Once again nature’s fury has taken a toll in pain, suffering, and lives lost. In recognition of the need for a rapid and appropriate response, CRC Press will donate $5 to the American Red Cross for ev
Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver
With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important imp
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals
As each generation of portable electronic devices and storage media becomes smaller, higher in capacity, and easier to transport, it's becoming increasingly difficult to protect the data on these dev
From software and testing tools to best practices and service providers. this book considers the entire cloud application environment. It details the platforms currently available. tools that facilit
This collection of fifteen essays on computer interface design showcases current research on subjects relating to the design of computer interfaces to elicit best or expected responses from human user
This cutting-edge reference represents a new phase in the talkRA project—an initiative dedicated to improving the discipline of revenue assurance (RA) for communication providers. From blog to podcast
In order to achieve long-term profitability and assure survival for their companies, managers must be informed, imaginative, and capable of adapting to shifting circumstances. Practical decisions rath
The rapidly growing demand for online courses and supporting technology has resulted in a plethora of structural and functional changes and challenges for universities and colleges. These changes have
The growing complexity of today’s interconnected systems has not only increased the need for improved information security, but also helped to move information from the IT backroom to the executive bo
Helpful to those tasked with managing complex environments, Projects and Complexity introduces a new way of looking at projects and fostering the culture needed to achieve sustainable results. It brin
The formation of systematic protocols for managing the security of industrial control systems (ICS) has somewhat lagged behind those for IT in general, note Macaulay (security liaison officer, Bell Ca
Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage. Time Variant data enables data w
Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cove
The rapid advancement of digital multimedia technologies has not only revolutionized the production and distribution of audiovisual content, but also created the need to efficiently analyze TV program
Safety-critical systems, by definition those systems whose failure can cause catastrophic results for people, the environment, and the economy, are becoming increasingly complex both in their function
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data wareh
The sixth edition of this handbook on information security in the digital age provides thirty-one articles addressing a variety of aspects of IT and software security focused on new and emerging threa
Reflecting recent advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics