|
Showing 1 - 11 of
11 matches in All Departments
Social networking venues have increased significantly in popularity
in recent years. When utilized properly, these networks can offer
many advantages within business contexts. Strategic Uses of Social
Media for Improved Customer Retention is a pivotal reference source
for the latest scholarly research on the implementation of online
social networks in modern businesses and examines how such networks
allow for a better understanding of clients and customers.
Highlighting theoretical concepts, empirical case studies, and
critical analyses, this book is ideally designed for researchers,
practitioners, professionals, and upper-level students interested
in improving and maintaining customer relationships.
Recent growth in knowledge management concepts has played a vital
role in the improvement of organizational performance. These
knowledge management approaches have been influential in achieving
the goal of efficient production of software development processes.
Knowledge-Based Processes in Software Development focuses on the
inherent issues to help practitioners in gaining understanding of
software development processes. The best practices highlighted in
this publication will be essential to software professionals
working in the industry as well as students and researchers in the
domain of software engineering in order to successfully employ
knowledge management procedures.
This textbook presents a practical introduction to information
security using the Competency Based Education (CBE) method of
teaching. The content and ancillary assessment methods explicitly
measure student progress in the three core categories: Knowledge,
Skills, and Experience, giving students a balance between
background knowledge, context, and skills they can put to work.
Students will learn both the foundations and applications of
information systems security; safeguarding from malicious attacks,
threats, and vulnerabilities; auditing, testing, and monitoring;
risk, response, and recovery; networks and telecommunications
security; source code security; information security standards; and
compliance laws. The book can be used in introductory courses in
security (information, cyber, network or computer security),
including classes that don't specifically use the CBE method, as
instructors can adjust methods and ancillaries based on their own
preferences. The book content is also aligned with the
Cybersecurity Competency Model, proposed by department of homeland
security. The author is an active member of The National Initiative
for Cybersecurity Education (NICE), which is led by the National
Institute of Standards and Technology (NIST). NICE is a partnership
between government, academia, and the private sector focused on
cybersecurity education, training, and workforce development.
This updated textbook is for courses in cyber security education
that follow the National Initiative for Cybersecurity Education
(NICE) framework which adopts the Competency- Based Education (CBE)
method. The book creates content based on the Knowledge, Skills and
Abilities (a.k.a. KSAs) described in the NICE framework. This book
focuses on cyber analytics and intelligence areas. The book has 18
chapters: Introduction, Acquisition Management, Continuity Planning
and Disaster Recovery, Cyber Defense Analysis and Support, Cyber
Intelligence, Cyber Intelligence Analysis, Cyber Operational
Planning, Cyber Policy and Strategy Management, Cyber Threat
Analysis, Cybersecurity Management, Forensics Analysis, Identity
Management, Incident Response, Collection Operations, Computer
Network Defense, Data Analysis, Threat Analysis and last chapter,
Vulnerability Assessment.
This textbook covers security controls and management. It is for
courses in cyber security education that follow National Initiative
for Cybersecurity Education (NICE) work roles and framework that
adopt the Competency-Based Education (CBE) method. The book follows
the CBE general framework, meaning each chapter contains three
sections, knowledge and questions, and skills/labs for skills and
sbilities. The author makes an explicit balance between knowledge
and skills material in information security, giving readers
immediate applicable skills. The book is divided into several
parts, including: Information Assurance / Encryption; Information
Systems Security Management; Information Systems / Network
Security; Information Technology Management; IT Management; and IT
Risk Management.
Software testing is needed to assess the quality of developed
software. However, it consumes a critical amount of time and
resources, often delaying the software release date and increasing
the overall cost. The answer to this problem is effective test
automation, which is expected to meet the need for effective
software testing while reducing amount of required time and
resources. Advanced Automated Software Testing: Frameworks for
Refined Practice discusses the current state of test automation
practices, as it includes chapters related to software test
automation and its validity and applicability in different domains.
This book demonstrates how test automation can be used in different
domains and in the different tasks and stages of software testing,
making it a useful reference for researchers, students, and
software engineers.
This textbook presents a practical introduction to information
security using the Competency Based Education (CBE) method of
teaching. The content and ancillary assessment methods explicitly
measure student progress in the three core categories: Knowledge,
Skills, and Experience, giving students a balance between
background knowledge, context, and skills they can put to work.
Students will learn both the foundations and applications of
information systems security; safeguarding from malicious attacks,
threats, and vulnerabilities; auditing, testing, and monitoring;
risk, response, and recovery; networks and telecommunications
security; source code security; information security standards; and
compliance laws. The book can be used in introductory courses in
security (information, cyber, network or computer security),
including classes that don't specifically use the CBE method, as
instructors can adjust methods and ancillaries based on their own
preferences. The book content is also aligned with the
Cybersecurity Competency Model, proposed by department of homeland
security. The author is an active member of The National Initiative
for Cybersecurity Education (NICE), which is led by the National
Institute of Standards and Technology (NIST). NICE is a partnership
between government, academia, and the private sector focused on
cybersecurity education, training, and workforce development.
This textbook covers security controls and management. It is for
courses in cyber security education that follow National Initiative
for Cybersecurity Education (NICE) work roles and framework that
adopt the Competency-Based Education (CBE) method. The book follows
the CBE general framework, meaning each chapter contains three
sections, knowledge and questions, and skills/labs for skills and
sbilities. The author makes an explicit balance between knowledge
and skills material in information security, giving readers
immediate applicable skills. The book is divided into several
parts, including: Information Assurance / Encryption; Information
Systems Security Management; Information Systems / Network
Security; Information Technology Management; IT Management; and IT
Risk Management.
In science, we try to separate the different views in order to
evaluate things in a more realistic way. In this book, we present
the overall research theories, models and developments that occur
in the software engineering field from the four views or
perspectives; Process, Project, People and Product. The goal is to
make a distinction between the progresses in each area and explore
the opportunities in finding windows for more research in any of
those four views. This will also organize the software engineering
project into smaller manageable parts that can be easy to
understand and identify. It should reduce complexity and improve
clarity. This concept is at the core of software engineering. The
4Ps concerns overlap and distinct. The book will try to point to
the two sides. Concepts such as; ontology, abstraction, modeling
and views or separation of concerns always include some sort of
abstraction or focus. The goal is to draw a better image or
understanding for the problem. In another goal, we hope that the
separation of concerns will help software engineering students
better understand the large number of modeling and terminology
concepts.
This book includes the details about a project for developing a
software metric tool to gather several code metrics from most of
the known types of codes such as .cs, .vb, .java, .html, .c, .h,
.cpp, .jsp, ..etc.). The book also includes guidelines to build
software prediction model to be used for cost estimation. A
prediction model in a company utilizes the earlier projects and
gather the metrics from them in order to be able to make cost and
project plannings for future ones. The book includes the different
stages of development such as requirements gathering, design,
implementation and testing. The project related to this paper was
originally developed to Honeywell aviation as they were trying to
make usage of their large number of earlier projects as a guidance
for newer projects. This can be easy as it is used and measured by
the same company. In general a limitation in the prediction model
is that we cant always apply models from different companies or
industry sectors.
|
|