0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (3)
  • R250 - R500 (38)
  • R500+ (840)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Systems management

BTEC Level 3 National IT Student Book 1 (Paperback, 3rd edition): Karen Anderson, Alan Jarvis, Allen Kaye, Jenny Phillips,... BTEC Level 3 National IT Student Book 1 (Paperback, 3rd edition)
Karen Anderson, Alan Jarvis, Allen Kaye, Jenny Phillips, Andrew Smith, … 1
R946 Discovery Miles 9 460 Ships in 12 - 17 working days

Resources designed to support learners of the 2010 BTEC Level 3 National IT specification*. Extensive unit coverage: Student Book 1 covers 14 units including all the mandatory units, giving learners the breadth to tailor the course to their needs and interests, when combined with Student Book 2. Functional Skills and Personal Learning and Thinking Skills are embedded in activities throughout the book. WorkSpace case studies take learners into the real world of work, showing them how they can apply their knowledge in a real-life context.

Auditing Information and Cyber Security Governance - A Controls-Based Approach (Hardcover): Robert E Davis Auditing Information and Cyber Security Governance - A Controls-Based Approach (Hardcover)
Robert E Davis
R1,574 Discovery Miles 15 740 Ships in 12 - 17 working days

"A much-needed service for society today. I hope this book reaches information managers in the organization now vulnerable to hacks that are stealing corporate information and even holding it hostage for ransom." - Ronald W. Hull, author, poet, and former professor and university administrator A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.

Creating an Information Security Program from Scratch (Paperback): Walter Williams Creating an Information Security Program from Scratch (Paperback)
Walter Williams
R1,191 Discovery Miles 11 910 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

The Site Reliability Workbook - Practical ways to implement SRE (Paperback): Betsy Beyer, Niall Richard Murphy, David Rensin,... The Site Reliability Workbook - Practical ways to implement SRE (Paperback)
Betsy Beyer, Niall Richard Murphy, David Rensin, Kent Kawahara, Stephen Thorne
R1,060 R673 Discovery Miles 6 730 Save R387 (37%) In stock

In 2016, Google's Site Reliability Engineering book ignited an industry discussion on what it means to run production services today-and why reliability considerations are fundamental to service design. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment. This new workbook not only combines practical examples from Google's experiences, but also provides case studies from Google's Cloud Platform customers who underwent this journey. Evernote, The Home Depot, The New York Times, and other companies outline hard-won experiences of what worked for them and what didn't. Dive into this workbook and learn how to flesh out your own SRE practice, no matter what size your company is. You'll learn: How to run reliable services in environments you don't completely control-like cloud Practical applications of how to create, monitor, and run your services via Service Level Objectives How to convert existing ops teams to SRE-including how to dig out of operational overload Methods for starting SRE from either greenfield or brownfield

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd New edition):... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments (Paperback, 3rd New edition)
Douglas Landoll
R1,544 Discovery Miles 15 440 Ships in 12 - 17 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting. The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization. Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. It includes features on how to Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports This edition includes detailed guidance on gathering data and analyzes over 200 administrative, technical, and physical controls using the RIIOT data gathering method; introduces the RIIOT FRAME (risk assessment method), including hundreds of tables, over 70 new diagrams and figures, and over 80 exercises; and provides a detailed analysis of many of the popular security risk assessment methods in use today. The companion website (infosecurityrisk.com) provides downloads for checklists, spreadsheets, figures, and tools.

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R1,595 Discovery Miles 15 950 Ships in 12 - 17 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

A Simple Guide to Technology and Analytics (Hardcover): Brian J Evans A Simple Guide to Technology and Analytics (Hardcover)
Brian J Evans
R1,587 Discovery Miles 15 870 Ships in 12 - 17 working days

Everyday technology is constantly changing, and it's hard to keep up with it at times. What is all this talk about automation, STEM, analytics and super-computers, and how will it really affect my daily life at work and in the home? This book is a simple guide to everyday technology and analytics written in plain language. It starts with explaining how computer networks are increasing in speed so fast that we can do more in less time than ever before. It explains the analytical jargon in plain English and why robotics in the home will be aided by the new technology of the quantum computer. Richly furnished with over 200 illustrations, photos and with minimal equations, A Simple Guide to Technology and Analytics is a ready reference book for those times when you don't really understand the technology and analytics being talked about. It explains complicated topics such as automated character recognition in a very simple way, and has simple exercises for the reader to fully understand the technology (with answers at the back). It even has explanations on how home appliances work, which are very useful the next time you go shopping for a microwave or TV. Even the Glossary at the back can be used as a quick look-up explanation for those on the go.

Blue Shark Team-Building - Leading High-Performance Teams during a Crisis (Paperback): Rizwan Amin Sheikh Blue Shark Team-Building - Leading High-Performance Teams during a Crisis (Paperback)
Rizwan Amin Sheikh
R1,142 Discovery Miles 11 420 Ships in 12 - 17 working days

Teams working in a crisis are operating in a high turbulence environment. Blue Shark Teams thrive in a crisis. They swim through turbulence and glide to project success. This book reveals the concepts and practical insight on how to create and lead Blue Shark Teams. The Blue Shark Model of Leading High-Performance Teams is based on Daniel Goleman's emotional intelligence model and Bruce Tuckman's team-building model (forming, storming, norming, performing, and adjourning). This book shows how to apply these models to large companies, small-to-medium size businesses, and projects during a crisis. It explains how managers can develop their leadership style and lead high-performance teams. A real-life case study, which was a success story during the COVID-19 pandemic, is discussed to elaborate the team-building and emotional intelligence models. The lessons learned from this case study can be applied to any crisis in any industry across the spectrum, including healthcare, IT, telecom, construction, manufacturing, oil and gas, airlines, financial services, retail, public sector, and consulting. The book arms executives and managers with the concepts and techniques to lead and manage projects, teams, and companies during turbulent and volatile times. If you are a CEO, CIO, CTO, or CXO of a Fortune 500 company, a mid-to-small size Business Owner, a Project Manager, or a Senior Executive facing a crisis, then this book is for you. It describes real-life case studies and projects that shows how the theoretical frameworks and models developed by leading researchers can be applied successfully to companies and projects, especially during a crisis and pandemic such as COVID-19.

Assessing and Insuring Cybersecurity Risk (Paperback): Ravi Das Assessing and Insuring Cybersecurity Risk (Paperback)
Ravi Das
R1,380 Discovery Miles 13 800 Ships in 12 - 17 working days

Remote workforces using VPNs, cloud-based infrastructure and critical systems, and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company's level of cyber risk and the tolerance level for this risk. Loosely put, this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization's particular level of cyber risk, and what would be deemed appropriate for the organization's risk tolerance. In addition to computing the level of cyber risk, an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA, GDPR, and the HIPAA. To help a security team to comprehensively assess an organization's cyber risk level and how to insure against it, the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR, CCPA, and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task, and this book helps to make it more understandable and manageable.

Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded... Exploratory Social Network Analysis with Pajek - Revised and Expanded Edition for Updated Software (Paperback, Expanded edition)
Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj
R933 Discovery Miles 9 330 Ships in 12 - 17 working days

An extensively revised and expanded third edition of the successful textbook on analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek). The main structural concepts and their applications in social research are introduced with exercises. Pajek software and datasets are available, so readers can learn network analysis through application and case studies. In the end readers will have the knowledge, skills, and tools to apply social network analysis across different disciplines. A fundamental redesign of the menu structure and the capability to analyze much larger networks required a new edition. This edition presents several new operations including community detection, generalized main paths searches, new network indices, advanced visualization approaches, and instructions for installing Pajek under MacOSX. This third edition is up-to-date with Pajek version 5 and it introduces PajekXXL for very large networks and Pajek3XL for huge networks.

BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback): Jenny Phillips, Alan... BTEC Nationals Information Technology Student Book + Activebook - For the 2016 specifications (Paperback)
Jenny Phillips, Alan Jarvis, Mark Fishpool, Richard McGill, Tim Cook, …
R877 Discovery Miles 8 770 Ships in 12 - 17 working days

Tailored support for the new BTEC Nationals in Information Technology

It's All Analytics - Part II - Designing an Integrated AI, Analytics, and Data Science Architecture for Your Organization... It's All Analytics - Part II - Designing an Integrated AI, Analytics, and Data Science Architecture for Your Organization (Hardcover)
Scott Burk, David Sweenor, Gary Miner
R1,409 Discovery Miles 14 090 Ships in 12 - 17 working days

