Information Technology

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

A Practical Introduction to Enterprise Network and Security Management

Featured

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a sol...

Data Science and Analytics with Python

Jesus Rogel-Salazar
August 11, 2017

Data Science and Analytics with Python is designed for practitioners in data science and data analytics in both academic and business environments. The aim is to present the reader with the main concepts used in data science using tools developed in Python, such as SciKit-learn, Pandas, Numpy, and...

Data Analytics Applications in Latin America and Emerging Economies

Eduardo Rodriguez
August 01, 2017

This book focuses on understanding the analytics knowledge management process and its comprehensive application to various socioeconomic sectors. Using cases from Latin America and other emerging economies, it examines analytics knowledge applications where a solution has been achieved. Written for...

Multilevel Modeling of Secure Systems in QoP-ML

Bogdan Księżopolski
August 01, 2017

In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and...

iOS App Penetration Testing and Security

Swaroop Yermalkar
July 31, 2017

...

iOS Reverse Engineering

Yinglu Zou
July 31, 2017

The purpose of this course is to provide iOS developers with a practical way to "think different", and open another door so they can see the whole picture. This course offers a free comprehensive book and serves as a digest and guide of it. The course consists of 4 parts, i.e. concepts, tools,...

The Virtual Mind: Designing the Logic to Approximate Human Thinking

Niklas Hageback
July 28, 2017

The Virtual Mind: Designing the Logic to Approximate Human Thinking, through an in-depth and multidisciplinary review, outlines and defines the underpinnings for modelling human thinking through approximating the mind. Whilst there are plenty of efforts underway trying to mimic the brain, its...

Experiment and Evaluation in Information Retrieval Models

K. Latha
July 27, 2017

Experiment and Evaluation in Information Retrieval Models explores different algorithms for the application of evolutionary computation to the field of information retrieval (IR). As well as examining existing approaches to resolving some of the problems in this field, results obtained by...

Fundamentals of Multicore Software Development

Victor Pankratius, Ali-Reza Adl-Tabatabai, Walter Tichy
July 19, 2017

With multicore processors now in every computer, server, and embedded device, the need for cost-effective, reliable parallel software has never been greater. By explaining key aspects of multicore programming, Fundamentals of Multicore Software Development helps software engineers understand...

Device-to-Device based Proximity Service: Architecture, Issues, and Applications

Yufeng Wang, Athanasios V. Vasilakos, Qun Jin, Hongbo Zhu
July 14, 2017

D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic,...

A History of Cyber Security Attacks: 1980 to Present

Bruce Middleton
July 14, 2017

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how...

Software Methodologies: A Quantitative Guide

Capers Jones
July 14, 2017

This comprehensive reference uses a formal and standard evaluation technique to show the strengths and weakness of more than 60 software development methodologies such as agile, DevOps, RUP, Waterfall, TSP, XP and many more. Each methodology is applied to an application of 1000 function points...

Conferences

Year: