Information Technology

Per Page:
Sort:

How to Win at CRM: Strategy, Implementation, Management

Featured

Seth Kinnett
July 13, 2017

This book provides clarity and guidance on effective strategy, implementation and management of CRM. It explores both the conceptual and cultural context of CRM initiatives along with the particulars of CRM system implementation and management. In order to provide this clarity, it surveyed the exist...

A Practical Introduction to Enterprise Network and Security Management

Featured

Bongsik Shin
July 12, 2017

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a sol...

Intrusion Detection and Prevention for Mobile Ecosystems

Featured

Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos
September 6, 2017

This book presents state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It covers fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection a...

Understanding the New European Data Protection Rules

Featured

Paul Lambert
September 21, 2017

Compared to the US, European data and privacy protection rules seem Draconian. The European rules apply to any enterprise doing business in the EU. The new rules are far more stringent than the last set. This book is a quick guide to the directives for companies, particularly US, that have to comply...

Handbook of e-Business Security

João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
July 19, 2018

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and...

Project Management Theory and Practice, Third Edition

Gary L. Richardson, Brad M. Jackson
July 19, 2018

Project Management: Theory and Practice, Third Edition gives students a broad and real flavor of project management. Bringing project management to life, it avoids being too sterilely academic and too narrowly focused on a particular industry view. It takes a model-based approach towards project...

Artificial Intelligence Safety and Security

Roman V. Yampolskiy
July 19, 2018

The history of robotics and artificial intelligence in many ways is also the history of humanity’s attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make...

Project Business Management

Oliver F. Lehmann
July 17, 2018

Roughly half of all project managers have to lead customer projects as profit centers on contractor side with two big objectives: making the customer happy and bringing money home. Customer projects are a high-risk business on both sides, customers and contractors, but the dynamics of this business...

Security without Obscurity: A Guide to Cryptographic Architectures

Jeff Stapleton
July 17, 2018

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are...

The Science of Biometrics: Security Technology for Identity Verification

Ravindra Das
July 10, 2018

The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins...

PgMP® Practice Test Questions: 1000+ Practice Exam Questions for the PgMP® Examination

Ginger Levin, PMP, PgMP
July 09, 2018

Up to date with the fourth edition of PMI’s Program Management Standard, PgMP®  Practice Test Questions: 1000+ Practice Exam Questions for the PgMP®  Examination contains more than 1,000 practice questions to help readers hone their knowledge and test their skills. It covers all...

Mastering Modern Linux

Paul S. Wang
June 22, 2018

Praise for the First Edition: "This outstanding book … gives the reader robust concepts and implementable knowledge of this environment. Graphical user interface (GUI)-based users and developers do not get short shrift, despite the command-line interface’s (CLI) full-power treatment. … Every...

Computational Intelligence Assisted Design: In Industrial Revolution 4.0

Yi Chen, Yun Li
June 20, 2018

Computational Intelligence Assisted Design framework mobilises computational resources, makes use of multiple Computational Intelligence (CI) algorithms and reduces computational costs. This book provides examples of real-world applications of technology. Case studies have been used to show the...

Project Management Lessons Learned: A Continuous Process Improvement Framework

Mel Bost
June 18, 2018

"Readers can benefit from the expertise of Mel Bost as both a project manager and a PMO practitioner. Kudos to him for bringing us this valuable perspective on lessons learned." —Mark Price Perry, Founder, BOT International and author of Business Driven Project Portfolio Management "Every project...

Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard

Heru Susanto, Mohammad Nabil Almunawar
June 18, 2018

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness...

Valuing Data: An Open Framework

Dewey E. Ray
June 18, 2018

The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises. Storing this increased volume of information has not been a problem to date, but as these information stores grow larger and larger, multiple...

Conferences

Year: