You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be used to build such tunable approaches. The book shows how the proposed methodology can be applied in the domains of database outsourcing, identity management, and credential management.
Complexity is a gift that can be made available for the successful implementation of projects, and used to create a new order or to change an existing one. Based on scientific facts, the authors present a systematic approach, which integrates complexity and its multitude of facets and gives practical recommendations for dealing with complexity in projects. The methods paradigm in project management is currently undergoing a massive upheaval. Projects are complex entities that cannot be tackled using traditional methods, such as classical cause and effect approaches. Complexity, and the associated phenomenon of self-organization, is a natural, but hidden designer. It offers a great opportunity in its use as a key driver for the implementation of projects. This requires identification of the principles of complexity and then using these for project management. In this book, the latest findings from natural sciences and brain research are used and transferred within a practice-oriented framework. The authors describe the methods of complexity regulation in projects and how self-organization for the management of projects can be applied.
Who should read this Book? This book is written for anyone who is interested in agility or needs to be agile. It is for those who seek deeper knowledge about what keeps the agile world together. You can read it from the perspective of a top manager or decision maker who feels the urge to be more agile. But you can also take the book and just follow it from the perspective of a user. What do you get? - A systemic picture of agility - to enable you to analyse your system (your team, your department, your company or your business network) and identify fields of agile application and the specific need for agility. - The ingredients of an Agile Mindset - this allows you to transform your organization and develop an agile culture for your organization. - The theoretical foundation of agile principles - so that you can really understand and assess the value of all the expert ideas for you and your organization. You will get the necessary skills to tailor organization specific agile frameworks without losing essential ingredients. - Input for your own reflections - you will be capable of innovating agility and be ahead of the main stream.
This book constitutes the refereed proceedings of the 28th International Supercomputing Conference, ISC 2013, held in Leipzig, Germany, in June 2013. The 35 revised full papers presented together were carefully reviewed and selected from 89 submissions. The papers cover the following topics: scalable applications with 50K+ cores; performance improvements in algorithms; accelerators; performance analysis and optimization; library development; administration and management of supercomputers; energy efficiency; parallel I/O; grid and cloud.
To continue providing people with safe, comfortable, and affordable places to live, cities must incorporate techniques and technologies to bring them into the future. The integration of big data and interconnected technology, along with the increasing population, will lead to the necessary creation of smart cities. Big Data Analytics for Smart and Connected Cities is a pivotal reference source that provides vital research on the application of the integration of interconnected technologies and big data analytics into the creation of smart cities. While highlighting topics such as energy conservation, public transit planning, and performance measurement, this publication explores technology integration in urban environments as well as the methods of planning cities to implement these new technologies. This book is ideally designed for engineers, professionals, researchers, and technology developers seeking current research on technology implementation in urban settings.
Cloud computing has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern, and developing effective methods to protect sensitive information and data on the cloud is imperative. Cloud Security: Concepts, Methodologies, Tools, and Applications explores the difficulties and challenges of securing user data and information on cloud platforms. It also examines the current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting a range of topics such as cloud forensics, information privacy, and standardization and security in the cloud, this multi-volume book is ideally designed for IT specialists, web designers, computer engineers, software developers, academicians, researchers, and graduate-level students interested in cloud computing concepts and security.
This book contains a range of keynote papers and submitted papers presented at the 7th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, held in Nijmegen, The Netherlands, in June 2013. The 13 revised full papers and 6 keynote papers included in this volume were carefully selected from a total of 30 presentations and 11 keynote talks and were subject to a two-step review process. The keynote papers cover the dramatic global changes, including legislative developments that society is facing today. Privacy and identity management are explored in specific settings, such as the corporate context, civic society, and education and using particular technologies such as cloud computing. The regular papers examine the challenges to privacy, security and identity; ways of preserving privacy; identity and identity management and the particular challenges presented by social media.
In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference source for the latest research on innovative concepts on the management of security and privacy analytics within big data. Featuring extensive coverage on relevant areas such as kinetic knowledge, cognitive analytics, and parallel computing, this publication is an ideal resource for professionals, researchers, academicians, advanced-level students, and technology developers in the field of big data.
This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity management and online social networks. For that, we investigate which pieces of PII can how often be gathered, correlated, or even be inferred by third parties that are not intended to get access to the specific pieces of PII. Furthermore, we introduce technical measures and concepts to avoid unintended flows of PII.
Analysis of the body language of statues of men and women as an indicator of gender relations in Roman society.