This resource compiles fundamental knowledge, skills, techniques, and tools needed by all information security professionals, in the eight domains of risk management, access control, cryptography, phy
A detailed review of underwater channel characteristics, Underwater Acoustic Sensor Networks investigates the fundamental aspects of underwater communication. Prominent researchers from around the wor
In 2004, the Government Accountability Office provided a report detailing approximately 200 government-based data-mining projects. While there is comfort in knowing that there are many effective syste
Most people do not truly understand a concept until they can visualize it. This applies to all fields, including Project Management. The best way to effectively manage projects is to help your team vi
The growing power being exercised by today’s consumer is causing significant paradigm shifts away from traditional marketing. This is leading to a whole new take on the structure and functioning
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean
Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies sp
Over the past two decades, business volume of hardware and software in the U.S has decreased by about seventy percent, while the cost of management and support has grown from $20 billion to $140 billi
In a business world of uncertain budgets, relentless technology changes, scarce management talent, and intense production demands, theory is good, but practice sells. The Effective CIO: How to Achieve
In today’s increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success
While history has identified a need for improved coordination during emergencies, it has also demonstrated that community volunteers positively impact their neighborhoods during times of crisis. Layin
Designed to conform to the ISO/IEC standard 14143, the Common Software Measurement International Consortium (COSMIC) Function Point method has become the major estimation technique based on internatio
Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver
With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important imp
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals
As each generation of portable electronic devices and storage media becomes smaller, higher in capacity, and easier to transport, it's becoming increasingly difficult to protect the data on these dev
From software and testing tools to best practices and service providers. this book considers the entire cloud application environment. It details the platforms currently available. tools that facilit
This cutting-edge reference represents a new phase in the talkRA project—an initiative dedicated to improving the discipline of revenue assurance (RA) for communication providers. From blog to podcast
In order to achieve long-term profitability and assure survival for their companies, managers must be informed, imaginative, and capable of adapting to shifting circumstances. Practical decisions rath
The rapidly growing demand for online courses and supporting technology has resulted in a plethora of structural and functional changes and challenges for universities and colleges. These changes have