1 - 20
Next
1. Postmedia : cyfrowy kod i bazy danych [2013]
- Celiński, Piotr.
- Lublin : Wydawn. Uniwersytetu Marii Curie-Skłodowskiej, 2013.
- Description
- Book — 220 p.
- Online
SAL3 (off-campus storage)
SAL3 (off-campus storage) | Status |
---|---|
Stacks | Request (opens in new tab) |
HM851 .C419 2013 | Available |
- Paradkar, Sameer, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
The ultimate guide to successful interviews for Enterprise, Business, Domain, Solution, and Technical Architect roles as well as IT Advisory Consultant and Software Designer roles About This Book * Learn about Enterprise Architects IT strategy and NFR - this book provides you with methodologies, best practices, and frameworks to ace your interview * A holistic view of key architectural skills and competencies with 500+ questions that cover 12 domains * 100+ diagrams depicting scenarios, models, and methodologies designed to help you prepare for your interview Who This Book Is For This book is for aspiring enterprise, business, domain, solution, and technical architects. It is also ideal for IT advisory consultants and IT designers who wish to interview for such a role. Interviewers will be able leverage this book to make sure they hire candidates with the right competencies to meet the role requirements. What You Will Learn * Learn about IT strategies, NFR, methodologies, best practices, and frameworks to ace your interview * Get a holistic view of key concepts, design principles, and patterns related to evangelizing web and Java enterprise applications * Discover interview preparation guidelines through case studies * Use this as a reference guide for adopting best practices, standards, and design guidelines * Get a better understanding with 60+ diagrams depicting various scenarios, models, and methodologies * Benefit from coverage of all architecture domains including EA (Business, Data, Infrastructure, and Application), SA, integration, NFRs, security, and SOA, with extended coverage from IT strategies to the NFR domain In Detail An architect attends multiple interviews for jobs or projects during the course of his or her career. This book is an interview resource created for designers, consultants, technical, solution, domain, enterprise, and chief architects to help them perform well in interview discussions and launch a successful career. The book begins by providing descriptions of architecture skills and competencies that cover the 12 key domains, including 350+ questions relating to these domains. The goal of this book is to cover all the core architectural domains. From an architect's perspective, it is impossible to revise or learn about all these key areas without a good reference guide - this book is the solution. It shares experiences, learning, insights, and proven methodologies that will benefit practitioners, SMEs, and aspirants in the long run. This book will help you tackle the NFR domain, which is a key aspect pertaining to architecting applications. It typically takes years to understand the core concepts, fundamentals, patterns, and principles related to architecture and designs. This book is a goldmine for the typical questions asked during an interview and will help prepare you for success! Style and approach This book will help you prepare for interviews for architectural profiles by providing likely questions, explanations, and expected answers. It is an insight-rich guide that will help you develop strategic, tactical, and operational thinking for your interview.
(source: Nielsen Book Data)
- Hoboken, NJ : Wiley, 2012.
- Description
- Book — 1 online resource (xxvi, 572 p.) : ill.
- Summary
-
- Front Matter
- A Framework. A Framework
- A Framework for Service-Learning in the Computer and Information Sciences / Brian A Nejmeh
- Organizational/Pedagogical Models and Approaches to Service-Learning in the Computer and Information Sciences. Organizational/Pedagogical Models and Approaches to Service-Learning in the Computer and Information Sciences
- EPICS Program / William Oakes, Carla Zoltowski
- Ten Years of EPICS at Butler University: Experiences from Crafting a Service-Learning Program for Computer Science and Software Engineering / Panagiotis K Linos
- The Collaboratory / David Vader
- The Humanitarian Free and Open-Source Software Project: Engaging Students in Service-Learning through Building Software / Ralph Morelli, Trishan de Lanerolle, Allen Tucker
- Service-Learning Projects in the Computer and Information Sciences. Service-Learning Projects in the Computer and Information Sciences
- Some Worked Better Than Others: Experience with a Variety of Service-Learning Projects / Ken Vollmar, Peter Sanderson
- EPICS Software Development Projects / William Oakes, Saurabh Bagchi
- HFOSS Service-Learning Case Study: The Bowdoin₆Ronald McDonald House Projects / Allen Tucker, Ralph Morelli, Trishan de Lanerolle
- Service-Learning and Project Management: The Capstone Course in Information Technology Leadership / Charles Hannon
- Service-Learning and Entrepreneurship for Engineers / Lisa Zidek
- Teaching Information Systems Ethics through Service-Learning / Thomas S E Hilton, Donald D Mowry
- Computer Literacy Service-Learning Project in Brazil / Wen-Jung Hsin, Olga Ganzen
- Service-Learning through Agile Software Development / Joseph T Chao, Jennifer B Warnke
- Empowerment through Service-Learning: Teaching Technology to Senior Citizens / Sally R Beisser
- Hybridizing Virtual- and Field-Based Service-Learning in Green IT / K Branker, J M Pearce
- Engaging Engineering Students in a Development Program for a Global South Nation through Service-Learning / Willie K Ofosu, Francois Sekyere, James Oppong
- Leveraging Local Resources to Implement Community-Oriented, Sustainable Computer Education Projects in Los Angeles / Rohit Mathew, Christine M Maxwell
- Using Labdoo to Bridge the Digital Divide: A New Form of International Cooperation / Jordi Ros-Giralt, Kevin Launglucknavalai, Daniel Massaguer, Julieta Casanova, Christine M Lee
- The CHARMS Application Suite: A Community-Based Mobile Data Collection and Alerting Environment for HIV/AIDS Orphan and Vulnerable Children in Zambia / Brian A Nejmeh, Tyler Dean
- Lessons Learned about Service-Learning in the Computer and Information Sciences. Lessons Learned about Service-Learning in the Computer and Information Sciences
- Lessons Learned₇ Guidance for Building Community Service Projects / Michael Werner, Lisa MacLean
- Assessing both the Know and Show in IT Service-Learning / Rick Homkes
- From Kudjip to Succotz: The Successes, Lessons, Joys, and Surprises from 25 Years of Service-Learning Projects / James Paul Skon, Doug J Karl
- Educational Impacts of an International Service-Learning Design Project on Project Members and Their Peers / Peter E Johnson
- Is the Community Partner Satisfied? / Camille George
- Service-Learning in the Computer and Information Sciences: Lessons Learned and Guidance for the Future / Brian A Nejmeh
- Index.
- Fort, Karën, author.
- 1st. - London : Wiley-ISTE, 2016.
- Description
- Book — 1 online resource.
- Summary
-
- Preface ix List of Acronyms xi Introduction xiii
- Chapter 1. Annotating Collaboratively 1 1.1. The annotation process (re)visited 1 1.1.1. Building consensus 1 1.1.2. Existing methodologies 3 1.1.3. Preparatory work 7 1.1.4. Pre-campaign 13 1.1.5. Annotation 17 1.1.6. Finalization 21 1.2. Annotation complexity 24 1.2.1. Example overview 25 1.2.2. What to annotate? 28 1.2.3. How to annotate? 30 1.2.4. The weight of the context 36 1.2.5. Visualization 38 1.2.6. Elementary annotation tasks 40 1.3. Annotation tools 43 1.3.1. To be or not to be an annotation tool 43 1.3.2. Much more than prototypes 46 1.3.3. Addressing the new annotation challenges 49 1.3.4. The impossible dream tool 54 1.4. Evaluating the annotation quality 55 1.4.1. What is annotation quality? 55 1.4.2. Understanding the basics 56 1.4.3. Beyond kappas 63 1.4.4. Giving meaning to the metrics 67 1.5. Conclusion 75
- Chapter 2. Crowdsourcing Annotation 77 2.1. What is crowdsourcing and why should we be interested in it? 77 2.1.1. A moving target 77 2.1.2. A massive success 80 2.2. Deconstructing the myths 81 2.2.1. Crowdsourcing is a recent phenomenon 81 2.2.2. Crowdsourcing involves a crowd (of non-experts) 83 2.2.3. "Crowdsourcing involves (a crowd of) non-experts" 87 2.3. Playing with a purpose 93 2.3.1. Using the players' innate capabilities and world knowledge 94 2.3.2. Using the players' school knowledge 96 2.3.3. Using the players' learning capacities 97 2.4. Acknowledging crowdsourcing specifics 101 2.4.1. Motivating the participants 101 2.4.2. Producing quality data 107 2.5. Ethical issues 109 2.5.1. Game ethics 109 2.5.2. What's wrong with Amazon Mechanical Turk? 111 2.5.3. A charter to rule them all 113 Conclusion 115
- Appendix 117 Glossary 141 Bibliography 143 Index 163.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
5. Software Project Management [2006]
- Kelsey, Robert Bruce, 1954-
- Oakland : Berrett-Koehler Publishers, Incorporated, 2006.
- Description
- Book — 1 online resource (231 pages)
- Summary
-
- Cover; Half Title; Title; Copyright; Dedication; Table of Contents; PREFACE; ACKNOWLEDGMENTS;
- CHAPTER 1. MEASURES, GOALS, AND STRATEGIES; Measuring Performance within a Project; Two Ways to Use Measurement; What Is Software Measurement?; What Do You Want to Accomplish with Measurement?; A Commitment to the Future; Think Globally, Act Locally; Identify Areas of Opportunity; Select an Operational Measure and Strategy; A Strategy for Addressing Product Quality; A Strategy for Addressing Productivity and Workflow; Applying What Youâ#x80; #x99; ve Learned; EXERCISE 1-1: A Clear Rationale.
- EXERCISE 1-2: A Strategy to Meet Real Needs
- CHAPTER 2. IMPLEMENTING A MEASUREMENT ARCHITECTURE; Measures Are Answers to Questions; The ISO/IEC 15939 Architecture; Measurable Concepts; Base Measures; Derived Measures; Models and Indicators; Putting the Architecture to Work; STEP 1: Identify When, Where, and What to Measure; STEP 2: Determine the Details; STEP 3: Establish the Architecture; STEP 4: Identify Tools and Infrastructure Requirements; A Typical Measurement Implementation; Base Measures; Derived Measures; Indicators; Applying What Youâ#x80; #x99; ve Learned.
- EXERCISE 2-1: Identifying Information NeedsEXERCISE 2-2: Learning from History; EXERCISE 2-3: Approaching Measurement as Risk Mitigation; EXERCISE 2-4: Selecting a Strategy and an Implementation Plan;
- CHAPTER 3. APPLYING THE BASICS: RUN RATES; Proceed with Caution; The Key Attributes of Defects and Time; Defects, Defects, Everywhere; What Is a Product Defect?; What Is a Process Defect?; How to Use Defect Run Rates; Interpreting Defect Run Rate Data; Project Events Affecting Run Rates; Static and Dynamic Test Approaches; Dynamic Test Events; Time Period for Release Phases.
- What Do You Mean, You Arenâ#x80; #x99; t Done Yet?Project Time vs. Work Time; Typical Time and Effort Run Rates; The Hidden Danger of Blocked Time; Applying What Youâ#x80; #x99; ve Learned; EXERCISE 3-1: Interpreting Defect Run Rates;
- CHAPTER 4. BEHIND THE LINES: ATTRIBUTE ANALYSES; Key Defect Attributes; Defect Status and Productivity; EXAMPLE: Defect Rates and States; Injection Phase and the Development Process; EXAMPLE: The Signi? cance of Injection Rates; Detection Phase and Quality Control; EXAMPLE: The Ones That Got Away; Key Time and Effort Attributes.
- Putting the Pieces Together: Iterative Development Risk AnalysisProblem Report Tracking System Requirements; Injection Phase; Detection Phase; Effect of Change; Documentation Affected; Prioritization; Conifiguration Information; Report Status and History; Defect/Fix Status; Time Fields; Should You Measure Defect â#x80; #x9C; Severityâ#x80; #x9D; Ratings?; Applying What Youâ#x80; #x99; ve Learned; EXERCISE 4
- -1: Looking into the Future; EXERCISE 4
- -2: Interpreting Detection Phase Data; EXERCISE 4
- -3: Interpreting Injection Phase Data; EXERCISE 4
- -4: Applying Injection and Detection Phases.
- Marks, Kristin.
- [Place of publication not identified], AUERBACH PUBLICATIONS, 2017.
- Description
- Book — 1 online resource
- Summary
-
- 1. Defining the Question
- 2. Overview of Servers and Functions
- 3. Hardware
- 4. Network Operating Systems
- 5. Application Servers
- 6. Server Management Add-Ons.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Henry, Thomas J.
- [Place of publication not identified], CRC Press, 2017.
- Description
- Book — 1 online resource
- Summary
-
- 1. Acanthosomatidae
- 2. Alydidae
- 3. Anthocoridae
- 4. Aradidae
- 5. Belostomatidae
- 6. Berytidae
- 7. Ceratocombidae
- 8. Cimicidae
- 9. Coreidae
- 10. Corixidae
- 11. Cydnidae
- 12. Dipsocoridae
- 13. Enicocephalidae
- 14. Gelastocoridae
- 15. Gerridae
- 16. Hebridae
- 17. Hydrometridae
- 18. Largidae
- 19. Leptopodidae
- 20. Lygaeidae
- 21. Macroveliidae
- 22. Mesoveliidae
- 23. Microphysidae
- 24. Miridae
- 25. Nabidae
- 26. Naucoridae
- 27. Nepidae
- 28. Notonectidae
- 29. Ochteridae
- 30. Pentatomidae
- 31. Phymatidae
- 32. Piesmatidae
- 33. Pleidae
- 34. Polyctenide
- 35. Pyrrhocoridae
- 36. Reduviidae
- 37. Rhopalidae
- 38. Saldidae
- 39. Schizopteridae
- 40. Scutelleridae
- 41. Tessaratomidae
- 42. Thaumastocoridae
- 43. Thyreocoridae
- 44. Tingidae
- 45. Veliidae.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Butuner, Hakan, author.
- Boca Raton, FL : Auerbach Publications, an imprint of Taylor and Francis, 2017.
- Description
- Book — 1 online resource (170 pages) : 67 illustrations
- Summary
-
- Planning by Design (PxD): Nature of Planning. Formula for Planning. Systematic Planning. Essence of Planning by Design.Sample Systematic Methodologies: Systematic Innovation Planning. Systematic Competency-based Training Needs Analysis. Systematic Wide Area Network Planning. Skyscrapers Terrorist Attack ResponsePlanning. Systematic Planning of Globalizing Local Firms. References.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Tipton, Harold F.
- [Place of publication not identified], AUERBACH PUBLICATIONS, 2017.
- Description
- Book — 1 online resource
- Summary
-
- 1. Access Control Systems and Methodology
- 2. Telecommunications and Network Security
- 3. Security Management Practices
- 4. Application Program Security
- 5. Cryptography
- 6. Computer, System, and Security Architecture
- 7. Operations Security
- 8. Business Continuity Planning
- 9. Law, Investigation, and Ethics
- 10. Physical Security.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Wojcik, Waldemar, author.
- First edition. - London : Taylor and Francis, 2017.
- Description
- Book — 1 online resource
- Summary
-
- Chapter 1 Security estimates updating of asymmetric cryptosystems for modern computing / V.K. Zadiraka A.M. Kudin I.V. Shvidchenko P.V. Seliukh P. Komada A. Kalizhanova
- chapter 2 Game problems of control for functional-differential systems / A.A. Chikrii G.Ts. Chikrii V.J. Zhukovskij W. Wójcik M. Junisbekov
- chapter 3 Information technology for automated translation from inflected languages to sign language / Iu Krak O. Barmak S. Romanyshyn A. Kotyra K. Gromaszek S. Smailova
- chapter 4 Interoperability of the health care information resources / Y.G. Kryvonos O. Khorozov A. Smolarz W. Surtel A. Kalizhanova
- chapter 5 Independent devices and wireless sensor networks for agriculture and ecological monitoring / Y.G. Kryvonos V.O. Romanov I.B. Galelyuka W. Wójcik T. Zyska E. Amirgaliyev
- chapter 6 The mathematical problems of complex systems investigation under uncertainties / K. Atoyev P. Knopov V. Pepeliaev P. Kisała R. Romaniuk M. Kalimoldayev
- chapter 7 Study of the impact of the technical state of the transformers with the LTC on the parameters of the EES modes optimal control / O.E. Rubanenko O.I. Kazmiruk T. Zyska K. Gromaszek M. Junisbekov.
(source: Nielsen Book Data)
- Chao, Lee, 1951, author.
- Boca Raton, FL : Auerbach Publications, an imprint of Taylor and Francis, 2017.
- Description
- Book — 1 online resource (470 pages) : 245 illustrations
- Summary
-
- Overview. Directory Services. Virtualization. Virtualized IT Infrastructure Management. Networking in Virtualized IT Infrastructure. Network Shared Storage. High Availability Implementation. Creating and Managing Template and vApp. Enterprise Computing Resource Management. Chapter: Securing Private Cloud Recourse. Private Cloud with vCloud Director.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Engel, Barak , author.
- First edition. - London : Taylor and Francis, 2017.
- Description
- Book — xxiv, 134 pages : illustrations ; cm.
- Summary
-
- Outlining the Overall Problem. The CISO as a Major Business Asset. Security in Marketing and Sales. The CISO and the General Counsel. Gotta Talk about Compliance, Right? The Technical Stuff. Rethinking the CISO.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- London, UK : ISTE Press ; Kidlington, Oxford, UK : Elsevier, 2017.
- Description
- Book — 1 online resource.
- Summary
-
- 1. Public Warning Applications: Requirements and Examples
- 2. An Innovative and Economic Management of Earthquakes: Early Warnings and Situational Awareness in Real Time
- 3. Community Early Warning Systems
- 4. Generating Crisis Maps for Large-scale Disasters: Issues and Challenges
- 5. Context-Aware Public Safety in a Pervasive Environment
- 6. Supporting New Application and Services over LTE Public Safety Networks
- 7. Aerial Platforms for Public Safety Networks and Performance Optimization
- 8. Topology Control for Drone Networks
- 9. Safe and Secure Support for Public Safety Networks
- 10. Disaster Resilient Telematics Based on Device-to-Device Communication
- 11. ICN/DTN for Public Safety in Mobile Networks.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
14. PMP® exam practice test and study guide [2015]
- Levin, Ginger, author.
- Tenth edition. - Boca Raton, FL : Auerbach Publications, an imprint of Taylor and Francis, 2015.
- Description
- Book — 1 online resource (462 pages) : 12 illustrations
- Summary
-
- Introduction Acronyms Project Integration Management Project Scope Management Project Time Management Project Cost Management Project Quality Management Project Human Resource Management Project Communications Management Project Risk Management Project Procurement Management Project Stakeholder Management An Overview of the Domains Practice Test Answer Sheet Appendix: Study Matrix Answer Key References.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Betti, Silvello, 1958- author.
- [S.l.] : CRC PRESS, 2021.
- Description
- Book — 1 online resource
- Summary
-
- Preface. Introduction. 1 Optical Communications Systems. 2 Polarization in Optical Fiber. 3 Multidimensional Optical Modulations. Conclusions. Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Laplante, Phillip A., editor.
- Second edition. - Boca Raton, FL : CRC Press, 2017.
