20 results (0,18252 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

TCP Performance over UMTS-HSDPA Systems

TCP Performance over UMTS-HSDPA Systems

The evolution of the mobile communication market is causing a major increase in data traffic demands. This could lead to disrupted mobility and intermittent degraded channel conditions that contribute to poor transmission control protocol (TCP) performance. TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity and shows how to reduce the interaction of wireless networks on TCP with minimal cost. With self-contained chapters the book consists of two main sections. The first several chapters provide background and describe the state of the art for wireless networks emphasizing one of the third-generation (3G) wireless technologies: the universal mobile telecommunications system (UMTS). These chapters also include an analysis of the overall cell capacity for UMTS Release 99 and high-speed downlink packet access (HSDPA) systems. The second section focuses on the interaction of TCP with wireless systems presenting an exhaustive list of TCP versions and link layer solutions that adapt TCP (often modifying the original TCP) to a wireless network. This section also displays mathematical modeling of the interaction of hybrid automatic repeat request (HARQ) and TCP in UMTS networks. While offering information for advanced undergraduate students who are unfamiliar with code division multiple access (CDMA) wireless systems as well as UMTS and HSDPA cellular systems the book also provides extensive coverage of TCP over wireless systems problems and solutions for researchers developers and graduate students.

GBP 56.99
1

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Most people do not truly understand a concept until they can visualize it. This applies to all fields including Project Management. The best way to effectively manage projects is to help your team visualize the end result as well as the steps needed to achieve that result. Help Your Team Visualize the Right Path to Success Building a Project Work Breakdown Structure: Visualizing Objectives Deliverables Activities and Schedules employs a diagram approach to project planning and scheduling. This useful tool empowers business professionals to take control of and successfully communicate their projects ensuring they are completed on time with their targeted impact. Industry professional Dennis P. Miller a consultant to leading Fortune 500 companies thoroughly explains the keys to an effective Work Breakdown Structure (WBS) through an Eight Step Process. He has refined this process over a period of twenty years applying it to over 100 projects ranging from software development to social events. The Eight Step Process starts with a concentrated effort to define the project through its deliverables. The middle steps walk the project team through a process of activity definition and sequencing and resource assignment. Finally the last steps involve estimating the duration and verifying the project timeline. Not Just What to Do But How to Do It! This is a hands-on volume that includes a practice section for each of the eight steps providing readers with real examples of how the author has successfully applied this process. The result of its application is a visualization of the project‘s objectives deliverables activities and schedules. Over 130 illustrations enrich the instructions. Project managers are assured of success by following the simple tools in this unique and comprehensive volume. | Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

GBP 170.00
1

Handbook of e-Business Security

802.1X Port-Based Authentication

802.1X Port-Based Authentication

Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802. 1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802. 1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802. 1X port-based authentication a history of the standard and the technical documents published and details of the connections among the three network components. It focuses on the technical aspect of 802. 1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology design and implementation with a specific focus on Cisco devices. Including examples derived from the 802. 1X implementation it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches 802. 1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today’s computer networks using this particular network protocol.

GBP 56.99
1

Social Media Warfare Equal Weapons for All

Internet of Nano-Things and Wireless Body Area Networks (WBAN)

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Practical Guide to IT Problem Management

Practical Guide to IT Problem Management

Some IT organisations seem to expend all their energy firefighting – dealing with incidents as they arise and fixing or patching over the breakage. In organisations like this restarting computers is seen as a standard method to resolve many issues. Perhaps the best way to identify whether an organisation understands problem management is to ask what they do after they have restarted the computer. If restarting the computer fixes the issue it is very tempting to say that the incident is over and the job is done. Problem management recognises that things do not improve if such an approach is taken. Such organisations are essentially spending their time running to stay in the same place. Written to help IT organisations move forward Practical Guide to IT Problem Management presents a combination of methodologies including understanding timelines and failure modes drill down 5 whys and divide and conquer. The book also presents an exploration of complexity theory and how automation can assist in the desire to shift left both the complexity of the problem and who can resolve it. The book emphasises that establishing the root cause of a problem is not the end of the process as the resolution options need to be evaluated and then prioritised alongside other improvements. It also explores the role of problem boards and checklists as well as the relationship between problem management and Lean thinking. This practical guide provides both a framework for tackling problems and a toolbox from which to select the right methodology once the type of problem being faced has been identified. In addition to reactive methods it presents proactive activities designed to reduce the incidence of problems or to reduce their impact and complexity should they arise. Solving problems is often a combination of common sense and methodologies which may either be learnt the hard way or may be taught. This practical guide shows how to use problem solving tools and to understand how and when to apply them while upskilling IT staff and improving IT problem solving processes.

GBP 14.99
1

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location identity and history over wireless connections. Connectivity and Communication — Anything Anywhere and Anytime An examination of the exciting expansion period in this research The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive technical and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies experience reports and best practice it contains information on emerging technologies market opportunities and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs itis a comprehensive technical and practical guide to recent advances in pervasive networked systems. | The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

GBP 56.99
1

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

An organization’s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods safeguards and techniques that help protect an organization from insider computer fraud. Drawing from the author’s vast experience assessing the adequacy of IT security for the banking and securities industries the book presents a practical framework for identifying measuring monitoring and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit process and store sensitive data. The author also examines the symbiotic relationship between the risks controls threats and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process. | Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

GBP 56.99
1

Making Your Data Center Energy Efficient

Making Your Data Center Energy Efficient

Detailing powerful methods for reducing the energy costs associated with operating a data center Making Your Data Center Energy Efficient examines both equipment and building facilities. It reviews the rationale for conserving energy and demonstrates how conservation and careful equipment selection can lead to significant improvements to your bottom line. For those not well-versed in financial or energy terms the first two chapters provide a detailed discussion of the terms associated with different types of energy as well as how to compute the return on investment for energy conservation efforts. The text includes tables of monthly expenses associated with operating equipment that will help you convert problems into simple table lookup processes. Among the money-saving topics discussed it considers: How to minimize the energy consumption of a wide range of devices A little-understood topic that can make a big impact on energy costs general heating and cooling Techniques required to effectively monitor different types of meters Phantom energy usage and methods for minimizing its cost to your organization Recognizing that most readers may not have direct control over the selection of a furnace or hot water heater the book provides you with the ability to recognize the efficiencies and inefficiencies of various types of devices so you can provide input into the decision-making process. From replacing lighting to consolidation and virtualization it provides you with the well-rounded understanding needed to properly manage all aspects of the energy consumed in your data center.

GBP 160.00
1

Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide

Transhumanism Artificial Intelligence the Cloud Robotics Electromagnetic Fields Intelligence Communities Rail Transportation Open-Source Intelligence (OSINT)—all this and more is discussed in Cyber Crime Investigator’s Field Guide Third Edition. Many excellent hardware and software products exist to protect our data communications systems but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws rules and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed along with information about how cyberspace works and the tools that reveal the who where what when why and how in the investigation of cybercrime. Features New focus area on rail transportation OSINT medical devices and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive the call arrival on site chain of custody and more This book offers a valuable Q&A by subject area an extensive overview of recommended reference materials and a detailed case study. Appendices highlight attack signatures Linux commands Cisco firewall commands port numbers and more. | Cyber Crime Investigator's Field Guide

GBP 56.99
1

Cybersecurity for Information Professionals Concepts and Applications

Cybersecurity for Information Professionals Concepts and Applications

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However the number of both cybersecurity and privacy breach incidents are soaring which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture making individuals more cybersecurity-conscious as well. However it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals librarians archivists record managers students and professionals in related disciplines. This book is written especially for educators preparing courses in information security cybersecurity and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations threats and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all the book addresses the ongoing challenges of cybersecurity. In particular it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior. | Cybersecurity for Information Professionals Concepts and Applications

GBP 41.99
1

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

Enterprise Agility A Practical Guide to Agile Business Management

Enterprise Agility A Practical Guide to Agile Business Management

Despite the astonishing technological developments in our times it is surprising how little has changed in the way organizations are structured and managed. However organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility including applied processes lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution project agility and describes how waterfall project management is transformed into scrum which can have positive effects on project timelines scope and budget as well as team motivation. The second phase of agility organizational agility is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility including structures roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally the latest phase enterprise agility transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales marketing HR finance etc. ) and by presenting the positive impact generated on the company’s overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author’s over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility. | Enterprise Agility A Practical Guide to Agile Business Management

GBP 44.99
1

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives in-depth explanations of each topic and accurate practice questions. Each chapter includes exam tips that highlight key exam information hands-on exercises a summary that serves as a quick review and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily it also serves as an ideal on-the-job reference. Richard E. Cascarino MBA CIA CISM CFE CRMA is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa Europe the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA and the Association of Certified Fraud Examiners where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand author of the book Internal Auditing: An Integrated Approach now in its third edition. This book is extensively used as a university textbook worldwide. In addition he is the author of the Auditor's Guide to IT Auditing Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE the Ultimate Resource.

GBP 36.99
1

Database Systems A Pragmatic Approach 3rd edition

Database Systems A Pragmatic Approach 3rd edition

This book provides a concise but comprehensive guide to the disciplines of database design construction implementation and management. Based on the authors’ professional experience in the software engineering and IT industries before making a career switch to academia the text stresses sound database design as a necessary precursor to successful development and administration of database systems. The discipline of database systems design and management is discussed within the context of the bigger picture of software engineering. Students are led to understand from the outset of the text that a database is a critical component of a software infrastructure and that proper database design and management is integral to the success of a software system. Additionally students are led to appreciate the huge value of a properly designed database to the success of a business enterprise. The text was written for three target audiences. It is suited for undergraduate students of computer science and related disciplines who are pursuing a course in database systems graduate students who are pursuing an introductory course to database and practicing software engineers and information technology (IT) professionals who need a quick reference on database design. Database Systems: A Pragmatic Approach 3rd Edition discusses concepts principles design implementation and management issues related to database systems. Each chapter is organized into brief reader-friendly conversational sections with itemization of salient points to be remembered. This pragmatic approach includes adequate treatment of database theory and practice based on strategies that have been tested proven and refined over several years. Features of the third edition include: Short paragraphs that express the salient aspects of each subject Bullet points itemizing important points for easy memorization Fully revised and updated diagrams and figures to illustrate concepts to enhance the student’s understanding Real-world examples Original methodologies applicable to database design Step-by-step student-friendly guidelines for solving generic database systems problems Opening chapter overviews and concluding chapter summaries Discussion of DBMS alternatives such as the Entity–Attributes–Value model NoSQL databases database-supporting frameworks and other burgeoning database technologies A chapter with sample assignment questions and case studies This textbook may be used as a one-semester or two-semester course in database systems augmented by a DBMS (preferably Oracle). After its usage students will come away with a firm grasp of the design development implementation and management of a database system. | Database Systems A Pragmatic Approach 3rd edition

GBP 59.99
1

Software Engineering A Methodical Approach 2nd Edition

Software Engineering A Methodical Approach 2nd Edition

Software Engineering: A Methodical Approach (Second Edition) provides a comprehensive but concise introduction to software engineering. It adopts a methodical approach to solving software engineering problems proven over several years of teaching with outstanding results. The book covers concepts principles design construction implementation and management issues of software engineering. Each chapter is organized systematically into brief reader-friendly sections with itemization of the important points to be remembered. Diagrams and illustrations also sum up the salient points to enhance learning. Additionally the book includes the author’s original methodologies that add clarity and creativity to the software engineering experience. New in the Second Edition are chapters on software engineering projects management support systems software engineering frameworks and patterns as a significant building block for the design and construction of contemporary software systems and emerging software engineering frontiers. The text starts with an introduction of software engineering and the role of the software engineer. The following chapters examine in-depth software analysis design development implementation and management. Covering object-oriented methodologies and the principles of object-oriented information engineering the book reinforces an object-oriented approach to the early phases of the software development life cycle. It covers various diagramming techniques and emphasizes object classification and object behavior. The text features comprehensive treatments of: Project management aids that are commonly used in software engineering An overview of the software design phase including a discussion of the software design process design strategies architectural design interface design database design and design and development standards User interface design Operations design Design considerations including system catalog product documentation user message management design for real-time software design for reuse system security and the agile effect Human resource management from a software engineering perspective Software economics Software implementation issues that range from operating environments to the marketing of software Software maintenance legacy systems and re-engineering This textbook can be used as a one-semester or two-semester course in software engineering augmented with an appropriate CASE or RAD tool. It emphasizes a practical methodical approach to software engineering avoiding an overkill of theoretical calculations where possible. The primary objective is to help students gain a solid grasp of the activities in the software development life cycle to be confident about taking on new software engineering projects. | Software Engineering A Methodical Approach 2nd Edition

GBP 59.99
1

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

This is an important book. Ethics is not an easy topic and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . Use this book as a practical resource an informative and educational source of material in developing expertise but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines professional journals and online blogs. These are synthesised into a blueprint which addresses in a practical manner the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15 became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world of what has happened and what might happen as digital technology continues to pervade.

GBP 52.99
1