Network management Books

98 products


  • The CPHIMS Review Guide 4th Edition

    Taylor & Francis Ltd The CPHIMS Review Guide 4th Edition

    1 in stock

    Book SynopsisWhether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book.The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians aTable of ContentsPreface. Acknowledgments. Editor. Section I HEALTHCARE AND TECHNOLOGY ENVIRONMENTS. 1 Healthcare Environment. 2 Technology Environment. Section II CLINICAL INFORMATICS. 3 Clinical Informatics. Section III HEALTHCARE INFORMATION AND SYSTEMS MANAGEMENT 4 Analysis. 5 Design. 6 Selection, Implementation, Support and Maintenance. 7 Testing and Evaluation. 8 Privacy and Security. Section IV MANAGEMENT AND LEADERSHIP. 9 Management and Leadership. 10 Questions. 11 Answer Key. Index.

    1 in stock

    £147.25

  • Architecture for the Commons Participatory

    Taylor & Francis Architecture for the Commons Participatory

    15 in stock

    Book SynopsisArchitecture for the Commons dives into an analysis of how the tectonics of a building is fundamentally linked to the economic organizations that allow them to exist. By tracing the origins and promises of current technological practices in design, the book provides an alternative path, one that reconsiders the means of achieving complexity through combinatorial strategies. This move requires reconsidering serial production with crowdsourcing and user content in mind. The ideas presented will be explored through the design research developed within Plethora Project, a design practice that explores the use of video game interfaces as a mechanism for participation and user design. The research work presented throughout the book seeks to align with a larger project that is currently taking place in many different fields: The Construction of the Commons. By developing both the ideological and physical infrastructure, the project of the Commons has become an antidote to current economic practices that perpetuate inequality. The mechanisms of the production and governance of the Commons are discussed, inviting the reader to get involved and participate in the discussion. The current political and economic landscape calls for a reformulation of our current economic practices and alternative value systems that challenge the current market monopolies. This book will be of great interest not only to architects and designers studying the impact of digital technologies in the field of design but also to researchers studying novel techniques for social participation and cooperating of communities through digital networks. The book connects principles of architecture, economics and social sciences to provide alternatives to the current production trends.Table of ContentsIntroduction - A Call for a Post-2008 Architecture 1. Architectural Progress 2. The Coalescence of Parts 3. In Defense of Parts 4. Immaterial Architectures 5. Reconstruction through Self-Provision Index

    15 in stock

    £35.14

  • PgMPÂ Practice Test Questions

    CRC Press PgMPÂ Practice Test Questions

    1 in stock

    Book SynopsisUp to date with the fourth edition of PMIâs Program Management Standard, PgMP Practice Test Questions: 1000+ Practice Exam Questions for the PgMP Examination contains more than 1,000 practice questions to help readers hone their knowledge and test their skills. It covers all five of the program management domains: Strategic Program Management, Program Management Life Cycle, Benefits Management, Stakeholder Management, and Governance. It also examines all of the sub domains of the lifecycle domain. With an easy-to-use format, this is an ideal resource for those preparing to take the PgMP exam.Table of ContentsIntroduction and Program Management Performance Domains. Program Strategy Alignment. Program Benefits Management. Program Stakeholder Engagement. Program Governance. Program Life Cycle Management. Program Activities. Initiating Process Group. Planning Process Group. Executing Process Group. Monitoring and Controlling Process Group. Closing Process Group

    1 in stock

    £40.84

  • Machine Learning and Wireless Communications

    Cambridge University Press Machine Learning and Wireless Communications

    15 in stock

    Book SynopsisHow can machine learning help the design of future communication networks and how can future networks meet the demands of emerging machine learning applications? Discover the interactions between two of the most transformative and impactful technologies of our age in this comprehensive book. First, learn how modern machine learning techniques, such as deep neural networks, can transform how we design and optimize future communication networks. Accessible introductions to concepts and tools are accompanied by numerous real-world examples, showing you how these techniques can be used to tackle longstanding problems. Next, explore the design of wireless networks as platforms for machine learning applications an overview of modern machine learning techniques and communication protocols will help you to understand the challenges, while new methods and design approaches will be presented to handle wireless channel impairments such as noise and interference, to meet the demands of emerging Table of ContentsPreface; 1. Machine learning and communications: an introduction Deniz Gündüz, Yonina Eldar, Andrea Goldsmith and H. Vincent Poor; Part I. Machine Learning for Wireless Networks: 2. Deep neural networks for joint source-channel coding David Burth Kurka, Milind Rao, Nariman Farsad, Deniz Gündüz and Andrea Goldsmith; 3. Neural network coding Litian Liu, Amit Solomon, Salman Salamatian, Derya Malak and Muriel Medard; 4. Channel coding via machine learning Hyeji Kim; 5. Channel estimation, feedback and signal detection Hengtao He, Hao Ye, Shi Jin and Geoffrey Y. Li; 6. Model-based machine learning for communications Nir Shlezinger, Nariman Farsad, Yonina Eldar and Andrea Goldsmith; 7. Constrained unsupervised learning for wireless network optimization Hoon Lee, Sang Hyun Lee and Tony Q. S. Quek; 8. Radio resource allocation in smart radio environments Alessio Zappone and Mérouane Debbah; 9. Reinforcement learning for physical layer communications Philippe Mary, Christophe Moy and Visa Koivunen; 10. Data-driven wireless networks: scalability and uncertainty Feng Yin, Yue Xu and Shuguang Cui; 11. Capacity estimation using machine learning Ziv Aharoni, Dor Zur, Ziv Goldfeld and Haim Permuter; Part II. Wireless Networks for Machine Learning: 12. Collaborative learning on wireless networks: an introductory overview Mehmet Emre Ozfatura, Deniz Gündüz and H. Vincent Poor; 13. Optimized federated learning in wireless networks with constrained resources Shiqiang Wang, Tiffany Tuor and Kin K. Leung; 14. Quantized federated learning Nir Shlezinger, Mingzhe Chen, Yonina Eldar, H. Vincent Poor and Shuguang Cui; 15. Over-the-air computation for distributed learning over wireless networks Mohammad Mohammadi Amiri and Deniz Gündüz; 16. Federated knowledge distillation Hyowoon Seo, Seungeun Oh, Jihong Park, Seong-Lyun Kim and Mehdi Bennis; 17. Differentially private wireless federated learning Dongzhu Liu, Amir Sonee, Stefano Rini and Osvaldo Simeone; 18. Timely wireless edge inference Sheng Zhou, Wenqi Shi, Xiufeng Huang and Zhisheng Niu.

    15 in stock

    £75.99

  • Software Defined Networks

    Elsevier Science Software Defined Networks

    Out of stock

    Book SynopsisTrade Review"The editing in general is very good. The figures are very clearly drawn…The authors have done a good job with this up-to-date book for anyone interested in SDN."--Computing ReviewsTable of Contents1. Introduction2. Why SDN?3. Genesis of SDN4. How SDN Works5. The OpenFlow Specification6. Alternative Definitions of SDN7. Emerging Protocol, Controller, and Application Models8. SDN in the Data Center9. SDN in Other Environments10. Network Functions Virtualization11. Players in the SDN Ecosystem12. SDN Applications13. SDN Open Source14. Business Ramifications15. SDN Futures

    Out of stock

    £40.84

  • Network Algorithmics

    Elsevier Science & Technology Network Algorithmics

    15 in stock

    Book SynopsisTable of ContentsPart I: Rules of the Game 1. Introducing Network Algorithmics 2. Network Implementation Models 3. Fifteen Implementation Principles 4. Principles in Action Part II: Playing with Endnodes 5. Copying Data 6. Transferring Control 7. Maintaining Timers 8. Demultiplexing 9. Protocol Processing Part III: Playing with Routers 10. Exact-Match Lookups 11. Prefix-Match Lookups 12. Packet Classification 13. Switching 14. Scheduling Packets 15. Routers as Distributed Systems Part IV: Endgame 16. Measuring Network Traffic 17. Network Security 18. Conclusions Appendix: Detailed Models

    15 in stock

    £62.06

  • Quantum Communication Quantum Networks and

    Elsevier Science Quantum Communication Quantum Networks and

    Out of stock

    Book SynopsisTable of Contents1. Introduction 2. Detection theory, information theory, and channel coding fundamentals 3. Quantum information processing fundamentals 4. Quantum information theory 5. Quantum detection and gaussian quantum information theories 6. Quantum key distribution (QKD) 7. Quantum error correction fundamentals 8. Quantum stabilizer codes and beyond 9. Quantum LDPC codes 10. Quantum networks 11. Quantum sensing 12. QIP and machine learning (ML) 13. Fault-tolerant QEC

    Out of stock

    £103.50

  • Network Programmability with YANG

    Pearson Education (US) Network Programmability with YANG

    Book Synopsis Benoît Claise, CCIE No. 2686, is a Cisco Fellow, working as an architect for embedded management. Areas of passion and expertise include Internet traffic monitoring, accounting, performance, fault, and configuration management. Benoît's area of focus these days is network automation with YANG as the data modeling language, NETCONF/RESTCONF, and telemetry as a feedback loop to solve intent-based networking. Benoît was IETF Operations and Management Area (OPS) co-director from 2012 to 2018, a period during which much of the data modeldriven management protocols, encoding, and data models were specified. He blogs on these topics on his web site http://www.claise.be/ and spends time on the yangcatalog.org developments. Benoît is a contributor to the IETF, with 35 RFCs in the area of NetFlow, IPFIX (IP Flow Information eXport), PSAMP (Packet Sampling), IPPM (IP Performance Metrics), YANG, MIB module, energy management, and networTable of ContentsIntroduction xxii1 The Network Management World Must Change: Why Should You Care? 2 Introduction 2 The Industry Has Changed: What Are the Trends? 6 Existing Network Management Practices and Related Limitations 24 Data Modeling Is Key for Automation 39 Interview with the Experts 48 Summary 52 References in This Chapter 53 Endnotes 532 Data Model—Driven Management 56 The Beginning: A New Set of Requirements 56 Network Management Is Dead, Long Live Network Management 59 YANG: The Data Modeling Language 61 The Management Architecture 69 Data Model—Driven Management Components 70 The Encoding (Protocol Binding and Serialization) 74 The Server Architecture: Datastore 77 The Protocols 78 The Programming Language 85 Telemetry 86 The Bigger Picture: Using NETCONF to Manage a Network 86 Interview with the Experts 91 Summary 93 References in This Chapter 93 Endnotes 943 YANG Explained 96 Introduction 96 Describe Your World of Data 96 Describing Possible Events 113 Separating Configuration from Operational Data 117 Constraints Keep Things Meaningful 122 Augmenting, Extending, and Possibly Deviating 142 Network Management Datastore Architecture (NMDA) 149 Interview with the Expert 154 Summary 156 References in This Chapter 1574 NETCONF, RESTCONF, and gNMI Explained 158 Introduction 158 NETCONF 158 RESTCONF 190 OpenConfig and gNMI 214 Interview with the Expert 225 Summary 227 References in This Chapter 2275 Telemetry Explained 230 Introduction 230 Data Model—Driven Telemetry 230 Moving Away from SNMP to Telemetry 232 Telemetry Use Cases 235 Telemetry Components 236 Telemetry Standard Mechanisms 242 Interview with the Experts 249 Summary 252 References in This Chapter 253 Endnotes 2536 YANG Data Modeling Developments in the Industry 256 Introduction 256 The Beginning: The IETF 256 Embracing YANG Throughout the Industry 263 The OpenConfig YANG Model 268 Industry Coordination Is Required 270 Interoperability Testing 272 Implementing More Than One YANG Model for a Specific Functionality 274 Interview with the Expert 275 Summary 278 References in This Chapter 279 Endnotes 2797 Automation Is as Good as the Data Models, Their Related Metadata, and the Tools: For the Network Architect and Operator 282 Introduction 282 Getting to Know the Structure of a YANG Module 283 Finding the Right Modules Using the YANG Catalog 287 Interacting with Devices 299 Interview with the Experts 331 Summary 335 Endnotes 3358 Automation Is as Good as the Data Models, Their Related Metadata, and the Tools: For the Module Author 336 Introduction 336 Designing Modules 336 Understanding Your Module’s Impact 349 Interview with the Expert 350 Summary 352 Endnotes 3529 Automation Is as Good as the Data Models, Their Related Metadata, and the Tools: For the Application Developer 354 Introduction 354 Working with YANG Modules 355 Interacting with the Network 366 Making YANG Language Native 373 Interview with the Expert 380 Summary 381 Endnotes 38210 Using NETCONF and YANG 384 Introduction 384 So the Story Goes 385 Top-Down Service Model 386 Bottom-Up Device Templates 392 Service Logic Connecting the Dots 394 Setting Up NETCONF on a Device 398 Discovering What’s on a Device 400 Managing Services 405 Manager Synchronization with Devices 413 Network-Wide Transactions 417 Interview with the Experts 425 Summary 42811 YANG Model Design 430 Introduction 430 Modeling Strategy 430 YANG Modeling Tips 433 Common YANG Mistakes 443 Backward Compatibility 457 Interview with the Experts 460 Summary 462 References in This Chapter 4639780135180396, TOC, 4/4/19

    £44.99

  • Open Radio Access Network ORAN Systems

    Academic Press Open Radio Access Network ORAN Systems

    Out of stock

    Book SynopsisTable of Contents1. Open radio access network overview 2. System components, requirements, and interfaces 3. Hardware system dimensioning 4. Hardware architecture choices 5. System software 6. User-plane application components 7. Wireless scheduling and Quality of Service optimization techniques 8. Synchronization in open radio access networks 9. Software performance 10. Interoperability and test 11. Differentiation by use case

    Out of stock

    £86.36

  • Information Systems

    Taylor & Francis Ltd Information Systems

    15 in stock

    Book SynopsisMost information systems textbooks overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required information systems course for business majors. For each topic covered, the text highlights key Take-Aways that alert students to material they will need to remember during their careers. Sections titled Where You Fit In and Why This Chapter Matters explain how the topics being covered will impact students on the job. Review questions, discussion questions, and summaries are also included. This second edition is updated to include new technology, along with a new running case study.Key features: Single-mindedly for business students who are not technical specialists Doesn’t try to prepare IS professionals; other courses will do that Stresses the enabling technologies and application areas that matter the most today Based on the author’s real-world eTable of ContentsTable of Contents Why Information Systems Matter in Business Role of Information Systems in Business information Systems Hardware Information Systems Software Data, Databases, and Database Management Information Networks Integrating the Organization Connecting with Customers and Suppliers Making Better Decisions Planning and Selecting Information Systems Developing Information Systems Managing Information Systems Index

    15 in stock

    £63.64

  • Strategic Information Management

    Taylor & Francis Strategic Information Management

    1 in stock

    Book SynopsisToday, there are few in senior management positions who can afford to ignore modern information technology, and few individuals who would prefer to be without it. Modern IT is key to organizational performance; yet we often assume the benefits will occur without forethought or effort. As managerial tasks become more complex, so the nature of the required information systems changes â from structured, routine support to ad hoc, unstructured, complex enquiries at the highest levels of management. If taken for granted, serious implications can arise for organizations.This fifth edition of Strategic Information Management has been brought fully up to date with recent developments in the management of information systems, including digital transformation strategy, the issues surrounding big data and algorithmic decision-making. The book provides a rich source of material reflecting recent thinking on the key issues facing executives, drawing from a wide range of contemporarTrade Review"This fifth edition of Strategic Information Management updates and extends a unique selection of theories and valuable practice insights, established in the previous editions, and offers a roadmap for executives navigating in the digital landscape and coping with the digitization challenges associated with organizational transformation. The book has the right balance of theoretical frameworks and practical insights. Taken together, the book reflects recent thinking regarding many of the key issues facing executives in getting the most out of their investments in information technology and digitalization initiatives, highlighting the complex strategy, organizational and governance issues involved." — IOANNA CONSTANTIOU, Copenhagen Business School, Denmark"I'm pleased the editors of Strategic Information Management have produced this 5th edition, which represents a major overhaul, including online supporting materials not available with prior editions. Particularly valuable is the amplification of theory in this edition – not theory for theory's sake, but rather practice-guiding theory; the implication being that we are all researchers and that complex matters demand research and unique approaches and solutions. I strongly encourage students and practitioners to assume an evidence-based practice perspective when reading and reflecting on these writings which, combined, provide a much-needed stimulus for critical thinking on these complex matters in what are challenging times." — GUY GABLE, Queensland University of Technology, Australia"The fifth edition of Strategic Information Management has great value in providing directions for practitioners and scholars towards an understanding of the strategic importance and managerial challenges of digital transformation in today’s organizations. With inputs from international scholars, the book offers really useful management frameworks and principles to help in understanding how organizations and industries are transformed by disruptive digital technologies." — CAROL HSU, Tongji University, China"This fifth edition of Strategic Information Management updates and strengthens what has long served as a vehicle through which current and future executives obtain a foundational understanding as well as pragmatic insights regarding a host of strategic and managerial issues associated with the digital transformation of organizations. As with the earlier editions, the authors refuse to fall into the too-often-taken route of providing readers with a handbook offering ‘one-size-fits-all’ practices and procedures – solutions which ultimately fail to align with the situations faced by readers. Instead, the editors successfully provide readers with exposures to critical themes and frameworks and to illustrations of how some of our brightest executives are applying these in addressing digitalization initiatives and challenges – providing readers with the capability to formulate workable solutions to many, if not most, of the situations they face in their digital transformation efforts." — ROBERT W. ZMUD, University of Oklahoma, USA"This fifth edition of Strategic Information Management updates and extends a unique selection of theories and valuable practice insights, established in the previous editions, and offers a roadmap for executives navigating in the digital landscape and coping with the digitization challenges associated with organizational transformation. The book has the right balance of theoretical frameworks and practical insights. Taken together, the book reflects recent thinking regarding many of the key issues facing executives in getting the most out of their investments in information technology and digitalization initiatives, highlighting the complex strategy, organizational and governance issues involved." – IOANNA CONSTANTIOU, Copenhagen Business School, Denmark"I'm pleased the editors of Strategic Information Management have produced this 5th edition, which represents a major overhaul, including online supporting materials not available with prior editions. Particularly valuable is the amplification of theory in this edition – not theory for theory's sake, but rather practice-guiding theory; the implication being that we are all researchers and that complex matters demand research and unique approaches and solutions. I strongly encourage students and practitioners to assume an evidence-based practice perspective when reading and reflecting on these writings which, combined, provide a much-needed stimulus for critical thinking on these complex matters in what are challenging times." – GUY GABLE, Queensland University of Technology, Australia"The fifth edition of Strategic Information Management has great value in providing directions for practitioners and scholars towards an understanding of the strategic importance and managerial challenges of digital transformation in today’s organizations. With inputs from international scholars, the book offers really useful management frameworks and principles to help in understanding how organizations and industries are transformed by disruptive digital technologies." – CAROL HSU, Tongji University, China"This fifth edition of Strategic Information Management updates and strengthens what has long served as a vehicle through which current and future executives obtain a foundational understanding as well as pragmatic insights regarding a host of strategic and managerial issues associated with the digital transformation of organizations. As with the earlier editions, the authors refuse to fall into the too-often-taken route of providing readers with a handbook offering ‘one-size-fits-all’ practices and procedures – solutions which ultimately fail to align with the situations faced by readers. Instead, the editors successfully provide readers with exposures to critical themes and frameworks and to illustrations of how some of our brightest executives are applying these in addressing digitalization initiatives and challenges – providing readers with the capability to formulate workable solutions to many, if not most, of the situations they face in their digital transformation efforts." – ROBERT W. ZMUD, University of Oklahoma, USATable of ContentsPart 1: Foundations to IS Strategy and Strategizing 1. Historical Approaches: Experiences in Information Systems Planning 2. Further Reflections: Reflections on Information Systems Strategizing 3. A Critique: On Confronting Some of the Common Myths of IS Strategy 4. Conceptual Developments: Further Developments in Information Systems Strategizing: Unpacking the Concept 5. Aligning Practices: Aligning in Practice: From Current Cases to a New Agenda Part 2: Digital Transformation and Organizational Transformation 6. Navigating digital transformation: How Big Old Companies Navigate Digital Transformation 7. Formulating a digital strategy: Options for Formulating a Digital Transformation Strategy 8. Building Digital Capabilities: How Lego Built the Foundations and Entreprise Capabilities for Digital Leadership 9. Chief Digital Officers: How Chief Digital Officers Promote the Digital Transformation of their Companies 10. Power Dynamics: Strategic Information Systems and Organizational Power Dynamics Part 3: Organizing and Governing the IS Function 11. Principles and models: Principles and Models for Organizing the IT Function 12. Managing in economic decline: How CIOs Manage IT during Economic Decline: Surviving and Thriving Amid Uncertainty 13. CIO profiles: CIO Leadership Profiles: Implications of Matching CIO Authority and Leadership Capability on IT Impact 14. Alternative roles for Chief Digital Officers: Three Types of Chief Digital Officers and the Reasons Organizations Adopt the Role 15. The IS organization: Rethinking the concept: Rethinking the Concept of the IS Organization Part 4: Some Current and Emerging Challenges 16. Opening strategy through social media: Social Media and the Emergence of Reflexiveness as a New Capability for Open Strategy 17. Organizational socialization and social media: An Affordance Perspective of Social Media and Organizational Socialization 18. Decision support systems failures: When Decision Support Systems Fail: Insights for Strategic Information Systems from Formula 1 19. Opportunities and challenges of datification: Strategic Opportunities (and Challenges) of Algorithmic Decision-Making: A Call for Action on the Long-Term Societal Effects of 'Datification' 20. Ethical issues: Ethical Issues in the Big Data Industry

    1 in stock

    £47.49

  • AI in Health

    Taylor & Francis AI in Health

    15 in stock

    Book SynopsisWe are in the early stages of the next big platform shift in healthcare computing. Fueled by Artificial Intelligence (AI) and the Cloud, this shift is already transforming the way health and medical services are provided.As the industry transitions from static digital repositories to intelligent systems, there will be winners and losers in the race to innovate and automate the provision of services. Critical to success will be the role leaders play in shaping the use of AI to be less artificial and more intelligent in support of improving processes to deliver care and keep people healthy and productive across all care settings.This book defines key technical, process, people, and ethical issues that need to be understood and addressed in successfully planning and executing an enterprise-wide AI plan. It provides clinical and business leaders with a framework for moving organizations from the aspiration to execution of intelligent systems to improve clinical, operationaTrade Review"Practical, insightful and a page turning read. Tom makes short work of the much-hyped topic of artificial intelligence, drawing on decades of experience to find the pattern between a series of case studies. This no nonsense book is a must read primer for those working in the healthcare system seeking to understand the impact of AI for the sector, or those entrepreneurial thinkers looking for the business opportunities this revolution will create."- Dr. Simon Kos, CEO, Next Practices and former Chief Medical Officer, Microsoft"Tom Lawry’s new book, "Artificial Intelligence in Healthcare - A Leader’s Guide to Winning in the Age of Intelligent Healthcare Systems" will be landing on real and virtual bookshelves in hospitals and health systems at a most opportune time. After a long incubation period and much hand-wringing about potential downsides of AI, the field is now ready for prime time in healthcare. Leaders in every aspect of the industry will find practical guidance in this concise and well-written book. That includes a clear and comprehensive breakdown of the many different technologies that comprise AI as well as a discussion of the myriad opportunities to leverage AI to improve not only clinical outcomes but workflows and processes in the many support functions that make a healthcare system work. The book will definitely help them cut through the morass of incomplete and sometimes conflicting information on AI and position themselves to lead the Intelligent Health Systems of the future…systems that will be powered by AI. I highly recommend this book."- Dr. Patricia Salber, CEO, The Doctor Weighs In"There is perhaps nothing is more profound than the impact AI will have on how healthcare is delivered in the future. In his new book, Artificial Intelligence in Health - A Leader’s Guide to Winning in the New Age of Intelligent Systems, Tom shares wisdom that comes from a lifetime of experience as a business leader and technologist in the health industry. He has traveled the globe gathering insights from some of the world’s most gifted experts. He examines how AI is being used in healthcare today, as well as where this powerful tech will take us in the future. There are both challenges and opportunities for AI in healthcare and Tom carefully examines both sides of the equation." - Dr. Bill Crounse, CIO, CMIO, Senior Director, Worldwide Heath, Microsoft Corporation (retired)."Mr Lawry’s book is a sensitively written analysis of the opportunities to use AI in healthcare whilst avoiding the pitfalls and the hype. He takes the reader through the key concepts and applies them to healthcare as only an expert in the three fields of health, technology and analytics can. Many people will be familiar with the background to the AI in health story and will struggle to know where to start and end their work. If you want to get the benefits of AI, then this book is for you. It will tell you want good looks like and how to navigate ethics, build a workforce, create new operating models and apply disruptive thinking. I loved it."- Paul Henderson, Regional Director EMIS Health, (UK)"Practical, insightful and a page turning read. Tom makes short work of the much-hyped topic of artificial intelligence, drawing on decades of experience to find the pattern between a series of case studies. This no nonsense book is a must read primer for those working in the healthcare system seeking to understand the impact of AI for the sector, or those entrepreneurial thinkers looking for the business opportunities this revolution will create."- Dr. Simon Kos, CEO, Next Practices and former Chief Medical Officer, Microsoft"Tom Lawry’s new book, "Artificial Intelligence in Healthcare - A Leader’s Guide to Winning in the Age of Intelligent Healthcare Systems" will be landing on real and virtual bookshelves in hospitals and health systems at a most opportune time. After a long incubation period and much hand-wringing about potential downsides of AI, the field is now ready for prime time in healthcare. Leaders in every aspect of the industry will find practical guidance in this concise and well-written book. That includes a clear and comprehensive breakdown of the many different technologies that comprise AI as well as a discussion of the myriad opportunities to leverage AI to improve not only clinical outcomes but workflows and processes in the many support functions that make a healthcare system work. The book will definitely help them cut through the morass of incomplete and sometimes conflicting information on AI and position themselves to lead the Intelligent Health Systems of the future…systems that will be powered by AI. I highly recommend this book."- Dr. Patricia Salber, CEO, The Doctor Weighs In"There is perhaps nothing is more profound than the impact AI will have on how healthcare is delivered in the future. In his new book, Artificial Intelligence in Health - A Leader’s Guide to Winning in the New Age of Intelligent Systems, Tom shares wisdom that comes from a lifetime of experience as a business leader and technologist in the health industry. He has traveled the globe gathering insights from some of the world’s most gifted experts. He examines how AI is being used in healthcare today, as well as where this powerful tech will take us in the future. There are both challenges and opportunities for AI in healthcare and Tom carefully examines both sides of the equation." - Dr. Bill Crounse, CIO, CMIO, Senior Director, Worldwide Heath, Microsoft Corporation (retired)."Mr Lawry’s book is a sensitively written analysis of the opportunities to use AI in healthcare whilst avoiding the pitfalls and the hype. He takes the reader through the key concepts and applies them to healthcare as only an expert in the three fields of health, technology and analytics can. Many people will be familiar with the background to the AI in health story and will struggle to know where to start and end their work. If you want to get the benefits of AI, then this book is for you. It will tell you want good looks like and how to navigate ethics, build a workforce, create new operating models and apply disruptive thinking. I loved it."- Paul Henderson, Regional Director EMIS Health, (UK)Table of ContentsPreface and Acknowledgements. Author. 1 The Future Is Not What It Used to Be. 2 The Rise of the Intelligent Health Consumer. 3 AI Is One Thing and Many Things. 4 From Gods to Geeks – A Brief History of AI. 5 Do Submarines Swim? 6 Creating Value Today with AI. 7 The Leadership Imperative. 8 When AI Meets HR. 9 Engaging Your Clinicians. 10 Making Radiologists More Rad. 11 Understanding and Managing the Ethics of AI. 12 The Role of the Cloud in AI. 13 Manage Your Data Estate Like Your Finances. 14 The Importance of Intelligent HIT Vendors. 15 From Aspiration to Execution. 16 The Road Ahead for AI. Index.

    15 in stock

    £37.99

  • CISO COMPASS

    CRC Press CISO COMPASS

    1 in stock

    Book Synopsis#1 Best Selling Information Security Book by Taylor & Francis in 2019, 2020, 2021, 2022, 2023, and 2024!2020 Cybersecurity CANON Hall of Fame WinnerTodd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2 Guide to the CISSP CBK, COBIT 5 for Information Security, and ISACA CSX Cybersecurity Fundamental Certification, is back with this new book incorporating practical experience in leading, building, and sustaining an information security/cybersecurity program.CISO COMPASS includes personal, pragmatic perspectives and lessons learned of over 75 award-winning CISOs, security leaders, professional association leaders, and cybersecurity standard setters who have fought the Table of ContentsSection 1: THE CISO ROAD MAP 1. CISO Role: Evolution or Revolution? 2. Cybersecurity Leadership and the McKinsey 7-S Framework Section 2: STRATEGY 3. Developing Strategy 4. Emerging Technologies and Trends Section 3: STRUCTURE 5. Cybersecurity Organization Structure 6. CISO Reporting Models Section 4: SYSTEMS 7. Leveraging the Incidents of Others 8. The Security Control Framework Maze 9. Risk Management Practices Section 5: SHARED VALUES 10. It’s the Law 11. Data Protection and Privacy Every CISO Must Know 12. Meaningful Policies and Procedures Section 6: STAFF 13. Multigenerational Workforce Team Dynamics Section 7: SKILLS 14. CISO Soft Skills Section 8: STYLE 15. The CISO and the Board of Directors

    1 in stock

    £42.74

  • The Complete Guide for CISA Examination

    Taylor & Francis Ltd (Sales) The Complete Guide for CISA Examination

    1 in stock

    Book SynopsisThe Complete Guide for CISA Examination Preparation delivers complete coverage of every topic on the latest release of the Certified Information Systems Auditor (CISA) exam. Designed to help candidates pass the CISA exam easily, it also serves as an ideal on-the-job reference.Table of ContentsContents· IntroductionChapter 1 Introduction to the CISA examination· The structure of the CISA exam· Becoming Certified· Experience requirements· Passing the Exam· CISA Job Practice Domains and task and knowledge statements· ISACA’s Code of Professional Ethics· The ISACA Standards· Continuous Professional EducationChapter 2: Domain 1—The Process of Auditing Information Systems· Knowledge Statements· Understanding the Fundamental Business Processes· Control principles related to controls in information systems· Risk-based audit planning and audit project management techniques· Quality of the internal control framework· Auditor understanding of the applicable laws· Evidence collection techniques· Domain One – exam tips· Domain One - Practice questions· Domain One – Review Questions and Hands on Exercise· Domain One - Answers to practice questions· Exercise 1 sample answerChapter 3: Domain 2—Governance and Management of IT· Governance in General· Resource Management· Project Management Tools· Auditor’s Role in the Project Management Process· Audit Risk Assessment· Audit Planning· Domain Two - practice questionsDomain Two – Review Questions and Hands on Exercise· Exercise 2 sample answer· Domain 2 Answers to practice questionsChapter 4: Domain 3— Information Systems Acquisition, Development and Implementation· Systems Acquisition· Systems Development· Systems Implementation· Systems Maintenance Review· Domain Three - practice questionsDomain Three – Review Questions and Hands on Exercise· Exercise 3 sample answer· Domain 3 Answers to practice questionsChapter 5: Domain 4— Information Systems Operations, Maintenance and Service Management· Hardware· Auditing Operating Systems· People· System interfaces· Change Management· Auditing Change Control· Disaster Recovery Planning· Auditing Service Delivery· Domain Four - practice questions· Domain Four – Review Questions and Hands on Exercise· Exercise 4 sample answer· Domain 4 Answers to practice questionsChapter 6: Domain 5— Protection of Information Assets· Protection of information assets· Privacy principles· Design, implementation, maintenance, monitoring and reporting of security controls· Physical access controls for the identification, authentication and restriction of users· Logical access controls for the identification, authentication and restriction of users· Risk and controls associated with virtualization of systems· Risks and controls associated with the use of mobile and wireless devices· Encryption-related techniques and their uses· Public key infrastructure (PKI) components and digital signature techniques· Peer-to-peer computing, instant messaging, and web-based technologies· Data classification standards related to the protection of information assets· Risks in end-user computing· Implementing a security awareness program· Information system attack methods and techniques· Prevention and detection tools and control techniques· Security testing techniques· Penetration testing and Vulnerability scanning· Forensic investigation and procedures in collection and preservation of the data and evidence· Domain Five - practice questions· Domain Five – Review Questions and Hands on Exercise· Exercise 5 sample answer· Domain 5 Answers to practice questionsChapter 7— Preparing for the ExamAppendicesAppendix A: Glossary of TermsAppendix B: CISA Sample Exam – Choose any 150 questionsAppendix C: Sample Exam Answers

    1 in stock

    £35.14

  • Project Management Maturity Model

    CRC Press Project Management Maturity Model

    1 in stock

    Book SynopsisAssisting organizations in improving their project management processes, the Project Management Maturity Model defines the industry standard for measuring project management maturity and agile and adaptive capabilities.Project Management Maturity Model, Fourth Edition provides a roadmap showing organizations how to move to higher levels of organizational behavior, improving project success and organizational performance. It''s a comprehensive tool for enhancing project management practices, covering areas critical to organizational improvement, such as the project management office, management oversight, and professional development. It also provides methods for optimizing project management processes and suggestions for deploying the model as a strategic tool in improving business outcomes. New material in each chapter also outlines good practices for implementing adaptive an agile processes. The book also includes the Project Portfolio Management Maturity ModeTable of Contents1. Describing Project Management Maturity. 2. Definitions of Maturity Levels. 3. Project Integration Management. 4. Project Scope Management. 5. Schedule Management. 6. Cost Management. 7. Quality Management. 8. Resource Management. 9. Communications Management. 10. Risk Management. 11. Procurement and Vendor Management. 12. Project Stakeholder Management. 13. Now What? Using Your Maturity Assessment to Achieve Business Goals. Epilogue. Appendix A: Self-Assessment Survey. Appendix B: PPM Maturity Model. Appendix C: A Glossary of Terms for Adaptive/Agile Project Management. References. Index.

    1 in stock

    £37.04

  • OutcomeDriven Business Architecture

    CRC Press OutcomeDriven Business Architecture

    Out of stock

    Book SynopsisThis book discusses business architecture as a basis for aligning efforts with outcomes. It views BA as complementary to enterprise architecture, where the focus of technological initiatives and inventories is to understand and improve business organization, business direction, and business decision-making. This book provides a practical, long-term view on BA. Based on the authors'' consulting experience and industrial research, the material in this book is a valuable addition to the thought processes around BA and EA. The lead author has direct and practical experience with large clients in applying APQC capability framework for undertaking multiple enterprise-wide capability assessments.Table of ContentsList of FiguresList of TablesAcknowledgmentsForewordPrefaceAuthorsSection A CONCEPTS AND ODBA FRAMEWORK1 Business Strategies and Outcome-Driven Business Architecture2 Developing Business Architecture I—Capabilities and Challenges3 Developing Business Architecture—II4 Building and Assessing Business Capabilities—I5 Implementing Business Capabilities—II6 Metrics and Measurements with Outcome-Driven Business Architecture7 Governance, Risk, and Compliance and QualitySection B PRACTICE AND TOOLS8 Establishing and Managing the Business Architecture Practice9 ODBA, Big Data, and a Functioning Agile OrganizationSection C CASE STUDIES10 Business Architecture and Capability Case Study 1—Manufacturing Industry11 ODBA and Capability-Building Case Study 2—Energy Market12 Business Architecture and Capability Case Study 3—Government ServicesBibliographyIndex

    Out of stock

    £40.84

  • Software Testing

    Taylor & Francis Ltd Software Testing

    1 in stock

    Book SynopsisThis updated and reorganized Fifth edition of Software Testing: A Craftsman''s Approach continues to be a valuable reference for software testers, developers, and engineers, by applying the strong mathematics content of previous editions to a coherent treatment of software testing. Responding to instructor and student survey input, the authors have streamlined chapters and examples. The Fifth Edition: Has a new chapter on feature interaction testing that explores the feature interaction problem and explains how to reduce tests Uses Java instead of pseudo-code for all examples including structured and object-oriented ones Presents model-based development and provides an explanation of how to conduct testing within model-based development environments Explains testing in waterfall, iterative, and agile software development projects Explores test-driven development,Table of ContentsPart I. A Mathematical Context. Chapter 1. A Perspective on Testing. Chapter 2. Examples. Chapter 3. Discrete Math for Testers. Chapter 4. Graph Theory for Testers. Part II. Unit Testing. Chapter 5. Boundary Value Testing. Chapter 6. Equivalence Class Testing. Chapter 7. Decision Table-Based Testing. Chapter 8. Code-Based Testing. Chapter 9 Testing Object-Oriented Software. Chapter 10. Retrospective on Unit Testing. Part III. Beyond Unit Testing. Chapter 11. Life Cycle-Based Testing. Chapter 12. Integration Testing. Chapter 13. System Testing. Chapter 14. Model-Based Testing. Chapter 15. Software Complexity. Chapter 16. Testing Systems of Systems. Chapter 17. Feature Interaction Testing. Chapter 18. Case Study: Testing Event-Driven Systems. Chapter 19. A Closer Look at All Pairs Testing. Chapter 20. Software Technical Reviews. Chapter 21. Epilogue: Software Testing Excellence.

    1 in stock

    £37.95

  • Computer and Cyber Security

    CRC Press Computer and Cyber Security

    Out of stock

    Book SynopsisThis is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.Table of Contents1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse. 5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6 Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETs. 8 Security in Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection Techniques: A Review. 10 Overview of Smartphone Security: Attack and Defense Techniques. 11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues. 12 Medical Image Enhancement Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes. 21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures. 22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective. 23 A Compendium of Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime.

    Out of stock

    £142.50

  • PMPÂ Exam Preparation

    Taylor & Francis Inc PMPÂ Exam Preparation

    5 in stock

    Book SynopsisFully updated to be aligned with the Project Management Body of Knowledge (PMBOK Guide), Sixth Edition, this study guide is structured per the PMP Examination Content Outline (ECO), 2015 edition, which is the blueprint for the PMP exam. The study guide has a chapter of 50 questions for each performance domain in the ECO: initiating, planning, executing, monitoring and controlling, and closing. The study guide also provides access to a 200-question on-line test that simulates the experience of taking the actual PMP examination. Table of ContentsAcronymsIntroduction1Project Integration Management2Project Scope Management3Project Schedule Management4Project Cost Management5Project Quality Management6Project Resource Management7Project Communications Management8Project Risk Management9Project Procurement Management10Project Stakeholder Management11Practice Test12Appendix13References

    5 in stock

    £61.74

  • Applied Software Risk Management

    Taylor & Francis Ltd Applied Software Risk Management

    Out of stock

    Book SynopsisFew software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis. Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management proceTable of ContentsRisk Culture. Risk Management Process. Risk Attributes. Risk Identification. Risk Analysis. Responding To Risk. Risk Tracking. Risk Models. Risk Intelligence. Feed Forward. Integrated Risk Management. Risk Management: Draft Procedures.

    Out of stock

    £99.75

  • Outsourcing Software Development Offshore

    Taylor & Francis Ltd Outsourcing Software Development Offshore

    1 in stock

    Book SynopsisIn Offshore Software Development: Making It Work, hands-on managers of Offshore solutions help you answer these questions:What is Offshore and why is it an IT imperative? What do you need to do to successfully evaluate an Offshore solution? How do you avoid common pitfalls? How do you confront security and geopolitical risk? How do you handle issues related to displaced workers? The author applies her considerable experience in the analysis of such Offshore issues as the financial growth of the Offshore industry, keys to success in initiating a program, choosing and managing vendors, risk mitigation, and employee impacts. A detailed program checklist outlines the steps for successful Offshore execution, providing real-world exposure and guidance to a movement that has become a fixture in the IT realm. About the AuthorTandy Gold is a 20-year veteran of the technology industry who is focused on entrepreneuTable of ContentsTHE OFFSHORE IMPERATIVE. Crunching the offshore numbers: What the financials portend. Getting started in offshore. Choosing an offshore vendor: A look at the offshore maturity model. A HANDS-ON OFFSHORE PROGRAM MANAGEMENT TOOLKIT. Choosing locations for offshore: Country pros and cons. The offshore program checklist: What's really different? THE OFFSHORE PROGRAM CHALLENGE. Managing employee impact: Villain or savior? Managing risk through an offshore network security architecture. Putting it all together: Top 10 Do's and Don'ts of Offshore.

    1 in stock

    £99.75

  • The HandsOn Project Office

    Taylor & Francis Ltd The HandsOn Project Office

    1 in stock

    Book SynopsisEconomic pressures have forced IT executives to demonstrate the immediate and calculable ROI of new technology deployments. Unfortunately, existing IT service delivery often drifts without serious thought as to how process improvements could lead to higher performance and customer satisfaction. The Hands-On Project Office: Guaranteeing ROI and On-Time Delivery offers the proven processes, techniques, and tools that IT managers can use to immediately improve the delivery of IT products and services. This compendium of best practices and practical recommendations details simple, deployable frameworks, practical tools, and time-tested best practices for successful IT service and project delivery management. Recognizing how your tech staff can do more with less, this practitioner''s handbook describes how you can better coordinate work efforts, hold project teams accountable, and communicate and demonstrate the importance of IT services to your company as a whole. By explaiTrade Review"[This book] contains a lot of valuable information including links to an electronic library of the tools, templates, and examples cited in the text. … Additionally, it also serves as a handy compendium of best practices and practical recommendations. … It focuses on simple changes in organizational process that can lead to higher customer satisfaction. … [R]eaders are taken on a journey of exploration and an examination of one's own business context." - Software Quality ProfessionalTable of ContentsThe Three Pillars of IT Delivery-Problem Resolution, Service Requests, and Projects. The Project Management Office Business Model. Alignment and Planning-Doing the Right Things. Modeling and Managing Service Delivery. Project Delivery and the Project Management Life Cycle.Collecting and Capturing Business Requirements for IT Projects. Managing Lessons Learned-The Reuse and Repurposing of IT Organizational Knowledge: A Case Study. Architecting Success-The Role of Sensible IT Architecture Management in Successful Service Delivery: A Case Study. Conclusions-The ROI of the PMO. Appendices.

    1 in stock

    £114.00

  • UML for Developing Knowledge Management Systems

    Taylor & Francis Ltd UML for Developing Knowledge Management Systems

    Out of stock

    Book SynopsisUML for Developing Knowledge Management Systems provides knowledge engineers the framework in which to identify types of knowledge and where this knowledge exists in an organization. It also shows ways in which to use a standard recognized notation to capture, or model, knowledge to be used in a knowledge management system (KMS).This volume enables knowledge engineers, systems analysts, designers, developers, and researchers to understand the concept of knowledge modeling with Unified Modeling Language (UML). It offers a guide to quantifying, qualifying, understanding, and modeling knowledge by providing a reusable framework that can be adopted for KMS implementation.Following a brief history of knowledge management, the book discusses knowledge acquisition and the types of knowledge that can be discovered within a domain. It offers an overview of types of models and the concepts behind them. It then reviews UML and how to apply UML to model knowledge. The book conclTable of ContentsIntroduction. Knowledge management. Declarative knowledge. Procedural knowledge. Tacit knowledge. Explicit knowledge. Process knowledge and concept knowledge. Case-based reasoning. Knowledge modeling. UML - an introduction. Knowledge modeling with UML. Defining a knowledge acquisition framework. Business case: Department of motor vehicles reporting system. Applying your knowledge framework. Summary.

    Out of stock

    £99.75

  • The ROI from Software Quality

    Taylor & Francis Ltd The ROI from Software Quality

    15 in stock

    Book SynopsisThe ROI from Software Quality provides the tools needed for software engineers and project managers to calculate how much they should invest in quality, what benefits the investment will reap, and just how quickly those benefits will be realized. This text provides the quantitative models necessary for making real and reasonable calculations and it shows how to perform ROI analysis before and after implementing a quality program. The book demonstrates how to collect the appropriate data and easily perform the appropriate ROI analysis.Taking an evidence-based approach, this book supports its methodology with large amounts of data and backs up its positioning with numerous case studies and straightforward return-on-investment calculations. By carefully substantiating arguments, this volume separates itself from other works on ROI.Table of ContentsIntroduction. Measuring software quality. Software quality practices. The state of the practice. A software quality benchmark. Quality and the cost of ownership. Quality and the cost to developers. Quality and profitability. Calculating return-on-investment. Example ROI calculations. The quality of open source software. Making the business case.

    15 in stock

    £117.40

  • Eaches or Pieces Order Fulfillment Design and

    Taylor & Francis Ltd Eaches or Pieces Order Fulfillment Design and

    Out of stock

    Book SynopsisIf your business uses warehouses to deal with the sales of goods, then you know that facility operations, shipping, and customer service are important to your company''s health. Eaches or Pieces Order Fulfillment, Design, and Operations Handbook offers insights for warehouse, distribution, or logistics professionals to make their eaches or pieces order-fulfillment operation more efficient and cost effective as well as provide better customer service.Created for direct marketing and retail store fulfillment operators, this handbook emphasizes the skills and knowledge needed to design, organize, and execute an order-fulfillment operation or concept. The first chapter reviews order-fulfillment activities and distribution operations. The author then proceeds to discuss docking; design parameters; storage; pick, pack, and ship activities; and power stock keeping units (SKUs). The final chapter discusses trash removal, vendor-delivered unit of product (UOP) rework locations and flowsTable of ContentsOrder-Fulfillment Objective and Their Impact on a Company Profit and Customer Service. Receiving, Manifesting, Loading, and Shipping Concepts. Master Carton and Pallet Storage Concepts. Small Item and Flatwear Apparel Pick and Pack Activities. Customer Order Returns, Vendor Re-Work, and Trash Handling. Index.

    Out of stock

    £104.50

  • Strategic Software Engineering

    CRC Press Strategic Software Engineering

    1 in stock

    Book SynopsisThe pervasiveness of software in business makes it crucial that software engineers and developers understand how software development impacts an entire organization. Strategic Software Engineering: An Interdisciplinary Approach presents software engineering as a strategic, business-oriented, interdisciplinary endeavor, rather than simply a technical process, as it has been described in previous publications.The book addresses technical, scientific, and management aspects of software development in a way that is accessible to a wide audience. It provides a detailed, critical review of software development models and processes, followed with a strategic assessment of how process models evolved over time and how to improve them. The authors then focus on the relation between problem-solving techniques and strategies for effectively confronting real-world business problems. They also analyze the impact of interdisciplinary factors on software development, including the role of peopTable of ContentsThe process and its models. Strategies for solving software problems. Interdisciplinary factors in software development.

    1 in stock

    £114.00

  • The Insiders Guide to Outsourcing Risks and

    Taylor & Francis Ltd The Insiders Guide to Outsourcing Risks and

    1 in stock

    Book SynopsisIt is essential for a corporation to not only survive but thrive in today's global outsourcing environment. The Insider's Guide to Outsourcing Risks and Rewards is a comprehensive and accessible resource that assists an organization in deciding whether it will benefit from pursuing-or not pursuing-such an endeavor. The author, an 18-year veteran of the IT industry, is an experienced consultant, software developer, manager, and entrepreneur. Providing an authoritative and unbiased view, he helps the reader navigate through a number of offshore outsourcing issues related to software management and international business. He examines the potential benefits derived from offshore outsourcing, as well as the possible pitfalls and how to avoid them as they apply to an organization's particular situation.Offering a unique combination of technical and political insight, The Insider's Guide to Outsourcing Risks and Rewards is the one resource to have when trying to figure out Table of ContentsIntroduction. Drivers. Costs. Countries. Partners. Stakeholders. Business Architectures. Selecting Suitable Projects. Contracts. Espionage.

    1 in stock

    £95.00

  • Global Software Development Handbook

    Taylor & Francis Ltd Global Software Development Handbook

    1 in stock

    Book SynopsisEconomics and technology have dramatically re-shaped the landscape of software development. It is no longer uncommon to find a software development team dispersed across countries or continents. Geographically distributed development challenges the ability to clearly communicate, enforce standards, ensure quality levels, and coordinate tasks. Global Software Development Handbook explores techniques that can bridge distances, create cohesion, promote quality, and strengthen lines of communication. The book introduces techniques proven successful at international electronics and software giant Siemens AG. It shows how this multinational uses a high-level process framework that balances agility and discipline for globally distributed software development. The authors delineate an organizational structure that not only fosters team building, but also achieves effective collaboration among the central and satellite teams. The handbook explores the issues surrounding quality and the Table of ContentsINTRODUCTION. Motivation. Critical Success Factors for Global Software Development. PLANNING. Requirements Engineering. Requirements for the Architecture. Architecture. Risk Analysis. Project Planning Process. Project Estimation. ORGANIZATION STRUCTURE. Software Development Teams. Supplier Manager. MONITORING AND CONTROL. Quality Assurance. Infrastructure Support for Global Software Development. Communication. CASE STUDIES. GSP 2005. DPS2000. FS2000. BAS. CONCLUDING REMARKS. Conclusions. Index.

    1 in stock

    £90.24

  • Point and Figure Charting The Essential

    Taylor & Francis Inc Point and Figure Charting The Essential

    Out of stock

    Book SynopsisAfter the Y2K Fireworks focuses on the business and technical aspects of surviving the year 2000 problem - from an author conversant with both business (particularly financial) and computer professionals.More companies than not will fail to prevent the problems arising from this potential programming disaster. After the Y2K Fireworks addresses this part of the market - putting the problem in perspective and examining all the various organizational and technical issues required to rebuild.Table of ContentsThe Fireworks The Schizophrenic Enterprise Strategic Advantage of Y2K Resurrection Process Discipline for Y2K Resurrection The Y2K Resurrection Process Technology in Year 2000 The Technological Process Methodology in Year 2000 The Methodological Process Sociology in Year 2000 The Sociological Process Distributed Architecture in Y2K Resurrection Processes from Ashes Testing Strategies for Y2K Processes The Adwait Enterprise in Year 2000

    Out of stock

    £78.84

  • Defining and Deploying Software Processes

    Taylor & Francis Ltd Defining and Deploying Software Processes

    Out of stock

    Book SynopsisDefining and Deploying Software Processes enables you to create efficient and effective processes that let you better manage project schedules and software quality. The author''s organized approach details how to deploy processes into your company''s culture that are enthusiastically embraced by employees, and explains how to implement a Web-based process architecture that is completely flexible and extensible.Divided into four sections, the book defines the software process architectural model, then explores how this model is implemented. It addresses both the importance of the Web in deploying processes and the importance of a version-controlled repository tool for process management. The third section examines the use of the software process model. The author focuses on classes of process users, metrics collection and presentation, schedule creation and management, earned value, project estimation, time-card charging, subcontract management, and integrated teaming.<Table of ContentsThe Software Process Model. Implementing the Software Process Model. Using the Software Process Model. Deploying the Software Process Model.

    Out of stock

    £95.00

  • Information Technology And Organisational Change

    Taylor & Francis Ltd Information Technology And Organisational Change

    1 in stock

    Book SynopsisThis book is a small contribution towards the development of a more user-centred approach to information technology design methods. It discusses the job design and organisational change issues in the planning domain when information technology systems are being contemplated.Table of Contents1. The Challenge of Information Technology 2. The Achievement of Benefits from Information Technology 3. Systems Design Methods and Organisational change 4. Towards the Socio- Technical Design of Information Technology Systems 5. Designing the Design and Implementation Process 6. Specifying the System 7. Organisational Change and Job Design 8. Designing the Technical System for Human Use 9. Implementation and Support 10. User Evaluation 11. Information Technology Strategies

    1 in stock

    £78.84

  • Introduction to Healthcare Information

    Taylor & Francis Inc Introduction to Healthcare Information

    1 in stock

    Book SynopsisIntroduction to Health Care Management is a concise, reader-friendly, introductory healthcare management book that covers a wide variety of healthcare settings, from hospitals to nursing homes and clinics. Filled with examples to engage the reader''s imagination, the important issues in healthcare management, such as ethics, cost management, strategic planning and marketing, information technology, and human resources, are all thoroughly covered. Guidelines and rubrics along with numerous case studies make this text both student-friendly and teacher friendly. It is the perfect resource for students of healthcare management, nursing, allied health, business administration, pharmacy, occupational therapy, public administration, and public health. Trade Review"Drs. Buchbinder and Shanks have done a masterful job in selecting topics and authors and putting them together in a meaningful and coherent manner. Each chapter of the book is designed to give the student the core content that must become part of the repertoire of each and every healthcare manager, whether entry level or senior executive. Each of the chapters and accompanying cases serve to bring to life what it means to be a truly competent healthcare manager."--Leonard H. Friedman, PhD, MPA, MPH, George Washington University, School of Public Health and Health Services I am very happy with Health Care Management and will be adopting it for a new course that I will be teaching. This is probably the best management text I have seen so far. I was thrilled to receive it."--Sally K. Fauchald, PhD, RN, Assistant Professor of Nursing, The College of St. Scholastica "A solid text that covers a wide range of management topics."--Michael H. Sullivan, Methodist University, Fayetteville, North Carolina

    1 in stock

    £60.79

  • Cloud Computing A HandsOn Approach

    Vijay Madisetti Cloud Computing A HandsOn Approach

    15 in stock

    15 in stock

    £34.00

  • Blockchain

    Taylor & Francis Ltd Blockchain

    1 in stock

    Book SynopsisBlockchain: A Hype or a Hoax? fills a gap in the book market to provide material that is not only technical but also caters to business readers. This book was written to keep in mind various stakeholders and the current gap in blockchain education as well as use case implementation.This book reviews blockchain technology, discusses why proof of concept fails, offers examples of use cases that have been successful and that have failed and articulates a framework that should be used before deciding whether blockchain is the right technology for transformation. It uses strategic models and frameworks to assist organisations to see a fit score for their specific use cases.This book provides guidance on how to create a blockchain strategy and a business case to pitch for the budget. It also includes a case study to apply the knowledge on practical use cases for blockchain and a technical overview of most of the blockchain use cases in the market including crypto, non-fungible tokens, decentralised finance, and decentralised autonomous organisations, as well as financial and non-financial industry use cases.This book also provides a detailed overview of most of the mainstream blockchain products currently available in the market. It also offers guidance on how readers can best educate themselves on blockchain technology that is available through commercial and free resources.It concludes with a clear direction on selecting blockchain to solve real-life use cases that are best fit. A financial and non-financial value-adding framework is discussed throughout this book to assist business leaders, programme managers, product managers and information technology leaders to make strategic choices, and business cases and develop strategies for digital transformation through the use of blockchain.The distinctive feature of this book is the critical analysis of blockchain from a technology and business perspective. This is the first book to focus on business, technology and blockchain selection framework. The most unique feature of this book would be to apply Michael Porterâs competitive advantage strategy theory on blockchain use cases and their impact on companies.This book is aimed at technology students, technology professionals, blockchain and fintech consultant and business leaders. It will also be useful for readers who are building a business case to adopt blockchain into an organisation or are seeking to grow their knowledge of blockchain and improve their fintech strategy.Table of Contents1 Blockchain: Is it a hype or a hoax?2 Blockchain products3 Blockchain: Is it hype?4 Blockchain: Is it a hoax?5 Blockchain framework: A model to assess the Blockchain for Business use case6 Blockchain strategies7 Blockchain business cases: A framework to produce a business case for blockchain8 Blockchain case study: Apply concepts on practical use case9 Conclusion

    1 in stock

    £31.34

  • Ethical Digital Technology in Practice

    CRC Press Ethical Digital Technology in Practice

    1 in stock

    Book SynopsisThis is an important book. Ethics is not an easy topic, and arguably the ethics of IT is less sonot leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . . . Use this book as a practical resource, an informative and educational source of material in developing expertise, but also as an invaluable toolkit to support practical application of ethical thinking. Declan Brady, President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics SocietiesDigital technology is about people. It is about those who plan, develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which Table of Contents1. Setting the Scene. 2. Data and Information. 3. Systems and Applications. 4. Practice and Method. 5. Regulation and Policy . 6. Practical Considerations. 7. Synthesis.

    1 in stock

    £50.34

  • Cybersecurity Operations and Fusion Centers

    Taylor & Francis Ltd Cybersecurity Operations and Fusion Centers

    15 in stock

    Book SynopsisCybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy by Dr. Kevin Lynn McLaughlin is a must-have resource for anyone involved in the establishment and operation of a Cybersecurity Operations and Fusion Center (SOFC). Think of a combination cybersecurity SOC and cybersecurity Threat Intelligence Center (TIC). In this book, Dr. McLaughlin, who is a well-respected cybersecurity expert, provides a comprehensive guide to the critical importance of having an SOFC and the various options available to organizations to either build one from scratch or purchase a ready-made solution. The author takes the reader through the crucial steps of designing an SOFC model, offering expert advice on selecting the right partner, allocating resources, and building a strong and effective team. The book also provides an in-depth exploration of the design and implementation of the SOFC infrastructure and toolset, including the use of virtual tools, the physicalTable of ContentsPart I. Building and Deployment, 1. What Is a Cybersecurity Operations and Fusion Center (SOFC) and Why Do You Need One?, 2. Designing the SOFC Model, 3. SOFC: Building the Core Team, Part II. Tools and Operations, 4. SOFC Infrastructure and Toolset, 5. Cybersecurity Operations and Fusion Center: Daily Operations, 6. Foundations of Security Operations or SecOps, 7. Detection, Response, and Remediation, Part III. Reporting and Metrics, 8. SOFC Reporting, 9. SOFC Metrics, Part IV. Leadership Alignment and Support, 10. SOFC Alignment and Support, 11. Key Components of a Turnkey SOFC, 12. Conclusion

    15 in stock

    £42.74

  • The Lean Approach to Digital Transformation

    Taylor & Francis Ltd The Lean Approach to Digital Transformation

    1 in stock

    Book SynopsisThe Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users, whether they are customers or future customers. This ability combines observation, dialogue, and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach, according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly customer-centric, from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative -- the era of abundance, usages rate of change, complexity of experiences, and shift of power towards communities -- are easier, using digital tools and digital communities. 2. DevelopiTable of ContentsPart 1: Digital transformation: Customer orientation and homeostasis Chapter 1 Why a digital transformation? Chapter 2 Homeostasis: continuous adaptation to change Chapter 3 Lean Startup: Lean principles applied to co-creation Part II: Exponential information systems Chapter 4 The Information System as a foundation for digital transformation Chapter 5 Artificial intelligence and machine learning Chapter 6 Governance, architecture and situational potential Part III: Software platforms and service factories Chapter 7 DevOps and software factories Chapter 8 Putting platforms at the service of digital transformation Conclusion

    1 in stock

    £32.29

  • Information Asset Management

    Taylor & Francis Ltd Information Asset Management

    2 in stock

    Book SynopsisOrganisations are using data, information and knowledge as a competitive weapon. Their data, information and knowledge are arguably their most valuable assets. Yet, this fourth asset is managed badly when compared to the other three assets, namely money, people and infrastructure with considerable risk to the organisation. Executives are accountable for the success of their organisations, and those who don't manage this critical resource and business enabler effectively can be regarded as negligent. Information Assets carry enormous risk and value. Most boards and executives don't know how to govern and manage IAs effectively and nobody is held accountable. Given this, organisations should govern and manage their Information Assets the way they manage their Financial Assets. The benefits of managing IAs well are compelling. These benefits include increased efficiency, productivity, employee satisfaction, improved decision-making, mitigating business risk and improving product, proteTrade ReviewPrice and Evans have produced a ground-breaking, mind-altering book on how organizations and executives need to be thinking about and approaching information in their organizations, but why they regularly fail to do so. This perhaps is the most comprehensively researched and one of the most important books ever published on the topic of managing data as an actual enterprise asset and overcoming the persistent business pathology preventing it. - Douglas B. Laney, Innovation Fellow, West Monroe Partners, and author of Infonomics and Data Juice”If you think money, people, and infrastructure, are your only assets to manage, think again. It is impossible to manage any other asset well without managing the data, information, and knowledge which underly them and are assets in their own right. Price and Evans offer compelling arguments based on experience, the latest research, and industry leaders. Learn from them and put this book to work! - Danette McGilvray, President and Principal, Granite Falls Consulting, Inc. Author of Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information™, 2nd Ed. (Elsevier/Academic Press, 2021)At a time when everyone seems to have become an instant data expert and AI genius, it’s refreshing to read a rigorously researched and pragmatically laid out examination of this fundamentally important topic. In my view, it’s a prime example of the Australian MBA culture (minimum bullshit allowed) in action, and needs to be on everyone’s reading list. - Daragh O Brien, CEO, Castlebridge and Lecturer in Data Protection and Data Governance, UCD Sutherland School of Law.Recognizing data, information, and knowledge as assets and treating them as such may be the single most effective way a company can improve its strategic position. And doing so is an absolute necessity for those pursuing AI.- Thomas C. Redman, Ph. D., the Data Doc, Data Quality Solutions, Rumson, NJ USATable of ContentsIntroduction Chapter 1: Background/context Chapter 2: Benefits of Managing IAs Effectively Chapter 3: Executive Awareness Chapter 4: Business Environment Chapter 5: Leadership and Management Chapter 6: Asset Governance Chapter 7: Information Systems Chapter 8: Information Assets Behaviours Chapter 9: Information Asset Attributes and Quality Chapter 10: Information Asset Performance/Exploitation Chapter 11: Justification Chapter 12: Conclusion and Call to Action

    2 in stock

    £29.99

  • Information Technology and Organizational

    CRC Press Information Technology and Organizational

    1 in stock

    Book SynopsisBecause digital and information technology (IT) has become a more significant part of strategic advantage and workplace operations, information systems personnel have become key to the success of corporate enterprises, particularly with the pursuit of becoming more digital. This book focuses on the vital role that technology must play in the course of organizational development and learning and on the growing need to integrate technology, particularly digital technology, fully into the culture of all organizations. Fundamentally this fourth edition takes an even stronger position than the previous editions that organizational learning is crucial to the success of what has been coined digital transformation. Companies are struggling to understand what it means to be digital. Their technology personnel go far beyond the traditional IT staff into areas such as artificial intelligence (AI), machine learning (ML), and natural language processing (NL). These three functions now fall underTable of Contents1. The “Ravell” Corporation, 2. The IT dilemma, 3. Technology as a variable and responsive organizational dynamism, 4. Organizational learning theories and technology, 5. Managing organizational learning and technology, 6. Digital technology platforms and the future of work, 7. Virtual teams and outsourcing, 8. Organizational learning, IT, and technology disruptions, 9. Forming a cyber security culture, 10. Digital transformation and changes in consumer behavior, 11. Integrating multiple generations of employees to accelerate competitive advantage in the digital age, 12. Toward best practices, 13. Conclusion

    1 in stock

    £42.74

  • Computational Intelligence for Cybersecurity

    Taylor & Francis Ltd Computational Intelligence for Cybersecurity

    1 in stock

    Book SynopsisAs cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine learning and automatic natural language processing quickly provide the means to identify real threats and dramatically reduce response times. The book collects and reports on recent high-quality research addressing different cybersecurity challenges. It: explores the newest developments in the use of computational intelligence and AI for cybersecurity applications provides several case studies related to computational intelligence techniques for cybersecurity in a wide range of applications (smart health care, blockchain, cyber-physical system, etc.) integrates theoretical and practical aspects of computational intelligence for cybTable of ContentsSection 1 Big Data and Computational Intelligence for Cybersecurity Management and Applications Chapter 1 Applications of Big Data and Blockchain for Cybersecurity Management Challenges and Solutions - Swathi Lakkineni, Lo’ai Tawalbeh, and Izzat Alsmadi Chapter 2 Deep Learning Techniques for Cybersecurity Applications - Balakrishnan S, Aswin G, Mohan Babu Chowdary, V. Arulkumar Chapter 3 Deep Learning Techniques for Malware Classification - Mustapha Belaissaoui, Yassine Maleh, Soufyane Mounir Section 2 Computational Intelligence for Cybersecurity Applications Chapter 4 Machine Learning and Blockchain for Security Management in Banking System - Oshin Sharma, Nidhi Pandey Chapter 5 Machine Learning Techniques for Fault Tolerance Management - Harinahalli Lokesh Gururaj, Francesco Flammini, Beekanahalli Harish Swathi, Nandini Nagaraj, and Sunil Kumar Byalaru Ramesh Chapter 6 An efficient approach of Image Detection and Recognition using Artificial Intelligence in Cyber-Physical System - Musarrat Saberin Nipun, Rejwan Bin Sulaiman and Amer Kareem Section 3 Blockchain and Computational Intelligence for Cybersecurity Applications Chapter 7 Artificial Intelligence Incorporated in Business Analytics and Blockchain to Enhance Security - Mamata Rath, Subhranshu Sekhar Tripathy,Niva Tripathy, Chhabi Rani Panigrahi, Bibudhendu Pati Chapter 8 Blockchain solutions for Security and Privacy issues in Smart Healthcare - Pinky Bai, Sushil Kumar, Upasana Dohare Chapter 9 Algorithm for Trust in Ewom for Digital Systems - B.H. Khoi, B.V.Quang, N.V.T.Truong Chapter 10 Study of IoT Security for blockchain management: An application to data backup - Cédric Tala Kuate, Franklin Tchakounte, Jean Claude Kamgang Chapter 11 Blockchain Application for Cybersecurity in Cyber-physical Systems - Soufyane Mounir and Yassine Maleh Compilation of References About the Authors Index

    1 in stock

    £94.99

  • Big Data Analytics

    CRC Press Big Data Analytics

    1 in stock

    Book SynopsisWith this book, managers and decision makers are given the tools to make more informed decisions about big data purchasing initiatives. Big Data Analytics: A Practical Guide for Managers not only supplies descriptions of common tools, but also surveys the various products and vendors that supply the big data market.Comparing and contrasting the different types of analysis commonly conducted with big data, this accessible reference presents clear-cut explanations of the general workings of big data tools. Instead of spending time on HOW to install specific packages, it focuses on the reasons WHY readers would install a given package.The book provides authoritative guidance on a range of tools, including open source and proprietary systems. It details the strengths and weaknesses of incorporating big data analysis into decision-making and explains how to leverage the strengths while mitigating the weaknesses. Describes the benefits of distrTable of ContentsIntroduction. The Mother of Invention’s Triplets: Moore’s Law, the Proliferation of Data, and Data Storage Technology. Hadoop. HBase and Other Big Data Databases. Machine Learning. Statistics. Google. Geographic Information Systems. Discovery. Data Quality. Benefits. Concerns.

    1 in stock

    £42.74

  • The Practice of Corporate Governance

    Taylor & Francis Ltd The Practice of Corporate Governance

    1 in stock

    Book SynopsisAll corporate entities, from the largest multinational conglomerate to the smallest tennis club, need effective governance. Some features of corporate governance are basic, common to all corporate entities: every governing body needs to think strategically and set policies to supervise ongoing management activities to ensure the entity is financially viable and is achieving its objectives.Every corporate entity has a governing body, whether it is called a board of directors, a committee, a council, or anything else. Many people, when appointed to the governing body of an organisation, have little idea of what to expect and what is expected of them. Even those with board-level experience find that the culture and leadership style of other governing bodies differ. The aim of this book is to help them understand and improve their contribution to the organisation and governing body they serve. The book is a simple guide to the work of every board member.Each chapter concluTable of ContentsAcknowledgements. Prologue. Chapter 1 All Corporate Entities Need Corporate Governance. Chapter 2 Board Structure and Board Members. Chapter 3 The Role of the Board. Chapter 4 The Corporate Entity and Society. Chapter 5 Board Culture and the Challenge of the Chair. Chapter 6 The Effective Board. Chapter 7 The Effective Director. Chapter 8 Governance Issues in Different Types of Corporate Entities. Epilogue. Index.

    1 in stock

    £29.99

  • PKI Implementation and Infrastructures

    Taylor & Francis Ltd PKI Implementation and Infrastructures

    1 in stock

    Book SynopsisThe concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream. This is mostly because implementing a PKI is time consuming and difficult. Maintaining a PKI is equally time consuming and even more difficult within the real world of mergers and acquisitions against a backdrop of ever-changing technology. Many organisations simply give up and hand everything over to a third party who promises to manage everything on their behalf. This is generally not a good idea and simply delays the inevitability of failures and misunderstood complexity. This book explores all the aspects of implementing and maintaining a PKI that the other books on the subject seem to miss. It reflects decades of hard-won experience, not only in PKI, not only in IT, not only in electronics, but in business, government agencies and academia alike. The book also explores the existence of a PKI alongside other technologies, such as biometrics, and against an ever-changing world of development methodologies. This last point is particularly relevant at this time as we are in the middle of a quiet, but all encompassing revolution in this respect. Consequently, this is the one book on PKI that you have to have on your shelf, whether you be a company director, IT manager, government minister or teacher of IT. It is the book which fills in all the gaps left in the literature and treads paths which others fear to tread. You will enjoy it enormously if you are from an IT background.Table of Contents1. What exactly is a PKI? The original concept, 2. How does PKI work? The nuts and bolts of PKI, 3. What are the primary applications for a PKI? How applications are changing, 4. What exactly is a digital certificate? The contents of a certificate, 5. What about encryption? How a public key infrastructure is used for encryption, 6. Biometrics and PKI: The possibilities of biometric certificates, 7. What is the conventional wider infrastructure? Different infrastructure models explained, 8. Kubernetes, containers and PKI: The container model and its implications for PKI, 9. Trust and certificates: The original concept has changed, 10. How may a localised infrastructure work? Keeping things simple, 11. What happens when certificates expire? What can go wrong?, 12. How do we ensure that certificates do not expire? Methodologies for security, 13. How does the human interaction work? Managing things manually, 14. Can we organise everything ourselves? Understanding what to do, 15. How long does it take to implement a proper PKI? Understanding the scale of the problem, 16. What skills are required for operational personnel? Understanding associated technologies, 17. How do we embed a PKI culture in the workplace? Communication, 18. How do we keep it working as we grow? Planning and documentation, 19. What happens if we acquire other companies? Merging public key infrastructures, 20. Who should be responsible for it all? Accountability, 21. PKI, the cloud and the Internet of things: What we should understand, 22. PKI and the global financial industry: The reliance upon a large-scale public key infrastructure, 23. PKI and government legislation: Ensuring that legislation is compatible, 24. Consequences: What happens when it all goes wrong

    1 in stock

    £33.24

  • Acquiring Card Payments

    Taylor & Francis Ltd Acquiring Card Payments

    1 in stock

    Book SynopsisThis book delves into the essential concepts and technologies of acquiring systems. It fills the gap left by manuals and standards and provides practical knowledge and insight that allow engineers to navigate systems as well as the massive tomes containing standards and manuals. Dedicated to card acquiring exclusively, the book covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data security standards in the payment card industry Validation algorithms Code tables Basic cryptography Pin block formats and algorithms When necessary the book discusses issuer-side features or standards insomuch as they are required for the sake of completeness. For example, protocols such as EMV 3-D Secure are not covered to the last exhaustiTable of Contents1. Overview of Card Payments Industry. 2. Card-Present Technology. 3. Card-Not-Present Environment. 4. Contact Chip Transactions. 5. Disputes, Arbitration, and Compliance. 6. Data Security Standards in Payment Card Industry. 7. Key Management with Hardware Security Modules (HSMs). 8. Other Payment Methods.

    1 in stock

    £40.84

  • Project Management in Extreme Situations

    Taylor & Francis Ltd Project Management in Extreme Situations

    2 in stock

    Book SynopsisThe growing complexity of projects today, as well as the uncertainty inherent in innovative projects, is making obsolete traditional project management practices and procedures, which are based on the notion that much about a project is known at its start. The current high level of change and complexity confronting organizational leaders and managers requires a new approach to projects so they can be managed flexibly to embrace and exploit change. What once used to be considered extreme uncertainty is now the norm, and managing planned projects is being replaced by managing projects as they evolve. Successfully managing projects in extreme situations, such as polar and military expeditions, shows how to manage successfully projects in today's turbulent environment. Executed under the harshest and most unpredictable conditions, these projects are great sources for learning about how to manage unexpected and unforeseen situations as they occur. This book presents multTable of ContentsForeword. Introduction: Blowing Hot and Cold on Project Management. A Polar Expedition Project and Project Management. Ambidexterity as a Project Leader Competency: A Comparative Case Study of Two Polar Expeditions. Mobilization and Sensibility on Polar Expeditions: More than Mere Motivation. Mobilizing Social Networks beyond Project Team Boundaries: The Case of Polar Expeditions. A Methodology for Investigating the "Actual" Course of a Project: The Case of a Polar Expedition. A Traditional Cree Expedition on the Ancestral Lands of the Neeposh Family of Northern Québec. Borrowing Concepts from Expedition Travel to Stimulate Alternative Tourism. The Project Front End: Financial Guidance Based on Risk. Lessons Learned from Sports Climbing: Some Disrespectful Discourse on Project Planning. Managing Extreme Situations in Fire and Rescue Organizations: The Complexity in Implementing Feedback. Coordination Practices in Extreme Situations: Lessons from the Military. Developing Collective Competence in Extreme Project Teams: The French Special Forces Case. Situated Teams: Dropping Tools on Mount Everest. Planning Risk and Cool Heads: Survival Conditions Required for Managing Projects. Flexibility and Rigidity in Planning a Program: The Case of the Montreal Metro Renovation Project. Project Manager: Specialist or Generalist? Project Management and the Unknown. Control and Flexibility: Which Balance Do We Mean? Conclusion. Epilog. Afterword: Looking for the Ordinary in the Extraordinary! Index.

    2 in stock

    £40.84

  • Elements of Digital Transformation

    Taylor & Francis Ltd Elements of Digital Transformation

    15 in stock

    Book SynopsisElements of Digital Transformation is a practitioner's guide to the digital transformation process. It is also a guide for managers in today's organizations that are accelerating digital transformation to modernize core technology capabilities and processes. The book discusses such key components of digital transformation as processes, principles and proven methods. It also covers such novel concepts in digital transformation as the first-time right framework, incident management transformation, digital factory, cloud migration, API-first approach and legacy modernization. Other highlights of the book include: A cloud migration framework along with a cloud migration methodology, rollout strategy and migration principles Principles and approaches for legacy modernization and process modernization Smart ticket management, smart problem management, proactive maintenance and ticket-avoidance architecture The novel digital factory approTable of ContentsPART I DIGITAL TRANSFORMATION INTRODUCTION 1. An Introduction to Digital Transformation 2. Digital Transformation Framework PART II MIGRATION AND MODERNIZATION 3. Legacy Modernization 4. Cloud Migration PART III DIGITAL TRANSFORMATION OF TECHNOLOGY 5. Services Transformation 6. Digital Factory for Digital Transformation 7. First Time Right Methodology in Digital Transformations 8. Experience Transformation 9. Transforming the Platform Performance 10. AI and Digital Transformation. PART IV DIGITAL TRANSFORMATION OF PROCESS 11. Agile Delivery in Digital Transformation 12. Digital Transformation of Incident Management Process PART V DIGITAL TRANSFORMATION OF OPERATIONS 13. Digital Transformation Operations 14. Automation through DevSecOps PART VI DIGITAL TRANSFORMATION CASE STUDIES 15. Digital Transformation Case Studies 16. Digital Transformation of Intranet Platforms

    15 in stock

    £42.74

  • Information Asset Management

    Taylor & Francis Ltd Information Asset Management

    1 in stock

    Book SynopsisOrganisations are using data, information and knowledge as a competitive weapon. Their data, information and knowledge are arguably their most valuable assets. Yet, this fourth asset is managed badly when compared to the other three assets, namely money, people and infrastructure with considerable risk to the organisation. Executives are accountable for the success of their organisations, and those who don't manage this critical resource and business enabler effectively can be regarded as negligent. Information Assets carry enormous risk and value. Most boards and executives don't know how to govern and manage IAs effectively and nobody is held accountable. Given this, organisations should govern and manage their Information Assets the way they manage their Financial Assets. The benefits of managing IAs well are compelling. These benefits include increased efficiency, productivity, employee satisfaction, improved decision-making, mitigating business risk and improving product, proteTrade ReviewPrice and Evans have produced a ground-breaking, mind-altering book on how organizations and executives need to be thinking about and approaching information in their organizations, but why they regularly fail to do so. This perhaps is the most comprehensively researched and one of the most important books ever published on the topic of managing data as an actual enterprise asset and overcoming the persistent business pathology preventing it. - Douglas B. Laney, Innovation Fellow, West Monroe Partners, and author of Infonomics and Data Juice”If you think money, people, and infrastructure, are your only assets to manage, think again. It is impossible to manage any other asset well without managing the data, information, and knowledge which underly them and are assets in their own right. Price and Evans offer compelling arguments based on experience, the latest research, and industry leaders. Learn from them and put this book to work! - Danette McGilvray, President and Principal, Granite Falls Consulting, Inc. Author of Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information™, 2nd Ed. (Elsevier/Academic Press, 2021)At a time when everyone seems to have become an instant data expert and AI genius, it’s refreshing to read a rigorously researched and pragmatically laid out examination of this fundamentally important topic. In my view, it’s a prime example of the Australian MBA culture (minimum bullshit allowed) in action, and needs to be on everyone’s reading list. - Daragh O Brien, CEO, Castlebridge and Lecturer in Data Protection and Data Governance, UCD Sutherland School of Law.Recognizing data, information, and knowledge as assets and treating them as such may be the single most effective way a company can improve its strategic position. And doing so is an absolute necessity for those pursuing AI.- Thomas C. Redman, Ph. D., the Data Doc, Data Quality Solutions, Rumson, NJ USATable of ContentsIntroduction Chapter 1: Background/context Chapter 2: Benefits of Managing IAs Effectively Chapter 3: Executive Awareness Chapter 4: Business Environment Chapter 5: Leadership and Management Chapter 6: Asset Governance Chapter 7: Information Systems Chapter 8: Information Assets Behaviours Chapter 9: Information Asset Attributes and Quality Chapter 10: Information Asset Performance/Exploitation Chapter 11: Justification Chapter 12: Conclusion and Call to Action

    1 in stock

    £128.25

  • Big Data Concepts Technologies and Applications

    Taylor & Francis Ltd Big Data Concepts Technologies and Applications

    2 in stock

    Book SynopsisWith the advent of such advanced technologies as cloud computing, the Internet of Things, the Medical Internet of Things, the Industry Internet of Things and sensor networks as well as the exponential growth in the usage of Internet-based and social media platforms, there are enormous oceans of data. These huge volumes of data can be used for effective decision making and improved performance if analyzed properly. Due to its inherent characteristics, big data is very complex and cannot be handled and processed by traditional database management approaches. There is a need for sophisticated approaches, tools and technologies that can be used to store, manage and analyze these enormous amounts of data to make the best use of them.Big Data Concepts, Technologies, and Applications covers the concepts, technologies, and applications of big data analytics. Presenting the state-of-the-art technologies in use for big data analytics. it provides an in-depth discussiTable of ContentsSection A. Understanding Big Data Chapter 1. Overview of Big Data Chapter 2. Challenges of Big Data Chapter 3. Big Data Analytics Section B. Big Data Technologies Chapter 4. Hadoop Ecosystem Chapter 5. NoSQL Databases Chapter 6. Data Lakes Chapter 7. Deep Learning Chapter 8. Blockchain Section C. Big Data Applications Chapter 9. Big Data for Healthcare Chapter 10. Big Data Analytics for Fraud Detection and Prevention Chapter 11. Big Data Analytics in Social Media Chapter 12. Novel Applications and Research Directions in Big Data Analytics

    2 in stock

    £42.74

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account