Information Technology

PUBLISHED


Viewing: 1 - 10 of 185
Published:
May 10, 2013
Author(s):
Khaled El Emam
Offering compelling practical and legal reasons why de-identification should be one of the main approaches to protecting patients’ privacy, the Guide to the De-Identification of Personal Health Information outlines a proven, risk-based methodology for the de-identification of sensitive health 
  Hardback
$69.95
Add to cart
Published:
May 20, 2013
Author(s):
Witold Pedrycz
Information granules, as encountered in natural language, are implicit in nature. To make them fully operational so they can be effectively used to analyze and design intelligent systems, information granules need to be made explicit. An emerging discipline, granular computing focuses on 
  Hardback
$129.95
Add to cart
Published:
May 20, 2013
Author(s):
Franjieh El Khoury
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured 
  Hardback
$119.95
Add to cart
Published:
May 22, 2013
Editor(s):
Francesco Flammini; Roberto Setola; Giorgio Franceschetti
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current 
  Hardback
$119.95
Add to cart
Published:
May 24, 2013
Author(s):
Tiffany Pham; David K. Pham; Andrew Pham
Whether you are a CEO, CFO, board member, or an IT executive, From Business Strategy to Information Technology Roadmap: A Practical Guide for Executives and Board Members lays out a practical, how-to approach to identifying business strategies and creating value-driven technology roadmaps in 
  Hardback
$49.95
Add to cart
Published:
May 28, 2013
Author(s):
Balaji Raghunathan
The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data anonymization. It examines data anonymization from both a practitioner's and a program sponsor's perspective. Discussing analysis, planning, setup, and 
  Hardback
$79.95
Add to cart
Published:
June 04, 2013
Author(s):
Mohssen Mohammed; Al-Sakib Khan Pathan
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods  
  Hardback
$89.95
Add to cart
Published:
June 05, 2013
Editor(s):
Serge Kernbach
This book is devoted to mechatronic, chemical, bacteriological, biological, and hybrid systems, utilizing cooperative, networked, swarm, self-organizing, evolutionary and bio-inspired design principles and targeting underwater, ground, air, and space applications. It addresses issues such as 
  Hardback
$249.95
Add to cart
Published:
June 14, 2013
Author(s):
Ginger Levin; J. LeRoy Ward, PMP, PgMP
PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiple-choice practice questions in each of the ten knowledge areas and in the 
  Paperback
$69.95
Add to cart
Published:
June 17, 2013
Author(s):
Yoshiteru Nakamori
Integrating ideas from the fields of systems science and knowledge science, Knowledge and Systems Science: Enabling Systemic Knowledge Synthesis shows how to create and justify various pieces of knowledge systemically. Written by one of the foremost experts in this area, the book presents 
  Hardback
$99.95
Add to cart

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2013 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us