Information Technology

Per Page:
Sort:

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of...

Integrating a Usable Security Protocol into User Authentication Services Design Process

1st Edition

Christina Braz, Ahmed Seffah, Bilal Naqvi
November 21, 2018

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is...

The Lean IT Expert: Leading the Transformation to High Performance IT

1st Edition

Niels Loader
November 21, 2018

Digital transformation is a business concern; it is no longer just IT that must get things done. The disruptive force of start-ups focusing on IT-based services that can be consumed through mobile devices cannot be underestimated -- These start-ups eat away at the high-margin services provided by...

The Healthcare Collapse: Where We've Been and Where We Need to Go

1st Edition

Eldo Frezza
November 21, 2018

The evolution of the healthcare system in the U.S. has seen numerous changes in the last 30 years where fee-for-service was the mainstay of reimbursement models and hospitals were managed by physicians and patient care was key. The early 1990’s saw the emergence of HMOs and other managed care...

Algorithm Design Practice for Collegiate Programming Contests and Education

1st Edition

Yonghui Wu, Jiande Wang
November 20, 2018

This book can be used as an experiment and reference book for algorithm design courses, as well as a training manual for programming contests. It contains 247 problems selected from ACM-ICPC programming contests and other programming contests. There's detailed analysis for each problem. All...

Phoenix Leadership for Business: An Executive's Strategy for Relevance and Resilience

1st Edition

Valentina Gokenbach
November 19, 2018

The world continues to ride a wave of turmoil, challenging leaders like never before. New laws, competitive markets and the need to respond to the demands of corporate boards and stockholders unnerve even the most senior of leaders resulting in progressively shorter tenures of those in leadership...

Web Wisdom: How to Evaluate and Create Information Quality on the Web, Third Edition

3rd Edition

Marsha Ann Tate
November 09, 2018

The World Wide Web has undergone tremendous growth since the first edition of Web Wisdom: How to Evaluate and Create Information Quality on the Web was conceived and written in the mid to late 1990s. The phenomenal global expansion of the internet, together with the increasing sophistication of...

Introduction to Python Programming

1st Edition

Gowrishankar S, Veena A
November 07, 2018

Introduction to Python Programming is written for students who are beginners in the field of computer programming. This book presents an intuitive approach to the concepts of Python Programming for students. This book differs from traditional texts not only in its philosophy but also in its overall...

Software Defined-WAN for the Digital Age: A Bold Transition to Next Generation Networking

1st Edition

David W. Wang
November 05, 2018

SD-WAN is an advanced networking approach that creates hybrid networks to integrate broadband or other network services into the corporate WAN, not only just handling general business workloads and traffic, but also being capable of maintaining the performance and security of real-time and...

iOS App Penetration Testing and Security

1st Edition

Swaroop Yermalkar
October 31, 2018

...

Information Security Governance: Framework and Toolset for CISOs and Decision Makers

1st Edition

Andrej Volchkov
October 25, 2018

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc....

Enterprise Process Management Systems: Engineering Process-Centric Enterprise Systems using BPMN 2.0

1st Edition

Vivek Kale
October 24, 2018

  Enterprise Process Management Systems: Engineering Process-Centric Enterprise Systems using BPMN 2.0 proposes a process-centric paradigm to replace the traditional data-centric paradigm for Enterprise Systems (ES)--ES should be reengineered from the present data-centric enterprise...

Conferences

Year: