154 results (0,22342 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Ethics in IT Outsourcing

Ethics in IT Outsourcing

In IT divisions and organizations the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads Ethics in IT Outsourcing explores the complex challenges of aligning IT outsourcing programs with ethical conduct and standards. This one-stop reference on the ethical structure and execution of IT outsourcing incorporates an easy-to-apply checklist of principles for outsourcing executives and managers. It examines certification programs such as the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals established by the International Association of Outsourcing Professionals (IAOP). Based upon significant research on the economic impact of outsourcing at a micro macro and corporate level this volume defines a comprehensive set of ethical program components to ensure your program is aligned with ethical guidelines. Based on a solid foundation of documented research and analysis Examines the ethical impact of outsourcing on individuals corporations and society Outlines a new corporate capability—the Ethics PMO Includes a list of tools to help readers establish their own Ethics PMO Filled with authoritative insights based on the author’s decades of experience working with large firms in IT and outsourcing this book is suitable for both veteran IT practitioners and stakeholders new to the topic. A must-read for anyone seeking to understand the underlying issues in this area of growing importance it will bring you up to speed on the recent developments you need to be aware of to ensure ethical personal corporate and societal decision-making. Readers are invited to participate in the growing dialog of business ethics and IT outsourcing ethics in particular at the author’s website: www. ethicsinit. com

GBP 54.99
1

Ethical Digital Technology in Practice

Ethical Digital Technology in Practice

This is an important book. Ethics is not an easy topic and arguably the ethics of IT is less so—not leastdue to its potential for developing and evolving in ways that are either unforeseen or unimaginable . . Use this book as a practical resource an informative and educational source of material in developing expertise but also as an invaluable toolkit to support practical application of ethical thinking. —Declan Brady President of the Irish Computer Society and a member of the Board of Directors of the Council of European Professional Informatics Societies Digital technology is about people. It is about those who plan develop and implement applications which other people use and are affected by. It is about the impact on all these people as well as on the world at large. Ethical Digital Technology in Practice takes a real-world perspective to explore these impacts over time and discover ways in which to promote ethical digital technology through good practice. It draws upon the author’s published articles in trade magazines professional journals and online blogs. These are synthesised into a blueprint which addresses in a practical manner the societal issues surrounding the increasing use and abuse of digital technology. It is a follow-up book to the author’s book The Evolving Landscape of Ethical Digital Technology which has a researcher’s perspective. This book is a hands-on account of the computer revolution from 1995 to the current day when the world is increasingly dependent on digital technology. It explores some of the social and ethical issues that are part of this revolution. This is not a book about deep philosophical and technical concepts. Nor does it claim to be comprehensive. It is the author’s personal account of technological change and its effects on people. It is written by a boy who was smitten by computer technology at the age of 15 became a computer professional and subsequently spent many years showing young people how to develop and use digital technology in a good way. It is a book based upon the author’s engagement with practitioners academics and students during the period as well as his continued fascination with this fantastic technology. Ethical Digital Technology in Practice is a book about the real world of what has happened and what might happen as digital technology continues to pervade.

GBP 52.99
1

Knowledge Management in Practice

Knowledge Management in Practice

This evidence-based book provides the framework and guidelines that professionals need for working with the contemporary explosion of data that is creating opportunities and challenges to all phases of our society and commerce. –Larry R. Medsker Research Professor in Physics and Data Science The George Washington UniversityKnowledge Management in Practice is a resource on how knowledge management (KM) is implemented. It provides specific KM methods tips techniques and best practices to gain competitive advantage and the most from investing in KM. It examines how KM is leveraged by first responders the military healthcare providers insurance and financial services companies legal firms human resources departments merger and acquisition (M&A) firms and research institutions. Essential KM concepts are explored not only from a foundational perspective but also from a practical application. These concepts include capturing and codifying tacit and explicit knowledge KM methods information architecture search KM and social media KM and Big Data and the adoption of KM. Readers can visit the book’s companion website KM Mentor (www. KMMentor. com) where they can access:Presentations by industry leaders on a variety of topicsKM templates and instruction on executing KM strategy performing knowledge transfer and KM assessments and auditsKM program and project implementation guidanceInsights and reviews on KM toolsGuidance on implementing and executing various KM MethodsSpecialized KM publicationsA private secure collaboration community for members to discuss ideas and get expert answers and advice

GBP 44.99
1

Data Analytics in Project Management

Building in Security at Agile Speed

Building in Security at Agile Speed

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still achieving security remains a human endeavor a core part of designing generating and verifying software. Dr. James Ransome and Brook S. E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately humans generate software security. People collectively act through a particular and distinct set of methodologies processes and technologies that the authors have brought together into a newly designed holistic generic software development lifecycle facilitating software security at Agile DevOps speed. —Eric. S. Yuan Founder and CEO Zoom Video Communications Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. —Jennifer Sunshine Steffens CEO of IOActive Both practical and strategic Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical but deeply human elements of agile ways of working. —Jorgen Hesselberg author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. —George K Tsantes CEO of Cyberphos former partner at Accenture and Principal at EYDetailing the people processes and technical aspects of software security Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed managed and exploited by humans. This book presents a step-by-step process for software security that uses today’s technology operational business and development methods with a focus on best practice proven activities processes tools and metrics for any size or type of organization and development practice.

GBP 44.99
1

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

As the twelfth most populous nation the Philippines’ diverse religious and ethnic population makes it an ideal example of the changing tenet of what is deemed national security—post 9/11. Issues previously considered social or public are now viewed as security issues. Food production is now analyzed in the context of food security and environmental degradation is now a part of environmental security. This broadened perspective is not unique to the Philippines but—thanks to the island nation’s long struggle with issues of Muslim radicalism democracy and globalization—it serves as a model worth studying. And no one is better positioned to take on this study than Rommel C. Banlaoi Chairman and Executive Director of the Philippine Institute for Peace Violence and Terrorism Research. In Philippine Security in the Age of Terror: National Regional and Global Challenges in the Post-9/11 World Banlaoi illustrates the increasing complexity of the issues. Divided into three sections the book explores why a nation’s security can no longer be just about its military or only about what is happening within its borders. Section I reviews issues specific to the Philippine people including politics national identity globalization and local and military security. Section II moves to bilateral security issues to report on security interests and collaborations with the United States China and Australia—as well as with India Japan and Russia. Section III examines selected global regional and multilateral issues such as maritime security piracy and the ASEAN Regional Forum. The comprehensive approach and coverage within the book reflects the author’s diverse interests as a scholar of politics security terrorism and international relations. More importantly it documents an intellectual journey that national policymakers across the world need to consider if they hope to achieve the shift in thinking that will promote the well-being of the world’s populations as the strategic centerpiece of any war on terrorism. | Philippine Security in the Age of Terror National Regional and Global Challenges in the Post-9/11 World

GBP 56.99
1

Cognitive Hack The New Battleground in Cybersecurity ... the Human Mind

Project Management in Small and Medium-Sized Enterprises A European Perspective

Project Management in Small and Medium-Sized Enterprises A European Perspective

The growing importance of projects in organizations combined with difficulties in their implementation is accompanied by the need for professional knowledge in the field of project management. It results from the complexity of project management problems and the difficulty of knowledge that must be applied. However surprisingly little is known about this topic especially in the context of European small and medium-sized enterprises (SMEs). Project Management in Small and Medium-Sized Enterprises: A European Perspective attempts to fill this specific research gap. The book analyses the process of managing projects being implemented by small and medium-sized firms from Europe identifies organizational processes and verifies which elements of these processes require improvement. It concentrates on issues around the multifaceted characteristics of project management with particular emphasis on the process of managing European small and medium enterprises. The book is the result of many years of empirical research and consists of two main parts: A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy. A systematization of concepts terminology and thus knowledge in the field of project management with particular emphasis on the phases of planning organizing as well as leading and controlling in the project as well as small and medium-sized enterprises with particular emphasis on their specificity and role in the modern European economy Verification and development of such model procedures in the management of projects so that the SME enterprises’ functioning will be efficient and effective. There is a close relationship between the two parts. The theoretical part is the foundation on which practical considerations are later carried out. Integrating theoretical and practical issues the book introduces new content to the literature and has the practical value of indicating how to manage projects in SMEs in the European Union. It also examines the decision-making processes related to project management in these organizations. | Project Management in Small and Medium-Sized Enterprises A European Perspective

GBP 89.99
1

Securing IoT in Industry 4.0 Applications with Blockchain

Securing IoT in Industry 4.0 Applications with Blockchain

The Industry 4. 0 revolution is changing the world around us. Artificial intelligence and machine learning automation and robotics big data Internet of Things augmented reality virtual reality and creativity are the tools of Industry 4. 0. Improved collaboration is seen between smart systems and humans which merges humans' critical and cognitive thinking abilities with highly accurate and fast industrial automation. Securing IoT in Industry 4. 0 Applications with Blockchain examines the role of IoT in Industry 4. 0 and how it can be made secure through various technologies including blockchain. The book begins with an in-depth look at IoT and discusses applications architecture technologies tools and programming languages. It then examines blockchain and cybersecurity as well as how blockchain achieves cybersecurity. It also looks at cybercrimes and their preventive measures and issues related to IoT security and trust. Features An overview of how IoT is used to improve the performance of Industry 4. 0 systems The evolution of the Industrial Internet of Things (IIoT) its proliferation and market share and some examples across major industries An exploration of how smart farming is helping farmers prevent plant disease The concepts behind the Internet of Nano Things (IoNT) including the nanomachine and nanonetwork architecture and nano-communication paradigms A look at how blockchains can enhance cybersecurity in a variety of applications including smart contracts transferring financial instruments and Public Key Infrastructure An overview of the structure and working of a blockchain including the types evolution benefits and applications of blockchain to industries A framework of technologies designed to shield networks computers and data from malware vulnerabilities and unauthorized activities An explanation of the automation system employed in industries along with its classification functionality flexibility limitations and applications

GBP 115.00
1

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

Systems engineering has been applied to some of the most important projects of our time including those that have helped humanity explore the world and the universe expand our technical abilities and enhance the quality of human life. Without formal training in systems engineering the discipline is often difficult to understand and apply and its use within projects is often confusing. Systems Engineering for Projects: Achieving Positive Outcomes in a Complex World provides an approach that utilizes a combination of the most effective processes from both project management and systems engineering disciplines in a simplified and straightforward manner. The processes described in the book are lightweight flexible and tailorable. They provide the shortest path to success in projects across the entire project life cycle from research to operations and from simple to the most complex. The book also addresses how this methodology can be used in a continually adapting and changing world as projects span disciplines and become even more interconnected across all areas of human existence. Each chapter includes diagrams templates summary lists a case study and a thought-provoking question and answer section that assists readers in immediate application of the material to their own projects. The book is a project manager’s resource for understanding how to directly apply essential processes to projects in a way that increases the probability of achieving success. It is a comprehensive go-to manual on the application of systems engineering processes to projects of all types and complexity. | Systems Engineering for Projects Achieving Positive Outcomes in a Complex World

GBP 42.99
1

FinTech The Technology Driving Disruption in the Financial Services Industry

A Software Development Approach for Driving Competitiveness in Small Firms

A Software Development Approach for Driving Competitiveness in Small Firms

The COVID-19 Pandemic has forced many businesses to accelerate their digital transformation strategies to continue to meet the changing needs of their customers. This has resulted in significant growth in the global software market. However for decades managing software product quality has been a major challenge for many software development firms. This low success rate is due mainly to the development and delivery of low-quality software products. In addition to the direct costs associated with poor-quality software software flaws can also raisesecurity concerns as hackers can gain complete control of various devices and data such as mobile phones computers or the operational transactions of businesses. These security and privacy breaches are currently occurring with great frequency. Although producers and consumers of software products spend vast amounts of money developing and purchasing these products in many cases the promised benefits of user satisfaction efficiency productivity and profitability are not realized. In more severe circumstances software development firms have failed and face the threat of going bankrupt being acquired or suffering closure because customers are demanding high-quality software products that they consistently fail to deliver. Small and medium enterprises (SMEs) operating within the software development industry have a more critical need to produce high-quality software since they are less able to absorb both the cost and the reputational impact of producing low-quality output. A Software Development Approach for Driving Competitiveness in Small Firms provides some cost-efficient options that can help SMEs increase the likelihood that their software will be of high quality. It tells the story of the entrepreneurial journey that small firms should take to deliver high-quality software products. By utilizing practical examples and providing several recommended solutions to decrease the likelihood of producing low-quality software the book outlines how mobilizing people processes and technology are integral to the software development process and emphasizes why process maturity is the most influential factor in software development in small and medium enterprises.

GBP 89.99
1

C++ Template Metaprogramming in Practice A Deep Learning Framework

C++ Template Metaprogramming in Practice A Deep Learning Framework

Using the implementation of a deep learning framework as an example C++ Template Metaprogramming in Practice: A Deep Learning Framework explains the application of metaprogramming in a relatively large project and emphasizes ways to optimize systems performance. The book is suitable for developers with a basic knowledge of C++. Developers familiar with mainstream deep learning frameworks can also refer to this book to compare the differences between the deep learning framework implemented with metaprogramming and compile-time computing with deep learning frameworks using object-oriented methods. Consisting of eight chapters the book starts with two chapters discussing basic techniques of metaprogramming and compile-time computing. The rest of the book’s chapters focus on the practical application of metaprogramming in a deep learning framework. It examines rich types and systems expression templates and writing complex meta-functions as well as such topics as: Heterogeneous dictionaries and policy templates An introduction to deep learning Type system and basic data types Operations and expression templates Basic layers Composite and recurrent layers Evaluation and its optimization Metaprogramming can construct flexible and efficient code. For C++ developers who are familiar with object-oriented programming the main difficulty in learning and mastering C++ metaprogramming is establishing the thinking mode of functional programming. The meta-programming approach involved at compile time is functional which means that the intermediate results of the construction cannot be changed and the impact may be greater than expected. This book enables C++ programmers to develop a functional mindset and metaprogramming skills. The book also discusses the development cost and use cost of metaprogramming and provides workarounds for minimizing these costs. | C++ Template Metaprogramming in Practice A Deep Learning Framework

GBP 99.99
1

Bankers Like Us Dispatches from an Industry in Transition

Bankers Like Us Dispatches from an Industry in Transition

This book will resonate with anyone no matter where you reside on this journey whether newbie or old guard. If you want to be part of this change you need to understand all about the messy middle that Leda so expertly describes in this book. If you read this book and it doesn’t resonate then I suggest you think about stepping aside. — Curt Queyrouze President Coastal Community Bank The world is going digital and so is banking—in fits starts and circles. Why is it so hard? Why is the industry constantly getting in the way of its own technological progress and what can we do about it all? This book looks at the human and structural obstacles to innovation-driven transformation and at the change in habits mindsets and leadership needed for the next stage of the digital journey and argues that this change will be brought about not by external heroes and saviours not by a generation yet to be born but people just like us. People who understand the industry and its quirks. Bankers who have the grit determination and energy to drive change. Bankers like us. This book celebrates and chronicles the shared experience of bankers like us. It starts with a ‘this is who we are’ piece including the author’s trench credentials. It then presents an overview of corporate culture (this is what we deal with and a few ideas on how to handle it) as well as a piece on why transformation is so difficult and so many get it wrong; a piece on the challenges our lack of diversity brings or compounds and a hopeful look-ahead on what a team of principled dedicated folks can do despite everything. | Bankers Like Us Dispatches from an Industry in Transition

GBP 29.99
1

Data Analytics Applications in Latin America and Emerging Economies

Program Management in Defense and High Tech Environments

Program Management in Defense and High Tech Environments

Program management in a technical environment is as much art as it is science. Effective program managers are able to combine management and leadership skills for the good of the program and the people entrusted to them. This book illuminates the entire life cycle of the program—from the customer’s original concept to successful completion. It includes many helpful ideas and insights into why programs and program managers can fail. Much more importantly it provides insights about how program managers can succeed. Program Management in Defense and High Tech Environments is organized as a chronological tale of a program life cycle with side trips that cover the important concepts of leadership claims and claims avoidance earned value measurement (EVM) communication basics negotiations and coaching. The book begins with an overview of program management discussing the role of program managers their required skills and experience and the types of programs and contracts. The remainder of the book provides more detail on the program manager’s role and the environment in which he or she works. Understanding that academic explanations of program management activities can be dry the author uses true-to-life stories to present the nuts and bolts of the work. These stories illustrate the science of program management and the art that is necessary for success. The book discusses many of the common program pitfalls. It explains how to detect and avoid scope creep—the unintended expansion of program scope. It details both internal and external scope creep and stresses the importance of constant vigilance to prevent cost overruns and schedule delays. Program Management in Defense and High Tech Environments is a comprehensive guide for early- and mid-career program managers to understand what they need to do to be successful. It is also a valuable resource for later-career program managers who want to learn through other program managers’ successes and failures.

GBP 44.99
1

How to Complete a Risk Assessment in 5 Days or Less

How to Complete a Risk Assessment in 5 Days or Less

Successful security professionals have had to modify the process of responding to new threats in the high-profile ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. How to Complete a Risk Assessment in 5 Days or Less demonstrates how to identify threats your company faces and then determine if those threats pose a real risk to the organization. To help you determine the best way to mitigate risk levels in any given situation How to Complete a Risk Assessment in 5 Days or Less includes more than 350 pages of user-friendly checklists forms questionnaires and sample assessments. Presents Case Studies and Examples of all Risk Management ComponentsBased on the seminars of information security expert Tom Peltier this volume provides the processes that you can easily employ in your organization to assess risk. Answers such FAQs as:Why should a risk analysis be conducted?Who should review the results?How is the success measured?Always conscious of the bottom line Peltier discusses the cost-benefit of risk mitigation and looks at specific ways to manage costs. He supports his conclusions with numerous case studies and diagrams that show you how to apply risk management skills in your organization—and it’s not limited to information security risk assessment. You can apply these techniques to any area of your business. This step-by-step guide to conducting risk assessments gives you the knowledgebase and the skill set you need to achieve a speedy and highly-effective risk analysis assessment in a matter of days.

GBP 56.99
1

Ethics and Governance in Project Management Small Sins Allowed and the Line of Impunity

The Human Change Management Body of Knowledge (HCMBOK )

The Human Change Management Body of Knowledge (HCMBOK )

I am happy to recommend this work. I believe in the principles presented in it and identify with its context. Due to the lack of knowledge on the subject in the market it is a topic that must be made known. The book should be in the library of all project and change managers. — Paul Dinsmore PMI FellowEvery manager should integrate HCMBOK® practices into their project management methodology in order to fully develop their work. This book addresses a simple and practical way that the critical component in organizational change management can be applied to projects of all kinds: the human factor. — Bruno Machado Director Project Management Office Grupo Anima EducaçãoWe live in a time of change speed and an avalanche of information. It is still very difficult for most companies to change their organizational culture efficiently. This book makes us reflect upon the crucial element in any change and which most managers do not place in the foreground—the people. — Joyce Meyer CEO iDigoIn today's constantly changing world the Project Manager must have sensitivity to how people react to change. Knowing a method that provides a structured way to take care of the human aspect is a key factor in the success of any project! HCMBOK® offers a simple and practical approach to managing change which can be easily incorporated into the project management routine providing amazing results. — Pedro Augusto Cardoso da Silva Engineering Director METRÔRIO This reference starts by presenting the concept of change management its players strategies and applicable models. In the second part the book covers the set of good practices methodology and tools known as the HCMBOK®— Human Change Management Body of Knowledge. The third part introduces the concept of the Change Management Office (CMO) and its relation to the strategic planning of an organization. The book concludes with the competencies essential for a change manager an approach to agile methodologies and a model for managing cultural change. | The Human Change Management Body of Knowledge (HCMBOK®)

GBP 44.99
1

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

An organization’s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods safeguards and techniques that help protect an organization from insider computer fraud. Drawing from the author’s vast experience assessing the adequacy of IT security for the banking and securities industries the book presents a practical framework for identifying measuring monitoring and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit process and store sensitive data. The author also examines the symbiotic relationship between the risks controls threats and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process. | Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

GBP 56.99
1

The Web Accessibility Project Development and Testing Best Practices

The Web Accessibility Project Development and Testing Best Practices

Approximately 15% of the global population is affected by some sort of disability according to the World Report on Disability. Many C-Suite executives perceive digital accessibility (DA) as an endless task. Among the engineering leaders one in four leaders are reliant on very limited knowledge about digital accessibility. Many countries are increasing their legislative efforts to make web accessibility an important part in web development and testing of software releases. Numerous organizations are facing extreme turbulence when not adhering to international accessibility guidelines while developing their software’s and website applications. Web Content Accessibility Guidelines (WCAG) is a global guide on accessibility recommendations that are developed through the World Wide Web Consortium (W3C) to help organizations to meet minimum standard accessibility guidelines. It has become critical for every organization to focus on implementing the accessibility checks at every stage of their application development to avoid costly mistakes. Meanwhile the need for front-end engineers and Quality Assurance (QA) test analysts to learn WCAG best practices is immensely important for the growing need to incorporate accessibility-focused inclusive design development and extensive accessibility testing which are essential for most of the customer-facing websites. In a fast-paced world incorporating shift left accessibility within development and testing is the new normal. The Web Accessibility Project: Development and Testing Best Practices helps developers address right accessibility attributes to user interface (UI) components. It also helps developers focus on developing manual and automation tests for QA professionals to inject accessibility audit accessibility functional tests and accessibility automation tests as part of their Continuous Integration and Continuous Development (CI/CD) models. The book is filled with readily usable best practices to adapt web accessibility early in application development. By applying the accessibility best practices covered in this book developers can help their organizations rise to a whole new level of accessibility adherence innovation and inclusive design. They will also see greater work satisfaction in their professional lives and a way to help improve digital accessibility for end users. | The Web Accessibility Project Development and Testing Best Practices

GBP 66.99
1

Technologies for Sustainable Global Higher Education

Technologies for Sustainable Global Higher Education

Digital technologies are influencing the way we learn live work and exist in different contexts of society in the digital age. There are a variety of learning systems that support innovative digital approaches and universities and organizations around the world are investing in building their own e-learning platforms. Digital technologies are enabling wider access to education and new markets for student recruitment resulting in increased income prospects for global higher education institutions. Technology enables numerous data and information sources which give greater access to information and data. It also enables highly virtual environments which impact teaching and the classroom. The widespread use and application of digital technologies in the teaching and learning process provoke pedagogical inquiry and mediation. It is in this context that Technologies for Sustainable Global Higher Education focuses on analyzing the application of digital technologies in the teaching–learning process. The chapters in this edited collection seek to answer questions relevant to the context of higher education such as: What is the concept of digital technologies? How is digital technology used to mediate the learning process? What technologies are used to qualify education in higher education? This book provides answers to these questions by focusing on issues central to improving education through digital technologies digital learning and pedagogical practices in digital education. It also provides case studies of higher education institutions.

GBP 110.00
1

Embedded Linux System Design and Development

Automated Software Testing with Cypress

Automated Software Testing with Cypress

Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2. 0. 0. This book explores Cypress scripts that help implement ‘shift left testing’ which is a dream come true for many software testers. Shift left occurs in the majority of testing projects but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!

GBP 38.99
1

Blockchain for Information Security and Privacy

Blockchain for Information Security and Privacy

Distributed and peer-to-peer (P2P) applications are increasing daily and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain a decentralized cryptographic-based technology is a promising element for IoT security in manufacturing finance healthcare supply chain identity management e-governance defence education banking and trading. Blockchain has the potential to secure IoT through repetition changeless capacity and encryption. Blockchain for Information Security and Privacy provides essential knowledge of blockchain usage in the mainstream areas of security trust and privacy in decentralized domains. This book is a source of technical information regarding blockchain-oriented software and applications. It provides tools to researchers and developers in both computing and software engineering to develop solutions and automated systems that can promote security trust and privacy in cyberspace. FEATURES Applying blockchain-based secured data management in confidential cyberdefense applications Securing online voting systems using blockchain Safeguarding electronic healthcare record (EHR) management using blockchain Impacting security and privacy in digital identity management Using blockchain-based security and privacy for smart contracts By providing an overview of blockchain technology application domains in IoT (e. g. vehicle web power web cloud internet and edge computing) this book features side-by-side comparisons of modern methods toward secure and privacy-preserving blockchain technology. It also examines safety objectives efficiency limitations computational complexity and communication overhead of various applications using blockchain. This book also addresses the combination of blockchain and industrial IoT. It explores novel various-levels of information sharing systems.

GBP 99.99
1