This book identifies and discusses the main challenges facing digital business innovation and the emerging trends and practices that will define its future.
This book constitutes the refereed proceedings of the 16th International Conference on Product-Focused Software Process Improvement, PROFES 2015, held in Bolzano, Italy, in December 2015.
This book constitutes the refereed proceedingsof the 14th International Conference on Cryptology and Network Security, CANS2015, held in Marrakesh, Morocco, in December 2015.
This book constitutes the refereed proceedings of the five workshops that were organized in conjunction with the International Conference on Business Information Systems, BIS 2015, which took place in Poznan, Poland, in June 2015.
This book constitutes the thoroughly refereed conferenceproceedings of the Third International Workshop on Risk Assessment andRisk-driven Testing, RISK 2015, held in conjunction with the OMG TechnicalMeeting in Berlin, Germany, in June 2015.
This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015.
This book constitutes the refereed proceedings of the Second International Conference on Future Data and Security Engineering, FDSE 2015, held in Ho Chi Minh City, Vietnam, in November 2015.
This book presents the full scope of Design Thinking in theory and practice, bringing together prominent opinion leaders and experienced practitioners who share their insights, approaches and lessons learned.
This book constitutes the thoroughly refereed post-workshop proceedings of the 23rd International Workshop on Security Protocols, held in Cambridge, UK, in March/April 2015.
This book constitutes the refereed proceedings of the 9th International Conference on Provable Security, ProvSec 2015, held in Kanazawa, Japan, in November 2015.
This book explores how agile development practices, in particular pair programming, code review and automated testing, help software development teams to perform better.
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field.
This book constitutes the thoroughly refereed proceedings of the 16th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2015, held Catania, Italy, in October 2015.
This book constitutes the refereed proceedings of the 4th D-A-CH Conference on Energy Informatics, D-A-CH EI 2015, held in Karlsruhe, Germany, in November 2015.
This book constitutes the refereed proceedings of sevenworkshops and a symposium, held at the 34th International Conference onConceptual Modeling, ER 2015, in Stockholm, Sweden.
Theinformation infrastructure---comprising computers, embedded devices, networksand software systems---is vital to day-to-day operations in every sector:information and telecommunications, banking and finance, energy, chemicals andhazardous materials, agriculture, food, water, public health, emergencyservices, transportation, postal and shipping, government and defense.
This book presents a collection of original research papers focused on the relationship between information technology and accounting and control models.
This book offers a collection of selected papers presented at the Seventh International Conference on ICT Innovations held in October 2015, in Ohrid, Macedonia, with main topic Emerging Technologies for Better Living.
This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015.
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015.
This book constitutes the thoroughly refereed proceedings of the9th International Joint Conference on Software Technologies, ICSOFT 2014, heldin Vienna, Austria, in August 2014.
This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015.
This book constitutes the thoroughly refereed proceedings of the 4th International Conference on Cloud Computing and Services Science, CLOSER 2014, held in Barcelona, Spain, in April 2014.
This book assesses the state of international manufacturing strategy and clarifies how recent developments, for example regarding configuration, technology, and the environment, are impacting on its content and direction and on its relationship to manufacturing performance.
This book presents new concepts as well as practical applications and experiences in the field of information technology for environmental engineering.
This book starts with an introduction to process modeling and process paradigms, then explains how to query and analyze process models, and how to analyze the process execution data.
Thisfundamental guide on programmatic advertising explains in detail how automated, data-driven advertisingreally works in practice and how the right adoption leads to a competitive advantage foradvertisers, agencies and media.
This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015.
This book constitutes the refereed proceedings of the 11th International Workshop on Enterprise and Organizational Modeling and Simulation, EOMAS 2015, held at CAiSE 2015, in June 2015 in Stockholm, Sweden.
This book constitutes the refereed proceedings of the SIGSAND/PLAIS EuroSymposium 2015 titled Information Systems: Development, Applications, Education, held in Gdansk, Poland, in September 25.
This book constitutes the refereed proceedings of the Third IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-EurAsia 2015, with the collocation of AsiaARES 2015 as a special track on Availability, Reliability and Security, and the 9th IFIP WG 8.
This book constitutes the refereed proceedings of two joint events: the 25th International Workshop on Software Measurement (IWSM) and the 10th International Conference on Software Process and Product Measurement (Mensura), referred to as IWSM-Mensura 2015 and held in Krakow, Poland, in October 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.
This book constitutes the refereed proceedings of the 5thInternational Conference on Security, Privacy, and Applied CryptographyEngineering, SPACE 2015, held in Jaipur, India, in October 2015.
Infotext: This book constitutes the refereed proceedings of the 4th European Conference on Service-Oriented and Cloud computing, ESOCC 2015, held in Taormina, Sicily, Italy, in September 2015.
This book opens the "e;black box"e; of software sourcing by explaining how dynamic software alignment is established and how it impacts business performance outcomes.