7 results (1,24373 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Seed Inoculation Coating and Precision Pelleting Science Technology and Practical Applications

Crisis in Higher Education A Customer-Focused Resource Management Resolution

Aviation and Human Factors How to Incorporate Human Factors into the Field

Data Center Storage Cost-Effective Strategies Implementation and Management

Data Center Storage Cost-Effective Strategies Implementation and Management

We overspend on data center storage … yet we fall short of business requirements. It's not about the technologies. It's about the proper application of technologies to deliver storage services efficiently and affordably. It’s about meeting business requirements dependent on data center storage. Spend less deliver more. Data Center Storage: Cost-Effective Strategies Implementation and Management provides an industry insider’s insight on how to properly scope plan evaluate and implement storage technologies to maximize performance capacity reliability and power savings. It provides business and use-case focused coverage of storage technology including storage area networks (SAN) capacity-optimized drives and solid-state drives. It offers key insights on financially responsible spending for data center storage. Delivered in accessible language the book starts with a discussion of the business merits of replacing direct attached compartmentalized storage with consolidated SAN-attached storage. The author advises on the use of service level applications (SLAs) as a tool to drive business unit collaboration with IT and prioritize those actions that impact productivity and profit from those that are less critical. This business guide to applied technologies disassembles big problems into digestible segments to help you understand quantify and fix any problems that arise as you work towards meeting your growing storage needs. The book builds on the consolidation and SLA driven approach to take advantage of the compelling benefits and potential savings of managed hosting and cloud storage. | Data Center Storage Cost-Effective Strategies Implementation and Management

GBP 56.99
1

Strategic Security Forward Thinking for Successful Executives

Strategic Security Forward Thinking for Successful Executives

Strategic Security will help security managers and those aspiring to the position to think strategically about their job the culture of their workplace and the nature of security planning and implementation. Security professionals tend to focus on the immediate (the urgent) rather than the important and essential—too often serving as firefighters rather than strategists. This book will help professionals consider their roles and structure their tasks through a strategic approach without neglecting their career objectives. Few security management books for professionals in the field focus on corporate or industrial security from a strategic perspective. Books on the market normally provide recipes methods or guidelines to develop plans policies or procedures. However many do so without taking into account the personal element that is supposed to apply these methods. In this book the authors helps readers to consider their own career development in parallel with establishing their organisation security programme. This is fundamental to becoming and serving as a quality effective manager. The element of considering career objectives as part-and-parcel to this is both unique to only this book and vital for long-term career success. The author delineates what makes strategic thinking different in a corporate and security environment. While strategy is crucial in the running of a company the traditional attitude towards security is that it has to fix issues quickly and at low cost. This is an attitude that no other department would tolerate but because of its image security departments sometimes have major issues with buy-in and from top-management. The book covers the necessary level of strategic thinking to put their ideas into practice. Once this is achieved the strategic process is explained including the need to build the different steps into this process—and into the overarching business goals of the organisation—will be demonstrated. The book provides numerous hand-on examples of how to formulate and execute the strategic master plan for the organization. The authors draws on his extensive experience and successes to serve as a valuable resource to all security professionals looking to advance their careers in the field. | Strategic Security Forward Thinking for Successful Executives

GBP 44.99
1

Design for Manufacturability How to Use Concurrent Engineering to Rapidly Develop High-Quality Products for Lean Production Second

Design for Manufacturability How to Use Concurrent Engineering to Rapidly Develop High-Quality Products for Lean Production Second

Achieve any cost goals in half the time and achieve stable production with quality designed in right-the-first-time. Design for Manufacturability: How to Use Concurrent Engineering to Rapidly Develop Low-Cost High-Quality Products for Lean Production is still the definitive work on DFM. This second edition extends the proven methodology to the most advanced product development process with the addition of the following new unique and original topics which have never been addressed previously. These topics show you how to: Cut cost from 1/2 to 1/10 in 9 categories—with ways to remove that much cost from product charges and pricing Commercialize innovation—starting with Manufacturable Research and learning from the new section on scalability you will learn how to design products and processing equipment to quickly scale up to any needed demand or desired growth. Design product families that can be built on-demand in platform cells that also mass customize products to-order Make Lean production easier to implement with much more effective results while making build-to-order practical with spontaneous supply chains and eliminating forecasted inventory by including an updated chapter on Designing Products for Lean Production The author’s 30 years of experience teaching companies DFM based on pre-class surveys and plant tours is the foundation of this most advanced design process. It includes incorporating dozens of proven DFM guidelines through up-front concurrent-engineering teamwork that cuts the time to stable production in half and curtails change orders for ramps rework redesign substituting cheaper parts change orders to fix the changes unstable design specs part obsolescence and late discovery of manufacturability issues at periodic design reviews. This second edition is for the whole product development community including: Engineers who want to learn the most advanced DFM techniques Managers who want to lead the most advanced product development Project team leaders who want to immediately apply all the principles taught in this book in their own micro-climate Improvement leaders and champions who want to implement the above and ensure that the company can design products and versatile processing equipment for low-volume/high-mix product varieties Designing half to a tenth of cost categories can avoid substituting cheap parts which degrades quality and encourages standardization and spontaneous supply chains which will encourage Lean initiatives. Using cellular manufacturing to shift production between lines for mixed production of platforms and build-to-order to offer the fastest order fulfillment can beat any competitors’ delivery time. | Design for Manufacturability How to Use Concurrent Engineering to Rapidly Develop High-Quality Products for Lean Production Second

GBP 56.99
1

Core Software Security Security at the Source

Core Software Security Security at the Source

. an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. . Readers are armed with firm solutions for the fight against cyber threats. —Dr. Dena Haritos Tsamitis. Carnegie Mellon University. a must read for security specialists software developers and software engineers. . should be part of every security professional’s library. —Dr. Larry Ponemon Ponemon Institute. the definitive how-to guide for software security professionals. Dr. Ransome Anmol Misra and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. . A must-have for anyone on the front lines of the Cyber War . —Cedric Leighton Colonel USAF (Ret. ) Cedric Leighton AssociatesDr. Ransome Anmol Misra and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! —Eric S. Yuan Zoom Video CommunicationsThere is much publicity regarding network security but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards in which we conduct our digital lives. In response security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative innovative people who write software. Core Software Security expounds developer-centric software security a holistic process to engage creativity for security. As long as software is developed by humans it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development which lies at the heart of our cyber infrastructure. Whatever development method is employed software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people process and technology Highlights the key success factors deliverables and metrics for each phase of the SDL Examines cost efficiencies optimized performance and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors' website at http://www. androidinsecurity. com/ | Core Software Security Security at the Source

GBP 44.99
1