164 results (0,21909 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

The Web Accessibility Project Development and Testing Best Practices

The Web Accessibility Project Development and Testing Best Practices

Approximately 15% of the global population is affected by some sort of disability according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software’s and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design development and extensive accessibility testing which are essential for most of the customer-facing websites. In a fast-paced world incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit accessibility functional tests and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book developers can help their organizations rise to a whole new level of accessibility adherence innovation and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users. | The Web Accessibility Project Development and Testing Best Practices

GBP 66.99
1

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Practical Guide to IT Problem Management

Practical Guide to IT Problem Management

Some IT organisations seem to expend all their energy firefighting – dealing with incidents as they arise and fixing or patching over the breakage. In organisations like this restarting computers is seen as a standard method to resolve many issues. Perhaps the best way to identify whether an organisation understands problem management is to ask what they do after they have restarted the computer. If restarting the computer fixes the issue it is very tempting to say that the incident is over and the job is done. Problem management recognises that things do not improve if such an approach is taken. Such organisations are essentially spending their time running to stay in the same place. Written to help IT organisations move forward Practical Guide to IT Problem Management presents a combination of methodologies including understanding timelines and failure modes drill down 5 whys and divide and conquer. The book also presents an exploration of complexity theory and how automation can assist in the desire to shift left both the complexity of the problem and who can resolve it. The book emphasises that establishing the root cause of a problem is not the end of the process as the resolution options need to be evaluated and then prioritised alongside other improvements. It also explores the role of problem boards and checklists as well as the relationship between problem management and Lean thinking. This practical guide provides both a framework for tackling problems and a toolbox from which to select the right methodology once the type of problem being faced has been identified. In addition to reactive methods it presents proactive activities designed to reduce the incidence of problems or to reduce their impact and complexity should they arise. Solving problems is often a combination of common sense and methodologies which may either be learnt the hard way or may be taught. This practical guide shows how to use problem solving tools and to understand how and when to apply them while upskilling IT staff and improving IT problem solving processes.

GBP 14.99
1

Security without Obscurity A Guide to PKI Operations

Ethics and the Internal Auditor's Political Dilemma Tools and Techniques to Evaluate a Company's Ethical Culture

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

Successful security professionals have had to modify the process of responding to new threats in the high-profile ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists forms questionnaires and sample assessments. Presents Case Studies and Examples of all Risk Management ComponentsBased on the seminars of information security expert Tom Peltier this volume provides the processes that you can easily employ in your organization to assess risk. Answers such FAQs as:Why should a risk analysis be conducted?Who should review the results?How is the success measured?Always conscious of the bottom line Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization—and it’s not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.

GBP 56.99
1

The Sensible Guide to Program Management Professional (PgMP) Success

The Sensible Guide to Program Management Professional (PgMP) Success

A Sensible Guide to Program Management Professional (PgMP)® Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management – 4th Edition (PgM4 Standard). It is designed for busy professionals whose responsibilities have taken them into the realm of coordinating facilitating managing and leading programs. Program managers are leaders who are directly managing large amounts of project resources for their organizations. This study guide addresses three main concerns facing PgMP exam candidates: What are the essential concepts processes and tools that form the foundation of today’s program management? Since program management is still an emerging profession with professionals often working in different ways what does this mean for a standard exam? More specifically how does that impact your ability to pass the PgMP exam? What is the best way to prepare for the PgMP exam? To address the first concern this book highlights the underlying rationale for program management: why it exists in organizations; why it is becoming ever more important; what programs are especially for the purpose of passing the exam; how to think like a portfolio manager; and what the most important concepts processes and tools are for this profession. By simplifying complex ideas and communicating them in plain English with relevant examples this book aims to help readers not only to pass the PgMP exam but also to serve as an essential guide for program managers. For the second concern this book differs from other study guides by describing the author’s personal experience as a program manager and addressing the most pressing questions for each of the performance domains in The Standard for Program Management. To address the last concern this book contains 420 practice questions access to an online exam simulator and an online PgMP community and a time-tested approach for passing the PgMP exam. | The Sensible Guide to Program Management Professional (PgMP)® Success

GBP 52.99
1

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range heralding the dawn of an era in which today’s Internet of People gives way to tomorrow’s Internet of Things — where billions of objects will have the ability to report their location identity and history over wireless connections. Connectivity and Communication — Anything Anywhere and Anytime An examination of the exciting expansion period in this research The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive technical and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies experience reports and best practice it contains information on emerging technologies market opportunities and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs itis a comprehensive technical and practical guide to recent advances in pervasive networked systems. | The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

GBP 56.99
1

Introduction to Mobile Communications Technology Services Markets

Introduction to Mobile Communications Technology Services Markets

The traditionally separate Fixed Mobile and Internet sectors have been evolving recently toward a single sector offering numerous implications for those involved in technology and business. It is therefore essential for telecommunication professionals to get a keen grasp of where the industry is heading. Providing a solid foundation in the industry Introduction to Mobile Communications: Technology Services Markets explores the core requirements of modern mobile telecommunications-from markets to technology. It explains how wireless systems work how mobility is supported the underlying infrastructure and what interactions are needed among the different functional components. The book also examines how mobile communications are evolving in order to meet the changing needs of users. The information provided in the book comes primarily from the four core modules of the Certificate in Mobile Communications Distance Learning program run by the Informa Telecoms Academy in London. Designed by a highly experienced training development team the program examines the complex and fascinating world of mobile communications. Designed to give a broad picture of mobile communications the book provides an excellent grounding for those involved in both business and engineering-leaving them much better equipped to fulfill roles within their current or prospective companies | Introduction to Mobile Communications Technology Services Markets

GBP 56.99
1

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book you will learn how to create a working practical control structure that will ensure the ongoing day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations. The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly many organizations do not have formal processes or policies to protect their assets from internal or external threats. The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning all the way down to basic technology operation.

GBP 42.99
1

How to Win at CRM Strategy Implementation Management

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

A Guide to IT Contracting Checklists Tools and Techniques

A Guide to IT Contracting Checklists Tools and Techniques

Since A Guide to IT Contracting: Checklists Tools and Techniques first published several alarming trends have developed in the technology contracting industry. These trends include: The Dawn of the As-Is Technology Product The Ever-Changing Product Where in the World Is My Data? To meet these challenges the Second Edition helps business managers and lawyers explore alternate solutions from other vendors conduct simultaneous negotiations with other vendors and generally ensure prospective vendors understand they can lose the deal if they refuse to act reasonably. Distilling the most critical business and legal lessons learned through the author’s decades of legal experience drafting and negotiating IT-related agreements this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement each chapter includes a checklist of essential terms a brief summary of what the agreement is intended to do and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes a complete glossary that defines key legal business and technical terms Technology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors. | A Guide to IT Contracting Checklists Tools and Techniques

GBP 44.99
1

A Technical Guide to IPSec Virtual Private Networks

Enterprise Agility A Practical Guide to Agile Business Management

Enterprise Agility A Practical Guide to Agile Business Management

Despite the astonishing technological developments in our times it is surprising how little has changed in the way organizations are structured and managed. However organizations are finally changing as they embark on agile transformations. Agility concepts emerged from the dynamics of project management and have evolved as they are being applied to organizational structure and operations. This phase of the agile evolution is known as enterprise agility. Filled with real-world scenarios and company case studies Enterprise Agility: A Practical Guide to Agile Business Management covers the evolution of agility including applied processes lessons learned and realized outcomes. The book starts with the initial phase of the agile evolution project agility and describes how waterfall project management is transformed into scrum which can have positive effects on project timelines scope and budget as well as team motivation. The second phase of agility organizational agility is the evolution of the agile principles from temporary projects to permanent organizational structures. The book explains the main components of organizational agility including structures roles and ways of organizing work. It emphasizes the advantages of transitioning from traditional organizational management to agile. Finally the latest phase enterprise agility transforms each function of the organization. The book acts as a guide and describes the change through the lens of each managerial domain (sales marketing HR finance etc. ) and by presenting the positive impact generated on the company’s overall performance based on case studies. The last chapter illustrates the enablers of this transformation and how they can help the change to be internalized so that the enterprises realize improvements. The book is based on the author’s over 15 years of experience of supporting more than 25 companies in varied sectors on their transformational journey with the last 5 years concentrating on agility. By combining business management trends and principles of agile business development it shows managers how to lead the transformation to enterprise agility by following the path from project agility to full enterprise agility. | Enterprise Agility A Practical Guide to Agile Business Management

GBP 44.99
1

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management Second Edition provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective. Because of the critical importance of cybersecurity in today’s enterprise networks security-related issues are explained throughout the book and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests such as CompTIA and CISSP Takes advantage of actual cases examples industry products and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots figures and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook this book includes hands-on assignments based on the Packet Tracer program an excellent network design and simulation tool from Cisco. Instructor materials also are provided including PowerPoint slides solutions for exercise questions and additional chapter questions from which to build tests.

GBP 44.99
1

The Concept of Enterprise Architecture from Theory to Practice

The Concept of Enterprise Architecture from Theory to Practice

Even though the field of enterprise architecture (EA) has matured many organisations still struggle with its development and implementation particularly those organisations involved in continuous transformational cycles and subjected to different environmental trends. This book is intended to assist organisations in getting a grip on the factors influencing EA implementation and gaining a deeper understanding of why things happen the way they do in the practice of EA. It is a comprehensive and definitive resource that is useful to both business professionals and academics. The book presents an approach for the development implementation or institutionalisation of EA that is independent of any method or other architecture frameworks. It can be applied directly using a realistic selection of organizational variables. The approach has two distinctive features that support EA even in complex environments: From both technical and non-technical perspectives it identifies influencing factors and how they manifest in the practice of EA in an organization It offers linear and practical mechanisms for developing and implementing EA to fortify the practice of the concept in an organisation This approach represents a significant contribution to EA. Starting with descriptions for EA the book offers deepened models and frameworks for the development and implementation of EA at the domain level. It also covers factors upon which a model is built for the institutionalisation of the concept. Additionally the book discusses the implications of EA for sponsors architects and other stakeholders responsible for EA development implementation and institutionalisation. | The Concept of Enterprise Architecture from Theory to Practice

GBP 54.99
1

A History of Cyber Security Attacks 1980 to Present

How to Achieve 27001 Certification An Example of Applied Compliance Management

GBP 56.99
1

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

Most academics still wrestle with the publish or perish phenomenon. Based on Dr. Liebowitz’s 25 years serving as the editor-in-chief of a leading international journal along with insights from some of the most knowledgeable journal editors this book shares key lessons learned to help new professors doctoral students and practitioner–scholars increase their chances of being published in selective refereed international journals. It focuses on the key practices needed to ensure journal publication with interesting cases and helpful tips sprinkled throughout the book. A Guide to Publishing for Academics provides useful knowledge from leading journal editors of both traditional and online journals as well as various tiers of journals. Although the focus is mainly in the business and IT areas much of the guidance provided can cross into other fields. The book contains interesting vignettes and do’s and don’ts so that potential authors can understand what goes on behind the scenes once the manuscript arrives on the journal editor’s desk. The book provides constructive guidance on choosing what and where to publish what to consider when writing a title for a paper how to prepare and submit journal manuscripts and how to position a paper for publication. It also has valuable information for current and future journal editors including models of editing and editorial boards editorial coaching advice and editing smart practices. With the information in this book the next generation of academics and practitioner–scholars will be well equipped to overcome the publish or perish phenomenon. | A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

GBP 56.99
1

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

Describing how to avoid common vendor traps Buying Supporting Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and ultimately better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts—which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition support and maintenanceExamines hardware and software warranty and support modelsConsiders finance and accounting issues for maintenance and supportSpells out technology product details Explains postwarranty support and maintenanceProvides the understanding to better negotiate with vendor sales teamsIllustrating the types of problems typically experienced during product use the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating. | Buying Supporting Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle

GBP 56.99
1

Quantifying Software Global and Industry Perspectives

Quantifying Software Global and Industry Perspectives

Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many millions of dollars. Software is also the target of frequent and increasingly serious cyber-attacks. Among the reasons for these software problems is a chronic lack of reliable quantified data. This reference provides quantified data from many countries and many industries based on about 26 000 projects developed using a variety of methodologies and team experience levels. The data has been gathered between 1970 and 2017 so interesting historical trends are available. Since current average software productivity and quality results are suboptimal this book focuses on best in class results and shows not only quantified quality and productivity data from best-in-class organizations but also the technology stacks used to achieve best-in-class results. The overall goal of this book is to encourage the adoption of best-in-class software metrics and best-in-class technology stacks. It does so by providing current data on average software schedules effort costs and quality for several industries and countries. Because productivity and quality vary by technology and size the book presents quantitative results for applications between 100 function points and 100 000 function points. It shows quality results using defect potential and DRE metrics because the number one cost driver for software is finding and fixing bugs. The book presents data on cost of quality for software projects and discusses technical debt but that metric is not standardized. Finally the book includes some data on three years of software maintenance and enhancements as well as some data on total cost of ownership. | Quantifying Software Global and Industry Perspectives

GBP 42.99
1

Implementing Cybersecurity A Guide to the National Institute of Standards and Technology Risk Management Framework

Electronically Stored Information The Complete Guide to Management Understanding Acquisition Storage Search and Retrieval Second Edition