Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cybernetics and Systems Theory in Management: Tools, Views, and Advancements, Wallis Steven


Варианты приобретения
Цена: 22572.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до:
Ориентировочная дата поставки:
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Wallis Steven
Название:  Cybernetics and Systems Theory in Management: Tools, Views, and Advancements
ISBN: 9781615206681
Издательство: Mare Nostrum (Eurospan)
Классификация:

ISBN-10: 161520668X
Обложка/Формат: Hardcover
Страницы: 400
Вес: 1.21 кг.
Дата издания: 22.04.2011
Язык: English
Иллюстрации: 1, black & white illustrations
Размер: 27.94 x 21.59 x 2.24 cm
Читательская аудитория: Professional & vocational
Подзаголовок: Tools, views, and advancements
Рейтинг:
Поставляется из: Англии
Описание: Covers topics such as advanced manufacturing technology; consortial benchmarking; cybernetics and organizational evaluation; decision integrity; implications of complexity thinking; management of complex organizations; neuro-knowledge system; second order cybernetics; systemic management research; and theory of management.


Theory of Social Choice on Networks

Автор: Wynn C. Stirling
Название: Theory of Social Choice on Networks
ISBN: 1107165164 ISBN-13(EAN): 9781107165168
Издательство: Cambridge Academ
Рейтинг:
Цена: 15840.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Drawing on cybernetics and network theory, this highly original book presents an alternative to classical social choice theory by constructing a framework that allows for dynamic preferences that are modulated by the situation-dependent social influence that they exert on each other.

Cyber Security and the Politics of Time

Автор: Stevens
Название: Cyber Security and the Politics of Time
ISBN: 1107109426 ISBN-13(EAN): 9781107109421
Издательство: Cambridge Academ
Рейтинг:
Цена: 9504.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: `Cyber security` is a recent addition to the global security agenda. This book explores how cyber security communities` conceptions of time are manifest in political practice. It will be valuable to anyone concerned with how security politics is shaped by visions of past, present and future.

Social and Professional Applications of Actor-Network Theory for Technology Development

Автор: Arthur Tatnall
Название: Social and Professional Applications of Actor-Network Theory for Technology Development
ISBN: 1466621664 ISBN-13(EAN): 9781466621664
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 25502.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presents a platform for the approaches and implementations of actor-network theory and its relationship with technology development. This book provides researchers and practitioners with a better understanding of the usefulness of the social and technical connection.

Cyber Security and the Politics of Time

Автор: Tim Stevens
Название: Cyber Security and the Politics of Time
ISBN: 1107521599 ISBN-13(EAN): 9781107521599
Издательство: Cambridge Academ
Рейтинг:
Цена: 4909.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: `Cyber security` is a recent addition to the global security agenda. This book explores how cyber security communities` conceptions of time are manifest in political practice. It will be valuable to anyone concerned with how security politics is shaped by visions of past, present and future.

Cyber Wars in the Middle East

Автор: Ahmed Al-Rawi
Название: Cyber Wars in the Middle East
ISBN: 1978810113 ISBN-13(EAN): 9781978810112
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 18810.00 р.
Наличие на складе: Нет в наличии.

Описание: Cyber Wars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz's structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other.

On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption.This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.

Handbook of Research on Applied Cybernetics and Systems Science

Автор: Snehanshu Saha, Abhyuday Mandal, Anand Narasimhamurthy, V. Sarasvathi
Название: Handbook of Research on Applied Cybernetics and Systems Science
ISBN: 1522524983 ISBN-13(EAN): 9781522524984
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 35759.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presents the latest scholarly information on complex concepts of more adaptive and self-regulating systems. Featuring exhaustive coverage on a variety of topics such as infectious disease modelling, clinical imaging, and computational modelling, this publication is an ideal source for researchers and students in the field of computer science.

