Information Technology

Per Page:
Sort:

Distributed Networks: Intelligence, Security, and Applications

Qurban A. Memon
March 29, 2017

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence,...

Netcentric System of Systems Engineering with DEVS Unified Process

Saurabh Mittal, José L. Risco Martín
March 29, 2017

In areas such as military, security, aerospace, and disaster management, the need for performance optimization and interoperability among heterogeneous systems is increasingly important. Model-driven engineering, a paradigm in which the model becomes the actual software, offers a promising approach...

Distributed Data Fusion for Network-Centric Operations

David Hall, Chee-Yee Chong, James Llinas, Martin Liggins II
March 29, 2017

With the recent proliferation of service-oriented architectures (SOA), cloud computing technologies, and distributed-interconnected systems, distributed fusion is taking on a larger role in a variety of applications—from environmental monitoring and crisis management to intelligent buildings and...

Multimedia Security: Watermarking, Steganography, and Forensics

Frank Y. Shih
March 29, 2017

Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the...

Developing Windows-Based and Web-Enabled Information Systems

Nong Ye, Teresa Wu
March 29, 2017

Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train...

Large-Scale Simulation: Models, Algorithms, and Applications

Dan Chen, Lizhe Wang, Jingying Chen
March 29, 2017

Large-Scale Simulation: Models, Algorithms, and Applications gives you firsthand insight on the latest advances in large-scale simulation techniques. Most of the research results are drawn from the authors’ papers in top-tier, peer-reviewed, scientific conference proceedings and journals. The...

Social Network Analysis: Interdisciplinary Approaches and Case Studies

Xiaoming Fu, Jar-Der Luo, Margarete Boos
March 27, 2017

The book addresses the issue of interdisciplinary understanding of collaboration on the topic of social network studies. Researchers and practitioners from various disciplines including sociology, computer science, socio-psychology, public health, complex systems, and management science have worked...

A Guide to Selecting Software Measures and Metrics

Capers Jones
March 16, 2017

Going where no book on software measurement and metrics has previously gone, this critique thoroughly examines a number of bad measurement practices, hazardous metrics, and huge gaps and omissions in the software literature that neglect important topics in measurement. The book covers the major...

HIPAA and PCI Audits: Secrets to Getting GREAT Results

Raj Goel
March 15, 2017

This book identifies proven tactics that help companies achieve HIPAA and PCI compliance and, more importantly, avoid system, record, and security compromises. It addresses policy, software, and procedural solutions to safeguarding information including: assigning unique IDs to users, controlling...

Data Analytics for Internal Auditors

Richard E. Cascarino
March 15, 2017

There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics. The spread of IT systems makes it necessary that...

The CISO Journey: Life Lessons and Concepts to Accelerate Your Professional Development

Eugene M Fredriksen
March 13, 2017

The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters, each...

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework

Anne Kohnke, Ken Sigler, Dan Shoemaker
March 09, 2017

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain...

Conferences

Year: