Filter
(found 406 products)
Book cover image
Technology and organizations co-evolve, as is illustrated by the growth of information and communication technology (ICT) and global software engineering (GSE). Technology has enabled the development of innovations in GSE. The literature on GSE has emphasized the role of the organization at the expense of technology. This book explores the ...
Global Software Engineering: Virtualization and Coordination
Technology and organizations co-evolve, as is illustrated by the growth of information and communication technology (ICT) and global software engineering (GSE). Technology has enabled the development of innovations in GSE. The literature on GSE has emphasized the role of the organization at the expense of technology. This book explores the role of technology in the evolution of globally distributed software engineering. To date, the role of the organization has been examined in coordinating GSE activities because of the prevalence of the logic of rationality (i.e., the efficiency ethos, mechanical methods, and mathematical analysis) and indeterminacy (i.e., the effectiveness ethos, natural methods, and functional analysis). This logic neglects the coordination role of ICT. However, GSE itself is an organizational mode that is technology-begotten, technology-dominated, and technology-driven, as is its coordination. GSE is a direct reflection of ICT innovation, change, and use, yet research into the role technology of GSE has been neglected. Global Software Engineering: Virtualization and Coordination considers existing fragmented explanations and perspectives in GSE research, poses new questions about GSE, and proposes a framework based on the logic of virtuality (i.e., creativity ethos, electrical methods, and technological analysis) rather than of rationality and indeterminacy. Virtuality is the primary perspective in this book's comprehensive study of GSE. The book concludes with an integrated explanation of GSE coordination made possible through ICT connectivity and capitalization.
https://magrudy-assets.storage.googleapis.com/9780367184810.jpg
170.62 USD

Global Software Engineering: Virtualization and Coordination

by Gamel O. Wiredu
Hardback
Book cover image
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn ...
Client-Centered Software Development: The CO-FOSS Approach
Client-Centered Software Development: The CO-FOSS Approach introduces a method to creating a customized software product for a single client, either from scratch or by reusing open source components. The clients are typically non-profit humanitarian, educational, or public service organizations. This approach has been used in undergraduate courses where students learn the principles of software development while implementing a real-world software product. This book provides instructors, students, clients, and professional software developers with detailed guidance for developing a new CO-FOSS product from conceptualization to completion. Features Provides instructors, students, clients, and professional software developers with a roadmap for the development of a new CO-FOSS product from conceptualization to completion Motivates students with real-world projects and community service experiences Teaches all elements of the software process, including requirements gathering, design, collaboration, coding, testing, client communication, refactoring, and writing developer and user documentation Uses source code that can be reused and refitted to suit the needs of future projects, since each CO-FOSS product is free and open source software Provides links to a rich variety of resources for instructors and students to freely use in their own courses that develop new CO-FOSS products for other non-profits.
https://magrudy-assets.storage.googleapis.com/9781138583849.jpg
131.39 USD

Client-Centered Software Development: The CO-FOSS Approach

by Allen B. Tucker
Hardback
Book cover image
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. ...
Effective Processes for Quality Assurance
Driving innovation can reduce costs for companies, institutions, military programs, and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices, improvements, and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies, institutions, military programs, and successful businesses by encouraging a cooperative, proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage, and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains: Quality Assurance methods Measuring benefits of Quality Assurance process improvement Quality Assurance performance and improvement Risk management Quality Assurance improvement with metrics Effective processes for Quality Assurance Quantitative process performance and commitments Quality Assurance plans Quality Assurance for customers and suppliers Supporting software configuration Effective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.
https://magrudy-assets.storage.googleapis.com/9780367172961.jpg
104.950000 USD

Effective Processes for Quality Assurance

by Boyd L. Summers
Hardback
Book cover image
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of ...
Practical Guide to Large Database Migration
It is a major challenge to migrate very large databases from one system, say for example, to transfer critical data from Oracle to SQL Server. One has to consider several issues such as loss of data being transferred, the security of the data, the cost and effort, technical aspects of the software involved, etc. There a very few books that provide practical tools and the methodology to migrate data from one vendor to another. This book introduces the concepts in database migration with large sample databases. It provides step by step guides and screenshots for database migration tools. Many examples are shown for migrating Oracle, SQL Server and MySQL databases.
https://magrudy-assets.storage.googleapis.com/9781138391628.jpg
178.450000 USD

Practical Guide to Large Database Migration

by Preston Zhang
Hardback
Book cover image
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes ...
Project Management of Large Software-Intensive Systems
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes people, policies, constraints, regulations, and a myriad of other factors. It focuses on how to seamlessly integrate systems, satisfy the customer's requirements, and deliver within the budget and on time. The guide is essentially a shopping list of all the activities that could be conducted with tailoring guidelines to meet the needs of each project.
https://magrudy-assets.storage.googleapis.com/9780367136710.jpg
127.95 USD

Project Management of Large Software-Intensive Systems

by Marvin Gechman
Paperback / softback
Book cover image
Toward Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications introduces the outlook and extension toward deep neural networks, with a focus on the weights-and-structure determination (WASD) algorithm. Based on the authors' 20 years of research experience on neuronets, the book explores the models, algorithms, and applications of the WASD ...
Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications
Toward Deep Neural Networks: WASD Neuronet Models, Algorithms, and Applications introduces the outlook and extension toward deep neural networks, with a focus on the weights-and-structure determination (WASD) algorithm. Based on the authors' 20 years of research experience on neuronets, the book explores the models, algorithms, and applications of the WASD neuronet, and allows reader to extend the techniques in the book to solve scientific and engineering problems. The book will be of interest to engineers, senior undergraduates, postgraduates, and researchers in the fields of neuronets, computer mathematics, computer science, artificial intelligence, numerical algorithms, optimization, simulation and modeling, deep learning, and data mining. Features Focuses on neuronet models, algorithms, and applications Designs, constructs, develops, analyzes, simulates and compares various WASD neuronet models, such as single-input WASD neuronet models, two-input WASD neuronet models, three-input WASD neuronet models, and general multi-input WASD neuronet models for function data approximations Includes real-world applications, such as population prediction Provides complete mathematical foundations, such as Weierstrass approximation, Bernstein polynomial approximation, Taylor polynomial approximation, and multivariate function approximation, exploring the close integration of mathematics (i.e., function approximation theories) and computers (e.g., computer algorithms) Utilizes the authors' 20 years of research on neuronets
https://magrudy-assets.storage.googleapis.com/9781138387034.jpg
157.450000 USD
Hardback
Book cover image
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science ...
Revival: Genetic Algorithms for Pattern Recognition (1986)
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science and technology, describing the integration of genetic algorithms in pattern recognition and machine learning problems to build intelligent recognition systems. The articles, written by leading experts from around the world, accomplish several objectives: they provide insight into the theory of genetic algorithms; they develop pattern recognition theory in light of genetic algorithms; and they illustrate applications in artificial neural networks and fuzzy logic. The cross-sectional view of current research presented in Genetic Algorithms for Pattern Recognition makes it a unique text, ideal for graduate students and researchers.
https://magrudy-assets.storage.googleapis.com/9781138558885.jpg
68.200000 USD

Revival: Genetic Algorithms for Pattern Recognition (1986)

by Paul P. Wang, Sankar K. Pal
Paperback / softback
Book cover image
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside ...
Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting
This book teaches the basics of Oracle GoldenGate, which is a product that is used to simplify the process of Oracle Database Replication. GoldenGate can be used for reporting, failover, high availability, live reporting, data warehousing, and BigData ETL process, as well as connecting to multiple other data sources outside of Oracle Database such as SQL Server, MySQL, Teradata, PostgreSQL, and many others. The purpose of GoldenGate and its popularity is its ability to make the highly complex architecture of database replication into a much more simplistic task. This book teaches the reader how to use Oracle GoldenGate, from installation to troubleshooting.
https://magrudy-assets.storage.googleapis.com/9781138197572.jpg
73.450000 USD

Working with Oracle GoldenGate 12c: From Implementation to Troubleshooting

by Gavin Powell
Hardback
Book cover image
Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in ...
Intelligence in IoT-enabled Smart Cities
Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in the era of cloud computing and IoT, varying from cost and energy efficiency to availability and service quality. It focuses on both the design and implementation aspects of artificial intelligence approaches in smart cities and sensing applications that are enabled and supported by IoT paradigms, and mainly on data delivery approaches and their performability aspects.
https://magrudy-assets.storage.googleapis.com/9781138316843.jpg
136.450000 USD

Intelligence in IoT-enabled Smart Cities

by Fadi Al-Turjman
Hardback
Book cover image
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors ...
Mobile Apps Engineering: Design, Development, Security, and Testing
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors emphasize the essential concepts of the field, such as apps design, testing and security, with the intention of offering a compact, self-contained book which shall stimulate further research interest in the topic. The editors hope and believe that their efforts in bringing this book together can make mobile apps engineering an independent discipline inspired by traditional software engineering, but taking into account the new challenges posed by mobile computing.
https://magrudy-assets.storage.googleapis.com/9781138054356.jpg
104.950000 USD

Mobile Apps Engineering: Design, Development, Security, and Testing

Hardback
Book cover image
A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for designing intelligent systems and ...
A First Course in Fuzzy Logic
A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for designing intelligent systems and a solid background for readers to pursue further studies and real-world applications. New in the Fourth Edition: Features new results on fuzzy sets of type-2 Provides more information on copulas for modeling dependence structures Includes quantum probability for uncertainty modeling in social sciences, especially in economics With its comprehensive updates, this new edition presents all the background necessary for students, instructors and professionals to begin using fuzzy logic in its many-applications in computer science, mathematics, statistics, and engineering. About the Authors: Hung T. Nguyen is a Professor Emeritus at the Department of Mathematical Sciences, New Mexico State University. He is also an Adjunct Professor of Economics at Chiang Mai University, Thailand. Carol L. Walker is also a Professor Emeritus at the Department of Mathematical Sciences, New Mexico State University. Elbert A. Walker is a Professor Emeritus, Department of Mathematical Sciences, New Mexico State University.
https://magrudy-assets.storage.googleapis.com/9781138585089.jpg
170.62 USD

A First Course in Fuzzy Logic

by Elbert a Walker, Carol L. Walker, Hung T. Nguyen
Hardback
Book cover image
Systems thinking tells us that human error, violations and technology failures result from poorly designed and managed work systems. To help us understand and prevent injuries and incidents, incident reporting systems must be capable of collecting data on contributory factors from across the overall work system, in addition to factors ...
Translating Systems Thinking into Practice: A Guide to Developing Incident Reporting Systems
Systems thinking tells us that human error, violations and technology failures result from poorly designed and managed work systems. To help us understand and prevent injuries and incidents, incident reporting systems must be capable of collecting data on contributory factors from across the overall work system, in addition to factors relating to the immediate context of the event (e.g. front-line workers, environment, and equipment). This book describes how to design a practical, usable incident reporting system based on this approach. The book contains all the information needed to effectively design and implement a new incident reporting system underpinned by systems thinking. It also provides guidance on how to evaluate and improve existing incident reporting systems so they are practical for users, collect good quality data, and reflect the principles of systems thinking. Features Highlights the key principles of systems thinking for designing incident reporting systems Outlines a process for developing and testing incident reporting systems Describes how to evaluate incident reporting systems to ensure they are practical, usable, and collect good quality data Provides detailed guidance on how to analyze incident data, and translate the findings into appropriate incident prevention strategies
https://magrudy-assets.storage.googleapis.com/9781472436917.jpg
157.450000 USD
Hardback
Book cover image
This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. It will act as a foundation for authors, researchers and industry professionals. This monograph will present the latest state of the art research being done on varied ...
Advances in Swarm Intelligence for Optimizing Problems in Computer Science
This book provides comprehensive details of all Swarm Intelligence based Techniques available till date in a comprehensive manner along with their mathematical proofs. It will act as a foundation for authors, researchers and industry professionals. This monograph will present the latest state of the art research being done on varied Intelligent Technologies like sensor networks, machine learning, optical fiber communications, digital signal processing, image processing and many more.
https://magrudy-assets.storage.googleapis.com/9781138482517.jpg
221.81 USD

Advances in Swarm Intelligence for Optimizing Problems in Computer Science

Hardback
Book cover image
The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts ...
Configuration Management, Second Edition: Theory and Application for Engineers, Managers, and Practitioners
The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts of the organization. It supplies an overview of configuration management and its process elements to provide readers with a contextual understanding of the theory, practice, and application of CM. The book illustrates the interplay of configuration and data management with all enterprise resources during each phase of a product lifecycle.
114.30 USD

Configuration Management, Second Edition: Theory and Application for Engineers, Managers, and Practitioners

by Kim L Robertson, Jon M. Quigley
Paperback / softback
Book cover image
Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian, Ubuntu, and Linux Mint, and RHEL-family CentOS, and stresses universal ...
Linux: The Textbook, Second Edition
Linux: The Textbook, Second Edition provides comprehensive coverage of the contemporary use of the Linux operating system for every level of student or practitioner, from beginners to advanced users. The text clearly illustrates system-specific commands and features using Debian-family Debian, Ubuntu, and Linux Mint, and RHEL-family CentOS, and stresses universal commands and features that are critical to all Linux distributions. The second edition of the book includes extensive updates and new chapters on system administration for desktop, stand-alone PCs, and server-class computers; API for system programming, including thread programming with pthreads; virtualization methodologies; and an extensive tutorial on systemd service management. Brand new online content on the CRC Press website includes an instructor's workbook, test bank, and In-Chapter exercise solutions, as well as full downloadable chapters on Python Version 3.5 programming, ZFS, TC shell programming, advanced system programming, and more. An author-hosted GitHub website also features updates, further references, and errata. Features New or updated coverage of file system, sorting, regular expressions, directory and file searching, file compression and encryption, shell scripting, system programming, client-server-based network programming, thread programming with pthreads, and system administration Extensive in-text pedagogy, including chapter objectives, student projects, and basic and advanced student exercises for every chapter Expansive electronic downloads offer advanced content on Python, ZFS, TC shell scripting, advanced system programming, internetworking with Linux TCP/IP, and many more topics, all featured on the CRC Press website Downloadable test bank, work book, and solutions available for instructors on the CRC Press website Author-maintained GitHub repository provides other resources, such as live links to further references, updates, and errata
https://magrudy-assets.storage.googleapis.com/9781138710085.jpg
125.950000 USD

Linux: The Textbook, Second Edition

by Robert M. Koretsky, Syed Mansoor Sarwar
Hardback
Book cover image
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy ...
Practical Guide for Oracle SQL, T-SQL and MySQL
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy for the reader to learn three major query languages in the IT industry. The author has over 20 years of experience in database design. KEY FEATURES: Contains numerous practical screenshots of Oracle SQL, T-SQL, MySQL statements and results. Shows the differences between Oracle SQL, T-SQL and MySQL side by side. Gives a real world experience for SQL developers and database administrators. Sample data is available to work on (available on our website).
https://magrudy-assets.storage.googleapis.com/9781138347526.jpg
59.70 USD

Practical Guide for Oracle SQL, T-SQL and MySQL

by Preston Zhang
Paperback / softback
Book cover image
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes ...
Internet of Things, for Things, and by Things
This book explains IoT technology, its potential applications, the security and privacy aspects, the key necessities like governance, risk management, regulatory compliance needs, the philosophical aspects of this technology that are necessary to support an ethical, safe and secure digitally enhanced environment in which people can live smarter. It describes the inherent technology of IoT, the architectural components and the philosophy behind this emerging technology. Then it shows the various potential applications of the Internet of Things that can bring benefits to the human society. Finally, it discusses various necessities to provide a secured and trustworthy IoT service.
https://magrudy-assets.storage.googleapis.com/9781138710443.jpg
105.78 USD

Internet of Things, for Things, and by Things

by Abhik Chaudhuri
Hardback
Book cover image
The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure ...
Artificial Intelligence Safety and Security
The history of robotics and artificial intelligence in many ways is also the history of humanity's attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make sure that they do not turn on us, its inventors. Numerous recent advancements in all aspects of research, development and deployment of intelligent systems are well publicized but safety and security issues related to AI are rarely addressed. This book is proposed to mitigate this fundamental problem. It is comprised of chapters from leading AI Safety researchers addressing different aspects of the AI control problem as it relates to the development of safe and secure artificial intelligence. The book is the first edited volume dedicated to addressing challenges of constructing safe and secure advanced machine intelligence. The chapters vary in length and technical content from broad interest opinion essays to highly formalized algorithmic approaches to specific problems. All chapters are self-contained and could be read in any order or skipped without a loss of comprehension.
https://magrudy-assets.storage.googleapis.com/9781138320840.jpg
157.450000 USD

Artificial Intelligence Safety and Security

Hardback
Book cover image
Behavior Trees (BTs) provide a way to structure the behavior of an artificial agent such as a robot or a non-player character in a computer game. Traditional design methods, such as finite state machines, are known to produce brittle behaviors when complexity increases, making it very hard to add features ...
Behavior Trees in Robotics and AI: An Introduction
Behavior Trees (BTs) provide a way to structure the behavior of an artificial agent such as a robot or a non-player character in a computer game. Traditional design methods, such as finite state machines, are known to produce brittle behaviors when complexity increases, making it very hard to add features without breaking existing functionality. BTs were created to address this very problem, and enables the creation of systems that are both modular and reactive. Behavior Trees in Robotics and AI: An Introduction provides a broad introduction as well as an in-depth exploration of the topic, and is the first comprehensive book on the use of BTs. This book introduces the subject of BTs from simple topics, such as semantics and design principles, to complex topics, such as learning and task planning. For each topic, the authors provide a set of examples, ranging from simple illustrations to realistic complex behaviors, to enable the reader to successfully combine theory with practice. Starting with an introduction to BTs, the book then describes how BTs relate to, and in many cases, generalize earlier switching structures, or control architectures. These ideas are then used as a foundation for a set of efficient and easy to use design principles. The book then presents a set of important extensions and provides a set of tools for formally analyzing these extensions using a state space formulation of BTs. With the new analysis tools, the book then formalizes the descriptions of how BTs generalize earlier approaches and shows how BTs can be automatically generated using planning and learning. The final part of the book provides an extended set of tools to capture the behavior of Stochastic BTs, where the outcomes of actions are described by probabilities. These tools enable the computation of both success probabilities and time to completion. This book targets a broad audience, including both students and professionals interested in modeling complex behaviors for robots, game characters, or other AI agents. Readers can choose at which depth and pace they want to learn the subject, depending on their needs and background.
https://magrudy-assets.storage.googleapis.com/9781138593732.jpg
92.13 USD

Behavior Trees in Robotics and AI: An Introduction

by Petter OEgren, Michele Colledanchise
Hardback
Book cover image
In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present. The key to project success is to identify risk and subsequently deal with it. The CIO's Guide to Risk addresses the many faces of risk, ...
The CIO's Guide to Risk
In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present. The key to project success is to identify risk and subsequently deal with it. The CIO's Guide to Risk addresses the many faces of risk, whether it be in systems development, adoption of bleeding edge tech, the push for innovation, and even the march toward all things social media. Risk management planning, risk identification, qualitative and quantitative risk analysis, contingency planning, and risk monitoring and control are all addressed on a macro as well as micro level. The book begins with a big-picture view of analyzing technology trends to evaluate risk. It shows how to conceptualize trends, analyze their effect on infrastructure, develop metrics to measure success, and assess risk in adapting new technology. The book takes an in-depth look at project-related risks. It explains the fundamentals of project management and how project management relates to systems development and technology implementation. Techniques for analyzing project risk include brainstorming, the Delphi technique, assumption analysis, and decision analysis. Metrics to track and control project risks include the Balance Scorecard, project monitoring and reporting, and business and technology metrics. The book also takes an in-depth look at the role of knowledge management and innovation management in identifying, assessing, and managing risk. The book concludes with an executive's guide to the legal and privacy issues related to risk management, as well overviews of risks associated with social media and mobile environments. With its checklists, templates, and worksheets, the book is an indispensable reference on risk and information technology.
https://magrudy-assets.storage.googleapis.com/9781138090361.jpg
95.54 USD

The CIO's Guide to Risk

by Jessica Keyes
Hardback
Book cover image
Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many ...
Quantifying Software: Global and Industry Perspectives
Software is one of the most important products in human history and is widely used by all industries and all countries. It is also one of the most expensive and labor-intensive products in human history. Software also has very poor quality that has caused many major disasters and wasted many millions of dollars. Software is also the target of frequent and increasingly serious cyber-attacks. Among the reasons for these software problems is a chronic lack of reliable quantified data. This reference provides quantified data from many countries and many industries based on about 26,000 projects developed using a variety of methodologies and team experience levels. The data has been gathered between 1970 and 2017, so interesting historical trends are available. Since current average software productivity and quality results are suboptimal, this book focuses on best in class results and shows not only quantified quality and productivity data from best-in-class organizations, but also the technology stacks used to achieve best-in-class results. The overall goal of this book is to encourage the adoption of best-in-class software metrics and best-in-class technology stacks. It does so by providing current data on average software schedules, effort, costs, and quality for several industries and countries. Because productivity and quality vary by technology and size, the book presents quantitative results for applications between 100 function points and 100,000 function points. It shows quality results using defect potential and DRE metrics because the number one cost driver for software is finding and fixing bugs. The book presents data on cost of quality for software projects and discusses technical debt, but that metric is not standardized. Finally, the book includes some data on three years of software maintenance and enhancements as well as some data on total cost of ownership.
https://magrudy-assets.storage.googleapis.com/9781138033115.jpg
124.54 USD

Quantifying Software: Global and Industry Perspectives

by Capers Jones
Hardback
Book cover image
The Virtual Mind: Designing the Logic to Approximate Human Thinking, through an in-depth and multidisciplinary review, outlines and defines the underpinnings for modelling human thinking through approximating the mind. Whilst there are plenty of efforts underway trying to mimic the brain, its complexities have so far proven insurmountable. But replicating ...
The Virtual Mind: Designing the Logic to Approximate Human Thinking
The Virtual Mind: Designing the Logic to Approximate Human Thinking, through an in-depth and multidisciplinary review, outlines and defines the underpinnings for modelling human thinking through approximating the mind. Whilst there are plenty of efforts underway trying to mimic the brain, its complexities have so far proven insurmountable. But replicating the abstract notion of the mind provides a viable and quicker route. Broadly, the mind consists of a conscious and an unconscious part with separate logic schemes and these absorbs reality in diverging chunks, with the former truncated through narratives and norms and the latter able to amass broader perceptions of reality. These are held together and controlled through a governing mechanism. With the replication and establishment of the mind's mechanistic rules and dynamic constants, tested through a big data approach from public media, it allows for standardization and machine generated human thinking, a Virtual Mind. A virtual mind is able to cover a wide array of applications, in particular forecasting of human behavior and decision-making. In essence, the whole socioeconomic spectra can be captured, including politics, financial markets and consumer patterns. Another area of potential application would be to augment various game software and of course, it would be applicable for the man-machine connect. The book guides the reader on how to develop and produce a machine generated virtual mind in a step-by-step manner. It is a must for anyone with an interest in artificial intelligence, the design and construction of the next generation of computer logic and it provides an enhanced understanding of mankind's greatest mystery, the workings of the mind. Niklas Hageback has extensive experience of risk modelling and financial analytics working at tier-one financial institutions and consulting firms, such as Deutsche Bank, KPMG, and Goldman Sachs, where he held regional executive risk management and oversight roles in both Europe and Asia.
https://magrudy-assets.storage.googleapis.com/9781138054035.jpg
204.75 USD

The Virtual Mind: Designing the Logic to Approximate Human Thinking

by Niklas Hageback
Hardback
Book cover image
An authoritative and accessible one-stop resource, An Introduction to Artificial Intelligence presents the first full examination of AI. Designed to provide an understanding of the foundations of artificial intelligence, it examines the central computational techniques employed by AI, including knowledge representation, search, reasoning, and learning, as well as the principal ...
An Introduction To Artificial Intelligence
An authoritative and accessible one-stop resource, An Introduction to Artificial Intelligence presents the first full examination of AI. Designed to provide an understanding of the foundations of artificial intelligence, it examines the central computational techniques employed by AI, including knowledge representation, search, reasoning, and learning, as well as the principal application domains of expert systems, natural language, vision, robotics, software agents and cognitive modeling. Many of the major philosophical and ethical issues of AI are also introduced. Throughout the volume, the authors provide detailed, well-illustrated treatments of each topic with abundant examples and exercises. The authors bring this exciting field to life by presenting a substantial and robust introduction to artificial intelligence in a clear and concise coursebook form. This book stands as a core text for all computer scientists approaching AI for the first time.
https://magrudy-assets.storage.googleapis.com/9781138435841.jpg
255.94 USD

An Introduction To Artificial Intelligence

by Janet Finlay
Hardback
Book cover image
There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these ...
Threat Level Red: Cybersecurity Research Programs of the U.S. Government
There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.
https://magrudy-assets.storage.googleapis.com/9781138052802.jpg
95.54 USD

Threat Level Red: Cybersecurity Research Programs of the U.S. Government

by Michael Erbschloe
Hardback
Book cover image
This easy-to-use, classroom-tested textbook covers the C programming language for computer science and IT students. Designed for a compulsory fundamental course, it presents the theory and principles of C. More than 500 exercises and examples of progressive difficulty aid students in understanding all the aspects and peculiarities of the C ...
C: From Theory to Practice, Second Edition
This easy-to-use, classroom-tested textbook covers the C programming language for computer science and IT students. Designed for a compulsory fundamental course, it presents the theory and principles of C. More than 500 exercises and examples of progressive difficulty aid students in understanding all the aspects and peculiarities of the C language. The exercises test students on various levels of programming and the examples enhance their concrete understanding of programming know-how. Instructor's manual and PowerPoint slides are available upon qualifying course adoption
https://magrudy-assets.storage.googleapis.com/9781138636002.jpg
124.54 USD

C: From Theory to Practice, Second Edition

by Nikolaos D. Tselikas, George S. Tselikis
Hardback
Book cover image
This book provides a framework for integrating complex systems that are problem-centric, human-centered, and provides an interdisciplinary, multi-methodological purview of multiple perspectives surrounding the human factors/human actors within living ecosystems. This book will provide useful theoretical and practical information to human factors, human-computer interaction, cognitive systems engineering personnel who are ...
Cognitive Systems Engineering: An Integrative Living Laboratory Framework
This book provides a framework for integrating complex systems that are problem-centric, human-centered, and provides an interdisciplinary, multi-methodological purview of multiple perspectives surrounding the human factors/human actors within living ecosystems. This book will provide useful theoretical and practical information to human factors, human-computer interaction, cognitive systems engineering personnel who are currently engaged in human-centered design or other applied aspects of modeling, simulation, and design that requires joint understanding of theory and practice.
https://magrudy-assets.storage.googleapis.com/9781138748231.jpg
85.31 USD

Cognitive Systems Engineering: An Integrative Living Laboratory Framework

Paperback / softback
Book cover image
In order to maximize IT resources and justify IT expenditures, CIO's and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand. The Business Value of IT: Managing Risks, Optimizing Performance, and Measuring Results solves this problem by providing practical ...
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results
In order to maximize IT resources and justify IT expenditures, CIO's and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand. The Business Value of IT: Managing Risks, Optimizing Performance, and Measuring Results solves this problem by providing practical answers to these questions: What does IT contribute to the business? Why should we care about IT governance? How can we best measure IT performance? How do we mitigate the risks associated with change? Leading consultants Michael D. Harris, David E. Herron, and Stasia Iwanicki share their real-world experiences to explain how you can demonstrate IT's value, and potentially find extra value you didn't know your IT organization creates. They also show how to apply risk management to process improvement and avoid unintended consequences of process improvement programs. The text provides the understanding required to discover the processes necessary to: prioritize your organization's IT activities. identify alternative measurement frameworks, and evaluate the best approaches to outsourcing. Many IT organizations have successfully implemented the techniques described in this book to increase their business value. This work identifies the organizational and cultural obstacles you need to remove to get started along the same path.
https://magrudy-assets.storage.googleapis.com/9781420064742.jpg
105.000000 USD

The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results

by Stasia Iwanicki, David Herron, Michael D.S. Harris
Hardback
Book cover image
Although there are countless books about process improvement and business performance, there is a dearth of literature on how process improvement yields business performance results. Filling this need, Return On Process (ROP): Getting Real Performance Results from Process Improvement provides strategic and tactical guidance on how to achieve a positive ...
Return On Process (ROP): Getting Real Performance Results from Process Improvement
Although there are countless books about process improvement and business performance, there is a dearth of literature on how process improvement yields business performance results. Filling this need, Return On Process (ROP): Getting Real Performance Results from Process Improvement provides strategic and tactical guidance on how to achieve a positive ROP. The book details a comprehensive and coherent end-to-end process for integrating organizational performance objectives and measures to process improvement activities. Describing how to achieve real business performance results from process improvement, it supplies sound, proven advice on how to improve your organization's software and systems development and delivery processes in ways that affect your business. Defining the relationship between performance and process, the book presents metrics for business performance and explains how to set performance and process improvement goals, measure process improvement results, and lead a performance culture. Filled with examples and case studies that illustrate key concepts, it provides how to information based on three role categories: executive, manager, and practitioner. Describing non-traditional and innovative ways to achieve process and performance improvement, the book includes action plan guides at the end of each chapter that provide clear-cut guidance on exactly what you should and shouldn't do.
https://magrudy-assets.storage.googleapis.com/9781439886397.jpg
81.850000 USD

Return On Process (ROP): Getting Real Performance Results from Process Improvement

by Michael West
Hardback
Book cover image
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the ...
Security for Service Oriented Architectures
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.
https://magrudy-assets.storage.googleapis.com/9781466584020.jpg
79.750000 USD

Security for Service Oriented Architectures

by Walter Williams
Paperback / softback
Page 1 of 14