152 results (0,20051 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

An organization’s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods safeguards and techniques that help protect an organization from insider computer fraud. Drawing from the author’s vast experience assessing the adequacy of IT security for the banking and securities industries the book presents a practical framework for identifying measuring monitoring and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit process and store sensitive data. The author also examines the symbiotic relationship between the risks controls threats and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process. | Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

GBP 56.99
1

The Complete Guide for CPP Examination Preparation

GBP 31.99
1

Business Analysis Requirements and Project Management A Guide for Computing Students

Business Analysis Requirements and Project Management A Guide for Computing Students

IT projects emerge from a business need. In practice software developers must accomplish two big things before an IT project can begin: find out what you need to do (i. e. analyse business requirements) and plan out how to do it (i. e. project management). The biggest problem in IT projects is delivering the wrong product because IT people do not understand what business people require. This practical textbook teaches computer science students how to manage and deliver IT projects by linking business and IT requirements with project management in an incremental and straightforward approach. Business Analysis Requirements and Project Management: A Guide for Computing Students presents an approach to analysis management that scales the business perspective. It takes a business process view of a business proposal as a model and explains how to structure a technical problem into a recognisable pattern with problem frames. It shows how to identify core transactions and model them as use cases to create a requirements table useful to designers and coders. Linked to the analysis are three management tools: the product breakdown structure (PBS) the Gantt chart and the Kanban board. The PBS is derived in part from the problem frame. The Gantt chart emerges from the PBS and ensures the key requirements are addressed by reference to use cases. The Kanban board is especially useful in Task Driven Development which the text covers. This textbook consists of two interleaving parts and features a single case study. Part one addresses the business and requirements perspective. The second integrates core project management approaches and explains how both requirements and management are connected. The remainder of the book is appendices the first of which provides solutions to the exercises presented in each chapter. The second appendix puts together much of the documentation for the case study into one place. The case study presents a real-word business scenario to expose students to professional practice. | Business Analysis Requirements and Project Management A Guide for Computing Students

GBP 48.99
1

Effective Methods for Software Engineering

Effective Methods for Software Engineering

Software is important because it is used by a great many people in companies and institutions. This book presents engineering methods for designing and building software. Based on the author’s experience in software engineering as a programmer in the defense and aerospace industries this book explains how to ensure a software that is programmed operates according to its requirements. It also shows how to develop operate and maintain software engineering capabilities by instilling an engineering discipline to support programming design builds and delivery to customers. This book helps software engineers to:Understand the basic concepts standards and requirements of software engineering. Select the appropriate programming and design techniques. Effectively use software engineering tools and applications. Create specifications to comply with the software standards and requirements. Utilize various methods and techniques to identify defects. Manage changes to standards and requirements. Besides providing a technical view this book discusses the moral and ethical responsibility of software engineers to ensure that the software they design and program does not cause serious problems. Software engineers tend to be concerned with the technical elegance of their software products and tools whereas customers tend to be concerned only with whether a software product meets their needs and is easy and ready to use. This book looks at these two sides of software development and the challenges they present for software engineering. A critical understanding of software engineering empowers developers to choose the right methods for achieving effective results. Effective Methods for Software Engineering guides software programmers and developers to develop this critical understanding that is so crucial in today’s software-dependent society.

GBP 42.99
1

Securing the Cloud Security Strategies for the Ubiquitous Data Center

Active and Programmable Networks for Adaptive Architectures and Services

Active and Programmable Networks for Adaptive Architectures and Services

Most conventional networks are passive with only basic traffic monitoring management routing and congestion control. At best they can be called reactive. Deploying new functions and integrating new standards into these architectures is difficult due to the rigid embedding of software and hardware into the network components. Active and Programmable Networks for Adaptive Architectures and Services introduces a new generation of network technologies and architecture that allows the creation customization and management of new services and applications deployed dynamically into network nodes. Following a brief introduction and historical overview the author outlines the architecture of active and programmable networks discusses the enabling technologies for network programmability in detail and introduces several paradigms and prototypes. He then explores packet scheduling management routing and security and examines active wireless and mobile networks. The final chapter presents several real-world examples of currently deployed active and programmable networks. Several tables present information on different schemes and architectures allowing easy comparison among a range of networking options. Placing the new paradigm in contrast with concepts such as TCP/IP and OSI Active and Programmable Networks for Adaptive Architectures and Services makes it easy to see how these new technologies can help you build more flexible and adaptive networks that can seamlessly integrate new functions.

GBP 56.99
1

Software Engineering with UML

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Strategic planning outlines the path between the current status of the business and the desired status. It requires the business to identify its objectives and goals and then make the correct decisions to achieve these objectives and goals. This book provides a complete set of practical strategic planning techniques and tools. It explains how and in what circumstances to use particular tools and how to target them to achieve effective results. Systematic Strategic Planning: A Comprehensive Framework for Implementation Control and Evaluation describes a framework of phases through which each project passes a pattern of procedures for straight-forward planning and the fundamentals involved in any strategic planning project. Designed to be simple to understand and easy to use the book presents techniques case studies and working forms to guide you through preparing a strategic plan for your existing or future business. The book is organized into four parts:Part I explains the steps to take before and after starting the strategic planning work. Part II provides the overall framework and characteristics of the simplified and full versions of systematic strategic planning. Part III describes the sections of systematic strategic planning in detail. Part IV provides a framework for implementation control and evaluation functions in a systematic manner. This book is designed to help both experienced strategic planners and other types of professionals who are faced with creating a strategic plan for their business. The processes and techniques described should be universally applicable to any type of business. With the information in this book you will be well-equipped to create effective strategic plans that drive your business forward. | Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

GBP 56.99
1

Developing the Intuitive Executive Using Analytics and Intuition for Success

Developing the Intuitive Executive Using Analytics and Intuition for Success

The leading traits of executives often include creativity and innovation. Research shows that intuition can significantly enhance these traits. Developing intuitive executives and honing intuition coupled with the ability to apply data and evidence to inform decision making is the focus of Developing the Intuitive Executive: Using Analytics and Intuition for Success. Some researchers call the complement of applying data analytics to intuition as quantitative intuition rational intuition or informed intuition. Certainly in today's data-driven environment analytics plays a key role in executive decision-making. However an executive’s many years of experiential learning are not formally considered as part of the decision-making process. Learning from both failures and successes can help fine-tune intuitive awareness—what this book calls intuition-based decision-making. Research also shows that many executives do not trust the internal data quality in their organizations and so they rely on their intuition rather than strictly on data. This book presents the work of leading researchers worldwide on intuition in the management and executive domain. Their chapters cover key issues trends concepts techniques and opportunities for applying intuition as part of the executive decision-making process. Highlights include: Using intuition to manage new opportunities Intuition in medicine Rules based on intuition Balancing logic and intuition in decision-making Smart heuristics to manage complexity Intuition and competitiveness Intuitive investment decision-making across cultures Showing how intuition in executive decision-making should play an important role this book enables managers to complement their knowledge gained from experience with analytics to improve decision-making and business success. | Developing the Intuitive Executive Using Analytics and Intuition for Success

GBP 44.99
1

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

As we get caught up in the quagmire of Big Data and analytics it remains critically important to be able to reflect and apply insights experience and intuition to your decision-making process. In fact a recent research study at Tel Aviv University found that executives who relied on their intuition were 90 percent accurate in their decisions. Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making focuses on this intuition-based decision making. The book does not discount data-based decision making especially for decisions that are important and complex. Instead it emphasizes the importance of applying intuition gut feel spirituality experiential learning and insight as key factors in the executive decision-making process. Explaining how intuition is a product of past experience learning and ambient factors the text outlines methods that will help to enhance your data-driven decision-making process with intuition-based decision making. The first part of the book the Research Track presents contributions from leading researchers worldwide on the topic of intuition-based decision making as applied to management. In the second part of the book the Practice Track global executives and senior managers in industry government universities and not-for-profits present vignettes that illustrate how they have used their intuition in making key decisions. The research part of the book helps to frame the problem and address leading research in intuition-based decision making. The second part then explains how to apply these intuition-based concepts and issues in your own decision-making process. | Bursting the Big Data Bubble The Case for Intuition-Based Decision Making

GBP 56.99
1

The Insider Threat Assessment and Mitigation of Risks

Effective Processes for Quality Assurance

Effective Processes for Quality Assurance

Driving innovation can reduce costs for companies institutions military programs and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices improvements and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies institutions military programs and successful businesses by encouraging a cooperative proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains:Quality Assurance methodsMeasuring benefits of Quality Assurance process improvementQuality Assurance performance and improvementRisk managementQuality Assurance improvement with metricsEffective processes for Quality AssuranceQuantitative process performance and commitmentsQuality Assurance plansQuality Assurance for customers and suppliersSupporting software configurationEffective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.

GBP 42.99
1

Practical Guide to IT Problem Management

Practical Guide to IT Problem Management

Some IT organisations seem to expend all their energy firefighting – dealing with incidents as they arise and fixing or patching over the breakage. In organisations like this restarting computers is seen as a standard method to resolve many issues. Perhaps the best way to identify whether an organisation understands problem management is to ask what they do after they have restarted the computer. If restarting the computer fixes the issue it is very tempting to say that the incident is over and the job is done. Problem management recognises that things do not improve if such an approach is taken. Such organisations are essentially spending their time running to stay in the same place. Written to help IT organisations move forward Practical Guide to IT Problem Management presents a combination of methodologies including understanding timelines and failure modes drill down 5 whys and divide and conquer. The book also presents an exploration of complexity theory and how automation can assist in the desire to shift left both the complexity of the problem and who can resolve it. The book emphasises that establishing the root cause of a problem is not the end of the process as the resolution options need to be evaluated and then prioritised alongside other improvements. It also explores the role of problem boards and checklists as well as the relationship between problem management and Lean thinking. This practical guide provides both a framework for tackling problems and a toolbox from which to select the right methodology once the type of problem being faced has been identified. In addition to reactive methods it presents proactive activities designed to reduce the incidence of problems or to reduce their impact and complexity should they arise. Solving problems is often a combination of common sense and methodologies which may either be learnt the hard way or may be taught. This practical guide shows how to use problem solving tools and to understand how and when to apply them while upskilling IT staff and improving IT problem solving processes.

GBP 14.99
1

Data Analytics for Internal Auditors

Quantifying Software Global and Industry Perspectives

Quantifying Software Global and Industry Perspectives

Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many millions of dollars. Software is also the target of frequent and increasingly serious cyber-attacks. Among the reasons for these software problems is a chronic lack of reliable quantified data. This reference provides quantified data from many countries and many industries based on about 26 000 projects developed using a variety of methodologies and team experience levels. The data has been gathered between 1970 and 2017 so interesting historical trends are available. Since current average software productivity and quality results are suboptimal this book focuses on best in class results and shows not only quantified quality and productivity data from best-in-class organizations but also the technology stacks used to achieve best-in-class results. The overall goal of this book is to encourage the adoption of best-in-class software metrics and best-in-class technology stacks. It does so by providing current data on average software schedules effort costs and quality for several industries and countries. Because productivity and quality vary by technology and size the book presents quantitative results for applications between 100 function points and 100 000 function points. It shows quality results using defect potential and DRE metrics because the number one cost driver for software is finding and fixing bugs. The book presents data on cost of quality for software projects and discusses technical debt but that metric is not standardized. Finally the book includes some data on three years of software maintenance and enhancements as well as some data on total cost of ownership. | Quantifying Software Global and Industry Perspectives

GBP 42.99
1

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched new variants of it are already on the way. IT Security teams in businesses and corporations are struggling daily to fight off any cyberthreats that they are experiencing. On top of this they are also asked by their CIO or CISO to model what future Cyberattacks could potentially look like and ways as to how the lines of defenses can be further enhanced. IT Security teams are overburdened and are struggling to find ways in order to keep up with what they are being asked to do. Trying to model the cyberthreat landscape is a very laborious process because it takes a lot of time to analyze datasets from many intelligence feeds. What can be done to accomplish this Herculean task? The answer lies in Artificial Intelligence (AI). With AI an IT Security team can model what the future Cyberthreat landscape could potentially look like in just a matter of minutes. As a result this gives valuable time for them not only to fight off the threats that they are facing but to also come up with solutions for the variants that will come out later. Practical AI for Cybersecurity explores the ways and methods as to how AI can be used in cybersecurity with an emphasis upon its subcomponents of machine learning computer vision and neural networks. The book shows how AI can be used to help automate the routine and ordinary tasks that are encountered by both penetration testing and threat hunting teams. The result is that security professionals can spend more time finding and discovering unknown vulnerabilities and weaknesses that their systems are facing as well as be able to come up with solid recommendations as to how the systems can be patched up quickly.

GBP 44.99
1

AI-Based Data Analytics Applications for Business Management

A Standard for Enterprise Project Management

A Standard for Enterprise Project Management

Providing structured yet adaptable models of project success within an organization A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. It also supplies an inventory of practical policies procedures techniques and templates for consistent management of projects. The book first discusses project authorization and initiation followed by analysis and planning. It then covers execution control and closure. Each phase contains an explanation and an illustration of how to optimize success. Throughout the text the author refers to numerous appendices that constitute both blank and completed templates. He provides details on how to use these tools with an emphasis on balancing the benefits of standardization and the need for flexibility. The accompanying downloadable resources encompass a color version of the book with four bonus features: Quick start with Project 2003 that offers a one-page tutorial and three pages of screen prints designed to quickly generate readable and concise project plans Complex project readiness grid that suggests how to manage intricate interrelationships in a project or program environment Project management competency development grid that outlines a program for developing key skills among project managers within an organization Traceability matrix that illustrates how various levels of requirements and final solutions are interrelated This book offers a painless guide to quickly getting business initiatives out of the clouds and onto the ground. Blending the rigor and discipline of project management with the thoroughness of business analysis it shows how to successfully build complement and enhance project management and business analysis in any organization.

GBP 160.00
1

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Technologies for Sustainable Global Higher Education

Technologies for Sustainable Global Higher Education

Digital technologies are influencing the way we learn live work and exist in different contexts of society in the digital age. There are a variety of learning systems that support innovative digital approaches and universities and organizations around the world are investing in building their own e-learning platforms. Digital technologies are enabling wider access to education and new markets for student recruitment resulting in increased income prospects for global higher education institutions. Technology enables numerous data and information sources which give greater access to information and data. It also enables highly virtual environments which impact teaching and the classroom. The widespread use and application of digital technologies in the teaching and learning process provoke pedagogical inquiry and mediation. It is in this context that Technologies for Sustainable Global Higher Education focuses on analyzing the application of digital technologies in the teaching–learning process. The chapters in this edited collection seek to answer questions relevant to the context of higher education such as: What is the concept of digital technologies? How is digital technology used to mediate the learning process? What technologies are used to qualify education in higher education? This book provides answers to these questions by focusing on issues central to improving education through digital technologies digital learning and pedagogical practices in digital education. It also provides case studies of higher education institutions.

GBP 110.00
1

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1

Modeling Software with Finite State Machines A Practical Approach

Requirements Engineering for Software and Systems

Requirements Engineering for Software and Systems

Solid requirements engineering has increasingly been recognized as the key to improved on-time and on-budget delivery of software and systems projects. New software tools are emerging that are empowering practicing engineers to improve their requirements engineering habits. However these tools are not usually easy to use without significant training. Requirements Engineering for Software and Systems Fourth Edition is intended to provide a comprehensive treatment of the theoretical and practical aspects of discovering analyzing modeling validating testing and writing requirements for systems of all kinds with an intentional focus on software-intensive systems. It brings into play a variety of formal methods social models and modern requirements writing techniques to be useful to practicing engineers. The book is intended for professional software engineers systems engineers and senior and graduate students of software or systems engineering. Since the first edition there have been made many changes and improvements to this textbook. Feedback from instructors students and corporate users was used to correct expand and improve the materials. The fourth edition features two newly added chapters: On Non-Functional Requirements and Requirements Engineering: Road Map to the Future. The latter provides a discussion on the relationship between requirements engineering and such emerging and disruptive technologies as Internet of Things Cloud Computing Blockchain Artificial Intelligence and Affective Computing. All chapters of the book were significantly expanded with new materials that keep the book relevant to current industrial practices. Readers will find expanded discussions on new elicitation techniques agile approaches (e. g. Kanpan SAFe and DEVOps) requirements tools requirements representation risk management approaches and functional size measurement methods. The fourth edition also has significant additions of vignettes exercises and references. Another new feature is scannable QR codes linked to sites containing updates tools videos and discussion forums to keep readers current with the dynamic field of requirements engineering.

GBP 59.99
1