33 results (0,22012 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

In this book Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption—fear. Fear of the unknown fear of the intangible fear of the investment needed and yes fear of losing your job to a machine. With his talent for distilling clarity from complexity Edosa tackles this and many other challenges. —Tim Carmichael Chief Data Officer Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data information and knowledge across organisations. Yet rather than being stuck with endless polarising debates such as breaking down silos it shifts focus back towards the ultimate to what end. —Jacky Wright Chief Digital Officer (CDO) Microsoft US If you care about AI transformation empowering people or advancing organisational success in an increasingly digital world then you should read this book. —Yomi Ibosiola Chief Data and Analytics Officer Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when—at the end of a critical investment in an artificial intelligence project that had been meant to save money—it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer’s production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to make data work for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation empower people and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities. | Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

GBP 44.99
1

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Most people do not truly understand a concept until they can visualize it. This applies to all fields including Project Management. The best way to effectively manage projects is to help your team visualize the end result as well as the steps needed to achieve that result. Help Your Team Visualize the Right Path to Success Building a Project Work Breakdown Structure: Visualizing Objectives Deliverables Activities and Schedules employs a diagram approach to project planning and scheduling. This useful tool empowers business professionals to take control of and successfully communicate their projects ensuring they are completed on time with their targeted impact. Industry professional Dennis P. Miller a consultant to leading Fortune 500 companies thoroughly explains the keys to an effective Work Breakdown Structure (WBS) through an Eight Step Process. He has refined this process over a period of twenty years applying it to over 100 projects ranging from software development to social events. The Eight Step Process starts with a concentrated effort to define the project through its deliverables. The middle steps walk the project team through a process of activity definition and sequencing and resource assignment. Finally the last steps involve estimating the duration and verifying the project timeline. Not Just What to Do But How to Do It! This is a hands-on volume that includes a practice section for each of the eight steps providing readers with real examples of how the author has successfully applied this process. The result of its application is a visualization of the project‘s objectives deliverables activities and schedules. Over 130 illustrations enrich the instructions. Project managers are assured of success by following the simple tools in this unique and comprehensive volume. | Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

GBP 170.00
1

Portfolio Management Delivering on Strategy

Portfolio Management Delivering on Strategy

Portfolio management is becoming the ‘must have’ for organizations to prosper and survive in this decade and beyond. No longer can the organizational focus be one of following best and repeatable practices as resource limitations mean only those programs projects and operational work that add business value can and should be pursued. Executives are focusing on strategic ability and managing complexity which can only be done through a disciplined portfolio process in ensuring the best mix of programs projects and operational work is under way. In turn the portfolio is constantly in flux as difficult decisions are made if a project for example is no longer contributing to business value and providing benefits and should be terminated to reallocate resources to one of higher priority. Commitment to this difficult approach is necessary at all levels and communication is required so everyone knows how their work contributes to the organization’s strategic goals and objectives. Portfolio Management: Delivering on Strategy Second Edition focuses on the benefits of portfolio management to the organization. Its goal is to provide senior executives a view on how portfolio management can deliver organizational strategy. The emphasis is on the specific aspects within the portfolio management discipline and how each aspect should be managed from a business perspective and not necessarily from a portfolio management perspective. Highlights of the book include: Agile portfolio management Delivering organizational value Portfolio management and uncertainty Portfolio governance Marketing a portfolio Portfolio management success Starting with a review of the project portfolio concept and its development this book is a reference for executives and practitioners in the field as well as a students and researchers studying portfolio management. | Portfolio Management Delivering on Strategy

GBP 44.99
1

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization Fundamentals Algorithms and Applications

Extremal Optimization: Fundamentals Algorithms and Applications introduces state-of-the-art extremal optimization (EO) and modified EO (MEO) solutions from fundamentals methodologies and algorithms to applications based on numerous classic publications and the authors’ recent original research results. It promotes the movement of EO from academic study to practical applications. The book covers four aspects beginning with a general review of real-world optimization problems and popular solutions with a focus on computational complexity such as NP-hard and the phase transitions occurring on the search landscape. Next it introduces computational extremal dynamics and its applications in EO from principles mechanisms and algorithms to the experiments on some benchmark problems such as TSP spin glass Max-SAT (maximum satisfiability) and graph partition. It then presents studies on the fundamental features of search dynamics and mechanisms in EO with a focus on self-organized optimization evolutionary probability distribution and structure features (e. g. backbones) which are based on the authors’ recent research results. Finally it discusses applications of EO and MEO in multiobjective optimization systems modeling intelligent control and production scheduling. The authors present the advanced features of EO in solving NP-hard problems through problem formulation algorithms and simulation studies on popular benchmarks and industrial applications. They also focus on the development of MEO and its applications. This book can be used as a reference for graduate students research developers and practical engineers who work on developing optimization solutions for those complex systems with hardness that cannot be solved with mathematical optimization or other computational intelligence such as evolutionary computations. | Extremal Optimization Fundamentals Algorithms and Applications

GBP 42.99
1

Project Management Methodologies Governance and Success Insight from Traditional and Transformative Research

Project Management Methodologies Governance and Success Insight from Traditional and Transformative Research

With all signs pointing to an increased use of and interest in project-based work in modern organizations the better scholars are able to make sense of the current state of the field through theory development and empirical investigation the more successful projects promise to become. This book is a welcome addition to our field and will be I am sure an important work and source for future reference well into the future. —Dr. Jeffrey Pinto Pennsylvania State UniversityThe goal of practicing project managers and scholars alike lies in solving the puzzle of how to manage projects toward successful completion. However understanding what comprises project success—seemingly such an innocent question—has come to represent one of the most challenging problems for project managers and scholars. Who determines success? At what point in time is success best measured? How do diverse stakeholders define success? What happens when their perspectives collide? What is the difference between project success and project management success? These are surprisingly complex problems. For every principle or rule posited a brief investigation reveals that there are numerous exceptions muddying the waters and making these ideas increasingly opaque. Project Management Methodologies Governance and Success addresses this challenge head-on putting into proper context the critical issues that shape our understanding of the project management research process. Employing a concept referred to as philosophical triangulation the book shows how to overcome the weaknesses or intrinsic biases that disrupt and minimize the impact of so much organizational research. It places organizational governance and success within their proper context allowing scholars to identify the best methods for investigating project-based work. It links together in a cogent manner the diverse themes of research theory and design projects and project success and organizational governance. In effect this book demonstrates that to fully understand how to undertake research in projects theory and method are inextricably interwoven. | Project Management Methodologies Governance and Success Insight from Traditional and Transformative Research

GBP 42.99
1

Ethics and the Internal Auditor's Political Dilemma Tools and Techniques to Evaluate a Company's Ethical Culture

Software Engineering with UML

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software: Requirements Test Cases and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:Pre-developed nonfunctional requirements that can be reused for any software development project Documented test cases that go along with the requirements and can be used to develop a Test Plan for the softwareTesting methods that can be applied to the test cases provided Downloadable resources with all security requirements and test cases as well as MS Word versions of the checklists requirements and test cases covered in the bookOffering ground-level already-developed software nonfunctional requirements and corresponding test cases and methods this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying downloadable resources filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis design and testing phases of your software development lifecycle. Some Praise for the Book:This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation . . —Doug Cavit Chief Security Strategist Microsoft Corporation. provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC). —Jeff Weekes Sr. Security Architect at Terra Verde Services. full of useful insights and practical advice from two au | Secure and Resilient Software Requirements Test Cases and Testing Methods

GBP 56.99
1

Telecommunications Cost Management

Telecommunications Cost Management

Our world is rapidly becoming an Internet-based world with tens of millions of homes millions of businesses and within a short period of time possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users ranging from individual professionals to networking managers and administrators is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to advanced topics in subnetting network address translation and configuring workstations servers and routers. The book contains network tools that prepare you for testing and troubleshooting and highlights the need for techniques that conserve the use of IP addressing as well as the creation of a next generation IP addressing structure. While structured on a chapter by chapter basis wherever possible each chapter was written to be independent making the book convenient and easy to use in a hectic work environment. While you may find it possible to design a network or configure a workstation to operate without a detailed knowledge of IP addressing the end results are not very efficient. And in the quickly changing global business environment inefficiency wastes your time and money both valuable resources for gaining and maintaining the competitive edge. With The ABCs of IP Addressing you get the comprehensive coverage of applications and protocols that help you do your job faster and more effectively. | Telecommunications Cost Management

GBP 160.00
1

The Human Change Management Body of Knowledge (HCMBOK )

The Human Change Management Body of Knowledge (HCMBOK )

I am happy to recommend this work. I believe in the principles presented in it and identify with its context. Due to the lack of knowledge on the subject in the market it is a topic that must be made known. The book should be in the library of all project and change managers. — Paul Dinsmore PMI FellowEvery manager should integrate HCMBOK® practices into their project management methodology in order to fully develop their work. This book addresses a simple and practical way that the critical component in organizational change management can be applied to projects of all kinds: the human factor. — Bruno Machado Director Project Management Office Grupo Anima EducaçãoWe live in a time of change speed and an avalanche of information. It is still very difficult for most companies to change their organizational culture efficiently. This book makes us reflect upon the crucial element in any change and which most managers do not place in the foreground—the people. — Joyce Meyer CEO iDigoIn today's constantly changing world the Project Manager must have sensitivity to how people react to change. Knowing a method that provides a structured way to take care of the human aspect is a key factor in the success of any project! HCMBOK® offers a simple and practical approach to managing change which can be easily incorporated into the project management routine providing amazing results. — Pedro Augusto Cardoso da Silva Engineering Director METRÔRIO This reference starts by presenting the concept of change management its players strategies and applicable models. In the second part the book covers the set of good practices methodology and tools known as the HCMBOK®— Human Change Management Body of Knowledge. The third part introduces the concept of the Change Management Office (CMO) and its relation to the strategic planning of an organization. The book concludes with the competencies essential for a change manager an approach to agile methodologies and a model for managing cultural change. | The Human Change Management Body of Knowledge (HCMBOK®)

GBP 44.99
1

Fundamentals of Internet of Things for Non-Engineers

Fundamentals of Internet of Things for Non-Engineers

The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers progressed to connecting people to people and is now moving to connect everything to everything. The movement started like a race—with a lot of fanfare excitement and cheering. We’re now into the work phase and we have to figure out how to make the dream come true. The IoT will have many faces and involve many fields as it progresses. It will involve technology design security legal policy business artificial intelligence design Big Data and forensics; about any field that exists now. This is the reason for this book. There are books in each one of these fields but the focus was always an inch wide and a mile deep. There’s a need for a book that will introduce the IoT to non-engineers and allow them to dream of the possibilities and explore the work venues in this area. The book had to be a mile wide and a few inches deep. The editors met this goal by engaging experts from a number of fields and asking them to come together to create an introductory IoT book. Fundamentals of Internet of Things for Non-Engineers Provides a comprehensive view of the current fundamentals and the anticipated future trends in the realm of Internet of Things from a practitioner’s point of view Brings together a variety of voices with subject matter expertise in these diverse topical areas to provide leaders students and lay persons with a fresh worldview of the Internet of Things and the background to succeed in related technology decision-making Enhances the reader’s experience through a review of actual applications of Internet of Things end points and devices to solve business and civic problems along with notes on lessons learned Prepares readers to embrace the Internet of Things era and address complex business social operational educational and personal systems integration questions and opportunities

GBP 52.99
1

Information Technology Control and Audit Fifth Edition

Human Dimensions of Cybersecurity

Introduction to Mobile Communications Technology Services Markets

Introduction to Mobile Communications Technology Services Markets

The traditionally separate Fixed Mobile and Internet sectors have been evolving recently toward a single sector offering numerous implications for those involved in technology and business. It is therefore essential for telecommunication professionals to get a keen grasp of where the industry is heading. Providing a solid foundation in the industry Introduction to Mobile Communications: Technology Services Markets explores the core requirements of modern mobile telecommunications-from markets to technology. It explains how wireless systems work how mobility is supported the underlying infrastructure and what interactions are needed among the different functional components. The book also examines how mobile communications are evolving in order to meet the changing needs of users. The information provided in the book comes primarily from the four core modules of the Certificate in Mobile Communications Distance Learning program run by the Informa Telecoms Academy in London. Designed by a highly experienced training development team the program examines the complex and fascinating world of mobile communications. Designed to give a broad picture of mobile communications the book provides an excellent grounding for those involved in both business and engineering-leaving them much better equipped to fulfill roles within their current or prospective companies | Introduction to Mobile Communications Technology Services Markets

GBP 56.99
1

Cyber Security Essentials

Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats tactics and procedures. To accomplish this the team of security professionals from VeriSign‘s iDefense Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security the book: Covers attacker methods and motivations exploitation trends malicious code techniques and the latest threat vectors Addresses more than 75 key security concepts in a series of concise well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It‘s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

GBP 160.00
1

Technologies for Sustainable Global Higher Education

Technologies for Sustainable Global Higher Education

Digital technologies are influencing the way we learn live work and exist in different contexts of society in the digital age. There are a variety of learning systems that support innovative digital approaches and universities and organizations around the world are investing in building their own e-learning platforms. Digital technologies are enabling wider access to education and new markets for student recruitment resulting in increased income prospects for global higher education institutions. Technology enables numerous data and information sources which give greater access to information and data. It also enables highly virtual environments which impact teaching and the classroom. The widespread use and application of digital technologies in the teaching and learning process provoke pedagogical inquiry and mediation. It is in this context that Technologies for Sustainable Global Higher Education focuses on analyzing the application of digital technologies in the teaching–learning process. The chapters in this edited collection seek to answer questions relevant to the context of higher education such as: What is the concept of digital technologies? How is digital technology used to mediate the learning process? What technologies are used to qualify education in higher education? This book provides answers to these questions by focusing on issues central to improving education through digital technologies digital learning and pedagogical practices in digital education. It also provides case studies of higher education institutions.

GBP 110.00
1

Securing the Cloud Security Strategies for the Ubiquitous Data Center

Enterprise Systems Integration

Enterprise Systems Integration

The convergence of knowledge technology and human performance which comprises today's enterprise allows creative business process design. Thus an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration. The book combines the perspectives knowledge and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today's enterprise. Collectively these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies you must successfully deploy ERP systems within budget and on time. In addition you must be able to integrate them into the rest of the enterprise. Still ERP software does not make up the full picture of today's enterprise. Legacy systems e-commerce and other Web-based systems client/server applications networks and communications systems data warehousing and integrated databases enter into the mix. Enterprise Systems Integration Second Edition paints a comprehensive picture of the technologies that comprise today's enterprise and shows you how to make them work together.

GBP 56.99
1

Data Center Storage Cost-Effective Strategies Implementation and Management

Data Center Storage Cost-Effective Strategies Implementation and Management

We overspend on data center storage … yet we fall short of business requirements. It's not about the technologies. It's about the proper application of technologies to deliver storage services efficiently and affordably. It’s about meeting business requirements dependent on data center storage. Spend less deliver more. Data Center Storage: Cost-Effective Strategies Implementation and Management provides an industry insider’s insight on how to properly scope plan evaluate and implement storage technologies to maximize performance capacity reliability and power savings. It provides business and use-case focused coverage of storage technology including storage area networks (SAN) capacity-optimized drives and solid-state drives. It offers key insights on financially responsible spending for data center storage. Delivered in accessible language the book starts with a discussion of the business merits of replacing direct attached compartmentalized storage with consolidated SAN-attached storage. The author advises on the use of service level applications (SLAs) as a tool to drive business unit collaboration with IT and prioritize those actions that impact productivity and profit from those that are less critical. This business guide to applied technologies disassembles big problems into digestible segments to help you understand quantify and fix any problems that arise as you work towards meeting your growing storage needs. The book builds on the consolidation and SLA driven approach to take advantage of the compelling benefits and potential savings of managed hosting and cloud storage. | Data Center Storage Cost-Effective Strategies Implementation and Management

GBP 56.99
1

Cyber Fraud Tactics Techniques and Procedures

Cyber Fraud Tactics Techniques and Procedures

With millions lost each year cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis Cyber Fraud: Tactics Techniques and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy. Copiously illustrated this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming trojans and toolkits direct threats pump-and-dump scams and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape the book specifically examines telecommunications infrastructure development patterns and trends of internet adoption and use profiles of specific malicious actors threat types and trends in these areas. This eye-opening work includes a variety of case studies ― including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s (RBN) role in global cyber crime as well as new evidence on how these criminals steal package buy sell and profit from the personal financial information of consumers. Armed with this invaluable information organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud. | Cyber Fraud Tactics Techniques and Procedures

GBP 56.99
1

Practical Data Mining Techniques and Applications

Practical Data Mining Techniques and Applications

Data mining techniques and algorithms are extensively used to build real-world applications. A practical approach can be applied to data mining techniques to build applications. Once deployed an application enables the developers to work on the users’ goals and mold the algorithms with respect to users’ perspectives. Practical Data Mining Techniques and Applications focuses on various concepts related to data mining and how these techniques can be used to develop and deploy applications. The book provides a systematic composition of fundamental concepts of data mining blended with practical applications. The aim of this book is to provide access to practical data mining applications and techniques to help readers gain an understanding of data mining in practice. Readers also learn how relevant techniques and algorithms are applied to solve problems and to provide solutions to real-world applications in different domains. This book can help academicians to extend their knowledge of the field as well as their understanding of applications based on different techniques to gain greater insight. It can also help researchers with real-world applications by diving deeper into the domain. Computing science students application developers and business professionals may also benefit from this examination of applied data science techniques. By highlighting an overall picture of the field introducing various mining techniques and focusing on different applications and research directions using these methods this book can motivate discussions among academics researchers professionals and students to exchange and develop their views regarding the dynamic field that is data mining.

GBP 150.00
1

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location demographics and sentiments of the participants of the network and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems analyze such systems and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book together with the numerous references listed in each chapter have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies (2) basics of analyzing and securing social networks (3) the authors’ design and implementation of various social network analytics tools (4) privacy aspects of social networks (5) access control and inference control for social networks (6) experimental systems designed or developed by the authors on analyzing and securing social networks (7) social media application systems developed by the authors (8) secure social media systems developed by the authors and (9) some of the authors’ exploratory work and further directions.

GBP 42.99
1

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Strategic planning outlines the path between the current status of the business and the desired status. It requires the business to identify its objectives and goals and then make the correct decisions to achieve these objectives and goals. This book provides a complete set of practical strategic planning techniques and tools. It explains how and in what circumstances to use particular tools and how to target them to achieve effective results. Systematic Strategic Planning: A Comprehensive Framework for Implementation Control and Evaluation describes a framework of phases through which each project passes a pattern of procedures for straight-forward planning and the fundamentals involved in any strategic planning project. Designed to be simple to understand and easy to use the book presents techniques case studies and working forms to guide you through preparing a strategic plan for your existing or future business. The book is organized into four parts:Part I explains the steps to take before and after starting the strategic planning work. Part II provides the overall framework and characteristics of the simplified and full versions of systematic strategic planning. Part III describes the sections of systematic strategic planning in detail. Part IV provides a framework for implementation control and evaluation functions in a systematic manner. This book is designed to help both experienced strategic planners and other types of professionals who are faced with creating a strategic plan for their business. The processes and techniques described should be universally applicable to any type of business. With the information in this book you will be well-equipped to create effective strategic plans that drive your business forward. | Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

GBP 56.99
1

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

Developing the Intuitive Executive Using Analytics and Intuition for Success

Developing the Intuitive Executive Using Analytics and Intuition for Success

The leading traits of executives often include creativity and innovation. Research shows that intuition can significantly enhance these traits. Developing intuitive executives and honing intuition coupled with the ability to apply data and evidence to inform decision making is the focus of Developing the Intuitive Executive: Using Analytics and Intuition for Success. Some researchers call the complement of applying data analytics to intuition as quantitative intuition rational intuition or informed intuition. Certainly in today's data-driven environment analytics plays a key role in executive decision-making. However an executive’s many years of experiential learning are not formally considered as part of the decision-making process. Learning from both failures and successes can help fine-tune intuitive awareness—what this book calls intuition-based decision-making. Research also shows that many executives do not trust the internal data quality in their organizations and so they rely on their intuition rather than strictly on data. This book presents the work of leading researchers worldwide on intuition in the management and executive domain. Their chapters cover key issues trends concepts techniques and opportunities for applying intuition as part of the executive decision-making process. Highlights include: Using intuition to manage new opportunities Intuition in medicine Rules based on intuition Balancing logic and intuition in decision-making Smart heuristics to manage complexity Intuition and competitiveness Intuitive investment decision-making across cultures Showing how intuition in executive decision-making should play an important role this book enables managers to complement their knowledge gained from experience with analytics to improve decision-making and business success. | Developing the Intuitive Executive Using Analytics and Intuition for Success

GBP 44.99
1