- Description
- Book — 1 online resource (xxx, 502 pages) : illustrations
- Summary
-
- Chapter 1 3-D Graphics / Fletcher Dunn Ian Parberry
- chapter 2 3-D Graphics: Bump Mapping / Fletcher Dunn Ian Parberry
- chapter 3 3-D Graphics: Coordinate Spaces / Fletcher Dunn Ian Parberry
- chapter 4 3-D Graphics: High Level Shading Language (HLSL) / Fletcher Dunn Ian Parberry
- chapter 5 3-D Graphics: Light Sources / Fletcher Dunn Ian Parberry
- chapter 6 3-D Graphics: Polygon Meshes / Fletcher Dunn Ian Parberry
- chapter 7 3-D Graphics: Real-Time Graphics Pipeline / Fletcher Dunn Ian Parberry
- chapter 8 3-D Graphics: Skeletal Animation / Fletcher Dunn Ian Parberry
- chapter 9 3-D Graphics: Standard Local Lighting Model / Fletcher Dunn Ian Parberry
- chapter 10 3-D Graphics: Texture Mapping / Fletcher Dunn Ian Parberry
- chapter 11 3-D Graphics: Viewing / Fletcher Dunn Ian Parberry
- chapter 12 Access Methods / Bernd-Peter Paris
- chapter 13 Ad Hoc Networks: Technologies / Marco Conti
- chapter 14 Advanced Encryption Standard (AES) / Ben Rothke
- chapter 15 Algorithms / Edna E. Reiter Clayton Matthew Johnson
- chapter 16 Algorithms: Rendering / Orion Sky Lawlor
- chapter 17 American National Standards Institute (ANSI) / Jana Zabinski
- chapter 18 Animation: Facial / Frederic I. Parke Keith Waters
- chapter 19 Artificial Intelligence / Jianhua Chen
- chapter 20 Authentication and Authorization: Policy-Based / Jeff Hayes
- chapter 21 Big Data / Roberto V. Zicari
- chapter 22 Bioelectronics / Alistair McEwan Gaetano D. Gargiulo Ché Fornusek Torsten Lehmann
- chapter 23 Bluetooth Systems / William Stallings
- chapter 24 CDMA Networks / Tero Ojanperä Steven D. Gray
- chapter 25 Cellular Systems / Lal C. Godara
- chapter 26 Classes: NP and NP-Complete / Edna E. Reiter Clayton Matthew Johnson
- chapter 27 Coding Theory: History / Dave K. Kythe Prem K. Kythe
- chapter 28 Computer Organization / Perhaad Mistry Yash Ukidave Zhongliang Chen David Kaeli
- chapter 29 Concurrency: Concepts / Matthew J. Sottile Timothy G. Mattson Craig E. Rasmussen
- chapter 30 Counting: Basics / Rebecca Grasser
- chapter 31 Cryptography / Javek Ikbal
- chapter 32 Cryptography: Advanced Encryption Standard (AES) / D. Mukhopadhyay
- chapter 33 Data Mining
- Geographic / Harvey J. Miller Jiawei Han
- chapter 34 Data Mining
- Privacy-Preservation Techniques / Chunhua Su Jianying Zhou Feng Bao Guilin Wang Kouichi Sakurai
- chapter 35 Digital Arithmetic / Dave K. Kythe Prem K. Kythe
- chapter 36 Digital Arithmetic
- Division Algorithms / Paolo Montuschi Alberto Nannarelli
- chapter 37 Digital Geometry / Petra Wiederhold
- chapter 38 Disabilities, Users with / Pradipta Biswas Peter Olaf Looms
- chapter 39 Disabilities
- Assistive Technology Design / Jo Lumsden Lilit Hakobyan Rock Leung Dympna O'Sullivan
- chapter 40 Discrete Fourier Transform / Dave K. Kythe Prem K. Kythe
- chapter 41 Distributed Sensor Actuator Networks / Shivakumar Sastry S. Sitharama Iyengar
- chapter 42 Ethics / Michael James Heron
- chapter 43 Field Programmable Gate Arrays (FPGA) / D. Mukhopadhyay.
17. Biomedical informatics : an introduction to information systems and Software in medicine and health [2015]
- Lubliner, David J., eauthor.
- First edition. - Boca Raton, FL : Auerbach Publications, an imprint of Taylor and Francis, 2015.
- Description
- Book — 1 online resource (444 pages) : 325 illustrations
- Summary
-
- chapter 1 - Introduction to Biomedical Informatics
- chapter 2 Framework for Implementing the U.S. Medical Records Infrastructure
- chapter 3 - Electronic Health Records
- chapter 4 - Data Interoperability
- chapter 5 - Security
- chapter 6 - Telehealth
- chapter 7 - Medical Sensors
- chapter 8 - Imaging
- chapter 9 - Ethics
- chapter 10 - Critical Care Nursing Perspective on the Electronic Health Record
- chapter 11 - Healthcare Management Information Technology in the Full Service Facility / Philomena Diquollo
- chapter 12 - Future Directions for Biomedical Informatics.
(source: Nielsen Book Data)
- Paradkar, Sameer, author.
- Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
The ultimate guide to successful interviews for Enterprise, Business, Domain, Solution, and Technical Architect roles as well as IT Advisory Consultant and Software Designer roles About This Book * Learn about Enterprise Architects IT strategy and NFR - this book provides you with methodologies, best practices, and frameworks to ace your interview * A holistic view of key architectural skills and competencies with 500+ questions that cover 12 domains * 100+ diagrams depicting scenarios, models, and methodologies designed to help you prepare for your interview Who This Book Is For This book is for aspiring enterprise, business, domain, solution, and technical architects. It is also ideal for IT advisory consultants and IT designers who wish to interview for such a role. Interviewers will be able leverage this book to make sure they hire candidates with the right competencies to meet the role requirements. What You Will Learn * Learn about IT strategies, NFR, methodologies, best practices, and frameworks to ace your interview * Get a holistic view of key concepts, design principles, and patterns related to evangelizing web and Java enterprise applications * Discover interview preparation guidelines through case studies * Use this as a reference guide for adopting best practices, standards, and design guidelines * Get a better understanding with 60+ diagrams depicting various scenarios, models, and methodologies * Benefit from coverage of all architecture domains including EA (Business, Data, Infrastructure, and Application), SA, integration, NFRs, security, and SOA, with extended coverage from IT strategies to the NFR domain In Detail An architect attends multiple interviews for jobs or projects during the course of his or her career. This book is an interview resource created for designers, consultants, technical, solution, domain, enterprise, and chief architects to help them perform well in interview discussions and launch a successful career. The book begins by providing descriptions of architecture skills and competencies that cover the 12 key domains, including 350+ questions relating to these domains. The goal of this book is to cover all the core architectural domains. From an architect's perspective, it is impossible to revise or learn about all these key areas without a good reference guide - this book is the solution. It shares experiences, learning, insights, and proven methodologies that will benefit practitioners, SMEs, and aspirants in the long run. This book will help you tackle the NFR domain, which is a key aspect pertaining to architecting applications. It typically takes years to understand the core concepts, fundamentals, patterns, and principles related to architecture and designs. This book is a goldmine for the typical questions asked during an interview and will help prepare you for success! Style and approach This book will help you prepare for interviews for architectural profiles by providing likely questions, explanations, and expected answers. It is an insight-rich guide that will help you develop strategic, tactical, and operational thinking for your interview.
(source: Nielsen Book Data)
19. Information security handbook [2022]
- First edition. - Boca Raton, FL : CRC Press, 2022.
- Description
- Book — 1 online resource : illustrations.
- Summary
-
- Chapter 1 SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network
- Chapter 2 Software-Defined Networking (SDN) Security Concerns
- Chapter 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy Inference Logic
- Chapter 4 Security in Big Data
- Chapter 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security Infrastructure
- Chapter 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks
- Chapter 7 PDF Malware Classifiers - A Survey, Future Directions, and Recommended Methodology
- Chapter 8 Key Authentication Schemes for Medical Cyber Physical System
- Chapter 9 Ransomware Attack: Threats & Different Detection Technique
- Chapter 10 Security Management System (SMS)
- Chapter 11 Automatic Street Light Control Based on Pedestrian and Automobile Detection
- Chapter 12 Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona
- Chapter 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
20. Project Management [2017]
- Tinnirello, Paul C., editor.
