27 results (0,19036 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization: Fundamentals Algorithms and Applications introduces state-of-the-art extremal optimization (EO) and modified EO (MEO) solutions from fundamentals methodologies and algorithms to applications based on numerous classic publications and the authors’ recent original research results. It promotes the movement of EO from academic study to practical applications. The book covers four aspects beginning with a general review of real-world optimization problems and popular solutions with a focus on computational complexity such as NP-hard and the phase transitions occurring on the search landscape. Next it introduces computational extremal dynamics and its applications in EO from principles mechanisms and algorithms to the experiments on some benchmark problems such as TSP spin glass Max-SAT (maximum satisfiability) and graph partition. It then presents studies on the fundamental features of search dynamics and mechanisms in EO with a focus on self-organized optimization evolutionary probability distribution and structure features (e. g. backbones) which are based on the authors’ recent research results. Finally it discusses applications of EO and MEO in multiobjective optimization systems modeling intelligent control and production scheduling. The authors present the advanced features of EO in solving NP-hard problems through problem formulation algorithms and simulation studies on popular benchmarks and industrial applications. They also focus on the development of MEO and its applications. This book can be used as a reference for graduate students research developers and practical engineers who work on developing optimization solutions for those complex systems with hardness that cannot be solved with mathematical optimization or other computational intelligence such as evolutionary computations. | Extremal Optimization Fundamentals Algorithms and Applications

GBP 42.99
1

The Insider Threat Assessment and Mitigation of Risks

The Web Accessibility Project Development and Testing Best Practices

The Web Accessibility Project Development and Testing Best Practices

Approximately 15% of the global population is affected by some sort of disability according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software’s and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design development and extensive accessibility testing which are essential for most of the customer-facing websites. In a fast-paced world incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit accessibility functional tests and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book developers can help their organizations rise to a whole new level of accessibility adherence innovation and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users. | The Web Accessibility Project Development and Testing Best Practices

GBP 66.99
1

The Business Value of Software

The Business Value of Software

In business driving value is a key strategy and typically starts at the top of an organization. In today’s digital age driving software value is also an important and often overlooked key strategy. Executives and the corporate board need to expect the highest level of business value from the software the organization is developing buying and selling. In today’s digital transformation marketplace it is imperative that organizations start driving business value from software development initiatives. For many years the cost of software development challenged organizations with questions such as: How do we allocate software development costs?Should these costs be considered an overhead expense?Are we getting the most value possible for our investment? A fundamental problem has been built into these questions – the focus on cost. In almost every other part of the organization maximizing profit or in the case of a not-for-profit maximizing the funds available provides a clear focus with metrics to determine success or failure. In theory simply aligning software spending with the maximizing profit goals should be sufficient to avoid any questions about value for money. Unfortunately this alignment hasn’t turned out to be so simple and the questions persist particularly at the strategic or application portfolio level. In this book Michael D. S. Harris describes how a software business value culture—one where all stakeholders including technology and business—have a clear understanding of the goals and expected business value from software development. The book shows readers how they can transform software development from a cost or profit center to a business value center. Only a culture of software as a value center enables an organization to constantly maximize business value flow through software development. If your organization is starting to ask how it can change software from a cost-center to a value-center this book is for you. | The Business Value of Software

GBP 42.99
1

Security without Obscurity A Guide to PKI Operations

AI-Based Data Analytics Applications for Business Management

802.1X Port-Based Authentication

802.1X Port-Based Authentication

Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802. 1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802. 1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802. 1X port-based authentication a history of the standard and the technical documents published and details of the connections among the three network components. It focuses on the technical aspect of 802. 1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology design and implementation with a specific focus on Cisco devices. Including examples derived from the 802. 1X implementation it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches 802. 1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today’s computer networks using this particular network protocol.

