語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The engineering leadership playbooks...
~
Neves, Raphael.
The engineering leadership playbookstrategies for team success and business growth /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The engineering leadership playbookby Raphael Neves.
其他題名:
strategies for team success and business growth /
作者:
Neves, Raphael.
出版者:
Berkeley, CA :Apress :2024.
面頁冊數:
xxi, 363 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Software engineering.
電子資源:
https://doi.org/10.1007/979-8-8688-0140-2
ISBN:
9798868801402$q(electronic bk.)
The engineering leadership playbookstrategies for team success and business growth /
Neves, Raphael.
The engineering leadership playbook
strategies for team success and business growth /[electronic resource] :by Raphael Neves. - Berkeley, CA :Apress :2024. - xxi, 363 p. :ill., digital ;24 cm.
Chapter 1: Principles to Become an Effective Engineering Leader -- Chapter 2: Leadership Styles and Situational Leadership -- Chapter 3: Collaboration and Team Dynamics -- Chapter 4: The Art of Mentoring -- Chapter 5: Fostering Growth and Innovation -- Chapter 6: Evaluating and Developing Your Team.
The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies. Beginning with the foundational understanding of the ever-evolving threat landscape, the book methodically introduces many cyber threats. From familiar challenges like malware and phishing to more sophisticated attacks targeting IoT and blockchain, readers will gain a robust comprehension of the attack vectors threatening our digital world. Understanding threats is just the start. The book also delves deep into the defensive mechanisms and strategies to counter these challenges. Readers will explore the intricate art of cryptography, the nuances of securing both mobile and web applications, and the complexities inherent in ensuring the safety of cloud environments. Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. These studies, although fictional, resonate with real-world scenarios, offering a nuanced understanding of the material and facilitating its practical application. Complementing the knowledge are reinforcement activities designed to test and solidify understanding. Through multiple-choice questions, readers can gauge their grasp of each chapter's content, and actionable recommendations offer insights on how to apply this knowledge in real-world settings. Adding chapters that delve into the intersection of cutting-edge technologies like AI and cybersecurity ensures that readers are prepared for the present and future of digital security. This book promises a holistic, hands-on, and forward-looking education in cybersecurity, ensuring readers are both knowledgeable and action-ready. What You Will Learn The vast array of cyber threats, laying the groundwork for understanding the significance of cybersecurity Various attack vectors, from malware and phishing to DDoS, giving readers a detailed understanding of potential threats The psychological aspect of cyber threats, revealing how humans can be manipulated into compromising security How information is encrypted and decrypted to preserve its integrity and confidentiality The techniques and technologies that safeguard data being transferred across networks Strategies and methods to protect online applications from threats How to safeguard data and devices in an increasingly mobile-first world The complexities of the complexities of cloud environments, offering tools and strategies to ensure data safety The science behind investigating and analyzing cybercrimes post-incident How to assess system vulnerabilities and how ethical hacking can identify weaknesses.
ISBN: 9798868801402$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-0140-2doiSubjects--Topical Terms:
184729
Software engineering.
LC Class. No.: QA76.758 / .N48 2024
Dewey Class. No.: 005.1068
The engineering leadership playbookstrategies for team success and business growth /
LDR
:04144nmm a2200325 a 4500
001
657964
003
DE-He213
005
20240701153758.0
006
m d
007
cr nn 008maaau
008
240923s2024 cau s 0 eng d
020
$a
9798868801402$q(electronic bk.)
020
$a
9798868801396$q(paper)
024
7
$a
10.1007/979-8-8688-0140-2
$2
doi
035
$a
979-8-8688-0140-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.758
$b
.N48 2024
072
7
$a
KJC
$2
bicssc
072
7
$a
BUS063000
$2
bisacsh
072
7
$a
KJC
$2
thema
082
0 4
$a
005.1068
$2
23
090
$a
QA76.758
$b
.N518 2024
100
1
$a
Neves, Raphael.
$3
969038
245
1 4
$a
The engineering leadership playbook
$h
[electronic resource] :
$b
strategies for team success and business growth /
$c
by Raphael Neves.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xxi, 363 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Principles to Become an Effective Engineering Leader -- Chapter 2: Leadership Styles and Situational Leadership -- Chapter 3: Collaboration and Team Dynamics -- Chapter 4: The Art of Mentoring -- Chapter 5: Fostering Growth and Innovation -- Chapter 6: Evaluating and Developing Your Team.
520
$a
The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies. Beginning with the foundational understanding of the ever-evolving threat landscape, the book methodically introduces many cyber threats. From familiar challenges like malware and phishing to more sophisticated attacks targeting IoT and blockchain, readers will gain a robust comprehension of the attack vectors threatening our digital world. Understanding threats is just the start. The book also delves deep into the defensive mechanisms and strategies to counter these challenges. Readers will explore the intricate art of cryptography, the nuances of securing both mobile and web applications, and the complexities inherent in ensuring the safety of cloud environments. Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. These studies, although fictional, resonate with real-world scenarios, offering a nuanced understanding of the material and facilitating its practical application. Complementing the knowledge are reinforcement activities designed to test and solidify understanding. Through multiple-choice questions, readers can gauge their grasp of each chapter's content, and actionable recommendations offer insights on how to apply this knowledge in real-world settings. Adding chapters that delve into the intersection of cutting-edge technologies like AI and cybersecurity ensures that readers are prepared for the present and future of digital security. This book promises a holistic, hands-on, and forward-looking education in cybersecurity, ensuring readers are both knowledgeable and action-ready. What You Will Learn The vast array of cyber threats, laying the groundwork for understanding the significance of cybersecurity Various attack vectors, from malware and phishing to DDoS, giving readers a detailed understanding of potential threats The psychological aspect of cyber threats, revealing how humans can be manipulated into compromising security How information is encrypted and decrypted to preserve its integrity and confidentiality The techniques and technologies that safeguard data being transferred across networks Strategies and methods to protect online applications from threats How to safeguard data and devices in an increasingly mobile-first world The complexities of the complexities of cloud environments, offering tools and strategies to ensure data safety The science behind investigating and analyzing cybercrimes post-incident How to assess system vulnerabilities and how ethical hacking can identify weaknesses.
650
0
$a
Software engineering.
$3
184729
650
0
$a
Transformational leadership.
$3
640818
650
0
$a
Corporate governance.
$3
190623
650
1 4
$a
Business Strategy and Leadership.
$3
914887
650
2 4
$a
Management.
$3
180005
650
2 4
$a
Software Engineering.
$3
274511
650
2 4
$a
Computer Engineering and Networks.
$3
913124
650
2 4
$a
Computer Science.
$3
212513
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0140-2
950
$a
Business and Management (SpringerNature-41169)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000237074
電子館藏
1圖書
電子書
EB QA76.758 .N518 2024 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/979-8-8688-0140-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入