14 results (0,15199 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management Second Edition provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective. Because of the critical importance of cybersecurity in today’s enterprise networks security-related issues are explained throughout the book and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests such as CompTIA and CISSP Takes advantage of actual cases examples industry products and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots figures and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook this book includes hands-on assignments based on the Packet Tracer program an excellent network design and simulation tool from Cisco. Instructor materials also are provided including PowerPoint slides solutions for exercise questions and additional chapter questions from which to build tests.

GBP 44.99
1

Information Technology Control and Audit Fifth Edition

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Enterprise Operations Management Handbook Second Edition

Human–Computer Interaction Fundamentals and Practice

Human–Computer Interaction Fundamentals and Practice

Although life continues to become increasingly embedded with interactive computing services that make our lives easier human-computer interaction (HCI) has not been given the attention it deserves in the education of software developers at the undergraduate level. Most entry-level HCI textbooks are structured around high-level concepts and are not directly tied to the software development process. Filling this need Human-Computer Interaction: Fundamentals and Practice supplies an accessible introduction to the entire cycle of HCI design and implementation—explaining the core HCI concepts behind each step. Designed around the overall development cycle for an interactive software product it starts off by covering the fundamentals behind HCI. The text then quickly goes into the application of this knowledge. It covers the forming of HCI requirements modeling the interaction process designing the interface implementing the resulting design and evaluating the implemented product. Although this textbook is suitable for undergraduate students of computer science and information technology it is accessible enough to be understood by those with minimal programming knowledge. Supplying readers with a firm foundation in the main HCI principles the book provides a working knowledge of HCI-oriented software development. The core content of this book is based on the introductory HCI course (advanced junior or senior-level undergraduate) that the author has been teaching at Korea University for the past eight years. The book includes access to PowerPoint lecture slides as well as source code for the example applications used throughout the text. | Human–Computer Interaction Fundamentals and Practice

GBP 42.99
1

Ethics and Governance in Project Management Small Sins Allowed and the Line of Impunity

Software Configuration Management

Data Center Storage Cost-Effective Strategies Implementation and Management

Data Center Storage Cost-Effective Strategies Implementation and Management

We overspend on data center storage … yet we fall short of business requirements. It's not about the technologies. It's about the proper application of technologies to deliver storage services efficiently and affordably. It’s about meeting business requirements dependent on data center storage. Spend less deliver more. Data Center Storage: Cost-Effective Strategies Implementation and Management provides an industry insider’s insight on how to properly scope plan evaluate and implement storage technologies to maximize performance capacity reliability and power savings. It provides business and use-case focused coverage of storage technology including storage area networks (SAN) capacity-optimized drives and solid-state drives. It offers key insights on financially responsible spending for data center storage. Delivered in accessible language the book starts with a discussion of the business merits of replacing direct attached compartmentalized storage with consolidated SAN-attached storage. The author advises on the use of service level applications (SLAs) as a tool to drive business unit collaboration with IT and prioritize those actions that impact productivity and profit from those that are less critical. This business guide to applied technologies disassembles big problems into digestible segments to help you understand quantify and fix any problems that arise as you work towards meeting your growing storage needs. The book builds on the consolidation and SLA driven approach to take advantage of the compelling benefits and potential savings of managed hosting and cloud storage. | Data Center Storage Cost-Effective Strategies Implementation and Management

GBP 56.99
1

Applied Semantic Web Technologies

Applied Semantic Web Technologies

The rapid advancement of semantic web technologies along with the fact that they are at various levels of maturity has left many practitioners confused about the current state of these technologies. Focusing on the most mature technologies Applied Semantic Web Technologies integrates theory with case studies to illustrate the history current state and future direction of the semantic web. It maintains an emphasis on real-world applications and examines the technical and practical issues related to the use of semantic technologies in intelligent information management. The book starts with an introduction to the fundamentals—reviewing ontology basics ontology languages and research related to ontology alignment mediation and mapping. Next it covers ontology engineering issues and presents a collaborative ontology engineering tool that is an extension of the Semantic MediaWiki. Unveiling a novel approach to data and knowledge engineering the text: Introduces cutting-edge taxonomy-aware algorithms Examines semantics-based service composition in transport logistics Offers ontology alignment tools that use information visualization techniques Explains how to enrich the representation of entity semantics in an ontology Addresses challenges in tackling the content creation bottleneck Using case studies the book provides authoritative insights and highlights valuable lessons learned by the authors—information systems veterans with decades of experience. They explain how to create social ontologies and present examples of the application of semantic technologies in building automation logistics ontology-driven business process intelligence decision making and energy efficiency in smart homes.

GBP 54.99
1

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test or ethical hack from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools which are required to complete a penetration test. The book covers a wide range of tools including Backtrack Linux Google reconnaissance MetaGooFil dig Nmap Nessus Metasploit Fast Track Autopwn Netcat and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools it details a four-step methodology for conducting an effective penetration test or hack. Providing an accessible introduction to penetration testing and hacking the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don‘t know where to start this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

GBP 170.00
1

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Most people do not truly understand a concept until they can visualize it. This applies to all fields including Project Management. The best way to effectively manage projects is to help your team visualize the end result as well as the steps needed to achieve that result. Help Your Team Visualize the Right Path to Success Building a Project Work Breakdown Structure: Visualizing Objectives Deliverables Activities and Schedules employs a diagram approach to project planning and scheduling. This useful tool empowers business professionals to take control of and successfully communicate their projects ensuring they are completed on time with their targeted impact. Industry professional Dennis P. Miller a consultant to leading Fortune 500 companies thoroughly explains the keys to an effective Work Breakdown Structure (WBS) through an Eight Step Process. He has refined this process over a period of twenty years applying it to over 100 projects ranging from software development to social events. The Eight Step Process starts with a concentrated effort to define the project through its deliverables. The middle steps walk the project team through a process of activity definition and sequencing and resource assignment. Finally the last steps involve estimating the duration and verifying the project timeline. Not Just What to Do But How to Do It! This is a hands-on volume that includes a practice section for each of the eight steps providing readers with real examples of how the author has successfully applied this process. The result of its application is a visualization of the project‘s objectives deliverables activities and schedules. Over 130 illustrations enrich the instructions. Project managers are assured of success by following the simple tools in this unique and comprehensive volume. | Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

GBP 170.00
1

Cybersecurity for Information Professionals Concepts and Applications

Cybersecurity for Information Professionals Concepts and Applications

Information professionals have been paying more attention and putting a greater focus on privacy over cybersecurity. However the number of both cybersecurity and privacy breach incidents are soaring which indicates that cybersecurity risks are high and growing. Utilizing cybersecurity awareness training in organizations has been an effective tool to promote a cybersecurity-conscious culture making individuals more cybersecurity-conscious as well. However it is unknown if employees’ security behavior at work can be extended to their security behavior at home and personal life. On the one hand information professionals need to inherit their role as data and information gatekeepers to safeguard data and information assets. On the other hand information professionals can aid in enabling effective information access and dissemination of cybersecurity knowledge to make users conscious about the cybersecurity and privacy risks that are often hidden in the cyber universe. Cybersecurity for Information Professionals: Concepts and Applications introduces fundamental concepts in cybersecurity and addresses some of the challenges faced by information professionals librarians archivists record managers students and professionals in related disciplines. This book is written especially for educators preparing courses in information security cybersecurity and the integration of privacy and cybersecurity. The chapters contained in this book present multiple and diverse perspectives from professionals in the field of cybersecurity. They cover such topics as: Information governance and cybersecurity User privacy and security online and the role of information professionals Cybersecurity and social media Healthcare regulations threats and their impact on cybersecurity A socio-technical perspective on mobile cybersecurity Cybersecurity in the software development life cycle Data security and privacy Above all the book addresses the ongoing challenges of cybersecurity. In particular it explains how information professionals can contribute to long-term workforce development by designing and leading cybersecurity awareness campaigns or cybersecurity hygiene programs to change people’s security behavior. | Cybersecurity for Information Professionals Concepts and Applications

GBP 41.99
1

Software Engineering A Methodical Approach 2nd Edition

Software Engineering A Methodical Approach 2nd Edition

Software Engineering: A Methodical Approach (Second Edition) provides a comprehensive but concise introduction to software engineering. It adopts a methodical approach to solving software engineering problems proven over several years of teaching with outstanding results. The book covers concepts principles design construction implementation and management issues of software engineering. Each chapter is organized systematically into brief reader-friendly sections with itemization of the important points to be remembered. Diagrams and illustrations also sum up the salient points to enhance learning. Additionally the book includes the author’s original methodologies that add clarity and creativity to the software engineering experience. New in the Second Edition are chapters on software engineering projects management support systems software engineering frameworks and patterns as a significant building block for the design and construction of contemporary software systems and emerging software engineering frontiers. The text starts with an introduction of software engineering and the role of the software engineer. The following chapters examine in-depth software analysis design development implementation and management. Covering object-oriented methodologies and the principles of object-oriented information engineering the book reinforces an object-oriented approach to the early phases of the software development life cycle. It covers various diagramming techniques and emphasizes object classification and object behavior. The text features comprehensive treatments of: Project management aids that are commonly used in software engineering An overview of the software design phase including a discussion of the software design process design strategies architectural design interface design database design and design and development standards User interface design Operations design Design considerations including system catalog product documentation user message management design for real-time software design for reuse system security and the agile effect Human resource management from a software engineering perspective Software economics Software implementation issues that range from operating environments to the marketing of software Software maintenance legacy systems and re-engineering This textbook can be used as a one-semester or two-semester course in software engineering augmented with an appropriate CASE or RAD tool. It emphasizes a practical methodical approach to software engineering avoiding an overkill of theoretical calculations where possible. The primary objective is to help students gain a solid grasp of the activities in the software development life cycle to be confident about taking on new software engineering projects. | Software Engineering A Methodical Approach 2nd Edition

GBP 59.99
1