The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
The editors of the HIMSS Books' best-seller Health: From Smartphones to Smart Systems have returned to deliver an expansive survey of the initiatives, innovators, and technologies driving the patient-centered mobile healthcare revolution.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.
This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit.
This book explains how AI and Machine Learning can be applied to help businesses solve problems, support critical thinking and ultimately create customer value and increase profit.
The 21st century has witnessed massive changes around the world in intelligence systems in order to become smarter, energy efficient, reliable, and cheaper.
The 21st century has witnessed massive changes around the world in intelligence systems in order to become smarter, energy efficient, reliable, and cheaper.
A Sensible Guide to Program Management Professional (PgMP)(R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard).
A Sensible Guide to Program Management Professional (PgMP)(R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard).
This book contains a collection of scientific chapters addressing the emerging trends in IT and telecommunications, as well as the issues that accompany them in business.
This book contains a collection of scientific chapters addressing the emerging trends in IT and telecommunications, as well as the issues that accompany them in business.
This updated and reorganized Fifth edition of Software Testing: A Craftsman's Approach continues to be a valuable reference for software testers, developers, and engineers, by applying the strong mathematics content of previous editions to a coherent treatment of software testing.
This updated and reorganized Fifth edition of Software Testing: A Craftsman's Approach continues to be a valuable reference for software testers, developers, and engineers, by applying the strong mathematics content of previous editions to a coherent treatment of software testing.
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits.
Operational Auditing: Principles and Techniques for a Changing World, 2nd edition, explains the proven approaches and essential procedures to perform risk-based operational audits.
Since A Guide to IT Contracting: Checklists, Tools, and Techniques first published, several alarming trends have developed in the technology contracting industry.
Since A Guide to IT Contracting: Checklists, Tools, and Techniques first published, several alarming trends have developed in the technology contracting industry.
Nonfunctional Requirements in Mobile Application Development is an empirical study that investigates how nonfunctional requirements--as compared with functional requirements--are treated by the software engineers during mobile application development.
Nonfunctional Requirements in Mobile Application Development is an empirical study that investigates how nonfunctional requirements--as compared with functional requirements--are treated by the software engineers during mobile application development.