Information Technology

Per Page:
Sort:

A Practical Guide To X Window Programming: Developing Applications with the XT Intrinsics and OSF/Motif

Brian J. Keller
November 29, 2017

A Practical Guide to X Window Programming is a basic guide that takes readers step by step through developing applications using X-Windows�. The book covers the Xt Intrinsics portion of the X-Window system in detail and discusses the MIT Athena and OSF/Motif Widget Sets that are used in many of the...

Insurance Technology Handbook

Jessica Keyes
November 29, 2017

This desk reference for IT professionals in the insurance industry provides information about the latest technologies to improve efficiency and prediction.Topics include:imagingmodelingmanagement systemscustomer systemsInternet commerceIssues affecting all financial service sectors, such as the...

The CIO’s Guide to Risk

Jessica Keyes
November 16, 2017

In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present. The key to project success is to identify risk and subsequently deal with it. The CIO’s Guide to Risk addresses the many...

SMACing the Bank: How to Use Social Media, Mobility, Analytics and Cloud Technologies to Transform the Business Processes of Banks and the Banking Experience

Balaji Raghunathan, Rajashekara Maiya
November 13, 2017

The formula for the Future of Work is called SMAC - social, mobile, analytics and cloud on one integrated stack where each function enables another to maximize its effect. This is the new enterprise IT model delivering an organization that is more connective, collaborative, real time and productive...

Practical Guide for Oracle SQL, T-SQL and MySQL

Preston Zhang
November 09, 2017

SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach...

Underlying Standards that Support Population Health Improvement

Laura Bright, Johanna Goderre
November 03, 2017

This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that...

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Ken Sigler, Dan Shoemaker, Anne Kohnke
November 03, 2017

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply...

Anti-Spam Techniques Based on Artificial Immune System

Ying Tan
November 01, 2017

Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial...

Cyberspace and Cybersecurity, Second Edition

George Kostopoulos
November 01, 2017

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include...

Requirements Engineering for Software and Systems, Third Edition

Phillip A. Laplante
October 31, 2017

Solid requirements engineering has increasingly been recognized as the key to improved, on-time, and on-budget delivery of software and systems projects. This textbook provides a comprehensive treatment of the theoretical and practical aspects of discovering, analyzing, modeling, validating,...

Fraud Hotlines: Design, Performance, and Assessment

Chelsea A. Binns
October 26, 2017

This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the performance of fraud hotlines....

Creating Smart Enterprises: Leveraging Cloud, Big Data, Web, Social Media, Mobile and IoT Technologies

Vivek Kale
October 26, 2017

"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobile, Analytics and big data, Cloud computing, and internet of Things) technologies. This book is...

Conferences

Year: