Information Technology

Per Page:
Sort:

Advanced Design and Implementation of Virtual Machines

Featured

Xiao-Feng Li
December 20, 2016

Along with the increasingly important runtime engines pervasive in our daily-life computing, there is a strong demand from the software community for a solid presentation on the design and implementation of modern virtual machines, including the Java virtual machine, JavaScript engine and Android ex...

ARM Microprocessor Systems: Cortex-M Architecture, Programming, and Interfacing

Featured

Muhammad Tahir, Kashif Javed
February 6, 2017

This book presents the use of a microprocessor-based digital system in our daily life. Its bottom-up approach ensures that all the basic building blocks are covered before the development of a real-life system. The ultimate goal of the book is to equip students with all the fundamental building bloc...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

Featured

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabili...

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

Featured

John J. Trinckes, Jr.
January 19, 2017

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medic...

Social Media, Crisis Communication, and Emergency Management: Leveraging Web and Mobile Technologies, Second Edition

Connie M. White
February 15, 2017

As social media continues to evolve at a rapid pace, emergency professionals need to know how to effectively implement and utilize social media and Web 2.0 technologies. This includes communication across agencies in emergency planning, preparedness, and response as well as for in-crisis...

The Analytics Process: Strategic and Tactical Steps

Eduardo Rodriguez
February 14, 2017

This book is about the process of using analytics and the capabilities of analytics in today’s organizations. Cutting through the buzz surrounding the term analytics and the overloaded expectations about using analytics, the book demystifies analytics with an in-depth examination of concepts...

Smart Technologies in Healthcare

Bruno Bouchard
February 13, 2017

Assistive technologies for the old and people with disabilities is now a very active field of research. It also constitutes a very profitable market (expected to reach US $60 billion p.a. by 2018). The book covers key aspects of this important field and provides guidelines for developing assistive...

HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations, Fourth Edition

Himss
February 09, 2017

This significantly expanded and newest edition of the bestselling HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations has been developed and extensively reviewed by more than 50 industry experts. The fourth edition of this dictionary serves as a quick reference for...

ARM Microprocessor Systems: Cortex-M Architecture, Programming, and Interfacing

Muhammad Tahir, Kashif Javed
February 06, 2017

This book presents the use of a microprocessor-based digital system in our daily life. Its bottom-up approach ensures that all the basic building blocks are covered before the development of a real-life system. The ultimate goal of the book is to equip students with all the fundamental building...

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

John J. Trinckes, Jr.
February 06, 2017

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security...

Advances in Smart Cities: Smarter People, Governance, and Solutions

Arpan Kumar Kar, M P Gupta, P. Vigneswara Ilavarasan, Yogesh K. Dwivedi
January 17, 2017

This is an edited book based on the selected submissions made to the conference titled "International Conference in Smart Cities". The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across...

Essentials of Computer Architecture, Second Edition

Douglas Comer
January 17, 2017

This easy to read textbook provides an introduction to computer architecture, while focusing on the essential aspects of hardware that programmers need to know. The topics are explained from a programmer’s point of view, and the text emphasizes consequences for programmers. Divided in five parts,...

Interconnections for Computer Communications and Packet Networks

Roberto Rojas-Cessa
January 06, 2017

This book introduces different interconnection networks applied to different systems. Interconnection networks are used to communicate processing units in a multi-processor system, routers in communication networks, and servers in data centers. Queuing techniques are applied to interconnection...

Encyclopedia of Computer Science and Technology, Second Edition (Print)

Phillip A. Laplante
December 21, 2016

With breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology. The topics covered in this encyclopedia include:...

Advanced Design and Implementation of Virtual Machines

Xiao-Feng Li
December 20, 2016

Along with the increasingly important runtime engines pervasive in our daily-life computing, there is a strong demand from the software community for a solid presentation on the design and implementation of modern virtual machines, including the Java virtual machine, JavaScript engine and Android...

Conferences

Year: