Information Technology

Per Page:
Sort:

Walling Out the Insiders: Controlling Access to Improve Organizational Security

Featured

Michael Erbschloe
February 23, 2017

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an orga...

Advanced Design and Implementation of Virtual Machines

Featured

Xiao-Feng Li
December 20, 2016

Along with the increasingly important runtime engines pervasive in our daily-life computing, there is a strong demand from the software community for a solid presentation on the design and implementation of modern virtual machines, including the Java virtual machine, JavaScript engine and Android ex...

ARM Microprocessor Systems: Cortex-M Architecture, Programming, and Interfacing

Featured

Muhammad Tahir, Kashif Javed
February 6, 2017

This book presents the use of a microprocessor-based digital system in our daily life. Its bottom-up approach ensures that all the basic building blocks are covered before the development of a real-life system. The ultimate goal of the book is to equip students with all the fundamental building bloc...

5G Radio Access Networks: Centralized RAN, Cloud-RAN and Virtualization of Small Cells

Featured

Hrishikesh Venkataraman, Ramona Trestian
February 23, 2017

C-RAN and virtualized Small Cell technology poses several major research challenges. These include dynamic resource allocation, self-configuration in the baseband pool, high latency in data transfer between radio unit and baseband unit, the cost of data delivery, high volume of data in the network, ...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

Featured

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabili...

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

Featured

John J. Trinckes, Jr.
January 19, 2017

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medic...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Featured

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 8, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain special...

Social Network Analysis: Interdisciplinary Approaches and Case Studies

Xiaoming Fu, Jar-Der Luo, Margarete Boos
March 21, 2017

The book addresses the issue of interdisciplinary understanding of collaboration on the topic of social network studies. Researchers and practitioners from various disciplines including sociology, computer science, socio-psychology, public health, complex systems, and management science have worked...

A Guide to Selecting Software Measures and Metrics

Capers Jones
March 16, 2017

Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major...

HIPAA and PCI Audits: Secrets to Getting GREAT Results

Raj Goel
March 15, 2017

This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system, record, and security compromises. It addresses policy, software, and procedural solutions to safeguarding information including: assigning unique IDs to users, controlling...

Data Analytics for Internal Auditors

Richard E. Cascarino
March 15, 2017

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

Eugene M Fredriksen
March 13, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Cybersecurity: Geopolitics, Law, and Policy

Amos N. Guiora
March 10, 2017

This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 08, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

Virtualization and Private Cloud with VMware Cloud Suite

Lee Chao
March 03, 2017

To help readers understand virtualization and cloud computing, this book is designed to cover the theories and concepts enough to understand the cutting-edge technology. Meanwhile, in this book, the reader can gain hands-on skills on VMware Cloud Suite to create a private cloud. With the academic...

The Internet of Things: Enabling Technologies, Platforms, and Use Cases

Pethuru Raj, Anupama C. Raman
March 02, 2017

As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and...

Computer, Communication and Electrical Technology: Proceedings of the International Conference on Advancement of Computer Communication and Electrical Technology (ACCET 2016), West Bengal, India, 21-22 October 2016

Debatosh Guha, Badal Chakraborty, Himadri Sekhar Dutta
February 28, 2017

The First International Conference on Advancement of Computer, Communication and Electrical Technology focuses on key technologies and recent progress in computer vision, information technology applications, VLSI, signal processing, power electronics & drives, and application of sensors &...

Walling Out the Insiders: Controlling Access to Improve Organizational Security

Michael Erbschloe
February 23, 2017

Insider threats are everywhere. To address them in a reasonable manner that does not disrupt the entire organization or create an atmosphere of paranoia requires dedication and attention over a long-term. Organizations can become a more secure, but to stay that way it is necessary to develop an...

Data Protection: Ensuring Data Availability

Preston de Guise
February 22, 2017

This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is...

Conferences

Year: