Surveying the major programming languages that have hallmarked the evolution of computing, Programming Language Fundamentals by Example provides an understanding of the many languages and notations us
This practical guide is a one-stop reference for IT professionals who must successfully master the realities of today's global sourcing environment. The author examines the reasons that an organizatio
After reviewing the failed attempts of carriers to retool for the future, this book describes the technologies and capabilities supporting next generation services, focusing particularly on multimedia
Knowledge management (KM) is the identification and analysis of available and required knowledge, and the subsequent planning and control of actions, to develop "knowledge assets" that enable business
Focusing on the future network architecture and its main principles, Converging NGN Wireline and Mobile 3G Networks with IMS provides a comprehensive view of the methods, functions, network elements,
The physical design flow of any project depends upon the size of the design, the technology, the number of designers, the clock frequency, and the time to do the design. As technology advances and des
As Internet traffic continues to grow exponentially, there is a great need to build Internet protocol (IP) routers with high-speed and high-capacity packet networking capabilities. The first book to e
Having an accurate assessment of company expenditures is a key to staying in business. Activity-based management (ABM) is the only system that offers the tools to correctly assess the outflow involved
Lean thinking is too often narrowly focused on physical processes, causing serious shortcomings, which limit Lean’s substantial benefits. Revised to consider the emerging global economy, Lean Pe
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book
Written by a team of industry experts, The DSL Handbook gives readers insight into the world of DSL that is unmatched by any existing publication. The authors provide broad coverage and present a wi
With a focus on strategy and implementation, James Chang discusses business management practices and the technology that enables them. He analyzes the history of process management practices and demon
In response to the exponentially increasing need to analyze vast amounts of data, Neural Networks for Applied Sciences and Engineering: From Fundamentals to Complex Pattern Recognition provides scient
This book illustrates how the blockchain is being sustained through a host of platforms, programming languages, and enabling tools. It details how blockchain is being blended with cloud computin
Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition integrates theory and pract
Driven by the need and desire to reduce costs, organizations are faced with a set of decisions that require analytical scrutiny. Enterprise Architecture A to Z: Frameworks, Business Process Modeling,
The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of sec
The global shift toward delivering services online requires organizations to evolve from using traditional paper files and storage to more modern electronic methods. There has however been very little
The field of public administration currently lacks sufficient resources for understanding the rationale, implications, and inherent practices of reforming government administration around the world.Th
The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process