10 results (0,14943 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Enterprise Operations Management Handbook Second Edition

Elements of Digital Transformation

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management Second Edition provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective. Because of the critical importance of cybersecurity in today’s enterprise networks security-related issues are explained throughout the book and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests such as CompTIA and CISSP Takes advantage of actual cases examples industry products and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots figures and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook this book includes hands-on assignments based on the Packet Tracer program an excellent network design and simulation tool from Cisco. Instructor materials also are provided including PowerPoint slides solutions for exercise questions and additional chapter questions from which to build tests.

GBP 44.99
1

Knowledge Management in Practice

Knowledge Management in Practice

This evidence-based book provides the framework and guidelines that professionals need for working with the contemporary explosion of data that is creating opportunities and challenges to all phases of our society and commerce. –Larry R. Medsker Research Professor in Physics and Data Science The George Washington UniversityKnowledge Management in Practice is a resource on how knowledge management (KM) is implemented. It provides specific KM methods tips techniques and best practices to gain competitive advantage and the most from investing in KM. It examines how KM is leveraged by first responders the military healthcare providers insurance and financial services companies legal firms human resources departments merger and acquisition (M&A) firms and research institutions. Essential KM concepts are explored not only from a foundational perspective but also from a practical application. These concepts include capturing and codifying tacit and explicit knowledge KM methods information architecture search KM and social media KM and Big Data and the adoption of KM. Readers can visit the book’s companion website KM Mentor (www. KMMentor. com) where they can access:Presentations by industry leaders on a variety of topicsKM templates and instruction on executing KM strategy performing knowledge transfer and KM assessments and auditsKM program and project implementation guidanceInsights and reviews on KM toolsGuidance on implementing and executing various KM MethodsSpecialized KM publicationsA private secure collaboration community for members to discuss ideas and get expert answers and advice

GBP 44.99
1

Making Your Data Center Energy Efficient

Making Your Data Center Energy Efficient

Detailing powerful methods for reducing the energy costs associated with operating a data center Making Your Data Center Energy Efficient examines both equipment and building facilities. It reviews the rationale for conserving energy and demonstrates how conservation and careful equipment selection can lead to significant improvements to your bottom line. For those not well-versed in financial or energy terms the first two chapters provide a detailed discussion of the terms associated with different types of energy as well as how to compute the return on investment for energy conservation efforts. The text includes tables of monthly expenses associated with operating equipment that will help you convert problems into simple table lookup processes. Among the money-saving topics discussed it considers: How to minimize the energy consumption of a wide range of devices A little-understood topic that can make a big impact on energy costs general heating and cooling Techniques required to effectively monitor different types of meters Phantom energy usage and methods for minimizing its cost to your organization Recognizing that most readers may not have direct control over the selection of a furnace or hot water heater the book provides you with the ability to recognize the efficiencies and inefficiencies of various types of devices so you can provide input into the decision-making process. From replacing lighting to consolidation and virtualization it provides you with the well-rounded understanding needed to properly manage all aspects of the energy consumed in your data center.

GBP 160.00
1

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

Business Strategies for the Next-Generation Network

Business Strategies for the Next-Generation Network

Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies the NGN is not being planned as the next-generation Internet. In its intention and architecture it is more accurately described as Broadband-ISDN release 2. 0. The NGN transition is hard for both practitioners and observers to understand because it weaves together a number of distinct strands: the development of a new architecture and technology base including advanced IT automation systems the development of a portfolio of ‘new wave’ products and services which exploits the power of the new network the design of a new kind of organization which can utilize the higher levels of automation in the NGN and reduce costs and the development of an effective transition plan which can smoothly move operators from their current legacy networks systems and processes to the NGN future. The book begins with a review of the failures of previous attempts by carriers to retool for the future. It describes in detail the technologies and capabilities supporting “new wave’” services focusing particularly on multimedia interactive services TV and Video-on-Demand. The author looks at the IMS layer and how it interworks both downwards into the QoS-enabled IP transport layer and upwards to enable new kinds of applications. However equal attention is addressed to the business models of players in the value chain carriers service providers broadcasters and production companies. The author then examines how carriers have attempted to remodel themselves as IP companies along the dimensions of people processes and IT automation systems describing the lessons to be learned from numerous failures. He identifies more innovativebusiness models exploresPeer-to-Peer networking and reviews the prospects for | Business Strategies for the Next-Generation Network

GBP 54.99
1

Risk Analytics Data-Driven Decisions under Uncertainty

Risk Analytics Data-Driven Decisions under Uncertainty

The 2022 World Economic Forum surveyed 1 000 experts and leaders who indicated their risk perception that the earth’s conditions for humans are a main concern in the next 10 years. This means environmental risks are a priority to study in a formal way. At the same time innovation risks are present in theminds of leaders newknowledge brings new risk and the adaptation and adoption of risk knowledge is required to better understand the causes and effects can have on technological risks. These opportunities require not only adopting new ways of managing and controlling emerging processes for society and business but also adapting organizations to changes and managing new risks. Risk Analytics: Data-Driven Decisions Under Uncertainty introduces a way to analyze and design a risk analytics system (RAS) that integrates multiple approaches to risk analytics to deal with diverse types of data and problems. A risk analytics system is a hybrid system where human and artificial intelligence interact with a data gathering and selection process that uses multiple sources to the delivery of guidelines to make decisions that include humans and machines. The RAS system is an integration of components such as data architecture with diverse data and a risk analytics process and modeling process to obtain knowledge and then determine actions through the new knowledge that was obtained. The use of data analytics is not only connected to risk modeling and its implementation but also to the development of the actionable knowledge that can be represented by text in documents to define and share explicit knowledge and guidelines in the organization for strategy implementation. This book moves from a review of data to the concepts of a RAS. It reviews RAS system components required to support the creation of competitive advantage in organizations through risk analytics. Written for executives analytics professionals risk management professionals strategy professionals and postgraduate students this book shows a way to implement the analytics process to develop a risk management practice that creates an adaptive competitive advantage under uncertainty. | Risk Analytics Data-Driven Decisions under Uncertainty

GBP 74.99
1

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

As the twelfth most populous nation the Philippines’ diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security—post 9/11. Issues previously considered social or public are now viewed as security issues. Food production is now analyzed in the context of food security and environmental degradation is now a part of environmental security. This broadened perspective is not unique to the Philippines but—thanks to the island nation’s long struggle with issues of Muslim radicalism democracy and globalization—it serves as a model worth studying. And no one is better positioned to take on this study than Rommel C. Banlaoi Chairman and Executive Director of the Philippine Institute for Peace Violence and Terrorism Research. In Philippine Security in the Age of Terror: National Regional and Global Challenges in the Post-9/11 World Banlaoi illustrates the increasing complexity of the issues. Divided into three sections the book explores why a nation’s security can no longer be just about its military or only about what is happening within its borders. Section I reviews issues specific to the Philippine people including politics national identity globalization and local and military security. Section II moves to bilateral security issues to report on security interests and collaborations with the United States China and Australia—as well as with India Japan and Russia. Section III examines selected global regional and multilateral issues such as maritime security piracy and the ASEAN Regional Forum. The comprehensive approach and coverage within the book reflects the author’s diverse interests as a scholar of politics security terrorism and international relations. More importantly it documents an intellectual journey that national policymakers across the world need to consider if they hope to achieve the shift in thinking that will promote the well-being of the world’s populations as the strategic centerpiece of any war on terrorism. | Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

GBP 56.99
1

Teaching Data Analytics Pedagogy and Program Design

Teaching Data Analytics Pedagogy and Program Design

The need for analytics skills is a source of the burgeoning growth in the number of analytics and decision science programs in higher education developed to feed the need for capable employees in this area. The very size and continuing growth of this need means that there is still space for new program development. Schools wishing to pursue business analytics programs intentionally assess the maturity level of their programs and take steps to close the gap. Teaching Data Analytics: Pedagogy and Program Design is a reference for faculty and administrators seeking direction about adding or enhancing analytics offerings at their institutions. It provides guidance by examining best practices from the perspectives of faculty and practitioners. By emphasizing the connection of data analytics to organizational success it reviews the position of analytics and decision science programs in higher education and to review the critical connection between this area of study and career opportunities. The book features: A variety of perspectives ranging from the scholarly theoretical to the practitioner appliedAn in-depth look into a wide breadth of skills from closely technology-focused to robustly soft human connection skillsResources for existing faculty to acquire and maintain additional analytics-relevant skills that can enrich their current course offerings. Acknowledging the dichotomy between data analytics and data science this book emphasizes data analytics rather than data science although the book does touch upon the data science realm. Starting with industry perspectives the book covers the applied world of data analytics covering necessary skills and applications as well as developing compelling visualizations. It then dives into pedagogical and program design approaches in data analytics education and concludes with ideas for program design tactics. This reference is a launching point for discussions about how to connect industry’s need for skilled data analysts to higher education’s need to design a rigorous curriculum that promotes student critical thinking communication and ethical skills. It also provides insight into adding new elements to existing data analytics courses and for taking the next step in adding data analytics offerings whether it be incorporating additional analytics assignments into existing courses offering one course designed for undergraduates or an integrated program designed for graduate students. | Teaching Data Analytics Pedagogy and Program Design

GBP 44.99
1