Information Technology

Per Page:
Sort:

The Insider Threat: Assessment and Mitigation of Risks

1st Edition

Eleanor E. Thompson
December 10, 2018

This book provides emergent knowledge relating to physical, cyber, and human risk mitigation in a practical and readable approach for the corporate environment. It presents and discusses practical applications of risk management techniques along with useable practical policy change options. This...

Mobile Apps Engineering: Design, Development, Security, and Testing

1st Edition

Ghita K. Mostefaoui, Faisal Tariq
December 10, 2018

The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To...

Introduction to Python for Science and Engineering

1st Edition

David J. Pine
December 05, 2018

Series in Computational PhysicsSteven A. Gottlieb and Rubin H. Landau, Series Editors Introduction to Python for Science and Engineering This guide offers a quick and incisive introduction to Python programming for anyone. The author has carefully developed a concise approach to using Python in...

CISO COMPASS: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers

1st Edition

Todd Fitzgerald
December 03, 2018

Todd Fitzgerald, co-author of the ground-breaking (ISC)2 CISO Leadership: Essential Principles for Success, Information Security Governance Simplified: From the Boardroom to the Keyboard, co-author for the E-C Council CISO Body of Knowledge, and contributor to many others including Official (ISC)2...

How to Build a Cyber-Resilient Organization

1st Edition

Dan Shoemaker, Anne Kohnke, Ken Sigler
December 03, 2018

This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of cyber-resilience in its day-to-day operation. Readers will know how to establish a state of...

A First Course in Fuzzy Logic

4th Edition

Hung T. Nguyen, Carol L. Walker, Elbert A. Walker
November 28, 2018

A First Course in Fuzzy Logic, Fourth Edition is an expanded version of the successful third edition. It provides a comprehensive introduction to the theory and applications of fuzzy logic. This popular text offers a firm mathematical basis for the calculus of fuzzy concepts necessary for...

Learning Approaches in Signal Processing

1st Edition

Wan-Chi Siu, Lap-Pui Chau, Liang Wang, Tieniu Tang
November 28, 2018

Coupled with machine learning, the use of signal processing techniques for big data analysis, Internet of things, smart cities, security, and bio-informatics applications has witnessed explosive growth. This has been made possible via fast algorithms on data, speech, image, and video processing...

Implementing Project and Program Benefit Management

1st Edition

Kenn Dolan
November 26, 2018

One of the most difficult, yet important, questions regarding projects is "What advantages will this project create for the investors and key stakeholders?" Projects and programs should be treated as investments. This means that the focus of projects shifts from delivering within the triple...

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

1st Edition

Brij B. Gupta
November 26, 2018

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of...

Integrating a Usable Security Protocol into User Authentication Services Design Process

1st Edition

Christina Braz, Ahmed Seffah, Bilal Naqvi
November 21, 2018

There is an intrinsic conflict between creating secure systems and usable systems. But usability and security can be made synergistic by providing requirements and design tools with specific usable security principles earlier in the requirements and design phase. In certain situations, it is...

The Lean IT Expert: Leading the Transformation to High Performance IT

1st Edition

Niels Loader
November 21, 2018

Digital transformation is a business concern; it is no longer just IT that must get things done. The disruptive force of start-ups focusing on IT-based services that can be consumed through mobile devices cannot be underestimated -- These start-ups eat away at the high-margin services provided by...

The Healthcare Collapse: Where We've Been and Where We Need to Go

1st Edition

Eldo Frezza
November 21, 2018

The evolution of the healthcare system in the U.S. has seen numerous changes in the last 30 years where fee-for-service was the mainstay of reimbursement models and hospitals were managed by physicians and patient care was key. The early 1990’s saw the emergence of HMOs and other managed care...

Conferences

Year: