15.354 results (0,25743 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

The Introduction to Private Cloud using Oracle Exadata and Oracle Database

The Cloud in IoT-enabled Spaces

Securing the Cloud Security Strategies for the Ubiquitous Data Center

Cloud-Based Music Production Sampling Synthesis and Hip-Hop

Business Model Transformation The AI & Cloud Technology Revolution

Leading School Change How to Overcome Resistance Increase Buy-In and Accomplish Your Goals

Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two Biometric Technology: Authentication Biocryptography and Cloud-Based Architecture is ideal for business IT or security managers that are faced with the task of making purchasing migration or adoption decisions. It brings biometrics down to an understandable level so that you can immediately begin to implement the concepts discussed. Exploring the technological and social implications of widespread biometric use the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud including security and privacy concerns the book includes a chapter that serves as a how-to manual on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U. S. and other countries. The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses it considers ease of use false positives and negatives and privacy and security issues. It also covers emerging applications such as biocryptography. Although the text can be understood by just about anybody it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations. | Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

GBP 31.99
1

Bear Cookin' The Original Guide to Bear Comfort Foods

Bear Cookin' The Original Guide to Bear Comfort Foods

Please DO feed the bears! Bear Cookin': The Original Guide to Bear Comfort Foods takes a good-natured approach to good eating presenting home-style recipes with a light-hearted touch. Aimed at husky hairy gay men—and their admirers—the book presents convenient and satisfying recipes for anyone who loves to cook—and eat! Bear Cookin' includes helpful hints “tributes” to favorite foods and meal suggestions for breakfast lunch dinner—and everything in between—that are guaranteed to please burly bears with big appetites. From lip-smacking snacks to belt-loosening main courses Bear Cookin’ is stuffed with easy-to-follow recipes for the hearty and delicious comfort foods bears crave: burgers meatloaf biscuits with sausage gravy pasta potatoes beans muffins and bread cheesecake puddings and pies and homemade ice cream. Collected from family and friends and perfect for summer picnic baskets or winter “hibernation” dinners these filling and flavorful recipes are presented with the love for good food that makes life worth living. Bear Cookin' includes recipes for: (Touch My) Monkey Bread What-A-Crock Pot Stew What’s It All About … Alfredo Polar Bear Chili Fur-ocious Pot Roast and odes to the wonders of Cool Whip® Bisquick® and Velveeta®! Bear Cookin': The Original Guide to Bear Comfort Foods also includes serving ideas and suggestions for making the best use of your cooking utensils. This book is a wonderful addition to any kitchen—bear or otherwise! | Bear Cookin' The Original Guide to Bear Comfort Foods

GBP 36.99
1

Digital Enterprise Transformation A Business-Driven Approach to Leveraging Innovative IT

Digital Enterprise Transformation A Business-Driven Approach to Leveraging Innovative IT

The integration of technological innovations such as In-Memory Analytics Cloud Computing Mobile Connectivity and Social Media with business practice can enable significant competitive advantage. In order to embrace recent challenges and changes in the governance of IT strategies SAP and its think tank - the Business Transformation Academy (BTA) - have jointly developed the Digital Capability Framework (DCF). Digital Enterprise Transformation: A Business-Driven Approach to Leveraging Innovative IT by Axel Uhl and Lars Alexander Gollenia outlines the DCF which comprises six specific capabilities: Innovation Management Transformation Management IT Excellence Customer Centricity Effective Knowledge Worker and Operational Excellence. In cooperation with the University of Applied Sciences and Arts Northwestern Switzerland University of St. Gallen (Switzerland) Queensland University of Technology (Australia) University of Liechtenstein (Principality of Liechtenstein) and Karlsruhe Institute of Technology (Germany) SAP and the BTA have been validating each capability and the corresponding maturity models based on analyzing several ’lighthouse’ case studies comprising: SAMSUNG IBM Finanz Informatik The Walt Disney Company Google Inc. HILTI AG. Digital Enterprise Transformation presents how these companies take advantage of innovative IT and how they develop their digital capabilities. On top the authors also develop and present a range of novel yet hands-on Digital Use Cases for a number of different industries which have emerged from innovative technological trends such as: Big Data Cloud Computing 3D Printing and Internet of Things. | Digital Enterprise Transformation A Business-Driven Approach to Leveraging Innovative IT

GBP 31.99
1

The Stage Manager's Toolkit Templates and Communication Techniques to Guide Your Theatre Production from First Meeting to Final Performance

Deploying the Zero Trust Framework in MSFT Azure

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

AI in Health A Leader’s Guide to Winning in the New Age of Intelligent Health Systems

Supply Chain Analytics Using Data to Optimise Supply Chain Processes

Supply Chain Analytics Using Data to Optimise Supply Chain Processes

Supply Chain Analytics introduces the reader to data analytics and demonstrates the value of their effective use in supply chain management. By describing the key supply chain processes through worked examples and the descriptive predictive and prescriptive analytic methods that can be applied to bring about improvements to those processes the book presents a more comprehensive learning experience for the reader than has been offered previously. Key topics are addressed including optimisation big data data mining and cloud computing. The author identifies four core supply chain processes – strategy design execution and people – to which the analytic techniques explained can be applied to ensure continuous improvement. Pedagogy to aid learning is incorporated throughout including an opening section for each chapter explaining the learnings designed for the chapter; worked examples illustrating how each analytic technique works how it is applied and what to be careful of; tables diagrams and equations to help ‘visualise’ the concepts and methods covered; chapter case studies; and end-of-chapter review questions and assignment tasks. Providing both management expertise and technical skills which are essential to decision-makers in the supply chain this textbook should be essential reading for advanced undergraduate and postgraduate students of supply chain analytics supply chain leadership and supply chain and operations management. Its practice-based and applied approach also makes it valuable for operating supply chain practitioners and those studying for professional qualifications. Online resources include chapter-by-chapter PowerPoint slides tutorial exercises written assignments and a test bank of exam questions. | Supply Chain Analytics Using Data to Optimise Supply Chain Processes

GBP 42.99
1

Architectures of Care From the Intimate to the Common

Architectures of Care From the Intimate to the Common

Drawing from a diverse range of interdisciplinary voices this book explores how spaces of care shape our affective material and social forms from the most intimate scale of the body to our planetary commons. Typical definitions of care center around the maintenance of a livable life encompassing everything from shelter and welfare to health and safety. Architecture plays a fundamental role in these definitions inscribed in institutional archetypes such as the home the hospital the school and the nursery. However these spaces often structure modes of care that prescribe gender roles bodily norms and labor practices. How can architecture instead engage with an expanded definition of care that questions such roles and norms producing more hybrid entanglements between our bodies our collective lives and our environments? Chapters in this book explore issues ranging from disabled domesticities and nursing unbuilding whiteness in the built environment practices and pedagogies of environmental care and the solidarity networks within ‘The Cloud’. Case studies include Floating University Berlin commoning initiatives by the Black Panther party and hospitals for the United Mine Workers of America among many other sites and scales of care. Exploring architecture through the lenses of gender studies labor theory environmental justice and the medical humanities this book will engage students and academics from a wide range of disciplines. | Architectures of Care From the Intimate to the Common

GBP 35.99
1

Planning and Designing the IP Broadcast Facility A New Puzzle to Solve

Planning and Designing the IP Broadcast Facility A New Puzzle to Solve

This book provides a comprehensive understanding of the technology architecture physical facility changes and – most importantly – the new media management workflows and business processes to support the entire lifecycle of the IP broadcast facility from an engineering and workflow perspective. Fully updated this second edition covers the technological evolutions and changes in the media broadcast industry including the new standards and specifications for live IP production the SMPTE ST2110 suite of standards the necessity of protecting against cyber threats and the expansion of cloud services in opening new possibilities. It provides users with the necessary information for planning organizing producing and distributing media for the modern broadcast facility. Key features of this text include: Strategies to implement a cost-effective live and file-based production and distribution system. A cohesive big-picture viewpoint that helps you identify how to overcome the challenges of upgrading your plant. The impact live production is having on the evolution to IP. Case studies serve as recommendations and examples of use. New considerations in engineering and maintenance of IP and file-based systems. Those in the fields of TV cable IT engineering and broadcast engineering will find this book an invaluable resource as will students learning how to set up modern broadcast facilities and the workflows of contemporary broadcasting. | Planning and Designing the IP Broadcast Facility A New Puzzle to Solve

