28 results (0,20706 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Information Security Management Handbook Volume 4

Information Security Management Handbook Volume 4

Every year in response to advancements in technology and new laws in different countries and regions there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Providing an up-to-date compilation of the fundamental skills techniques tools and understanding required of IT security professionals the Information Security Management Handbook Sixth Edition Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security adaptive threat defense Web 2. 0 virtualization data leakage and governance. New material also addresses risk management business continuity planning disaster recovery planning and cryptography. As the risks that threaten the security of our systems continue to evolve it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments new vulnerabilities and possible threats. | Information Security Management Handbook Volume 4

GBP 56.99
1

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched new variants of it are already on the way. IT Security teams in businesses and corporations are struggling daily to fight off any cyberthreats that they are experiencing. On top of this they are also asked by their CIO or CISO to model what future Cyberattacks could potentially look like and ways as to how the lines of defenses can be further enhanced. IT Security teams are overburdened and are struggling to find ways in order to keep up with what they are being asked to do. Trying to model the cyberthreat landscape is a very laborious process because it takes a lot of time to analyze datasets from many intelligence feeds. What can be done to accomplish this Herculean task? The answer lies in Artificial Intelligence (AI). With AI an IT Security team can model what the future Cyberthreat landscape could potentially look like in just a matter of minutes. As a result this gives valuable time for them not only to fight off the threats that they are facing but to also come up with solutions for the variants that will come out later. Practical AI for Cybersecurity explores the ways and methods as to how AI can be used in cybersecurity with an emphasis upon its subcomponents of machine learning computer vision and neural networks. The book shows how AI can be used to help automate the routine and ordinary tasks that are encountered by both penetration testing and threat hunting teams. The result is that security professionals can spend more time finding and discovering unknown vulnerabilities and weaknesses that their systems are facing as well as be able to come up with solid recommendations as to how the systems can be patched up quickly.

GBP 44.99
1

Handbook of e-Business Security

The Complete Project Management Office Handbook

The Complete Project Management Office Handbook

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight control and support. Illustrating the implications of project management in today’s organizations The Complete Project Management Office Handbook Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs purpose and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists detailed process steps and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate quick-wins and early PMO-based accomplishments in their organization.

GBP 42.99
1

Information Technology Control and Audit Fifth Edition

Software Testing A Craftsman’s Approach Fifth Edition

Principles of Mobile Computing and Communications

Healthcare Informatics Improving Efficiency through Technology Analytics and Management

Healthcare Informatics Improving Efficiency through Technology Analytics and Management

Healthcare Informatics: Improving Efficiency through Technology Analytics and Management supplies an understanding of the different types of healthcare service providers corresponding information technologies analytic methods and data issues that play a vital role in transforming the healthcare industry. All of these elements are reshaping the various activities such as workflow and processes of hospitals healthcare systems ACOs and patient analytics including hot spotting risk stratification and treatment effectiveness. A follow-up to Healthcare Informatics: Improving Efficiency and Productivity this latest book includes new content that examines the evolution of Big Data and how it is revolutionizing the healthcare industry. It presents strategies for achieving national goals for the meaningful use of health information technology and includes sound project management principles and case illustrations for technology roll-out such as Computer Physician Order Entry (CPOE) for optimal utilization. The book describes how to enhance process efficiency by linking technologies data and analytics with strategic initiatives to achieve success. It explains how to leverage data resources with analytics to enhance decision support for care providers through in-depth descriptions of the array of analytic methods that are used to create actionable information including Business Intelligence Six Sigma Data and Text Mining. | Healthcare Informatics Improving Efficiency through Technology Analytics and Management

GBP 44.99
1

Healthcare Information Systems

Healthcare Information Systems

The move to manage medicine from a financial perspective i. e. managed care has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records mandated by government legislation such as HIPAA is bringing new technologies and processes into the healthcare arena. A universal medical record system and absolute patient portability is a definite possibility in the not too distant future. All of these issues beg for clear IT solutions. Healthcare Information Systems Second Edition approaches these challenges and opportunitites as pieces of a complex puzzle. It not only brings you up-to-date on the technology involved but also explains how that technology interrelates and affects healthcare organizations. The book gives you complete coverage of all aspects of information technology as it relates to the healthcare industry. In Healthcare Information Systems you will find:An overview of healthcare systemsTips on disaster planning and system securityImproving quality reducing risks and understanding costs An in-depth look into the HIPAA regulationsEMR and the data warehouseInformation on managing the healthcare communityA look at the changing organizationViews on telemedicine the Internet and emerging technologiesIdeas on using IT to deal with increasing government regulationIn addition the new edition has expanded coverage of HIPAA wireless networks and communications telemedicine and the increasing role of the Internet in all facets of healthcare. Healthcare Information Systems presents workable solutions to the real problems you will face both today and tomorrow.

GBP 56.99
1

The Total CISSP Exam Prep Book Practice Questions Answers and Test Taking Tips and Techniques

GBP 160.00
1

Enterprise Systems Integration

Enterprise Systems Integration

The convergence of knowledge technology and human performance which comprises today's enterprise allows creative business process design. Thus an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration. The book combines the perspectives knowledge and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today's enterprise. Collectively these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies you must successfully deploy ERP systems within budget and on time. In addition you must be able to integrate them into the rest of the enterprise. Still ERP software does not make up the full picture of today's enterprise. Legacy systems e-commerce and other Web-based systems client/server applications networks and communications systems data warehousing and integrated databases enter into the mix. Enterprise Systems Integration Second Edition paints a comprehensive picture of the technologies that comprise today's enterprise and shows you how to make them work together.

GBP 56.99
1

Handbook of Data Management 1999 Edition

Handbook of Data Management 1999 Edition

Packed with dozens of no-nonsense chapters written by leading professionals Handbook of Data Management 1999 Edition shows your students how to design build and maintain high-performance high-availability databases in multiple environments. Handbook of Data Management 1999 Edition is the most comprehensive single-volume guide of its kind. The book provides the latest most innovative solutions for planning developing and running a powerful data management function. Here students will find exhaustive coverage of the range of data repositories (from legacy indexed files to object data bases and data warehouses) as well as details on everything from strategic planning to maximizing database performance. Completely revised and updated to reflect latebreaking technologies Handbook of Data Management 1999 Edition includes extensive case studies and straightforward descriptions showing students how to:implement Web-enabled data warehousesbuild multimedia databasesmaster data mininguse enterprise database modelingstay up-to-date with data conversion and migrationmaximize OLAP architectures and toolsHandbook of Data Management 1999 Edition also provides ongoing coverage of the latest tools and techniques regarding:organization for quality information systemsdata definitiondatabase design and managementobject and hybrid databasesand moreEach contributor to Handbook of Data Management 1999 Edition is an expert with first-hand experience in database and data management. These contributors provide a depth and breadth of coverage you and your students simply won't find anywhere else. Prepare your students for real-world business computing. Start them off with Handbook of Data Management 1999 Edition.

GBP 425.00
1

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

Software Project Management A Process-Driven Approach

Software Project Management A Process-Driven Approach

To build reliable industry-applicable software products large-scale software project groups must continuously improve software engineering processes to increase product quality facilitate cost reductions and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects Software Project Management: A Process-Driven Approach discusses human resources software engineering and technology to a level that exceeds most university-level courses on the subject. The book is organized into five parts. Part I defines project management with information on project and process specifics and choices the skills and experience needed the tools available and the human resources organization and management that brings it all together. Part II explores software life-cycle management. Part III tackles software engineering processes and the range of processing models devised by several domestic and international organizations. Part IV reveals the human side of project management with chapters on managing the team the suppliers and the customers themselves. Part V wraps up coverage with a look at the technology techniques templates and checklists that can help your project teams meet and exceed their goals. A running case study provides authoritative insight and insider information on the tools and techniques required to ensure product quality reduce costs and meet project deadlines. Praise for the book:This book presents all aspects of modern project management practices … includes a wealth of quality templates that practitioners can use to build their own tools. … equally useful to students and professionals alike. —Maqbool Patel PhD SVP/CTO/Partner Acuitec | Software Project Management A Process-Driven Approach

GBP 56.99
1

Android Security Attacks and Defenses

Android Security Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture the book describes Android permissions including Manifest permissions to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system including import directories and files so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www. androidinsecurity. com. It explains how to crack SecureApp. apk discussed in the text and also makes the application available on its site. The book includes coverage of advanced topics such as reverse engineering and forensics mobile device pen-testing methodology malware analysis secure coding and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes. The book’s site includes a resource section where readers can access downloads for applications tools created by users and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text wherever needed. Visit www. androidinsecurity. com for more information. | Android Security Attacks and Defenses

GBP 56.99
1

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Describing how to avoid common vendor traps Buying Supporting Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and ultimately better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts—which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition support and maintenanceExamines hardware and software warranty and support modelsConsiders finance and accounting issues for maintenance and supportSpells out technology product details Explains postwarranty support and maintenanceProvides the understanding to better negotiate with vendor sales teamsIllustrating the types of problems typically experienced during product use the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating. | Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

GBP 56.99
1

Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

With an ever-increasing amount of information on the web it is critical to understand the pedigree quality and accuracy of your data. Using provenance you can ascertain the quality of data based on its ancestral data and derivations track back to sources of errors allow automatic re-enactment of derivations to update data and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes products tools and standards for secure data management secure Semantic Web secure web services and secure cloud computing.

GBP 56.99
1

Database Modeling Step by Step

Database Modeling Step by Step

With the aim of simplifying relational database modeling Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach which is a more simplistic intuitive way to building relational database models. Going from basics to contemporary topics the book opens with relational data modeling and ends with BigData database modeling following a road map of the evolution in relational modeling and including brief introductions to data warehousing and BigData modeling. A break-down of the elements of a model explains what makes up a relational data model. This is followed by a comparison between standard normalization and a more simplistic intuitive approach to data modeling that a beginner can follow and understand. A brief chapter explains how to use the database programming language SQL (Structured Query Language) which reads from and writes to a relational database. SQL is fundamental to data modeling because it helps in understanding how the model is used. In addition to the relational model the last three chapters cover important modern world topics including denormalization that leads into data warehouses and BigData database modeling. The book explains how there is not much to logical data modeling in BigData databases because as they are often schema-less which means that BigData databases do not have schemas embedded into the database itself they have no metadata and thus not much of a logical data model. Online bonus chapters include a case study that covers relational data modeling and are available at the author’s web site: www. oracletroubleshooter. com/datamodeling. html | Database Modeling Step by Step

GBP 54.99
1

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

As we get caught up in the quagmire of Big Data and analytics it remains critically important to be able to reflect and apply insights experience and intuition to your decision-making process. In fact a recent research study at Tel Aviv University found that executives who relied on their intuition were 90 percent accurate in their decisions. Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making focuses on this intuition-based decision making. The book does not discount data-based decision making especially for decisions that are important and complex. Instead it emphasizes the importance of applying intuition gut feel spirituality experiential learning and insight as key factors in the executive decision-making process. Explaining how intuition is a product of past experience learning and ambient factors the text outlines methods that will help to enhance your data-driven decision-making process with intuition-based decision making. The first part of the book the Research Track presents contributions from leading researchers worldwide on the topic of intuition-based decision making as applied to management. In the second part of the book the Practice Track global executives and senior managers in industry government universities and not-for-profits present vignettes that illustrate how they have used their intuition in making key decisions. The research part of the book helps to frame the problem and address leading research in intuition-based decision making. The second part then explains how to apply these intuition-based concepts and issues in your own decision-making process. | Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

GBP 56.99
1

Vulnerability Management

Vulnerability Management

Vulnerability management (VM) has been around for millennia. Cities tribes nations and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today we identify vulnerabilities in our software systems infrastructure and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps especially those that are inherent in a larger organization. Completely updated the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective. This book is a guide for security practitioners security or network engineers security officers and CIOs seeking understanding of VM and its role in the organization. To serve various audiences it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy although serving the executive well provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

GBP 44.99
1

Ethics in IT Outsourcing

Ethics in IT Outsourcing

In IT divisions and organizations the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro macro and corporate level this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals corporations and society Outlines a new corporate capability—the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author’s decades of experience working with large firms in IT and outsourcing this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal corporate and societal decision-making. Readers are invited to participate in the growing dialog of business ethics and IT outsourcing ethics in particular at the author’s website: www. ethicsinit. com

GBP 54.99
1

The DataOps Revolution Delivering the Data-Driven Enterprise

The DataOps Revolution Delivering the Data-Driven Enterprise

DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author’s own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www. kinaesis. com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members. | The DataOps Revolution Delivering the Data-Driven Enterprise

GBP 31.99
1

ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

ERP Systems for Manufacturing Supply Chains: Applications Configuration and Performance provides insight into the core architecture modules and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module’s structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system’s core modules and functions this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies. | ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

GBP 42.99
1

Managing Business Projects The Essentials

Managing Business Projects The Essentials

Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost it is about business projects as opposed to construction or engineering projects. Although many techniques like schedule management apply to both they are usually applied differently. As its title conveys the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects up to $20 million but often below $1 million. Some literature favors large and mega-projects but for every mega-project there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects. This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos. ' Rather it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea which is stated repeatedly is to do the essentials and to do them consistently and well. Strong emphasis is placed on things that happen before around and after the project itself. So while the basic disciplines like engaging with stakeholders managing scope schedules costs risks issues changes and communication are thoroughly explained other important aspects are covered. These include: governance of a project and of a portfolio of projects project selection with its financial and non-financial aspects effective use of the business case through to benefits realization procurement outsourcing and partnership and also the agile mindset that is valuable beyond Agile projects. Besides project managers and sponsors this book is intended for people who are working in business or government at any level or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students although many would benefit from the contents. | Managing Business Projects The Essentials

GBP 52.99
1

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

In this book Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption—fear. Fear of the unknown fear of the intangible fear of the investment needed and yes fear of losing your job to a machine. With his talent for distilling clarity from complexity Edosa tackles this and many other challenges. —Tim Carmichael Chief Data Officer Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data information and knowledge across organisations. Yet rather than being stuck with endless polarising debates such as breaking down silos it shifts focus back towards the ultimate to what end. —Jacky Wright Chief Digital Officer (CDO) Microsoft US If you care about AI transformation empowering people or advancing organisational success in an increasingly digital world then you should read this book. —Yomi Ibosiola Chief Data and Analytics Officer Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when—at the end of a critical investment in an artificial intelligence project that had been meant to save money—it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer’s production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to make data work for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation empower people and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities. | Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

GBP 44.99
1