Information Technology

Per Page:
Sort:
Web Security: A WhiteHat Perspective

Web Security: A WhiteHat Perspective

Featured

Hanqing Wu, Liz Zhao
April 6, 2015

In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: ...

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

Official (ISC)2 Guide to the CISSP CBK, Fourth Edition

Featured

Adam Gordon
March 11, 2015

As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on ...

Emerging Economies, Risk and Development, and Intelligent Technology: Proceedings of the 5th International Conference on Risk Analysis and Crisis Response, June 1-3, 2015, Tangier, Morocco

Emerging Economies, Risk and Development, and Intelligent Technology: Proceedings of the 5th International Conference on Risk Analysis and Crisis Response, June 1-3, 2015, Tangier, Morocco

Chongfu Huang, Abdelouahid Lyhyaoui, Zhai Guofang, Nesrin Benhayoun
May 26, 2015

RACR is a series of biennial international conferences on risk analysis, crisis response, and disaster prevention for specialists and stakeholders. RACR-2015, held June 1-3, 2015 in Tangier, Morocco, was the fifth conference in this series, following the successful RACR-2007 in Shanghai (China),...

Simple Statistical Methods for Software Engineering: Data and Patterns

Simple Statistical Methods for Software Engineering: Data and Patterns

C. Ravindranath Pandian, Murali Kumar
May 20, 2015

Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler...

Securing Systems: Applied Security Architecture and Threat Models

Securing Systems: Applied Security Architecture and Threat Models

Brook S. E. Schoenfield
May 20, 2015

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This...

Sports Engineering and Computer Science: Proceedings of the International Conference on Sport Science and Computer Science (SSCS 2014), Singapore, 16-17 September 2014

Sports Engineering and Computer Science: Proceedings of the International Conference on Sport Science and Computer Science (SSCS 2014), Singapore, 16-17 September 2014

Qi Luo
May 18, 2015

Sports Engineering and Computer Science contains papers presented at the 2014 International Conference on Sport Science and Computer Science (SSCS 2014), held September 16-17, 2014 in Singapore and at the 2014 International Conference on Biomechanics and Sports Engineering (BSE 2014), held October...

Frontiers in Computer Education: Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE 2014), December 24–25, 2014, Wuhan, China

Frontiers in Computer Education: Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE 2014), December 24–25, 2014, Wuhan, China

Yuanzhi Wang
May 18, 2015

This proceedings volume contains selected papers presented at the 2014 International Conference on Frontiers in Computer Education (ICFCE 2014), which was held December 24-25, 2014, in Wuhan, China. The objective of this conference was to provide a forum for different researchers in different...

Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition

Official (ISC)2® Guide to the CISSP®-ISSMP® CBK®, Second Edition

Joseph Steinberg
May 14, 2015

The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the...

Emerging Technologies in Healthcare

Emerging Technologies in Healthcare

Suzanne Moss Richins
May 14, 2015

Recent changes in healthcare delivery as mandated by the Patient Protection and Affordable Care Act are forcing providers to focus on technology as a way to improve the health of the population, while engaging patients and encouraging them to take accountability for maintaining their own health....

Computer Games and Software Engineering

Computer Games and Software Engineering

Kendra M. L. Cooper, Walt Scacchi
May 08, 2015

Computer games represent a significant software application domain for innovative research in software engineering techniques and technologies. Game developers, whether focusing on entertainment-market opportunities or game-based applications in non-entertainment domains, thus share a common...

Virtual Character Design for Games and Interactive Media

Virtual Character Design for Games and Interactive Media

Robin James Stuart Sloan
May 07, 2015

While the earliest character representations in video games were rudimentary in terms of their presentation and performance, the virtual characters that appear in games today can be extremely complex and lifelike. These are characters that have the potential to make a powerful and emotional...

Informatics, Networking and Intelligent Computing: Proceedings of the 2014 International Conference on Informatics, Networking and Intelligent Computing (INIC 2014), 16-17 November 2014, Shenzhen, China

Informatics, Networking and Intelligent Computing: Proceedings of the 2014 International Conference on Informatics, Networking and Intelligent Computing (INIC 2014), 16-17 November 2014, Shenzhen, China

Jiaxing Zhang
May 06, 2015

This proceedings volume contains selected papers presented at the 2014 International Conference on Informatics, Networking and Intelligent Computing, held in Shenzhen, China. Contributions cover the latest developments and advances in the field of Informatics, Networking and Intelligent Computing....

Design Science Research Methods and Patterns: Innovating Information and Communication Technology, 2nd Edition

Design Science Research Methods and Patterns: Innovating Information and Communication Technology, 2nd Edition

Vijay K. Vaishnavi, William Kuechler
May 06, 2015

Presenting innovative research methods, this second edition of a bestseller describes a simple and practical methodology for conducting cutting-edge design science research (DSR). It provides comprehensive guidance on how to conduct such research and supplies in-depth treatment of design...

Conferences

Year: