20 results (0,36614 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Social Media Warfare Equal Weapons for All

Digital Transformation Strategy Execution and Technology

Digital Transformation Strategy Execution and Technology

Digital transformation is a multidimensional concept and involves many moving parts. Successful digital transformation requires a fresh approach to harnessing people processes technology and data to develop new business models and digital ecosystems. One main barrier could be an overemphasis on applying technology to expand the business rather than transforming the people’s mindsets to do things differently. Thus it is important to develop a holistic view of these parts and assemble them to foster the right conditions for digital transformation to happen. Business leaders and executives must be equipped with a wide range of digital competencies to thrive in a rapidly changing digital environment. Digital Transformation: Strategy Execution and Technology provides an overall view on the strategy execution and technology for organizations aiming to transform digitally. It offers insights on how to become more successful in the digital age by explaining the importance and relevance of the various building blocks which form the foundation of a digital organization. It shows the reader how to develop these building blocks in the organization as part of the digital transformation journey from both a business and technical perspective. Highlights of the book include: Digital transformation strategy Digital governance and risk management Digital organization and change management Experimental learning and design thinking Digital product management Agile and DevSecOps Digital enterprise architecture Business applications of digital technology This practical guide is written keeping business and information technology professionals and digital transformation practitioners in mind. It is also suitable for students pursuing postgraduate degrees and participants attending executive education programs in business and information technology. | Digital Transformation Strategy Execution and Technology

GBP 48.99
1

Practical Data Mining Techniques and Applications

Practical Data Mining Techniques and Applications

Data mining techniques and algorithms are extensively used to build real-world applications. A practical approach can be applied to data mining techniques to build applications. Once deployed an application enables the developers to work on the users’ goals and mold the algorithms with respect to users’ perspectives. Practical Data Mining Techniques and Applications focuses on various concepts related to data mining and how these techniques can be used to develop and deploy applications. The book provides a systematic composition of fundamental concepts of data mining blended with practical applications. The aim of this book is to provide access to practical data mining applications and techniques to help readers gain an understanding of data mining in practice. Readers also learn how relevant techniques and algorithms are applied to solve problems and to provide solutions to real-world applications in different domains. This book can help academicians to extend their knowledge of the field as well as their understanding of applications based on different techniques to gain greater insight. It can also help researchers with real-world applications by diving deeper into the domain. Computing science students application developers and business professionals may also benefit from this examination of applied data science techniques. By highlighting an overall picture of the field introducing various mining techniques and focusing on different applications and research directions using these methods this book can motivate discussions among academics researchers professionals and students to exchange and develop their views regarding the dynamic field that is data mining.

GBP 150.00
1

Effective Methods for Software Engineering

Effective Methods for Software Engineering

Software is important because it is used by a great many people in companies and institutions. This book presents engineering methods for designing and building software. Based on the author’s experience in software engineering as a programmer in the defense and aerospace industries this book explains how to ensure a software that is programmed operates according to its requirements. It also shows how to develop operate and maintain software engineering capabilities by instilling an engineering discipline to support programming design builds and delivery to customers. This book helps software engineers to:Understand the basic concepts standards and requirements of software engineering. Select the appropriate programming and design techniques. Effectively use software engineering tools and applications. Create specifications to comply with the software standards and requirements. Utilize various methods and techniques to identify defects. Manage changes to standards and requirements. Besides providing a technical view this book discusses the moral and ethical responsibility of software engineers to ensure that the software they design and program does not cause serious problems. Software engineers tend to be concerned with the technical elegance of their software products and tools whereas customers tend to be concerned only with whether a software product meets their needs and is easy and ready to use. This book looks at these two sides of software development and the challenges they present for software engineering. A critical understanding of software engineering empowers developers to choose the right methods for achieving effective results. Effective Methods for Software Engineering guides software programmers and developers to develop this critical understanding that is so crucial in today’s software-dependent society.

GBP 42.99
1

Practical Cryptography Algorithms and Implementations Using C++

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

This is an important book. Ethics is not an easy topic and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . Use this book as a practical resource an informative and educational source of material in developing expertise but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines professional journals and online blogs. These are synthesised into a blueprint which addresses in a practical manner the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15 became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world of what has happened and what might happen as digital technology continues to pervade.

GBP 52.99
1

Intelligent Data Analytics IoT and Blockchain

Principles of Mobile Computing and Communications

Intelligent Cities Enabling Tools and Technology

Intelligent Cities Enabling Tools and Technology

The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts—providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest technologies and tools required to develop and enhance smart cities around the world. The book begins by examining the rise of the cloud as the fundamental technology for establishing and sustaining smart cities and enterprises. Explaining the principal technologies and platform solutions for implementing intelligent cities the book details the role of various technologies standards protocols and tools in establishing flexible homes and the buildings of the future. Examines IT platforms and tools from various product vendorsConsiders service-oriented architecture and event-driven architecture for smart city applicationsExplains how to leverage big data analytics for smart city enhancement and improved decision makingIncludes case studies of intelligent cities smart homes buildings transports healthcare systems and airports The authors explore the convergence of cloud computing and enterprise architecture and present valuable information on next-generation cloud computing. They also cover the various architectural types including enterprise-scale integration security management and governance. The book concludes by explaining the various security requirements of intelligent cities as well as the threats and vulnerabilities of the various components that form the basis of the intelligent city framework including cloud big data Internet of Things and mobile technologies. | Intelligent Cities Enabling Tools and Technology

GBP 44.99
1

Cyber Fraud Tactics Techniques and Procedures

Cyber Fraud Tactics Techniques and Procedures

With millions lost each year cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigative journalism and technical analysis Cyber Fraud: Tactics Techniques and Procedures documents changes in the culture of cyber criminals and explores the innovations that are the result of those changes. The book uses the term Botnet as a metaphor for the evolving changes represented by this underground economy. Copiously illustrated this engaging and engrossing book explores the state of threats present in the cyber fraud underground. It discusses phishing and pharming trojans and toolkits direct threats pump-and-dump scams and other fraud-related activities of the booming cyber-underground economy. By examining the geopolitical and socio-economic foundations of a cyber threat landscape the book specifically examines telecommunications infrastructure development patterns and trends of internet adoption and use profiles of specific malicious actors threat types and trends in these areas. This eye-opening work includes a variety of case studies ― including the cyber threat landscape in Russia and Brazil. An in-depth discussion is provided on the Russian Business Network’s (RBN) role in global cyber crime as well as new evidence on how these criminals steal package buy sell and profit from the personal financial information of consumers. Armed with this invaluable information organizations and individuals will be better able to secure their systems and develop countermeasures to disrupt underground fraud. | Cyber Fraud Tactics Techniques and Procedures

GBP 56.99
1

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

C++ Template Metaprogramming in Practice A Deep Learning Framework

C++ Template Metaprogramming in Practice A Deep Learning Framework

Using the implementation of a deep learning framework as an example C++ Template Metaprogramming in Practice: A Deep Learning Framework explains the application of metaprogramming in a relatively large project and emphasizes ways to optimize systems performance. The book is suitable for developers with a basic knowledge of C++. Developers familiar with mainstream deep learning frameworks can also refer to this book to compare the differences between the deep learning framework implemented with metaprogramming and compile-time computing with deep learning frameworks using object-oriented methods. Consisting of eight chapters the book starts with two chapters discussing basic techniques of metaprogramming and compile-time computing. The rest of the book’s chapters focus on the practical application of metaprogramming in a deep learning framework. It examines rich types and systems expression templates and writing complex meta-functions as well as such topics as: Heterogeneous dictionaries and policy templates An introduction to deep learning Type system and basic data types Operations and expression templates Basic layers Composite and recurrent layers Evaluation and its optimization Metaprogramming can construct flexible and efficient code. For C++ developers who are familiar with object-oriented programming the main difficulty in learning and mastering C++ metaprogramming is establishing the thinking mode of functional programming. The meta-programming approach involved at compile time is functional which means that the intermediate results of the construction cannot be changed and the impact may be greater than expected. This book enables C++ programmers to develop a functional mindset and metaprogramming skills. The book also discusses the development cost and use cost of metaprogramming and provides workarounds for minimizing these costs. | C++ Template Metaprogramming in Practice A Deep Learning Framework

GBP 99.99
1

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software Requirements Test Cases and Testing Methods

Secure and Resilient Software: Requirements Test Cases and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:Pre-developed nonfunctional requirements that can be reused for any software development project Documented test cases that go along with the requirements and can be used to develop a Test Plan for the softwareTesting methods that can be applied to the test cases provided Downloadable resources with all security requirements and test cases as well as MS Word versions of the checklists requirements and test cases covered in the bookOffering ground-level already-developed software nonfunctional requirements and corresponding test cases and methods this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying downloadable resources filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis design and testing phases of your software development lifecycle. Some Praise for the Book:This book pulls together the state of the art in thinking about this important issue in a holistic way with several examples. It takes you through the entire lifecycle from conception to implementation . . —Doug Cavit Chief Security Strategist Microsoft Corporation. provides the reader with the tools necessary to jump-start and mature security within the software development lifecycle (SDLC). —Jeff Weekes Sr. Security Architect at Terra Verde Services. full of useful insights and practical advice from two au | Secure and Resilient Software Requirements Test Cases and Testing Methods

GBP 56.99
1

The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

Uses the Running Operation as the Main Thread Difficulty in understanding an operating system (OS) lies not in the technical aspects but in the complex relationships inside the operating systems. The Art of Linux Kernel Design: Illustrating the Operating System Design Principle and Implementation addresses this complexity. Written from the perspective of the designer of an operating system this book tackles important issues and practical problems on how to understand an operating system completely and systematically. It removes the mystery revealing operating system design guidelines explaining the BIOS code directly related to the operating system and simplifying the relationships and guiding ideology behind it all. Based on the Source Code of a Real Multi-Process Operating System Using the 0. 11 edition source code as a representation of the Linux basic design the book illustrates the real states of an operating system in actual operations. It provides a complete systematic analysis of the operating system source code as well as a direct and complete understanding of the real operating system run-time structure. The author includes run-time memory structure diagrams and an accompanying essay to help readers grasp the dynamics behind Linux and similar software systems. Identifies through diagrams the location of the key operating system data structures that lie in the memory Indicates through diagrams the current operating status information which helps users understand the interrupt state and left time slice of processes Examines the relationship between process and memory memory and file file and process and the kernel Explores the essential association preparation and transition which is the vital part of operating system Develop a System of Your Own This text offers an in-dep | The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation

GBP 170.00
1

The Complete Project Management Office Handbook

The Complete Project Management Office Handbook

This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the realm of project management oversight control and support. Illustrating the implications of project management in today’s organizations The Complete Project Management Office Handbook Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests. Helping you determine if a PMO is right for your organization this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs purpose and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists detailed process steps and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management but will also help you to adapt and integrate those practices into the project management environment in your organization. For anyone associated with start-up and smaller PMOs the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate quick-wins and early PMO-based accomplishments in their organization.

GBP 42.99
1

Database Design Using Entity-Relationship Diagrams

Database Design Using Entity-Relationship Diagrams

Essential to database design entity-relationship (ER) diagrams are known for their usefulness in data modeling and mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams Third Edition database designers developers and students preparing to enter the field can quickly learn the ins and outs of data modeling through ER diagramming. Building on the success of the bestselling first and second editions this accessible text includes a new chapter on the relational model and functional dependencies. It also includes expanded chapters on Enhanced Entity-Relationship (EER) diagrams and reverse mapping. It uses cutting-edge case studies and examples to help readers master database development basics and defines ER and EER diagramming in terms of requirements (end user requests) and specifications (designer feedback to those requests) facilitating agile database development. This book Describes a step-by-step approach for producing an ER diagram and developing a relational database from it Contains exercises examples case studies bibliographies and summaries in each chapter Details the rules for mapping ER diagrams to relational databases Explains how to reverse engineer a relational database back to an entity-relationship model Includes grammar for the ER diagrams that can be presented back to the user facilitating agile database development The updated exercises and chapter summaries provide the real-world understanding needed to develop ER and EER diagrams map them to relational databases and test the resulting relational database. Complete with a wealth of additional exercises and examples throughout this edition should be a basic component of any database course. Its comprehensive nature and easy-to-navigate structure make it a resource that students and professionals will turn to throughout their careers.

GBP 56.99
1

The Human Change Management Body of Knowledge (HCMBOK )

The Human Change Management Body of Knowledge (HCMBOK )

I am happy to recommend this work. I believe in the principles presented in it and identify with its context. Due to the lack of knowledge on the subject in the market it is a topic that must be made known. The book should be in the library of all project and change managers. — Paul Dinsmore PMI FellowEvery manager should integrate HCMBOK® practices into their project management methodology in order to fully develop their work. This book addresses a simple and practical way that the critical component in organizational change management can be applied to projects of all kinds: the human factor. — Bruno Machado Director Project Management Office Grupo Anima EducaçãoWe live in a time of change speed and an avalanche of information. It is still very difficult for most companies to change their organizational culture efficiently. This book makes us reflect upon the crucial element in any change and which most managers do not place in the foreground—the people. — Joyce Meyer CEO iDigoIn today's constantly changing world the Project Manager must have sensitivity to how people react to change. Knowing a method that provides a structured way to take care of the human aspect is a key factor in the success of any project! HCMBOK® offers a simple and practical approach to managing change which can be easily incorporated into the project management routine providing amazing results. — Pedro Augusto Cardoso da Silva Engineering Director METRÔRIO This reference starts by presenting the concept of change management its players strategies and applicable models. In the second part the book covers the set of good practices methodology and tools known as the HCMBOK®— Human Change Management Body of Knowledge. The third part introduces the concept of the Change Management Office (CMO) and its relation to the strategic planning of an organization. The book concludes with the competencies essential for a change manager an approach to agile methodologies and a model for managing cultural change. | The Human Change Management Body of Knowledge (HCMBOK®)

GBP 44.99
1

Risk Analytics Data-Driven Decisions under Uncertainty

Risk Analytics Data-Driven Decisions under Uncertainty

The 2022 World Economic Forum surveyed 1 000 experts and leaders who indicated their risk perception that the earth’s conditions for humans are a main concern in the next 10 years. This means environmental risks are a priority to study in a formal way. At the same time innovation risks are present in theminds of leaders newknowledge brings new risk and the adaptation and adoption of risk knowledge is required to better understand the causes and effects can have on technological risks. These opportunities require not only adopting new ways of managing and controlling emerging processes for society and business but also adapting organizations to changes and managing new risks. Risk Analytics: Data-Driven Decisions Under Uncertainty introduces a way to analyze and design a risk analytics system (RAS) that integrates multiple approaches to risk analytics to deal with diverse types of data and problems. A risk analytics system is a hybrid system where human and artificial intelligence interact with a data gathering and selection process that uses multiple sources to the delivery of guidelines to make decisions that include humans and machines. The RAS system is an integration of components such as data architecture with diverse data and a risk analytics process and modeling process to obtain knowledge and then determine actions through the new knowledge that was obtained. The use of data analytics is not only connected to risk modeling and its implementation but also to the development of the actionable knowledge that can be represented by text in documents to define and share explicit knowledge and guidelines in the organization for strategy implementation. This book moves from a review of data to the concepts of a RAS. It reviews RAS system components required to support the creation of competitive advantage in organizations through risk analytics. Written for executives analytics professionals risk management professionals strategy professionals and postgraduate students this book shows a way to implement the analytics process to develop a risk management practice that creates an adaptive competitive advantage under uncertainty. | Risk Analytics Data-Driven Decisions under Uncertainty

GBP 74.99
1

Oracle Database Programming with Java Ideas Designs and Implementations

Oracle Database Programming with Java Ideas Designs and Implementations

Databases have become an integral part of modern life. Today’s society is an information-driven society and database technology has a direct impact on all aspects of daily life. Decisions are routinely made by organizations based on the information collected and stored in databases. Database management systems such as Oracle are crucial to apply data in industrial or commercial systems. Equally crucial is a graphical user interface (GUI) to enable users to access and manipulate data in databases. The Apache NetBeans IDE with Java is an ideal candidate for developing a GUI with programming functionality. Oracle Database Programming with Java: Ideas Designs and Implementations is written for college students and software programmers who want to develop practical and commercial database programming with Java and relational databases such as Oracle Database XE 18c. The book details practical considerations and applications of database programming with Java and is filled with authentic examples as well as detailed explanations. Advanced topics in Java Web like Java Web Applications and Java Web Services are covered in real project examples to show how to handle the database programming issues in the Apache NetBeans IDE environment. This book features: A real sample database CSE _ DEPT which is built with Oracle SQL Developer provided and used throughout the book Step by step detailed illustrations and descriptions of how to design and build a practical relational database Fundamental and advanced Java database programming techniques practical to both beginning students and experienced programmers Updated Java desktop and Web database programming techniques such as Java Enterprise Edition 7 JavaServer Pages JavaServer Faces Enterprise Java Beans Web applications and Web services including GlassFish and Tomcat Web servers More than 30 real database programming projects with detailed illustrations Actual JDBC APIs and JDBC drivers along with code explanations Homework and selected solutions for each chapter to strengthen and improve students’ learning and understanding of the topics they have studied | Oracle Database Programming with Java Ideas Designs and Implementations

GBP 82.99
1