Written by renowned data science experts Foster Provost and Tom Fawcett, Data Science for Business introduces the fundamental principles of data science, and walks you through the "e;data-analytic thinking"e; necessary for extracting useful knowledge and business value from the data you collect.
Written by renowned data science experts Foster Provost and Tom Fawcett, Data Science for Business introduces the fundamental principles of data science, and walks you through the "e;data-analytic thinking"e; necessary for extracting useful knowledge and business value from the data you collect.
"e;The book not only gives a clear picture of the policy and strategic framework of PFI/PPP projects, the governance and knowledge management issues through different phases from planning, design development to operation and service delivery and the processes associated with each phase, but practical tools, methodologies and capabilities needed to deliver PFI/PPP projects in a range of sectors are also explained.
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle.
The third book in the Healthcare Payment Systems series, Prospective Payment Systems examines the various types of prospective payment systems (PPS) used by healthcare providers and third-party payers.
The fourth book in the Healthcare Payment System series, Cost-Based, Charge-Based, and Contractual Payment Systems compares cost-based systems, charge-based payment approaches, and contractually-based payment processes with fee-schedule payment systems and prospective payment systems.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes.
The Art of Agile Practice: A Composite Approach for Projects and Organizations presents a consistent, integrated, and strategic approach to achieving Agility in your business.
Taking a broad approach that speaks to experienced and inexperienced process improvement practitioners, CMMI experts and CMMI novices, this second edition thoroughly examines the latest version of the CMMI.
As the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals.
In today's increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes.
Going beyond the usual how-to guide, Lean Six Sigma Secrets for the CIO supplies proven tips and valuable case studies that illustrate how to combine Six Sigma's rigorous quality principles with Lean methods for uncovering and eliminating waste inIT processes.
Your guide to making better decisionsDespite the dizzying amount of data at our disposal todayand an increasing reliance on analytics to make the majority of our decisionsmany of our most critical choices still come down to human judgment.
Your company's data has the potential to add enormous value to every facet of the organization -- from marketing and new product development to strategy to financial management.
How to transfer your organizations most important knowledgebefore it walks out the doorWhen highly skilled subject matter experts, engineers, and managers leave their organizations, they take with them years of hard-earned, experience-based knowledgemuch of it undocumented and irreplaceable.
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations.
The Most Comprehensive Book on the SubjectChronicles the Development of the Weibull Distribution in Statistical Theory and Applied StatisticsExploring one of the most important distributions in statistics, The Weibull Distribution: A Handbook focuses on its origin, statistical properties, and related distributions.
Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization.
Delivering successful projects means the ability to produce high quality software within budget and on time-consistently, but when one mentions quality to software engineers or project managers, they talk about how impossible it is to eliminate defects from software.
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft.
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries.
In orderto maximizeIT resources andjustify IT expenditures, CIO's and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand.
In a business world of uncertain budgets, relentless technology changes, scarce management talent, and intense production demands, theory is good, but practice sells.