You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book presents in-depth insight through a case study approach into the current state of research in ICT as well as identified successful approaches, tools and methodologies in ICT research"--Provided by publisher.
One of the main aspects of an organization is the efficiency of managerial concerns, daily interactions and the design and implementation of its business system. Therefore, integrating the latest technology is vital in assisting in the performance and productivity improvement of an organization. Cases on Performance Measurement and Productivity Improvement: Technology Integration and Maturity highlights the successes and failures which have shaped the modern business as well as the technological solutions taken to improve the organizational system. Providing essential research on these applied innovations, this collection of case studies appeals to both academics and practitioners in the business and IT management fields.
Technological innovation and evolution continues to improve personal and professional lifestyles, as well as general organizational and business practices; however, these advancements also create potential issues in the security and privacy of the user’s information. Innovative Solutions for Access Control Management features a comprehensive discussion on the trending topics and emergent research in IT security and governance. Highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management, this publication is a pivotal reference source for researchers, practitioners, students, database vendors, and organizations within the information technology and computer science fields.
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
Information technology is everywhere. As we continue to expand our use of ICT in all aspects of our lives, the use of information communication technology has been developed in support of engaging citizens in the government decision making process. Cases on Progressions and Challenges in ICT Utilization for Citizen-Centric Governance is a collection of case studies on the advancements and challenges of information technology in the involvements of citizens with the government. With contributions from authors around the world, this compilation is relevant to researchers, academics, and practitioners who wish to stay informed of the new world of technology in the government.
As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.
Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.
The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance.
Directory of foreign diplomatic officers in Washington.
Medical imaging has transformed the ways in which various conditions, injuries, and diseases are identified, monitored, and treated. As various types of digital visual representations continue to advance and improve, new opportunities for their use in medical practice will likewise evolve. Medical Imaging: Concepts, Methodologies, Tools, and Applications presents a compendium of research on digital imaging technologies in a variety of healthcare settings. This multi-volume work contains practical examples of implementation, emerging trends, case studies, and technological innovations essential for using imaging technologies for making medical decisions. This comprehensive publication is an essential resource for medical practitioners, digital imaging technologists, researchers, and medical students.