Information Technology

Networking Communication

Per Page:
Sort:

Risk Thinking for Cloud-Based Application Services

Eric Bauer
April 03, 2017

Many enterprises are moving their applications and IT services to the cloud. Better risk management results in fewer operational surprises and failures, greater stakeholder confidence and reduced regulatory concerns; proactive risk management maximizes the likelihood that an enterprise’s objectives...

Social Network Analysis: Interdisciplinary Approaches and Case Studies

Xiaoming Fu, Jar-Der Luo, Margarete Boos
March 21, 2017

The book addresses the issue of interdisciplinary understanding of collaboration on the topic of social network studies. Researchers and practitioners from various disciplines including sociology, computer science, socio-psychology, public health, complex systems, and management science have worked...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 08, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

Virtualization and Private Cloud with VMware Cloud Suite

Lee Chao
March 03, 2017

To help readers understand virtualization and cloud computing, this book is designed to cover the theories and concepts enough to understand the cutting-edge technology. Meanwhile, in this book, the reader can gain hands-on skills on VMware Cloud Suite to create a private cloud. With the academic...

The Internet of Things: Enabling Technologies, Platforms, and Use Cases

Pethuru Raj, Anupama C. Raman
March 02, 2017

As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality. The book begins with a discussion of IoT "ecosystems" and...

Data Protection: Ensuring Data Availability

Preston de Guise
February 22, 2017

This is the fundamental truth about data protection: backup is dead. Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization. So what is...

Advances in Smart Cities: Smarter People, Governance, and Solutions

Arpan Kumar Kar, M P Gupta, P. Vigneswara Ilavarasan, Yogesh K. Dwivedi
January 17, 2017

This is an edited book based on the selected submissions made to the conference titled "International Conference in Smart Cities". The project provides an innovative and new approach to holistic management of cities physical, socio-economic, environmental, transportation and political assets across...

Encyclopedia of Computer Science and Technology, Second Edition (Print)

Phillip A. Laplante
December 21, 2016

With breadth and depth of coverage, the Encyclopedia of Computer Science and Technology, Second Edition has a multi-disciplinary scope, drawing together comprehensive coverage of the inter-related aspects of computer science and technology. The topics covered in this encyclopedia include:...

Mobile Crowdsensing

Cristian Borcea, Manoop Talasila, Reza Curtmola
November 23, 2016

Mobile crowdsensing is a technology that allows large scale, cost-effective sensing of the physical world. In mobile crowdsensing, mobile personal devices such as smart phones or smart watches come equipped with a variety of sensors that can be leveraged to collect data related to environment,...

Culture Matters: Decision-Making in Global Virtual Teams

Norhayati Zakaria
November 18, 2016

Global virtual teams (GVTs) have evolved as a common work structure in multinational corporations due to their efficiency and cost-effectiveness. The cultural differences can produce great benefits in terms of perspective, creativity, and innovation, but can also exacerbate interpersonal...

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices

Sajay Rai, Philip Chukwuma, Richard Cozart
November 10, 2016

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices have created a maintenance nightmare not only for the...

Location Privacy in Wireless Sensor Networks

Ruben Rios, Javier Lopez, Jorge Cuellar
October 21, 2016

Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an unprecedented privacy risk given their ability to collect information on quantities and situations so far unsuspected. There is therefore an urgent need to develop mechanisms to ensure privacy in sensor...

Conferences

Year: