Information Technology

IT Management

Per Page:
Sort:

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

Featured

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security vulnerabili...

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

Featured

John J. Trinckes, Jr.
January 19, 2017

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medic...

The Analytics Process: Strategic and Tactical Steps

Eduardo Rodriguez
February 14, 2017

This book is about the process of using analytics and the capabilities of analytics in today’s organizations. Cutting through the buzz surrounding the term analytics and the overloaded expectations about using analytics, the book demystifies analytics with an in-depth examination of concepts...

HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations, Fourth Edition

Himss
February 09, 2017

This significantly expanded and newest edition of the bestselling HIMSS Dictionary of Health Information Technology Terms, Acronyms, and Organizations has been developed and extensively reviewed by more than 50 industry experts. The fourth edition of this dictionary serves as a quick reference for...

How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!

John J. Trinckes, Jr.
February 06, 2017

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased...

Cognitive Hack: The New Battleground in Cybersecurity ... the Human Mind

James Bone
January 31, 2017

This book explores a broad cross section of research and actual case studies to draw out new insights that may be used to build a benchmark for IT security professionals. This research takes a deeper dive beneath the surface of the analysis to uncover novel ways to mitigate data security...

Advances in Smart Cities: Smarter People, Governance, and Solutions

Arpan Kumar Kar, M P Gupta, P. Vigneswara Ilavarasan, Yogesh K. Dwivedi
January 17, 2017

This is an edited book based on the selected submissions made to the conference titled "International Conference in Smart Cities". The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across...

Oracle Business Intelligence and Essbase Solutions Guide

Rosendo Abellera, Lakshman Bulusu
December 12, 2016

This book highlights the practical aspects of using Oracle Essbase and Oracle Business Intelligence Enterprise Edition (OBIEE) as a comprehensive BI solution. It explains the key steps involved in Oracle Essbase and OBIEE implementations. Using case studies, the book covers Oracle Essbase for...

Project and Program Turnaround

Thomas Pavelko
December 12, 2016

The U.S. economy thrives on the development of new products, new systems, and new processes. Usually, these advances start as a flash of inspiration by highly creative individuals. It is complex and difficult to go from initial inspiration to a final product, process, or system. So it is not...

Project Management in Extreme Situations: Lessons from Polar Expeditions, Military and Rescue Operations, and Wilderness Exploration

Monique Aubry, Pascal Lievre
December 06, 2016

The growing complexity of projects today, as well as the uncertainty inherent in innovative projects, is making obsolete traditional project management practices and procedures, which are based on the notion that much about a project is known at its start. The current high level of change and...

The Data Protection Officer: Profession, Rules, and Role

Paul Lambert
December 06, 2016

The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data protection regime. Organizations must now appoint and designate a DPO. The specific definitions and...

Communication, Management and Information Technology: International Conference on Communciation, Management and Information Technology (ICCMIT 2016, Cosenza, Italy, 26-29 April 2016)

Marcelo Sampaio de Alencar
November 17, 2016

Communication, Management and Information Technology contains the contributions presented at the International Conference on Communication, Management and Information Technology (ICCMIT 2016, Cosenza, Italy, 26-29 April 2016, organized by the Universal Society of Applied Research (USAR). The...

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

Sajay Rai, Philip Chukwuma, Richard Cozart
November 10, 2016

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the...

Software Testing 2020: Preparing for New Roles

Mukesh Sharma
October 21, 2016

Software testing is at a very important crossroad, where it is going back to the roots on certain fronts while moving inexorably forward. For instance, test automation is growing in prominence, but manual testing is becoming a niche; we are increasingly collaborating with the developers, breaking...

Conferences

Year: