Information Technology

Software Engineering & Systems Development

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

Machine-to-Machine Communications: Architectures, Technology, Standards, and Applications

Vojislav B. Misic, Jelena Misic
October 18, 2017

With the number of machine-to-machine (M2M)–enabled devices projected to reach 20 to 50 billion by 2020, there is a critical need to understand the demands imposed by such systems. Machine-to-Machine Communications: Architectures, Technology, Standards, and Applications offers rigorous treatment of...

The Innovator’s Imperative: Rapid Technology Adoption for Digital Transformation

Stephen J Andriole, Thomas Cox, Kaung M. Khin
October 13, 2017

The pace of technological change is accelerating, hyper competition is growing, opportunities for business model disruption are exploding, and comprehensive cloud delivery is readily available. These factors challenge every aspect of business technology strategy. The Innovator’s Imperative: Rapid...

Intrusion Detection Networks: A Key to Collaborative Security

Carol Fung, Raouf Boutaba
October 12, 2017

The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your...

Software Patterns, Knowledge Maps, and Domain Analysis

Mohamed E. Fayad, Huascar A. Sanchez, Srikanth G.K. Hegde, Anshu Basia, Ashka Vakil
October 12, 2017

Software design patterns are known to play a vital role in enhancing the quality of software systems while reducing development time and cost. However, the use of these design patterns has also been known to introduce problems that can significantly reduce the stability, robustness, and reusability...

Stable Design Patterns for Software and Systems

Mohamed Fayad
September 11, 2017

Attention to design patterns is unquestionably growing in software engineering because there is a strong belief that using made to measure solutions for solving frequently occurring problems encountered throughout the design phase greatly reduces the total cost and the time of developing software...

The Business Value of Software

Michael D. S. Harris
August 28, 2017

In business, driving value is a key strategy and typically starts at the top of an organization. In today’s digital age, driving software value is also an important, and often overlooked, key strategy. Executives, and the corporate board, need to expect the highest level of business value from the...

Multilevel Modeling of Secure Systems in QoP-ML

Bogdan Księżopolski
August 01, 2017

In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and...

Fundamentals of Multicore Software Development

Victor Pankratius, Ali-Reza Adl-Tabatabai, Walter Tichy
July 19, 2017

With multicore processors now in every computer, server, and embedded device, the need for cost-effective, reliable parallel software has never been greater. By explaining key aspects of multicore programming, Fundamentals of Multicore Software Development helps software engineers understand...

Software Methodologies: A Quantitative Guide

Capers Jones
July 14, 2017

This comprehensive reference uses a formal and standard evaluation technique to show the strengths and weakness of more than 60 software development methodologies such as agile, DevOps, RUP, Waterfall, TSP, XP and many more. Each methodology is applied to an application of 1000 function points...

Threat Level Red: Cybersecurity Research Programs of the U.S. Government

Michael Erbschloe
July 14, 2017

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely...

How to Win at CRM: Strategy, Implementation, Management

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the...

Shaping the Future of ICT: Trends in Information Technology, Communications Engineering, and Management

Ibrahiem M. M. El Emary, Anna Brzozowska
July 13, 2017

The International Conference on Communications, Management, and Information Technology (ICCMIT’16) provides a discussion forum for scientists, engineers, educators and students about the latest discoveries and realizations in the foundations, theory, models and applications of systems inspired on...

Conferences

Year: