26 results (0,19769 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Information Technology Control and Audit Fifth Edition

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Strategic planning outlines the path between the current status of the business and the desired status. It requires the business to identify its objectives and goals and then make the correct decisions to achieve these objectives and goals. This book provides a complete set of practical strategic planning techniques and tools. It explains how and in what circumstances to use particular tools and how to target them to achieve effective results. Systematic Strategic Planning: A Comprehensive Framework for Implementation Control and Evaluation describes a framework of phases through which each project passes a pattern of procedures for straight-forward planning and the fundamentals involved in any strategic planning project. Designed to be simple to understand and easy to use the book presents techniques case studies and working forms to guide you through preparing a strategic plan for your existing or future business. The book is organized into four parts:Part I explains the steps to take before and after starting the strategic planning work. Part II provides the overall framework and characteristics of the simplified and full versions of systematic strategic planning. Part III describes the sections of systematic strategic planning in detail. Part IV provides a framework for implementation control and evaluation functions in a systematic manner. This book is designed to help both experienced strategic planners and other types of professionals who are faced with creating a strategic plan for their business. The processes and techniques described should be universally applicable to any type of business. With the information in this book you will be well-equipped to create effective strategic plans that drive your business forward. | Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

GBP 56.99
1

Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

With an ever-increasing amount of information on the web it is critical to understand the pedigree quality and accuracy of your data. Using provenance you can ascertain the quality of data based on its ancestral data and derivations track back to sources of errors allow automatic re-enactment of derivations to update data and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes products tools and standards for secure data management secure Semantic Web secure web services and secure cloud computing.

GBP 56.99
1

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book you will learn how to create a working practical control structure that will ensure the ongoing day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning all the way down to basic technology operation.

GBP 42.99
1

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Handbook of e-Business Security

Implementing Cybersecurity A Guide to the National Institute of Standards and Technology Risk Management Framework

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location demographics and sentiments of the participants of the network and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems analyze such systems and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book together with the numerous references listed in each chapter have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies (2) basics of analyzing and securing social networks (3) the authors’ design and implementation of various social network analytics tools (4) privacy aspects of social networks (5) access control and inference control for social networks (6) experimental systems designed or developed by the authors on analyzing and securing social networks (7) social media application systems developed by the authors (8) secure social media systems developed by the authors and (9) some of the authors’ exploratory work and further directions.

GBP 42.99
1

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Describing how to avoid common vendor traps Buying Supporting Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and ultimately better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts—which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition support and maintenanceExamines hardware and software warranty and support modelsConsiders finance and accounting issues for maintenance and supportSpells out technology product details Explains postwarranty support and maintenanceProvides the understanding to better negotiate with vendor sales teamsIllustrating the types of problems typically experienced during product use the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating. | Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

GBP 56.99
1

Industrial IoT Application Architectures and Use Cases

Industrial IoT Application Architectures and Use Cases

As the number of Internet of Things (IoT) elements grows exponentially their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI) data analytics and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster more stable AI algorithms and approaches knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water managementAn IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillanceAn IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal social and industrial applications.

GBP 42.99
1

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership is a must read for anyone involved in international business. It enables beginners to avoid common pitfalls and seasoned executives will recognize many of their own mistakes and benefit from the frameworks Dr. Kraljevic provides. — Professor Sibrandes Poppema President University of Groningen NetherlandsI just cannot stop recommending this book to ever so many people—my academic colleagues industry colleagues friends in the government former students students young CEOs of start-ups that I mentor and my media friends. The book is very special deep with several gems of ideas told in absorbing narrative; neither a text book nor a cook book but a candid sincere and extremely effective set of real world lessons for so many global citizens. Dr. Kraljevic uses personal examples from across continents in diverse industry settings. All I can say is this: Go grab the book on a Thursday night and you will have a wonderful weekend reading this amazing book. — Professor S. Sadagopan Director International Institute of Information Technology of Bangalore India Everything I know about international markets I owe it to Zlática. — Sue Payne Former ExxonMobil Area Manager U. S. & Mexico As the global village rapidly expands understanding borderless leadership becomes a prerequisite for international success in this 21st century. Kraljevic brings her vast and unique worldly experiences to open your mind with practical treasures thoughtful how-to models and conceptual insights. Find out about the human fractal on your journey to becoming a borderless leader. — Lane Sloan Former President Shell Chemical Company USA Studies consistently show that international partnerships between organizations fail to generate expected results at a significant cost. The leading cause behind this failure is lack of trust among people at all levels within organizations. Borderless Leadership explores the disparity that exists between the ways that the West and other cultures conduct business. The book’s premise is that if one cannot control the events or circumstances one must learn how to control reactions to new environments. Using real-life examples the book illustrates how to build trust and rapport with business partners across borders and establish relationships that help businesses grow. The book is about achieving success with and through total strangers as you progress from awareness to understanding and from understanding to acquiring internalizing and applying new knowledge so you bring your approach to life up to date. Only then can you transform obstacles into unsuspected opportunities that will have a positive impact on your personal and business success. | Borderless Leadership Global Skills for Personal and Business Success

GBP 42.99
1

Active and Programmable Networks for Adaptive Architectures and Services

Active and Programmable Networks for Adaptive Architectures and Services

Most conventional networks are passive with only basic traffic monitoring management routing and congestion control. At best they can be called reactive. Deploying new functions and integrating new standards into these architectures is difficult due to the rigid embedding of software and hardware into the network components. Active and Programmable Networks for Adaptive Architectures and Services introduces a new generation of network technologies and architecture that allows the creation customization and management of new services and applications deployed dynamically into network nodes. Following a brief introduction and historical overview the author outlines the architecture of active and programmable networks discusses the enabling technologies for network programmability in detail and introduces several paradigms and prototypes. He then explores packet scheduling management routing and security and examines active wireless and mobile networks. The final chapter presents several real-world examples of currently deployed active and programmable networks. Several tables present information on different schemes and architectures allowing easy comparison among a range of networking options. Placing the new paradigm in contrast with concepts such as TCP/IP and OSI Active and Programmable Networks for Adaptive Architectures and Services makes it easy to see how these new technologies can help you build more flexible and adaptive networks that can seamlessly integrate new functions.

GBP 56.99
1

802.1X Port-Based Authentication

802.1X Port-Based Authentication

Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802. 1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802. 1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802. 1X port-based authentication a history of the standard and the technical documents published and details of the connections among the three network components. It focuses on the technical aspect of 802. 1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology design and implementation with a specific focus on Cisco devices. Including examples derived from the 802. 1X implementation it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches 802. 1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today’s computer networks using this particular network protocol.

GBP 56.99
1

TCP Performance over UMTS-HSDPA Systems

TCP Performance over UMTS-HSDPA Systems

The evolution of the mobile communication market is causing a major increase in data traffic demands. This could lead to disrupted mobility and intermittent degraded channel conditions that contribute to poor transmission control protocol (TCP) performance. TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity and shows how to reduce the interaction of wireless networks on TCP with minimal cost. With self-contained chapters the book consists of two main sections. The first several chapters provide background and describe the state of the art for wireless networks emphasizing one of the third-generation (3G) wireless technologies: the universal mobile telecommunications system (UMTS). These chapters also include an analysis of the overall cell capacity for UMTS Release 99 and high-speed downlink packet access (HSDPA) systems. The second section focuses on the interaction of TCP with wireless systems presenting an exhaustive list of TCP versions and link layer solutions that adapt TCP (often modifying the original TCP) to a wireless network. This section also displays mathematical modeling of the interaction of hybrid automatic repeat request (HARQ) and TCP in UMTS networks. While offering information for advanced undergraduate students who are unfamiliar with code division multiple access (CDMA) wireless systems as well as UMTS and HSDPA cellular systems the book also provides extensive coverage of TCP over wireless systems problems and solutions for researchers developers and graduate students.

GBP 56.99
1

Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques

Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques

A company with effective cost reduction activities in place will be better positioned to adapt to shifting economic conditions. In fact it can make the difference between organizations that thrive and those that simply survive during times of economic uncertainty. Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques covers the methods and techniques currently available for lowering the costs of products processes and services. Describing why cost reductions can be just as powerful as revenue increases the book arms readers with the understanding required to select the best solution for their company’s culture and capabilities. It emphasizes home-grown techniques that do not require the implementation of any new methodologies—making it easy to apply them in any organization. The authors explain how to reduce costs through traditional Lean methods and Lean Six Sigma. They also present Six Sigma cost savings techniques from Manufacturing Six Sigma Services Six Sigma and Design for Six Sigma. The book also presents optimization techniques from operations research methods design experiment and engineering process control. Helping you determine what your organization’s value proposition is the text explains how to improve on the existing proposition and suggests a range of tools to help you achieve this goal. The tools and techniques presented vary in complexity and capability and most chapters include a rubric at the start to help readers determine the levels of competence required to perform the tasks outlined in that chapter.

GBP 56.99
1

Making Your Data Center Energy Efficient

Making Your Data Center Energy Efficient

Detailing powerful methods for reducing the energy costs associated with operating a data center Making Your Data Center Energy Efficient examines both equipment and building facilities. It reviews the rationale for conserving energy and demonstrates how conservation and careful equipment selection can lead to significant improvements to your bottom line. For those not well-versed in financial or energy terms the first two chapters provide a detailed discussion of the terms associated with different types of energy as well as how to compute the return on investment for energy conservation efforts. The text includes tables of monthly expenses associated with operating equipment that will help you convert problems into simple table lookup processes. Among the money-saving topics discussed it considers: How to minimize the energy consumption of a wide range of devices A little-understood topic that can make a big impact on energy costs general heating and cooling Techniques required to effectively monitor different types of meters Phantom energy usage and methods for minimizing its cost to your organization Recognizing that most readers may not have direct control over the selection of a furnace or hot water heater the book provides you with the ability to recognize the efficiencies and inefficiencies of various types of devices so you can provide input into the decision-making process. From replacing lighting to consolidation and virtualization it provides you with the well-rounded understanding needed to properly manage all aspects of the energy consumed in your data center.

GBP 160.00
1

Social Media and Crowdsourcing Application and Analytics

Social Media and Crowdsourcing Application and Analytics

Social media and crowdsourcing are important tools for solving complex problems. The benefit of crowdsourcing is that it leverages the power of human intelligence cost effectively and with less time. Social Media and Crowdsourcing: Application and Analytics examines the concepts of social media and crowdsourcing as well as their analytical aspects. It explores how these technologies contribute to the real world and examines such applications as promoting social good agriculture healthcare tourism disaster management education crime control and cultural heritage. The book also looks at ethical issues in crowdsourcing and future scenarios and challenges for policy. Highlights of the book include the following: A crowdsourcing application in agriculture Crowdsourcing outline for a contemporary aided medicinal backup system Crowdsourcing-based recommendation in the tourism industry Crowdsourcing mechanisms for reviving cultural heritage Expanding the overarching concept of utilizing social media and crowdsourcing to solve various real-life problems this book discusses how to bring together the wisdom of crowds for various decision-making problems in agriculture disaster management and healthcare. It addresses the various ethical issues arising out of various crowdsourcing-based applications. It puts forward diverse methodologies to involve crowdsourcing in education to implement new strategies to enhance learning outcomes. This book also addresses various problem-solving techniques for recommender applications in the travel and tourism industry. Providing a systematic discussion of the many sectors using crowdsourcing as an essential part of social innovation this book is a theoretical and methodological look at the application of social media. | Social Media and Crowdsourcing Application and Analytics

GBP 89.99
1

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization: Fundamentals Algorithms and Applications introduces state-of-the-art extremal optimization (EO) and modified EO (MEO) solutions from fundamentals methodologies and algorithms to applications based on numerous classic publications and the authors’ recent original research results. It promotes the movement of EO from academic study to practical applications. The book covers four aspects beginning with a general review of real-world optimization problems and popular solutions with a focus on computational complexity such as NP-hard and the phase transitions occurring on the search landscape. Next it introduces computational extremal dynamics and its applications in EO from principles mechanisms and algorithms to the experiments on some benchmark problems such as TSP spin glass Max-SAT (maximum satisfiability) and graph partition. It then presents studies on the fundamental features of search dynamics and mechanisms in EO with a focus on self-organized optimization evolutionary probability distribution and structure features (e. g. backbones) which are based on the authors’ recent research results. Finally it discusses applications of EO and MEO in multiobjective optimization systems modeling intelligent control and production scheduling. The authors present the advanced features of EO in solving NP-hard problems through problem formulation algorithms and simulation studies on popular benchmarks and industrial applications. They also focus on the development of MEO and its applications. This book can be used as a reference for graduate students research developers and practical engineers who work on developing optimization solutions for those complex systems with hardness that cannot be solved with mathematical optimization or other computational intelligence such as evolutionary computations. | Extremal Optimization Fundamentals Algorithms and Applications

GBP 42.99
1

System Reliability and Security Techniques and Methodologies

System Reliability and Security Techniques and Methodologies

Because of the growing reliance on software concerns are growing as to how reliable a system is before it is commissioned for use how high the level of reliability is in the system and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems. System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modeling and analysis of dependable and secure systems. It examines systems and applications having complex distributed or networked architectures in such fields as: Nuclear energy Ground transportation systems Air traffic control Healthcare and medicine Communications System reliability engineering is a multidisciplinary field that uses computational methods for estimating or predicting the reliability aspects of a system and analyzing failure data obtained from real-world projects. System security is a related field that ensures that even a reliable system is secure against accidental or deliberate intrusions and is free of vulnerabilities. This book covers tools and techniques cutting-edge research topics and methodologies in the areas of system reliability and security. It examines prediction models and methods as well as how to secure a system as it is being developed. | System Reliability and Security Techniques and Methodologies

GBP 59.99
1

A Standard for Enterprise Project Management

A Standard for Enterprise Project Management

Providing structured yet adaptable models of project success within an organization A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. It also supplies an inventory of practical policies procedures techniques and templates for consistent management of projects. The book first discusses project authorization and initiation followed by analysis and planning. It then covers execution control and closure. Each phase contains an explanation and an illustration of how to optimize success. Throughout the text the author refers to numerous appendices that constitute both blank and completed templates. He provides details on how to use these tools with an emphasis on balancing the benefits of standardization and the need for flexibility. The accompanying downloadable resources encompass a color version of the book with four bonus features: Quick start with Project 2003 that offers a one-page tutorial and three pages of screen prints designed to quickly generate readable and concise project plans Complex project readiness grid that suggests how to manage intricate interrelationships in a project or program environment Project management competency development grid that outlines a program for developing key skills among project managers within an organization Traceability matrix that illustrates how various levels of requirements and final solutions are interrelated This book offers a painless guide to quickly getting business initiatives out of the clouds and onto the ground. Blending the rigor and discipline of project management with the thoroughness of business analysis it shows how to successfully build complement and enhance project management and business analysis in any organization.

GBP 160.00
1

The Complete Project Management Office Handbook

The Complete Project Management Office Handbook

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight control and support. Illustrating the implications of project management in today’s organizations The Complete Project Management Office Handbook Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs purpose and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists detailed process steps and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate quick-wins and early PMO-based accomplishments in their organization.

GBP 42.99
1

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Most people do not truly understand a concept until they can visualize it. This applies to all fields including Project Management. The best way to effectively manage projects is to help your team visualize the end result as well as the steps needed to achieve that result. Help Your Team Visualize the Right Path to Success Building a Project Work Breakdown Structure: Visualizing Objectives Deliverables Activities and Schedules employs a diagram approach to project planning and scheduling. This useful tool empowers business professionals to take control of and successfully communicate their projects ensuring they are completed on time with their targeted impact. Industry professional Dennis P. Miller a consultant to leading Fortune 500 companies thoroughly explains the keys to an effective Work Breakdown Structure (WBS) through an Eight Step Process. He has refined this process over a period of twenty years applying it to over 100 projects ranging from software development to social events. The Eight Step Process starts with a concentrated effort to define the project through its deliverables. The middle steps walk the project team through a process of activity definition and sequencing and resource assignment. Finally the last steps involve estimating the duration and verifying the project timeline. Not Just What to Do But How to Do It! This is a hands-on volume that includes a practice section for each of the eight steps providing readers with real examples of how the author has successfully applied this process. The result of its application is a visualization of the project‘s objectives deliverables activities and schedules. Over 130 illustrations enrich the instructions. Project managers are assured of success by following the simple tools in this unique and comprehensive volume. | Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

GBP 170.00
1

A Software Development Approach for Driving Competitiveness in Small Firms

A Software Development Approach for Driving Competitiveness in Small Firms

The COVID-19 Pandemic has forced many businesses to accelerate their digital transformation strategies to continue to meet the changing needs of their customers. This has resulted in significant growth in the global software market. However for decades managing software product quality has been a major challenge for many software development firms. This low success rate is due mainly to the development and delivery of low-quality software products. In addition to the direct costs associated with poor-quality software software flaws can also raisesecurity concerns as hackers can gain complete control of various devices and data such as mobile phones computers or the operational transactions of businesses. These security and privacy breaches are currently occurring with great frequency. Although producers and consumers of software products spend vast amounts of money developing and purchasing these products in many cases the promised benefits of user satisfaction efficiency productivity and profitability are not realized. In more severe circumstances software development firms have failed and face the threat of going bankrupt being acquired or suffering closure because customers are demanding high-quality software products that they consistently fail to deliver. Small and medium enterprises (SMEs) operating within the software development industry have a more critical need to produce high-quality software since they are less able to absorb both the cost and the reputational impact of producing low-quality output. A Software Development Approach for Driving Competitiveness in Small Firms provides some cost-efficient options that can help SMEs increase the likelihood that their software will be of high quality. It tells the story of the entrepreneurial journey that small firms should take to deliver high-quality software products. By utilizing practical examples and providing several recommended solutions to decrease the likelihood of producing low-quality software the book outlines how mobilizing people processes and technology are integral to the software development process and emphasizes why process maturity is the most influential factor in software development in small and medium enterprises.

GBP 89.99
1

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives in-depth explanations of each topic and accurate practice questions. Each chapter includes exam tips that highlight key exam information hands-on exercises a summary that serves as a quick review and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily it also serves as an ideal on-the-job reference. Richard E. Cascarino MBA CIA CISM CFE CRMA is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa Europe the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA and the Association of Certified Fraud Examiners where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand author of the book Internal Auditing: An Integrated Approach now in its third edition. This book is extensively used as a university textbook worldwide. In addition he is the author of the Auditor's Guide to IT Auditing Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE the Ultimate Resource.

GBP 36.99
1