Information Technology

Per Page:

Applied Cloud Deep Semantic Recognition: Advanced Anomaly Detection

Mehdi Roopaei, Peyman Najafirad (Paul Rad)
March 15, 2018

This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. In each chapter, it identifies advanced anomaly detection and key...

Software Design: A Comprehensive Guide to Software Development Projects

Murali Chemuturi
March 12, 2018

This book is perhaps the first attempt to give full treatment to the topic of Software Design. It will facilitate the academia as well as the industry. This book covers all the topics of software design including the ancillary ones....

Parallel Programming for Modern High Performance Computing Systems

Pawel Czarnul
February 28, 2018

In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems....

Computer Organization: Basic Processor Structure

James Gil de Lamadrid
February 23, 2018

Computer Organization: Basic Processor Structure is a class-tested textbook, based on the author’s decades of teaching the topic to undergraduate and beginning graduate students. The main questions the book tries to answer are: how is a processor structured, and how does the processor function, in...

GPU Parallel Program Development Using CUDA

Tolga Soyata
February 16, 2018

GPU Parallel Program Development using CUDA teaches GPU programming by showing the differences among different families of GPUs. This approach prepares the reader for the next generation and future generations of GPUs. The book emphasizes concepts that will remain relevant for a long time, rather...

Communication Protocol Engineering

Miroslav Popovic
February 14, 2018

The book aims to enable the reader to master the engineering of communication protocols, which are amply present nowadays in mobile phones, tablets, laptops, smart appliances, and service providers' datacenters and clouds. Readers will acquire the theoretical knowledge and practical skills to...

Managing Project Competence: The Lemon and the Loop

Rolf Medina
January 25, 2018

For companies to be successful, the management of an organization needs to understand how competence evolves and how it can be utilized and linked to the organization’s goals. When executive managers understand this, there is a higher probability that the people working in the organization will be...

The Human Change Management Body of Knowledge (HCMBOK�)

Vicente Goncalves, Carla Campos
January 24, 2018

"I am happy to recommend this work. I believe in the principles presented in it and identify with its context. Due to the lack of knowledge on the subject in the market, it is a topic that must be made known. The book should be in the library of all project and change managers."— Paul Dinsmore, PMI...

Management and Technological Challenges in the Digital Age

Pedro Novo Melo, Carolina Machado
January 22, 2018

Technological developments in recent years have been tremendous. The evolution is visible in companies through increasing technological equipment, computerized procedures, and management practices. One of the visible management practices is related to employees' management. Parallel to the concerns...

Internet of Things: Challenges, Advances, and Applications

Qusay F. Hassan, Atta ur Rehman Khan, Sajjad A. Madani
January 12, 2018

Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale. It surveys recent technological advances and novel solutions for challenges in the IoT environment. Moreover, it...

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology

Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria
January 04, 2018

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIELD...

Enterprise Information Security Management

Meng-Chow Kang
December 31, 2017

The purpose of this course is to address the growing challenges of managing information security risks in enterprise and government organizations, prompted by the complexity and risks of today’s changing technological landscape, as well as increasingly demanding business aspirations. These...