While global sourcing has expanded dramatically in terms of activities, consistent challenges remain for organizations that choose such a business decision. These challenges include maximizing the opp
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand
Expectations for performance management systems continue to grow in the public sector. Yet few administrators know how to effectively implement and sustain these systems. Performance-Based Management
Delivering successful projects means the ability to produce high quality software within budget and on time—consistently, but when one mentions quality to software engineers or project managers,
Focusing on an important and complicated topic in wireless network design, Wireless Quality of Service: Techniques, Standards, and Applications systematically addresses the quality-of-service (QoS) is
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due
Over the last decade, software product line engineering (SPLE) has emerged as one of the most promising software development paradigms for increasing productivity in IT-related industries. Detailing t
Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Ma
This resource compiles fundamental knowledge, skills, techniques, and tools needed by all information security professionals, in the eight domains of risk management, access control, cryptography, phy
A detailed review of underwater channel characteristics, Underwater Acoustic Sensor Networks investigates the fundamental aspects of underwater communication. Prominent researchers from around the wor
In 2004, the Government Accountability Office provided a report detailing approximately 200 government-based data-mining projects. While there is comfort in knowing that there are many effective syste
Most people do not truly understand a concept until they can visualize it. This applies to all fields, including Project Management. The best way to effectively manage projects is to help your team vi
Explores the Nexus Formed When Malevolent Actors Access Malignant MeansWritten for professionals, academics, and policymakers working at the forefront of counterterrorism efforts, Jihadists and Weapon
The growing power being exercised by today’s consumer is causing significant paradigm shifts away from traditional marketing. This is leading to a whole new take on the structure and functioning
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean
Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies sp
Over the past two decades, business volume of hardware and software in the U.S has decreased by about seventy percent, while the cost of management and support has grown from $20 billion to $140 billi
In a business world of uncertain budgets, relentless technology changes, scarce management talent, and intense production demands, theory is good, but practice sells. The Effective CIO: How to Achieve
In today’s increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success
While history has identified a need for improved coordination during emergencies, it has also demonstrated that community volunteers positively impact their neighborhoods during times of crisis. Layin