Internet & Web-based Computing

108 Results


Subject


Status


Type

Internet & Web-based Computing

Per Page:
Sort:
PCI Compliance: The Definitive Guide

PCI Compliance: The Definitive Guide

Featured

Abhay Bhargav

May 5, 2014

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explai...

The Influential Project Manager: Winning Over Team Members and Stakeholders

The Influential Project Manager: Winning Over Team Members and Stakeholders

Featured

Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F

July 25, 2014

If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to devel...

Project Leadership: Creating Value with an Adaptive Project Organization

Project Leadership: Creating Value with an Adaptive Project Organization

Featured

Barry L. Cross, M. Kathryn Brohman

July 1, 2014

Look around your organization: can you identify who owns project management? Would that person appreciate that they own responsibility for your projects? Project Leadership: Creating Value with an Adaptive Project Organization highlights the importance of these questions—underlining the importance...

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Featured

Rafay Baloch

July 28, 2014

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking t...

Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript

Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript

J. D. Glaser

October 13, 2014

The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security. Establishing mobile software...

Leveraging the Wisdom of the Crowd in Software Testing

Leveraging the Wisdom of the Crowd in Software Testing

Mukesh Sharma, Rajini Padmanaban

September 19, 2014

Its scale, flexibility, cost effectiveness, and fast turnaround are just a few reasons why crowdsourced testing has received so much attention lately. While there are a few online resources that explain what crowdsourced testing is all about, there’s been a need for a book that covers best...

Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective

Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective

Yufeng Wang, Jianhua Ma

September 05, 2014

Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along...

Automated Diagnostics and Analytics for Buildings

Automated Diagnostics and Analytics for Buildings

Barney L. Capehart, Ph.D., C.E.M., Michael R. Brambley, Ph.D.

September 04, 2014

With the widespread availability of high-speed, high-capacity microprocessors and microcomputers with high-speed communication ability, and sophisticated energy analytics software, the technology to support deployment of automated diagnostics is now available, and the opportunity to apply automated...

Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar

August 01, 2014

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment...

E-Commerce, E-Business and E-Service

E-Commerce, E-Business and E-Service

Garry Lee

July 28, 2014

The 2014 International Conference on E-Commerce, E-Business and E-Service (EEE 2014) was held on May 1-2, 2014, Hong Kong. This proceedings volume assembles papers from various professionals, leading researchers, engineers, scientists and students and presents innovative ideas and research results...

Wireless Multimedia Communication Systems: Design, Analysis, and Implementation

Wireless Multimedia Communication Systems: Design, Analysis, and Implementation

K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz

June 24, 2014

Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to...

Semantic Multimedia Analysis and Processing

Semantic Multimedia Analysis and Processing

Evaggelos Spyrou, Dimitris Iakovidis, Phivos Mylonas

June 23, 2014

Broad in scope, Semantic Multimedia Analysis and Processing provides a complete reference of techniques, algorithms, and solutions for the design and the implementation of contemporary multimedia systems. Offering a balanced, global look at the latest advances in semantic indexing, retrieval,...

GIS Cartography: A Guide to Effective Map Design, Second Edition

GIS Cartography: A Guide to Effective Map Design, Second Edition

Gretchen N. Peterson

May 23, 2014

In the five years since the publication of the first edition of A Guide to Effective Map Design, cartography and software have become further intertwined. However, the initial motivation for publishing the first edition is still valid: many GISers enter the field without so much as one hour of...

Web-based Virtual Environments for Decision Support in Water Based Systems: UNESCO-IHE PhD Thesis

Web-based Virtual Environments for Decision Support in Water Based Systems: UNESCO-IHE PhD Thesis

Xuan Zhu

May 14, 2014

User interface is one of the most important components for decision support systems since it directly faces to the end users: decision makers and stakeholders. Implementation of modern visualization and interaction techniques can fill the gap between models and information in order to assist the...

Linked Data Management

Linked Data Management

Andreas Harth, Katja Hose, Ralf Schenkel

May 01, 2014

Linked Data Management presents techniques for querying and managing Linked Data that is available on today’s Web. The book shows how the abundance of Linked Data can serve as fertile ground for research and commercial applications. The text focuses on aspects of managing large-scale collections...

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Walter Williams

April 24, 2014

Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both...