it, forensics, security and business improvement newsletter

22
Information Technology, Forensics, Security and Business Improvement Newsletter January, February and March 2014 New & Noteworthy Titles from CRC Press Forensics, Law and Homeland Security - Page 2 - 5 Software Networking and Security - Page 6 - 17 Business and Public Administration - Page 18 Business Improvement - Page 19 -21

Upload: crc-press-india

Post on 19-Mar-2016

216 views

Category:

Documents


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: IT, Forensics, Security and Business Improvement Newsletter

Information Technology,Forensics, Security and Business Improvement NewsletterJanuary, February and March 2014New & Noteworthy Titles from CRC Press Forensics, Law and Homeland Security - Page 2 - 5Software Networking and Security - Page 6 - 17Business and Public Administration - Page 18Business Improvement - Page 19 -21

Page 2: IT, Forensics, Security and Business Improvement Newsletter

2

Forensics, Law & Homeland Security

Forensic Science An Introduction to Scientific and Investigative Techniques, Fourth Edition

Edited by Stuart James, James & Associates Forensic Consultants, Inc., Fort Lauderdale, Florida, USA, Jon J. Nordby, Final Analysis Forensics, University Place, Washington, USA and Suzanne Bell, West Virginia University, Morgantown, USA

ISBN: 978-1-4398-5383-2January 2014 • Pack • £38.99 • 614pp • 334 illus.

Featuring more than 400 photographs, the fourth edition of this volume provides more complete treatment outside of CSI and laboratory analysis. Some of the greatest experts in the field discuss case studies from their own personal files. The chapters are now organized into those topics that are most popular for coursework, making the text more manageable for instructors. This edition also offers a wider range of supporting materials, including an instructor’s guide with objectives, questions and answers, and suggested activities as well as PowerPoint® lecture slides and an extensive test bank.

Key Features

• Presents full treatment of the arena outside CSI and laboratory analysis• Offers edited contributions from some of the greatest experts in their

fields• Uses case studies taken from the expert’s personal files• Organizes chapters into those topics most popular for coursework,

making the book more manageable• Instructor’s guide, PowerPoint® lecture slides, and test bank available

with qualifying course adoption

International Features

• Over 8000 copies sold of the last edition outside the United States attests to the international reputation of this work.

Editor: Becky Masterman

Market Forensic science students, forensic scientists and technicians, criminal justice professionals.

TEXTBOOK

Sell this book with...

Bloodstain Pattern Analysis with an Introduction to Crime Scene Reconstruction, Third Edition, ISBN: 978-1-4200-5268-8 Practical Crime Scene Processing and Investigation, ISBN: 978-0-8493-2043-9 Practical Crime Scene Analysis and Reconstruction, ISBN: 978-1-4200-6551-0

Page 3: IT, Forensics, Security and Business Improvement Newsletter

3

Forensics, Law & Homeland Security

REFERENCE

Market Forensic scientists, pathologists, biologists, physical anthropologists, archeologists, and criminal justice professionals.

DNA Analysis for Missing Person Identification in Mass Fatalities

Amanda C Sozer, Alexandria, Virginia, USA

ISBN: 978-1-4665-1384-6January 2014 • HB • £89.00 • 328pp • 87 illus.

Beginning with a concise overview of DNA analysis methods and their use in identifying victims of mass fatalities, this volume provides comprehensive training in these techniques. The book discusses DNA sample collection from family members and other DNA reference samples. Readers learn different methodologies that can be used in the laboratory to extract DNA and generate profiles. A chapter on STR data analysis provides everything needed to understand the many complexities involved in the comparison of DNA profiles from the human remains to the reference samples. An accompanying CD-ROM includes example forms.

Key Features

• Provides comprehensive information on best practices in DNA sample collection

• Supplies a detailed overview of autosomal STR DNA profile analysis and interpretation

• Includes a discussion on the importance of data management using information technology tools and maintaining quality operations

• Provides comprehensive information on laboratory development• Contains a vocabulary list of 175 terms related to mass fatality DNA

identification and more than 250 images

International Features

• The international popularity of Forensic DNA analysis, especially as it relates to disasters and mass graves, make this book travel well.

Editor: Becky Masterman

Sell this book with...

Forensic Human Identification, ISBN: 978-0-8493-3954-7

Mass Fatality and Casualty Incidents, ISBN: 978-0-8493-1295-.

Forensic DNA Evidence Interpretation, ISBN: 978-0-8493-3017-9

Page 4: IT, Forensics, Security and Business Improvement Newsletter

4

Forensics, Law & Homeland Security

Forensic DNA Applications An Interdisciplinary Perspective

Edited by Dragan Primorac, Zagreb, Croatia and Moses Schanfield, Washington, D.C., USA

ISBN: 978-1-4665-8022-0January 2014 • HB • £89.00 • 600pp • 114 illus.

With dozens of international contributions, this book brings together the worldwide progress in DNA methods and applications as they apply to forensic science. Four sections cover background and the latest methodological concepts, current uses of the techniques and their applications, recent developments and future directions in human forensic molecular biology, and law, ethics, and policy. With solid background information for those new to the field, the book presents applications in bioterrorism and mass disasters and includes almost 100 color illustrations.

Key Features

• Provides background as an introduction to those new to the field• Presents applications in bioterrorism and mass disasters• Examines the latest information on forensic applications of X

chromosomes• Includes material on animal and plant DNA• Contains almost 100 color illustrations

International Features

• The chapters of this book were written by scientists around the world after the Forensic DNA meeting in eastern Europe.

Editor: Becky Masterman

Market Forensic scientists and pathologists, molecular biologists and geneticists, legal professionals.

REFERENCE

Sell this book with...

Forensic DNA Evidence Interpretation, ISBN 978-0-8493-3017-9 An Introduction to Forensic DNA Analysis, Second Edition, ISBN: 978-0-8493-0233-6 Introduction to Forensic DNA Evidence for Criminal Justice Professionals, ISBN: 978-1-4398-9909-0

Page 5: IT, Forensics, Security and Business Improvement Newsletter

5

Forensics, Law & Homeland Security

REFERENCEProfiling Cop-Killers

Ann R. Bumbak, Washington, D.C., USA

ISBN: 978-1-4822-1141-2 January 2014 • PB • £25.99 • 278pp • 71 illus.

Drawing heavily on original research designed to train police officers to survive deadly encounters, this book identifies the commonalities and differences between groups of offenders by age, examining the previously hidden connections between an offender’s lethal choices, criminal history, drug and alcohol usage, interpersonal relationships, injury patterns and life-and-death outcomes. Using Erikson’s theory of life span development, the author applies the test of the struggle for identity to offender profiles, words and actions to analyze the interaction of offenders’ maturity levels, mastery of challenges by phase, and degree of deviancy exhibited in their violent acts.

Key Features

• Reveals the hidden stories behind cop killers• Explores the two main mental health issues with cop killers• Includes an introductory segment on Christopher Dorner• Discusses the trends in violence against police

Market Police officers and law enforcement and public safety personnel

Editor: Carolyn Spence

Sell this book with...

Officer-Involved Shootings and Use of Force, ISBN: 978-0-8493-8798-2 The Active Shooter Response Training Manual, ISBN: 978-1-4665-8297-2 Criminal Profiling, ISBN: 978-1-4665-0435-6

International features

• Discusses the trends in violence against police• Explores the two main mental health issues with cop killers• Includes an introductory segment in Christopher Domer• Examines the sociological history , psychology, motives, and outcomes of

fifty murderers of police officers in 2011.

Page 6: IT, Forensics, Security and Business Improvement Newsletter

6

Software Networking & Security

REFERENCEIntrusion Detection in Wireless Ad-Hoc Networks

Edited by Nabendu Chaki, University of Calcutta, Kolkata, West Bengal, India and Rituparna Chaki, University of Calcutta, Kolkata, West Bengal, India

ISBN: 978-1-4665-1565-9January 2014 • HB • £63.99 • 258pp • 75 illus

Presenting cutting-edge research, this book explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it provides readers with the understanding required to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.

Key Features

• Covers the security aspects, particularly Intrusion Detection Systems, for the range of wireless ad-hoc networks

• Reviews and evaluates state-of-the-art IDSs for various wireless ad-hoc networks, including MANETs, wireless mesh networks, and sensor networks

• Touches on advanced topics such as security for smart power grid and IDS for the cloud environment

Market Network design and development engineers working on sensor networks and security; Researchers working on sensor networks and security; Graduate faculty and students.

Editor: Rich O’Hanley

Sell this book with...

Intrusion Detection Networks: A Key to Collaborative Security, ISBN 978-1-4665-6412-1

Automatic Defense against Zero-day Polymorphic Worms in Communication Networks, ISBN 978-1-4665-5727-7The State of the Art in Intrusion Prevention and Detection, ISBN 978-1-4822-0351-6

International Features

• Editor from Department of Computer Science & Engineering, University of Calcutta, India

• Cyber-crime is greatest global threat to organizations’ survival today; intrusion detection systems are front line defense against network attacks

• Covers the security aspects particularly IDS (Intrusion Detection Systems) for all types of Wireless Ad-Hoc Networks and related application areas, including MANETs, Wireless Mesh Networks, Sensor Networks, smart power-grid, IDS for cloud environment, and more

Page 7: IT, Forensics, Security and Business Improvement Newsletter

7

Software Networking & Security

REFERENCE

Market Engineers building, deploying, and managing OpenFlow/SDN networks; academics and R&D engineers working on NGNs and OpenFlow/SDN.

Network Innovation through OpenFlow and SDN Principles and Design

Fei Hu, University of Alabama, Tuscaloosa, USA

ISBN: 978-1-4665-7209-6February 2014 • HB • £57.99 • 488pp •181 illus.

Legacy networks simply weren’t designed to handle the speed, volume, and scalability needs of today’s organizations. To address this, it is important to consider software-defined networking (SDN) powered by the OpenFlow protocol for your network architecture. Introducing SDN and OpenFlow, this book explains how to use them to build next-generation networks that are simple to design and scale, less expensive to build and operate, more agile and customizable, and more virtualized, flexible, and interoperable.

Key Features

• Supplies a cutting-edge look at SDN and OpenFlow • Explains how SDN and OpenFlow can be used to build next-generation

networks that are easy to design and scale; less expensive to build and operate; more agile and customizable; and more virtualized

• Focuses on building, deploying, and managing OpenFlow/SDN products and networks

International Features

• OpenFlow/SDN is emerging as one of the most promising and disruptive networking technologies of recent years.

• Some of the world’s largest network providers, including Alcatel-Lucent (France), Deutsche Telekom (Germany), Ericsson (Sweden), Huawei (PRC), KT Corp. (Korea Telecom), Telefonica I+D (Spain), Tata Consultancy Services Ltd (India), have created the Open Networking Foundation (ONF) to standardize and promote SDN interfaces and protocols including OpenFlow.

• The well-defined API for the network operating system means third parties can develop and sell network control and management applications creating more choice for the network operators, which creates global market for this

Editor: Rich O’Hanley

Sell this book with...

Converging NGN Wireline and Mobile 3G Networks with IMS, ISBN: 978-0-8493-9250-4

Security of Mobile Communications, ISBN: 978-0-8493-7941-3

Wireless Sensor Networks, ISBN: 978-1-4200-9215-8

Page 8: IT, Forensics, Security and Business Improvement Newsletter

8

Software Networking & Security

The State of the Art in Intrusion Prevention and Detection

Edited by Al-Sakib Khan Pathan, International Islamic University Malaysia, Kuala

ISBN: 978-1-4822-0351-6January 2014 • HB • £76.99 • 514pp • 168 illus.

This book analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention.

Key Features

• Analyzes latest trends and issues about intrusion detection and prevention in computer networks and systems, especially in communications networks

• Covers wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks

• Reports on new techniques and research on intrusion detection schemes, intrusion prevention schemes, and tracing back mobile attackers

Market Professionals and researchers working in the field of computer and network security; graduate students, academics, and industry practitioners working in the area of wired or wireless networking or computer systems, who want to improve their understanding of the inter-related topics.

REFERENCE

Editor: Rich O’Hanley

Sell this book with...

Data Mining and Machine Learning in Cybersecurity, ISBN: 978-1-4398-3942-3

Enhancing Computer Security with Smart Technology, ISBN: 978-0-8493-3045-2

Data Mining Tools for Malware Detection, ISBN: 978-1-4398-5454-9

International eatures

• Author from Department of Computer Science, Kulliyyah (Faculty) of Information and Communication Technology International Islamic University Malaysia (IIUM)

• Cyber-crime is greatest global threat to organizations’ survival today; intrusion detection and prevention systems are front line defense against network attacks

• 3. Covers wired, wireless and mobile networks; Next-Generation Converged Networks; and intrusion in social networks

Page 9: IT, Forensics, Security and Business Improvement Newsletter

9

Software Networking & Security

Disturbance Observer Based Control Methods and Applications

Shihua Li, Southeast University, Nanjing, China, Jun Yang, Southeast University, Nanjing, China, Wen-Hua Chen, Loughborough University, UK and Xisong Chen, Southeast University, Nanjing, China

ISBN: 978-1-4665-1579-6February 2014 • HB • £63.99 • 328pp • 115 illus.

With a view towards developing more effective measures of prevention and resolution, this book examines political violence in various national and international settings. Providing both conceptual analysis and case studies, it explores historical and sociopolitical contexts of conflicts in order to help readers better understand these themes. The book is written by academics researching the areas as well as practitioners working in the fields of counterterrorism and political violence. It brings together theoretical concepts examined through operational and empirical findings from which conclusions can be drawn that may assist in dealing with terrorism and political violence in practice.

Key Features

• Includes novel theory results on DOBC • Provides successful applications of DOBC on motion control which already

benefited companies, as well as applications on process control• Contains many examples useful to those who engage in flight control and

systems• Supplies theory and application results for university staff and graduates

who engage or have interest in the field of DOBC

Editor: He Ruijun

Market Electrical engineers, control systems engineers, estimation theorists, aerospace/mechanical/chemical engineers, mechatronics, and applied mathematicians.

REFERENCE

Sell this book with...

Linear Control Theory: Structure, Robustness, and Optimization, ISBN 9780849340635

Simulation of Dynamic Systems with MATLAB and Simulink, Second Edition, ISBN: 9781439836736

Intelligent Control Systems with an Introduction to System of Systems Engineering, ISBN: 9781420079241

International features

• Authors are world leading researchers in this field from different countries;

Page 10: IT, Forensics, Security and Business Improvement Newsletter

10

Software Networking & Security

The Art of Linux Kernel DesignIllustrating the Operating System Design Principle and Implementation

Lixiang Yang, Graduate University of the Chinese Academy of Sciences, Beijing, China

ISBN: 978-1-4665-1803-2March 2014 • PB • £49.99 • 384pp • 309 illus.

This book uses the real source code of a multi-processing OS as the blueprint and its actual running operation as the main thread, with the concept of “master-slave mechanism” and 349 figures, illustrates the complex relationships within the OS. The content of the book is divided into two different sections according to the operational procedures of the OS. It provides a detailed insight on the complete process from booting up to system idling, the second part uses a few carefully designed real life user operations as study cases to explicate important OS concepts.

Key Features

• 349 high resolution figures to illustrate the real inside status of the OS.• By raising the concept of “master-slave mechanism,” the author reveals

the the fundamental design concepts of the OS.• This book also provides thorough explanations of the original source

code, helping readers to learn how a real OS operates and the common problems the designer had faced during development.

• This book uses the running operation of the OS as the main thread to explain how it works, natural and easy to understand.

• The author uses concise summary, special notes, author’s comments to help readers get better understanding.

Editor: He Ruijun

Market OS and application software programmers and developers

REFERENCE

Sell this book with...

Mastering Linux, ISBN: 978-1-4398-0686-9

Embedded Linux System Design and Development, ISBN: 978-0-8493-4058-1

International Features

• Witten by authors have deep understanding on not only operating systems, but also compiling and programing;

• Put much attention on operating systems related security issues;• The material of the book has been taught many semester to students and

is quite mature;

Page 11: IT, Forensics, Security and Business Improvement Newsletter

11

Software Networking & Security

C: From Theory to Practice

George S. Tselikis, 4Plus company, Athens, Greece and Nikolaos D. Tselikas, Dept. of Informatics and Telecommunications, University of Peloonnese, Greece

ISBN: 978-1-4822-1450-5February 2014 • PB • £49.99 • 528pp • 110 illus.

This easy-to-use, classroom-tested textbook covers the C programming language for computer science and IT students. Designed for a compulsory fundamental course, it presents the theory and principles of C. More than 500 exercises and examples of progressive difficulty aid students in understanding all the aspects and peculiarities of the C language. The exercises test students on various levels of programming and the examples enhance their concrete understanding of programming know-how.

Key Features

• Presents the theory behind C in an accessible way with hints and advice• Gives thorough explanations of complicated concepts, such as pointers,

structures, memory management, and files• Provides concrete examples that illustrate hands-on programming• Includes exercises to test students’ programming skills• Offers source code online• Instructor’s manual and PowerPoint slides available upon qualifying

course adoption

International Features

• 500+ difficulty-scaled solved programming exercises• Dominant C programming text book in Greece• Substantial, non-tiring, and easy-to-read presentation of the C theory• Tips to avoid programming bugs and implement efficient and clear C

programs

Editor: He Ruijun

Market Undergraduate students taking a course on C; computer and IT professionals interested in the C language.

TEXTBOOK

Sell this book with...

A Practical Guide to Data Structures and Algorithms using Java, ISBN 978-1-58488-455-2 Programming in C++ for Engineering and Science, ISBN 978-1-4398-2534-1 Operating System Design, ISBN 978-1-4398-8109-5

Page 12: IT, Forensics, Security and Business Improvement Newsletter

12

Software Networking & Security

Formal Languages and Computation

Alexander Meduna, Brno University of Technology, Czech Republic

ISBN: 978-1-4665-1345-7January 2014 • HB • £63.99 • 315pp • 59 illus.

This computer science book gives a clear, comprehensive introduction to formal language theory and its applications in computer science. It is meant as the basis of a one-term course on this subject at the undergraduate level. It covers all rudimental topics concerning formal languages and their models, especially grammars and automata. It sketches the basic ideas underlying the theory of computation, including computability, decidability, and computational complexity. From a practical viewpoint, it explains how these models underlie computer science engineering techniques for language processing, such as lexical and syntax analysis.

Key Features

• Covers formal language theory and its applications in computer science• Pays a special attention to various language processors and their

supporting language-defining models• Presents theoretical results informally, then sketches their proofs

intuitively, step by step, gently leading students to formal versions of these proofs

• Sketches the basic ideas underlying the theory of computation, including computability, decidability, and computational complexity

• Contains self-contained explanations without assumption of any previous knowledge

• Emphasizes real-world applications, demonstrating how theory and practice work together

International Features

• The author, Alex Meduna, is a professor in the Faculty of Information Technology, Brno University of Technology, Czech Republic.

• With his international teaching experience, having taught at the University of Missouri and in Japan, Dr. Meduna has written a core computer textbook suitable for higher education institutions throughout the world.

• Ancillaries, including lecture slides, are available.

Editor: John Wyzalek

Market Undergraduate students in computer science

TEXTBOOK

Sell this book with...

Requirements Engineering for Software and Systems, ISBN 978-1-4200-6467-4Modeling Software with Finite State Machines, ISBN 978-0-8493-8086-0Finite Automata, ISBN 978-1-58488-255-8

Page 13: IT, Forensics, Security and Business Improvement Newsletter

13

Software Networking & Security

Introduction to Software Project Management

Adolfo Villafiorita, Bruno Kessler Foundation

ISBN: 978-1-4665-5953-0March 2014 • HB • £57.99 • 296 pages • 63 illus.

A proper development process and sound project management remain the top reasons software projects fail or succeed. This book is an introduction to the area of software project management. After presenting the main definitions and concepts, the book is organized in two main parts. The first part describes the technical activities for developing software and managing projects. The second part of the book organizes the technical activities in a coherent process and shows how this process is customized in practice to fit common software-development scenarios.

Key Features

• Provides the know-how to manage projects• Covers a broad range of techniques, with explanation of alternatives to

achieve similar goals• Presents content dedicated to management frameworks (such as the

ESA and NASA guidelines, PRINCE2, and PMBOK), allowing readers to “standardize” and kick-start their software development practices and situations in which software development is only a component of a larger project

• Addresses open source development practices and tools, allowing readers to adopt some best practices from the open source domain and get started in their projects with a set of freely available tools

• Discusses the customization of the software process, enabling readers to tailor the development process to different kind of products and formality (for example, development of critical applications, development of web applications)

International Features

• The author, Adolfo Villafiorita, is a head researcher at the Bruno Kessler Foundation, Trento Italy.

• Covers internationally recognized frameworks: the OCG Prince2® and the PMI® Project Management Body of Knowledge

• Slides and other course material are available.

Editor: John Wyzalek

Market Practitioners who wish to acquire more know on specific management techniques and students in electronic engineering and computer science.

TEXTBOOK

Sell this book with...

Project Management Theory and Practice, ISBN: 9781439809938

Page 14: IT, Forensics, Security and Business Improvement Newsletter

14

Software Networking & Security

Big Data, Mining, and Analytics Components of Strategic Decision Making

Stephan Kudyba,

ISBN: 978-1-4665-6870-9March 2014 • HB • £49.99 • 308pp • 89 illus.

The book provides a description of the general underpinnings of mining along with the various mathematical and algorithmic methodologies that are incorporated in it. It describes the data management issues that are involved with the generation of information using mining techniques. It provides various numerous business applications where mining can be applied and describes new data sources that have evolved that can add explanatory power to these business processes.

Key Features

• Provides various numerous business applications where mining can be applied and describes new data sources that have evolved that can add explanatory power to these business processes

• Explains how the evolution of big data and new data resources that are largely the result of the internet, is bringing analytics to a new dimension

• Explains general underpinnings of data mining, along with its various mathematical and algorithmic methodologies, and data management issues associated with data mining techniques

Editor: John Wyzalek

Market Data mining professionals

REFERENCE

Sell this book with...

