Information Technology

Per Page:

Cyberspace and Cybersecurity, Second Edition

George Kostopoulos
November 01, 2017

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include...

Programming for Hybrid Multi/Manycore MPP Systems

John Levesque, Aaron Vose
October 31, 2017

"Ask not what your compiler can do for you, ask what you can do for your compiler."--John Levesque, Director of Cray’s Supercomputing Centers of Excellence The next decade of computationally intense computing lies with more powerful multi/manycore nodes where processors share a large memory space....

Requirements Engineering for Software and Systems, Third Edition

Phillip A. Laplante
October 31, 2017

Solid requirements engineering has increasingly been recognized as the key to improved, on-time, and on-budget delivery of software and systems projects. This textbook provides a comprehensive treatment of the theoretical and practical aspects of discovering, analyzing, modeling, validating,...

Big Data Analytics: Tools and Technology for Effective Planning

Arun K. Somani, Ganesh Chandra Deka
October 27, 2017

The proposed book will discuss various aspects of big data Analytics. It will deliberate upon the tools, technology, applications, use cases and research directions in the field. Chapters would be contributed by researchers, scientist and practitioners from various reputed universities and...

Fraud Hotlines: Design, Performance, and Assessment

Chelsea A. Binns
October 26, 2017

This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the performance of fraud hotlines....

Creating Smart Enterprises: Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies

Vivek Kale
October 26, 2017

"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is...

Hybrid Intelligent Techniques for Pattern Analysis and Understanding

Siddhartha Bhattacharyya, Anirban Mukherjee, Indrajit Pan, Paramartha Dutta, Arup Kumar Bhaumik
October 26, 2017

Hybrid Intelligent Techniques for Pattern Analysis and Understanding outlines the latest research on the development and application of synergistic approaches to pattern analysis in real-world scenarios. An invaluable resource for lecturers, researchers, and graduates students in computer science...

Intuition, Trust, and Analytics

Jay Liebowitz, Joanna Paliszkiewicz, Jerzy Gołuchowski
October 26, 2017

In order to make informed decisions, there are three important elements: intuition, trust, and analytics. Intuition is based on experiential learning and recent research has shown that those who rely on their “gut feelings” may do better than those who don’t. Analytics, however, are important in a...

PMI-PBA® Exam Practice Test and Study Guide

Brian Williamson
October 26, 2017

The PMI-PBA® Exam Practice Test and Study Guide attempts to address all your questions and concerns by providing two of the most sought-after study aids: memory maps and practice questions. The systematic use of memory maps helps aid in the efficient recall of information and can boost confidence...

Oracle Embedded Programming and Application Development

Lakshman Bulusu
October 23, 2017

Focusing on tried and true best practice techniques in cross-technology based Oracle embedded programming, this book provides authoritative guidance for improving your code compilation and execution. Geared towards IT professionals developing Oracle-based Web-enabled applications in PL/SQL, Java, C...

Iris Biometric Model for Secured Network Access

Franjieh El Khoury
October 23, 2017

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. Iris Biometric Model for Secured...

Computation for Humanity: Information Technology to Advance Society

Justyna Zander, Pieter J. Mosterman
October 23, 2017

The exponential progress and accessibility of computing has vastly increased data flows and revolutionized the practice of science, engineering, and communication. Computing plays a critical role in advancing research across almost every scientific discipline. Computation for Humanity: Information...