Information Technology

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

A Practical Introduction to Enterprise Network and Security Management

Featured

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a sol...

Intrusion Detection and Prevention for Mobile Ecosystems

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 7, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

Big Data and Computational Intelligence in Networking

Yulei Wu, Fei Hu, Geyong Min, Albert Y. Zomaya
December 15, 2017

This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big data and its computational intelligence in supporting smart network operation, management, and optimization. In particular, the technical focus covers the comprehensive...

Empirical Research for Software Security: Foundations and Experience

Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
December 04, 2017

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that...

Realizing Strategy through Projects: The Executive's Guide

Carl Marnewick
December 04, 2017

Executives should not necessarily know the intricacies of project management, but they should know how project management, as a discipline, can benefit the organization in implementing its strategies and realizing its vision. The only way that executives can effectively apply project management to...

Big Data Analytics with Applications in Insider Threat Detection

Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
December 01, 2017

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to...

Project Management beyond Waterfall and Agile

Mounir Ajam
December 01, 2017

This book goes beyond the paint by numbers approach, transcending the "how" of project management to the "what" and "why," which is critical for leaders of change. — Dr. Joel B. Carboni, President and Founder, GPM Global and President, IPMA-USA Project Management beyond Waterfall and Agile...

The CIO’s Guide to Risk

Jessica Keyes
November 16, 2017

In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present. The key to project success is to identify risk and subsequently deal with it. The CIO’s Guide to Risk addresses the many...

SMACing the Bank: How to Use Social Media, Mobility, Analytics and Cloud Technologies to Transform the Business Processes of Banks and the Banking Experience

Balaji Raghunathan, Rajashekara Maiya
November 13, 2017

The formula for the Future of Work is called SMAC - social, mobile, analytics and cloud on one integrated stack where each function enables another to maximize its effect. This is the new enterprise IT model delivering an organization that is more connective, collaborative, real time and productive...

Practical Guide for Oracle SQL, T-SQL and MySQL

Preston Zhang
November 09, 2017

SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach...

Underlying Standards that Support Population Health Improvement

Laura Bright, Johanna Goderre
November 03, 2017

This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health. These are critical stories that...

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Ken Sigler, Dan Shoemaker, Anne Kohnke
November 03, 2017

The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161. It covers how to create a verifiable audit-based control structure to ensure comprehensive security for acquired products. It explains how to establish systematic control over the supply...

Anti-Spam Techniques Based on Artificial Immune System

Ying Tan
November 01, 2017

Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial...

Conferences

Year: