- Table View
- List View
Financial Crimes: A Threat to Global Security
by Maximillian Edelbacher, Peter Kratcoski and Michael TheilFinancial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection
Pre-Employment Background Investigations for Public Safety Professionals
by Frank A. Colaprete***Author Radio InterviewJoin Dr. Frank A. Colaprete for an upcoming interview on the Privacy Piracy show on KUCI 88.9FM. Click here on September 2nd, 2013 at 8:00 a.m. PST to listen in.Pre-employment investigations have been the subject of intense review and debate since 9/11 made the vetting of applicants a critical function of every organization
Machine-to-Machine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5)
by Jesus MenaIn today's wireless environment, marketing is more frequently occurring at the server-to-device level-with that device being anything from a laptop or phone to a TV or car. In this real-time digital marketplace, human attributes such as income, marital status, and age are not the most reliable attributes for modeling consumer behaviors. A more effe
Communication and Networking in Smart Grids
by Yang XiaoAppropriate for researchers, practitioners, and students alike, Communication and Networking in Smart Grids presents state-of-the-art approaches and novel technologies for communication networks in smart grids. It explains how contemporary grid networks are developed and deployed and presents a collection of cutting-edge advances to help improve cu
Media Networks: Architectures, Applications, and Standards
by Hassnaa Moustafa Sherali ZeadallyA rapidly growing number of services and applications along with a dramatic shift in users' consumption models have made media networks an area of increasing importance. Do you know all that you need to know?Supplying you with a clear understanding of the technical and deployment challenges, Media Networks: Architectures, Applications, and Standard
Managing the Insider Threat: No Dark Corners
by Nick CatrantzosAn adversary who attacks an organization from within can prove fatal to the organization and is generally impervious to conventional defenses. Drawn from the findings of an award-winning thesis, Managing the Insider Threat: No Dark Corners is the first comprehensive resource to use social science research to explain why traditional methods fail aga
Next-Generation Batteries and Fuel Cells for Commercial, Military, and Space Applications
by A.R. JhaDistilling complex theoretical physical concepts into an understandable technical framework, Next-Generation Batteries and Fuel Cells for Commercial, Military, and Space Applications describes primary and secondary (rechargeable) batteries for various commercial, military, spacecraft, and satellite applications for covert communications, surveillan
The 7 Qualities of Highly Secure Software
by Mano PaulThe 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure
Handbook of Mobile Systems Applications and Services (Mobile Services And Systems Ser. #1)
by Anup Kumar Bin XieFrom fundamental concepts and theories to implementation protocols and cutting-edge applications, the Handbook of Mobile Systems Applications and Services supplies a complete examination of the evolution of mobile services technologies. It examines service-oriented architecture (SOA) and explains why SOA and service oriented computing (SOC) will pl
Disasters 2.0: The Application of Social Media Systems for Modern Emergency Management
by Adam CroweEmerging social media and so-called Web 2.0 technologies will continue to have a great impact on the practice and application of the emergency management function in every public safety sector. Disasters 2.0: The Application of Social Media Systems for Modern Emergency Management prepares emergency managers and first responders to successfully appl
Projects and Complexity: Theory, Methods, And Applications (Systems Innovation Book Ser.)
by Adedeji B. BadiruHelpful to those tasked with managing complex environments, Projects and Complexity introduces a new way of looking at projects and fostering the culture needed to achieve sustainable results. It brings together experts from the academic, military, and business worlds to explore project management in the context of complexity theory and organizatio
Ethics in IT Outsourcing (Applied Software Engineering Series)
by Tandy GoldIn IT divisions and organizations, the need to execute in a competitive and complex technical environment while demonstrating personal integrity can be a significant personal and organizational challenge. Supplying concrete guidelines for those at an ethical crossroads, Ethics in IT Outsourcing explores the complex challenges of aligning IT outsour
Contemporary Artificial Intelligence (Chapman And Hall/crc Artificial Intelligence And Robotics Ser.)
by Richard E. NeapolitanThe notion of artificial intelligence (AI) often sparks thoughts of characters from science fiction, such as the Terminator and HAL 9000. While these two artificial entities do not exist, the algorithms of AI have been able to address many real issues, from performing medical diagnoses to navigating difficult terrain to monitoring possible failures
Strategy and Business Process Management: Techniques for Improving Execution, Adaptability, and Consistency
by Carl F. LehmannThis book prepares readers to master an IT and managerial discipline quickly gaining momentum in organizations of all sizes - Business Process Management (BPM). It describes how BPM treats processes as a portfolio of strategic assets that create and deliver customer and shareholder value and adapt, when necessary, enabling competitive advantage thr
Electronic Health Record: A Systems Analysis of the Medications Domain
by MD, Alexander ScarlatAn accessible primer, Electronic Health Record: A Systems Analysis of the Medications Domain introduces the tools and methodology of Structured Systems Analysis as well as the nuances of the Medications domain. The first part of the book provides a top-down decomposition along two main paths: data in motion workflows, processes, activities, and tas
Multimedia Communications and Networking
by Mario Marques da SilvaThe result of decades of research and international project experience, Multimedia Communications and Networking provides authoritative insight into recent developments in multimedia, digital communications, and networking services and technologies. Supplying you with the required foundation in these areas, it illustrates the means that will allow
Green Mobile Devices and Networks: Energy Optimization and Scavenging Techniques
by Hrishikesh Venkataraman Gabriel-Miro MunteanWhile battery capacity is often insufficient to keep up with the power-demanding features of the latest mobile devices, powering the functional advancement of wireless devices requires a revolution in the concept of battery life and recharge capability. Future handheld devices and wireless networks should be able to recharge themselves automaticall
TV Content Analysis: Techniques and Applications (Multimedia Computing, Communication And Intelligence Ser.)
by Yiannis Kompatsiaris Bernard Merialdo Shiguo LianThe rapid advancement of digital multimedia technologies has not only revolutionized the production and distribution of audiovisual content, but also created the need to efficiently analyze TV programs to enable applications for content managers and consumers. Leaving no stone unturned, TV Content Analysis: Techniques and Applications provides a de
Noiseless Steganography: The Key to Covert Communications
by Abdelrahman DesokyAmong the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic SteganographyThe first to comprehensively cover Graph SteganographyThe first to comprehensively cover Game SteganographyAlthough the goal of steganography is to prevent adversaries from suspe
Information Security Management Handbook, Volume 6
by Harold F. Tipton Cissp Micki Krause NozakiUpdated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay
Manifold Learning Theory and Applications
by Yunqian Ma Yun FuTrained to extract actionable information from large volumes of high-dimensional data, engineers and scientists often have trouble isolating meaningful low-dimensional structures hidden in their high-dimensional observations. Manifold learning, a groundbreaking technique designed to tackle these issues of dimensionality reduction, finds widespread
Investigations in the Workplace
by Eugene F. Ferraro T.J. MacGinley Ban Seng ChooThe process of investigation is dynamic and fluid. The approach must be reasonable and the investigator flexible. However, in order to be successful, every investigation must have a meaningful purpose and be executed ethically and lawfully.Inevitably, employers must invest time, money, and patience to ensure they obtain demonstrable and actionable
Green Project Management
by Richard Maltzman David ShirleyWinner of PMI's 2011 David I. Cleland Project Management Literature AwardDetailing cutting-edge green techniques and methods, this book teaches project managers how to maximize resources and get the most out of limited budgets. It supplies proven techniques and best practices in green project management, including risk and opportunity assessments.
TV White Space Spectrum Technologies: Regulations, Standards, and Applications
by Rashid A. Saeed Stephen J. ShellhammerAlthough sophisticated wireless radio technologies make it possible for unlicensed wireless devices to take advantage of un-used broadcast TV spectra, those looking to advance the field have lacked a book that covers cognitive radio in TV white spaces (TVWS). Filling this need, TV White Space Spectrum Technologies: Regulations, Standards and Applic
Web-Based and Traditional Outsourcing
by Vivek Sharma Varun Sharma K.S. RajasekaranIn today's increasingly competitive business environment, organizations must be able to adapt to the ever-changing business landscape where traditional business concepts no longer ensure success. The future will be driven by value and competing ideas-creating an environment where old alignments and equations will be replaced by a global network of