The discipline of Knowledge Management (KM) is rapidly becoming established as an essential course or module in both information systems and management programs around the world.
Evolving from Digital Transformation to Digital Acceleration Using The Galapagos Framework challenges established thinking and offers a new way to deliver digital change.
Over 60 recipes to achieve a robust and advanced backup and recovery solution leveraging SCDPMKey FeaturesAdapt to the modern data center design challenges and improve storage efficiencyEffective recipes to help you create your own robust architectural designs Solve data protection and recovery problems in your organizationBook DescriptionSystem Center Data Protection Manager (SCDPM) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the backup and recovery of enterprise data.
It is with immense pleasure that we extend a warm welcome to all of you to the recently concluded conference, international conference on Advances in Science, Technology and Management (ICOSTEM 2023) which took place from November 24 - 27, 2023, in the picturesque Maldives, Male.
Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world?
The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart domains that are assisted by Cloud Computing, core technologies behind Cloud Computing, driving factors towards Cloud Computing, and security challenges and proposed solutions in Cloud Computing.
The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart domains that are assisted by Cloud Computing, core technologies behind Cloud Computing, driving factors towards Cloud Computing, and security challenges and proposed solutions in Cloud Computing.
This book builds on the popular GARDENER OF GOVERNANCE article, which enjoys amazing traction in the professional community globally and has been translated into 25+ languages.
Recent combinations of semantic technology and artificial intelligence (AI) present new techniques to build intelligent systems that identify more precise results.
This book takes a new, critical, and multidisciplinary look at experiences and meanings of social intervention in different social contexts, taking the approaches of social constructionism as a theoretical approach.
Recent combinations of semantic technology and artificial intelligence (AI) present new techniques to build intelligent systems that identify more precise results.
This book takes a new, critical, and multidisciplinary look at experiences and meanings of social intervention in different social contexts, taking the approaches of social constructionism as a theoretical approach.
The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts-providing wider connectivity of digitized entities that can facilitate the building of connected cities.
This book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions.
Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python and architect a complete IoT system that is the best fit for your organizationKey FeaturesBuild complex Python-based applications with IoTExplore different concepts, technologies, and tradeoffs in the IoT architectural stackDelve deep into each element of the IoT design-from sensors to the cloudBook DescriptionThe Internet of Things (IoT) is the fastest growing technology market.
Clarifying the purpose and place of strategy in an information security program, this book explains how to select, develop, and deploy the security strategy best suited to your organization.
In this book, the author presents lessons learned from her extensive experience as a CAE to help internal auditors understand the challenges, issues, and potential alternative solutions when executing the role.
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization.
Delivering successful projects means the ability to produce high quality software within budget and on time-consistently, but when one mentions quality to software engineers or project managers, they talk about how impossible it is to eliminate defects from software.
Smart manufacturing environments are revolutionizing the industrial sector by integrating advanced technologies, such as the Internet of Things (IoT), artificial intelligence (AI), and robotics, to achieve higher levels of efficiency, productivity, and safety.
Practice the Skills Essential for a Successful IT Career80+ lab exercises challenge you to solve problems based on realistic case studiesStep-by-step scenarios require you to think criticallyLab Analysis tests measure your understanding of lab resultsKey Term Quizzes help build your vocabularyMike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition covers:Network modelsCabling and topologyEthernet basicsEthernet standardsInstalling a physical networkTCP/IP basicsRoutingTCP/IP applicationsNetwork namingSecuring TCP/IPSwitch featuresIPv6WAN connectivityWireless networkingVirtualization and cloud computingData centersIntegrating network devicesNetwork operationsProtecting your networkNetwork monitoringNetwork troubleshooting
As manufacturing control systems converge with manufacturing automation systems and systems supporting the back office, IT managers in manufacturing companies are being asked to oversee all their company's IT-including the manufacturing systems.
This second edition of the Strategic Project Leader prepares project managers to develop leadership competencies that translate into increased confidence to lead in a demanding environment.
The aim of this book is to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to AI risks, as AI systems often require access to personal data.
En las estructuras de datos dinámicas el tamaño y su forma es variable a lo largo de un programa, es decir, la memoria se reserva a tiempo de corrida del programa; este tipo de estructuras está conformada por nodos, los cuales tienen como mínimo dos campos: uno de información (clientes, pasajeros, cuenta bancaria, entre otros) y otro que contiene la referencia del siguiente nodo; los nodos se crean y destruyen en tiempo de ejecución.