Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

34 results (0,19340 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

FinTech The Technology Driving Disruption in the Financial Services Industry

Information Security Management Handbook Volume 4

Information Security Management Handbook Volume 4

Every year in response to advancements in technology and new laws in different countries and regions there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Providing an up-to-date compilation of the fundamental skills techniques tools and understanding required of IT security professionals the Information Security Management Handbook Sixth Edition Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security adaptive threat defense Web 2. 0 virtualization data leakage and governance. New material also addresses risk management business continuity planning disaster recovery planning and cryptography. As the risks that threaten the security of our systems continue to evolve it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments new vulnerabilities and possible threats. | Information Security Management Handbook Volume 4

GBP 56.99
1

Business Analysis Requirements and Project Management A Guide for Computing Students

Business Analysis Requirements and Project Management A Guide for Computing Students

IT projects emerge from a business need. In practice software developers must accomplish two big things before an IT project can begin: find out what you need to do (i. e. analyse business requirements) and plan out how to do it (i. e. project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis Requirements and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS) the Gantt chart and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice. | Business Analysis Requirements and Project Management A Guide for Computing Students

GBP 48.99
1

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched new variants of it are already on the way. IT Security teams in businesses and corporations are struggling daily to fight off any cyberthreats that they are experiencing. On top of this they are also asked by their CIO or CISO to model what future Cyberattacks could potentially look like and ways as to how the lines of defenses can be further enhanced. IT Security teams are overburdened and are struggling to find ways in order to keep up with what they are being asked to do. Trying to model the cyberthreat landscape is a very laborious process because it takes a lot of time to analyze datasets from many intelligence feeds. What can be done to accomplish this Herculean task? The answer lies in Artificial Intelligence (AI). With AI an IT Security team can model what the future Cyberthreat landscape could potentially look like in just a matter of minutes. As a result this gives valuable time for them not only to fight off the threats that they are facing but to also come up with solutions for the variants that will come out later. Practical AI for Cybersecurity explores the ways and methods as to how AI can be used in cybersecurity with an emphasis upon its subcomponents of machine learning computer vision and neural networks. The book shows how AI can be used to help automate the routine and ordinary tasks that are encountered by both penetration testing and threat hunting teams. The result is that security professionals can spend more time finding and discovering unknown vulnerabilities and weaknesses that their systems are facing as well as be able to come up with solid recommendations as to how the systems can be patched up quickly.

GBP 44.99
1

Handbook of e-Business Security

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

This is an important book. Ethics is not an easy topic and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . Use this book as a practical resource an informative and educational source of material in developing expertise but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines professional journals and online blogs. These are synthesised into a blueprint which addresses in a practical manner the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15 became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world of what has happened and what might happen as digital technology continues to pervade.

GBP 52.99
1

The Complete Project Management Office Handbook

The Complete Project Management Office Handbook

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight control and support. Illustrating the implications of project management in today’s organizations The Complete Project Management Office Handbook Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs purpose and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists detailed process steps and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate quick-wins and early PMO-based accomplishments in their organization.

GBP 42.99
1

Wireless Crime and Forensic Investigation

Wireless Crime and Forensic Investigation

Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However based on the broad reach of wireless stopping someone from passively listening is just as critical. Intrusion detection systems firewalls and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. From short text messaging to war driving Wireless Crime and Forensic Investigation explores all aspects of wireless technology how it is used in daily life and how it will be used in the future. The book provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author's straightforward and easy to read style seamlessly integrates the topics of wireless security and computer forensics. He provides a solid understanding of modern wireless technologies wireless security techniques and wireless crime techniques as well as conducting forensic analysis on wireless devices and networks. Each chapter while part of a greater whole can stand on its own making researching wireless technologies security crime or forensics easy. With a problem space as big and complex as wireless proactive measures must be put in place and put in place immediately. To protect your organization you need to be well versed in the new technology sooner rather than later. You can pay now or you can pay later. Later always costs more. This book not only has all the information required to become proficient in wireless technology but also provides the information required for conducting a forensic analysis in a wireless environment.

GBP 56.99
1

Information Technology Control and Audit Fifth Edition

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives in-depth explanations of each topic and accurate practice questions. Each chapter includes exam tips that highlight key exam information hands-on exercises a summary that serves as a quick review and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily it also serves as an ideal on-the-job reference. Richard E. Cascarino MBA CIA CISM CFE CRMA is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa Europe the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA and the Association of Certified Fraud Examiners where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand author of the book Internal Auditing: An Integrated Approach now in its third edition. This book is extensively used as a university textbook worldwide. In addition he is the author of the Auditor's Guide to IT Auditing Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE the Ultimate Resource.

GBP 36.99
1

The Business Value of Software

The Business Value of Software

In business driving value is a key strategy and typically starts at the top of an organization. In today’s digital age driving software value is also an important and often overlooked key strategy. Executives and the corporate board need to expect the highest level of business value from the software the organization is developing buying and selling. In today’s digital transformation marketplace it is imperative that organizations start driving business value from software development initiatives. For many years the cost of software development challenged organizations with questions such as: How do we allocate software development costs?Should these costs be considered an overhead expense?Are we getting the most value possible for our investment? A fundamental problem has been built into these questions – the focus on cost. In almost every other part of the organization maximizing profit or in the case of a not-for-profit maximizing the funds available provides a clear focus with metrics to determine success or failure. In theory simply aligning software spending with the maximizing profit goals should be sufficient to avoid any questions about value for money. Unfortunately this alignment hasn’t turned out to be so simple and the questions persist particularly at the strategic or application portfolio level. In this book Michael D. S. Harris describes how a software business value culture—one where all stakeholders including technology and business—have a clear understanding of the goals and expected business value from software development. The book shows readers how they can transform software development from a cost or profit center to a business value center. Only a culture of software as a value center enables an organization to constantly maximize business value flow through software development. If your organization is starting to ask how it can change software from a cost-center to a value-center this book is for you. | The Business Value of Software

GBP 42.99
1

Software Testing A Craftsman’s Approach Fifth Edition

Principles of Mobile Computing and Communications

Healthcare Informatics Improving Efficiency through Technology Analytics and Management

Healthcare Informatics Improving Efficiency through Technology Analytics and Management

Healthcare Informatics: Improving Efficiency through Technology Analytics and Management supplies an understanding of the different types of healthcare service providers corresponding information technologies analytic methods and data issues that play a vital role in transforming the healthcare industry. All of these elements are reshaping the various activities such as workflow and processes of hospitals healthcare systems ACOs and patient analytics including hot spotting risk stratification and treatment effectiveness. A follow-up to Healthcare Informatics: Improving Efficiency and Productivity this latest book includes new content that examines the evolution of Big Data and how it is revolutionizing the healthcare industry. It presents strategies for achieving national goals for the meaningful use of health information technology and includes sound project management principles and case illustrations for technology roll-out such as Computer Physician Order Entry (CPOE) for optimal utilization. The book describes how to enhance process efficiency by linking technologies data and analytics with strategic initiatives to achieve success. It explains how to leverage data resources with analytics to enhance decision support for care providers through in-depth descriptions of the array of analytic methods that are used to create actionable information including Business Intelligence Six Sigma Data and Text Mining. | Healthcare Informatics Improving Efficiency through Technology Analytics and Management

GBP 44.99
1

The Total CISSP Exam Prep Book Practice Questions Answers and Test Taking Tips and Techniques

GBP 160.00
1

Healthcare Information Systems

Healthcare Information Systems

The move to manage medicine from a financial perspective i. e. managed care has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records mandated by government legislation such as HIPAA is bringing new technologies and processes into the healthcare arena. A universal medical record system and absolute patient portability is a definite possibility in the not too distant future. All of these issues beg for clear IT solutions. Healthcare Information Systems Second Edition approaches these challenges and opportunitites as pieces of a complex puzzle. It not only brings you up-to-date on the technology involved but also explains how that technology interrelates and affects healthcare organizations. The book gives you complete coverage of all aspects of information technology as it relates to the healthcare industry. In Healthcare Information Systems you will find:An overview of healthcare systemsTips on disaster planning and system securityImproving quality reducing risks and understanding costs An in-depth look into the HIPAA regulationsEMR and the data warehouseInformation on managing the healthcare communityA look at the changing organizationViews on telemedicine the Internet and emerging technologiesIdeas on using IT to deal with increasing government regulationIn addition the new edition has expanded coverage of HIPAA wireless networks and communications telemedicine and the increasing role of the Internet in all facets of healthcare. Healthcare Information Systems presents workable solutions to the real problems you will face both today and tomorrow.

GBP 56.99
1

Handbook of Data Management 1999 Edition

Handbook of Data Management 1999 Edition

Packed with dozens of no-nonsense chapters written by leading professionals Handbook of Data Management 1999 Edition shows your students how to design build and maintain high-performance high-availability databases in multiple environments. Handbook of Data Management 1999 Edition is the most comprehensive single-volume guide of its kind. The book provides the latest most innovative solutions for planning developing and running a powerful data management function. Here students will find exhaustive coverage of the range of data repositories (from legacy indexed files to object data bases and data warehouses) as well as details on everything from strategic planning to maximizing database performance. Completely revised and updated to reflect latebreaking technologies Handbook of Data Management 1999 Edition includes extensive case studies and straightforward descriptions showing students how to:implement Web-enabled data warehousesbuild multimedia databasesmaster data mininguse enterprise database modelingstay up-to-date with data conversion and migrationmaximize OLAP architectures and toolsHandbook of Data Management 1999 Edition also provides ongoing coverage of the latest tools and techniques regarding:organization for quality information systemsdata definitiondatabase design and managementobject and hybrid databasesand moreEach contributor to Handbook of Data Management 1999 Edition is an expert with first-hand experience in database and data management. These contributors provide a depth and breadth of coverage you and your students simply won't find anywhere else. Prepare your students for real-world business computing. Start them off with Handbook of Data Management 1999 Edition.

GBP 425.00
1

Enterprise Systems Integration

Enterprise Systems Integration

The convergence of knowledge technology and human performance which comprises today's enterprise allows creative business process design. Thus an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration. The book combines the perspectives knowledge and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today's enterprise. Collectively these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies you must successfully deploy ERP systems within budget and on time. In addition you must be able to integrate them into the rest of the enterprise. Still ERP software does not make up the full picture of today's enterprise. Legacy systems e-commerce and other Web-based systems client/server applications networks and communications systems data warehousing and integrated databases enter into the mix. Enterprise Systems Integration Second Edition paints a comprehensive picture of the technologies that comprise today's enterprise and shows you how to make them work together.

GBP 56.99
1

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

Software Project Management A Process-Driven Approach

Software Project Management A Process-Driven Approach

To build reliable industry-applicable software products large-scale software project groups must continuously improve software engineering processes to increase product quality facilitate cost reductions and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects Software Project Management: A Process-Driven Approach discusses human resources software engineering and technology to a level that exceeds most university-level courses on the subject. The book is organized into five parts. Part I defines project management with information on project and process specifics and choices the skills and experience needed the tools available and the human resources organization and management that brings it all together. Part II explores software life-cycle management. Part III tackles software engineering processes and the range of processing models devised by several domestic and international organizations. Part IV reveals the human side of project management with chapters on managing the team the suppliers and the customers themselves. Part V wraps up coverage with a look at the technology techniques templates and checklists that can help your project teams meet and exceed their goals. A running case study provides authoritative insight and insider information on the tools and techniques required to ensure product quality reduce costs and meet project deadlines. Praise for the book:This book presents all aspects of modern project management practices … includes a wealth of quality templates that practitioners can use to build their own tools. … equally useful to students and professionals alike. —Maqbool Patel PhD SVP/CTO/Partner Acuitec | Software Project Management A Process-Driven Approach

GBP 56.99
1

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Describing how to avoid common vendor traps Buying Supporting Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and ultimately better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts—which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition support and maintenanceExamines hardware and software warranty and support modelsConsiders finance and accounting issues for maintenance and supportSpells out technology product details Explains postwarranty support and maintenanceProvides the understanding to better negotiate with vendor sales teamsIllustrating the types of problems typically experienced during product use the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating. | Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

GBP 56.99
1

Android Security Attacks and Defenses

Android Security Attacks and Defenses

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture the book describes Android permissions including Manifest permissions to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. The authors describe how to write Android bots in JAVA and how to use reversing tools to decompile any Android application. They also cover the Android file system including import directories and files so readers can perform basic forensic analysis on file system and SD cards. The book includes access to a wealth of resources on its website: www. androidinsecurity. com. It explains how to crack SecureApp. apk discussed in the text and also makes the application available on its site. The book includes coverage of advanced topics such as reverse engineering and forensics mobile device pen-testing methodology malware analysis secure coding and hardening guidelines for Android. It also explains how to analyze security implications for Android mobile devices/applications and incorporate them into enterprise SDLC processes. The book’s site includes a resource section where readers can access downloads for applications tools created by users and sample applications created by the authors under the Resource section. Readers can easily download the files and use them in conjunction with the text wherever needed. Visit www. androidinsecurity. com for more information. | Android Security Attacks and Defenses

GBP 56.99
1

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

As we get caught up in the quagmire of Big Data and analytics it remains critically important to be able to reflect and apply insights experience and intuition to your decision-making process. In fact a recent research study at Tel Aviv University found that executives who relied on their intuition were 90 percent accurate in their decisions. Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making focuses on this intuition-based decision making. The book does not discount data-based decision making especially for decisions that are important and complex. Instead it emphasizes the importance of applying intuition gut feel spirituality experiential learning and insight as key factors in the executive decision-making process. Explaining how intuition is a product of past experience learning and ambient factors the text outlines methods that will help to enhance your data-driven decision-making process with intuition-based decision making. The first part of the book the Research Track presents contributions from leading researchers worldwide on the topic of intuition-based decision making as applied to management. In the second part of the book the Practice Track global executives and senior managers in industry government universities and not-for-profits present vignettes that illustrate how they have used their intuition in making key decisions. The research part of the book helps to frame the problem and address leading research in intuition-based decision making. The second part then explains how to apply these intuition-based concepts and issues in your own decision-making process. | Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

GBP 56.99
1

Database Modeling Step by Step

Database Modeling Step by Step

With the aim of simplifying relational database modeling Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach which is a more simplistic intuitive way to building relational database models. Going from basics to contemporary topics the book opens with relational data modeling and ends with BigData database modeling following a road map of the evolution in relational modeling and including brief introductions to data warehousing and BigData modeling. A break-down of the elements of a model explains what makes up a relational data model. This is followed by a comparison between standard normalization and a more simplistic intuitive approach to data modeling that a beginner can follow and understand. A brief chapter explains how to use the database programming language SQL (Structured Query Language) which reads from and writes to a relational database. SQL is fundamental to data modeling because it helps in understanding how the model is used. In addition to the relational model the last three chapters cover important modern world topics including denormalization that leads into data warehouses and BigData database modeling. The book explains how there is not much to logical data modeling in BigData databases because as they are often schema-less which means that BigData databases do not have schemas embedded into the database itself they have no metadata and thus not much of a logical data model. Online bonus chapters include a case study that covers relational data modeling and are available at the author’s web site: www. oracletroubleshooter. com/datamodeling. html | Database Modeling Step by Step

GBP 54.99
1