Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-B
Contributors from around the world investigate dimensions of WiMAX network performance, providing information for a professional, technical, and academic audience interested in network planning and op
When used together effectively, computer-aided design (CAD) and geospatial information systems (GIS) have a solid track record for streamlining decision making and reducing inefficiencies in the desig
Process Improvement and CMMIR for Systems and Software provides a workable approach for achieving cost-effective process improvements for systems and software. Focusing on planning, implementation, an
Effective communication on projects is a challenging, ongoing process for project managers and stakeholders at all levels within an organization. Project managers experience the greatest challenge du
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and pr
Cooperative devices and mechanisms are increasingly important to enhance the performance of wireless communications and networks, with their ability to decrease power consumption and packet loss rate
In order to maximize IT resources and justify IT expenditures, CIO’s and other IT managers must be able to identify meaningful metrics and explain them in a way that management can understand. The Bus
Fueled by ongoing and increasing consumer demand, the explosive growth in spectrum-based communications continues to tax the finite resources of the available spectrum. One possible solution, Cognitiv
This book compares enterprise architecture (EA), which can be an all-encompassing model of an organization’s technical (IT) architecture, systems, contents (databases), interfaces, applications, and n
Detailing powerful methods for reducing the energy costs associated with operating a data center, Making Your Data Center Energy Efficient examines both equipment and building facilities. It reviews t
In IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challe
Intended for mid- to high-level information technology professionals, this volume on business best practices provides a comprehensive overview of management techniques required to design and implement
Intended as a reference for IT consultants and data analysts, this guide to data mining serves as a practical handbook for designing and implementing systematic programs for data culling and the produ
This interesting work on the state of modern IT security examines the de-professionalization of the of the industry in the past decade, and explores the reasons why conventional security processes, ba
From basic concepts to research grade material and future directions, the Near Field Communications Handbook provides comprehensive technical coverage of this rapidly emerging field. Walking readers t
"With the development of society and the great increase of knowledge and information, more and more decision-making problems involve a number of decision makers (DMs). The subjective preference of DMs
Supplying a high-level overview of how to protect your company’s physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of yo
This book addresses the integration of all the new tools and technologies presented in today’s plethora of artificial intelligence tools and technologies to boost and enhance business intelligence. It