Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage. Time Variant data enables data w
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cove
The rapid advancement of digital multimedia technologies has not only revolutionized the production and distribution of audiovisual content, but also created the need to efficiently analyze TV program
Safety-critical systems, by definition those systems whose failure can cause catastrophic results for people, the environment, and the economy, are becoming increasingly complex both in their function
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data wareh
The sixth edition of this handbook on information security in the digital age provides thirty-one articles addressing a variety of aspects of IT and software security focused on new and emerging threa
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics
As executives build and nurture their organization’s strategic agility in today’s turbulent, uncertain business environment, the ability to lead strategic change has become more critical than ever. Th
This book prepares readers to master an IT and managerial discipline quickly gaining momentum in organizations of all sizes – Business Process Management (BPM). It describes how BPM treats proce
Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrat
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legi
The growing complexity of projects and the uncertainty that reigns in today's global economy are rendering ineffective traditional project practices and processes. These outdated techniques are based
"1 Healthcare Systems Introduction Fr ank M. Groom , Ph.D. As the population ages, the economy struggles, and healthcare costs soar, the focus of the nation and the H ealthcare Industry is on determin
"Preface The world is a changed place. The collaborative web has caught our collective imagination and there is no turning back, particularly in the business world. Some have taken to calling this use
Examining the questions most commonly asked by students attending Certified Scrum Master (CSM) and Certified Scrum Product Owner (CSPO) classes, The ScrumMaster Study Guide provides an accessible intr
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical a
Originally developed to provide a single resource for an introductory course in software projects management at major Indian universities, this textbook provides a comprehensive overview of major prin
This collection of twenty articles on software testing examines methodologies for implementing effective testing regimes at the least cost with the most efficiency. Topics discussed include cost estim
Machine learning forensics can be used to recognize patterns of criminal activity, detect network intrusions, and discover evidence. Mena, an artificial intelligence specialist, compiles deductive and
Intended for information technology professionals, system architects, and executives in charge of information systems, this volume discusses the rationale behind implementing cloud computing and virtu