Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

16 results (0,17513 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Software Methodologies A Quantitative Guide

The Internet of Things Enabling Technologies Platforms and Use Cases

The Internet of Things Enabling Technologies Platforms and Use Cases

As more and more devices become interconnected through the Internet of Things (IoT) there is an even greater need for this book which explains the technology the internetworking and applications that are making IoT an everyday reality. The book begins with a discussion of IoT ecosystems and the technology that enables them which includes:Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement PlatformsA chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection storage translation real-time processing mining and analysis all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices mobile technology wearables RFID sensors and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements promising applications and roles of cloud computing and data analytics. The book also examines smart homes smart cities and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter. | The Internet of Things Enabling Technologies Platforms and Use Cases

GBP 44.99
1

Blockchain and IoT Integration Approaches and Applications

Blockchain and IoT Integration Approaches and Applications

As technology continues to advance and the interconnection of various devices makes our lives easier it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms turn on or off the lights and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions. However the lack of an intrinsic security measure within IoT makes it especially vulnerable to privacy and security threats. Blockchain and IoT Integration highlights how Blockchain an encrypted distributed computer filing system can be used to help protect IoT against such privacy and security breaches. The merger of IoT and blockchain technology is a step towards creating a verifiable secure and permanent method of recording data processed by smart machines. The text explores the platforms and applications of blockchain-enabled IoT as well as helps clarify how to strengthen the IoT security found in healthcare systems as well as private homes. Other highlights of the book include: Overview of the blockchain architecture Blockchain to secure IoT data Blockchain to secure drug supply chain and combat counterfeits Blockchain IoT concepts for smart grids smart cities and smart homes A biometric-based blockchain enabled payment system IoT for smart healthcare monitoring systems | Blockchain and IoT Integration Approaches and Applications

GBP 100.00
1

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book you will learn how to create a working practical control structure that will ensure the ongoing day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning all the way down to basic technology operation.

GBP 42.99
1

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

Successful security professionals have had to modify the process of responding to new threats in the high-profile ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists forms questionnaires and sample assessments. Presents Case Studies and Examples of all Risk Management ComponentsBased on the seminars of information security expert Tom Peltier this volume provides the processes that you can easily employ in your organization to assess risk. Answers such FAQs as:Why should a risk analysis be conducted?Who should review the results?How is the success measured?Always conscious of the bottom line Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization—and it’s not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.

GBP 56.99
1

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Describing how to avoid common vendor traps Buying Supporting Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and ultimately better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts—which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition support and maintenanceExamines hardware and software warranty and support modelsConsiders finance and accounting issues for maintenance and supportSpells out technology product details Explains postwarranty support and maintenanceProvides the understanding to better negotiate with vendor sales teamsIllustrating the types of problems typically experienced during product use the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating. | Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

GBP 56.99
1

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software: Requirements Test Cases and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:Pre-developed nonfunctional requirements that can be reused for any software development project Documented test cases that go along with the requirements and can be used to develop a Test Plan for the softwareTesting methods that can be applied to the test cases provided Downloadable resources with all security requirements and test cases as well as MS Word versions of the checklists requirements and test cases covered in the bookOffering ground-level already-developed software nonfunctional requirements and corresponding test cases and methods this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying downloadable resources filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis design and testing phases of your software development lifecycle. Some Praise for the Book:This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation . . —Doug Cavit Chief Security Strategist Microsoft Corporation. provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC). —Jeff Weekes Sr. Security Architect at Terra Verde Services. full of useful insights and practical advice from two au | Secure and Resilient Software Requirements Test Cases and Testing Methods

GBP 56.99
1

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Strategic planning outlines the path between the current status of the business and the desired status. It requires the business to identify its objectives and goals and then make the correct decisions to achieve these objectives and goals. This book provides a complete set of practical strategic planning techniques and tools. It explains how and in what circumstances to use particular tools and how to target them to achieve effective results. Systematic Strategic Planning: A Comprehensive Framework for Implementation Control and Evaluation describes a framework of phases through which each project passes a pattern of procedures for straight-forward planning and the fundamentals involved in any strategic planning project. Designed to be simple to understand and easy to use the book presents techniques case studies and working forms to guide you through preparing a strategic plan for your existing or future business. The book is organized into four parts:Part I explains the steps to take before and after starting the strategic planning work. Part II provides the overall framework and characteristics of the simplified and full versions of systematic strategic planning. Part III describes the sections of systematic strategic planning in detail. Part IV provides a framework for implementation control and evaluation functions in a systematic manner. This book is designed to help both experienced strategic planners and other types of professionals who are faced with creating a strategic plan for their business. The processes and techniques described should be universally applicable to any type of business. With the information in this book you will be well-equipped to create effective strategic plans that drive your business forward. | Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

GBP 56.99
1

Ethics in IT Outsourcing

Ethics in IT Outsourcing

In IT divisions and organizations the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro macro and corporate level this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals corporations and society Outlines a new corporate capability—the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author’s decades of experience working with large firms in IT and outsourcing this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal corporate and societal decision-making. Readers are invited to participate in the growing dialog of business ethics and IT outsourcing ethics in particular at the author’s website: www. ethicsinit. com

