13 results (0,15922 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Practical Cryptography Algorithms and Implementations Using C++

The Sensible Guide to Program Management Professional (PgMP) Success

The Sensible Guide to Program Management Professional (PgMP) Success

A Sensible Guide to Program Management Professional (PgMP)® Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management – 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating facilitating managing and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts processes and tools that form the foundation of today’s program management? Since program management is still an emerging profession with professionals often working in different ways what does this mean for a standard exam? More specifically how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts processes and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern this book differs from other study guides by describing the author’s personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern this book contains 420 practice questions access to an online exam simulator and an online PgMP community and a time-tested approach for passing the PgMP exam. | The Sensible Guide to Program Management Professional (PgMP)® Success

GBP 52.99
1

AI-Based Data Analytics Applications for Business Management

UML Diagramming A Case Study Approach

UML Diagramming A Case Study Approach

The Unified Modeling Language better known as UML has become the de facto standard modeling language for analyzing and designing software applications and systems. Software analysis and design is just as much an art as it is a science. UML Diagramming: A Catalog of Cases shows the art and the science behind successful software analysis and design with more than 35 case studies of applications of a variety of industries including: Transportation Healthcare Supply chain management Education Agriculture Manufacturing The book explains UML diagramming through case studies to help systems and software developers specify visualize construct and document the artifacts of software systems. The cases demonstrate how UML embodies software engineering best practices for modeling large and complex systems. They show how UML is an intuitive diagramming language that can be easily understood by end-users and business professionals. These cases studies also demonstrate how UML is a powerful language for communicating software designs to help developers and end users validate application scope requirements and features. Case studies highlighted in the book included: WEBMED healthcare service system services Inventory management system Business process outsourcing (BPO) management system Weather monitoring system Product recommendation system Textile management system Smart traffic management system Online pharmacy management system Placement automation system Farm management system Art gallery management system Website development This catalog of UML case studies is an invaluable reference for students studying software engineering programmers starting out their careers and seasoned systems developers needing a reference guide. | UML Diagramming A Case Study Approach

GBP 48.99
1

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

Most academics still wrestle with the publish or perish phenomenon. Based on Dr. Liebowitz’s 25 years serving as the editor-in-chief of a leading international journal along with insights from some of the most knowledgeable journal editors this book shares key lessons learned to help new professors doctoral students and practitioner–scholars increase their chances of being published in selective refereed international journals. It focuses on the key practices needed to ensure journal publication with interesting cases and helpful tips sprinkled throughout the book. A Guide to Publishing for Academics provides useful knowledge from leading journal editors of both traditional and online journals as well as various tiers of journals. Although the focus is mainly in the business and IT areas much of the guidance provided can cross into other fields. The book contains interesting vignettes and do’s and don’ts so that potential authors can understand what goes on behind the scenes once the manuscript arrives on the journal editor’s desk. The book provides constructive guidance on choosing what and where to publish what to consider when writing a title for a paper how to prepare and submit journal manuscripts and how to position a paper for publication. It also has valuable information for current and future journal editors including models of editing and editorial boards editorial coaching advice and editing smart practices. With the information in this book the next generation of academics and practitioner–scholars will be well equipped to overcome the publish or perish phenomenon. | A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

GBP 56.99
1

A Guide to IT Contracting Checklists Tools and Techniques

A Guide to IT Contracting Checklists Tools and Techniques

Since A Guide to IT Contracting: Checklists Tools and Techniques first published several alarming trends have developed in the technology contracting industry. These trends include: The Dawn of the As-Is Technology Product The Ever-Changing Product Where in the World Is My Data? To meet these challenges the Second Edition helps business managers and lawyers explore alternate solutions from other vendors conduct simultaneous negotiations with other vendors and generally ensure prospective vendors understand they can lose the deal if they refuse to act reasonably. Distilling the most critical business and legal lessons learned through the author’s decades of legal experience drafting and negotiating IT-related agreements this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement each chapter includes a checklist of essential terms a brief summary of what the agreement is intended to do and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes a complete glossary that defines key legal business and technical terms Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors. | A Guide to IT Contracting Checklists Tools and Techniques

GBP 44.99
1

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location demographics and sentiments of the participants of the network and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems analyze such systems and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book together with the numerous references listed in each chapter have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies (2) basics of analyzing and securing social networks (3) the authors’ design and implementation of various social network analytics tools (4) privacy aspects of social networks (5) access control and inference control for social networks (6) experimental systems designed or developed by the authors on analyzing and securing social networks (7) social media application systems developed by the authors (8) secure social media systems developed by the authors and (9) some of the authors’ exploratory work and further directions.

GBP 42.99
1

Database Modeling Step by Step

Database Modeling Step by Step

With the aim of simplifying relational database modeling Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach which is a more simplistic intuitive way to building relational database models. Going from basics to contemporary topics the book opens with relational data modeling and ends with BigData database modeling following a road map of the evolution in relational modeling and including brief introductions to data warehousing and BigData modeling. A break-down of the elements of a model explains what makes up a relational data model. This is followed by a comparison between standard normalization and a more simplistic intuitive approach to data modeling that a beginner can follow and understand. A brief chapter explains how to use the database programming language SQL (Structured Query Language) which reads from and writes to a relational database. SQL is fundamental to data modeling because it helps in understanding how the model is used. In addition to the relational model the last three chapters cover important modern world topics including denormalization that leads into data warehouses and BigData database modeling. The book explains how there is not much to logical data modeling in BigData databases because as they are often schema-less which means that BigData databases do not have schemas embedded into the database itself they have no metadata and thus not much of a logical data model. Online bonus chapters include a case study that covers relational data modeling and are available at the author’s web site: www. oracletroubleshooter. com/datamodeling. html | Database Modeling Step by Step

GBP 54.99
1

Ethics in IT Outsourcing

Ethics in IT Outsourcing

In IT divisions and organizations the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro macro and corporate level this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals corporations and society Outlines a new corporate capability—the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author’s decades of experience working with large firms in IT and outsourcing this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal corporate and societal decision-making. Readers are invited to participate in the growing dialog of business ethics and IT outsourcing ethics in particular at the author’s website: www. ethicsinit. com

GBP 54.99
1

Cybersecurity for Information Professionals Concepts and Applications

Cybersecurity for Information Professionals Concepts and Applications

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However the number of both cybersecurity and privacy breach incidents are soaring which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture making individuals more cybersecurity-conscious as well. However it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals librarians archivists record managers students and professionals in related disciplines. This book is written especially for educators preparing courses in information security cybersecurity and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations threats and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all the book addresses the ongoing challenges of cybersecurity. In particular it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior. | Cybersecurity for Information Professionals Concepts and Applications

GBP 41.99
1

PMI-PBA Exam Practice Test and Study Guide

PMI-PBA Exam Practice Test and Study Guide

The PMI-PBA® Exam Practice Test and Study Guide attempts to address all your questions and concerns by providing two of the most sought-after study aids: memory maps and practice questions. The systematic use of memory maps helps aid in the efficient recall of information and can boost confidence during the exam. Well-crafted practice questions are fantastic study aids that can be used to track your progress as you learn new concepts introduce you to the complex sentence structure that is likely to appear on the exam and concentrate your studies by domain essentially preparing you to pass the very challenging PMI-PBA® Exam in the allotted four hours. In addition to study hints and exam topics this book provides references to tools and techniques that should be incorporated into your work immediately. For each of the five domains outlined in the PMI Professional in Business Analysis (PMI-PBA)® Examination Content Outline 2013 (the ECO) twenty practice questions test your knowledge. Also included is a challenging 200-question practice exam which is representative of the actual exam. To enhance your studies a timed online simulated exam is also provided. At the end of the simulated exam you can see your score per the number of questions you answered correctly. These exam questions are crafted to foster learning and reinforce content; they are not obscure or overly complicated but rather are representative of the actual exam. Knowing what to do must be translated into doing what you know. This book helps you prepare for the PMI-PBA® exam by instilling knowledge and encouraging critical thinking. As a result the skills attained can lead to improved project success and outcomes and you’ll have a much stronger understanding of the material along with the tools and techniques of business analysis. PMI-PBA® is a registered trademark of the Project Management Institute.

GBP 42.99
1

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

This is an important book. Ethics is not an easy topic and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . Use this book as a practical resource an informative and educational source of material in developing expertise but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines professional journals and online blogs. These are synthesised into a blueprint which addresses in a practical manner the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15 became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world of what has happened and what might happen as digital technology continues to pervade.

GBP 52.99
1