Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics
As executives build and nurture their organization’s strategic agility in today’s turbulent, uncertain business environment, the ability to lead strategic change has become more critical than ever. Th
This book prepares readers to master an IT and managerial discipline quickly gaining momentum in organizations of all sizes – Business Process Management (BPM). It describes how BPM treats proce
Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrat
The new fifth edition of Information Technology Control and Audit has been significantly revised to include a comprehensive overview of the IT environment, including revolutionizing technologies, legi
The growing complexity of projects and the uncertainty that reigns in today's global economy are rendering ineffective traditional project practices and processes. These outdated techniques are based
"1 Healthcare Systems Introduction Fr ank M. Groom , Ph.D. As the population ages, the economy struggles, and healthcare costs soar, the focus of the nation and the H ealthcare Industry is on determin
"Preface The world is a changed place. The collaborative web has caught our collective imagination and there is no turning back, particularly in the business world. Some have taken to calling this use
Examining the questions most commonly asked by students attending Certified Scrum Master (CSM) and Certified Scrum Product Owner (CSPO) classes, The ScrumMaster Study Guide provides an accessible intr
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical a
Originally developed to provide a single resource for an introductory course in software projects management at major Indian universities, this textbook provides a comprehensive overview of major prin
This collection of twenty articles on software testing examines methodologies for implementing effective testing regimes at the least cost with the most efficiency. Topics discussed include cost estim
Machine learning forensics can be used to recognize patterns of criminal activity, detect network intrusions, and discover evidence. Mena, an artificial intelligence specialist, compiles deductive and
Intended for information technology professionals, system architects, and executives in charge of information systems, this volume discusses the rationale behind implementing cloud computing and virtu
Calling ethics in project management a "positive negative," i.e., an issue that gets little to no attention until negative consequences arise from lack of ethical behavior, Kliem (City U. of Seattle)
Liebowitz (management and technology, U. of Maryland U. College) identifies 10 areas where senior executives and managers can gain a competitive advantage and add value to their organization: knowledg
This book provides insight as to why and how current security management practices fail at their basic foundation, resulting in overall dissatisfaction by practitioners and lack of success in the corp
This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organi
Whether you use budget, schedule, quality, or other criteria, the statistics by think tanks, institutes, associations, and other trade organizations all point to one inescapable conclusion: your proje
IT systems around the world are in the midst of an evolution that is impacting business and technology. The increasing adoption of Business Process Management (BPM) has inspired pioneering software ar