Emerging Economies, Risk and Development, and Intelligent Technology: Proceedings of the 5th International Conference on Risk Analysis and Crisis Response, June 1-3, 2015, Tangier, Morocco
Sports Engineering and Computer Science: Proceedings of the International Conference on Sport Science and Computer Science (SSCS 2014), Singapore, 16-17 September 2014
Frontiers in Computer Education: Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE 2014), December 24–25, 2014, Wuhan, China
Informatics, Networking and Intelligent Computing: Proceedings of the 2014 International Conference on Informatics, Networking and Intelligent Computing (INIC 2014), 16-17 November 2014, Shenzhen, China
Hanqing Wu, Liz Zhao
April 6, 2015
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: ...
March 11, 2015
As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on ...
Chongfu Huang, Abdelouahid Lyhyaoui, Zhai Guofang, Nesrin Benhayoun
May 26, 2015
RACR is a series of biennial international conferences on risk analysis, crisis response, and disaster prevention for specialists and stakeholders. RACR-2015, held June 1-3, 2015 in Tangier, Morocco, was the fifth conference in this series, following the successful RACR-2007 in Shanghai (China),...
C. Ravindranath Pandian, Murali Kumar
May 20, 2015
Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler...
Brook S. E. Schoenfield
May 20, 2015
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This...
May 18, 2015
Sports Engineering and Computer Science contains papers presented at the 2014 International Conference on Sport Science and Computer Science (SSCS 2014), held September 16-17, 2014 in Singapore and at the 2014 International Conference on Biomechanics and Sports Engineering (BSE 2014), held October...
May 18, 2015
This proceedings volume contains selected papers presented at the 2014 International Conference on Frontiers in Computer Education (ICFCE 2014), which was held December 24-25, 2014, in Wuhan, China. The objective of this conference was to provide a forum for different researchers in different...
May 14, 2015
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the...
Suzanne Moss Richins
May 14, 2015
Recent changes in healthcare delivery as mandated by the Patient Protection and Affordable Care Act are forcing providers to focus on technology as a way to improve the health of the population, while engaging patients and encouraging them to take accountability for maintaining their own health....
Kendra M. L. Cooper, Walt Scacchi
May 08, 2015
Computer games represent a significant software application domain for innovative research in software engineering techniques and technologies. Game developers, whether focusing on entertainment-market opportunities or game-based applications in non-entertainment domains, thus share a common...
Robin James Stuart Sloan
May 07, 2015
While the earliest character representations in video games were rudimentary in terms of their presentation and performance, the virtual characters that appear in games today can be extremely complex and lifelike. These are characters that have the potential to make a powerful and emotional...
May 06, 2015
This proceedings volume contains selected papers presented at the 2014 International Conference on Informatics, Networking and Intelligent Computing, held in Shenzhen, China. Contributions cover the latest developments and advances in the field of Informatics, Networking and Intelligent Computing....
Vijay K. Vaishnavi, William Kuechler
May 06, 2015
Presenting innovative research methods, this second edition of a bestseller describes a simple and practical methodology for conducting cutting-edge design science research (DSR). It provides comprehensive guidance on how to conduct such research and supplies in-depth treatment of design...
CRC Press exhibits every year at more than 100 professional and academic conferences held across the world. At these events, you will have the chance to meet the authors and to get to know the CRC Press staff. You can also take advantage of special discounts for convention attendees. Visit us at the following conventions throughout the year.