the Association of Certified Fraud Examiners where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand author of the book Internal Auditing: An Integrated Approach now in its third edition. This book is extensively used as a university textbook worldwide. In addition he is the author of the Auditor's Guide to IT Auditing Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE the Ultimate Resource.

GBP 36.99
1

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book you will learn how to create a working practical control structure that will ensure the ongoing day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning all the way down to basic technology operation.

GBP 42.99
1

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems engineering has been applied to some of the most important projects of our time including those that have helped humanity explore the world and the universe expand our technical abilities and enhance the quality of human life. Without formal training in systems engineering the discipline is often difficult to understand and apply and its use within projects is often confusing. Systems Engineering for Projects: Achieving Positive Outcomes in a Complex World provides an approach that utilizes a combination of the most effective processes from both project management and systems engineering disciplines in a simplified and straightforward manner. The processes described in the book are lightweight flexible and tailorable. They provide the shortest path to success in projects across the entire project life cycle from research to operations and from simple to the most complex. The book also addresses how this methodology can be used in a continually adapting and changing world as projects span disciplines and become even more interconnected across all areas of human existence. Each chapter includes diagrams templates summary lists a case study and a thought-provoking question and answer section that assists readers in immediate application of the material to their own projects. The book is a project manager’s resource for understanding how to directly apply essential processes to projects in a way that increases the probability of achieving success. It is a comprehensive go-to manual on the application of systems engineering processes to projects of all types and complexity. | Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

GBP 42.99
1

Human–Computer Interaction Fundamentals and Practice

Human–Computer Interaction Fundamentals and Practice

Although life continues to become increasingly embedded with interactive computing services that make our lives easier human-computer interaction (HCI) has not been given the attention it deserves in the education of software developers at the undergraduate level. Most entry-level HCI textbooks are structured around high-level concepts and are not directly tied to the software development process. Filling this need Human-Computer Interaction: Fundamentals and Practice supplies an accessible introduction to the entire cycle of HCI design and implementation—explaining the core HCI concepts behind each step. Designed around the overall development cycle for an interactive software product it starts off by covering the fundamentals behind HCI. The text then quickly goes into the application of this knowledge. It covers the forming of HCI requirements modeling the interaction process designing the interface implementing the resulting design and evaluating the implemented product. Although this textbook is suitable for undergraduate students of computer science and information technology it is accessible enough to be understood by those with minimal programming knowledge. Supplying readers with a firm foundation in the main HCI principles the book provides a working knowledge of HCI-oriented software development. The core content of this book is based on the introductory HCI course (advanced junior or senior-level undergraduate) that the author has been teaching at Korea University for the past eight years. The book includes access to PowerPoint lecture slides as well as source code for the example applications used throughout the text. | Human–Computer Interaction Fundamentals and Practice

GBP 42.99
1

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

Cybersecurity for Information Professionals Concepts and Applications

Cybersecurity for Information Professionals Concepts and Applications

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However the number of both cybersecurity and privacy breach incidents are soaring which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture making individuals more cybersecurity-conscious as well. However it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals librarians archivists record managers students and professionals in related disciplines. This book is written especially for educators preparing courses in information security cybersecurity and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations threats and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all the book addresses the ongoing challenges of cybersecurity. In particular it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior. | Cybersecurity for Information Professionals Concepts and Applications

GBP 41.99
1

Handbook of e-Business Security