Browse Results

Showing 35,151 through 35,175 of 53,797 results

Financial Crimes: A Threat to Global Security

by Maximillian Edelbacher, Peter Kratcoski and Michael Theil

Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection

Pre-Employment Background Investigations for Public Safety Professionals

by Frank A. Colaprete

***Author Radio InterviewJoin Dr. Frank A. Colaprete for an upcoming interview on the Privacy Piracy show on KUCI 88.9FM. Click here on September 2nd, 2013 at 8:00 a.m. PST to listen in.Pre-employment investigations have been the subject of intense review and debate since 9/11 made the vetting of applicants a critical function of every organization

Machine-to-Machine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5)

by Jesus Mena

In today's wireless environment, marketing is more frequently occurring at the server-to-device level-with that device being anything from a laptop or phone to a TV or car. In this real-time digital marketplace, human attributes such as income, marital status, and age are not the most reliable attributes for modeling consumer behaviors. A more effe

Communication and Networking in Smart Grids

by Yang Xiao

Appropriate for researchers, practitioners, and students alike, Communication and Networking in Smart Grids presents state-of-the-art approaches and novel technologies for communication networks in smart grids. It explains how contemporary grid networks are developed and deployed and presents a collection of cutting-edge advances to help improve cu

Media Networks: Architectures, Applications, and Standards

by Hassnaa Moustafa Sherali Zeadally

A rapidly growing number of services and applications along with a dramatic shift in users' consumption models have made media networks an area of increasing importance. Do you know all that you need to know?Supplying you with a clear understanding of the technical and deployment challenges, Media Networks: Architectures, Applications, and Standard

Managing the Insider Threat: No Dark Corners

by Nick Catrantzos

An adversary who attacks an organization from within can prove fatal to the organization and is generally impervious to conventional defenses. Drawn from the findings of an award-winning thesis, Managing the Insider Threat: No Dark Corners is the first comprehensive resource to use social science research to explain why traditional methods fail aga

Next-Generation Batteries and Fuel Cells for Commercial, Military, and Space Applications

by A.R. Jha

Distilling complex theoretical physical concepts into an understandable technical framework, Next-Generation Batteries and Fuel Cells for Commercial, Military, and Space Applications describes primary and secondary (rechargeable) batteries for various commercial, military, spacecraft, and satellite applications for covert communications, surveillan

The 7 Qualities of Highly Secure Software

by Mano Paul

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure

Handbook of Mobile Systems Applications and Services (Mobile Services And Systems Ser. #1)

by Anup Kumar Bin Xie

From fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will pl

Disasters 2.0: The Application of Social Media Systems for Modern Emergency Management

by Adam Crowe

Emerging social media and so-called Web 2.0 technologies will continue to have a great impact on the practice and application of the emergency management function in every public safety sector. Disasters 2.0: The Application of Social Media Systems for Modern Emergency Management prepares emergency managers and first responders to successfully appl

Projects and Complexity: Theory, Methods, And Applications (Systems Innovation Book Ser.)

by Adedeji B. Badiru

Helpful to those tasked with managing complex environments, Projects and Complexity introduces a new way of looking at projects and fostering the culture needed to achieve sustainable results. It brings together experts from the academic, military, and business worlds to explore project management in the context of complexity theory and organizatio

Ethics in IT Outsourcing (Applied Software Engineering Series)

by Tandy Gold

In IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads, Ethics in IT Outsourcing explores the complex challenges of aligning IT outsour

Contemporary Artificial Intelligence (Chapman And Hall/crc Artificial Intelligence And Robotics Ser.)

by Richard E. Neapolitan

The notion of artificial intelligence (AI) often sparks thoughts of characters from science fiction, such as the Terminator and HAL 9000. While these two artificial entities do not exist, the algorithms of AI have been able to address many real issues, from performing medical diagnoses to navigating difficult terrain to monitoring possible failures

Strategy and Business Process Management: Techniques for Improving Execution, Adaptability, and Consistency

by Carl F. Lehmann

This book prepares readers to master an IT and managerial discipline quickly gaining momentum in organizations of all sizes - Business Process Management (BPM). It describes how BPM treats processes as a portfolio of strategic assets that create and deliver customer and shareholder value and adapt, when necessary, enabling competitive advantage thr

Electronic Health Record: A Systems Analysis of the Medications Domain

by MD, Alexander Scarlat

An accessible primer, Electronic Health Record: A Systems Analysis of the Medications Domain introduces the tools and methodology of Structured Systems Analysis as well as the nuances of the Medications domain. The first part of the book provides a top-down decomposition along two main paths: data in motion workflows, processes, activities, and tas

Multimedia Communications and Networking

by Mario Marques da Silva

The result of decades of research and international project experience, Multimedia Communications and Networking provides authoritative insight into recent developments in multimedia, digital communications, and networking services and technologies. Supplying you with the required foundation in these areas, it illustrates the means that will allow

Green Mobile Devices and Networks: Energy Optimization and Scavenging Techniques

by Hrishikesh Venkataraman Gabriel-Miro Muntean

While battery capacity is often insufficient to keep up with the power-demanding features of the latest mobile devices, powering the functional advancement of wireless devices requires a revolution in the concept of battery life and recharge capability. Future handheld devices and wireless networks should be able to recharge themselves automaticall

TV Content Analysis: Techniques and Applications (Multimedia Computing, Communication And Intelligence Ser.)

by Yiannis Kompatsiaris Bernard Merialdo Shiguo Lian

The rapid advancement of digital multimedia technologies has not only revolutionized the production and distribution of audiovisual content, but also created the need to efficiently analyze TV programs to enable applications for content managers and consumers. Leaving no stone unturned, TV Content Analysis: Techniques and Applications provides a de

Noiseless Steganography: The Key to Covert Communications

by Abdelrahman Desoky

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively cover Game SteganographyAlthough the goal of steganography is to prevent adversaries from suspe

Information Security Management Handbook, Volume 6

by Harold F. Tipton Cissp Micki Krause Nozaki

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay

Manifold Learning Theory and Applications

by Yunqian Ma Yun Fu

Trained to extract actionable information from large volumes of high-dimensional data, engineers and scientists often have trouble isolating meaningful low-dimensional structures hidden in their high-dimensional observations. Manifold learning, a groundbreaking technique designed to tackle these issues of dimensionality reduction, finds widespread

Investigations in the Workplace

by Eugene F. Ferraro T.J. MacGinley Ban Seng Choo

The process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully.Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable

Green Project Management

by Richard Maltzman David Shirley

Winner of PMI's 2011 David I. Cleland Project Management Literature AwardDetailing cutting-edge green techniques and methods, this book teaches project managers how to maximize resources and get the most out of limited budgets. It supplies proven techniques and best practices in green project management, including risk and opportunity assessments.

TV White Space Spectrum Technologies: Regulations, Standards, and Applications

by Rashid A. Saeed Stephen J. Shellhammer

Although sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applic

Web-Based and Traditional Outsourcing

by Vivek Sharma Varun Sharma K.S. Rajasekaran

In today's increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success. The future will be driven by value and competing ideas-creating an environment where old alignments and equations will be replaced by a global network of

Refine Search

Showing 35,151 through 35,175 of 53,797 results