While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation.
The foundation of a successful information systems strategic plan is the recognition that business direction and requirements must drive the IS strategy and computing architecture. A Practical Guide t
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community b
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, com
The convergence of knowledge, technology, and human performance which comprises today's enterprise allows creative business process design. Thus, an organization can create new and innovative ways to
Organizations enjoy two kinds of strategic advantages. One is transitory: being in the right place with the right products at the right time. The other comes from having first class management and ins
For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlook
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data p
Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the soci
As Vehicular Networks technology enters a critical phase in its evolution, academic institutions, industry, and governments worldwide are investing significant resources into large-scale deployment of
The architects of today’s large and complex systems all too often struggle with the lack of a consistent set of principles and practices that adequately address the entire breadth of systems arc
In this era when data and voice services are available at a push of a button, service providers have virtually limitless options for reaching their customers with value-added services. The changes in
The Green and Virtual Data Center sets aside the political aspects of what is or is not considered green to instead focus on the opportunities for organizations that want to sustain environmentally-fr
The constant advances in diagnostic imaging have had an impact on the practice, attitudes, and moral values of all who participate in health care. Now in its fourth edition, the original Medicolegal I
Constructive Suggestions for Efficiently Implementing Technology Transfer Theory of Science and Technology Transfer and Applications presents the mechanisms, features, effects, and modes of technology
Without standardized construction elements such as nuts, bolts, bearings, beams, resistors and the like, the design of physical equipment is hopelessly inefficient, and engineers are continually bogge
Supported by the expert-level advice of pioneering researchers, Orthogonal Frequency Division Multiple Access Fundamentals and Applications provides a comprehensive and accessible introduction to the
With millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. Combining the best of investigati
Recent improvements in LED technology have made them as ubiquitous as cell phones. In fact, LEDs light up almost all cell phones screens. The technology’s myriad applications and low energy use have m