In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT.
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow.
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers.
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries.
The Core Network for 5G Advanced, Second Edition covers up to the 3GPP release 17 & 18 which includes the core network for 5G Advanced as well as a large number of new features added by 3GPP to expand the initial 5G Core specifications in rel-15/16.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state.
The Core Network for 5G Advanced, Second Edition covers up to the 3GPP release 17 & 18 which includes the core network for 5G Advanced as well as a large number of new features added by 3GPP to expand the initial 5G Core specifications in rel-15/16.
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions.
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions.
If your business uses warehouses to deal with the sales of goods, then you know that facility operations, shipping, and customer service are important to your company's health.
Many of the challenges of the next century will have physical dimensions, such as tsunamis, hurricanes, and climate change as well as human dimensions such as economic crises, epidemics, and emergency responses.
This proceedings set contains selected Computer, Information and Education Technology related papers from the 2015 International Conference on Computer, Intelligent Computing and Education Technology (CICET 2015), to be held April 11-12, 2015 in Guilin, P.
Information Technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise.
The 2015 International Congress on Economics, Social Sciences and Information Management (ICESSIM 2015), held 28-29 March 2015 in Bali, Indonesia, aimed to provide a platform for the sharing of valuable knowledge and experience in the context of changing economics and social settings.
While there are sporadic journal articles on socio-technical networks, there's long been a need for an integrated resource that addresses concrete socio-technical network (STN) design issues from algorithmic and engineering perspectives.
Performance Analysis of Queuing and Computer Networks develops simple models and analytical methods from first principles to evaluate performance metrics of various configurations of computer systems and networks.
This book is a collection of best-selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2024), held at Jalpaiguri Government Engineering College (JGEC), Jalpaiguri, West Bengal, India, during March 6-8, 2024.
Consisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols.
The Project Management Office (PMO) is a rapidly emerging concept in project management that has evolved in terms of its application, sophistication, and proven results.
High Speed Packet Access (HSPA) is a collection of two mobile telephony protocols, High Speed Downlink Packet Access (HSDPA) and High Speed Uplink Packet Access (HSUPA).
This book is a collection of selected high-quality research papers presented at the International Conference on Paradigms of Communication, Computing and Data Analytics (PCCDA 2024), held at Pt.
Get the know-how you need to safeguard your data against cyber attacks Cybercriminals are constantly updating their strategies and techniques in search of new ways to breach data security shouldn't you learn how to keep yourself and your loved ones safe?
Adéntrese en el mundo de la ciberseguridad y del análisis forense en entornos digitalesLa ciberseguridad es un campo en crecimiento constante y con una relevancia que trasciende fronteras, especialmente en una era digital en la que los delitos informáticos se vuelven cada vez más sofisticados y frecuentes.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents.
Project leaders, managers, and team members, as well as cost engineers, analysts, and students in project management and planning, can glean ideas and methods for managing multiple projects from this reference.
This book is a collection of selected high-quality research papers presented at the International Conference on Paradigms of Communication, Computing and Data Analytics (PCCDA 2024), held at Pt.
This proceedings volume brings together selected peer-reviewed papers presented at the 2015 International Conference on Architectural, Energy and Information Engineering (AEIE 2015), held July 15-16, 2015 in Hong Kong, China.
This book is a collection of selected high-quality research papers presented at the International Conference on Paradigms of Communication, Computing and Data Analytics (PCCDA 2024), held at Pt.
In this essential, Martin Pils unfolds a clear vision for effective security awareness programs aimed at strengthening the human element in cyber defense.