GBP 29.99
1

Writing with Clarity and Style A Guide to Rhetorical Devices for Contemporary Writers

Writing with Clarity and Style A Guide to Rhetorical Devices for Contemporary Writers

Writing with Clarity and Style 2nd Edition will help you to improve your writing dramatically. The book shows you how to use dozens of classical rhetorical devices to bring power clarity and effectiveness to your writing. You will also learn about writing styles authorial personas and sentence syntax as tools to make your writing interesting and persuasive. If you want to improve the appeal and persuasion of your speeches this is also the book for you. From strategic techniques for keeping your readers engaged as you change focus down to the choice of just the right words and phrases for maximum impact this book will help you develop a flexible adaptable style for all the audiences you need to address. Each chapter now includes these sections: Style Check discussing many elements of style including some enhanced and revised sections Define Your Terms asking students to use their own words and examples in their definitions. It’s in the Cloud directing students to the Web to locate and respond to various rhetorically focused items including biographies and speeches. Salt and Pepper spicing up the study of rhetoric by stretching students’ thinking about how their writing can be improved sometimes by attending to details such as punctuation and sometimes by exploring the use of unusual techniques such as stylistic fragments. Review Questions providing an end-of-chapter quiz to help cement the chapter ideas in long-term memory. Questions for Thought and Discussion a set of questions designed for either in-class discussion or personal response. New to the Second Edition Additional examples of each device including from world personalities and the captains of industry More and longer exercises with a range of difficulty Advice from classical rhetoricians including Aristotle Horace Longinus Cicero and Quintilian. | Writing with Clarity and Style A Guide to Rhetorical Devices for Contemporary Writers

GBP 35.99
1

Building a Game Pitch How to Bottle Lightning

Building a Game Pitch How to Bottle Lightning

Based on the PocketGamer MasterClass Building a Pitch: From Concept to Document (2021) a decade’s worth of industry experience and numerous industry-level pitches for a variety of organisations including Mediatonic Epic Games and GDC this book will equip you with methodologies best practices and insights around video game pitch design. It will guide you through a step-by-step process from initial conceptualisation and idea validation to communicating your pitches on paper clearly and effectively –as well as illustrating why such a process can be highly valuable. In a day and age where video game development is more competitive than ever the value and importance of lightning in a bottle pitches has never been higher: foundational visions capable of delivering video games that stand apart from the crowd as industry-renowned titles generating immense critical or commercial success which (after the awe has abated) usually triggers the same internal question –why didn’t I think of that!? As such this book will cover: How video game pitches can determine the success potential of a video game How to conceptualise unique and compelling ideas for a video game How to validate your ideas to better determine whether they are capable of becoming lightning in a bottle experiences –or even worth prototyping How to structure format and write a video game pitch in a manner that not only helps you better expand upon and understand your own pitch but also makes it easier for others to understand and buy into This book will be of great interest to both seasoned and early-career game designers students studying game design courses and start-up founders seeking investment. | Building a Game Pitch How to Bottle Lightning

GBP 32.99
1

Introduction to Stochastic Calculus Applied to Finance

How to Manage Project Stakeholders Effective Strategies for Successful Large Infrastructure Projects

How to Manage Project Stakeholders Effective Strategies for Successful Large Infrastructure Projects

This book outlines how to identify stakeholders analyse theirs stakes and plan and implement an engagement strategy to secure relevant input and dependable buy-in to assure the successful delivery of Large Infrastructure Projects. It also addresses common stakeholder management inadequacies and is supplemented with four extended practical exercises to help readers apply the principles to their own large complex projects and ensure project success. The project management industry particularly the Large Infrastructure Projects domain has only recently awakened to the reality that failed Stakeholder Management probably leads to a failure of the project altogether. Due to the complexities involved most traditional approaches to managing stakeholders have developed serious difficulties in dealing with large and complex projects. This book presents a Systems Thinking approach to managing stakeholders that accommodates these complexities and seeks to crystallise the notion that managing projects means managing stakeholders while also introducing an ethical perspective (i. e. stakeholders have legitimate rights regardless of their power to influence the project). This shifts the paradigm from Management of Stakeholders to Management for Stakeholders. It is essential reading for all those involved with managing large projects including project managers sponsors and executives. It will also be useful for advanced students of project management and systems engineering looking to understand and expand their knowledge of infrastructure projects and Systems Engineering. | How to Manage Project Stakeholders Effective Strategies for Successful Large Infrastructure Projects

GBP 26.99
1

The Path to Successful Community School Policy Adoption A Comparative Analysis of District-Level Policy Reform Processes

Why It's OK to Want to Be Rich

Why It's OK to Want to Be Rich

Finger-wagging moralizers say the love of money is the root of all evil. They assume that making a lot of money requires exploiting others and that the best way to wash off the resulting stain is to give a lot of it away. In Why It’s OK to Want to Be Rich Jason Brennan shows that the moralizers have it backwards. He argues that in general the more money you make the more you already do for others and that even an average wage earner is productively “giving back” to society just by doing her job. In addition wealth liberates us to have the best chance of leading a life that’s authentically our own. Brennan also demonstrates how money-based societies create nicer more trustworthy and more cooperative citizens. And in another chapter that takes on the new historians of capitalism Brennan argues that wealthy nations became wealthy because of their healthy institutions not from their horrific histories of slavery or colonialism. While writing that the more money one has the more one should help others Brennan also notes that we weren’t born into a perpetual debt to society. It’s OK to get rich and it’s OK to enjoy being rich too. Key Features Shows how the desire to become wealthy in an open and fair market helps maximize cooperation and lessens the chance of violence and war Argues that it is much easier for the average for-profit business to add value to the world than it is for the average non-profit Demonstrates that the kinds of virtues (e. g. conscientiousness thoughtfulness hard work) that lead to desirable personal and civic states (e. g. happy marriages stable families engaged citizens) also make people richer Argues that living in small clans for most of their history has given humans a negative attitude towards anyone acquiring more than her fair share an attitude that’s ill-suited for our market-driven globally connected world In a final provocative chapter maintains that ideal economic growth is infinite. | Why It's OK to Want to Be Rich

GBP 19.99
1

A Transition to Proof An Introduction to Advanced Mathematics

The Lean Approach to Digital Transformation From Customer to Code and From Code to Customer

The Lean Approach to Digital Transformation From Customer to Code and From Code to Customer

The Lean Approach to Digital Transformation: From Customer to Code and From Code to Customer is organized into three parts that expose and develop the three capabilities that are essential for a successful digital transformation: 1. Understanding how to co-create digital services with users whether they are customers or future customers. This ability combines observation dialogue and iterative experimentation. The approach proposed in this book is based on the Lean Startup approach according to an extended vision that combines Design Thinking and Growth Hacking. Companies must become truly customer-centric from observation and listening to co-development. The revolution of the digital age of the 21st century is that customer orientation is more imperative - the era of abundance usages rate of change complexity of experiences and shift of power towards communities - are easier using digital tools and digital communities. 2. Developing an information system (IS) that is the backbone of the digital transformation – called “exponential information system” to designate an open IS (in particular on its borders) capable of interfacing and combining with external services positioned as a player in software ecosystems and built for processing scalable and dynamic data flows. The exponential information system is constantly changing and it continuously absorbs the best of information processing technology such as Artificial Intelligence and Machine Learning. 3. Building software “micro-factories” that produce service platforms which are called “Lean software factories. ” This “software factory” concept covers the integration of agile methods tooling and continuous integration and deployment practices a customer-oriented product approach and a platform approach based on modularity as well as API-based architecture and openness to external stakeholders. This software micro-factory is the foundation that continuously produces and provides constantly evolving services. These three capabilities are not unique or specific to this book they are linked to other concepts such as agile methods product development according to lean principles software production approaches such as CICD (continuous integration and deployment) or DevOps. This book weaves a common frame of reference for all these approaches to derive more value from the digital transformation and to facilitate its implementation. The title of the book refers to the “lean approach to digital transformation” because the two underlying frameworks Lean Startup and Lean Software Factory are directly inspired by Lean in the sense of the Toyota Way. The Lean approach is present from the beginning to the end of this book - it provides the framework for customer orientation and the love of a job well done which are the conditions for the success of a digital transformation. | The Lean Approach to Digital Transformation From Customer to Code and From Code to Customer

GBP 32.99
1

Preface to Action