Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

156 results (0,24905 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Portfolio Management Delivering on Strategy

Portfolio Management Delivering on Strategy

Portfolio management is becoming the ‘must have’ for organizations to prosper and survive in this decade and beyond. No longer can the organizational focus be one of following best and repeatable practices as resource limitations mean only those programs projects and operational work that add business value can and should be pursued. Executives are focusing on strategic ability and managing complexity which can only be done through a disciplined portfolio process in ensuring the best mix of programs projects and operational work is under way. In turn the portfolio is constantly in flux as difficult decisions are made if a project for example is no longer contributing to business value and providing benefits and should be terminated to reallocate resources to one of higher priority. Commitment to this difficult approach is necessary at all levels and communication is required so everyone knows how their work contributes to the organization’s strategic goals and objectives. Portfolio Management: Delivering on Strategy Second Edition focuses on the benefits of portfolio management to the organization. Its goal is to provide senior executives a view on how portfolio management can deliver organizational strategy. The emphasis is on the specific aspects within the portfolio management discipline and how each aspect should be managed from a business perspective and not necessarily from a portfolio management perspective. Highlights of the book include: Agile portfolio management Delivering organizational value Portfolio management and uncertainty Portfolio governance Marketing a portfolio Portfolio management success Starting with a review of the project portfolio concept and its development this book is a reference for executives and practitioners in the field as well as a students and researchers studying portfolio management. | Portfolio Management Delivering on Strategy

GBP 44.99
1

Software Engineering with UML

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

With an ever-increasing amount of information on the web it is critical to understand the pedigree quality and accuracy of your data. Using provenance you can ascertain the quality of data based on its ancestral data and derivations track back to sources of errors allow automatic re-enactment of derivations to update data and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes products tools and standards for secure data management secure Semantic Web secure web services and secure cloud computing.

GBP 56.99
1

Oracle Database Programming with Java Ideas Designs and Implementations

Oracle Database Programming with Java Ideas Designs and Implementations

Databases have become an integral part of modern life. Today’s society is an information-driven society and database technology has a direct impact on all aspects of daily life. Decisions are routinely made by organizations based on the information collected and stored in databases. Database management systems such as Oracle are crucial to apply data in industrial or commercial systems. Equally crucial is a graphical user interface (GUI) to enable users to access and manipulate data in databases. The Apache NetBeans IDE with Java is an ideal candidate for developing a GUI with programming functionality. Oracle Database Programming with Java: Ideas Designs and Implementations is written for college students and software programmers who want to develop practical and commercial database programming with Java and relational databases such as Oracle Database XE 18c. The book details practical considerations and applications of database programming with Java and is filled with authentic examples as well as detailed explanations. Advanced topics in Java Web like Java Web Applications and Java Web Services are covered in real project examples to show how to handle the database programming issues in the Apache NetBeans IDE environment. This book features: A real sample database CSE _ DEPT which is built with Oracle SQL Developer provided and used throughout the book Step by step detailed illustrations and descriptions of how to design and build a practical relational database Fundamental and advanced Java database programming techniques practical to both beginning students and experienced programmers Updated Java desktop and Web database programming techniques such as Java Enterprise Edition 7 JavaServer Pages JavaServer Faces Enterprise Java Beans Web applications and Web services including GlassFish and Tomcat Web servers More than 30 real database programming projects with detailed illustrations Actual JDBC APIs and JDBC drivers along with code explanations Homework and selected solutions for each chapter to strengthen and improve students’ learning and understanding of the topics they have studied | Oracle Database Programming with Java Ideas Designs and Implementations

GBP 82.99
1

Modeling Software with Finite State Machines A Practical Approach

Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques

Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques

A company with effective cost reduction activities in place will be better positioned to adapt to shifting economic conditions. In fact it can make the difference between organizations that thrive and those that simply survive during times of economic uncertainty. Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques covers the methods and techniques currently available for lowering the costs of products processes and services. Describing why cost reductions can be just as powerful as revenue increases the book arms readers with the understanding required to select the best solution for their company’s culture and capabilities. It emphasizes home-grown techniques that do not require the implementation of any new methodologies—making it easy to apply them in any organization. The authors explain how to reduce costs through traditional Lean methods and Lean Six Sigma. They also present Six Sigma cost savings techniques from Manufacturing Six Sigma Services Six Sigma and Design for Six Sigma. The book also presents optimization techniques from operations research methods design experiment and engineering process control. Helping you determine what your organization’s value proposition is the text explains how to improve on the existing proposition and suggests a range of tools to help you achieve this goal. The tools and techniques presented vary in complexity and capability and most chapters include a rubric at the start to help readers determine the levels of competence required to perform the tasks outlined in that chapter.

GBP 56.99
1

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization: Fundamentals Algorithms and Applications introduces state-of-the-art extremal optimization (EO) and modified EO (MEO) solutions from fundamentals methodologies and algorithms to applications based on numerous classic publications and the authors’ recent original research results. It promotes the movement of EO from academic study to practical applications. The book covers four aspects beginning with a general review of real-world optimization problems and popular solutions with a focus on computational complexity such as NP-hard and the phase transitions occurring on the search landscape. Next it introduces computational extremal dynamics and its applications in EO from principles mechanisms and algorithms to the experiments on some benchmark problems such as TSP spin glass Max-SAT (maximum satisfiability) and graph partition. It then presents studies on the fundamental features of search dynamics and mechanisms in EO with a focus on self-organized optimization evolutionary probability distribution and structure features (e. g. backbones) which are based on the authors’ recent research results. Finally it discusses applications of EO and MEO in multiobjective optimization systems modeling intelligent control and production scheduling. The authors present the advanced features of EO in solving NP-hard problems through problem formulation algorithms and simulation studies on popular benchmarks and industrial applications. They also focus on the development of MEO and its applications. This book can be used as a reference for graduate students research developers and practical engineers who work on developing optimization solutions for those complex systems with hardness that cannot be solved with mathematical optimization or other computational intelligence such as evolutionary computations. | Extremal Optimization Fundamentals Algorithms and Applications

GBP 42.99
1

Securing IoT in Industry 4.0 Applications with Blockchain

Securing IoT in Industry 4.0 Applications with Blockchain

The Industry 4. 0 revolution is changing the world around us. Artificial intelligence and machine learning automation and robotics big data Internet of Things augmented reality virtual reality and creativity are the tools of Industry 4. 0. Improved collaboration is seen between smart systems and humans which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4. 0 Applications with Blockchain examines the role of IoT in Industry 4. 0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications architecture technologies tools and programming languages. It then examines blockchain and cybersecurity as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4. 0 systems The evolution of the Industrial Internet of Things (IIoT) its proliferation and market share and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT) including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications including smart contracts transferring financial instruments and Public Key Infrastructure An overview of the structure and working of a blockchain including the types evolution benefits and applications of blockchain to industries A framework of technologies designed to shield networks computers and data from malware vulnerabilities and unauthorized activities An explanation of the automation system employed in industries along with its classification functionality flexibility limitations and applications

GBP 115.00
1

Intelligent Data Analytics IoT and Blockchain

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

Data Center Storage Cost-Effective Strategies Implementation and Management

Data Center Storage Cost-Effective Strategies Implementation and Management

We overspend on data center storage … yet we fall short of business requirements. It's not about the technologies. It's about the proper application of technologies to deliver storage services efficiently and affordably. It’s about meeting business requirements dependent on data center storage. Spend less deliver more. Data Center Storage: Cost-Effective Strategies Implementation and Management provides an industry insider’s insight on how to properly scope plan evaluate and implement storage technologies to maximize performance capacity reliability and power savings. It provides business and use-case focused coverage of storage technology including storage area networks (SAN) capacity-optimized drives and solid-state drives. It offers key insights on financially responsible spending for data center storage. Delivered in accessible language the book starts with a discussion of the business merits of replacing direct attached compartmentalized storage with consolidated SAN-attached storage. The author advises on the use of service level applications (SLAs) as a tool to drive business unit collaboration with IT and prioritize those actions that impact productivity and profit from those that are less critical. This business guide to applied technologies disassembles big problems into digestible segments to help you understand quantify and fix any problems that arise as you work towards meeting your growing storage needs. The book builds on the consolidation and SLA driven approach to take advantage of the compelling benefits and potential savings of managed hosting and cloud storage. | Data Center Storage Cost-Effective Strategies Implementation and Management

GBP 56.99
1

FinTech The Technology Driving Disruption in the Financial Services Industry

Project Management in Small and Medium-Sized Enterprises A European Perspective

Project Management in Small and Medium-Sized Enterprises A European Perspective

The growing importance of projects in organizations combined with difficulties in their implementation is accompanied by the need for professional knowledge in the field of project management. It results from the complexity of project management problems and the difficulty of knowledge that must be applied. However surprisingly little is known about this topic especially in the context of European small and medium-sized enterprises (SMEs). Project Management in Small and Medium-Sized Enterprises: A European Perspective attempts to fill this specific research gap. The book analyses the process of managing projects being implemented by small and medium-sized firms from Europe identifies organizational processes and verifies which elements of these processes require improvement. It concentrates on issues around the multifaceted characteristics of project management with particular emphasis on the process of managing European small and medium enterprises. The book is the result of many years of empirical research and consists of two main parts: A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy. A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy Verification and development of such model procedures in the management of projects so that the SME enterprises’ functioning will be efficient and effective. There is a close relationship between the two parts. The theoretical part is the foundation on which practical considerations are later carried out. Integrating theoretical and practical issues the book introduces new content to the literature and has the practical value of indicating how to manage projects in SMEs in the European Union. It also examines the decision-making processes related to project management in these organizations. | Project Management in Small and Medium-Sized Enterprises A European Perspective

GBP 89.99
1

Ethics in IT Outsourcing

Ethics in IT Outsourcing

In IT divisions and organizations the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro macro and corporate level this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals corporations and society Outlines a new corporate capability—the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author’s decades of experience working with large firms in IT and outsourcing this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal corporate and societal decision-making. Readers are invited to participate in the growing dialog of business ethics and IT outsourcing ethics in particular at the author’s website: www. ethicsinit. com

GBP 54.99
1

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

Most academics still wrestle with the publish or perish phenomenon. Based on Dr. Liebowitz’s 25 years serving as the editor-in-chief of a leading international journal along with insights from some of the most knowledgeable journal editors this book shares key lessons learned to help new professors doctoral students and practitioner–scholars increase their chances of being published in selective refereed international journals. It focuses on the key practices needed to ensure journal publication with interesting cases and helpful tips sprinkled throughout the book. A Guide to Publishing for Academics provides useful knowledge from leading journal editors of both traditional and online journals as well as various tiers of journals. Although the focus is mainly in the business and IT areas much of the guidance provided can cross into other fields. The book contains interesting vignettes and do’s and don’ts so that potential authors can understand what goes on behind the scenes once the manuscript arrives on the journal editor’s desk. The book provides constructive guidance on choosing what and where to publish what to consider when writing a title for a paper how to prepare and submit journal manuscripts and how to position a paper for publication. It also has valuable information for current and future journal editors including models of editing and editorial boards editorial coaching advice and editing smart practices. With the information in this book the next generation of academics and practitioner–scholars will be well equipped to overcome the publish or perish phenomenon. | A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

GBP 56.99
1

Enterprise Agility A Practical Guide to Agile Business Management

Enterprise Agility A Practical Guide to Agile Business Management

Despite the astonishing technological developments in our times it is surprising how little has changed in the way organizations are structured and managed. However organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility including applied processes lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution project agility and describes how waterfall project management is transformed into scrum which can have positive effects on project timelines scope and budget as well as team motivation. The second phase of agility organizational agility is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility including structures roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally the latest phase enterprise agility transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales marketing HR finance etc. ) and by presenting the positive impact generated on the company’s overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author’s over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility. | Enterprise Agility A Practical Guide to Agile Business Management

GBP 44.99
1

Requirements Engineering for Software and Systems

Requirements Engineering for Software and Systems

Solid requirements engineering has increasingly been recognized as the key to improved on-time and on-budget delivery of software and systems projects. New software tools are emerging that are empowering practicing engineers to improve their requirements engineering habits. However these tools are not usually easy to use without significant training. Requirements Engineering for Software and Systems Fourth Edition is intended to provide a comprehensive treatment of the theoretical and practical aspects of discovering analyzing modeling validating testing and writing requirements for systems of all kinds with an intentional focus on software-intensive systems. It brings into play a variety of formal methods social models and modern requirements writing techniques to be useful to practicing engineers. The book is intended for professional software engineers systems engineers and senior and graduate students of software or systems engineering. Since the first edition there have been made many changes and improvements to this textbook. Feedback from instructors students and corporate users was used to correct expand and improve the materials. The fourth edition features two newly added chapters: On Non-Functional Requirements and Requirements Engineering: Road Map to the Future. The latter provides a discussion on the relationship between requirements engineering and such emerging and disruptive technologies as Internet of Things Cloud Computing Blockchain Artificial Intelligence and Affective Computing. All chapters of the book were significantly expanded with new materials that keep the book relevant to current industrial practices. Readers will find expanded discussions on new elicitation techniques agile approaches (e. g. Kanpan SAFe and DEVOps) requirements tools requirements representation risk management approaches and functional size measurement methods. The fourth edition also has significant additions of vignettes exercises and references. Another new feature is scannable QR codes linked to sites containing updates tools videos and discussion forums to keep readers current with the dynamic field of requirements engineering.

GBP 59.99
1

The Internet of Things Enabling Technologies Platforms and Use Cases

The Internet of Things Enabling Technologies Platforms and Use Cases

As more and more devices become interconnected through the Internet of Things (IoT) there is an even greater need for this book which explains the technology the internetworking and applications that are making IoT an everyday reality. The book begins with a discussion of IoT ecosystems and the technology that enables them which includes:Wireless Infrastructure and Service Discovery Protocols Integration Technologies and Tools Application and Analytics Enablement PlatformsA chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection storage translation real-time processing mining and analysis all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing. The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices mobile technology wearables RFID sensors and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements promising applications and roles of cloud computing and data analytics. The book also examines smart homes smart cities and smart governments. The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter. | The Internet of Things Enabling Technologies Platforms and Use Cases

GBP 44.99
1

Software Development Patterns and Antipatterns

Software Development Patterns and Antipatterns

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10 000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies breach of contract lawsuits and the literature on major software failures. This section considers the factors involved with cost overruns schedule delays canceled projects poor quality and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section’s first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence as well as measures that can prove excellence to C-level executives and with continuing excellence through the maintenance cycle as well as for software development.

GBP 48.99
1

Vulnerability Management

Vulnerability Management

Vulnerability management (VM) has been around for millennia. Cities tribes nations and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today we identify vulnerabilities in our software systems infrastructure and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps especially those that are inherent in a larger organization. Completely updated the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective. This book is a guide for security practitioners security or network engineers security officers and CIOs seeking understanding of VM and its role in the organization. To serve various audiences it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy although serving the executive well provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

GBP 44.99
1

Bankers Like Us Dispatches from an Industry in Transition

Bankers Like Us Dispatches from an Industry in Transition

This book will resonate with anyone no matter where you reside on this journey whether newbie or old guard. If you want to be part of this change you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate then I suggest you think about stepping aside. — Curt Queyrouze President Coastal Community Bank The world is going digital and so is banking—in fits starts and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about not by external heroes and saviours not by a generation yet to be born but people just like us. People who understand the industry and its quirks. Bankers who have the grit determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a ‘this is who we are’ piece including the author’s trench credentials. It then presents an overview of corporate culture (this is what we deal with and a few ideas on how to handle it) as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds and a hopeful look-ahead on what a team of principled dedicated folks can do despite everything. | Bankers Like Us Dispatches from an Industry in Transition

GBP 29.99
1

Practical Data Mining Techniques and Applications

Practical Data Mining Techniques and Applications

Data mining techniques and algorithms are extensively used to build real-world applications. A practical approach can be applied to data mining techniques to build applications. Once deployed an application enables the developers to work on the users’ goals and mold the algorithms with respect to users’ perspectives. Practical Data Mining Techniques and Applications focuses on various concepts related to data mining and how these techniques can be used to develop and deploy applications. The book provides a systematic composition of fundamental concepts of data mining blended with practical applications. The aim of this book is to provide access to practical data mining applications and techniques to help readers gain an understanding of data mining in practice. Readers also learn how relevant techniques and algorithms are applied to solve problems and to provide solutions to real-world applications in different domains. This book can help academicians to extend their knowledge of the field as well as their understanding of applications based on different techniques to gain greater insight. It can also help researchers with real-world applications by diving deeper into the domain. Computing science students application developers and business professionals may also benefit from this examination of applied data science techniques. By highlighting an overall picture of the field introducing various mining techniques and focusing on different applications and research directions using these methods this book can motivate discussions among academics researchers professionals and students to exchange and develop their views regarding the dynamic field that is data mining.

GBP 150.00
1

Software Project Management A Process-Driven Approach

Software Project Management A Process-Driven Approach

To build reliable industry-applicable software products large-scale software project groups must continuously improve software engineering processes to increase product quality facilitate cost reductions and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects Software Project Management: A Process-Driven Approach discusses human resources software engineering and technology to a level that exceeds most university-level courses on the subject. The book is organized into five parts. Part I defines project management with information on project and process specifics and choices the skills and experience needed the tools available and the human resources organization and management that brings it all together. Part II explores software life-cycle management. Part III tackles software engineering processes and the range of processing models devised by several domestic and international organizations. Part IV reveals the human side of project management with chapters on managing the team the suppliers and the customers themselves. Part V wraps up coverage with a look at the technology techniques templates and checklists that can help your project teams meet and exceed their goals. A running case study provides authoritative insight and insider information on the tools and techniques required to ensure product quality reduce costs and meet project deadlines. Praise for the book:This book presents all aspects of modern project management practices … includes a wealth of quality templates that practitioners can use to build their own tools. … equally useful to students and professionals alike. —Maqbool Patel PhD SVP/CTO/Partner Acuitec | Software Project Management A Process-Driven Approach

GBP 56.99
1

Packet Forwarding Technologies