Information Technology

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

A Practical Introduction to Enterprise Network and Security Management

Featured

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a sol...

Intrusion Detection and Prevention for Mobile Ecosystems

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 6, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

Parallel Programming for Modern High Performance Computing Systems

Pawel Czarnul
January 17, 2018

In view of the growing presence and popularity of multicore and manycore processors, accelerators, and coprocessors, as well as clusters using such computing devices, the development of efficient parallel applications has become a key challenge to be able to exploit the performance of such systems....

Internet of Things: Challenges, Advances, and Applications

Qusay F. Hassan, Atta ur Rehman Khan, Sajjad A. Madani
January 12, 2018

Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale. It surveys recent technological advances and novel solutions for challenges in the IoT environment. Moreover, it...

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology

Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria
January 04, 2018

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIELD...

Enterprise Information Security Management

Meng-Chow Kang
December 31, 2017

The purpose of this course is to address the growing challenges of managing information security risks in enterprise and government organizations, prompted by the complexity and risks of today’s changing technological landscape, as well as increasingly demanding business aspirations. These...

Big Data and Computational Intelligence in Networking

Yulei Wu, Fei Hu, Geyong Min, Albert Y. Zomaya
December 27, 2017

This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big data and its computational intelligence in supporting smart network operation, management, and optimization. In particular, the technical focus covers the comprehensive...

Creating a Greater Whole: A Project Manager’s Guide to Becoming a Leader

Susan G. Schwartz
December 27, 2017

Creating a Greater Whole unlocks the not-so-secret secrets of what aspiring managers need to become strong leaders. This information-rich, easy to understand guide offers readers an immediate clear path to honing their leadership skills using the rigor and discipline of project management...

Discrete Problems in Nature Inspired Algorithms

Anupam Prof. Shukla, Ritu Tiwari
December 26, 2017

This book includes introduction of several algorithms which are exclusively for graph based problems, namely combinatorial optimization problems, path formation problems, etc. Each chapter includes the introduction of the basic traditional nature inspired algorithm and discussion of the modified...

Software Engineering with UML

Bhuvan Unhelkar
December 21, 2017

This book presents the analysis, design, documentation, and quality of software solutions based on the OMG UML v2.5. Notably it covers 14 different modelling constructs including use case diagrams, activity diagrams, business-level class diagrams, corresponding interaction diagrams and state...

Handbook of Internet Computing

Borko Furht
December 18, 2017

Scientists in different geographical locations conduct real-time experiments in a virtual shared workspace. E-commerce provides an emerging market for businesses large and small. E-mail, Servers, and Enterprise Resources Planning have revolutionized businesses on every level. People from all over...

Information Security Management Handbook, Fourth Edition: Volume IV

Harold Tipton
December 14, 2017

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA,...

Mobile SmartLife via Sensing, Localization, and Cloud Ecosystems

Kaikai Liu, Xiaolin Li
December 13, 2017

Indoor location is one of the two most important contexts (time and location), becoming a key entry for mobile Internet. This book envisions potential indoor location applications, overviews the related state of the art technologies, and presents original patented techniques and open source...

Conferences

Year: