Information Technology

PUBLISHED


Viewing: 41 - 50 of 869
Published:
October 24, 2012
Author(s):
Pethuru Raj
Cloud Enterprise Architecture examines enterprise architecture (EA) in the context of the surging popularity of Cloud computing. It explains the different kinds of desired transformations the architectural blocks of EA undergo in light of this strategically significant convergence. Chapters cover 
  Hardback
$79.95
Add to cart
Published:
October 19, 2012
Editor(s):
Laurence T. Yang; Evi Syukur; Seng W. Loke
Consolidating recent research in the area, the Handbook on Mobile and Ubiquitous Computing: Status and Perspective illustrates the design, implementation, and deployment of mobile and ubiquitous systems, particularly in mobile and ubiquitous environments, modeling, database components, and wireless 
  Hardback
$119.95
Add to cart
Published:
October 18, 2012
Author(s):
Harsh Kupwade Patil; Stephen A. Szygenda
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack 
  Hardback
$119.95
Add to cart
Published:
October 16, 2012
Editor(s):
Jiacun Wang
Applicable to any problem that requires a finite number of solutions, finite state-based models (also called finite state machines or finite state automata) have found wide use in various areas of computer science and engineering. Handbook of Finite State Based Models and Applications provides a 
  Hardback
$99.95
Add to cart
Published:
October 15, 2012
Editor(s):
Micki Krause
Updated annually, the Information Security Management Handbook is the most comprehensive and up-to-date reference available on information security and risk management. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the 
  CDRM
$199.95
Add to cart
Published:
October 12, 2012
Editor(s):
Mario Tokoro
This book describes how to achieve dependability in information systems. The author first proposes viewing systems as open systems instead of closed systems and presents Open Systems Dependability as a property for a system that has the ability to provide optimal services, minimize damage when 
  Hardback
$69.95
Add to cart
Published:
October 09, 2012
Author(s):
Bert Brijs
Aligning business intelligence (BI) infrastructure with strategy processes not only improves your organization's ability to respond to change, but also adds significant value to your BI infrastructure and development investments. Until now, there has been a need for a comprehensive book on business 
  Hardback
$89.95
Add to cart
Published:
September 20, 2012
Author(s):
Frederic Magoules; Jie Pan; Fei Teng
As more and more data is generated at a faster-than-ever rate, processing large volumes of data is becoming a challenge for data analysis software. Addressing performance issues, Cloud Computing: Data-Intensive Computing and Scheduling explores the evolution of classical techniques and describes 
  Hardback
$79.95
Add to cart
Published:
September 17, 2012
Author(s):
Jithesh Sathyan; Anoop N.; Navin Narayan; Shibu Kizhakke Vallathai
Although enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility has resulted in a lack of books on the subject. A Comprehensive Guide to Enterprise Mobility fills this void. It supplies authoritative guidance on all aspects of enterprise 
  Hardback
$79.95
Add to cart
Published:
September 17, 2012
Author(s):
Hans Jonasson
Good requirements do not come from a tool, or from a customer interview. They come from a repeatable set of processes that take a project from the early idea stage through to the creation of an agreed-upon project and product scope between the customer and the developer. From enterprise analysis 
  Hardback
$69.95
Add to cart

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2013 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us