|
|
Books > Computing & IT
Even though terrorism poses an increasing threat to multinational
companies, corporate leaders can thwart attacks by learning to
navigate the complexities of foreign governments, social unrest,
and cultural dissonance. Multinational corporations are on the
front lines of terrorism and cyberattacks—two of the world's
biggest threats to global security. How can corporate leaders
mitigate their organizations' risks and develop an infrastructure
that detects and deters a security menace before it happens? This
timely reference lays out essential political context and
historical background to help executives identify contemporary
threats and understand the interconnections between threat dynamics
in an increasingly dangerous international environment. This
compelling work is organized into seven chapters. The beginning
chapters profile the specific risks for multinational companies and
detail which global—and regional—factors might propagate
violence targeted at American-based businesses. Next, two
historical case studies on terrorist assaults at Tigantourine and
Mombasa illustrate how counterterrorism can successfully thwart
potential attacks against business targets. The final part
describes industrial espionage and criminal activity and then
outlines a corporate counterterror blueprint to combat the prospect
of terrorism, providing specific recommendations for preventative
measures.
With the continued progression of technologies such as mobile
computing and the internet of things (IoT), cybersecurity has
swiftly risen to a prominent field of global interest. This has led
to cyberattacks and cybercrime becoming much more sophisticated to
a point where cybersecurity can no longer be the exclusive
responsibility of an organization's information technology (IT)
unit. Cyber warfare is becoming a national issue and causing
various governments to reevaluate the current defense strategies
they have in place. Cyber Security Auditing, Assurance, and
Awareness Through CSAM and CATRAM provides emerging research
exploring the practical aspects of reassessing current
cybersecurity measures within organizations and international
governments and improving upon them using audit and awareness
training models, specifically the Cybersecurity Audit Model (CSAM)
and the Cybersecurity Awareness Training Model (CATRAM). The book
presents multi-case studies on the development and validation of
these models and frameworks and analyzes their implementation and
ability to sustain and audit national cybersecurity strategies.
Featuring coverage on a broad range of topics such as forensic
analysis, digital evidence, and incident management, this book is
ideally designed for researchers, developers, policymakers,
government officials, strategists, security professionals,
educators, security analysts, auditors, and students seeking
current research on developing training models within cybersecurity
management and awareness.
The implementation of wireless sensor networks has wide-ranging
applications for monitoring various physical and environmental
settings. However, certain limitations with these technologies must
be addressed in order to effectively utilize them. The Handbook of
Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures is a pivotal reference source for the
latest research on recent innovations and developments in the field
of wireless sensors. Examining the advantages and challenges
presented by the application of these networks in various areas,
this book is ideally designed for academics, researchers, students,
and IT developers.
Emerging Trends in Applications and Infrastructures for
Computational Biology, Bioinformatics, and Systems Biology: Systems
and Applications covers the latest trends in the field with special
emphasis on their applications. The first part covers the major
areas of computational biology, development and application of
data-analytical and theoretical methods, mathematical modeling, and
computational simulation techniques for the study of biological and
behavioral systems. The second part covers bioinformatics, an
interdisciplinary field concerned with methods for storing,
retrieving, organizing, and analyzing biological data. The book
also explores the software tools used to generate useful biological
knowledge. The third part, on systems biology, explores how to
obtain, integrate, and analyze complex datasets from multiple
experimental sources using interdisciplinary tools and techniques,
with the final section focusing on big data and the collection of
datasets so large and complex that it becomes difficult to process
using conventional database management systems or traditional data
processing applications.
Demand for integral and sustainable solutions is on the rise. As
new ways of defining reality emerge, this generates the progression
of more humanistic and sustainable construction of operating
systems. Designing for Human-Machine Symbiosis using the URANOS
Model: Emerging Research and Opportunities is a pivotal reference
source for the latest research on human-centered system modeling
and methods to provide a generic system model to describe complex
non-linear systems. Featuring extensive coverage across a range of
relevant topics, such as pervasive computing systems, smart
environments, and smart industrial machines, this book is ideally
designed for researchers, engineers, and professionals seeking
current research on the integration of human beings and their
natural, informational, and socio-cultural environments into system
design.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
Data is powerful. It separates leaders from laggards and it drives
business disruption, transformation, and reinvention. Today's most
progressive companies are using the power of data to propel their
industries into new areas of innovation, specialization, and
optimization. The horsepower of new tools and technologies have
provided more opportunities than ever to harness, integrate, and
interact with massive amounts of disparate data for business
insights and value - something that will only continue in the era
of the Internet of Things. And, as a new breed of tech-savvy and
digitally native knowledge workers rise to the ranks of data
scientist and visual analyst, the needs and demands of the people
working with data are changing, too. The world of data is changing
fast. And, it's becoming more visual. Visual insights are becoming
increasingly dominant in information management, and with the
reinvigorated role of data visualization, this imperative is a
driving force to creating a visual culture of data discovery. The
traditional standards of data visualizations are making way for
richer, more robust and more advanced visualizations and new ways
of seeing and interacting with data. However, while data
visualization is a critical tool to exploring and understanding
bigger and more diverse and dynamic data, by understanding and
embracing our human hardwiring for visual communication and
storytelling and properly incorporating key design principles and
evolving best practices, we take the next step forward to transform
data visualizations from tools into unique visual information
assets.
The development of new and effective analytical and numerical
models is essential to understanding the performance of a variety
of structures. As computational methods continue to advance, so too
do their applications in structural performance modeling and
analysis. Modeling and Simulation Techniques in Structural
Engineering presents emerging research on computational techniques
and applications within the field of structural engineering. This
timely publication features practical applications as well as new
research insights and is ideally designed for use by engineers, IT
professionals, researchers, and graduate-level students.
The highly dynamic world of information technology service
management stresses the benefits of the quick and correct
implementation of IT services. A disciplined approach relies on a
separate set of assumptions and principles as an agile approach,
both of which have complicated implementation processes as well as
copious benefits. Combining these two approaches to enhance the
effectiveness of each, while difficult, can yield exceptional
dividends. Balancing Agile and Disciplined Engineering and
Management Approaches for IT Services and Software Products is an
essential publication that focuses on clarifying theoretical
foundations of balanced design methods with conceptual frameworks
and empirical cases. Highlighting a broad range of topics including
business trends, IT service, and software development, this book is
ideally designed for software engineers, software developers,
programmers, information technology professionals, researchers,
academicians, and students.
Topics in Parallel and Distributed Computing provides resources and
guidance for those learning PDC as well as those teaching students
new to the discipline. The pervasiveness of computing devices
containing multicore CPUs and GPUs, including home and office PCs,
laptops, and mobile devices, is making even common users dependent
on parallel processing. Certainly, it is no longer sufficient for
even basic programmers to acquire only the traditional sequential
programming skills. The preceding trends point to the need for
imparting a broad-based skill set in PDC technology. However, the
rapid changes in computing hardware platforms and devices,
languages, supporting programming environments, and research
advances, poses a challenge both for newcomers and seasoned
computer scientists. This edited collection has been developed over
the past several years in conjunction with the IEEE technical
committee on parallel processing (TCPP), which held several
workshops and discussions on learning parallel computing and
integrating parallel concepts into courses throughout computer
science curricula.
The WWW era made billions of people dramatically dependent on the
progress of data technologies, out of which Internet search and Big
Data are arguably the most notable. Structured Search paradigm
connects them via a fundamental concept of key-objects evolving out
of keywords as the units of search. The key-object data model and
KeySQL revamp the data independence principle making it applicable
for Big Data and complement NoSQL with full-blown structured
querying functionality. The ultimate goal is extracting Big
Information from the Big Data. As a Big Data Consultant, Mikhail
Gilula combines academic background with 20 years of industry
experience in the database and data warehousing technologies
working as a Sr. Data Architect for Teradata, Alcatel-Lucent, and
PayPal, among others. He has authored three books, including The
Set Model for Database and Information Systems and holds four US
Patents in Structured Search and Data Integration.
Mathematics has been used as a tool in logistical reasoning for
centuries. Examining how specific mathematic structures can aid in
data and knowledge management helps determine how to efficiently
and effectively process more information in these fields. N-ary
Relations for Logical Analysis of Data and Knowledge is a critical
scholarly reference source that provides a detailed study of the
mathematical techniques currently involved in the progression of
information technology fields. Featuring relevant topics that
include algebraic sets, deductive analysis, defeasible reasoning,
and probabilistic modeling, this publication is ideal for
academicians, students, and researchers who are interested in
staying apprised of the latest research in the information
technology field.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,321
R1,228
Discovery Miles 12 280
|