Information Technology

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

A Practical Introduction to Enterprise Network and Security Management

Featured

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a sol...

Intrusion Detection and Prevention for Mobile Ecosystems

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 7, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

SMACing the Bank: How to Use Social Media, Mobility, Analytics and Cloud Technologies to Transform the Business Processes of Banks and the Banking Experience

Balaji Raghunathan, Rajashekara Maiya
November 13, 2017

The formula for the Future of Work is called SMAC - social, mobile, analytics and cloud on one integrated stack where each function enables another to maximize its effect. This is the new enterprise IT model delivering an organization that is more connective, collaborative, real time and productive...

Underlying Standards that Support Population Health Improvement

Laura Bright, Johanna Goderre
November 13, 2017

This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that...

Practical Guide for Oracle SQL, T-SQL and MySQL

Preston Zhang
November 09, 2017

SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach...

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Ken Sigler, Dan Shoemaker, Anne Kohnke
November 03, 2017

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply...

Anti-Spam Techniques Based on Artificial Immune System

Ying Tan
November 01, 2017

Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial...

Cyberspace and Cybersecurity, Second Edition

George Kostopoulos
November 01, 2017

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include...

Programming for Hybrid Multi/Manycore MPP Systems

John Levesque, Aaron Vose
October 31, 2017

"Ask not what your compiler can do for you, ask what you can do for your compiler."--John Levesque, Director of Cray’s Supercomputing Centers of Excellence The next decade of computationally intense computing lies with more powerful multi/manycore nodes where processors share a large memory space....

Study Guide for TOGAF 9.1 Certifications

B. V. Kumar
October 31, 2017

This book is aimed at addressing the needs of individuals interested in a comprehensive understanding of TOGAF. Those who are keen in getting themselves certified in ‘The TOGAF Foundation Certification’ and ‘The TOGAF Certified Certification’ will find this book useful. The contents of the book...

Requirements Engineering for Software and Systems, Third Edition

Phillip A. Laplante
October 31, 2017

Solid requirements engineering has increasingly been recognized as the key to improved, on-time, and on-budget delivery of software and systems projects. This textbook provides a comprehensive treatment of the theoretical and practical aspects of discovering, analyzing, modeling, validating,...

Big Data Analytics: Tools and Technology for Effective Planning

Arun K. Somani, Ganesh Chandra Deka
October 27, 2017

The proposed book will discuss various aspects of big data Analytics. It will deliberate upon the tools, technology, applications, use cases and research directions in the field. Chapters would be contributed by researchers, scientist and practitioners from various reputed universities and...

Fraud Hotlines: Design, Performance, and Assessment

Chelsea A. Binns
October 26, 2017

This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the performance of fraud hotlines....

Creating Smart Enterprises: Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies

Vivek Kale
October 26, 2017

"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is...

Conferences

Year: