This collection of twenty articles on software testing examines methodologies for implementing effective testing regimes at the least cost with the most efficiency. Topics discussed include cost estim
Machine learning forensics can be used to recognize patterns of criminal activity, detect network intrusions, and discover evidence. Mena, an artificial intelligence specialist, compiles deductive and
Intended for information technology professionals, system architects, and executives in charge of information systems, this volume discusses the rationale behind implementing cloud computing and virtu
Calling ethics in project management a "positive negative," i.e., an issue that gets little to no attention until negative consequences arise from lack of ethical behavior, Kliem (City U. of Seattle)
Liebowitz (management and technology, U. of Maryland U. College) identifies 10 areas where senior executives and managers can gain a competitive advantage and add value to their organization: knowledg
This book provides insight as to why and how current security management practices fail at their basic foundation, resulting in overall dissatisfaction by practitioners and lack of success in the corp
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organi
Whether you use budget, schedule, quality, or other criteria, the statistics by think tanks, institutes, associations, and other trade organizations all point to one inescapable conclusion: your proje
IT systems around the world are in the midst of an evolution that is impacting business and technology. The increasing adoption of Business Process Management (BPM) has inspired pioneering software ar
Although many software books highlight open problems in secure software development, few provide easily actionable, ground-level solutions. Breaking the mold, Secure and Resilient Software Development
We overspend on data center storage … yet, we fall short of business requirements. It's not about the technologies. It's about the proper application of technologies to deliver storage services effici
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean
Data mining can help pinpoint hidden information in medical data and accurately differentiate pathological from normal data. It can help to extract hidden features from patient groups and disease stat
With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and jour
It is becoming increasingly important for telecom operators to be able to provide service delivery platforms (SDP) quickly and efficiently in order to improve the time-to-revenue of value-added servic
Threats to multinational corporations come in two forms: natural and man-made. This book illustrates the types of risks that confront corporations when working outside of North America. It provides ke
Creating a Greater Whole unlocks the not-so-secret secrets of what aspiring managers need to become strong leaders. This information-rich, easy to understand guide offers readers an immediate clear pa
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobi
From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolut
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality expl