GBP 56.99
1

Architecting Secure Software Systems

Architecting Secure Software Systems

Traditionally software engineers have defined security as a non-functional requirement. As such all too often it is only considered as an afterthought making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase continuing this sharp focus into security design secured programming security testing and secured deployment. Outlines Protection Protocols for Numerous ApplicationsThrough the use of examples this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX . NET Java mobile and Web environments. Finally they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation. Define a Security Methodology from the Initial Phase of Development Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers engineers and architects to approach security in a holistic fashion at the beginning of the software development li

GBP 56.99
1

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide

Transhumanism Artificial Intelligence the Cloud Robotics Electromagnetic Fields Intelligence Communities Rail Transportation Open-Source Intelligence (OSINT)—all this and more is discussed in Cyber Crime Investigator’s Field Guide Third Edition. Many excellent hardware and software products exist to protect our data communications systems but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws rules and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed along with information about how cyberspace works and the tools that reveal the who where what when why and how in the investigation of cybercrime. Features New focus area on rail transportation OSINT medical devices and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive the call arrival on site chain of custody and more This book offers a valuable Q&A by subject area an extensive overview of recommended reference materials and a detailed case study. Appendices highlight attack signatures Linux commands Cisco firewall commands port numbers and more. | Cyber Crime Investigator's Field Guide

GBP 56.99
1

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

Most academics still wrestle with the publish or perish phenomenon. Based on Dr. Liebowitz’s 25 years serving as the editor-in-chief of a leading international journal along with insights from some of the most knowledgeable journal editors this book shares key lessons learned to help new professors doctoral students and practitioner–scholars increase their chances of being published in selective refereed international journals. It focuses on the key practices needed to ensure journal publication with interesting cases and helpful tips sprinkled throughout the book. A Guide to Publishing for Academics provides useful knowledge from leading journal editors of both traditional and online journals as well as various tiers of journals. Although the focus is mainly in the business and IT areas much of the guidance provided can cross into other fields. The book contains interesting vignettes and do’s and don’ts so that potential authors can understand what goes on behind the scenes once the manuscript arrives on the journal editor’s desk. The book provides constructive guidance on choosing what and where to publish what to consider when writing a title for a paper how to prepare and submit journal manuscripts and how to position a paper for publication. It also has valuable information for current and future journal editors including models of editing and editorial boards editorial coaching advice and editing smart practices. With the information in this book the next generation of academics and practitioner–scholars will be well equipped to overcome the publish or perish phenomenon. | A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

GBP 56.99
1

A Guide to IT Contracting Checklists Tools and Techniques

A Guide to IT Contracting Checklists Tools and Techniques

Since A Guide to IT Contracting: Checklists Tools and Techniques first published several alarming trends have developed in the technology contracting industry. These trends include: The Dawn of the As-Is Technology Product The Ever-Changing Product Where in the World Is My Data? To meet these challenges the Second Edition helps business managers and lawyers explore alternate solutions from other vendors conduct simultaneous negotiations with other vendors and generally ensure prospective vendors understand they can lose the deal if they refuse to act reasonably. Distilling the most critical business and legal lessons learned through the author’s decades of legal experience drafting and negotiating IT-related agreements this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement each chapter includes a checklist of essential terms a brief summary of what the agreement is intended to do and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes a complete glossary that defines key legal business and technical terms Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors. | A Guide to IT Contracting Checklists Tools and Techniques

GBP 44.99
1

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Describing how to avoid common vendor traps Buying Supporting Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and ultimately better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts—which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition support and maintenanceExamines hardware and software warranty and support modelsConsiders finance and accounting issues for maintenance and supportSpells out technology product details Explains postwarranty support and maintenanceProvides the understanding to better negotiate with vendor sales teamsIllustrating the types of problems typically experienced during product use the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating. | Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

GBP 56.99
1

Developing the Intuitive Executive Using Analytics and Intuition for Success

Developing the Intuitive Executive Using Analytics and Intuition for Success

The leading traits of executives often include creativity and innovation. Research shows that intuition can significantly enhance these traits. Developing intuitive executives and honing intuition coupled with the ability to apply data and evidence to inform decision making is the focus of Developing the Intuitive Executive: Using Analytics and Intuition for Success. Some researchers call the complement of applying data analytics to intuition as quantitative intuition rational intuition or informed intuition. Certainly in today's data-driven environment analytics plays a key role in executive decision-making. However an executive’s many years of experiential learning are not formally considered as part of the decision-making process. Learning from both failures and successes can help fine-tune intuitive awareness—what this book calls intuition-based decision-making. Research also shows that many executives do not trust the internal data quality in their organizations and so they rely on their intuition rather than strictly on data. This book presents the work of leading researchers worldwide on intuition in the management and executive domain. Their chapters cover key issues trends concepts techniques and opportunities for applying intuition as part of the executive decision-making process. Highlights include: Using intuition to manage new opportunities Intuition in medicine Rules based on intuition Balancing logic and intuition in decision-making Smart heuristics to manage complexity Intuition and competitiveness Intuitive investment decision-making across cultures Showing how intuition in executive decision-making should play an important role this book enables managers to complement their knowledge gained from experience with analytics to improve decision-making and business success. | Developing the Intuitive Executive Using Analytics and Intuition for Success

GBP 44.99
1

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

C++ Template Metaprogramming in Practice A Deep Learning Framework

C++ Template Metaprogramming in Practice A Deep Learning Framework

Using the implementation of a deep learning framework as an example C++ Template Metaprogramming in Practice: A Deep Learning Framework explains the application of metaprogramming in a relatively large project and emphasizes ways to optimize systems performance. The book is suitable for developers with a basic knowledge of C++. Developers familiar with mainstream deep learning frameworks can also refer to this book to compare the differences between the deep learning framework implemented with metaprogramming and compile-time computing with deep learning frameworks using object-oriented methods. Consisting of eight chapters the book starts with two chapters discussing basic techniques of metaprogramming and compile-time computing. The rest of the book’s chapters focus on the practical application of metaprogramming in a deep learning framework. It examines rich types and systems expression templates and writing complex meta-functions as well as such topics as: Heterogeneous dictionaries and policy templates An introduction to deep learning Type system and basic data types Operations and expression templates Basic layers Composite and recurrent layers Evaluation and its optimization Metaprogramming can construct flexible and efficient code. For C++ developers who are familiar with object-oriented programming the main difficulty in learning and mastering C++ metaprogramming is establishing the thinking mode of functional programming. The meta-programming approach involved at compile time is functional which means that the intermediate results of the construction cannot be changed and the impact may be greater than expected. This book enables C++ programmers to develop a functional mindset and metaprogramming skills. The book also discusses the development cost and use cost of metaprogramming and provides workarounds for minimizing these costs. | C++ Template Metaprogramming in Practice A Deep Learning Framework

GBP 99.99
1

Cybersecurity for Information Professionals Concepts and Applications

Cybersecurity for Information Professionals Concepts and Applications

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However the number of both cybersecurity and privacy breach incidents are soaring which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture making individuals more cybersecurity-conscious as well. However it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals librarians archivists record managers students and professionals in related disciplines. This book is written especially for educators preparing courses in information security cybersecurity and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations threats and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all the book addresses the ongoing challenges of cybersecurity. In particular it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior. | Cybersecurity for Information Professionals Concepts and Applications

GBP 41.99
1

Risk Management Concepts and Guidance Fifth Edition

Risk Management Concepts and Guidance Fifth Edition

This new edition of Risk Management: Concepts and Guidance supplies a look at risk in light of current information yet remains grounded in the history of risk practice. Taking a holistic approach it examines risk as a blend of environmental programmatic and situational concerns. Supplying comprehensive coverage of risk management tools practices and protocols the book presents powerful techniques that can enhance organizational risk identification assessment and management—all within the project and program environments. Updated to reflect the Project Management Institute’s A Guide to the Project Management Body of Knowledge (PMBOK® Guide) Fifth Edition this edition is an ideal resource for those seeking Project Management Professional and Risk Management Professional certification. Emphasizing greater clarity on risk practice this edition maintains a focus on the ability to apply planned clairvoyance to peer into the future. The book begins by analyzing the various systems that can be used to apply risk management. It provides a fundamental introduction to the basics associated with particular techniques clarifying the essential concepts of risk and how they apply in projects. The second part of the book presents the specific techniques necessary to successfully implement the systems described in Part I. The text addresses project risk management from the project manager’s perspective. It adopts PMI’s perspective that risk is both a threat and an opportunity and it acknowledges that any effective risk management practice must look at the potential positive events that may befall a project as well as the negatives. Providing coverage of the concepts that many project management texts ignore such as the risk response matrix and risk models the book includes appendices filled with additional reference materials and supporting details that simplifying some of the most complex aspects of risk management. | Risk Management Concepts and Guidance Fifth Edition

GBP 44.99
1

Requirements Engineering for Software and Systems

Requirements Engineering for Software and Systems

Solid requirements engineering has increasingly been recognized as the key to improved on-time and on-budget delivery of software and systems projects. New software tools are emerging that are empowering practicing engineers to improve their requirements engineering habits. However these tools are not usually easy to use without significant training. Requirements Engineering for Software and Systems Fourth Edition is intended to provide a comprehensive treatment of the theoretical and practical aspects of discovering analyzing modeling validating testing and writing requirements for systems of all kinds with an intentional focus on software-intensive systems. It brings into play a variety of formal methods social models and modern requirements writing techniques to be useful to practicing engineers. The book is intended for professional software engineers systems engineers and senior and graduate students of software or systems engineering. Since the first edition there have been made many changes and improvements to this textbook. Feedback from instructors students and corporate users was used to correct expand and improve the materials. The fourth edition features two newly added chapters: On Non-Functional Requirements and Requirements Engineering: Road Map to the Future. The latter provides a discussion on the relationship between requirements engineering and such emerging and disruptive technologies as Internet of Things Cloud Computing Blockchain Artificial Intelligence and Affective Computing. All chapters of the book were significantly expanded with new materials that keep the book relevant to current industrial practices. Readers will find expanded discussions on new elicitation techniques agile approaches (e. g. Kanpan SAFe and DEVOps) requirements tools requirements representation risk management approaches and functional size measurement methods. The fourth edition also has significant additions of vignettes exercises and references. Another new feature is scannable QR codes linked to sites containing updates tools videos and discussion forums to keep readers current with the dynamic field of requirements engineering.

GBP 59.99
1

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management Second Edition provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective. Because of the critical importance of cybersecurity in today’s enterprise networks security-related issues are explained throughout the book and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests such as CompTIA and CISSP Takes advantage of actual cases examples industry products and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots figures and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook this book includes hands-on assignments based on the Packet Tracer program an excellent network design and simulation tool from Cisco. Instructor materials also are provided including PowerPoint slides solutions for exercise questions and additional chapter questions from which to build tests.

GBP 44.99
1

Portfolio Management Delivering on Strategy

Portfolio Management Delivering on Strategy

Portfolio management is becoming the ‘must have’ for organizations to prosper and survive in this decade and beyond. No longer can the organizational focus be one of following best and repeatable practices as resource limitations mean only those programs projects and operational work that add business value can and should be pursued. Executives are focusing on strategic ability and managing complexity which can only be done through a disciplined portfolio process in ensuring the best mix of programs projects and operational work is under way. In turn the portfolio is constantly in flux as difficult decisions are made if a project for example is no longer contributing to business value and providing benefits and should be terminated to reallocate resources to one of higher priority. Commitment to this difficult approach is necessary at all levels and communication is required so everyone knows how their work contributes to the organization’s strategic goals and objectives. Portfolio Management: Delivering on Strategy Second Edition focuses on the benefits of portfolio management to the organization. Its goal is to provide senior executives a view on how portfolio management can deliver organizational strategy. The emphasis is on the specific aspects within the portfolio management discipline and how each aspect should be managed from a business perspective and not necessarily from a portfolio management perspective. Highlights of the book include: Agile portfolio management Delivering organizational value Portfolio management and uncertainty Portfolio governance Marketing a portfolio Portfolio management success Starting with a review of the project portfolio concept and its development this book is a reference for executives and practitioners in the field as well as a students and researchers studying portfolio management. | Portfolio Management Delivering on Strategy

GBP 44.99
1

Fundamentals of Internet of Things for Non-Engineers

Fundamentals of Internet of Things for Non-Engineers

The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers progressed to connecting people to people and is now moving to connect everything to everything. The movement started like a race—with a lot of fanfare excitement and cheering. We’re now into the work phase and we have to figure out how to make the dream come true. The IoT will have many faces and involve many fields as it progresses. It will involve technology design security legal policy business artificial intelligence design Big Data and forensics; about any field that exists now. This is the reason for this book. There are books in each one of these fields but the focus was always an inch wide and a mile deep. There’s a need for a book that will introduce the IoT to non-engineers and allow them to dream of the possibilities and explore the work venues in this area. The book had to be a mile wide and a few inches deep. The editors met this goal by engaging experts from a number of fields and asking them to come together to create an introductory IoT book. Fundamentals of Internet of Things for Non-Engineers Provides a comprehensive view of the current fundamentals and the anticipated future trends in the realm of Internet of Things from a practitioner’s point of view Brings together a variety of voices with subject matter expertise in these diverse topical areas to provide leaders students and lay persons with a fresh worldview of the Internet of Things and the background to succeed in related technology decision-making Enhances the reader’s experience through a review of actual applications of Internet of Things end points and devices to solve business and civic problems along with notes on lessons learned Prepares readers to embrace the Internet of Things era and address complex business social operational educational and personal systems integration questions and opportunities

GBP 52.99
1

Building in Security at Agile Speed

Building in Security at Agile Speed

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still achieving security remains a human endeavor a core part of designing generating and verifying software. Dr. James Ransome and Brook S. E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately humans generate software security. People collectively act through a particular and distinct set of methodologies processes and technologies that the authors have brought together into a newly designed holistic generic software development lifecycle facilitating software security at Agile DevOps speed. —Eric. S. Yuan Founder and CEO Zoom Video Communications Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. —Jennifer Sunshine Steffens CEO of IOActive Both practical and strategic Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical but deeply human elements of agile ways of working. —Jorgen Hesselberg author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. —George K Tsantes CEO of Cyberphos former partner at Accenture and Principal at EYDetailing the people processes and technical aspects of software security Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed managed and exploited by humans. This book presents a step-by-step process for software security that uses today’s technology operational business and development methods with a focus on best practice proven activities processes tools and metrics for any size or type of organization and development practice.

GBP 44.99
1

Managing Business Projects The Essentials

Managing Business Projects The Essentials

Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost it is about business projects as opposed to construction or engineering projects. Although many techniques like schedule management apply to both they are usually applied differently. As its title conveys the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects up to $20 million but often below $1 million. Some literature favors large and mega-projects but for every mega-project there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects. This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos. ' Rather it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea which is stated repeatedly is to do the essentials and to do them consistently and well. Strong emphasis is placed on things that happen before around and after the project itself. So while the basic disciplines like engaging with stakeholders managing scope schedules costs risks issues changes and communication are thoroughly explained other important aspects are covered. These include: governance of a project and of a portfolio of projects project selection with its financial and non-financial aspects effective use of the business case through to benefits realization procurement outsourcing and partnership and also the agile mindset that is valuable beyond Agile projects. Besides project managers and sponsors this book is intended for people who are working in business or government at any level or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students although many would benefit from the contents. | Managing Business Projects The Essentials

GBP 52.99
1

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

In this book Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption—fear. Fear of the unknown fear of the intangible fear of the investment needed and yes fear of losing your job to a machine. With his talent for distilling clarity from complexity Edosa tackles this and many other challenges. —Tim Carmichael Chief Data Officer Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data information and knowledge across organisations. Yet rather than being stuck with endless polarising debates such as breaking down silos it shifts focus back towards the ultimate to what end. —Jacky Wright Chief Digital Officer (CDO) Microsoft US If you care about AI transformation empowering people or advancing organisational success in an increasingly digital world then you should read this book. —Yomi Ibosiola Chief Data and Analytics Officer Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when—at the end of a critical investment in an artificial intelligence project that had been meant to save money—it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer’s production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to make data work for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation empower people and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities. | Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

GBP 44.99
1