You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Organizational strategies in the public sector are constantly changing and growing. In order for organizations to remain successful and competitive, they must ensure that the stream of knowledge is managed effectively. Building a Competitive Public Sector with Knowledge Management Strategy explores different practices and theories of knowledge management, providing an efficient way of sustaining knowledge to improve organizational learning and enhance company performance. By intelligently analyzing current research, this publication is beneficial to managers, practitioners, and researchers interested in increasing their knowledge management strategies in the public sector.
"This book assists its readers in recommending formulation of ICT strategies for e-government implementation and maintenance from the perspective of acknowledging the importance of e-Governance for building institutions to achieve transparency and accountability, and eventually democratic governance"--Provided by publisher.
The design and study of materials is a pivotal component to new discoveries in the various fields of science and technology. By better understanding the components and structures of materials, researchers can increase its applications across different industries. Electronic Nose Technologies and Advances in Machine Olfaction is an academic scholarly resource that examines the emerging applications of odor-sensing devices as well as a better understanding of the designing process with the aid of neural networks and various other technologies. Featuring coverage on a broad range of topics including food spoilage detection, chemical sensing, and olfactometer, this book is a vital resource for engineers, academicians, researchers, students, and practitioners seeking current research on the advancements in applications of odor-sensing devices.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks’ shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.
Technology Diffusion and Adoption: Global Complexity, Global Innovation discusses the emerging topics of information technology and the IT based solutions in global and multi-cultural environments. This comprehensive collection addresses the aspects of innovation diffusion in the field of business computing technologies and is essential for researchers, practitioners, academicians and educators all over the world.
Addresses key issues and offers expert viewpoints into the field of network and data communications. Presents research articles that investigate the most significant issues in network and data communications.