GBP 54.99
1

The Human Change Management Body of Knowledge (HCMBOK )

The Human Change Management Body of Knowledge (HCMBOK )

I am happy to recommend this work. I believe in the principles presented in it and identify with its context. Due to the lack of knowledge on the subject in the market it is a topic that must be made known. The book should be in the library of all project and change managers. — Paul Dinsmore PMI FellowEvery manager should integrate HCMBOK® practices into their project management methodology in order to fully develop their work. This book addresses a simple and practical way that the critical component in organizational change management can be applied to projects of all kinds: the human factor. — Bruno Machado Director Project Management Office Grupo Anima EducaçãoWe live in a time of change speed and an avalanche of information. It is still very difficult for most companies to change their organizational culture efficiently. This book makes us reflect upon the crucial element in any change and which most managers do not place in the foreground—the people. — Joyce Meyer CEO iDigoIn today's constantly changing world the Project Manager must have sensitivity to how people react to change. Knowing a method that provides a structured way to take care of the human aspect is a key factor in the success of any project! HCMBOK® offers a simple and practical approach to managing change which can be easily incorporated into the project management routine providing amazing results. — Pedro Augusto Cardoso da Silva Engineering Director METRÔRIO This reference starts by presenting the concept of change management its players strategies and applicable models. In the second part the book covers the set of good practices methodology and tools known as the HCMBOK®— Human Change Management Body of Knowledge. The third part introduces the concept of the Change Management Office (CMO) and its relation to the strategic planning of an organization. The book concludes with the competencies essential for a change manager an approach to agile methodologies and a model for managing cultural change. | The Human Change Management Body of Knowledge (HCMBOK®)

GBP 44.99
1

Applied Edge AI Concepts Platforms and Industry Use Cases

Applied Edge AI Concepts Platforms and Industry Use Cases

The strategically sound combination of edge computing and artificial intelligence (AI) results in a series of distinct innovations and disruptions enabling worldwide enterprises to visualize and realize next-generation software products solutions and services. Businesses individuals and innovators are all set to embrace and experience the sophisticated capabilities of Edge AI. With the faster maturity and stability of Edge AI technologies and tools the world is destined to have a dazzling array of edge-native people-centric event-driven real-time service-oriented process-aware and insights-filled services. Further on business workloads and IT services will become competent and cognitive with state-of-the-art Edge AI infrastructure modules AI algorithms and models enabling frameworks integrated platforms accelerators high-performance processors etc. The Edge AI paradigm will help enterprises evolve into real-time and intelligent digital organizations. Applied Edge AI: Concepts Platforms and Industry Use Cases focuses on the technologies processes systems and applications that are driving this evolution. It examines the implementation technologies; the products processes platforms patterns and practices; and use cases. AI-enabled chips are exclusively used in edge devices to accelerate intelligent processing at the edge. This book examines AI toolkits and platforms for facilitating edge intelligence. It also covers chips algorithms and tools to implement Edge AI as well as use cases. FEATURES The opportunities and benefits of intelligent edge computing Edge architecture and infrastructure AI-enhanced analytics in an edge environment Encryption for securing information An Edge AI system programmed with Tiny Machine learning algorithms for decision making An improved edge paradigm for addressing the big data movement in IoT implementations by integrating AI and caching to the edge Ambient intelligence in healthcare services and in development of consumer electronic systems Smart manufacturing of unmanned aerial vehicles (UAVs) AI edge computing and blockchain in systems for environmental protection Case studies presenting the potential of leveraging AI in 5G wireless communication | Applied Edge AI Concepts Platforms and Industry Use Cases

GBP 99.99
1

Building in Security at Agile Speed

Building in Security at Agile Speed

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still achieving security remains a human endeavor a core part of designing generating and verifying software. Dr. James Ransome and Brook S. E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately humans generate software security. People collectively act through a particular and distinct set of methodologies processes and technologies that the authors have brought together into a newly designed holistic generic software development lifecycle facilitating software security at Agile DevOps speed. —Eric. S. Yuan Founder and CEO Zoom Video Communications Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. —Jennifer Sunshine Steffens CEO of IOActive Both practical and strategic Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical but deeply human elements of agile ways of working. —Jorgen Hesselberg author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. —George K Tsantes CEO of Cyberphos former partner at Accenture and Principal at EYDetailing the people processes and technical aspects of software security Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed managed and exploited by humans. This book presents a step-by-step process for software security that uses today’s technology operational business and development methods with a focus on best practice proven activities processes tools and metrics for any size or type of organization and development practice.

GBP 44.99
1

How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

The burnout rate of a Chief Information Security Officer (CISO) is pegged at about 16 months. In other words that is what the average tenure of a CISO is at a business. At the end of their stay many CISOs look for totally different avenues of work or they try something else – namely starting their own Cybersecurity Consulting business. Although a CISO might have the skill and knowledge set to go it alone it takes careful planning to launch a successful Cyber Consulting business. This ranges all the way from developing a business plan to choosing the specific area in Cybersecurity that they want to serve. How to Start Your Own Cybersecurity Consulting Business: First-Hand Lessons from a Burned-Out Ex-CISO is written by an author who has real-world experience in launching a Cyber Consulting company. It is all-encompassing with coverage spanning from selecting which legal formation is most suitable to which segment of the Cybersecurity industry should be targeted. The book is geared specifically towards the CISO that is on the verge of a total burnout or career change. It explains how CISOs can market their experience and services to win and retain key customers. It includes a chapter on how certification can give a Cybersecurity consultant a competitive edge and covers the five top certifications in information security: CISSP CompTIA Security+ CompTIA CySA+ CSSP and CISM. The book’s author has been in the IT world for more than 20 years and has worked for numerous companies in corporate America. He has experienced CISO burnout. He has also started two successful Cybersecurity companies. This book offers his own unique perspective based on his hard-earned lessons learned and shows how to apply them in creating a successful venture. It also covers the pitfalls of starting a consultancy how to avoid them and how to bounce back from any that prove unavoidable. This is the book for burned-out former CISOs to rejuvenate themselves and their careers by launching their own consultancies. | How to Start Your Own Cybersecurity Consulting Business First-Hand Lessons from a Burned-Out Ex-CISO

GBP 44.99
1

Ethics of Data and Analytics Concepts and Cases

Ethics of Data and Analytics Concepts and Cases

The ethics of data and analytics in many ways is no different than any endeavor to find the right answer. When a business chooses a supplier funds a new product or hires an employee managers are making decisions with moral implications. The decisions in business like all decisions have a moral component in that people can benefit or be harmed rules are followed or broken people are treated fairly or not and rights are enabled or diminished. However data analytics introduces wrinkles or moral hurdles in how to think about ethics. Questions of accountability privacy surveillance bias and power stretch standard tools to examine whether a decision is good ethical or just. Dealing with these questions requires different frameworks to understand what is wrong and what could be better. Ethics of Data and Analytics: Concepts and Cases does not search for a new different answer or to ban all technology in favor of human decision-making. The text takes a more skeptical ironic approach to current answers and concepts while identifying and having solidarity with others. Applying this to the endeavor to understand the ethics of data and analytics the text emphasizes finding multiple ethical approaches as ways to engage with current problems to find better solutions rather than prioritizing one set of concepts or theories. The book works through cases to understand those marginalized by data analytics programs as well as those empowered by them. Three themes run throughout the book. First data analytics programs are value-laden in that technologies create moral consequences reinforce or undercut ethical principles and enable or diminish rights and dignity. This places an additional focus on the role of developers in their incorporation of values in the design of data analytics programs. Second design is critical. In the majority of the cases examined the purpose is to improve the design and development of data analytics programs. Third data analytics artificial intelligence and machine learning are about power. The discussion of power—who has it who gets to keep it and who is marginalized—weaves throughout the chapters theories and cases. In discussing ethical frameworks the text focuses on critical theories that question power structures and default assumptions and seek to emancipate the marginalized. | Ethics of Data and Analytics Concepts and Cases

GBP 56.99
1

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership is a must read for anyone involved in international business. It enables beginners to avoid common pitfalls and seasoned executives will recognize many of their own mistakes and benefit from the frameworks Dr. Kraljevic provides. — Professor Sibrandes Poppema President University of Groningen NetherlandsI just cannot stop recommending this book to ever so many people—my academic colleagues industry colleagues friends in the government former students students young CEOs of start-ups that I mentor and my media friends. The book is very special deep with several gems of ideas told in absorbing narrative; neither a text book nor a cook book but a candid sincere and extremely effective set of real world lessons for so many global citizens. Dr. Kraljevic uses personal examples from across continents in diverse industry settings. All I can say is this: Go grab the book on a Thursday night and you will have a wonderful weekend reading this amazing book. — Professor S. Sadagopan Director International Institute of Information Technology of Bangalore India Everything I know about international markets I owe it to Zlática. — Sue Payne Former ExxonMobil Area Manager U. S. & Mexico As the global village rapidly expands understanding borderless leadership becomes a prerequisite for international success in this 21st century. Kraljevic brings her vast and unique worldly experiences to open your mind with practical treasures thoughtful how-to models and conceptual insights. Find out about the human fractal on your journey to becoming a borderless leader. — Lane Sloan Former President Shell Chemical Company USA Studies consistently show that international partnerships between organizations fail to generate expected results at a significant cost. The leading cause behind this failure is lack of trust among people at all levels within organizations. Borderless Leadership explores the disparity that exists between the ways that the West and other cultures conduct business. The book’s premise is that if one cannot control the events or circumstances one must learn how to control reactions to new environments. Using real-life examples the book illustrates how to build trust and rapport with business partners across borders and establish relationships that help businesses grow. The book is about achieving success with and through total strangers as you progress from awareness to understanding and from understanding to acquiring internalizing and applying new knowledge so you bring your approach to life up to date. Only then can you transform obstacles into unsuspected opportunities that will have a positive impact on your personal and business success. | Borderless Leadership Global Skills for Personal and Business Success

GBP 42.99
1