An up-to-date guide to the economic issues in telecommunications, delivering a comprehensive overview from mathematical models to practical applications.
An up-to-date guide to the economic issues in telecommunications, delivering a comprehensive overview from mathematical models to practical applications.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach.
Healthcare Solutions Using Machine Learning and Informatics covers novel and innovative solutions for healthcare that apply machine learning and biomedical informatics technology.
Healthcare Solutions Using Machine Learning and Informatics covers novel and innovative solutions for healthcare that apply machine learning and biomedical informatics technology.
The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses.
The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses.
Whether it's because of a lack of understanding, poor planning, or a myriad of other things, 50 to 60 percent of the IT effort in most companies can be considered waste.
As the population ages and healthcare costs continue to soar, the focus of the nation and the healthcare industry turns to reducing costs and making the delivery process more efficient.
If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets.
In order to achieve long-term profitability and assure survival for their companies, managers must be informed, imaginative, and capable of adapting to shifting circumstances.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective.
Interdisciplinary approaches using Machine Learning and Deep Learning techniques are smartly addressing real life challenges and have emerged as an inseparable element of disruption in current times.
Interdisciplinary approaches using Machine Learning and Deep Learning techniques are smartly addressing real life challenges and have emerged as an inseparable element of disruption in current times.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes.
Process Improvement and CMMI for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software.
Providing structured yet adaptable models of project success within an organization, A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum.