Information Technology

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

1st Edition

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

A Practical Introduction to Enterprise Network and Security Management

1st Edition

Featured

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a sol...

Intrusion Detection and Prevention for Mobile Ecosystems

1st Edition

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 6, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

1st Edition

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

Revival: The Handbook of Software for Engineers and Scientists (1995)

1st Edition

Paul W Ross
December 11, 2018

The Handbook of Software for Engineers and Scientists is a single-volume, ready reference for the practicing engineer and scientist in industry, government, and academia as well as the novice computer user. It provides the most up-to-date information in a variety of areas such as common platforms...

Mobile Apps Engineering: Design, Development, Security, and Testing

1st Edition

Ghita K. Mostefaoui, Faisal Tariq
December 06, 2018

The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To...

Cryptographic and Information Security Approaches for Images and Videos

1st Edition

S. Ramakrishnan
December 06, 2018

This book presents essential principles, technical information, and expert insights on multimedia security technology. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, it presents a wealth of everyday protection application...

Introduction to Python for Science and Engineering

1st Edition

David J. Pine
December 05, 2018

Series in Computational PhysicsSteven A. Gottlieb and Rubin H. Landau, Series Editors Introduction to Python for Science and Engineering This guide offers a quick and incisive introduction to Python programming for anyone. The author has carefully developed a concise approach to using Python in...

CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

1st Edition

Todd Fitzgerald
December 03, 2018

Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2...

How to Build a Cyber-Resilient Organization

1st Edition

Dan Shoemaker, Anne Kohnke, Ken Sigler
December 03, 2018

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of...

A First Course in Fuzzy Logic

4th Edition

Hung T. Nguyen, Carol L. Walker, Elbert A. Walker
November 28, 2018

A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for...

Learning Approaches in Signal Processing

1st Edition

Francis Ring, Wan-Chi Siu, Lap-Pui Chau, Liang Wang, Tieniu Tang
November 28, 2018

Coupled with machine learning, the use of signal processing techniques for big data analysis, Internet of things, smart cities, security, and bio-informatics applications has witnessed explosive growth. This has been made possible via fast algorithms on data, speech, image, and video processing...

Implementing Project and Program Benefit Management

1st Edition

Kenn Dolan
November 26, 2018

One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple...

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of...

Integrating a Usable Security Protocol into User Authentication Services Design Process

1st Edition

Christina Braz, Ahmed Seffah, Bilal Naqvi
November 21, 2018

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is...

The Lean IT Expert: Leading the Transformation to High Performance IT

1st Edition

Niels Loader
November 21, 2018

Digital transformation is a business concern; it is no longer just IT that must get things done. The disruptive force of start-ups focusing on IT-based services that can be consumed through mobile devices cannot be underestimated -- These start-ups eat away at the high-margin services provided by...

Conferences

Year: