0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (116)
  • R250 - R500 (366)
  • R500+ (2,346)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Digital Communities in a Networked Society - e-Commerce, e-Business and e-Government (Paperback, Softcover reprint of the... Digital Communities in a Networked Society - e-Commerce, e-Business and e-Government (Paperback, Softcover reprint of the original 1st ed. 2004)
Manuel J. Mendes, Reima Suomi, Carlos Passos
R2,702 Discovery Miles 27 020 Ships in 18 - 22 working days

Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government deals with the accelerating evolution in the computerization of society. This evolution, or should we call it a revolution, is dominantly driven by the Internet, and documented by the novelties introduced, year by year, by Information and Communication Technologies. The book contains recent results of research and development in the areas of: -E-government, -Business models of e-applications, -Innovative structures in the internet, -Auctions and e-payment, -Future aspects of communication, -Internet and the web, -Advanced platforms and grid computing, -Cooperation and integration, -Modeling and construction of e-services.

Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings... Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings (Paperback, 2014 ed.)
Sjouke Mauw, Christian Damsgaard Jensen
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Paperback, Softcover reprint of the original 1st ed. 2002)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R3,991 Discovery Miles 39 910 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP),focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government,...Themoreour societyrelies on electronicforms ofcommunication,themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines,organisationsandcountries,todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering,mobileagentsecurity,e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies,one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion,and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea drivingforce for futureconferencestocome.

Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The... Radio Frequency Identification: Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jaap-Henk Hoepman, Ingrid Verbauwhede
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-worksop proceedings of the 8th International Workshop Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012, held in Nijmegen, The Netherlands, in July 2012. The 12 revised full papers presented were carefully reviewed and selected from 29 submissions for inclusion in the book. The papers focus on approaches to solve security and data protection issues in advanced contactless technologies.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the original 1st ed. 2002)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,637 Discovery Miles 26 370 Ships in 18 - 22 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings... Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R1,899 Discovery Miles 18 990 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.

Context-Aware Systems and Applications - Second International Conference, ICCASA 2013, Phu Quoc Island, Vietnam, November... Context-Aware Systems and Applications - Second International Conference, ICCASA 2013, Phu Quoc Island, Vietnam, November 25-26, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Phan Cong-Vinh, Vangalur Alagar, Emil Vassev, Ashish Khare
R2,417 Discovery Miles 24 170 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Context-Aware Systems and Applications, ICCASA 2013, held in Phu Quoc Island, Vietnam in November 2013. The 36 revised full papers presented were carefully selected and reviewed from over 100 submissions and cover a wide spectrum of issues in the area of context-aware systems (CAS) and context-based recommendation systems.

Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences... Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings (Paperback, 2013 ed.)
David Basin, John C. Mitchell
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

Web Information Systems and Technologies - 8th International Conference, WEBIST 2012, Porto, Portugal, April 18-21, 2012,... Web Information Systems and Technologies - 8th International Conference, WEBIST 2012, Porto, Portugal, April 18-21, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jose Cordeiro, Karl-Heinz Krempels
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book contains the thoroughly refereed and revised best papers from the 8th International Conference on Web Information Systems and Technologies, WEBIST 2012, held in Porto, Portugal, in April 2012, and organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS.

The 23 papers presented in this book were carefully reviewed and selected from 184 submissions. The papers were selected from those with the best reviews also taking into account the quality of their presentation at the conference. The papers are grouped into parts on Internet Technology; Web Interfaces and Applications; Society, e-Business, and e-Government; Web Intelligence; and Mobile Information Systems.

Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced... Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20-22, 2000, Bristol, United Kingdom (Paperback, Softcover reprint of the original 1st ed. 2000)
Josep Domingo-Ferrer, David Chan, Anthony Watson
R5,173 Discovery Miles 51 730 Ships in 18 - 22 working days

Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

Webvertising - The Ultimate Internet Advertising Guide (Paperback, Softcover reprint of the original 1st ed. 2000): SCN... Webvertising - The Ultimate Internet Advertising Guide (Paperback, Softcover reprint of the original 1st ed. 2000)
SCN Education BV; Edited by SCN Education BV
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

'There is no doubt', dr. Kevin Nunley wrote, 'the Internet really is the biggest gold rush of our lifetime. It is unlikely you or I will get another chance as big as this one to earn huge profits anytime in the next 100 years. Someday people will look back and judge us as one of two groups: those who didn't recognize the Internet revolution and missed the greatest chance of our age, and those who smartly made a place for themselves in the new business model that will dominate the future. It is time to get on board. ' Ing. Adrian Mulder Content Editor Adrian Mulder is an Internet journalist who writes for major business computing magazines. He combines a technical background with a vast experience in the computer and business trade magazine industry The Ultimate Internet Advertising Guide Acknowledgements Many people and professionals have contributed directly or indirectly to this book. To name them all would be practically impossible, as there are many. Nevertheless the editors would like to mention a few of those who have made the production of this book possible. Executive Editor for SCN Education BV: Robert Pieter Schotema Publishing Manager: drs. Marieke Kok Marketing Coordinator: Martijn Robert Broersma Content Editor: ing. Adrian Mulder Editorial Support Dennis Gaasbeek, Rob Guijt, Richard van Winssen Interior Design: Paulien van Hemmen, Bach. Also, we would especially like to thank dr. Roland van Stigt for laying a solid foundation for the Hon Guide series to grow on.

Interactive Decision Aids in E-Commerce (Paperback, 2012 ed.): Jella Pfeiffer Interactive Decision Aids in E-Commerce (Paperback, 2012 ed.)
Jella Pfeiffer
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book gives recommendations on which interactive decision aids to offer in webstores. Interactive decision aids are tools that help online shoppers to compare and evaluate product information. Consumers can, for instance, exclude products that do not meet certain criteria, they can highlight certain information or they can assign ratings of different kinds. Interactive decision aids are important, because finding the preferred product in a short amount of time increases both the customers' satisfaction and, in turn, the sales volume.This book includes a detailed description of decision aids, closely studies how decision aids are related to the decision behavior of customers, and develops a comprehensive system of decision aids, which is very flexible, increases both customer satisfaction and confidence, and can be used intuitively. The close link between typical behaviors and the decision aids allows webstores to learn about customers' decision-making behavior by using a simple click stream analysis. The book is written in an easy-to-read style and provides both practical recommendations and knowledge about consumer behavior

Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25-... Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Paperback, 2013 ed.)
Ed Dawson
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011,... Digital Forensics and Cyber Crime - Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Pavel Gladyshev, Marcus K. Rogers
R1,412 Discovery Miles 14 120 Ships in 18 - 22 working days

This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.

The Internet of Products - An Approach to Establishing Total Transparency in Electronic Markets (Paperback, 2013 ed.): Robert... The Internet of Products - An Approach to Establishing Total Transparency in Electronic Markets (Paperback, 2013 ed.)
Robert Neumann
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This study approaches the difficult problem of providing Internet users with a completely transparent view on electronic markets from a product information accessibility point of view. Robert Neumann analyzes economic, ecological, and societal gains of openly accessible product information in the form of theoretical models. Though many aspects of very different research disciplines have to be investigated to gain a holistic view on the Internet of Products, this thesis reduces the range of involved research topics to product information discoverability related questions."

Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected... Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R1,849 Discovery Miles 18 490 Ships in 18 - 22 working days

This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003): Alvin T. S. Chan, Stephen Chan,... Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003)
Alvin T. S. Chan, Stephen Chan, Hong Va Leong, Vincent Ng
R4,005 Discovery Miles 40 050 Ships in 18 - 22 working days

The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule.

Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback,... Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback, 2013 ed.)
Berthold Voecking
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.

Virtual Corporate Universities - A Matrix of Knowledge and Learning for the New Digital Dawn (Paperback, Softcover reprint of... Virtual Corporate Universities - A Matrix of Knowledge and Learning for the New Digital Dawn (Paperback, Softcover reprint of the original 1st ed. 2003)
Walter R.J. Baets, Gert Van Der Linden
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

Over the past years, business schools have been experimenting with distance learning and online education. In many cases this new technology has not brought the anticipated results. Questions raised by online education can be linked to the fundamental problem of education and teaching, and more specifically to the models and philosophy of education and teaching. Virtual Corporate Universities: A Matrix of Knowledge and Learning for the New Digital Dawn offers a source for new thoughts about those processes in view of the use of new technologies. Learning is considered as a key-strategic tool for new strategies, innovation, and significantly improving organizational effectiveness. The book blends the elements of knowledge management, as well as organizational and individual learning. The book is not just a treatment of technology, but a fusion of a novel dynamic learner (student)-driven learning concept, the management and creation of dynamic knowledge, and next-generation technologies to generic business, organizational and managerial processes, and the development of human capital. Obviously, the implications of online learning go far beyond the field of business as presented in this book.

Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004): Godfried B. Williams Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004)
Godfried B. Williams
R2,605 Discovery Miles 26 050 Ships in 18 - 22 working days

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.

Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001)
Stefan Katzenbeisser
R2,616 Discovery Miles 26 160 Ships in 18 - 22 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

The IT Value Network - From IT Investment to Stakeholder Value (Hardcover): TJ Read The IT Value Network - From IT Investment to Stakeholder Value (Hardcover)
TJ Read
R994 R792 Discovery Miles 7 920 Save R202 (20%) Ships in 10 - 15 working days

Learn to measure and manage the real value of IT investment and spending

IT investments are becoming more than just business enablers or assets on the books; they provide capability that can drive the business. Thought leadership should migrate towards information investment, getting a bigger bang for the buck from the 'I' in IT and from the 'I' in CIO.

"The IT Value Network: From IT Investment to Stakeholder Economic Value" incorporates new emerging decision support methods, such as real options, which are considered to complement traditional financial measures. Organizational and informational economic based techniques are also incorporated to manage and assess IT investments, including the balanced scorecard (BSC), and investment and portfolio management; in addition to coverage of IT key performance indicators and competitive benchmarking.

Selected as a top 10 best IT-Business book for 2009 by CIO Insight - Praises for "The IT Value Network: From IT Investment to Stakeholder Value"

"This is probably the best 'up-to-date' executive information management resource since Strassmann's works of fifteen years ago. Tony Read provides a comprehensive and insightful assessment of the state of IT investment and the value of various technologies and information management in the modern enterprise. For corporate executives trying to navigate this rapidly changing landscape, this book is highly recommended."
--Paul A. Brinkley, Deputy Under Secretary of Defense (U.S.) for Business Transformation Agency

"Managing technology investments with a value-based approach just works--it has provided significant stakeholder value at Indigo. This book is a must-read for both IT and business managers who want to improve the return on their IT investments."
--Michael Serbinis, President, Shortcovers, CIO & EVP, Indigo Books & Music Inc.

"Difficulty proving the business value of IT remains a key barrier to IT executives. IT Value Network provides a clear road map to chief information officers interested in moving beyond simply aligning business and technology strategies. It is a must-read for IT executives who wish to become true partners to the business."
--Gary Beach, Publisher Emeritus, CIO magazine

"This book is a complete study of how value is derived and measured from IT investments. All IT strategy professionals should read it and have access to it. I strongly recommend it."
--Ali Hamza, Partner, PricewaterhouseCoopers (PwC)

"IT spending continues to climb, but IT value is invariably left on the table. Tony's new book will enlighten both the practitioner and academic to new approaches and techniques for capturing and realizing stakeholder economic value--with a great perspective to sustaining competitive advantage or as the book promotes network advantage, across the firm's value system."
--Edward Lieblein, PhD, Dean and Professor, Graduate School of Computer and Information Sciences, Nova Southeastern University

"Tony Read's book provides excellent insight and strategies for maximizing shareholder return from IT investments. The book gives a timely response to the challenges every CIO and CFO face in the current economic environment. It is now more important than ever to demonstrate IT return on investment and this book is a valuable aid for Cx's looking to leverage every IT dollar to secure maximum business return"
--Albert R. Hitchcock, CIO, Vodafone Group

Distributed Infrastructure Support for Electronic Commerce Applications (Paperback, Softcover reprint of the original 1st ed.... Distributed Infrastructure Support for Electronic Commerce Applications (Paperback, Softcover reprint of the original 1st ed. 2004)
Hans-Arno Jacobsen
R2,626 Discovery Miles 26 260 Ships in 18 - 22 working days

Distributed Infrastructure Support For E-Commerce And Distributed Applications is organized in three parts. The first part constitutes an overview, a more detailed motivation of the problem context, and a tutorial-like introduction to middleware systems. The second part is comprised of a set of chapters that study solutions to leverage the trade-off between a transparent programming model and application-level enabled resource control. The third part of this book presents three detailed distributed application case studies and demonstrates how standard middleware platforms fail to adequately cope with resource control needs of the application designer in these three cases: -An electronic commerce framework for software leasing over the World Wide Web; -A remote building energy management system that has been experimentally deployed on several building sites; -A wireless computing infrastructure for efficient data transfer to non-stationary mobile clients that have been experimentally validated.

Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3,... Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Chuankun Wu, Moti Yung, Dongdai Lin
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues  9th International Workshop, RFIDsec... Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Michael Hutter, Joern-Marc Schmidt
R1,754 Discovery Miles 17 540 Ships in 18 - 22 working days

This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 papers presented in this volume were carefully reviewed and selected from 23 submissions. RFIDsec deals with topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Artificial Intelligence and Digital…
Adedeji B. Badiru Hardcover R1,631 Discovery Miles 16 310
Evolutionary Intelligence for Healthcare…
T. Ananth Kumar, R. Rajmohan, … Hardcover R1,438 Discovery Miles 14 380
Handbook of Emergency Response - A Human…
Adedeji B. Badiru, Leeann Racz Paperback R1,961 Discovery Miles 19 610
Synergistic Interaction of Big Data with…
Indranath Chatterjee, Rajanish K. Kamat, … Hardcover R4,495 Discovery Miles 44 950
Machine Learning Algorithms and…
Prasenjit Chatterjee, Morteza Yazdani, … Hardcover R3,363 Discovery Miles 33 630
Variable-Structure Approaches…
Andreas Rauh, Luise Senkel Hardcover R4,010 R3,479 Discovery Miles 34 790
AI Knowledge Transfer from the…
Jose Guadix Martin, Milica Lilic, … Hardcover R1,485 Discovery Miles 14 850
Machine Learning and Analytics in…
Himani Bansal, Balamurugan Balusamy, … Hardcover R4,219 Discovery Miles 42 190
Advanced Sensing in Image Processing and…
Rashmi Gupta, Arun Kumar Rana, … Hardcover R3,389 Discovery Miles 33 890
Human-Machine Interface Technology…
Ravichander Janapati, Usha Desai, … Hardcover R4,911 Discovery Miles 49 110

 

Partners