- First edition. - Boca Raton, FL : CRC Press, 2017.
- Description
- Book — 1 online resource : text file, PDF
- Summary
-
- Introduction
- Section I Project Management Essentials 1 Seven Steps for Highly Effective Project Management Nancy Blumenstalk Mingus 2 Effective Systems Development: The Experts Advise Tom L. Roberts, Jr., Michael L. Gibson, and William N. Ledbetter 3 Project Management: A Structured Framework Howard W. Miller 4 Collecting Project Information Ralph L. Kliem 5 Risk Management: The Safety Net for Project Schedules and Budgets Polly Perryman 6 Guidelines for Making and Using Project Estimates Larry D. Runge 7 A Model for Estimating Small-Scale Software Development Abbas Heiat 8 Strategic Planning for Acquiring and Managing Computer Resources Robert DeMichiell 9 Large-Scale IS Project Management Erwin Martinez
- Section II Managing Business Relationships 1 Corporate Lessons for the IS Manager Robert E. Umbaugh 2 Partnership: The Key to Successful Systems Development in a TQM Company Christine B. Tayntor 3 Linking Project Outcomes to Customer Needs Richard H. Deane, Tomas B. Clark, and A.P. (Dennis) Young 4 Managing End-User Development in a Client/Server Environment John Windsor, Leon A. Kappelman, and Carl Stephen Guynes 5 Managing User-Driven Systems Development Kwasi Amoaka-Gyampah and Kathy B. White 6 Tips for Effectively Managing User Expectations During System Development Dana T. Edberg and Fritz H. Grupe 7 Project Team Work: How To Make It Happen James R.. Coleman 8 Team Building for IS Success Raghu Nath and Albert L. Lederer 9 Survival Skills for the Information Systems Professional Clinton O. Longenecker, Jack L. Simonetti, and Mark Mulias 10 Assessing Customer Perceptions Naomi Karten
- Section III Effectively Managing Outsourced Projects 1 Outsourced Systems Development Raoul J. Freeman 2 Applications Maintenance Outsourcing Joseph Judenberg 3 Outsourcing Network Management and Information Systems Nathan J. Muller 4 Certification of Externally Developed Software Craig A. Schiller 5 Audit and Control of Information Systems Outsourcing S. Yvonne Scott 6 Improving IT Performance as an Outsourcing Alternative Richard D. Hays 7 Contracting with Consultants for Computer Services David M. Massey
- Section IV Managing Special Projects 1 SAP Implementation and Control Frederick Gallegos and Loida Tison-Dualan 2 Keeping Client/Server Projects on Track with Project Management Ralph L. Kliem 3 Project Management Solutions for the Year 2000 Crisis Ralph L. Kliem 4 Disaster Recovery Planning Tools and Management Options Jon William Toigo 5 Reengineering Methodologies and Tools Mark M. Klein 6 Controlling Major Systems Integration Projects Steve Mar 7 An Object-Oriented Strategy for Reintegrating IS into Mainstream Management Richard W. Koontz 8 Economic Evaluation of Data Warehouse Projects Duncan M. Witte
- Section V Measuring and Improving Project Management Success 1 Evaluating Project Performance Ralph L. Kliem and Irwin S. Ludin 2 Completing Project Successfully James A. Ward 3 Creating and Implementing a Balanced Measurement Program Dana T. Edberg 4 Negotiating Conditions for Project Success Stanley H. Stahl 5 Continuous Process Improvement in Systems Development Robert F. Kniestadt and Pamela A. Hager 6 Assessing and Improving the Software Developing Process Roger S. Pressman 7 Improving Productivity Strategically and Tactically Stanley H. Stahl.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.