Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become
Project management methodologies, practices, and guidelines are the only explicit information that project managers have and, when properly maintained, should reflect the most current knowledge and gu
The growth of machines and users of the Internet has led to the proliferation of all sorts of data concerning individuals, institutions, companies, governments, universities, and all kinds of known ob
The book presents a holistic approach to organization performance improvements by lessons learned management. Such an approach is required because specific methods, such as debriefing, task management
This book blends concepts and their application in a comprehensive and clear presentation of how mastering of visionary leadership, strategic Innovation, managed resilience, and organizational agility
This book explores the problem of the loss of corporate expertise. It explains how to meet the challenge of capturing hard-to-replicate knowledge, skills and attitudes from legacy employees and packag
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise?s effort to build an effective security program. Foll
Portfolio management consists mainly of making decisions about which initiatives to undertake, which initiatives not to pursue, and which resources are to be allocated to which portfolio component. At
There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the im
Organizations enjoy two kinds of strategic advantages. One is transitory: being in the right place with the right products at the right time. The other comes from having first class management and ins
The development of smart cities is one of the most important challenges over the next few decades. Governments and companies are leveraging billions of dollars in public and private funds for smart ci
This book presents a standard methodology approach to cyber-resilience. Readers will learn how to design a cyber-resilient architecture for a given organization as well as how to maintain a state of c
The book is about a very active research field in software engineering. In modern society, the fact of the world's high reliance on software requires the system's robustness, i.e., continual availabil
In an age of globalization, widely distributed systems, and rapidly advancing technological change, IT professionals and their managers must understand that risk is ever present. The key to project su
The authors have put together a fascinating narrative of the creation process of one of the most successful example of frugal engineering in recent years. They bring out insightful details of what man
Software design patterns are known to play a vital role in enhancing the quality of software systems while reducing development time and cost. However, the use of these design patterns has also been k
In order to make informed decisions, there are three important elements: intuition, trust, and analytics. Intuition is based on experiential learning and recent research has shown that those who rely
Public Sector organizations represent an important aspect of the economy of most countries, ranging from 30-40% of GDP. The application of Big Data and Analytics (BDA) techniques can greatly enhance t
The formula for the Future of Work is called SMAC - social, mobile, analytics and cloud on one integrated stack where each function enables another to maximize its effect. This is the new enterprise I