Strategic Intelligence ISBN: 978-0-8493-9868-1

The Business Value of IT ISBN: 978-1-4200-6474-2

Healthcare Informatics, ISBN: 978-1-4398-0978-5

International Features • Big data is a global phenomenon caused by the ever-growing amount of

data from such sources as on-line commerce and social networking• Foreword by Thomas H. Davenport, an internationally recognized

analytics consultant and author• International group of contributors from the U.S., U.K., and Canada

Page 15: IT, Forensics, Security and Business Improvement Newsletter

15

Software Networking & Security

The SAP Materials Management Handbook

Ashfaque Ahmed, SCM Consulting, Bhilai, Chattisgarh, India

ISBN: 978-1-4665-8162-3 March 2014 • HB • £49.99 • 448pp • 640 llus.

SAP Materials Management module (SAP MM) takes care of business functions related to purchasing and inventory management. SAP MM also takes care of defining and maintaining materials in the system. This book provides readers with a complete understanding on how to configure and implement SAP materials management module on projects. All the business flows are captured through system screen shots and explained with examples in “how to do it”. The book includes case studies taken from real projects that illustrate how theoretical techniques are converted into practical solutions and applied in real life.

Key Features

• Covers SAP Release/3 ERP ECC 6 MM, SAP MM Inventory Management, and SAP MM Purchase

• Depicts business flows with screen shots• Covers all SAP MM purchase functions including purchase orders,

purchase requisitions, outline contracts, and request for quotation • Examines all SAP MM Inventory Management functions including

physical inventory, stock over view, stock valuation, movement types, and reservations

• Illustrates the procure to pay lifecycle

Editor: John Wyzalek

Market SAP shops using SAP MM.

REFERENCE

Sell this book with...

Managing Global Supply Chains, ISBN: 978-1-4200-6456-8

Supply Chain Architecture, : ISBN: 978-1-57444-357-8

ERP, ISBN: 978-1-57444-358-5

International Features

• SAP, headquartered in Germany, is a global leader in Enterprise Resource Planning• The author, Ashfaque Ahmed, is an India-based consultant who has worked on SAP projects globally• The book explains how to use SAP MM to handle multiple countries globally

Page 16: IT, Forensics, Security and Business Improvement Newsletter

16

Software Networking & Security

Agile Strategy Management

Soren Lyngso, Lyngso Informatique

ISBN: 978-1-4665-9607-8February 2014 • HB • £49.99 • 433pp • 49 illus.

Strategies are challenged all the time because markets, technology, legal factors, government, and other factors change. In order to ensure that a strategy does not become ephemeral it must be flexible when confronting the challenges. This flexibility is ensured by building agility into the methods proposed in this book for initiation, development, implementation, and governance of strategic initiatives. The book shows how you can initiate, develop, implement, and govern a healthy strategy delivering the benefits expected by all stakeholders.

Key Features

• Shows how to initiate, develop, implement, and govern a healthy strategy delivering the benefits expected by all stakeholders

• Demonstrates how to ensure flexibility by building agility initiation, development, implementation, and governance of strategic initiatives

• Guides readers on how to respond strategically to changing markets, technology, legal factors, government, and other factors

Editor: John Wyzalek

Market Scientists and engineers working on biometrics, biometric produce and system developers

REFERENCE

Sell this book with...

The Effective CIO, ISBN:978-1-4200-6460-5

A Practical Guide to Information Systems Strategic Planning, Second Edition, ISBN 978-0-8493-5073-3

The Strategic Project Office, Second Edition, 978-1-4398-3812-9

International Features

• Soren Lyngso runs a consultancy based in Luxembourg and speaks regularly at conferences in the U.K., France, Denmark, Belgium, and Luxembourg

• Case studies based on the author’s working experience throughout the EU

Page 17: IT, Forensics, Security and Business Improvement Newsletter

17

Software Networking & Security

Empowering Project Teams Using Project Followership to Improve Performance

Marco Sampietro, Business School of Bocconi University, Milan, Italy and Tiziano Villa, Project Management LAB

ISBN: 978-1-4822-1755-1February 2014 • HB • £44.99 • 295pp • 29 illus.

Project team members play an important role in every project but often do not have the necessary understanding of project management methodologies. Thus, the dialog between the project manager and team members is often not as easy as it should be and becomes a source of stress and tensions. This book tries to improve on this situation by presenting the project environment from the perspective of project team members. Project management methodologies and behaviors are re-interpreted with a bottom-up approach throughout the text.

Key Features

• Illustrates the knowledge that team members should have and the behaviors they should adopt in order to successfully participate in a project environment

• Presents the project environment through the lenses of project team members

• Provides individuals who work in project teams with tools and skills to produce better performing projects and increase personal satisfaction

• Examines the project end as an important moment to “take stock” and evaluate whether the effort invested has been rewarded

Editor: John Wyzalek

Market Project managers and project team members.

REFERENCE

Sell this book with...

The Strategic Project Leader, ISBN: 978-0-8493-8794-4

Implementing Program Management, ISBN: 978-1-4398-1605-9

Optimizing Human Capital with a Strategic Project Office ISBN: 978-0-8493-5410-6

International Features

• Dr. Marco Sampietro is a professor SDA Bocconi School of Management, Milan, and Tiziano Villa is a project management consultant based in Milan.

• Foreword by an early pioneer of the field of project management, Russell D. Archibald, who is a Fellow of the Project Management Institute and an Honorary Fellow of the Association of Project Management (APM/IPMA) in the UK

• Dr. Sampietro is regular speaker at conferences in the EU and US.

Page 18: IT, Forensics, Security and Business Improvement Newsletter

18

Business & Public Administration

Editor: Michael Sinocchi

Market Acquisitions, purchasing and supply chain managers.

REFERENCE

Sell this book with...

Managing Global Supply Chains, ISBN: 978-1-4200-6456-8

Mastering Purchasing Management for Inbound Supply Chains ISBN: 9978-1-4200-8619-5

Compliance in Today’s Global Supply Chain, ISBN: 978-1-4200-8621-8

Mastering the Business of Global Trade Negotiating Competitive Advantage Contractual Best Practices, Incoterms, and Leveraging Supply Chain Options

Thomas A. Cook, American River International, Melville, New York, USA

ISBN: 978-1-4665-9578-1January 2014 • HB • £49.99 • 416pp • 102 illus.

Explaining the key elements of what any international business person must know, this book describes how to utilize negotiation skills and leveraged options, along with INCO Terms, to extract the maximum benefits from your supply chain. Illustrating how INCO Terms impact compliance and risk, it details options to help readers reduce their exposure to risk as well as best practices to help readers steer clear of compliance issues that can lead to costly delays. The book establishes a simple, yet comprehensive, roadmap that readers can easily follow to engage in more deals and increase returns, while reducing overall risk exposure.

Key Features

• Illustrates how Global Contract wordings and agreements impact compliance and risk

• Offers best practices to help readers reduce risk and ensure compliance • Explains how to negotiate more favorable conditions, terms and

agreements• Describes how to use leveraged options and INCO Terms to maximize

the benefits of your supply chain

International Features

• This book will not only teach the very key elements of what every international businessperson must know, but more importantly will teach readers how to utilize negotiation skills and leveraged options, along with Inco Terms (International Commercial Terms) to work their supply chains for competitive benefits. This will allow for more trade, more deals, higher returns and a reduction in commercial risk.

• Will provide great insight for the reader on how Inco Terms impact compliance and risk and then offering the critical options for avoidance and best practices.

• Landed costs are ultimately what determines pricing and profits. The book will offer understanding how landed cost modeling works, and more importantly, how to use these business models to leverage supply chain options.

Page 19: IT, Forensics, Security and Business Improvement Newsletter

19

Business Improvement

Healthcare Hazard Control and Safety Management, Third Edition

James T. Tweedy, MS, CHSP, CPSO, CHEP, International Board for Certification of Safety Managers, Helena, Alabama, USA

ISBN: 978-1-4822-0655-5March 2014 • HB • £82.00 • 592pp • 9 illus.

Comprehensive in scope, this edition of a bestseller covers all major issues in the field. Presented in an easy-to-read format, the book includes practical checklists and forms that can be readily put to use. It provides advice and guidance on management, hazard control, compliance, standards, and accreditation. New to this edition is information on leadership, performance improvement, risk management, organizational culture, behavioral safety, and root cause analysis. The book also profiles new OSHA and Joint Commission requirement and regulatory changes. This text is used as the primary study reference for the Certified Healthcare Safety Professional examination.

Key Features

• Presents information in an easy-to-use style and provides a comprehensive overview of health care safety regulation, accreditation, hazards, management and leadership tips, and prevention activities

• Contains a comprehensive index of topics with accompanying checklists, glossary of terms, and sample management plans

• Provides real-world information from an author with more than 20 years of experience in dealing with all facets of healthcare safety and hazard control

• Discusses hazard control and safety as proactive functions of the organization and not just programs

Editor: Kristine Mednansky

Market senior managers, nurses, safety directors, risk managers, patient safety officers, facility managers, occupational health professionals, infection prevention professionals, environmental services personnel, security professionals, facility engineers, hazardous material coordinators in hospitals, surgery centers, clinics and long-term care facilities.

REFERENCE

Sell this book with...

Handbook of Modern Hospital Safety, Second Edition, ISBN: 978-1-4200-4785-1

Reliability Technology, Human Error, and Quality in Health Care, ISBN: 978-1-4200-6558-9

Lean Hospitals, ISBN: 978-1-4200-8380-4

International Features

• The topics discussed in this book apply to any hospital or healthcare facility regardless of their location in the world. All hospitals need to concern themselves with patient safety factors, facility hazards, biohazards, environmental services, food service safety, medical equipment, pharmacy safety, etc. Additionally, many of these issues are regulated by government entities regardless of their location.

Page 20: IT, Forensics, Security and Business Improvement Newsletter

20

Business Improvement

Design for Manufacturability How to Use Concurrent Engineering to Rapidly Develop Low-Cost, High-Quality Products for Lean Production

David M. Anderson

ISBN: 978-1-4822-0492-6February 2014 • HB • £38.99 • 480pp • 49 illus.

This book explains how to develop manufactured products right, the first time around. It describes how to reduce total cost, ramp to volume production on schedule, and increase production for demand so as not to limit growth. Most design for manufacturability books are written for design engineers and focus on the parts that determine 20% of the costs. This book focuses on designing products which determine 60% of the costs. This book is suitable for anyone involved in product development at manufacturing companies, including management, ownership, and the consultants that serve them.

Key Features

• Explains how to develop manufactured products right, the first time around

• Describes how to significantly reduce total costs• Demonstrates how to learn lessons from previous/similar projects using

lessons learned• Details how to work with manufacturing engineers to design parts for

optimal manufacturability and compatibility with factory processes while engineering fixturing, tooling, and procedures

• Spells out how to work with purchasing people early on to select parts and materials that maximize quality and availability while assuring the desired functionality

Editor: Michael Sinocchi

Market Anyone involved with product development at manufacturing companies, including management/ownership, and the consultants that serve them.

REFERENCE

Sell this book with...

The Toyota Product Development System, ISBN: 978-1-56327-282-0

Value Stream Mapping for Lean Development, ISBN: 978-1-56327-372-8

The Mastery of Innovation, ISBN: 978-1-4398-7702-9

Key Features

• Details R&D investment at international companies.• Details Team Leaders at international companies.• Details offshoring and manufacturability.

Page 21: IT, Forensics, Security and Business Improvement Newsletter

21

Business Improvement

Agribusiness Supply Chain Management

N. Chandrasekaran, Take Solutions, Ltd.,Chennai Tamilnadu, India and G. Raghuram, Indian Institute of Management, Ahmedabad, Gujarat, India

ISBN: 978-1-4665-1674-8February 2014 • HB • £63.99 • 708pp • 77 illus.

This book introduces the complexity and importance of supply chain management within businesses handling agricultural products. Topics include major drivers, facility, inventory, and transportation management, sourcing decisions such as processed or farm fresh, input and output challenges, processors, challenges of managing perishables, infrastructure, retailing, quality, information technology, risk strategies, financials, direct trading verses auction, and navigating relevant government policies. The book includes numerous case studies that span a wide range of issues and industries.

Key Features

• Supplies engaging, illustrated, and accessible recommendations for best practices

• Provides many examples from a global perspective• Includes case studies that cover a range of industries and issues—

including oils, seeds, tobacco, crop protection, spices, sauce, transportation, grocery stores, cold storage, sugarcane, and fisheries

Editor: Lara Zoble

Market Agribusiness supply chain managers and executives, MBA faculty, and students with an interest in agricultural products.

REFERENCE

Sell this book with...

Managing Supply Chains on the Silk Road, ISBN: 978-1-4398-6720-4 Supply Chain Architecture, ISBN: 978-1-5744-4357-8

International Features

• Extensive coverage of global supply chain sourcing issues such as agricultural resource scarcity, dealing with different health standards across countries, and special transport requirements of perishable supplies.

• Special focus on Indian agricultural sourcing with prominent case studies covering such markets as oil palm, dairy, chili, seafood, sugar, and more.

• Includes an entire section on quality issues and foreign trade policies in the agri sector.

• Also covers agricultural risk management such as weather uncertainty, price fluctuation and commodities markets, insurance, etc.

Page 22: IT, Forensics, Security and Business Improvement Newsletter

22

Like us on Facebook

Join our LinkedIn Group

Follow us on Twitter.

www.crcpress.com

Sign up to receive CRC Press' First Look eAlerts, exclusive discounts and promotions!

For feedback or queries about this newsletter please contact:[email protected]

Marketing Coordinator . Taylor & Francis/CRC Press . 3 Park Square, Milton Park . Abingdon, Oxon . OX14 4RN, UK