Information Technology

PUBLISHED


Viewing: 1 - 10 of 989
Published:
August 29, 2014
Author(s):
Ryszard Tadeusiewicz, Rituparna Chaki, Nabendu Chaki
The utility of artificial neural network models lies in the fact that they can be used to infer functions from observations—making them especially useful in applications where the complexity of data or tasks makes the design of such functions by hand impractical.Exploring Neural Networks with C# 
Published:
August 29, 2014
Author(s):
Jessica Keyes
From operating systems to the cloud, Oracle’s products and services are everywhere, and it has the market share to prove it. Given the share diversity of the Oracle product line, and the level of complexity of integration, management can be quite a daunting task.The CIO's Guide to Oracle Products 
Published:
August 26, 2014
Author(s):
Richard Fox
A True Textbook for an Introductory Course, System Administration Course, or a Combination Course Linux with Operating System Concepts merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or 
Published:
August 12, 2014
Author(s):
Haishi Bai
Zen of Cloud: Learning Cloud Computing by Examples on Microsoft Azure provides comprehensive coverage of the essential theories behind cloud computing and the Windows Azure cloud platform. Sharing the author’s insights gained while working at Microsoft’s headquarters, it presents nearly 70 
Published:
August 07, 2014
Editor(s):
Dawei Zheng
The 2014 International Conference on Future Communication, Information and Computer Science (FCICS 2014) was held May 22-23, 2014 in Beijing, China. The objective of FCICS 2014 was to provide a platform for researchers, engineers and academics as well as industrial professionals from all over the 
Published:
August 01, 2014
Author(s):
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment 
Published:
July 28, 2014
Author(s):
Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking 
Published:
July 28, 2014
Editor(s):
Garry Lee
The 2014 International Conference on E-Commerce, E-Business and E-Service (EEE 2014) was held on May 1-2, 2014, Hong Kong. This proceedings volume assembles papers from various professionals, leading researchers, engineers, scientists and students and presents innovative ideas and research results 
Published:
July 25, 2014
Author(s):
Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F
If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to 
Published:
July 25, 2014
Author(s):
Carol L. Stimmel
By implementing a comprehensive data analytics program, utility companies can meet the continually evolving challenges of modern grids that are operationally efficient, while reconciling the demands of greenhouse gas legislation and establishing a meaningful return on investment from smart grid 

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us