39 results (0,21185 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Information Technology Control and Audit Fifth Edition

Human–Computer Interaction Fundamentals and Practice

Human–Computer Interaction Fundamentals and Practice

Although life continues to become increasingly embedded with interactive computing services that make our lives easier human-computer interaction (HCI) has not been given the attention it deserves in the education of software developers at the undergraduate level. Most entry-level HCI textbooks are structured around high-level concepts and are not directly tied to the software development process. Filling this need Human-Computer Interaction: Fundamentals and Practice supplies an accessible introduction to the entire cycle of HCI design and implementation—explaining the core HCI concepts behind each step. Designed around the overall development cycle for an interactive software product it starts off by covering the fundamentals behind HCI. The text then quickly goes into the application of this knowledge. It covers the forming of HCI requirements modeling the interaction process designing the interface implementing the resulting design and evaluating the implemented product. Although this textbook is suitable for undergraduate students of computer science and information technology it is accessible enough to be understood by those with minimal programming knowledge. Supplying readers with a firm foundation in the main HCI principles the book provides a working knowledge of HCI-oriented software development. The core content of this book is based on the introductory HCI course (advanced junior or senior-level undergraduate) that the author has been teaching at Korea University for the past eight years. The book includes access to PowerPoint lecture slides as well as source code for the example applications used throughout the text. | Human–Computer Interaction Fundamentals and Practice

GBP 42.99
1

Project Management Lessons Learned A Continuous Process Improvement Framework

Risk Analytics Data-Driven Decisions under Uncertainty

Risk Analytics Data-Driven Decisions under Uncertainty

The 2022 World Economic Forum surveyed 1 000 experts and leaders who indicated their risk perception that the earth’s conditions for humans are a main concern in the next 10 years. This means environmental risks are a priority to study in a formal way. At the same time innovation risks are present in theminds of leaders newknowledge brings new risk and the adaptation and adoption of risk knowledge is required to better understand the causes and effects can have on technological risks. These opportunities require not only adopting new ways of managing and controlling emerging processes for society and business but also adapting organizations to changes and managing new risks. Risk Analytics: Data-Driven Decisions Under Uncertainty introduces a way to analyze and design a risk analytics system (RAS) that integrates multiple approaches to risk analytics to deal with diverse types of data and problems. A risk analytics system is a hybrid system where human and artificial intelligence interact with a data gathering and selection process that uses multiple sources to the delivery of guidelines to make decisions that include humans and machines. The RAS system is an integration of components such as data architecture with diverse data and a risk analytics process and modeling process to obtain knowledge and then determine actions through the new knowledge that was obtained. The use of data analytics is not only connected to risk modeling and its implementation but also to the development of the actionable knowledge that can be represented by text in documents to define and share explicit knowledge and guidelines in the organization for strategy implementation. This book moves from a review of data to the concepts of a RAS. It reviews RAS system components required to support the creation of competitive advantage in organizations through risk analytics. Written for executives analytics professionals risk management professionals strategy professionals and postgraduate students this book shows a way to implement the analytics process to develop a risk management practice that creates an adaptive competitive advantage under uncertainty. | Risk Analytics Data-Driven Decisions under Uncertainty

GBP 74.99
1

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management Second Edition provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective. Because of the critical importance of cybersecurity in today’s enterprise networks security-related issues are explained throughout the book and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests such as CompTIA and CISSP Takes advantage of actual cases examples industry products and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots figures and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook this book includes hands-on assignments based on the Packet Tracer program an excellent network design and simulation tool from Cisco. Instructor materials also are provided including PowerPoint slides solutions for exercise questions and additional chapter questions from which to build tests.

GBP 44.99
1

Cybertax Managing the Risks and Results

Cybertax Managing the Risks and Results

Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations The book outlines questions and leadership techniques to gain the relevant information to manage cybersecurity threats and risk. The book enables executives to: Understand cybersecurity risk from a business perspective Understand cybersecurity risk as a tax (cybertax) Understand the cybersecurity threat landscape Drive business-driven questions and metrics for managing cybersecurity risk Understand the Seven C’s for managing cybersecurity risk Governing the cybersecurity function is as important as governing finance sales human resources and other key leadership responsibilities Executive leadership needs to manage cybersecurity risk like they manage other critical risks such as sales finances resources and competition. This book puts managing cybersecurity risk on an even plane with these other significant risks that demand leaderships’ attention. The authors strive to demystify cybersecurity to bridge the chasm from the top-of-the-house to the cybersecurity function. This book delivers actionable advice and metrics to measure and evaluate cybersecurity effectiveness across your organization. | Cybertax Managing the Risks and Results

GBP 14.99
1

Social Media and Crowdsourcing Application and Analytics

Social Media and Crowdsourcing Application and Analytics

Social media and crowdsourcing are important tools for solving complex problems. The benefit of crowdsourcing is that it leverages the power of human intelligence cost effectively and with less time. Social Media and Crowdsourcing: Application and Analytics examines the concepts of social media and crowdsourcing as well as their analytical aspects. It explores how these technologies contribute to the real world and examines such applications as promoting social good agriculture healthcare tourism disaster management education crime control and cultural heritage. The book also looks at ethical issues in crowdsourcing and future scenarios and challenges for policy. Highlights of the book include the following: A crowdsourcing application in agriculture Crowdsourcing outline for a contemporary aided medicinal backup system Crowdsourcing-based recommendation in the tourism industry Crowdsourcing mechanisms for reviving cultural heritage Expanding the overarching concept of utilizing social media and crowdsourcing to solve various real-life problems this book discusses how to bring together the wisdom of crowds for various decision-making problems in agriculture disaster management and healthcare. It addresses the various ethical issues arising out of various crowdsourcing-based applications. It puts forward diverse methodologies to involve crowdsourcing in education to implement new strategies to enhance learning outcomes. This book also addresses various problem-solving techniques for recommender applications in the travel and tourism industry. Providing a systematic discussion of the many sectors using crowdsourcing as an essential part of social innovation this book is a theoretical and methodological look at the application of social media. | Social Media and Crowdsourcing Application and Analytics

GBP 89.99
1

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

The DataOps Revolution Delivering the Data-Driven Enterprise

The DataOps Revolution Delivering the Data-Driven Enterprise

DataOps is a new way of delivering data and analytics that is proven to get results. It enables IT and users to collaborate in the delivery of solutions that help organisations to embrace a data-driven culture. The DataOps Revolution: Delivering the Data-Driven Enterprise is a narrative about real world issues involved in using DataOps to make data-driven decisions in modern organisations. The book is built around real delivery examples based on the author’s own experience and lays out principles and a methodology for business success using DataOps. Presenting practical design patterns and DataOps approaches the book shows how DataOps projects are run and presents the benefits of using DataOps to implement data solutions. Best practices are introduced in this book through the telling of a story which relates how a lead manager must find a way through complexity to turn an organisation around. This narrative vividly illustrates DataOps in action enabling readers to incorporate best practices into everyday projects. The book tells the story of an embattled CIO who turns to a new and untested project manager charged with a wide remit to roll out DataOps techniques to an entire organisation. It illustrates a different approach to addressing the challenges in bridging the gap between IT and the business. The approach presented in this story lines up to the six IMPACT pillars of the DataOps model that Kinaesis (www. kinaesis. com) has been using through its consultants to deliver successful projects and turn around failing deliveries. The pillars help to organise thinking and structure an approach to project delivery. The pillars are broken down and translated into steps that can be applied to real-world projects that can deliver satisfaction and fulfillment to customers and project team members. | The DataOps Revolution Delivering the Data-Driven Enterprise

GBP 31.99
1

Agile Software Development

The Human Change Management Body of Knowledge (HCMBOK )

The Human Change Management Body of Knowledge (HCMBOK )

I am happy to recommend this work. I believe in the principles presented in it and identify with its context. Due to the lack of knowledge on the subject in the market it is a topic that must be made known. The book should be in the library of all project and change managers. — Paul Dinsmore PMI FellowEvery manager should integrate HCMBOK® practices into their project management methodology in order to fully develop their work. This book addresses a simple and practical way that the critical component in organizational change management can be applied to projects of all kinds: the human factor. — Bruno Machado Director Project Management Office Grupo Anima EducaçãoWe live in a time of change speed and an avalanche of information. It is still very difficult for most companies to change their organizational culture efficiently. This book makes us reflect upon the crucial element in any change and which most managers do not place in the foreground—the people. — Joyce Meyer CEO iDigoIn today's constantly changing world the Project Manager must have sensitivity to how people react to change. Knowing a method that provides a structured way to take care of the human aspect is a key factor in the success of any project! HCMBOK® offers a simple and practical approach to managing change which can be easily incorporated into the project management routine providing amazing results. — Pedro Augusto Cardoso da Silva Engineering Director METRÔRIO This reference starts by presenting the concept of change management its players strategies and applicable models. In the second part the book covers the set of good practices methodology and tools known as the HCMBOK®— Human Change Management Body of Knowledge. The third part introduces the concept of the Change Management Office (CMO) and its relation to the strategic planning of an organization. The book concludes with the competencies essential for a change manager an approach to agile methodologies and a model for managing cultural change. | The Human Change Management Body of Knowledge (HCMBOK®)

GBP 44.99
1

Practical Guide to IT Problem Management

Practical Guide to IT Problem Management

Some IT organisations seem to expend all their energy firefighting – dealing with incidents as they arise and fixing or patching over the breakage. In organisations like this restarting computers is seen as a standard method to resolve many issues. Perhaps the best way to identify whether an organisation understands problem management is to ask what they do after they have restarted the computer. If restarting the computer fixes the issue it is very tempting to say that the incident is over and the job is done. Problem management recognises that things do not improve if such an approach is taken. Such organisations are essentially spending their time running to stay in the same place. Written to help IT organisations move forward Practical Guide to IT Problem Management presents a combination of methodologies including understanding timelines and failure modes drill down 5 whys and divide and conquer. The book also presents an exploration of complexity theory and how automation can assist in the desire to shift left both the complexity of the problem and who can resolve it. The book emphasises that establishing the root cause of a problem is not the end of the process as the resolution options need to be evaluated and then prioritised alongside other improvements. It also explores the role of problem boards and checklists as well as the relationship between problem management and Lean thinking. This practical guide provides both a framework for tackling problems and a toolbox from which to select the right methodology once the type of problem being faced has been identified. In addition to reactive methods it presents proactive activities designed to reduce the incidence of problems or to reduce their impact and complexity should they arise. Solving problems is often a combination of common sense and methodologies which may either be learnt the hard way or may be taught. This practical guide shows how to use problem solving tools and to understand how and when to apply them while upskilling IT staff and improving IT problem solving processes.

GBP 14.99
1

Principles of Mobile Computing and Communications

Technologies for Sustainable Global Higher Education

Technologies for Sustainable Global Higher Education

Digital technologies are influencing the way we learn live work and exist in different contexts of society in the digital age. There are a variety of learning systems that support innovative digital approaches and universities and organizations around the world are investing in building their own e-learning platforms. Digital technologies are enabling wider access to education and new markets for student recruitment resulting in increased income prospects for global higher education institutions. Technology enables numerous data and information sources which give greater access to information and data. It also enables highly virtual environments which impact teaching and the classroom. The widespread use and application of digital technologies in the teaching and learning process provoke pedagogical inquiry and mediation. It is in this context that Technologies for Sustainable Global Higher Education focuses on analyzing the application of digital technologies in the teaching–learning process. The chapters in this edited collection seek to answer questions relevant to the context of higher education such as: What is the concept of digital technologies? How is digital technology used to mediate the learning process? What technologies are used to qualify education in higher education? This book provides answers to these questions by focusing on issues central to improving education through digital technologies digital learning and pedagogical practices in digital education. It also provides case studies of higher education institutions.

GBP 110.00
1

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location identity and history over wireless connections. Connectivity and Communication — Anything Anywhere and Anytime An examination of the exciting expansion period in this research The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive technical and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies experience reports and best practice it contains information on emerging technologies market opportunities and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs itis a comprehensive technical and practical guide to recent advances in pervasive networked systems. | The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

GBP 56.99
1

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book you will learn how to create a working practical control structure that will ensure the ongoing day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning all the way down to basic technology operation.

GBP 42.99
1

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems engineering has been applied to some of the most important projects of our time including those that have helped humanity explore the world and the universe expand our technical abilities and enhance the quality of human life. Without formal training in systems engineering the discipline is often difficult to understand and apply and its use within projects is often confusing. Systems Engineering for Projects: Achieving Positive Outcomes in a Complex World provides an approach that utilizes a combination of the most effective processes from both project management and systems engineering disciplines in a simplified and straightforward manner. The processes described in the book are lightweight flexible and tailorable. They provide the shortest path to success in projects across the entire project life cycle from research to operations and from simple to the most complex. The book also addresses how this methodology can be used in a continually adapting and changing world as projects span disciplines and become even more interconnected across all areas of human existence. Each chapter includes diagrams templates summary lists a case study and a thought-provoking question and answer section that assists readers in immediate application of the material to their own projects. The book is a project manager’s resource for understanding how to directly apply essential processes to projects in a way that increases the probability of achieving success. It is a comprehensive go-to manual on the application of systems engineering processes to projects of all types and complexity. | Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

GBP 42.99
1

The Concept of Enterprise Architecture from Theory to Practice

The Concept of Enterprise Architecture from Theory to Practice

Even though the field of enterprise architecture (EA) has matured many organisations still struggle with its development and implementation particularly those organisations involved in continuous transformational cycles and subjected to different environmental trends. This book is intended to assist organisations in getting a grip on the factors influencing EA implementation and gaining a deeper understanding of why things happen the way they do in the practice of EA. It is a comprehensive and definitive resource that is useful to both business professionals and academics. The book presents an approach for the development implementation or institutionalisation of EA that is independent of any method or other architecture frameworks. It can be applied directly using a realistic selection of organizational variables. The approach has two distinctive features that support EA even in complex environments: From both technical and non-technical perspectives it identifies influencing factors and how they manifest in the practice of EA in an organization It offers linear and practical mechanisms for developing and implementing EA to fortify the practice of the concept in an organisation This approach represents a significant contribution to EA. Starting with descriptions for EA the book offers deepened models and frameworks for the development and implementation of EA at the domain level. It also covers factors upon which a model is built for the institutionalisation of the concept. Additionally the book discusses the implications of EA for sponsors architects and other stakeholders responsible for EA development implementation and institutionalisation. | The Concept of Enterprise Architecture from Theory to Practice

GBP 54.99
1

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

Successful security professionals have had to modify the process of responding to new threats in the high-profile ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists forms questionnaires and sample assessments. Presents Case Studies and Examples of all Risk Management ComponentsBased on the seminars of information security expert Tom Peltier this volume provides the processes that you can easily employ in your organization to assess risk. Answers such FAQs as:Why should a risk analysis be conducted?Who should review the results?How is the success measured?Always conscious of the bottom line Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization—and it’s not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.

GBP 56.99
1

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software: Requirements Test Cases and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:Pre-developed nonfunctional requirements that can be reused for any software development project Documented test cases that go along with the requirements and can be used to develop a Test Plan for the softwareTesting methods that can be applied to the test cases provided Downloadable resources with all security requirements and test cases as well as MS Word versions of the checklists requirements and test cases covered in the bookOffering ground-level already-developed software nonfunctional requirements and corresponding test cases and methods this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying downloadable resources filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis design and testing phases of your software development lifecycle. Some Praise for the Book:This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation . . —Doug Cavit Chief Security Strategist Microsoft Corporation. provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC). —Jeff Weekes Sr. Security Architect at Terra Verde Services. full of useful insights and practical advice from two au | Secure and Resilient Software Requirements Test Cases and Testing Methods

GBP 56.99
1

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Describing how to avoid common vendor traps Buying Supporting Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and ultimately better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts—which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition support and maintenanceExamines hardware and software warranty and support modelsConsiders finance and accounting issues for maintenance and supportSpells out technology product details Explains postwarranty support and maintenanceProvides the understanding to better negotiate with vendor sales teamsIllustrating the types of problems typically experienced during product use the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating. | Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

GBP 56.99
1

Database Modeling Step by Step

Database Modeling Step by Step

With the aim of simplifying relational database modeling Database Modeling Step-by-Step presents the standard approach to database normalization and then adds its own approach which is a more simplistic intuitive way to building relational database models. Going from basics to contemporary topics the book opens with relational data modeling and ends with BigData database modeling following a road map of the evolution in relational modeling and including brief introductions to data warehousing and BigData modeling. A break-down of the elements of a model explains what makes up a relational data model. This is followed by a comparison between standard normalization and a more simplistic intuitive approach to data modeling that a beginner can follow and understand. A brief chapter explains how to use the database programming language SQL (Structured Query Language) which reads from and writes to a relational database. SQL is fundamental to data modeling because it helps in understanding how the model is used. In addition to the relational model the last three chapters cover important modern world topics including denormalization that leads into data warehouses and BigData database modeling. The book explains how there is not much to logical data modeling in BigData databases because as they are often schema-less which means that BigData databases do not have schemas embedded into the database itself they have no metadata and thus not much of a logical data model. Online bonus chapters include a case study that covers relational data modeling and are available at the author’s web site: www. oracletroubleshooter. com/datamodeling. html | Database Modeling Step by Step

GBP 54.99
1

Bankers Like Us Dispatches from an Industry in Transition

Bankers Like Us Dispatches from an Industry in Transition

This book will resonate with anyone no matter where you reside on this journey whether newbie or old guard. If you want to be part of this change you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate then I suggest you think about stepping aside. — Curt Queyrouze President Coastal Community Bank The world is going digital and so is banking—in fits starts and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about not by external heroes and saviours not by a generation yet to be born but people just like us. People who understand the industry and its quirks. Bankers who have the grit determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a ‘this is who we are’ piece including the author’s trench credentials. It then presents an overview of corporate culture (this is what we deal with and a few ideas on how to handle it) as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds and a hopeful look-ahead on what a team of principled dedicated folks can do despite everything. | Bankers Like Us Dispatches from an Industry in Transition

GBP 29.99
1