Information Technology

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

A Practical Introduction to Enterprise Network and Security Management

Featured

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a sol...

Intrusion Detection and Prevention for Mobile Ecosystems

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 6, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

Computational Intelligence Assisted Design: In Industrial Revolution 4.0

Yi Chen, Yun Li
June 20, 2018

Computational Intelligence Assisted Design framework mobilises computational resources, makes use of multiple Computational Intelligence (CI) algorithms and reduces computational costs. This book provides examples of real-world applications of technology. Case studies have been used to show the...

Project Management Lessons Learned: A Continuous Process Improvement Framework

Mel Bost
June 18, 2018

"Readers can benefit from the expertise of Mel Bost as both a project manager and a PMO practitioner. Kudos to him for bringing us this valuable perspective on lessons learned." —Mark Price Perry, Founder, BOT International and author of Business Driven Project Portfolio Management "Every project...

Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard

Heru Susanto, Mohammad Nabil Almunawar
June 18, 2018

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness...

Valuing Data: An Open Framework

Dewey E. Ray
June 18, 2018

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple...

Project. Program. Change

Roland Gareis, Lorenz Gareis
June 18, 2018

This book gives managers an integrative approach to project, program, and change management. It describes the differences between change in projects versus programs with case studies in both areas and the different life cycles. While the project and change comprise much of the book, it is up to...

Mastering Modern Linux, Second Edition

Paul S. Wang
June 18, 2018

Praise for the First Edition: "This outstanding book … gives the reader robust concepts and implementable knowledge of this environment. Graphical user interface (GUI)-based users and developers do not get short shrift, despite the command-line interface’s (CLI) full-power treatment. … Every...

Integrated Networking, Caching, and Computing

F. Richard Yu, Tao Huang, Yunjie Liu
June 13, 2018

This book features the major research advances on integrated networking, caching, and computing. Information-centric networking-based caching is one of the promising techniques for future networks. The cloud computing paradigm has been widely adopted to enable convenient, on-demand network access...

Agilizing the Enterprise

Joseph Raynus
June 08, 2018

This book blends concepts and their application in a comprehensive and clear presentation of how mastering of visionary leadership, strategic Innovation, managed resilience, and organizational agility improve solution delivery and sustain enterprise performance. This book widens the perspective on...

PgMP® Exam Test Preparation: Test Questions, Practice Tests, and Simulated Exams

Ginger Levin, PMP, PgMP
May 31, 2018

In addition to test questions in each of the five domains and two practice tests in print and online, this all-in-one study guide also contains flashcards for learning terms. This book is current with The Standard for Program Management, Fourth Edition, and its author is the second person in the...

High Performance CMOS Range Imaging: Device Technology and Systems Considerations

Andreas Süss
May 27, 2018

This work is dedicated to CMOS based imaging with the emphasis on the noise modeling, characterization and optimization in order to contribute to the design of high performance imagers in general and range imagers in particular. CMOS is known to be superior to CCD due to its flexibility in terms of...

Redefining Innovation: Embracing the 80-80 Rule to Ignite Growth in the Biopharmaceutical Industry

Ruchin Kansal, Jeff Huth
May 24, 2018

Most people marvel at the level of innovation demonstrated by the biopharmaceutical industry in bringing new products to the market – especially in the past 20 years. However, there is a crisis looming in the industry that should be a concern to all of us who take for granted the constant pace at...

Handbook of Image-based Security Techniques

Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
May 22, 2018

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking...

Conferences

Year: