155 results (0,24211 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

Successful security professionals have had to modify the process of responding to new threats in the high-profile ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists forms questionnaires and sample assessments. Presents Case Studies and Examples of all Risk Management ComponentsBased on the seminars of information security expert Tom Peltier this volume provides the processes that you can easily employ in your organization to assess risk. Answers such FAQs as:Why should a risk analysis be conducted?Who should review the results?How is the success measured?Always conscious of the bottom line Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization—and it’s not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.

GBP 56.99
1

Ethics in IT Outsourcing

Ethics in IT Outsourcing

In IT divisions and organizations the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro macro and corporate level this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals corporations and society Outlines a new corporate capability—the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author’s decades of experience working with large firms in IT and outsourcing this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal corporate and societal decision-making. Readers are invited to participate in the growing dialog of business ethics and IT outsourcing ethics in particular at the author’s website: www. ethicsinit. com

GBP 54.99
1

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

This is an important book. Ethics is not an easy topic and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . Use this book as a practical resource an informative and educational source of material in developing expertise but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines professional journals and online blogs. These are synthesised into a blueprint which addresses in a practical manner the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15 became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world of what has happened and what might happen as digital technology continues to pervade.

GBP 52.99
1

Knowledge Management in Practice

Knowledge Management in Practice

This evidence-based book provides the framework and guidelines that professionals need for working with the contemporary explosion of data that is creating opportunities and challenges to all phases of our society and commerce. –Larry R. Medsker Research Professor in Physics and Data Science The George Washington UniversityKnowledge Management in Practice is a resource on how knowledge management (KM) is implemented. It provides specific KM methods tips techniques and best practices to gain competitive advantage and the most from investing in KM. It examines how KM is leveraged by first responders the military healthcare providers insurance and financial services companies legal firms human resources departments merger and acquisition (M&A) firms and research institutions. Essential KM concepts are explored not only from a foundational perspective but also from a practical application. These concepts include capturing and codifying tacit and explicit knowledge KM methods information architecture search KM and social media KM and Big Data and the adoption of KM. Readers can visit the book’s companion website KM Mentor (www. KMMentor. com) where they can access:Presentations by industry leaders on a variety of topicsKM templates and instruction on executing KM strategy performing knowledge transfer and KM assessments and auditsKM program and project implementation guidanceInsights and reviews on KM toolsGuidance on implementing and executing various KM MethodsSpecialized KM publicationsA private secure collaboration community for members to discuss ideas and get expert answers and advice

GBP 44.99
1

Data Analytics in Project Management

Building in Security at Agile Speed

Building in Security at Agile Speed

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still achieving security remains a human endeavor a core part of designing generating and verifying software. Dr. James Ransome and Brook S. E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately humans generate software security. People collectively act through a particular and distinct set of methodologies processes and technologies that the authors have brought together into a newly designed holistic generic software development lifecycle facilitating software security at Agile DevOps speed. —Eric. S. Yuan Founder and CEO Zoom Video Communications Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. —Jennifer Sunshine Steffens CEO of IOActive Both practical and strategic Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical but deeply human elements of agile ways of working. —Jorgen Hesselberg author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. —George K Tsantes CEO of Cyberphos former partner at Accenture and Principal at EYDetailing the people processes and technical aspects of software security Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed managed and exploited by humans. This book presents a step-by-step process for software security that uses today’s technology operational business and development methods with a focus on best practice proven activities processes tools and metrics for any size or type of organization and development practice.

GBP 44.99
1

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

As the twelfth most populous nation the Philippines’ diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security—post 9/11. Issues previously considered social or public are now viewed as security issues. Food production is now analyzed in the context of food security and environmental degradation is now a part of environmental security. This broadened perspective is not unique to the Philippines but—thanks to the island nation’s long struggle with issues of Muslim radicalism democracy and globalization—it serves as a model worth studying. And no one is better positioned to take on this study than Rommel C. Banlaoi Chairman and Executive Director of the Philippine Institute for Peace Violence and Terrorism Research. In Philippine Security in the Age of Terror: National Regional and Global Challenges in the Post-9/11 World Banlaoi illustrates the increasing complexity of the issues. Divided into three sections the book explores why a nation’s security can no longer be just about its military or only about what is happening within its borders. Section I reviews issues specific to the Philippine people including politics national identity globalization and local and military security. Section II moves to bilateral security issues to report on security interests and collaborations with the United States China and Australia—as well as with India Japan and Russia. Section III examines selected global regional and multilateral issues such as maritime security piracy and the ASEAN Regional Forum. The comprehensive approach and coverage within the book reflects the author’s diverse interests as a scholar of politics security terrorism and international relations. More importantly it documents an intellectual journey that national policymakers across the world need to consider if they hope to achieve the shift in thinking that will promote the well-being of the world’s populations as the strategic centerpiece of any war on terrorism. | Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

GBP 56.99
1

Cognitive Hack The New Battleground in Cybersecurity ... the Human Mind

Project Management in Small and Medium-Sized Enterprises A European Perspective

Project Management in Small and Medium-Sized Enterprises A European Perspective

The growing importance of projects in organizations combined with difficulties in their implementation is accompanied by the need for professional knowledge in the field of project management. It results from the complexity of project management problems and the difficulty of knowledge that must be applied. However surprisingly little is known about this topic especially in the context of European small and medium-sized enterprises (SMEs). Project Management in Small and Medium-Sized Enterprises: A European Perspective attempts to fill this specific research gap. The book analyses the process of managing projects being implemented by small and medium-sized firms from Europe identifies organizational processes and verifies which elements of these processes require improvement. It concentrates on issues around the multifaceted characteristics of project management with particular emphasis on the process of managing European small and medium enterprises. The book is the result of many years of empirical research and consists of two main parts: A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy. A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy Verification and development of such model procedures in the management of projects so that the SME enterprises’ functioning will be efficient and effective. There is a close relationship between the two parts. The theoretical part is the foundation on which practical considerations are later carried out. Integrating theoretical and practical issues the book introduces new content to the literature and has the practical value of indicating how to manage projects in SMEs in the European Union. It also examines the decision-making processes related to project management in these organizations. | Project Management in Small and Medium-Sized Enterprises A European Perspective

GBP 89.99
1

Securing IoT in Industry 4.0 Applications with Blockchain

Securing IoT in Industry 4.0 Applications with Blockchain

The Industry 4. 0 revolution is changing the world around us. Artificial intelligence and machine learning automation and robotics big data Internet of Things augmented reality virtual reality and creativity are the tools of Industry 4. 0. Improved collaboration is seen between smart systems and humans which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4. 0 Applications with Blockchain examines the role of IoT in Industry 4. 0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications architecture technologies tools and programming languages. It then examines blockchain and cybersecurity as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4. 0 systems The evolution of the Industrial Internet of Things (IIoT) its proliferation and market share and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT) including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications including smart contracts transferring financial instruments and Public Key Infrastructure An overview of the structure and working of a blockchain including the types evolution benefits and applications of blockchain to industries A framework of technologies designed to shield networks computers and data from malware vulnerabilities and unauthorized activities An explanation of the automation system employed in industries along with its classification functionality flexibility limitations and applications

GBP 115.00
1

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems engineering has been applied to some of the most important projects of our time including those that have helped humanity explore the world and the universe expand our technical abilities and enhance the quality of human life. Without formal training in systems engineering the discipline is often difficult to understand and apply and its use within projects is often confusing. Systems Engineering for Projects: Achieving Positive Outcomes in a Complex World provides an approach that utilizes a combination of the most effective processes from both project management and systems engineering disciplines in a simplified and straightforward manner. The processes described in the book are lightweight flexible and tailorable. They provide the shortest path to success in projects across the entire project life cycle from research to operations and from simple to the most complex. The book also addresses how this methodology can be used in a continually adapting and changing world as projects span disciplines and become even more interconnected across all areas of human existence. Each chapter includes diagrams templates summary lists a case study and a thought-provoking question and answer section that assists readers in immediate application of the material to their own projects. The book is a project manager’s resource for understanding how to directly apply essential processes to projects in a way that increases the probability of achieving success. It is a comprehensive go-to manual on the application of systems engineering processes to projects of all types and complexity. | Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

GBP 42.99
1

FinTech The Technology Driving Disruption in the Financial Services Industry

A Software Development Approach for Driving Competitiveness in Small Firms

A Software Development Approach for Driving Competitiveness in Small Firms

The COVID-19 Pandemic has forced many businesses to accelerate their digital transformation strategies to continue to meet the changing needs of their customers. This has resulted in significant growth in the global software market. However for decades managing software product quality has been a major challenge for many software development firms. This low success rate is due mainly to the development and delivery of low-quality software products. In addition to the direct costs associated with poor-quality software software flaws can also raisesecurity concerns as hackers can gain complete control of various devices and data such as mobile phones computers or the operational transactions of businesses. These security and privacy breaches are currently occurring with great frequency. Although producers and consumers of software products spend vast amounts of money developing and purchasing these products in many cases the promised benefits of user satisfaction efficiency productivity and profitability are not realized. In more severe circumstances software development firms have failed and face the threat of going bankrupt being acquired or suffering closure because customers are demanding high-quality software products that they consistently fail to deliver. Small and medium enterprises (SMEs) operating within the software development industry have a more critical need to produce high-quality software since they are less able to absorb both the cost and the reputational impact of producing low-quality output. A Software Development Approach for Driving Competitiveness in Small Firms provides some cost-efficient options that can help SMEs increase the likelihood that their software will be of high quality. It tells the story of the entrepreneurial journey that small firms should take to deliver high-quality software products. By utilizing practical examples and providing several recommended solutions to decrease the likelihood of producing low-quality software the book outlines how mobilizing people processes and technology are integral to the software development process and emphasizes why process maturity is the most influential factor in software development in small and medium enterprises.

GBP 89.99
1

C++ Template Metaprogramming in Practice A Deep Learning Framework

C++ Template Metaprogramming in Practice A Deep Learning Framework

Using the implementation of a deep learning framework as an example C++ Template Metaprogramming in Practice: A Deep Learning Framework explains the application of metaprogramming in a relatively large project and emphasizes ways to optimize systems performance. The book is suitable for developers with a basic knowledge of C++. Developers familiar with mainstream deep learning frameworks can also refer to this book to compare the differences between the deep learning framework implemented with metaprogramming and compile-time computing with deep learning frameworks using object-oriented methods. Consisting of eight chapters the book starts with two chapters discussing basic techniques of metaprogramming and compile-time computing. The rest of the book’s chapters focus on the practical application of metaprogramming in a deep learning framework. It examines rich types and systems expression templates and writing complex meta-functions as well as such topics as: Heterogeneous dictionaries and policy templates An introduction to deep learning Type system and basic data types Operations and expression templates Basic layers Composite and recurrent layers Evaluation and its optimization Metaprogramming can construct flexible and efficient code. For C++ developers who are familiar with object-oriented programming the main difficulty in learning and mastering C++ metaprogramming is establishing the thinking mode of functional programming. The meta-programming approach involved at compile time is functional which means that the intermediate results of the construction cannot be changed and the impact may be greater than expected. This book enables C++ programmers to develop a functional mindset and metaprogramming skills. The book also discusses the development cost and use cost of metaprogramming and provides workarounds for minimizing these costs. | C++ Template Metaprogramming in Practice A Deep Learning Framework

GBP 99.99
1

Bankers Like Us Dispatches from an Industry in Transition

Bankers Like Us Dispatches from an Industry in Transition

This book will resonate with anyone no matter where you reside on this journey whether newbie or old guard. If you want to be part of this change you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate then I suggest you think about stepping aside. — Curt Queyrouze President Coastal Community Bank The world is going digital and so is banking—in fits starts and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about not by external heroes and saviours not by a generation yet to be born but people just like us. People who understand the industry and its quirks. Bankers who have the grit determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a ‘this is who we are’ piece including the author’s trench credentials. It then presents an overview of corporate culture (this is what we deal with and a few ideas on how to handle it) as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds and a hopeful look-ahead on what a team of principled dedicated folks can do despite everything. | Bankers Like Us Dispatches from an Industry in Transition

GBP 29.99
1

Program Management in Defense and High Tech Environments

Program Management in Defense and High Tech Environments

Program management in a technical environment is as much art as it is science. Effective program managers are able to combine management and leadership skills for the good of the program and the people entrusted to them. This book illuminates the entire life cycle of the program—from the customer’s original concept to successful completion. It includes many helpful ideas and insights into why programs and program managers can fail. Much more importantly it provides insights about how program managers can succeed. Program Management in Defense and High Tech Environments is organized as a chronological tale of a program life cycle with side trips that cover the important concepts of leadership claims and claims avoidance earned value measurement (EVM) communication basics negotiations and coaching. The book begins with an overview of program management discussing the role of program managers their required skills and experience and the types of programs and contracts. The remainder of the book provides more detail on the program manager’s role and the environment in which he or she works. Understanding that academic explanations of program management activities can be dry the author uses true-to-life stories to present the nuts and bolts of the work. These stories illustrate the science of program management and the art that is necessary for success. The book discusses many of the common program pitfalls. It explains how to detect and avoid scope creep—the unintended expansion of program scope. It details both internal and external scope creep and stresses the importance of constant vigilance to prevent cost overruns and schedule delays. Program Management in Defense and High Tech Environments is a comprehensive guide for early- and mid-career program managers to understand what they need to do to be successful. It is also a valuable resource for later-career program managers who want to learn through other program managers’ successes and failures.

GBP 44.99
1

Data Analytics Applications in Latin America and Emerging Economies

Ethics and Governance in Project Management Small Sins Allowed and the Line of Impunity

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

An organization’s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods safeguards and techniques that help protect an organization from insider computer fraud. Drawing from the author’s vast experience assessing the adequacy of IT security for the banking and securities industries the book presents a practical framework for identifying measuring monitoring and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit process and store sensitive data. The author also examines the symbiotic relationship between the risks controls threats and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process. | Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

GBP 56.99
1

Software Engineering with UML

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location demographics and sentiments of the participants of the network and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems analyze such systems and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book together with the numerous references listed in each chapter have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies (2) basics of analyzing and securing social networks (3) the authors’ design and implementation of various social network analytics tools (4) privacy aspects of social networks (5) access control and inference control for social networks (6) experimental systems designed or developed by the authors on analyzing and securing social networks (7) social media application systems developed by the authors (8) secure social media systems developed by the authors and (9) some of the authors’ exploratory work and further directions.

GBP 42.99
1

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

#1 Best Selling Information Security Book by Taylor & Francis in 2019 2020 2021 and 2022! 2020 Cybersecurity CANON Hall of Fame Winner Todd Fitzgerald co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success Information Security Governance Simplified: From the Boardroom to the Keyboard co-author for the E-C Council CISO Body of Knowledge and contributor to many others including Official (ISC)2 Guide to the CISSP CBK COBIT 5 for Information Security and ISACA CSX Cybersecurity Fundamental Certification is back with this new book incorporating practical experience in leading building and sustaining an information security/cybersecurity program. CISO COMPASS includes personal pragmatic perspectives and lessons learned of over 75 award-winning CISOs security leaders professional association leaders and cybersecurity standard setters who have fought the tough battle. Todd has also for the first time adapted the McKinsey 7S framework (strategy structure systems shared values staff skills and style) for organizational effectiveness to the practice of leading cybersecurity to structure the content to ensure comprehensive coverage by the CISO and security leaders to key issues impacting the delivery of the cybersecurity strategy and demonstrate to the Board of Directors due diligence. The insights will assist the security leader to create programs appreciated and supported by the organization capable of industry/ peer award-winning recognition enhance cybersecurity maturity gain confidence by senior management and avoid pitfalls. The book is a comprehensive soup-to-nuts book enabling security leaders to effectively protect information assets and build award-winning programs by covering topics such as developing cybersecurity strategy emerging trends and technologies cybersecurity organization structure and reporting models leveraging current incidents security control frameworks risk management laws and regulations data protection and privacy meaningful policies and procedures multi-generational workforce team dynamics soft skills and communicating with the Board of Directors and executive management. The book is valuable to current and future security leaders as a valuable resource and an integral part of any college program for information/ cybersecurity. | CISO COMPASS Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

GBP 44.99
1

Information Security Management Handbook Volume 4

Information Security Management Handbook Volume 4

Every year in response to advancements in technology and new laws in different countries and regions there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security and assurance. Providing an up-to-date compilation of the fundamental skills techniques tools and understanding required of IT security professionals the Information Security Management Handbook Sixth Edition Volume 4 reflects the latest changes to information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information on mobile device security adaptive threat defense Web 2. 0 virtualization data leakage and governance. New material also addresses risk management business continuity planning disaster recovery planning and cryptography. As the risks that threaten the security of our systems continue to evolve it is imperative that those charged with protecting that information stay ahead of the curve. Also available in a fully searchable CD-ROM format this comprehensive resource provides the up-to-date understanding required to keep you abreast of the latest developments new vulnerabilities and possible threats. | Information Security Management Handbook Volume 4

GBP 56.99
1

Software Development Patterns and Antipatterns

Software Development Patterns and Antipatterns

Software development has been a troubling since it first started. There are seven chronic problems that have plagued it from the beginning: Incomplete and ambiguous user requirements that grow by >2% per month. Major cost and schedule overruns for large applications > 35% higher than planned. Low defect removal efficiency (DRE) < 85% on large systems. Cancelled projects that are not completed: > 30% above 10 000 function points. Poor quality and low reliability after the software is delivered: > 5 bugs per FP. Breach of contract litigation against software outsource vendors. Expensive maintenance and enhancement costs after delivery. These are endemic problems for software executives software engineers and software customers but they are not insurmountable. In Software Development Patterns and Antipatterns software engineering and metrics pioneer Capers Jones presents technical solutions for all seven. The solutions involve moving from harmful patterns of software development to effective patterns of software development. The first section of the book examines common software development problems that have been observed in many companies and government agencies. The data on the problems comes from consulting studies breach of contract lawsuits and the literature on major software failures. This section considers the factors involved with cost overruns schedule delays canceled projects poor quality and expensive maintenance after deployment. The second section shows patterns that lead to software success. The data comes from actual companies. The section’s first chapter on Corporate Software Risk Reduction in a Fortune 500 company was based on a major telecom company whose CEO was troubled by repeated software failures. The other chapters in this section deal with methods of achieving excellence as well as measures that can prove excellence to C-level executives and with continuing excellence through the maintenance cycle as well as for software development.

GBP 48.99
1

Risk Analytics Data-Driven Decisions under Uncertainty

Risk Analytics Data-Driven Decisions under Uncertainty

The 2022 World Economic Forum surveyed 1 000 experts and leaders who indicated their risk perception that the earth’s conditions for humans are a main concern in the next 10 years. This means environmental risks are a priority to study in a formal way. At the same time innovation risks are present in theminds of leaders newknowledge brings new risk and the adaptation and adoption of risk knowledge is required to better understand the causes and effects can have on technological risks. These opportunities require not only adopting new ways of managing and controlling emerging processes for society and business but also adapting organizations to changes and managing new risks. Risk Analytics: Data-Driven Decisions Under Uncertainty introduces a way to analyze and design a risk analytics system (RAS) that integrates multiple approaches to risk analytics to deal with diverse types of data and problems. A risk analytics system is a hybrid system where human and artificial intelligence interact with a data gathering and selection process that uses multiple sources to the delivery of guidelines to make decisions that include humans and machines. The RAS system is an integration of components such as data architecture with diverse data and a risk analytics process and modeling process to obtain knowledge and then determine actions through the new knowledge that was obtained. The use of data analytics is not only connected to risk modeling and its implementation but also to the development of the actionable knowledge that can be represented by text in documents to define and share explicit knowledge and guidelines in the organization for strategy implementation. This book moves from a review of data to the concepts of a RAS. It reviews RAS system components required to support the creation of competitive advantage in organizations through risk analytics. Written for executives analytics professionals risk management professionals strategy professionals and postgraduate students this book shows a way to implement the analytics process to develop a risk management practice that creates an adaptive competitive advantage under uncertainty. | Risk Analytics Data-Driven Decisions under Uncertainty

GBP 74.99
1