Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

23 results (0,16543 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Program Management in Defense and High Tech Environments

Program Management in Defense and High Tech Environments

Program management in a technical environment is as much art as it is science. Effective program managers are able to combine management and leadership skills for the good of the program and the people entrusted to them. This book illuminates the entire life cycle of the program—from the customer’s original concept to successful completion. It includes many helpful ideas and insights into why programs and program managers can fail. Much more importantly it provides insights about how program managers can succeed. Program Management in Defense and High Tech Environments is organized as a chronological tale of a program life cycle with side trips that cover the important concepts of leadership claims and claims avoidance earned value measurement (EVM) communication basics negotiations and coaching. The book begins with an overview of program management discussing the role of program managers their required skills and experience and the types of programs and contracts. The remainder of the book provides more detail on the program manager’s role and the environment in which he or she works. Understanding that academic explanations of program management activities can be dry the author uses true-to-life stories to present the nuts and bolts of the work. These stories illustrate the science of program management and the art that is necessary for success. The book discusses many of the common program pitfalls. It explains how to detect and avoid scope creep—the unintended expansion of program scope. It details both internal and external scope creep and stresses the importance of constant vigilance to prevent cost overruns and schedule delays. Program Management in Defense and High Tech Environments is a comprehensive guide for early- and mid-career program managers to understand what they need to do to be successful. It is also a valuable resource for later-career program managers who want to learn through other program managers’ successes and failures.

GBP 44.99
1

The Complete Project Management Office Handbook

The Complete Project Management Office Handbook

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight control and support. Illustrating the implications of project management in today’s organizations The Complete Project Management Office Handbook Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs purpose and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists detailed process steps and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate quick-wins and early PMO-based accomplishments in their organization.

GBP 42.99
1

Packet Forwarding Technologies

A Software Development Approach for Driving Competitiveness in Small Firms

A Software Development Approach for Driving Competitiveness in Small Firms

The COVID-19 Pandemic has forced many businesses to accelerate their digital transformation strategies to continue to meet the changing needs of their customers. This has resulted in significant growth in the global software market. However for decades managing software product quality has been a major challenge for many software development firms. This low success rate is due mainly to the development and delivery of low-quality software products. In addition to the direct costs associated with poor-quality software software flaws can also raisesecurity concerns as hackers can gain complete control of various devices and data such as mobile phones computers or the operational transactions of businesses. These security and privacy breaches are currently occurring with great frequency. Although producers and consumers of software products spend vast amounts of money developing and purchasing these products in many cases the promised benefits of user satisfaction efficiency productivity and profitability are not realized. In more severe circumstances software development firms have failed and face the threat of going bankrupt being acquired or suffering closure because customers are demanding high-quality software products that they consistently fail to deliver. Small and medium enterprises (SMEs) operating within the software development industry have a more critical need to produce high-quality software since they are less able to absorb both the cost and the reputational impact of producing low-quality output. A Software Development Approach for Driving Competitiveness in Small Firms provides some cost-efficient options that can help SMEs increase the likelihood that their software will be of high quality. It tells the story of the entrepreneurial journey that small firms should take to deliver high-quality software products. By utilizing practical examples and providing several recommended solutions to decrease the likelihood of producing low-quality software the book outlines how mobilizing people processes and technology are integral to the software development process and emphasizes why process maturity is the most influential factor in software development in small and medium enterprises.

GBP 89.99
1

Software Project Management A Process-Driven Approach

Software Project Management A Process-Driven Approach

To build reliable industry-applicable software products large-scale software project groups must continuously improve software engineering processes to increase product quality facilitate cost reductions and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects Software Project Management: A Process-Driven Approach discusses human resources software engineering and technology to a level that exceeds most university-level courses on the subject. The book is organized into five parts. Part I defines project management with information on project and process specifics and choices the skills and experience needed the tools available and the human resources organization and management that brings it all together. Part II explores software life-cycle management. Part III tackles software engineering processes and the range of processing models devised by several domestic and international organizations. Part IV reveals the human side of project management with chapters on managing the team the suppliers and the customers themselves. Part V wraps up coverage with a look at the technology techniques templates and checklists that can help your project teams meet and exceed their goals. A running case study provides authoritative insight and insider information on the tools and techniques required to ensure product quality reduce costs and meet project deadlines. Praise for the book:This book presents all aspects of modern project management practices … includes a wealth of quality templates that practitioners can use to build their own tools. … equally useful to students and professionals alike. —Maqbool Patel PhD SVP/CTO/Partner Acuitec | Software Project Management A Process-Driven Approach

GBP 56.99
1

Effective Processes for Quality Assurance

Effective Processes for Quality Assurance

Driving innovation can reduce costs for companies institutions military programs and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices improvements and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies institutions military programs and successful businesses by encouraging a cooperative proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains:Quality Assurance methodsMeasuring benefits of Quality Assurance process improvementQuality Assurance performance and improvementRisk managementQuality Assurance improvement with metricsEffective processes for Quality AssuranceQuantitative process performance and commitmentsQuality Assurance plansQuality Assurance for customers and suppliersSupporting software configurationEffective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.

GBP 42.99
1

PMI-PBA Exam Practice Test and Study Guide

PMI-PBA Exam Practice Test and Study Guide

The PMI-PBA® Exam Practice Test and Study Guide attempts to address all your questions and concerns by providing two of the most sought-after study aids: memory maps and practice questions. The systematic use of memory maps helps aid in the efficient recall of information and can boost confidence during the exam. Well-crafted practice questions are fantastic study aids that can be used to track your progress as you learn new concepts introduce you to the complex sentence structure that is likely to appear on the exam and concentrate your studies by domain essentially preparing you to pass the very challenging PMI-PBA® Exam in the allotted four hours. In addition to study hints and exam topics this book provides references to tools and techniques that should be incorporated into your work immediately. For each of the five domains outlined in the PMI Professional in Business Analysis (PMI-PBA)® Examination Content Outline 2013 (the ECO) twenty practice questions test your knowledge. Also included is a challenging 200-question practice exam which is representative of the actual exam. To enhance your studies a timed online simulated exam is also provided. At the end of the simulated exam you can see your score per the number of questions you answered correctly. These exam questions are crafted to foster learning and reinforce content; they are not obscure or overly complicated but rather are representative of the actual exam. Knowing what to do must be translated into doing what you know. This book helps you prepare for the PMI-PBA® exam by instilling knowledge and encouraging critical thinking. As a result the skills attained can lead to improved project success and outcomes and you’ll have a much stronger understanding of the material along with the tools and techniques of business analysis. PMI-PBA® is a registered trademark of the Project Management Institute.

GBP 42.99
1

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives in-depth explanations of each topic and accurate practice questions. Each chapter includes exam tips that highlight key exam information hands-on exercises a summary that serves as a quick review and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily it also serves as an ideal on-the-job reference. Richard E. Cascarino MBA CIA CISM CFE CRMA is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa Europe the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA and the Association of Certified Fraud Examiners where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand author of the book Internal Auditing: An Integrated Approach now in its third edition. This book is extensively used as a university textbook worldwide. In addition he is the author of the Auditor's Guide to IT Auditing Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE the Ultimate Resource.

GBP 36.99
1

Data Analytics for Internal Auditors

Enterprise Operations Management Handbook Second Edition

Handbook of Data Management 1999 Edition

Handbook of Data Management 1999 Edition

Packed with dozens of no-nonsense chapters written by leading professionals Handbook of Data Management 1999 Edition shows your students how to design build and maintain high-performance high-availability databases in multiple environments. Handbook of Data Management 1999 Edition is the most comprehensive single-volume guide of its kind. The book provides the latest most innovative solutions for planning developing and running a powerful data management function. Here students will find exhaustive coverage of the range of data repositories (from legacy indexed files to object data bases and data warehouses) as well as details on everything from strategic planning to maximizing database performance. Completely revised and updated to reflect latebreaking technologies Handbook of Data Management 1999 Edition includes extensive case studies and straightforward descriptions showing students how to:implement Web-enabled data warehousesbuild multimedia databasesmaster data mininguse enterprise database modelingstay up-to-date with data conversion and migrationmaximize OLAP architectures and toolsHandbook of Data Management 1999 Edition also provides ongoing coverage of the latest tools and techniques regarding:organization for quality information systemsdata definitiondatabase design and managementobject and hybrid databasesand moreEach contributor to Handbook of Data Management 1999 Edition is an expert with first-hand experience in database and data management. These contributors provide a depth and breadth of coverage you and your students simply won't find anywhere else. Prepare your students for real-world business computing. Start them off with Handbook of Data Management 1999 Edition.

GBP 425.00
1

How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words that is what the average tenure of a CISO is at a business. At the end of their stay many CISOs look for totally different avenues of work or they try something else – namely starting their own Cybersecurity Consulting business. Although a CISO might have the skill and knowledge set to go it alone it takes careful planning to launch a successful Cyber Consulting business. This ranges all the way from developing a business plan to choosing the specific area in Cybersecurity that they want to serve. How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO is written by an author who has real-world experience in launching a Cyber Consulting company. It is all-encompassing with coverage spanning from selecting which legal formation is most suitable to which segment of the Cybersecurity industry should be targeted. The book is geared specifically towards the CISO that is on the verge of a total burnout or career change. It explains how CISOs can market their experience and services to win and retain key customers. It includes a chapter on how certification can give a Cybersecurity consultant a competitive edge and covers the five top certifications in information security: CISSP CompTIA Security+ CompTIA CySA+ CSSP and CISM. The book’s author has been in the IT world for more than 20 years and has worked for numerous companies in corporate America. He has experienced CISO burnout. He has also started two successful Cybersecurity companies. This book offers his own unique perspective based on his hard-earned lessons learned and shows how to apply them in creating a successful venture. It also covers the pitfalls of starting a consultancy how to avoid them and how to bounce back from any that prove unavoidable. This is the book for burned-out former CISOs to rejuvenate themselves and their careers by launching their own consultancies. | How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

GBP 44.99
1

Building in Security at Agile Speed

Building in Security at Agile Speed

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still achieving security remains a human endeavor a core part of designing generating and verifying software. Dr. James Ransome and Brook S. E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately humans generate software security. People collectively act through a particular and distinct set of methodologies processes and technologies that the authors have brought together into a newly designed holistic generic software development lifecycle facilitating software security at Agile DevOps speed. —Eric. S. Yuan Founder and CEO Zoom Video Communications Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. —Jennifer Sunshine Steffens CEO of IOActive Both practical and strategic Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical but deeply human elements of agile ways of working. —Jorgen Hesselberg author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. —George K Tsantes CEO of Cyberphos former partner at Accenture and Principal at EYDetailing the people processes and technical aspects of software security Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed managed and exploited by humans. This book presents a step-by-step process for software security that uses today’s technology operational business and development methods with a focus on best practice proven activities processes tools and metrics for any size or type of organization and development practice.

GBP 44.99
1

Cyber Security Essentials

Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats tactics and procedures. To accomplish this the team of security professionals from VeriSign‘s iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security the book: Covers attacker methods and motivations exploitation trends malicious code techniques and the latest threat vectors Addresses more than 75 key security concepts in a series of concise well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‘s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

GBP 160.00
1

TCP Performance over UMTS-HSDPA Systems

TCP Performance over UMTS-HSDPA Systems

The evolution of the mobile communication market is causing a major increase in data traffic demands. This could lead to disrupted mobility and intermittent degraded channel conditions that contribute to poor transmission control protocol (TCP) performance. TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity and shows how to reduce the interaction of wireless networks on TCP with minimal cost. With self-contained chapters the book consists of two main sections. The first several chapters provide background and describe the state of the art for wireless networks emphasizing one of the third-generation (3G) wireless technologies: the universal mobile telecommunications system (UMTS). These chapters also include an analysis of the overall cell capacity for UMTS Release 99 and high-speed downlink packet access (HSDPA) systems. The second section focuses on the interaction of TCP with wireless systems presenting an exhaustive list of TCP versions and link layer solutions that adapt TCP (often modifying the original TCP) to a wireless network. This section also displays mathematical modeling of the interaction of hybrid automatic repeat request (HARQ) and TCP in UMTS networks. While offering information for advanced undergraduate students who are unfamiliar with code division multiple access (CDMA) wireless systems as well as UMTS and HSDPA cellular systems the book also provides extensive coverage of TCP over wireless systems problems and solutions for researchers developers and graduate students.

GBP 56.99
1

Human–Computer Interaction Fundamentals and Practice

Human–Computer Interaction Fundamentals and Practice

Although life continues to become increasingly embedded with interactive computing services that make our lives easier human-computer interaction (HCI) has not been given the attention it deserves in the education of software developers at the undergraduate level. Most entry-level HCI textbooks are structured around high-level concepts and are not directly tied to the software development process. Filling this need Human-Computer Interaction: Fundamentals and Practice supplies an accessible introduction to the entire cycle of HCI design and implementation—explaining the core HCI concepts behind each step. Designed around the overall development cycle for an interactive software product it starts off by covering the fundamentals behind HCI. The text then quickly goes into the application of this knowledge. It covers the forming of HCI requirements modeling the interaction process designing the interface implementing the resulting design and evaluating the implemented product. Although this textbook is suitable for undergraduate students of computer science and information technology it is accessible enough to be understood by those with minimal programming knowledge. Supplying readers with a firm foundation in the main HCI principles the book provides a working knowledge of HCI-oriented software development. The core content of this book is based on the introductory HCI course (advanced junior or senior-level undergraduate) that the author has been teaching at Korea University for the past eight years. The book includes access to PowerPoint lecture slides as well as source code for the example applications used throughout the text. | Human–Computer Interaction Fundamentals and Practice

GBP 42.99
1

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

Successful security professionals have had to modify the process of responding to new threats in the high-profile ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists forms questionnaires and sample assessments. Presents Case Studies and Examples of all Risk Management ComponentsBased on the seminars of information security expert Tom Peltier this volume provides the processes that you can easily employ in your organization to assess risk. Answers such FAQs as:Why should a risk analysis be conducted?Who should review the results?How is the success measured?Always conscious of the bottom line Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization—and it’s not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.

GBP 56.99
1

System Reliability and Security Techniques and Methodologies

System Reliability and Security Techniques and Methodologies

Because of the growing reliance on software concerns are growing as to how reliable a system is before it is commissioned for use how high the level of reliability is in the system and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critical systems. System Reliability and Security: Techniques and Methodologies focuses on the use of soft computing techniques and analytical techniques in the modeling and analysis of dependable and secure systems. It examines systems and applications having complex distributed or networked architectures in such fields as: Nuclear energy Ground transportation systems Air traffic control Healthcare and medicine Communications System reliability engineering is a multidisciplinary field that uses computational methods for estimating or predicting the reliability aspects of a system and analyzing failure data obtained from real-world projects. System security is a related field that ensures that even a reliable system is secure against accidental or deliberate intrusions and is free of vulnerabilities. This book covers tools and techniques cutting-edge research topics and methodologies in the areas of system reliability and security. It examines prediction models and methods as well as how to secure a system as it is being developed. | System Reliability and Security Techniques and Methodologies

GBP 59.99
1

Vulnerability Management

Vulnerability Management

Vulnerability management (VM) has been around for millennia. Cities tribes nations and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today we identify vulnerabilities in our software systems infrastructure and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps especially those that are inherent in a larger organization. Completely updated the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective. This book is a guide for security practitioners security or network engineers security officers and CIOs seeking understanding of VM and its role in the organization. To serve various audiences it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy although serving the executive well provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

GBP 44.99
1

Cybersecurity for Information Professionals Concepts and Applications

Cybersecurity for Information Professionals Concepts and Applications

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However the number of both cybersecurity and privacy breach incidents are soaring which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture making individuals more cybersecurity-conscious as well. However it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals librarians archivists record managers students and professionals in related disciplines. This book is written especially for educators preparing courses in information security cybersecurity and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations threats and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all the book addresses the ongoing challenges of cybersecurity. In particular it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior. | Cybersecurity for Information Professionals Concepts and Applications

GBP 41.99
1

Leading Megaprojects A Tailored Approach

Leading Megaprojects A Tailored Approach

The performance of megaprojects is questionable and a large percentage of them fail in one dimension or another. The challenges that contribute to these failures are known. Then why do these projects still fail at a high rate? Leading Megaprojects: A Tailored Approach examines the challenges facing megaprojects and more importantly successes in delivering megaprojects. To close the performance gaps in megaproject deliveries the book presents a customizable model that professionals and organizations can use to increase the chance of successful project delivery. To illustrate the model it uses examples and case studies primarily from capital projects with engineering and construction components. The book also explains how the approach can be applied to all projects regardless of industry or domain. The book emphasizes the role of leadership because it takes the point of view that megaprojects cannot be successful without great leadership due to their massive size complexity number of parties and stakeholders involved and cost among other vital factors. Leaders can define the path for a megaproject to guide seasoned managers and project managers to successful closure. The tailored approach is based on a stage-gate project life cycle model which covers projects from concept to success. However it is not limited to a purist form of traditional project management. It is a tailored methodological approach with an emphasis on leading the work end-to-end at the project level along with the management of every stage of the project. Also it presents the integration of the business product delivery and operations management into a cohesive approach. The book concludes with an in-depth simulation showing how the model is can be tailored to deliver a megaproject successfully. | Leading Megaprojects A Tailored Approach

GBP 44.99
1

Assessing and Insuring Cybersecurity Risk

Assessing and Insuring Cybersecurity Risk

Remote workforces using VPNs cloud-based infrastructure and critical systems and a proliferation in phishing attacks and fraudulent websites are all raising the level of risk for every company. It all comes down to just one thing that is at stake: how to gauge a company’s level of cyber risk and the tolerance level for this risk. Loosely put this translates to how much uncertainty an organization can tolerate before it starts to negatively affect mission critical flows and business processes. Trying to gauge this can be a huge and nebulous task for any IT security team to accomplish. Making this task so difficult are the many frameworks and models that can be utilized. It is very confusing to know which one to utilize in order to achieve a high level of security. Complicating this situation further is that both quantitative and qualitative variables must be considered and deployed into a cyber risk model. Assessing and Insuring Cybersecurity Risk provides an insight into how to gauge an organization’s particular level of cyber risk and what would be deemed appropriate for the organization’s risk tolerance. In addition to computing the level of cyber risk an IT security team has to determine the appropriate controls that are needed to mitigate cyber risk. Also to be considered are the standards and best practices that the IT security team has to implement for complying with such regulations and mandates as CCPA GDPR and the HIPAA. To help a security team to comprehensively assess an organization’s cyber risk level and how to insure against it the book covers: The mechanics of cyber risk Risk controls that need to be put into place The issues and benefits of cybersecurity risk insurance policies GDPR CCPA and the the CMMC Gauging how much cyber risk and uncertainty an organization can tolerate is a complex and complicated task and this book helps to make it more understandable and manageable.

GBP 52.99
1

Applied Edge AI Concepts Platforms and Industry Use Cases

Applied Edge AI Concepts Platforms and Industry Use Cases

The strategically sound combination of edge computing and artificial intelligence (AI) results in a series of distinct innovations and disruptions enabling worldwide enterprises to visualize and realize next-generation software products solutions and services. Businesses individuals and innovators are all set to embrace and experience the sophisticated capabilities of Edge AI. With the faster maturity and stability of Edge AI technologies and tools the world is destined to have a dazzling array of edge-native people-centric event-driven real-time service-oriented process-aware and insights-filled services. Further on business workloads and IT services will become competent and cognitive with state-of-the-art Edge AI infrastructure modules AI algorithms and models enabling frameworks integrated platforms accelerators high-performance processors etc. The Edge AI paradigm will help enterprises evolve into real-time and intelligent digital organizations. Applied Edge AI: Concepts Platforms and Industry Use Cases focuses on the technologies processes systems and applications that are driving this evolution. It examines the implementation technologies; the products processes platforms patterns and practices; and use cases. AI-enabled chips are exclusively used in edge devices to accelerate intelligent processing at the edge. This book examines AI toolkits and platforms for facilitating edge intelligence. It also covers chips algorithms and tools to implement Edge AI as well as use cases. FEATURES The opportunities and benefits of intelligent edge computing Edge architecture and infrastructure AI-enhanced analytics in an edge environment Encryption for securing information An Edge AI system programmed with Tiny Machine learning algorithms for decision making An improved edge paradigm for addressing the big data movement in IoT implementations by integrating AI and caching to the edge Ambient intelligence in healthcare services and in development of consumer electronic systems Smart manufacturing of unmanned aerial vehicles (UAVs) AI edge computing and blockchain in systems for environmental protection Case studies presenting the potential of leveraging AI in 5G wireless communication | Applied Edge AI Concepts Platforms and Industry Use Cases

GBP 99.99
1