Security is a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, sto
The only book on the market to offer complete coverage of the topic, Software Configuration Management explores the full spectrum of configuration management techniques. It delineates a common approa
Business success hinges on successfully creating products with the right features. You must correctly analyze the needs of the customer and match these needs with your resources to not only produce a
The modern field of software metrics emerged from the computer modeling and "statistical thinking" services of the 1980s. As the field evolved, metrics programs were integrated with project managemen
Novel in its approach to software design, development, and management, Building Software: A Practitioner's Guide shows you how to successfully build and manage a system. The approach the authors recom
While it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation.
The foundation of a successful information systems strategic plan is the recognition that business direction and requirements must drive the IS strategy and computing architecture. A Practical Guide t
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data across applications, enterprises, and community b
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, com
The convergence of knowledge, technology, and human performance which comprises today's enterprise allows creative business process design. Thus, an organization can create new and innovative ways to
Organizations enjoy two kinds of strategic advantages. One is transitory: being in the right place with the right products at the right time. The other comes from having first class management and ins
For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats
Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlook
The EU's General Data Protection Regulation created the position of corporate Data Protection Officer (DPO), who is empowered to ensure the organization is compliant with all aspects of the new data p
Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the soci
As Vehicular Networks technology enters a critical phase in its evolution, academic institutions, industry, and governments worldwide are investing significant resources into large-scale deployment of
The architects of today’s large and complex systems all too often struggle with the lack of a consistent set of principles and practices that adequately address the entire breadth of systems arc
In this era when data and voice services are available at a push of a button, service providers have virtually limitless options for reaching their customers with value-added services. The changes in
The Green and Virtual Data Center sets aside the political aspects of what is or is not considered green to instead focus on the opportunities for organizations that want to sustain environmentally-fr
The constant advances in diagnostic imaging have had an impact on the practice, attitudes, and moral values of all who participate in health care. Now in its fourth edition, the original Medicolegal I