The rapidly growing demand for online courses and supporting technology has resulted in a plethora of structural and functional changes and challenges for universities and colleges. These changes have
The growing complexity of today’s interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive bo
Helpful to those tasked with managing complex environments, Projects and Complexity introduces a new way of looking at projects and fostering the culture needed to achieve sustainable results. It brin
The formation of systematic protocols for managing the security of industrial control systems (ICS) has somewhat lagged behind those for IT in general, note Macaulay (security liaison officer, Bell Ca
Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage. Time Variant data enables data w
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cove
The rapid advancement of digital multimedia technologies has not only revolutionized the production and distribution of audiovisual content, but also created the need to efficiently analyze TV program
Safety-critical systems, by definition those systems whose failure can cause catastrophic results for people, the environment, and the economy, are becoming increasingly complex both in their function
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data wareh
The sixth edition of this handbook on information security in the digital age provides thirty-one articles addressing a variety of aspects of IT and software security focused on new and emerging threa
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics
As executives build and nurture their organization’s strategic agility in today’s turbulent, uncertain business environment, the ability to lead strategic change has become more critical than ever. Th
This book prepares readers to master an IT and managerial discipline quickly gaining momentum in organizations of all sizes – Business Process Management (BPM). It describes how BPM treats proce
Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrat
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legi
The growing complexity of projects and the uncertainty that reigns in today's global economy are rendering ineffective traditional project practices and processes. These outdated techniques are based
"1 Healthcare Systems Introduction Fr ank M. Groom , Ph.D. As the population ages, the economy struggles, and healthcare costs soar, the focus of the nation and the H ealthcare Industry is on determin
"Preface The world is a changed place. The collaborative web has caught our collective imagination and there is no turning back, particularly in the business world. Some have taken to calling this use
Examining the questions most commonly asked by students attending Certified Scrum Master (CSM) and Certified Scrum Product Owner (CSPO) classes, The ScrumMaster Study Guide provides an accessible intr
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical a