Information Technology

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

A Practical Introduction to Enterprise Network and Security Management

Featured

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a sol...

Intrusion Detection and Prevention for Mobile Ecosystems

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 6, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

High Performance CMOS Range Imaging: Device Technology and Systems Considerations

Forthcoming

Andreas Süss
May 27, 2018

This work is dedicated to CMOS based imaging with the emphasis on the noise modeling, characterization and optimization in order to contribute to the design of high performance imagers in general and range imagers in particular. CMOS is known to be superior to CCD due to its flexibility in terms of...

Redefining Innovation: Embracing the 80-80 Rule to Ignite Growth in the Biopharmaceutical Industry

Ruchin Kansal, Jeff Huth
May 24, 2018

Most people marvel at the level of innovation demonstrated by the biopharmaceutical industry in bringing new products to the market – especially in the past 20 years. However, there is a crisis looming in the industry that should be a concern to all of us who take for granted the constant pace at...

Handbook of Image-based Security Techniques

Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
May 22, 2018

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking...

Artificial Intelligence: With an Introduction to Machine Learning, Second Edition

Richard E. Neapolitan, Xia Jiang
May 16, 2018

The first edition of this popular textbook, Contemporary Artificial Intelligence, provided an accessible and student friendly introduction to AI. This fully revised and expanded update, Artificial Intelligence: With an Introduction to Machine Learning, Second Edition, retains the same accessibility...

Big Data in the Arts and Humanities: Theory and Practice

Giovanni Schiuma, Daniela Carlucci
May 08, 2018

As digital technologies occupy a more central role in working and everyday human life, individual and social realities are increasingly constructed and communicated through digital objects, which are progressively replacing and representing physical objects. They are even shaping new forms of...

Wireless Network Security: Second Edition

Wolfgang Osterhage
May 08, 2018

Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been...

R for Programmers: Quantitative Investment Applications

Dan Zhang
May 07, 2018

After the fundamental volume and the advanced technique volume, this volume focuses on R applications in the quantitative investment area. Quantitative investment has been hot for some years, and there are more and more startups working on it, combined with many other internet communities and...

Handbook of SDP for Multimedia Session Negotiations: SIP and WebRTC IP Telephony

Radhika Ranjan Roy
May 07, 2018

This book on SDP is the first of this kind that attempts to put all SIP related RFCs together with their mandatory and optional texts in a chronological systematic way as if people can use a single “super-SDP RFC” with almost one-to-one integrity from beginning to end to see the big picture of SDP...

Retaining Expert Knowledge: What to Keep in an Age of Information Overload

Peggy Salvatore
May 01, 2018

This book covers two major topics central to capturing and transferring expertise in organizations: Methodology and best practices for interviewing subject matter experts (SMEs) to capture their knowledge Identifying the SMEs to interview The more critical problem is identifying the SMEs and the...

Low-Power Wireless Communication Circuits and Systems: 60GHz and Beyond

Kiat Seng Yeo, Kaixue Ma
April 26, 2018

The increasing demand for extremely high-data-rate communications has urged researchers to develop new communication systems. Currently, wireless transmission with more than one Giga-bits-per-second (Gbps) data rates is becoming essential due to increased connectivity between different portable and...

Artificial Intelligence and the Two Singularities

Calum Chace
April 26, 2018

The science of AI was born a little over 60 years ago, but for most of that time its achievements were modest. In 2012 it experienced a big bang, when a branch of statistics called Machine Learning (and a sub-branch called Deep Learning) was applied to it. Now machines have surpassed humans in...

Flexible Network Architectures Security: Principles and Issues

Bhawana Rudra
April 19, 2018

The future of Internet security doesn’t lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for...

Conferences

Year: