Information Technology

PUBLISHED


Viewing: 1 - 10 of 990
Published:
August 29, 2014
Editor(s):
Biju Issac, Nauman Israr
Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date 
Published:
August 29, 2014
Editor(s):
Biju Issac, Nauman Israr
In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the 
Published:
August 29, 2014
Author(s):
Ryszard Tadeusiewicz, Rituparna Chaki, Nabendu Chaki
The utility of artificial neural network models lies in the fact that they can be used to infer functions from observations—making them especially useful in applications where the complexity of data or tasks makes the design of such functions by hand impractical.Exploring Neural Networks with C# 
Published:
August 26, 2014
Author(s):
Richard Fox
A True Textbook for an Introductory Course, System Administration Course, or a Combination Course Linux with Operating System Concepts merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or 
Published:
August 12, 2014
Author(s):
Haishi Bai
Zen of Cloud: Learning Cloud Computing by Examples on Microsoft Azure provides comprehensive coverage of the essential theories behind cloud computing and the Windows Azure cloud platform. Sharing the author’s insights gained while working at Microsoft’s headquarters, it presents nearly 70 
Published:
August 01, 2014
Author(s):
Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment 
Published:
July 28, 2014
Author(s):
Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking 
Published:
July 28, 2014
Editor(s):
Garry Lee
The 2014 International Conference on E-Commerce, E-Business and E-Service (EEE 2014) was held on May 1-2, 2014, Hong Kong. This proceedings volume assembles papers from various professionals, leading researchers, engineers, scientists and students and presents innovative ideas and research results 
Published:
July 25, 2014
Author(s):
Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F
If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to 

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
Sign Up for Email Alerts
© 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us