Rethinking Information Technology Asset Management

Автор: Jeremy L. Boerger
Название: Rethinking Information Technology Asset Management
ISBN: 1637420145 ISBN-13(EAN): 9781637420140
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 3635.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Most IT directors and ITAM (Information Technology Asset Management) team leads learn on the job. ITAM is specialized enough that one cannot pick-up all the nuances without a lot of mistakes and pratfalls. This book, then, will help accelerate the ITAM program, set baselines for proper measures of success, and ensure both business leadership and the ITAM team are speaking the same language. The stakes couldn’t be higher. Worldwide enterprise IT spending estimate is $3.9 trillion USD for 2020, and expected to continue to increase at about 10% per year. However, software publishers estimate they are losing out on an addition $46.3 billion USD yearly revenue due to software piracy and volume license key abuses. To make up these losses, software companies engage in a policy of ‘auditing’ their existing customers to ensure software contract compliance.68% of all US companies can expect to be hit and fined by a software audit in any given 12-month period, with an average fine of $500,000 USD per audit event. Corporate ITAM initiatives keep failing because they are following the wrong methodology. Asset management should be an exercise of epistemology (as opposed to the transactional or accountancy methods most businesses use today). Epistemology is the philosophical study of knowledge: what do you know, and how can you prove it. Pragmatic ITAM will take the reader through a brief review of three Western philosophers: Socrates, Rene Descartes, and Blaise Pascal, and present 7 of their basic tenants on the topic. The next section uses these philosophical tenants to explain the ISO/IEC’s reasoning in building out their best business standards for corporate ITAM teams. The reader can then better interpret the “data lake.”

Techniques For Electronic Resource Management

Автор: Emery & Stone
Название: Techniques For Electronic Resource Management
ISBN: 0838958842 ISBN-13(EAN): 9780838958841
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 7069.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Best practices for managing e-resources are critical--two decades after the advent of electronic journals and databases, librarians are still grappling with how to effectively manage these resources in conjunction with their print resources. Now e-books have become yet another stream of purchasing and management, while economic pressures mean that librarians have to justify every penny spent on collections and resource development. This issue of Library Technology Reports details a project by Jill Emery and Graham Stone, Techniques in Electronic Resource Management (TERMS). It encourages open peer commentary and crowdsourcing of areas of best practice for each of the six stages of the e-resources life cycle: Investigation of new content for purchase or additionAcquisition of new contentImplementationOngoing evaluation and accessAnnual reviewCancellation and replacement reviewNo matter their level of experience, all those involved with e-resource management will find this Report a valuable reference.

Автор: Rinkaj Goyal, Sanjay Misra
Название: Advancements in Models and Applications of Agents and Multi-Agent Systems
ISBN: 1799852024 ISBN-13(EAN): 9781799852025
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 29245.00 р.
Наличие на складе: Нет в наличии.

Описание: Presents research exploring the theoretical and practical aspects of agent-based systems and implementations within economics, engineering, and the business field. The book features coverage on a broad range of topics, including knowledge discovery, socio-ecological systems, and human-computer interfaces.

Advancements in Models and Applications of Agents and Multi-Agent Systems

Автор: Rinkaj Goyal, Sanjay Misra
Название: Advancements in Models and Applications of Agents and Multi-Agent Systems
ISBN: 1799850595 ISBN-13(EAN): 9781799850595
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 38669.00 р.
Наличие на складе: Нет в наличии.

Описание: Presents research exploring the theoretical and practical aspects of agent-based systems and implementations within economics, engineering, and the business field. The book features coverage on a broad range of topics, including knowledge discovery, socio-ecological systems, and human-computer interfaces.

Cyberwars in the Middle East

Автор: Al-Rawi Ahmed
Название: Cyberwars in the Middle East
ISBN: 1978810105 ISBN-13(EAN): 9781978810105
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 4132.00 р.
Наличие на складе: Нет в наличии.

Описание: Cyber Wars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz's structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other.

On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption.This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.

Cyber Resilience

Автор: Sergei Petrenko
Название: Cyber Resilience
ISBN: 8770221162 ISBN-13(EAN): 9788770221160
Издательство: Taylor&Francis
Рейтинг:
Цена: 14851.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Modern cyber systems acquire more emergent system properties, as far as their complexity increases: cyber resilience, controllability, self-organization, proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one. Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G , IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc. We should even consider the cyber resilience as a primary one, because the mentioned systems cannot exist without it. Indeed, without the sustainable formation made of the interconnected components of the critical information infrastructure, it does not make sense to discuss the existence of 4.0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats, the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks. This monograph shows that modern Industry 4.0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity, a potential danger of existing vulnerabilities and “sleep” hardware and software tabs, as well as an inadequate efficiency of modern models, methods, and tools to ensure cyber security, reliability, response and recovery. A new formulation of the cyber resilience problem under heterogeneous mass cyber-attacks is proposed, in which the cyber system performance recovery in destructive software impacts prevents significant or catastrophic consequences. Here, the idea of ensuring the cyber resilience is to give the cyber systems the ability to develop immunity to disturbances of the computational processes under destructive influences, by analogy with the immune system protecting a living organism. The book contains three chapters, devoted to the following topics: Development of the Cyber Resilience Management Concept of modern technological platforms and cyber-systems of 4.0 Industry; Development of a corporate cyber risk management methodology; Technical implementation of the corporate program of business sustainability management based on the best practices (standards).


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия