Information Technology

PUBLISHED


Viewing: 1 - 10 of 986
Published:
August 12, 2014
Author(s):
Haishi Bai
Zen of Cloud: Learning Cloud Computing by Examples on Microsoft Azure provides comprehensive coverage of the essential theories behind cloud computing and the Windows Azure cloud platform. Sharing the author’s insights gained while working at Microsoft’s headquarters, it presents nearly 70 
Published:
August 07, 2014
Editor(s):
Dawei Zheng
The 2014 International Conference on Future Communication, Information and Computer Science (FCICS 2014) was held May 22-23, 2014 in Beijing, China. The objective of FCICS 2014 was to provide a platform for researchers, engineers and academics as well as industrial professionals from all over the 
Published:
August 01, 2014
Author(s):
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment 
Published:
July 28, 2014
Author(s):
Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking 
Published:
July 28, 2014
Editor(s):
Garry Lee
The 2014 International Conference on E-Commerce, E-Business and E-Service (EEE 2014) was held on May 1-2, 2014, Hong Kong. This proceedings volume assembles papers from various professionals, leading researchers, engineers, scientists and students and presents innovative ideas and research results 
Published:
July 25, 2014
Author(s):
Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F
If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to 
Published:
July 25, 2014
Author(s):
Carol L. Stimmel
By implementing a comprehensive data analytics program, utility companies can meet the continually evolving challenges of modern grids that are operationally efficient, while reconciling the demands of greenhouse gas legislation and establishing a meaningful return on investment from smart grid 
Published:
July 25, 2014
Editor(s):
Jay Liebowitz
As we get caught up in the quagmire of Big Data and analytics, it remains critically important to be able to reflect and apply insights, experience, and intuition to your decision-making process. In fact, a recent research study at Tel Aviv University found that executives who relied on their 
Published:
July 24, 2014
Editor(s):
Peter Stephenson
Cyber forensic knowledge requirements have expanded and evolved just as fast as the nature of digital information has—requiring cyber forensics professionals to understand far more than just hard drive intrusion analysis. The Certified Cyber Forensics Professional (CCFPSM) designation ensures that 
Published:
July 15, 2014
Editor(s):
Xiaolong Li


News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us