Information Technology

Per Page:
Sort:

Enterprise Level Security: Securing Information Systems in an Uncertain World

William R. Simpson
April 29, 2016

Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized,...

From Action Systems to Distributed Systems: The Refinement Approach

Luigia Petre, Emil Sekerinski
April 27, 2016

Formal methods traditionally address the question of transforming software engineering into a mature engineering discipline. This essentially refers to trusting that the software-intensive systems that form our society’s infrastructures are behaving according to their specifications. More recently,...

Software Quality Assurance: Integrating Testing, Security, and Audit

Abu Sayed Mahfuz
April 27, 2016

Software Quality Assurance: Integrating Testing, Security, and Audit focuses on the importance of software quality and security. It defines various types of testing, recognizes factors that propose value to software quality, and provides theoretical and real-world scenarios that offer value and...

Healthcare Informatics: Improving Efficiency through Technology, Analytics, and Management

Stephan P. Kudyba
April 14, 2016

Healthcare Informatics: Improving Efficiency through Technology, Analytics, and Management supplies an understanding of the different types of healthcare service providers, corresponding information technologies, analytic methods, and data issues that play a vital role in transforming the...

Analyzing and Securing Social Networks

Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, Latifur Khan
April 05, 2016

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of...

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop

Peng Cheng, Heng Zhang, Jiming Chen
April 05, 2016

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of...

The Complete Guide to Cybersecurity Risks and Controls

Anne Kohnke, Dan Shoemaker, Ken E. Sigler
April 04, 2016

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day...

The Dynamic Progress Method: Using Advanced Simulation to Improve Project Planning and Management

J. Chris White, Robert M. Sholtes
April 01, 2016

Recent computer-based tools for project planning and management focus on user-friendliness and interconnectivity. However, these programs function on the Critical Path Method, or CPM, which was created in the 1950s. These programs, which involve simplistic models and methods, ignore the fact that...

Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations

Fei Hu
April 01, 2016

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts...

Operational Assessment of IT

Steve Katzman
April 01, 2016

Operational Assessment of IT presents ideas and concepts of optimization designed to improve an organization’s business processes and assist business units in meeting organizational goals more effectively. Rather than focus on specific technologies, computing environments, enterprise risks,...

High Performance CMOS Range Imaging: Device Technology and Systems Considerations

Andreas Süss
March 24, 2016

This work is dedicated to CMOS based imaging with the emphasis on the noise modeling, characterization and optimization in order to contribute to the design of high performance imagers in general and range imagers in particular. CMOS is known to be superior to CCD due to its flexibility in terms of...

The Innovation Factory

Gilles Garel, Elmar Mock
March 18, 2016

The Innovation Factory takes a fresh look at the fine art of breakthrough innovation. What makes it unique is that it brings together an experienced scholar and a serial entrepreneur who share the same passion for understanding the processes and theories needed to innovate over and over again. The...

Conferences

Year: