Information Technology

Per Page:
Sort:

Communication Protocol Engineering, Second Edition

Miroslav Popovic
February 12, 2018

The book aims to enable the reader to master the engineering of communication protocols, which are amply present nowadays in mobile phones, tablets, laptops, smart appliances, and service providers' datacenters and clouds. Readers will acquire the theoretical knowledge and practical skills to...

Software Engineering with UML

Bhuvan Unhelkar
December 21, 2017

This book presents the analysis, design, documentation, and quality of software solutions based on the OMG UML v2.5. Notably it covers 14 different modelling constructs including use case diagrams, activity diagrams, business-level class diagrams, corresponding interaction diagrams and state...

Cyberspace and Cybersecurity, Second Edition

George Kostopoulos
November 01, 2017

Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include...

Requirements Engineering for Software and Systems, Third Edition

Phillip A. Laplante
October 31, 2017

Solid requirements engineering has increasingly been recognized as the key to improved, on-time, and on-budget delivery of software and systems projects. This textbook provides a comprehensive treatment of the theoretical and practical aspects of discovering, analyzing, modeling, validating,...

Internet Infrastructure: Networking, Web Services, and Cloud Computing

Richard Fox, Wei Hao
October 19, 2017

Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses. The material in the text is divided into concept...

Introduction to Machine Learning with Applications in Information Security

Mark Stamp
September 07, 2017

Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn’t prove theorems, or otherwise dwell on mathematical theory....

A Practical Introduction to Enterprise Network and Security Management

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a...

C: From Theory to Practice, Second Edition

George S. Tselikis, Nikolaos D. Tselikas
June 13, 2017

This easy-to-use, classroom-tested textbook covers the C programming language for computer science and IT students. Designed for a compulsory fundamental course, it presents the theory and principles of C. More than 500 exercises and examples of progressive difficulty aid students in understanding...

Introduction to Middleware: Web Services, Object Components, and Cloud Computing

Letha Hughes Etzkorn
June 05, 2017

"A stereotype of computer science textbooks is that they are dry, boring, and sometimes even intimidating. As a result, they turn students’ interests off from the subject matter instead of enticing them into it. This textbook is the opposite of such a stereotype. The author presents the subject...

Processing: An Introduction to Programming

Jeffrey L. Nyhoff, Larry R. Nyhoff
May 16, 2017

This book demonstrates how Processing is an excellent language for beginners to learn the fundamentals of computer programming. Originally designed to make it simpler for digital artists to learn to program, Processing is a wonderful first language for anyone to learn. Given its origins, Processing...

Cybersecurity: Geopolitics, Law, and Policy

Amos N. Guiora
March 07, 2017

This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement...

ARM Microprocessor Systems: Cortex-M Architecture, Programming, and Interfacing

Muhammad Tahir, Kashif Javed
February 06, 2017

This book presents the use of a microprocessor-based digital system in our daily life. Its bottom-up approach ensures that all the basic building blocks are covered before the development of a real-life system. The ultimate goal of the book is to equip students with all the fundamental building...

Conferences

Year: