Vores kunder ligger øverst på Google

Google Ads Specialister fra Vestjylland

Vi er 100% dedikerede til Google Annoncering – Vi har mange års erfaring med Google Ads og den bruger vi på at opsætte, optimere & vedligeholde vores fantastiske kunders konti.

100% Specialiseret i Google Ads
Vi har mange års erfaring fra +300 konti
Ingen lange bindinger & evighedskontrakter
Jævnlig opfølgning med hver enkelt kunde
Vi tager din virksomhed seriøst

28 results (0,19464 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Handbook of Data Management 1999 Edition

Handbook of Data Management 1999 Edition

Packed with dozens of no-nonsense chapters written by leading professionals Handbook of Data Management 1999 Edition shows your students how to design build and maintain high-performance high-availability databases in multiple environments. Handbook of Data Management 1999 Edition is the most comprehensive single-volume guide of its kind. The book provides the latest most innovative solutions for planning developing and running a powerful data management function. Here students will find exhaustive coverage of the range of data repositories (from legacy indexed files to object data bases and data warehouses) as well as details on everything from strategic planning to maximizing database performance. Completely revised and updated to reflect latebreaking technologies Handbook of Data Management 1999 Edition includes extensive case studies and straightforward descriptions showing students how to:implement Web-enabled data warehousesbuild multimedia databasesmaster data mininguse enterprise database modelingstay up-to-date with data conversion and migrationmaximize OLAP architectures and toolsHandbook of Data Management 1999 Edition also provides ongoing coverage of the latest tools and techniques regarding:organization for quality information systemsdata definitiondatabase design and managementobject and hybrid databasesand moreEach contributor to Handbook of Data Management 1999 Edition is an expert with first-hand experience in database and data management. These contributors provide a depth and breadth of coverage you and your students simply won't find anywhere else. Prepare your students for real-world business computing. Start them off with Handbook of Data Management 1999 Edition.

GBP 425.00
1

Information Technology Control and Audit Fifth Edition

Software Testing A Craftsman’s Approach Fifth Edition

Enterprise Operations Management Handbook Second Edition

Risk Management Concepts and Guidance Fifth Edition

Risk Management Concepts and Guidance Fifth Edition

This new edition of Risk Management: Concepts and Guidance supplies a look at risk in light of current information yet remains grounded in the history of risk practice. Taking a holistic approach it examines risk as a blend of environmental programmatic and situational concerns. Supplying comprehensive coverage of risk management tools practices and protocols the book presents powerful techniques that can enhance organizational risk identification assessment and management—all within the project and program environments. Updated to reflect the Project Management Institute’s A Guide to the Project Management Body of Knowledge (PMBOK® Guide) Fifth Edition this edition is an ideal resource for those seeking Project Management Professional and Risk Management Professional certification. Emphasizing greater clarity on risk practice this edition maintains a focus on the ability to apply planned clairvoyance to peer into the future. The book begins by analyzing the various systems that can be used to apply risk management. It provides a fundamental introduction to the basics associated with particular techniques clarifying the essential concepts of risk and how they apply in projects. The second part of the book presents the specific techniques necessary to successfully implement the systems described in Part I. The text addresses project risk management from the project manager’s perspective. It adopts PMI’s perspective that risk is both a threat and an opportunity and it acknowledges that any effective risk management practice must look at the potential positive events that may befall a project as well as the negatives. Providing coverage of the concepts that many project management texts ignore such as the risk response matrix and risk models the book includes appendices filled with additional reference materials and supporting details that simplifying some of the most complex aspects of risk management. | Risk Management Concepts and Guidance Fifth Edition

GBP 44.99
1

Database Systems A Pragmatic Approach 3rd edition

Database Systems A Pragmatic Approach 3rd edition

This book provides a concise but comprehensive guide to the disciplines of database design construction implementation and management. Based on the authors’ professional experience in the software engineering and IT industries before making a career switch to academia the text stresses sound database design as a necessary precursor to successful development and administration of database systems. The discipline of database systems design and management is discussed within the context of the bigger picture of software engineering. Students are led to understand from the outset of the text that a database is a critical component of a software infrastructure and that proper database design and management is integral to the success of a software system. Additionally students are led to appreciate the huge value of a properly designed database to the success of a business enterprise. The text was written for three target audiences. It is suited for undergraduate students of computer science and related disciplines who are pursuing a course in database systems graduate students who are pursuing an introductory course to database and practicing software engineers and information technology (IT) professionals who need a quick reference on database design. Database Systems: A Pragmatic Approach 3rd Edition discusses concepts principles design implementation and management issues related to database systems. Each chapter is organized into brief reader-friendly conversational sections with itemization of salient points to be remembered. This pragmatic approach includes adequate treatment of database theory and practice based on strategies that have been tested proven and refined over several years. Features of the third edition include: Short paragraphs that express the salient aspects of each subject Bullet points itemizing important points for easy memorization Fully revised and updated diagrams and figures to illustrate concepts to enhance the student’s understanding Real-world examples Original methodologies applicable to database design Step-by-step student-friendly guidelines for solving generic database systems problems Opening chapter overviews and concluding chapter summaries Discussion of DBMS alternatives such as the Entity–Attributes–Value model NoSQL databases database-supporting frameworks and other burgeoning database technologies A chapter with sample assignment questions and case studies This textbook may be used as a one-semester or two-semester course in database systems augmented by a DBMS (preferably Oracle). After its usage students will come away with a firm grasp of the design development implementation and management of a database system. | Database Systems A Pragmatic Approach 3rd edition

GBP 59.99
1

Software Engineering A Methodical Approach 2nd Edition

Software Engineering A Methodical Approach 2nd Edition

Software Engineering: A Methodical Approach (Second Edition) provides a comprehensive but concise introduction to software engineering. It adopts a methodical approach to solving software engineering problems proven over several years of teaching with outstanding results. The book covers concepts principles design construction implementation and management issues of software engineering. Each chapter is organized systematically into brief reader-friendly sections with itemization of the important points to be remembered. Diagrams and illustrations also sum up the salient points to enhance learning. Additionally the book includes the author’s original methodologies that add clarity and creativity to the software engineering experience. New in the Second Edition are chapters on software engineering projects management support systems software engineering frameworks and patterns as a significant building block for the design and construction of contemporary software systems and emerging software engineering frontiers. The text starts with an introduction of software engineering and the role of the software engineer. The following chapters examine in-depth software analysis design development implementation and management. Covering object-oriented methodologies and the principles of object-oriented information engineering the book reinforces an object-oriented approach to the early phases of the software development life cycle. It covers various diagramming techniques and emphasizes object classification and object behavior. The text features comprehensive treatments of: Project management aids that are commonly used in software engineering An overview of the software design phase including a discussion of the software design process design strategies architectural design interface design database design and design and development standards User interface design Operations design Design considerations including system catalog product documentation user message management design for real-time software design for reuse system security and the agile effect Human resource management from a software engineering perspective Software economics Software implementation issues that range from operating environments to the marketing of software Software maintenance legacy systems and re-engineering This textbook can be used as a one-semester or two-semester course in software engineering augmented with an appropriate CASE or RAD tool. It emphasizes a practical methodical approach to software engineering avoiding an overkill of theoretical calculations where possible. The primary objective is to help students gain a solid grasp of the activities in the software development life cycle to be confident about taking on new software engineering projects. | Software Engineering A Methodical Approach 2nd Edition

GBP 59.99
1

Electronically Stored Information The Complete Guide to Management Understanding Acquisition Storage Search and Retrieval Second Edition

Configuration Management Second Edition Theory and Application for Engineers Managers and Practitioners

Requirements Engineering for Software and Systems

Requirements Engineering for Software and Systems

Solid requirements engineering has increasingly been recognized as the key to improved on-time and on-budget delivery of software and systems projects. New software tools are emerging that are empowering practicing engineers to improve their requirements engineering habits. However these tools are not usually easy to use without significant training. Requirements Engineering for Software and Systems Fourth Edition is intended to provide a comprehensive treatment of the theoretical and practical aspects of discovering analyzing modeling validating testing and writing requirements for systems of all kinds with an intentional focus on software-intensive systems. It brings into play a variety of formal methods social models and modern requirements writing techniques to be useful to practicing engineers. The book is intended for professional software engineers systems engineers and senior and graduate students of software or systems engineering. Since the first edition there have been made many changes and improvements to this textbook. Feedback from instructors students and corporate users was used to correct expand and improve the materials. The fourth edition features two newly added chapters: On Non-Functional Requirements and Requirements Engineering: Road Map to the Future. The latter provides a discussion on the relationship between requirements engineering and such emerging and disruptive technologies as Internet of Things Cloud Computing Blockchain Artificial Intelligence and Affective Computing. All chapters of the book were significantly expanded with new materials that keep the book relevant to current industrial practices. Readers will find expanded discussions on new elicitation techniques agile approaches (e. g. Kanpan SAFe and DEVOps) requirements tools requirements representation risk management approaches and functional size measurement methods. The fourth edition also has significant additions of vignettes exercises and references. Another new feature is scannable QR codes linked to sites containing updates tools videos and discussion forums to keep readers current with the dynamic field of requirements engineering.

GBP 59.99
1

The Complete Project Management Office Handbook

The Complete Project Management Office Handbook

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight control and support. Illustrating the implications of project management in today’s organizations The Complete Project Management Office Handbook Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs purpose and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists detailed process steps and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate quick-wins and early PMO-based accomplishments in their organization.

GBP 42.99
1

The Complete Guide for CPP Examination Preparation

GBP 31.99
1

Information Security Management Handbook Volume 4

Information Security Management Handbook Volume 4

Every year in response to advancements in technology and new laws in different countries and regions there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Providing an up-to-date compilation of the fundamental skills techniques tools and understanding required of IT security professionals the Information Security Management Handbook Sixth Edition Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security adaptive threat defense Web 2. 0 virtualization data leakage and governance. New material also addresses risk management business continuity planning disaster recovery planning and cryptography. As the risks that threaten the security of our systems continue to evolve it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments new vulnerabilities and possible threats. | Information Security Management Handbook Volume 4

GBP 56.99
1

Enterprise Systems Integration

Enterprise Systems Integration

The convergence of knowledge technology and human performance which comprises today's enterprise allows creative business process design. Thus an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration. The book combines the perspectives knowledge and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today's enterprise. Collectively these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies you must successfully deploy ERP systems within budget and on time. In addition you must be able to integrate them into the rest of the enterprise. Still ERP software does not make up the full picture of today's enterprise. Legacy systems e-commerce and other Web-based systems client/server applications networks and communications systems data warehousing and integrated databases enter into the mix. Enterprise Systems Integration Second Edition paints a comprehensive picture of the technologies that comprise today's enterprise and shows you how to make them work together.

GBP 56.99
1

Healthcare Information Systems

Healthcare Information Systems

The move to manage medicine from a financial perspective i. e. managed care has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records mandated by government legislation such as HIPAA is bringing new technologies and processes into the healthcare arena. A universal medical record system and absolute patient portability is a definite possibility in the not too distant future. All of these issues beg for clear IT solutions. Healthcare Information Systems Second Edition approaches these challenges and opportunitites as pieces of a complex puzzle. It not only brings you up-to-date on the technology involved but also explains how that technology interrelates and affects healthcare organizations. The book gives you complete coverage of all aspects of information technology as it relates to the healthcare industry. In Healthcare Information Systems you will find:An overview of healthcare systemsTips on disaster planning and system securityImproving quality reducing risks and understanding costs An in-depth look into the HIPAA regulationsEMR and the data warehouseInformation on managing the healthcare communityA look at the changing organizationViews on telemedicine the Internet and emerging technologiesIdeas on using IT to deal with increasing government regulationIn addition the new edition has expanded coverage of HIPAA wireless networks and communications telemedicine and the increasing role of the Internet in all facets of healthcare. Healthcare Information Systems presents workable solutions to the real problems you will face both today and tomorrow.

GBP 56.99
1

Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide

Transhumanism Artificial Intelligence the Cloud Robotics Electromagnetic Fields Intelligence Communities Rail Transportation Open-Source Intelligence (OSINT)—all this and more is discussed in Cyber Crime Investigator’s Field Guide Third Edition. Many excellent hardware and software products exist to protect our data communications systems but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws rules and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed along with information about how cyberspace works and the tools that reveal the who where what when why and how in the investigation of cybercrime. Features New focus area on rail transportation OSINT medical devices and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive the call arrival on site chain of custody and more This book offers a valuable Q&A by subject area an extensive overview of recommended reference materials and a detailed case study. Appendices highlight attack signatures Linux commands Cisco firewall commands port numbers and more. | Cyber Crime Investigator's Field Guide

GBP 56.99
1

Database Design Using Entity-Relationship Diagrams

Database Design Using Entity-Relationship Diagrams

Essential to database design entity-relationship (ER) diagrams are known for their usefulness in data modeling and mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams Third Edition database designers developers and students preparing to enter the field can quickly learn the ins and outs of data modeling through ER diagramming. Building on the success of the bestselling first and second editions this accessible text includes a new chapter on the relational model and functional dependencies. It also includes expanded chapters on Enhanced Entity-Relationship (EER) diagrams and reverse mapping. It uses cutting-edge case studies and examples to help readers master database development basics and defines ER and EER diagramming in terms of requirements (end user requests) and specifications (designer feedback to those requests) facilitating agile database development. This book Describes a step-by-step approach for producing an ER diagram and developing a relational database from it Contains exercises examples case studies bibliographies and summaries in each chapter Details the rules for mapping ER diagrams to relational databases Explains how to reverse engineer a relational database back to an entity-relationship model Includes grammar for the ER diagrams that can be presented back to the user facilitating agile database development The updated exercises and chapter summaries provide the real-world understanding needed to develop ER and EER diagrams map them to relational databases and test the resulting relational database. Complete with a wealth of additional exercises and examples throughout this edition should be a basic component of any database course. Its comprehensive nature and easy-to-navigate structure make it a resource that students and professionals will turn to throughout their careers.

GBP 56.99
1

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation

The Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. The author is an IT security and auditing expert and the book covers all five exam domains. This effective self-study system features chapter learning objectives in-depth explanations of each topic and accurate practice questions. Each chapter includes exam tips that highlight key exam information hands-on exercises a summary that serves as a quick review and end-of-chapter questions that simulate those on the actual exam. Designed to help candidates pass the CISA exam easily it also serves as an ideal on-the-job reference. Richard E. Cascarino MBA CIA CISM CFE CRMA is well known in international auditing. Richard is a principal of Richard Cascarino & Associates. He has over 31 years’ experience in audit training and consulting. He is a regular speaker at national and international conferences and has presented courses throughout Africa Europe the Middle East and the USA. Richard is a Past President of the Institute of Internal Auditors in South Africa was the founding Regional Director of the Southern African Region of the IIA-Inc. and is a member of ISACA and the Association of Certified Fraud Examiners where he is a member of the Board of Regents for Higher Education. Richard was Chairman of the Audit Committee of Gauteng cluster 2 (Premier's office Shared Services and Health) in Johannesburg and is currently the Chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa. Richard is also a visiting Lecturer at the University of the Witwatersrand author of the book Internal Auditing: An Integrated Approach now in its third edition. This book is extensively used as a university textbook worldwide. In addition he is the author of the Auditor's Guide to IT Auditing Second Edition and the book Corporate Fraud and Internal Control: A Framework for Prevention. He is also a contributor to all four editions of QFINANCE the Ultimate Resource.

GBP 36.99
1

A Guide to IT Contracting Checklists Tools and Techniques

A Guide to IT Contracting Checklists Tools and Techniques

Since A Guide to IT Contracting: Checklists Tools and Techniques first published several alarming trends have developed in the technology contracting industry. These trends include: The Dawn of the As-Is Technology Product The Ever-Changing Product Where in the World Is My Data? To meet these challenges the Second Edition helps business managers and lawyers explore alternate solutions from other vendors conduct simultaneous negotiations with other vendors and generally ensure prospective vendors understand they can lose the deal if they refuse to act reasonably. Distilling the most critical business and legal lessons learned through the author’s decades of legal experience drafting and negotiating IT-related agreements this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement each chapter includes a checklist of essential terms a brief summary of what the agreement is intended to do and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes a complete glossary that defines key legal business and technical terms Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors. | A Guide to IT Contracting Checklists Tools and Techniques

GBP 44.99
1

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

Successful security professionals have had to modify the process of responding to new threats in the high-profile ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists forms questionnaires and sample assessments. Presents Case Studies and Examples of all Risk Management ComponentsBased on the seminars of information security expert Tom Peltier this volume provides the processes that you can easily employ in your organization to assess risk. Answers such FAQs as:Why should a risk analysis be conducted?Who should review the results?How is the success measured?Always conscious of the bottom line Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization—and it’s not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.

GBP 56.99
1

The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects but in the complex relationships inside the operating systems. The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation addresses this complexity. Written from the perspective of the designer of an operating system this book tackles important issues and practical problems on how to understand an operating system completely and systematically. It removes the mystery revealing operating system design guidelines explaining the BIOS code directly related to the operating system and simplifying the relationships and guiding ideology behind it all. Based on the Source Code of a Real Multi-Process Operating System Using the 0. 11 edition source code as a representation of the Linux basic design the book illustrates the real states of an operating system in actual operations. It provides a complete systematic analysis of the operating system source code as well as a direct and complete understanding of the real operating system run-time structure. The author includes run-time memory structure diagrams and an accompanying essay to help readers grasp the dynamics behind Linux and similar software systems. Identifies through diagrams the location of the key operating system data structures that lie in the memory Indicates through diagrams the current operating status information which helps users understand the interrupt state and left time slice of processes Examines the relationship between process and memory memory and file file and process and the kernel Explores the essential association preparation and transition which is the vital part of operating system Develop a System of Your Own This text offers an in-dep | The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

GBP 170.00
1

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management Second Edition provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective. Because of the critical importance of cybersecurity in today’s enterprise networks security-related issues are explained throughout the book and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests such as CompTIA and CISSP Takes advantage of actual cases examples industry products and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots figures and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook this book includes hands-on assignments based on the Packet Tracer program an excellent network design and simulation tool from Cisco. Instructor materials also are provided including PowerPoint slides solutions for exercise questions and additional chapter questions from which to build tests.

GBP 44.99
1

Portfolio Management Delivering on Strategy

Portfolio Management Delivering on Strategy

Portfolio management is becoming the ‘must have’ for organizations to prosper and survive in this decade and beyond. No longer can the organizational focus be one of following best and repeatable practices as resource limitations mean only those programs projects and operational work that add business value can and should be pursued. Executives are focusing on strategic ability and managing complexity which can only be done through a disciplined portfolio process in ensuring the best mix of programs projects and operational work is under way. In turn the portfolio is constantly in flux as difficult decisions are made if a project for example is no longer contributing to business value and providing benefits and should be terminated to reallocate resources to one of higher priority. Commitment to this difficult approach is necessary at all levels and communication is required so everyone knows how their work contributes to the organization’s strategic goals and objectives. Portfolio Management: Delivering on Strategy Second Edition focuses on the benefits of portfolio management to the organization. Its goal is to provide senior executives a view on how portfolio management can deliver organizational strategy. The emphasis is on the specific aspects within the portfolio management discipline and how each aspect should be managed from a business perspective and not necessarily from a portfolio management perspective. Highlights of the book include: Agile portfolio management Delivering organizational value Portfolio management and uncertainty Portfolio governance Marketing a portfolio Portfolio management success Starting with a review of the project portfolio concept and its development this book is a reference for executives and practitioners in the field as well as a students and researchers studying portfolio management. | Portfolio Management Delivering on Strategy

GBP 44.99
1

Vulnerability Management

Vulnerability Management

Vulnerability management (VM) has been around for millennia. Cities tribes nations and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today we identify vulnerabilities in our software systems infrastructure and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman’s more than three decades of multinational experience the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps especially those that are inherent in a larger organization. Completely updated the second edition provides a fundamental understanding of technology risks—including a new chapter on cloud vulnerabilities and risk management—from an interloper’s perspective. This book is a guide for security practitioners security or network engineers security officers and CIOs seeking understanding of VM and its role in the organization. To serve various audiences it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy although serving the executive well provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

GBP 44.99
1

Leading Megaprojects A Tailored Approach

Leading Megaprojects A Tailored Approach

The performance of megaprojects is questionable and a large percentage of them fail in one dimension or another. The challenges that contribute to these failures are known. Then why do these projects still fail at a high rate? Leading Megaprojects: A Tailored Approach examines the challenges facing megaprojects and more importantly successes in delivering megaprojects. To close the performance gaps in megaproject deliveries the book presents a customizable model that professionals and organizations can use to increase the chance of successful project delivery. To illustrate the model it uses examples and case studies primarily from capital projects with engineering and construction components. The book also explains how the approach can be applied to all projects regardless of industry or domain. The book emphasizes the role of leadership because it takes the point of view that megaprojects cannot be successful without great leadership due to their massive size complexity number of parties and stakeholders involved and cost among other vital factors. Leaders can define the path for a megaproject to guide seasoned managers and project managers to successful closure. The tailored approach is based on a stage-gate project life cycle model which covers projects from concept to success. However it is not limited to a purist form of traditional project management. It is a tailored methodological approach with an emphasis on leading the work end-to-end at the project level along with the management of every stage of the project. Also it presents the integration of the business product delivery and operations management into a cohesive approach. The book concludes with an in-depth simulation showing how the model is can be tailored to deliver a megaproject successfully. | Leading Megaprojects A Tailored Approach

GBP 44.99
1