Up to 70% and even more of corporate Analytics Efforts fail!!! Even after these corporations have made very large investments, in time, talent, and money, in developing what they thought were good data and analytics programs. Why? Because the executives and decision makers and the entire analytics team have not considered the most important aspect of making these analytics efforts successful. In this Book II of "It's All Analytics!" series, we describe two primary things: 1) What this "most important aspect" consists of, and 2) How to get this "most important aspect" at the center of the analytics effort and thus make your analytics program successful. This Book II in the series is divided into three main parts: Part I, Organizational Design for Success, discusses ....... The need for a complete company / organizational Alignment of the entire company and its analytics team for making its analytics successful. This means attention to the culture - the company culture culture!!! To be successful, the CEO's and Decision Makers of a company / organization must be fully cognizant of the cultural focus on 'establishing a center of excellence in analytics'. Simply, "culture - company culture" is the most important aspect of a successful analytics program. The focus must be on innovation, as this is needed by the analytics team to develop successful algorithms that will lead to greater company efficiency and increased profits. Part II, Data Design for Success, discusses ..... Data is the cornerstone of success with analytics. You can have the best analytics algorithms and models available, but if you do not have good data, efforts will at best be mediocre if not a complete failure. This Part II also goes further into data with descriptions of things like Volatile Data Memory Storage and Non-Volatile Data Memory Storage, in addition to things like data structures and data formats, plus considering things like Cluster Computing, Data Swamps, Muddy Data, Data Marts, Enterprise Data Warehouse, Data Reservoirs, and Analytic Sandboxes, and additionally Data Virtualization, Curated Data, Purchased Data, Nascent & Future Data, Supplemental Data, Meaningful Data, GIS (Geographic Information Systems) & Geo Analytics Data, Graph Databases, and Time Series Databases. Part II also considers Data Governance including Data Integrity, Data Security, Data Consistency, Data Confidence, Data Leakage, Data Distribution, and Data Literacy. Part III, Analytics Technology Design for Success, discusses .... Analytics Maturity and aspects of this maturity, like Exploratory Data Analysis, Data Preparation, Feature Engineering, Building Models, Model Evaluation, Model Selection, and Model Deployment. Part III also goes into the nuts and bolts of modern predictive analytics, discussing such terms as AI = Artificial Intelligence, Machine Learning, Deep Learning, and the more traditional aspects of analytics that feed into modern analytics like Statistics, Forecasting, Optimization, and Simulation. Part III also goes into how to Communicate and Act upon Analytics, which includes building a successful Analytics Culture within your company / organization. All-in-all, if your company or organization needs to be successful using analytics, this book will give you the basics of what you need to know to make it happen.

Artificial Intelligence for Business Optimization - Research and Applications (Hardcover): Bhuvan Unhelkar, Tad Gonsalves Artificial Intelligence for Business Optimization - Research and Applications (Hardcover)
Bhuvan Unhelkar, Tad Gonsalves
R2,009 Discovery Miles 20 090 Ships in 12 - 17 working days

This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit. By considering business strategies, business process modeling, quality assurance, cybersecurity, governance and big data and focusing on functions, processes, and people's behaviors it helps businesses take a truly holistic approach to business optimization. It contains practical examples that make it easy to understand the concepts and apply them. It is written for practitioners (consultants, senior executives, decision-makers) dealing with real-life business problems on a daily basis, who are keen to develop systematic strategies for the application of AI/ML/BD technologies to business automation and optimization, as well as researchers who want to explore the industrial applications of AI and higher-level students.

The Sensible Guide to Program Management Professional (PgMP) (R) Success (Paperback): Te Wu The Sensible Guide to Program Management Professional (PgMP) (R) Success (Paperback)
Te Wu
R1,401 Discovery Miles 14 010 Ships in 12 - 17 working days

A Sensible Guide to Program Management Professional (PgMP) (R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating, facilitating, managing, and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts, processes, and tools that form the foundation of today's program management? Since program management is still an emerging profession with professionals often working in different ways, what does this mean for a "standard" exam? More specifically, how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern, this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are, especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts, processes, and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples, this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern, this book differs from other study guides by describing the author's personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern, this book contains 420 practice questions, access to an online exam simulator and an online PgMP community, and a time-tested approach for passing the PgMP exam.

