37 results (0,23205 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

Most people do not truly understand a concept until they can visualize it. This applies to all fields including Project Management. The best way to effectively manage projects is to help your team visualize the end result as well as the steps needed to achieve that result. Help Your Team Visualize the Right Path to Success Building a Project Work Breakdown Structure: Visualizing Objectives Deliverables Activities and Schedules employs a diagram approach to project planning and scheduling. This useful tool empowers business professionals to take control of and successfully communicate their projects ensuring they are completed on time with their targeted impact. Industry professional Dennis P. Miller a consultant to leading Fortune 500 companies thoroughly explains the keys to an effective Work Breakdown Structure (WBS) through an Eight Step Process. He has refined this process over a period of twenty years applying it to over 100 projects ranging from software development to social events. The Eight Step Process starts with a concentrated effort to define the project through its deliverables. The middle steps walk the project team through a process of activity definition and sequencing and resource assignment. Finally the last steps involve estimating the duration and verifying the project timeline. Not Just What to Do But How to Do It! This is a hands-on volume that includes a practice section for each of the eight steps providing readers with real examples of how the author has successfully applied this process. The result of its application is a visualization of the project‘s objectives deliverables activities and schedules. Over 130 illustrations enrich the instructions. Project managers are assured of success by following the simple tools in this unique and comprehensive volume. | Building a Project Work Breakdown Structure Visualizing Objectives Deliverables Activities and Schedules

GBP 170.00
1

Cyberspace and Cybersecurity

Business Analysis Requirements and Project Management A Guide for Computing Students

Business Analysis Requirements and Project Management A Guide for Computing Students

IT projects emerge from a business need. In practice software developers must accomplish two big things before an IT project can begin: find out what you need to do (i. e. analyse business requirements) and plan out how to do it (i. e. project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis Requirements and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS) the Gantt chart and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice. | Business Analysis Requirements and Project Management A Guide for Computing Students

GBP 48.99
1

Social Media Warfare Equal Weapons for All

FinTech The Technology Driving Disruption in the Financial Services Industry

Bankers Like Us Dispatches from an Industry in Transition

Bankers Like Us Dispatches from an Industry in Transition

This book will resonate with anyone no matter where you reside on this journey whether newbie or old guard. If you want to be part of this change you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate then I suggest you think about stepping aside. — Curt Queyrouze President Coastal Community Bank The world is going digital and so is banking—in fits starts and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about not by external heroes and saviours not by a generation yet to be born but people just like us. People who understand the industry and its quirks. Bankers who have the grit determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a ‘this is who we are’ piece including the author’s trench credentials. It then presents an overview of corporate culture (this is what we deal with and a few ideas on how to handle it) as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds and a hopeful look-ahead on what a team of principled dedicated folks can do despite everything. | Bankers Like Us Dispatches from an Industry in Transition

GBP 29.99
1

Financial Literacy Education Addressing Student Business and Government Needs

Practical Guide to IT Problem Management

Practical Guide to IT Problem Management

Some IT organisations seem to expend all their energy firefighting – dealing with incidents as they arise and fixing or patching over the breakage. In organisations like this restarting computers is seen as a standard method to resolve many issues. Perhaps the best way to identify whether an organisation understands problem management is to ask what they do after they have restarted the computer. If restarting the computer fixes the issue it is very tempting to say that the incident is over and the job is done. Problem management recognises that things do not improve if such an approach is taken. Such organisations are essentially spending their time running to stay in the same place. Written to help IT organisations move forward Practical Guide to IT Problem Management presents a combination of methodologies including understanding timelines and failure modes drill down 5 whys and divide and conquer. The book also presents an exploration of complexity theory and how automation can assist in the desire to shift left both the complexity of the problem and who can resolve it. The book emphasises that establishing the root cause of a problem is not the end of the process as the resolution options need to be evaluated and then prioritised alongside other improvements. It also explores the role of problem boards and checklists as well as the relationship between problem management and Lean thinking. This practical guide provides both a framework for tackling problems and a toolbox from which to select the right methodology once the type of problem being faced has been identified. In addition to reactive methods it presents proactive activities designed to reduce the incidence of problems or to reduce their impact and complexity should they arise. Solving problems is often a combination of common sense and methodologies which may either be learnt the hard way or may be taught. This practical guide shows how to use problem solving tools and to understand how and when to apply them while upskilling IT staff and improving IT problem solving processes.

GBP 14.99
1

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

In this book Edosa explores common challenges which limit the value that organisations can get from data. What makes his book unique is that he also tackles one of the unspoken barriers to data adoption—fear. Fear of the unknown fear of the intangible fear of the investment needed and yes fear of losing your job to a machine. With his talent for distilling clarity from complexity Edosa tackles this and many other challenges. —Tim Carmichael Chief Data Officer Chalhoub Group This book offers fresh insight about how to solve the interactional frictions that hamper the flow of data information and knowledge across organisations. Yet rather than being stuck with endless polarising debates such as breaking down silos it shifts focus back towards the ultimate to what end. —Jacky Wright Chief Digital Officer (CDO) Microsoft US If you care about AI transformation empowering people or advancing organisational success in an increasingly digital world then you should read this book. —Yomi Ibosiola Chief Data and Analytics Officer Union Bank A retail giant already struggling due to the Covid-19 pandemic was faced with a disastrous situation when—at the end of a critical investment in an artificial intelligence project that had been meant to save money—it suddenly discovered that its implementation was likely to leave it worse off. An entire critical service stream within an insurer’s production system crashed. This critical failure resulted in the detentions of fully insured motorists for allegedly not carrying required insurance. Making Data Work details these two scenarios as well as others illustrating the consequences that arise when organizations do not know how to make data work properly. It is a journey to determine what to do to make data work for ourselves and for our organisations. It is a journey to discover how to bring it all together so organisations can enable digital transformation empower people and advance organisational success. It is the journey to a world where data and technology finally live up to the hype and deliver better human outcomes where artificial intelligence can move us from reacting to situations to predicting future occurrences and enabling desirable possibilities. | Making Data Work Enabling Digital Transformation Empowering People and Advancing Organisational Success

GBP 44.99
1

Managing Business Projects The Essentials

Managing Business Projects The Essentials

Managing Business Projects: The Essentials differs from many other project management textbooks. Foremost it is about business projects as opposed to construction or engineering projects. Although many techniques like schedule management apply to both they are usually applied differently. As its title conveys the book explains the essential techniques and perspectives needed for business projects to be successful. The focus is on small- and medium-sized projects up to $20 million but often below $1 million. Some literature favors large and mega-projects but for every mega-project there are many thousands of smaller projects that are vital to the organization and could involve considerable complexity and risk. Nevertheless the techniques outlined here also apply to mega-projects and their many subprojects; they even apply to some aspects of construction or engineering projects. This book does not aim to cover all project management techniques. In real life there is simply no time for sophisticated ‘should-dos. ' Rather it covers the essentials that apply to almost all business projects; these are unlikely to change in the future even as technology and methodologies advance. The driving idea which is stated repeatedly is to do the essentials and to do them consistently and well. Strong emphasis is placed on things that happen before around and after the project itself. So while the basic disciplines like engaging with stakeholders managing scope schedules costs risks issues changes and communication are thoroughly explained other important aspects are covered. These include: governance of a project and of a portfolio of projects project selection with its financial and non-financial aspects effective use of the business case through to benefits realization procurement outsourcing and partnership and also the agile mindset that is valuable beyond Agile projects. Besides project managers and sponsors this book is intended for people who are working in business or government at any level or for MBA students. It offers perspectives that enable them to learn more from their everyday experience. It is not aimed at undergraduate students although many would benefit from the contents. | Managing Business Projects The Essentials

GBP 52.99
1

A Technical Guide to IPSec Virtual Private Networks

Practical Cryptography Algorithms and Implementations Using C++

Human Dimensions of Cybersecurity

The Total CISSP Exam Prep Book Practice Questions Answers and Test Taking Tips and Techniques

GBP 160.00
1

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

Handbook of Algorithms for Physical Design Automation

Handbook of Algorithms for Physical Design Automation

The physical design flow of any project depends upon the size of the design the technology the number of designers the clock frequency and the time to do the design. As technology advances and design-styles change physical design flows are constantly reinvented as traditional phases are removed and new ones are added to accommodate changes in technology. Handbook of Algorithms for Physical Design Automation provides a detailed overview of VLSI physical design automation emphasizing state-of-the-art techniques trends and improvements that have emerged during the previous decade. After a brief introduction to the modern physical design problem basic algorithmic techniques and partitioning the book discusses significant advances in floorplanning representations and describes recent formulations of the floorplanning problem. The text also addresses issues of placement net layout and optimization routing multiple signal nets manufacturability physical synthesis special nets and designing for specialized technologies. It includes a personal perspective from Ralph Otten as he looks back on the major technical milestones in the history of physical design automation. Although several books on this topic are currently available most are either too broad or out of date. Alternatively proceedings and journal articles are valuable resources for researchers in this area but the material is widely dispersed in the literature. This handbook pulls together a broad variety of perspectives on the most challenging problems in the field and focuses on emerging problems and research results.

GBP 56.99
1

Enterprise Systems Integration

Enterprise Systems Integration

The convergence of knowledge technology and human performance which comprises today's enterprise allows creative business process design. Thus an organization can create new and innovative ways to service customers or to do business with suppliers and make itself a leader in its field. This capability relies on a successful strategy that integrates the enterprise. Enterprise Systems Integration Second Edition continues to provide you with the business insight and the technical know-how that ensures successful systems integration. The book combines the perspectives knowledge and experience of more than 70 experts in the various areas that involve enterprise integration. Their expertise ranges from hands-on experience with technology and project management to the higher-level issues of business and management strategy. Each chapter examines an issue or technology relevant to today's enterprise. Collectively these chapters span the range of enterprise computing and systems integration. Once armed with the strategy and technologies you must successfully deploy ERP systems within budget and on time. In addition you must be able to integrate them into the rest of the enterprise. Still ERP software does not make up the full picture of today's enterprise. Legacy systems e-commerce and other Web-based systems client/server applications networks and communications systems data warehousing and integrated databases enter into the mix. Enterprise Systems Integration Second Edition paints a comprehensive picture of the technologies that comprise today's enterprise and shows you how to make them work together.

GBP 56.99
1

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book you will learn how to create a working practical control structure that will ensure the ongoing day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning all the way down to basic technology operation.

GBP 42.99
1

Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques

Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques

A company with effective cost reduction activities in place will be better positioned to adapt to shifting economic conditions. In fact it can make the difference between organizations that thrive and those that simply survive during times of economic uncertainty. Reducing Process Costs with Lean Six Sigma and Value Engineering Techniques covers the methods and techniques currently available for lowering the costs of products processes and services. Describing why cost reductions can be just as powerful as revenue increases the book arms readers with the understanding required to select the best solution for their company’s culture and capabilities. It emphasizes home-grown techniques that do not require the implementation of any new methodologies—making it easy to apply them in any organization. The authors explain how to reduce costs through traditional Lean methods and Lean Six Sigma. They also present Six Sigma cost savings techniques from Manufacturing Six Sigma Services Six Sigma and Design for Six Sigma. The book also presents optimization techniques from operations research methods design experiment and engineering process control. Helping you determine what your organization’s value proposition is the text explains how to improve on the existing proposition and suggests a range of tools to help you achieve this goal. The tools and techniques presented vary in complexity and capability and most chapters include a rubric at the start to help readers determine the levels of competence required to perform the tasks outlined in that chapter.

GBP 56.99
1

Software Development Patterns and Antipatterns

Software Development Patterns and Antipatterns

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10 000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies breach of contract lawsuits and the literature on major software failures. This section considers the factors involved with cost overruns schedule delays canceled projects poor quality and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section’s first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence as well as measures that can prove excellence to C-level executives and with continuing excellence through the maintenance cycle as well as for software development.

GBP 48.99
1

Cyber Crime Investigator's Field Guide

Cyber Crime Investigator's Field Guide

Transhumanism Artificial Intelligence the Cloud Robotics Electromagnetic Fields Intelligence Communities Rail Transportation Open-Source Intelligence (OSINT)—all this and more is discussed in Cyber Crime Investigator’s Field Guide Third Edition. Many excellent hardware and software products exist to protect our data communications systems but security threats dictate that they must be all the more enhanced to protect our electronic environment. Many laws rules and regulations have been implemented over the past few decades that have provided our law enforcement community and legal system with the teeth needed to take a bite out of cybercrime. But there is still a major need for individuals and professionals who know how to investigate computer network security incidents and can bring them to a proper resolution. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. The third edition provides the investigative framework that needs to be followed along with information about how cyberspace works and the tools that reveal the who where what when why and how in the investigation of cybercrime. Features New focus area on rail transportation OSINT medical devices and transhumanism / robotics Evidence collection and analysis tools Covers what to do from the time you receive the call arrival on site chain of custody and more This book offers a valuable Q&A by subject area an extensive overview of recommended reference materials and a detailed case study. Appendices highlight attack signatures Linux commands Cisco firewall commands port numbers and more. | Cyber Crime Investigator's Field Guide

GBP 56.99
1

The Concept of Enterprise Architecture from Theory to Practice

The Concept of Enterprise Architecture from Theory to Practice

Even though the field of enterprise architecture (EA) has matured many organisations still struggle with its development and implementation particularly those organisations involved in continuous transformational cycles and subjected to different environmental trends. This book is intended to assist organisations in getting a grip on the factors influencing EA implementation and gaining a deeper understanding of why things happen the way they do in the practice of EA. It is a comprehensive and definitive resource that is useful to both business professionals and academics. The book presents an approach for the development implementation or institutionalisation of EA that is independent of any method or other architecture frameworks. It can be applied directly using a realistic selection of organizational variables. The approach has two distinctive features that support EA even in complex environments: From both technical and non-technical perspectives it identifies influencing factors and how they manifest in the practice of EA in an organization It offers linear and practical mechanisms for developing and implementing EA to fortify the practice of the concept in an organisation This approach represents a significant contribution to EA. Starting with descriptions for EA the book offers deepened models and frameworks for the development and implementation of EA at the domain level. It also covers factors upon which a model is built for the institutionalisation of the concept. Additionally the book discusses the implications of EA for sponsors architects and other stakeholders responsible for EA development implementation and institutionalisation. | The Concept of Enterprise Architecture from Theory to Practice

GBP 54.99
1

A Guide to IT Contracting Checklists Tools and Techniques

A Guide to IT Contracting Checklists Tools and Techniques

Since A Guide to IT Contracting: Checklists Tools and Techniques first published several alarming trends have developed in the technology contracting industry. These trends include: The Dawn of the As-Is Technology Product The Ever-Changing Product Where in the World Is My Data? To meet these challenges the Second Edition helps business managers and lawyers explore alternate solutions from other vendors conduct simultaneous negotiations with other vendors and generally ensure prospective vendors understand they can lose the deal if they refuse to act reasonably. Distilling the most critical business and legal lessons learned through the author’s decades of legal experience drafting and negotiating IT-related agreements this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement each chapter includes a checklist of essential terms a brief summary of what the agreement is intended to do and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes a complete glossary that defines key legal business and technical terms Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors. | A Guide to IT Contracting Checklists Tools and Techniques

GBP 44.99
1

Architecting Secure Software Systems

Architecting Secure Software Systems

Traditionally software engineers have defined security as a non-functional requirement. As such all too often it is only considered as an afterthought making software applications and services vulnerable to attacks. With the phenomenal growth in cybercrime it has become imperative that security be an integral part of software engineering so that all software assets are protected and safe. Architecting Secure Software Systems defines how security should be incorporated into basic software engineering at the requirement analysis phase continuing this sharp focus into security design secured programming security testing and secured deployment. Outlines Protection Protocols for Numerous ApplicationsThrough the use of examples this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX . NET Java mobile and Web environments. Finally they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach that allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation. Define a Security Methodology from the Initial Phase of Development Almost all assets in our lives have a virtual presence and the convergence of computer information and telecommunications makes these assets accessible to everyone in the world. This volume enables developers engineers and architects to approach security in a holistic fashion at the beginning of the software development li

GBP 56.99
1

Developing the Intuitive Executive Using Analytics and Intuition for Success

Developing the Intuitive Executive Using Analytics and Intuition for Success

The leading traits of executives often include creativity and innovation. Research shows that intuition can significantly enhance these traits. Developing intuitive executives and honing intuition coupled with the ability to apply data and evidence to inform decision making is the focus of Developing the Intuitive Executive: Using Analytics and Intuition for Success. Some researchers call the complement of applying data analytics to intuition as quantitative intuition rational intuition or informed intuition. Certainly in today's data-driven environment analytics plays a key role in executive decision-making. However an executive’s many years of experiential learning are not formally considered as part of the decision-making process. Learning from both failures and successes can help fine-tune intuitive awareness—what this book calls intuition-based decision-making. Research also shows that many executives do not trust the internal data quality in their organizations and so they rely on their intuition rather than strictly on data. This book presents the work of leading researchers worldwide on intuition in the management and executive domain. Their chapters cover key issues trends concepts techniques and opportunities for applying intuition as part of the executive decision-making process. Highlights include: Using intuition to manage new opportunities Intuition in medicine Rules based on intuition Balancing logic and intuition in decision-making Smart heuristics to manage complexity Intuition and competitiveness Intuitive investment decision-making across cultures Showing how intuition in executive decision-making should play an important role this book enables managers to complement their knowledge gained from experience with analytics to improve decision-making and business success. | Developing the Intuitive Executive Using Analytics and Intuition for Success

GBP 44.99
1