|
Books > Computing & IT > General theory of computing
How well does your organization manage the risks associated with
information quality? Managing information risk is becoming a top
priority on the organizational agenda. The increasing
sophistication of IT capabilities along with the constantly
changing dynamics of global competition are forcing businesses to
make use of their information more effectively. Information is
becoming a core resource and asset for all organizations; however,
it also brings many potential risks to an organization, from
strategic, operational, financial, compliance, and environmental to
societal. If you continue to struggle to understand and measure how
information and its quality affects your business, this book is for
you. This reference is in direct response to the new challenges
that all managers have to face. Our process helps your organization
to understand the "pain points" regarding poor data and information
quality so you can concentrate on problems that have a high impact
on core business objectives. This book provides you with all the
fundamental concepts, guidelines and tools to ensure core business
information is identified, protected and used effectively, and
written in a language that is clear and easy to understand for
non-technical managers.
Shows how to manage information risk using a holistic approach by
examining information from all sourcesOffers varied perspectives of
an author team that brings together academics, practitioners and
researchers (both technical and managerial) to provide a
comprehensive guideProvides real-life case studies with practical
insight into the management of information risk and offers a basis
for broader discussion among managers and practitioners
As governments worldwide are entering the digital age, there are
increasing expectations from citizens and stakeholders for a more
responsive, efficient, and open government. Innovations in
information technology and web technologies can facilitate these
changes. Innovative Perspectives on Public Administration in the
Digital Age is a critical scholarly resource that examines the
prevalence of e-government and the advancements of information
systems to facilitate a government that is more open and accessible
to citizens and businesses. Highlighting coverage on a broad range
of topics such as online civic engagement, e-petition, and privacy
and security, this publication is geared toward academicians,
practitioners, and government officials seeking current and
relevant research on the use of online and technological systems
for the advancement of government and public policy.
The only official, comprehensive reference guide to the CISSP
Thoroughly updated for 2021 and beyond, this is the authoritative
common body of knowledge (CBK) from (ISC)2 for information security
professionals charged with designing, engineering, implementing,
and managing the overall information security program to protect
organizations from increasingly sophisticated attacks. Vendor
neutral and backed by (ISC)2, the CISSP credential meets the
stringent requirements of ISO/IEC Standard 17024. This CBK covers
the current eight domains of CISSP with the necessary depth to
apply them to the daily practice of information security. Revised
and updated by a team of subject matter experts, this comprehensive
reference covers all of the more than 300 CISSP objectives and
sub-objectives in a structured format with: Common and good
practices for each objective Common vocabulary and definitions
References to widely accepted computing standards Highlights of
successful approaches through case studies Whether you've earned
your CISSP credential or are looking for a valuable resource to
help advance your security career, this comprehensive guide offers
everything you need to apply the knowledge of the most recognized
body of influence in information security.
To date, a plethora of companies and organizations are investing
vast amounts of money on the latest technologies. Information
technology can be used to improve market share, profits, sales,
competitive advantage, and customer/employee satisfaction.
Unfortunately, the individuals meant to use these technologies are
not well equipped on how to effectively and efficiently use these
tools for competitive advantage and decision making. The Handbook
of Research on IT Applications for Strategic Competitive Advantage
and Decision Making is a collection of innovative research relevant
to the methodologies, theoretical frameworks, and latest empirical
research findings in information technology applications, strategic
competitive advantage, and decision making. While highlighting
topics including agility, knowledge management, and business
intelligence, this book is ideally designed for information
technology professionals, academics, researchers, managers,
executives, and government officials interested in using
information technology for strategic competitive advantage and
better decision making.
This revised textbook motivates and illustrates the techniques of
applied probability by applications in electrical engineering and
computer science (EECS). The author presents information processing
and communication systems that use algorithms based on
probabilistic models and techniques, including web searches,
digital links, speech recognition, GPS, route planning,
recommendation systems, classification, and estimation. He then
explains how these applications work and, along the way, provides
the readers with the understanding of the key concepts and methods
of applied probability. Python labs enable the readers to
experiment and consolidate their understanding. The book includes
homework, solutions, and Jupyter notebooks. This edition includes
new topics such as Boosting, Multi-armed bandits, statistical
tests, social networks, queuing networks, and neural networks. For
ancillaries related to this book, including examples of Python
demos and also Python labs used in Berkeley, please email Mary
James at [email protected]. This is an open access book.
Basic Computer Technology for seniors and beginners in a clear and
comprehensive format easy to understand.
This book describes concepts and tools needed for water resources
management, including methods for modeling, simulation,
optimization, big data analysis, data mining, remote sensing,
geographical information system, game theory, conflict resolution,
System dynamics, agent-based models, multiobjective, multicriteria,
and multiattribute decision making and risk and uncertainty
analysis, for better and sustainable management of water resources
and consumption, thus mitigating the present and future global
water shortage crisis. It presents the applications of these tools
through case studies which demonstrate its benefits of proper
management of water resources systems. This book acts as a
reference for students, professors, industrial practitioners, and
stakeholders in the field of water resources and hydrology.
This book provides application of multi criteria decision making
techniques for managerial discretion. With this book, a concerted
platform has been provided for several peers and other management
organizations to understand and implement these tools and deal with
the practical problems in a better way so as to provide more robust
managerial decision making.
"Windows 2012 Server Network Security "provides the most
in-depth guide to deploying and maintaining a secure Windows
network. The book drills down into all the new features of Windows
2012 and provides practical, hands-on methods for securing your
Windows systems networks, including: Secure remote access Network
vulnerabilities and mitigations DHCP installations configuration
MAC filtering DNS server security WINS installation configuration
Securing wired and wireless connections Windows personal firewall
Remote desktop services Internet connection sharing Network
diagnostics and troubleshooting
Windows network security is of primary importance due to the
sheer volume of data residing on Windows networks. "Windows 2012
Server Network Security "provides network administrators with the
most focused and in-depth coverage of Windows network security
threats along with methods and techniques for securing important
mission-critical networks and assets. The book also covers Windows
8.
Provides practical examples of how to secure your Windows network.
Focuses specifically on Windows network security rather than
general concepts. One of the first books to cover WindowsServer
2012network security. "
For the past decade or more, much of cell biology research has been
focused on determining the key molecules involved in different
cellular processes, an analytical problem that has been amenable to
biochemical and genetic approaches. Now, we face an integrative
problem of understanding how all of these molecules work together
to produce living cells, a challenge that requires using
quantitative approaches to model the complex interactions within a
cell, and testing those models with careful quantitative
measurements. This book is an introductory overview of the various
approaches, methods, techniques, and models employed in
quantitative cell biology, which are reviewed in greater detail in
the other volumes in this e-book series. Particular emphasis is
placed on the goals and purpose of quantitative analysis and
modeling, and the special challenges that cell biology holds for
understanding life at the physical level.
Because efficient compilation of information allows managers and
business leaders to make the best decisions for the financial
solvency of their organizations, data analysis is an important part
of modern business administration. Understanding the use of
analytics, reporting, and data mining in everyday business
environments is imperative to the success of modern businesses.
Utilizing Big Data Paradigms for Business Intelligence is a pivotal
reference source that provides vital research on how to address the
challenges of data extraction in business intelligence using the
five "Vs" of big data: velocity, volume, value, variety, and
veracity. This book is ideally designed for business analysts,
investors, corporate managers, entrepreneurs, and researchers in
the fields of computer science, data science, and business
intelligence.
The internet of things (IoT) enhances customer experience,
increases the amount of data gained through connected devices, and
widens the scope of analytics. This provides a range of exciting
marketing possibilities such as selling existing products and
services more effectively, delivering truly personalized customer
experiences, and potentially creating new products and services.
Smart Marketing With the Internet of Things is an essential
reference source that discusses the use of the internet of things
in marketing, as well as its importance in enhancing the customer
experience. Featuring research on topics such as augmented reality,
sensor networks, and wearable technology, this book is ideally
designed for business professionals, marketing managers, marketing
strategists, academicians, researchers, and graduate-level students
seeking coverage on the use of IoT in enhancing customer marketing
outcomes.
This book discusses machine learning and artificial intelligence
(AI) for agricultural economics. It is written with a view towards
bringing the benefits of advanced analytics and prognostics
capabilities to small scale farmers worldwide. This volume provides
data science and software engineering teams with the skills and
tools to fully utilize economic models to develop the software
capabilities necessary for creating lifesaving applications. The
book introduces essential agricultural economic concepts from the
perspective of full-scale software development with the emphasis on
creating niche blue ocean products. Chapters detail several
agricultural economic and AI reference architectures with a focus
on data integration, algorithm development, regression, prognostics
model development and mathematical optimization. Upgrading
traditional AI software development paradigms to function in
dynamic agricultural and economic markets, this volume will be of
great use to researchers and students in agricultural economics,
data science, engineering, and machine learning as well as
engineers and industry professionals in the public and private
sectors.
"Analysis of Turbulent Flows" is written by one of the most
prolific authors in the field of CFD. Professor of Aerodynamics at
SUPAERO and Director of DMAE at ONERA, Professor Tuncer Cebeci
calls on both his academic and industrial experience when
presenting this work. Each chapter has been specifically
constructed to provide a comprehensive overview of turbulent flow
and its measurement. "Analysis of Turbulent Flows" serves as an
advanced textbook for PhD candidates working in the field of CFD
and is essential reading for researchers, practitioners in industry
and MSc and MEng students.
The field of CFD is strongly represented by the following
corporate organizations: Boeing, Airbus, Thales, United
Technologies and General Electric. Government bodies and academic
institutions also have a strong interest in this exciting
field.
An overview of the development and application of computational
fluid dynamics (CFD), with real applications to industryContains a
unique section on short-cut methods - simple approaches to
practical engineering problems
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,406
R1,302
Discovery Miles 13 020
|