Management and Information Technology after Digital Transformation (Hardcover): Peter Ekman, Peter Dahlin, Christina Keller Management and Information Technology after Digital Transformation (Hardcover)
Peter Ekman, Peter Dahlin, Christina Keller
R3,059 Discovery Miles 30 590 Ships in 12 - 17 working days

With the widespread transformation of information into digital form throughout society - firms and organisations are embracing this development to adopt multiple types of IT to increase internal efficiency and to achieve external visibility and effectiveness - we have now reached a position where there is data in abundance and the challenge is to manage and make use of it fully. This book addresses this new managerial situation, the post-digitalisation era, and offers novel perspectives on managing the digital landscape. The topics span how the post-digitalisation era has the potential to renew organisations, markets and society. The chapters of the book are structured in three topical sections but can also be read individually. The chapters are structured to offer insights into the developments that take place at the intersection of the management, information systems and computer science disciplines. It features more than 70 researchers and managers as collaborating authors in 23 thought-provoking chapters. Written for scholars, researchers, students and managers from the management, information systems and computer science disciplines, the book presents a comprehensive and thought-provoking contribution on the challenges of managing organisations and engaging in global markets when tools, systems and data are abundant.

Optimal Enterprise - Structures, Processes and Mathematics of Knowledge, Technology and Human Capital (Hardcover): Mikhail V.... Optimal Enterprise - Structures, Processes and Mathematics of Knowledge, Technology and Human Capital (Hardcover)
Mikhail V. Belov, Dmitry A. Novikov
R2,587 Discovery Miles 25 870 Ships in 12 - 17 working days

In the modern world, most gross product is created within Enterprise firms, project programs, state agencies, transnational corporations and their divisions, as well as various associations and compositions of the above entities. Enterprises, being, on the one hand, complex, and, on the other hand, widespread systems, are the subject matter of cybernetics, system theory, operations research, management sciences and many other fields of knowledge. However, the complexity of the system obstructs the development of mathematically rigorous foundations for Enterprise control. Moreover, methods of operations research and related sciences, which are widely used in practice, provide optimization of the constituents of an Enterprise, without modeling it as a whole system. But the optimization of parts does not lead to the optimality of the whole, and, also, the absence of top-down and holistic mathematical models of Enterprise contradicts the principle of holism and the system approach. The approach in this book looks first at Enterprise Systems and their essential aspects as complex sociotechnical systems composed of integrated sets of structural and process models (Chapters 1 and 2). A uniform description of all the heterogeneous fields of the modern Enterprise (marketing, sales, manufacturing, HR, finance, etc.) is then made, and the Enterprise Control Problem is posed as a top-down and holistic mathematical optimization problem (Chapter 3). Original models and methods of contract theory (Chapter 4), technology management (Chapter 5), human behavior and human capital (Chapter 6) and complex activity and resource planning (Chapter 7) are developed to solve the problem. Structural processes and mathematical models constitute an Optimal Enterprise Control Framework (Chapter 8) that provides a practical solution to the Enterprise Control Problem. This book is a resource for postgraduate and doctoral students, postdoctoral researchers and professors with research interests in the following fields of science: Fundamental Complex Systems study, Complex Systems Engineering, Enterprise Systems Engineering Applications of Operations Research, Optimization, Probability and Stochastic processes to Management Science, Economics and Business Theory of the Firm Business and Management - general, strategy/leadership, organization management, operations management and management information systems Theory of Business Processes, Business Processes Improvement and Reengineering

The DataOps Revolution - Delivering the Data-Driven Enterprise (Paperback): Simon Trewin The DataOps Revolution - Delivering the Data-Driven Enterprise (Paperback)
Simon Trewin
R811 Discovery Miles 8 110 Ships in 10 - 20 working days

DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author's own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches, the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story, which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action, enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www.kinaesis.com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members.

Cognitive Infocommunications (CogInfoCom) (Hardcover, 1st ed. 2015): Peter Baranyi, Adam Csapo, Gyula Sallai Cognitive Infocommunications (CogInfoCom) (Hardcover, 1st ed. 2015)
Peter Baranyi, Adam Csapo, Gyula Sallai
R3,867 Discovery Miles 38 670 Ships in 7 - 11 working days

This book describes the theoretical foundations of cognitive infocommunications (CogInfoCom), and provides a survey on state-of-the-art solutions and applications within the field. The book covers aspects of cognitive infocommunications in research fields such as affective computing, BCI, future internet, HCI, HRI, sensory substitution, and virtual/augmented interactions, and also introduces newly proposed paradigms and initiatives under the field, including CogInfoCom channels, speechability and socio-cognitive ICT. The book focuses on describing the merging between humans and information and communications technology (ICT) at the level of cognitive capabilities with an approach towards developing future cognitive ICT.

Closing the Analytics Talent Gap - An Executive's Guide to Working with Universities (Paperback): Jennifer Priestley,... Closing the Analytics Talent Gap - An Executive's Guide to Working with Universities (Paperback)
Jennifer Priestley, Robert McGrath
R1,129 Discovery Miles 11 290 Ships in 12 - 17 working days

How can we recruit out of your program? We have a project - how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics - can you help me with that? How much does all of this cost? Managers and executives are increasingly asking university professors such questions as they deal with a critical shortage of skilled data analysts. At the same time, academics are asking such questions as: How can I bring a "real" analytical project in the classroom? How can I get "real" data to help my students develop the skills necessary to be a "data scientist? Is what I am teaching in the classroom aligned with the demands of the market for analytical talent? After spending several years answering almost daily e-mails and telephone calls from business managers asking for staffing help and aiding fellow academics with their analytics teaching needs, Dr. Jennifer Priestley of Kennesaw State University and Dr. Robert McGrath of the University of New Hampshire wrote Closing the Analytics Talent Gap: An Executive's Guide to Working with Universities. The book builds a bridge between university analytics programs and business organizations. It promotes a dialog that enables executives to learn how universities can help them find strategically important personnel and universities to learn how they can develop and educate this personnel. Organizations are facing previously unforeseen challenges related to the translation of massive amounts of data - structured and unstructured, static and in-motion, voice, text, and image - into information to solve current challenges and anticipate new ones. The advent of analytics and data science also presents universities with unforeseen challenges of providing learning through application. This book helps both organizations with finding "data natives" and universities with educating students to develop the facility to work in a multi-faceted and complex data environment. .

Creating an Information Security Program from Scratch (Hardcover): Walter Williams Creating an Information Security Program from Scratch (Hardcover)
Walter Williams
R3,067 Discovery Miles 30 670 Ships in 12 - 17 working days

This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.

Nonfunctional Requirements in Mobile Application Development (Hardcover): Varun Gupta, Raj Kumar Chopra, Durg Singh Chauhan Nonfunctional Requirements in Mobile Application Development (Hardcover)
Varun Gupta, Raj Kumar Chopra, Durg Singh Chauhan
R1,403 Discovery Miles 14 030 Ships in 12 - 17 working days

Nonfunctional Requirements in Mobile Application Development is an empirical study that investigates how nonfunctional requirements--as compared with functional requirements--are treated by the software engineers during mobile application development. The book empirically analyzes the contribution of nonfunctional requirements to project parameters such as cost, time, and quality. Such parameters are of prime interest as they determine the survival of organizations in highly dynamic environments. The impact of nonfunctional requirements on project success is analyzed through surveys and case studies, both individually and relative to each other. Sources for data collection include industry, academia, and literature. The book also empirically studies the impact of nonfunctional requirements on the overall business success of both the software development firm and the software procuring firm. Project success is examined to determine if it leads to business success. The book provides rich empirical evidence to place nonfunctional requirements on par with functional requirements to achieve business success in highly competitive markets. This work enhances the body of knowledge through multiple empirical research methods including surveys, case studies, and experimentation to study software engineers' focus on nonfunctional requirements at both project and business levels. The book can guide both computer scientists and business managers in devising theoretical and technical solutions for software release planning to achieve business success.

A Guide to IT Contracting - Checklists, Tools, and Techniques (Hardcover, 2nd New edition): Michael R Overly A Guide to IT Contracting - Checklists, Tools, and Techniques (Hardcover, 2nd New edition)
Michael R Overly
R1,758 Discovery Miles 17 580 Ships in 12 - 17 working days

Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements. In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes downloadable resources with reusable checklists and complete glossary that defines key legal, business, and technical terms Costly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation.

The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments, Second Edition (Paperback,... The Security Risk Assessment Handbook - A Complete Guide for Performing Security Risk Assessments, Second Edition (Paperback, 2nd New edition)
Douglas Landoll
R1,174 Discovery Miles 11 740 Ships in 12 - 17 working days

Conducted properly, information security risk assessments provide managers with the feedback needed to understand threats to corporate assets, determine vulnerabilities of current controls, and select appropriate safeguards. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessor left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition gives you detailed instruction on how to conduct a risk assessment effectively and efficiently. Supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting, this updated edition provides the tools needed to solicit and review the scope and rigor of risk assessment proposals with competence and confidence. Trusted to assess security for leading organizations and government agencies, including the CIA, NSA, and NATO, Douglas Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. He details time-tested methods to help you: Better negotiate the scope and rigor of security assessments Effectively interface with security assessment teams Gain an improved understanding of final report recommendations Deliver insightful comments on draft reports The book includes charts, checklists, and sample reports to help you speed up the data gathering, analysis, and document development process. Walking you through the process of conducting an effective security assessment, it provides the tools and up-to-date understanding you need to select the security measures best suited to your organization.

Blue Shark Team-Building - Leading High-Performance Teams during a Crisis (Hardcover): Rizwan Amin Sheikh Blue Shark Team-Building - Leading High-Performance Teams during a Crisis (Hardcover)
Rizwan Amin Sheikh
R2,436 Discovery Miles 24 360 Ships in 12 - 17 working days

Teams working in a crisis are teams working in high turbulence environments. Blue Shark Teams thrive in a crisis. They swim through turbulence and glide to project success. This book reveals the concepts and practical insight on how to form and lead Blue Shark Teams. The Blue Shark Model of Leading High-Performance Teams is based on Daniel Goleman's emotional intelligence model and Bruce Tuckman's team-building model (forming, storming, norming, performing, and adjourning). This book shows how to apply these models to large companies, small-to-medium size businesses, and projects during a crisis. It explains how managers can develop their leadership style and lead high-performance teams. A real-life case study, which was a success story during COVID-19, is discussed to elaborate the team-building and emotional intelligence models. The lessons learned from this case study can be applied to any crisis in any industries across the spectrum, including healthcare, I.T., telecom, construction, manufacturing, oil and gas, airlines, financial services, retail, public sector, consulting, and public sector. The book arms managers with the concepts and techniques to lead and manage teams, projects, and companies during turbulent and volatile times. If you are a CEO, CIO, CTO, or CXO of a Fortune 500 company, a mid-to-small size business owner, project manager, or a senior executive facing a crisis, this book is for you. It describes real-life case studies and projects and shows how the theoretical frameworks and models developed by leading researchers can be applied successfully to companies and projects, especially during a crisis and pandemic like COVID-19.

Cloud Reliability Engineering - Technologies and Tools (Paperback): Rathnakar Achary, Pethuru Raj Cloud Reliability Engineering - Technologies and Tools (Paperback)
Rathnakar Achary, Pethuru Raj
R1,430 Discovery Miles 14 300 Ships in 12 - 17 working days

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book's chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Routledge Companion to Management…
Robert D. Galliers, Mari-Klara Stein Paperback R1,353 Discovery Miles 13 530
CompTIA A+ 220-801 and 220-802 Practice…
David L. Prowse Paperback R559 R442 Discovery Miles 4 420
Architecture for the Commons…
Jose Sanchez Paperback R943 Discovery Miles 9 430
Security of Internet of Things Nodes…
Chinmay Chakraborty, Sree Ranjani Rajendran, … Hardcover R3,576 Discovery Miles 35 760
The Complete Guide for CPP Examination…
PSP & PCI) DiSalvatore (CPP Paperback R867 Discovery Miles 8 670
Assessing and Insuring Cybersecurity…
Ravi Das Hardcover R3,296 Discovery Miles 32 960
Data Analytics in Marketing…
Mounir Kehal, Shahira El Alfy Hardcover R2,310 Discovery Miles 23 100
Network Science
Albert-Laszlo Barabasi Hardcover R1,234 R1,151 Discovery Miles 11 510
Trust and Records in an Open Digital…
Hrvoje Stancic Paperback R822 Discovery Miles 8 220
The Sensible Guide to Program Management…
Te Wu Hardcover R3,451 Discovery Miles 34 510

 

Partners