Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
In a world bursting with new information, ideas, opportunities, and technological advancements, it is time to rethink how continuous learning shapes our future.
Spanning the multi-disciplinary scope of information technology, the Encyclopedia of Information Systems and Technology draws together comprehensive coverage of the inter-related aspects of information systems and technology.
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to harden their security.
It is with immense pleasure that we extend a warm welcome to all of you to the recently concluded conference, international conference on Advances in Science, Technology and Management (ICOSTEM 2023) which took place from November 24 - 27, 2023, in the picturesque Maldives, Male.
Enterprise Information Systems (EIS) integrate and support business processes across functional boundaries in a supply chain environment, and have become increasingly popular over the last 15 years.
The main aim of the book is to familiarize readers with the concepts of convergence of different connected and smart domains that are assisted by Cloud Computing, core technologies behind Cloud Computing, driving factors towards Cloud Computing, and security challenges and proposed solutions in Cloud Computing.
Get the most out of ACDs (automatic call distributors) and other complex systems in order to boost customer satisfaction and increase sales Includes three ready to use RFPs (request for proposals) for buying an ACD, computer telephony system, or recording
Nonfunctional Requirements in Mobile Application Development is an empirical study that investigates how nonfunctional requirements--as compared with functional requirements--are treated by the software engineers during mobile application development.
Discover the unified, distributed storage system and improve the performance of applications Key FeaturesExplore the latest features of Ceph's Mimic releaseGet to grips with advanced disaster and recovery practices for your storageHarness the power of Reliable Autonomic Distributed Object Store (RADOS) to help you optimize storage systemsBook DescriptionCeph is an open source distributed storage system that is scalable to Exabyte deployments.
Successful Packaged Software Implementation guides IT departments through the selection and implementation of packaged software, pointing out potential pitfalls and how to avoid them.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
Project Managers leading massive IT projects--defined as projects rolling out deliverables across geographic boundaries with budgets ranging well into the millions--need a unique level of expertise and an arsenal of personal and professional skills to successfully accomplish their tasks.
While emerging technologies create massive opportunity, especially for investors and companies that seek more adaptable forms of economic growth than currently available, value is held inert by traditional approaches, patents, and other closed systems.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance.
The work presented in this book is based on empirical study undertaken as a case study to understand the challenges faced in massively open online course (MOOC) based learning and experimentation to understand the challenges for presenting theoretical and practical courses.
AI iQ for a Human-Focused Future: Strategy, Talent, and Culture offers a pioneering approach to integrating artificial intelligence (AI) and generative AI (GenAI) in business, emphasizing a business strategy first mindset over a technologycentric one.
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices, Second Edition takes an interdisciplinary approach to applying principles for efficient implementation of network devices, offering solutions to the problem of network implementation bottlenecks.
Accounting for the rapid and often confusing changes currently underway in the information systems of organizations, such as the rush to replace mainframes with networks and the decentralization of data storage and processing, provides insights on the duties and challenges of a data center manager.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
Any supply chain improvement project, even if well conceived, has a good chance of failing, unless the accompanying information technology enables the design.
"e;Vivek Kale has written a great book on performance management that focuses on decision-making; on continuous, incremental improvement; and on identifying common patterns in becoming a more intelligent organization.
From small start-ups to major corporations, companies of all sizes have embraced cloud computing for the scalability, reliability, and cost benefits it can provide.
Enhancing Enterprise Intelligence: Leveraging ERP, CRM, SCM, PLM, BPM, and BI takes a fresh look at the benefits of enterprise systems (ES), focusing on the fact that ES collectively contribute to enhancing the intelligence quotient of an enterprise.
Incomplete or missed requirements, omissions, ambiguous product features, lack of user involvement, unrealistic customer expectations, and the proverbial scope creep can result in cost overruns, missed deadlines, poor product quality, and can very well ruin a project.