You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization. Add to that the spending restraints of a down economy, and IT managers find themselves in need of a thoughtful, rea
Bureaucracy is an age-old form of government that has survived since ancient times; it has provided order and persisted with durability, dependability, and stability. The popularity of the first edition of this book, entitled Handbook of Bureaucracy, is testimony to the endurance of bureaucratic institutions. Reflecting the accelerated globalizatio
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
More than 12 years have passed since the publication of the first edition of Crisis and Emergency Management. During that time numerous disasters—from 9/11 to massive earthquakes in Iran and China, to the giant Asian Tsunami, Hurricane Katrina, and the Fukushima Tsunami and ensuing nuclear meltdown—have changed the way we manage catastrophic events. With contributions from leading experts, this second edition features 40 new chapters that address recent worldwide crises and what we have learned from emergency responses to them. See What’s New in the Second Edition: Up-to-date concepts, theories, and practices Analysis of recent disasters and their effect on emergency management Policy ...
Human resources represents one of the largest shares of government budgets at every level. The management of people who carry out the government's work is therefore a critical issue to politicians and government managers and leaders, as well as citizens. Regardless of which administration is in office or which reforms are being touted as necessary, personnel are always at the heart of government and governing. Personnel Management in Government: Politics and Process highlights the rapid developments in public personnel administration and management. As one of the bestselling texts in the field, this sixth edition reflects the major changes that have occurred recently in government personnel ...
The traditional view of information security includes the three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field continues to grow in complexity, novices and professionals need a reliable reference that clearly outlines the essentials. Security without Obscurit
Based on decades of evidence-based research and technical assistance, Public Administration and Disability: Community Services Administration in the US brings together the diverse, expert perspectives and discusses the leading efforts of the past three decades in the field of disability and community services. The book highlights the development of
The rapid advancement of digital multimedia technologies has not only revolutionized the production and distribution of audiovisual content, but also created the need to efficiently analyze TV programs to enable applications for content managers and consumers. Leaving no stone unturned, TV Content Analysis: Techniques and Applications provides a de
This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applications. Describing how to employ game theory in infrastructure-based wireless networks and multihop networks to reduce power consumption, it facilitates quick and easy reference to related optimization and algorithm methodologies. The book explains how to apply the game theoretic model to address resource allocation, congestion control, attacks, routing, energy management, packet forwarding, and MAC.