Information Technology

PUBLISHED


Viewing: 1 - 10 of 997
Published:
September 19, 2014
Author(s):
Nong Ye, Teresa Wu
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train 
Published:
September 19, 2014
Author(s):
Mukesh Sharma, Rajini Padmanaban
Its scale, flexibility, cost effectiveness, and fast turnaround are just a few reasons why crowdsourced testing has received so much attention lately. While there are a few online resources that explain what crowdsourced testing is all about, there’s been a need for a book that covers best 
Published:
September 10, 2014
Editor(s):
Steven Hernandez
HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one 
Published:
September 05, 2014
Author(s):
Yufeng Wang, Jianhua Ma
Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along 
Published:
September 05, 2014
Author(s):
Muhammad Ehsan Khan
Although program management has received much attention in recent books, program governance remains a relatively new subject. While selected books and standards touch on this important topic, few are devoted to program governance as a subject. This book fills that need.Program Governance provides a 
Published:
September 04, 2014
Editor(s):
Barney L. Capehart, Ph.D., C.E.M., Michael R. Brambley, Ph.D.
With the widespread availability of high-speed, high-capacity microprocessors and microcomputers with high-speed communication ability, and sophisticated energy analytics software, the technology to support deployment of automated diagnostics is now available, and the opportunity to apply automated 
Published:
September 03, 2014
Author(s):
James R. Kalyvas, Michael R. Overly
Big Data: A Business and Legal Guide supplies a clear understanding of the interrelationships between Big Data, the new business insights it reveals, and the laws, regulations, and contracting practices that impact the use of the insights and the data. Providing business executives and lawyers ( 
Published:
September 02, 2014
Author(s):
Ryszard Tadeusiewicz, Rituparna Chaki, Nabendu Chaki
The utility of artificial neural network models lies in the fact that they can be used to infer functions from observations—making them especially useful in applications where the complexity of data or tasks makes the design of such functions by hand impractical.Exploring Neural Networks with C# 
Published:
September 02, 2014
Author(s):
Jessica Keyes
From operating systems to the cloud, Oracle’s products and services are everywhere, and it has the market share to prove it. Given the share diversity of the Oracle product line, and the level of complexity of integration, management can be quite a daunting task.The CIO's Guide to Oracle Products 

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement