COVID-19 accelerated healthcare's transition towards digital technology since it helped expand the capacity of healthcare organizations (HCOs) through extended patient access and isolation.
Exploring many aspects of blockchain technologies and providing an overview of the latest cuttingedge developments along with their diversified business applications, this volume addresses the challenges, emerging issues, and problems in classical centralized architecture and covers how blockchain platforms provide almost magical solutions and novel services for improving business processes.
Exploring many aspects of blockchain technologies and providing an overview of the latest cuttingedge developments along with their diversified business applications, this volume addresses the challenges, emerging issues, and problems in classical centralized architecture and covers how blockchain platforms provide almost magical solutions and novel services for improving business processes.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance.
This guide explains how to gain a handle on the vital aspects of data protection, offering a solid understanding of how data protection fits into various organizations.
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules.
When implemented correctly, release management can help ensure that quality is integrated throughout the development, implementation, and delivery of services, applications, and infrastructure.
Written by one of the nation's most highly regarded project management mentors, The Complete Project Management Methodology and Toolkit provides a combined project and business management solution that any can be readily applied in any industry by both novice and certified project managers.
The third book in the Healthcare Payment Systems series, Prospective Payment Systems examines the various types of prospective payment systems (PPS) used by healthcare providers and third-party payers.
It is with immense pleasure that we extend a warm welcome to all of you to the recently concluded conference, international conference on Advances in Science, Technology and Management (ICOSTEM 2023) which took place from November 24 - 27, 2023, in the picturesque Maldives, Male.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
The global shift toward delivering services online requires organizations to evolve from using traditional paper files and storage to more modern electronic methods.
The book provides a comprehensive examination of the integration of IoT technology into various industries and its impact on daily life, with a focus on the most recent advancements in the field.
This book provides insights into how to approach and utilise data science tools, technologies, and methodologies related to artificial intelligence (AI) in industrial contexts.
This book provides insights into how to approach and utilise data science tools, technologies, and methodologies related to artificial intelligence (AI) in industrial contexts.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream.
The Age of Decentralization talks about various decentralization technologies including Web3, decentralized identity, and decentralized storage, and how they can be incorporated in traditional tech architectures to improve technical and business performance.
This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies.
This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies.