Résultats de recherche de titre
Articles 141 à 160 sur 2557
Researching an individual‘s, firm‘s or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including…
law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence.On the Way to Fun: An Emotion-Based Approach to Successful Game Design
Par Roberto Dillon. 2010
How can video games be fun and immerse players in fantastic worlds where anything seems possible? How can they be…
so engaging to have become the main entertainment product for children and adults alike? In On the Way to Fun, the author proposes a possible answer to these questions by going back to the roots of gaming and showing how early games, asOn Animation: The Director's Perspective Vol 2
Par Ron Diamond. 2020
On Animation: The Director's Perspective is a collection of interviews with 23 animated feature-film directors. These extensive interviews were conducted…
over the past several years by filmmakers and educators (and peers to the directors interviews) Tom Sito and Bill Kroyer. Interviews cover in-depth discussion of each director's career -- focusing on their creative development, their films, lesson learned and advice. The interviews were edited and produced by Ron Diamond.Key FeaturesInterviews with the greatest living legends in animationOffers profound insight into the creative process of these giantsGrants advice and lessons for inspiring animatorsSecurity for Service Oriented Architectures
Par Walter Williams. 2014
This book examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance through the…
design of distributed and resilient applications, it provides an overview of the various standards that service oriented and distributed applications leverage to provide the understanding required to make intelligent decisions regarding their design. The book reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows.This is not another how-to guide for program managers or another reiteration of the Project Management Institute's standards for program…
management. Instead, Program Management Leadership: Creating Successful Team Dynamics examines various leadership approaches and illustrates the value of effective leadership styles in Program Management forBuilding Smart Cities: Analytics, ICT, and Design Thinking
Par Carol L. Stimmel. 2016
The term "smart city" defines the new urban environment, one that is designed for performance through information and communication technologies.…
Given that the majority of people across the world will live in urban environments within the next few decades, it's not surprising that massive effort and investment is being placed into efforts to develPhoneGap Build: Developing Cross Platform Mobile Applications in the Cloud
Par Bintu Harwani. 2014
PhoneGap is a standards-based, open-source development framework that can be deployed to any mobile device without losing the features of…
the native app-allowing for access to device contacts, the local file system, camera, and media on multiple platforms without requiring users to write a single line of code. Ideal for intermediate to advanced users, this book offers the comprehensive coverage you need to harness the power of this dynamic tool. It provides complete coverage of the cloud computing platform and the theories behind cloud computing, using a series of engaging examples.A Tale of Two Transformations: Bringing Lean and Agile Software Development to Life
Par Michael K. Levine. 2012
There are many books that seek to explain Lean and Agile software that offer theory, techniques, and examples. Michael Levine’s…
first book, A Tale of Two Systems, is one of the best, synthesizing Lean manufacturing and product development with agile software concepts in an engaging business novel. However, there has been precious little practical guidance for those seeking to change existing organizations to become Lean and Agile, until now. Mr. Levine has followed the successful approach of A Tale of Two Systems, telling two simultaneous intertwined and contrasting stories, to bring organizational transformation to life. Mary O’Connell and James "Wes" Wesleyan, recently engaged to be married, share a commitment to Lean and Agile Software. They have recently become leaders in two very different companies – one, stuck in a slow-moving, unresponsive, process-driven quagmire of a software culture; the other, struggling through the chaos of a sales-driven, process-less swirl. Together with their wise mentor, Neville Roberts, they identify two approaches to making needed changes: Drive People (a top-down approach focused on processes and tools), and People Driven (an enablement approach focused on people and organizations). Mary and Wes evaluate their situations and choose approaches that best fit for them, and the transformations commence. A Tale of Two Transformations differs from many information technology books by grappling with all the complexities of our organizations: the people, the politics, the financials, the processes – in short, the culture from which our Lean and Agile journeys must begin. The change model presented in the flow of the stories is generally applicable, and can help anyone thinking about how to improve their organization.Virtuous Policing: Bridging America's Gulf Between Police and Populace (500 Tips)
Par David G. Bolgiano, L. Morgan Banks III, James M. Patterson. 2016
"It pulls no punches, shuns no controversial topic, and glosses over no issues or problems that beset America‘s law enforcement…
community in our day. For those who may be prone to suspect the motives of these self-confessed lovers of cops and warriors, the title of this book‘should be sufficient to allay such concerns." John C. Hall, Supervisory SpCold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition (Advances in Police Theory and Practice)
Par James M. Adcock, Sarah L. Stein. 2015
Because the investigation of cold cases is usually an arduous and time-consuming task, most law enforcement agencies in the United…
States are not able to dedicate the resources necessary to support the cold case investigation process. However, when those cases are fully pursued and prosecuted, they often result in convictions and lengthy prison terms. Cold Cases: Evaluation Models with Follow-up Strategies for Investigators, Second Edition saves law enforcement time by providing detailed guidelines for determining if a cold case is solvable, and if so, how to organize, manage, and evaluate the investigation. It also provides techniques for developing investigative strategies to complement the evaluation process and resolve the crime.This second edition features a new revised model and methodology for investigating cold cases suitable for all police and public safety agencies—large or small, domestic or international. This new model is more expeditious and convenient for departments that have less manpower and experience in dealing with cold cases. It emphasizes the prioritization of cold cases based on the availability of physical evidence and the chances of deriving matches from said evidence and an identified person of interest.Additional topics covered in the second edition include: How cases go cold Strategies for creating a cold case unit Cold case investigations in a Dutch educational environment—a chapter written by members of the Dutch Police Academy New forensic science technologies, including DNA, CODIS, and AFIS Case studies demonstrating advances in suspectology Strategies for effective investigative interviewing Challenges posed by staged crime scenes in cold cases How to craft a cold case evaluation report The expert authors of this book maintain The Center for the Resolution of Unresolved Crimes and conduct training and consulting worldwide. Their practical book is designed to help law enforcement agencies resurrect long-forgotten cases, bringing closure to victims and holding accountable those who are responsible. This book is part of the Advances in Police Theory and Practice seriesCognitive Robotics
Par Hooman Samani. 2016
The kimono-clad android robot that recently made its debut as the new greeter at the entrance of Tokyo's Mitsukoshi department…
store is just one example of the rapid advancements being made in the field of robotics.Cognitive robotics is an approach to creating artificial intelligence in robots by enabling them to learn from and respond to real-worlCollaborative Policing: Police, Academics, Professionals, and Communities Working Together for Education, Training, and Program Implementation (Advances in Police Theory and Practice)
Par Peter C. Kratcoski, Maximilian Edelbacher. 2016
"The chapters in this book reveal that police education, training, and practices are now closely tied to collaboration between police,…
academics, professional practitioners, and community agencies, and such collaboration is described and evaluated." Dilip K. Das, PhD, Founding President, International Police Executive Symposium (IPES) and foundingTransportation Systems Security
Par Allan McDougall, Robert Radvanovsky. 2008
Highlighting the importance of transportation to a country‘s infrastructure and survival, Transportation Systems Security presents the strategic and practical considerations…
involved in the implementation of physical, procedural, and managerial safeguards required to keep all modes of transportation up and running during an actual or potentiInteractive Storytelling: Techniques for 21st Century Fiction
Par Andrew Glassner. 2004
We are on the verge of creating an exciting new kind of interactive story form that will involve audiences as…
active participants. This book provides a solid foundation in the fundamentals of classical story structure and classical game structure and explains why it has been surprisingly difficult to bring these two activities together. With this foundation in place, the book presents several ideas for ways to move forward in this appealing quest. The author has a conversational and friendly style, making reading a pleasure.Software Project Management: A Process-Driven Approach
Par Ashfaque Ahmed. 2012
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality,…
facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project Management: AOrganizations need to constantly innovate and improve products and services to maintain a strong competitive position in the market place.…
The vehicle used by organizations for such constant reinvention is a business transformation program. This book illustrates a tested program management roadmap along with the supporting comprehensive frameworksThe Complete Project Management Office Handbook (ESI International Project Management Series)
Par Gerard M. Hill. 2014
This updated and completely revised edition of a bestseller extends the concepts and considerations of modern project management into the…
realm of project management oversight, control, and support. Illustrating the implications of project management in today’s organizations, The Complete Project Management Office Handbook, Third Edition explains how to use the project management office (PMO) as a business integrator to influence project outcomes in a manner that serves both project and business management interests.Helping you determine if a PMO is right for your organization, this edition presents a five-stage PMO competency continuum to help you understand how to develop PMOs at different competency levels and associated functionalities. It also identifies five progressive PMO development levels to help you identify which level is best for your organization. Updates to this edition include: A refinement of the 20 PMO functions that guide PMO setup and operations A new section that provides an effective evaluation of PMO maturity indicators based on the prescribed 20 PMO functions presented in the handbook A new section on Establishing a Project Management Office that details a comprehensive process for determining the needs, purpose, and functionality for a new PMO Best practices that have cross-industry value and applicability The book includes checklists, detailed process steps, and descriptive guidance for developing PMO functional capability. The up-to-date PMO model defined will not only help you better understand business practices in project management, but will also help you to adapt and integrate those practices into the project management environment in your organization.For anyone associated with start-up and smaller PMOs, the book explains what can be done to create less rigorous PMO functional capabilities. It also includes helpful insights for those who need to specify and demonstrate "quick-wins" and early PMO-based accomplishments in their organization.The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices…
now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security. Establishing mobile software security should be of primary concern to every mobilCounterterrorism: Reassessing the Policy Response
Par Benoît Gomis. 2016
Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need…
for reform. It challenges government, media, and academic accounts that exaggerate terrorist threats, particularly in comparison to other threats such as organized crime. Author Beno�Gomis rOfficial ((ISC)2 Press)
Par Steven Hernandez. 2015
HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose…
foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches. The Official (ISC)2 (R) Guide to the HCISPPSM CBK (R) is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). This guide covers the diversity of the healthcare industry, the types of technologies and information flows that require various levels of protection, and the exchange of healthcare information within the industry, including relevant regulatory, compliance, and legal requirements. Numerous illustrated examples and tables are included that illustrate key concepts, frameworks, and real-life scenarios. Endorsed by the (ISC)(2) and compiled and reviewed by HCISPPs and (ISC)(2) members, this book brings together a global and thorough perspective on healthcare information security and privacy. Utilize this book as your fundamental study tool in preparation for the HCISPP certification exam.