With the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and jour
It is becoming increasingly important for telecom operators to be able to provide service delivery platforms (SDP) quickly and efficiently in order to improve the time-to-revenue of value-added servic
Threats to multinational corporations come in two forms: natural and man-made. This book illustrates the types of risks that confront corporations when working outside of North America. It provides ke
Creating a Greater Whole unlocks the not-so-secret secrets of what aspiring managers need to become strong leaders. This information-rich, easy to understand guide offers readers an immediate clear pa
"Vivek Kale's Creating Smart Enterprises goes smack-dab at the heart of harnessing technology for competing in today's chaotic digital era. Actually, for him, it's SMACT-dab: SMACT (Social media, Mobi
From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolut
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality expl
Systems engineering (SE) is experiencing a significant expansion that encompasses increasingly complex systems. However, a common body of knowledge on how to apply complex systems engineering (CSE) ha
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with informatio
Helps readers understand the use of application servers in E-business. This book presents a comprehensive overview of the relevant technologies including CORBA, Java, web servers, and legacy systems.
Reporting on cutting-edge research in production, distribution, and transportation, The Supply Chain in Manufacturing, Distribution, and Transportation: Modeling, Optimization, and Applications provid
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively
A promising new technology, wireless mesh networks are playing an increasingly important role in the future generations of wireless mobile networks. Characterized by dynamic self-organization, self-co
Two hot topics in recent years are data analytics and AI. Unfortunately, both communities have not done been communicating and collaborating with each other to build the necessary synergies. This book
A primer for learning SAS and analytics quickly, the book makes use of real-world data analysis steps. Filled with line-by-line code explanations, it is packed with fully functional and easily modifia
Two hot topics in recent years are data analytics and AI. Unfortunately, both communities have not done been communicating and collaborating with each other to build the necessary synergies. This book
This book is about how to test Web based applications so that customers know that they are very safe to access them, and that their information and data will not fall into the hands of a malicious thi
A primer for learning SAS and analytics quickly, the book makes use of real-world data analysis steps. Filled with line-by-line code explanations, it is packed with fully functional and easily modifia
As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to