Browse Results

Showing 29,051 through 29,075 of 53,536 results

Information Security Handbook

by Darren Death

Implement information security effectively as per your organization's needs. About This Book • Learn to build your own information security framework, the best fit for your organization • Build on the concepts of threat modeling, incidence response, and security analysis • Practical use cases and best practices for information security Who This Book Is For This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you. What You Will Learn • Develop your own information security framework • Build your incident response mechanism • Discover cloud security considerations • Get to know the system development life cycle • Get your security operation center up and running • Know the various security testing types • Balance security as per your business needs • Implement information security best practices In Detail Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it's important. It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you'll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization's requirements. Style and approach This book takes a practical approach, walking you through information security fundamentals, along with information security best practices.

Information Security Practices

by Isaac Woungang Ahmed Awad Issa Traoré

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.

Information Systems: 10th SIGSAND/PLAIS EuroSymposium 2017, Gdansk, Poland, September 22, 2017, Proceedings (Lecture Notes in Business Information Processing #300)

by Stanisław Wrycza and Jacek Maślankowski

This book constitutes the refereed proceedings of the 10th SIGSAND/PLAIS EuroSymposium 2017 titled Information Systems: Research, Development, Applications, and Education, held in Gdansk and Sopot, Poland, on September 27, 2017.The objective of the EuroSymposium on Systems Analysis and Design is to promote and develop high quality research on all issues related to analysis and design (SAND). It provides a forum for SAND researchers and practitioners in Europe and beyond to interact, collaborate, and develop their field. The 10 papers presented in this volume were carefully reviewed and selected from 45 submissions.They are organized in topical sections on data analytics, Web-based information systems, and information systems development.

Information Systems: 14th European, Mediterranean, and Middle Eastern Conference, EMCIS 2017, Coimbra, Portugal, September 7-8, 2017, Proceedings (Lecture Notes in Business Information Processing #299)

by Marinos Themistocleous and Vincenzo Morabito

This book constitutes selected papers from the 14th European, Mediterranean, and Middle Eastern Conference, EMCIS 2017, held in Coimbra, Portugal, in September 2017. EMCIS is focusing on approaches that facilitate the identification of innovative research of significant relevance to the IS discipline following sound research methodologies that lead to results of measurable impact. The 37 full and 16 short papers presented in this volume were carefully reviewed and selected from a total of 106 submissions. They are organized in sections on big data and Semantic Web; digital services, social media and digital collaboration; e-government; healthcare information systems; information systems security and information privacy protection; IT governance; and management and organizational issues in information systems.

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II

by Adam Grzech Jerzy Świątek Zofia Wilimowska Leszek Borzemski

This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18-20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I--addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects. Part II--discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and mulit-agent systems and Internet of Things. Part III--discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management. Part IV--dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods.

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part III

by Jerzy Świątek Zofia Wilimowska Leszek Borzemski Adam Grzech

This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18-20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I--addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects. Part II--discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and mulit-agent systems and Internet of Things. Part III--discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management. Part IV--dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods.

Information Systems for Crisis Response and Management in Mediterranean Countries: 4th International Conference, ISCRAM-med 2017, Xanthi, Greece, October 18-20, 2017, Proceedings (Lecture Notes in Business Information Processing #301)

by Ioannis M. Dokas, Narjès Bellamine-Ben Saoud, Julie Dugdale and Paloma Díaz

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems for Crisis Response and Management in Mediterranean Countries, ISCRAM-med 2017, held in Xanthi, Greece, in October 2017. ISCRAM-med conferences aim to enhance the collaboration and solidarity between Mediterranean countries in issues related to crisis management. They offer an outstanding opportunity to address and discuss new trends and challenges in the area of Information systems and Technologies for Crisis Response and Management (ISCRAM). The 12 full and 5 short papers presented in this volume were carefully reviewed and selected from 39 submissions. They were organized in topical sections named: social networking and big data analytics; robotic systems for crisis management; decision making in the context of crisis management; serious games and simulations; and collaboration and information sharing.

Information Systems Security

by Rudrapatna K. Shyamasundar Virendra Singh Jaideep Vaidya

This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics: privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.

Information Technology and Computational Physics

by Piotr Kulczycki László T. Kóczy Radko Mesiar Janusz Kacprzyk

A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

Information Technology and Intelligent Transportation Systems

by Valentina Emilia Balas Lakhmi C. Jain Xiangmo Zhao

This volume includes the proceedings of the 2015 International Conference on Information Technology and Intelligent Transportation Systems (ITITS 2015) which was held in Xi'an on December 12-13, 2015. The conference provided a platform for all professionals and researchers from industry and academia to present and discuss recent advances in the field of Information Technology and Intelligent Transportation Systems. The presented information technologies are connected to intelligent transportation systems including wireless communication, computational technologies, floating car data/floating cellular data, sensing technologies, and video vehicle detection. The articles focusing on intelligent transport systems vary in the technologies applied, from basic management systems to more application systems including topics such as emergency vehicle notification systems, automatic road enforcement, collision avoidance systems and some cooperative systems. The conference hosted 12 invited speakers and over 200 participants. Each paper was under double peer reviewed by at least 3 reviewers. This proceedings are sponsored by Shaanxi Computer Society and co-sponsored by Chang'an University, Xi'an University of Technology, Northwestern Poly-technical University, CAS, Shaanxi Sirui Industries Co. , LTD.

Information Technology and Intelligent Transportation Systems

by Valentina Emilia Balas Lakhmi C. Jain Xiangmo Zhao

This volume includes the proceedings of the 2015 International Conference on Information Technology and Intelligent Transportation Systems (ITITS 2015) which was held in Xi'an on December 12-13, 2015. The conference provided a platform for all professionals and researchers from industry and academia to present and discuss recent advances in the field of Information Technology and Intelligent Transportation Systems. The presented information technologies are connected to intelligent transportation systems including wireless communication, computational technologies, floating car data/floating cellular data, sensing technologies, and video vehicle detection. The articles focusing on intelligent transport systems vary in the technologies applied, from basic management systems to more application systems including topics such as emergency vehicle notification systems, automatic road enforcement, collision avoidance systems and some cooperative systems. The conference hosted 12 invited speakers and over 200 participants. Each paper was under double peer reviewed by at least 3 reviewers. This proceedings are sponsored by Shaanxi Computer Society and co-sponsored by Chang'an University, Xi'an University of Technology, Northwestern Poly-technical University, CAS, Shaanxi Sirui Industries Co. , LTD.

Information Technology for Management: New Ideas and Real Solutions

by Ewa Ziemba

This book constitutes revised selected papers from the 14th Conference on Advanced Information Technologies for Management, AITM 2016, and the 11th Conference on Information Systems Management, ISM 2016, held as part of the Federated Conference on Computer Science and Information Systems, FedCSIS, which took place in Gdansk, Poland, in September 2016. The 13 papers presented in this volume were carefully reviewed and selected from 51 submissions. They were organized in topical sections named: information technology and systems for knowledge management; information technology and systems for business transformation; and implementation and evaluation of information systems.

Information Technology Governance in Public Organizations

by Lazar Rusu Gianluigi Viscusi

This book examines trends and challenges in research on IT governance in public organizations, reporting innovative research and new insights in the theories, models and practices within the area. As we noticed, IT governance plays an important role in generating value from organization's IT investments. However there are different challenges for researchers in studying IT governance in public organizations due to the differences between political, administrative, and practices in these organizations. The first section of the book looks at Management issues, including an introduction to IT governance in public organizations; a systematic review of IT alignment research in public organizations; the role of middle managers in aligning strategy and IT in public service organizations; and an analysis of alignment and governance with regard to IT-related policy decisions. The second section examines Modelling, including a consideration of the challenges faced by public administration; a discussion of a framework for IT governance implementation suitable to improve alignment and communication between stakeholders of IT services; the design and implementation of IT architecture; and the adoption of enterprise architecture in public organizations. Finally, section three presents Case Studies, including IT governance in the context of e-government strategy implementation in the Caribbean; the relationship of IT organizational structure and IT governance performance in the IT department of a public research and education organization in a developing country; the relationship between organizational ambidexterity and IT governance through a study of the Swedish Tax Authorities; and the role of institutional logics in IT project activities and interactions in a large Swedish hospital.

Information Technology in Bio- and Medical Informatics: 8th International Conference, ITBAM 2017, Lyon, France, August 28–31, 2017, Proceedings (Lecture Notes in Computer Science #10443)

by Miroslav Bursa, Andreas Holzinger, M. Elena Renda and Sami Khuri

This book constitutes the refereed proceedings of the 8th International Conference on Information Technology in Bio- and Medical Informatics, ITBAM 2017, held in Lyon, France, in August 2017.The 3 revised full papers and 6 poster papers presented were carefully reviewed and selected from 15 submissions. The papers address a broad range of topics in applications of information technology to biomedical engineering and medical informatics.

Information Technology in Disaster Risk Reduction: First Ifip Tc 5 Dcdrr International Conference, Itdrr 2016, Sofia, Bulgaria, November 16-18,, 2016, Revised Selected Papers (IFIP Advances in Information and Communication Technology #501)

by Yuko Murayama Dimiter Velev Plamena Zlateva

This volume constitutes the refereed post-conference proceedings of the Second IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2017, held in Sofia, Bulgaria, in October 2017. <P><P> The 16 revised full papers presented were carefully reviewed and selected from 43 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, and disaster risk assessment and management.

Information Theoretic Security: 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings (Lecture Notes in Computer Science #10681)

by Junji Shikata

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Information Theory and Coding - Solved Problems

by Predrag Ivaniš Dušan Drajić

This book is offers a comprehensive overview of information theory and error control coding, using a different approach then in existed literature. The chapters are organized according to the Shannon system model, where one block affects the others. A relatively brief theoretical introduction is provided at the beginning of every chapter, including a few additional examples and explanations, but without any proofs. And a short overview of some aspects of abstract algebra is given at the end of the corresponding chapters. The characteristic complex examples with a lot of illustrations and tables are chosen to provide detailed insights into the nature of the problem. Some limiting cases are presented to illustrate the connections with the theoretical bounds. The numerical values are carefully selected to provide in-depth explanations of the described algorithms. Although the examples in the different chapters can be considered separately, they are mutually connected and the conclusions for one considered problem relate to the others in the book.

Information Theory Tools for Visualization (AK Peters Visualization Series)

by Min Chen Miquel Feixas Ivan Viola Anton Bardera Han-Wei Shen Mateu Sbert

This book explores Information theory (IT) tools, which have become state of the art to solve and understand better many of the problems in visualization. This book covers all relevant literature up to date. It is the first book solely devoted to this subject, written by leading experts in the field.

Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far

by Ted Demopoulos

Have you noticed that some people in infosec simply have more success than others, however they may define success? Some people are simply more listened too, more prominent, make more of a difference, have more flexibility with work, more freedom, choices of the best projects, and yes, make more money. They are not just lucky. They make their luck. The most successful are not necessarily the most technical, although technical or "geek" skills are essential. They are an absolute must, and we naturally build technical skills through experience. They are essential, but not for Rock Star level success. The most successful, the Infosec Rock Stars, have a slew of other equally valuable skills, ones most people never develop nor even understand. They include skills such as self direction, communication, business understanding, leadership, time management, project management, influence, negotiation, results orientation, and lots more . . . Infosec Rock Star will start you on your journey of mastering these skills and the journey of moving toward Rock Star status and all its benefits. Maybe you think you can’t be a Rock Star, but everyone can MOVE towards it and reap the benefits of vastly increased success. Remember, “Geek” will only get you so far . . .

Infrastructure as Code (IAC) Cookbook

by Stephane Jourdan Pierre Pomes

This book is for DevOps engineers and developers working in cross-functional teams or operations and would now switch to IAC to manage complex infrastructures.

Innovations in Enterprise Information Systems Management and Engineering

by Felix Piazolo Verena Geist Lars Brehm Rainer Schmidt

This book constitutes revised and peer reviewed contributions from the Research part of the ERP Future 2016 conference held in Hagenberg, Austria, in November 2016. The ERP Future Research conference is set up as a platform for scientific discussion on enterprise resource planning (ERP) systems, business intelligence (BI) systems, business process management (BPM) systems and information technology systems. The conference acts as a discussion and communication platform for business and technological topics covering ERP systems. The 7 full and 5 short papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in the following topical sections: introduction of enterprise systems; business processes; production processes; and IT-trends.

Innovationsorientiertes IT-Management mit DevOps: IT im Zeitalter von Digitalisierung und Software-defined Business (essentials)

by Rainer Alt Gunnar Auth Christoph Kögler

Dieses essential verbindet die neue Welt der Digitalisierung mit dem klassischen IT-Management. Es erkennt die Softwareentwicklung und das Softwaremanagement als wichtiges Element digitaler Innovationen. Dazu f#65533;hren die Autoren ausf#65533;hrlich in das Software-defined Business ein und legen die Grundlagen eines innovationsorientieren IT-Managements. Die auf agilen Verfahren aufbauende DevOps-Methode repr#65533;sentiert einen L#65533;sungsansatz, der schnelle (Re)Aktion durch digitale Innovation einerseits und langfristige Entwicklungszyklen sowie stabilen Betrieb andererseits verbindet. Eine umfassende Fallstudie bei der T-Systems Multimedia Systems illustriert den Einsatz von DevOps in der Praxis.

Innovative ICT Industrial Architecture in East Asia

by Norio Tokumaru Ferdinand C. Maquito Nobuhiro Takahashi Hitoshi Hirakawa

This book aims to shed light on the potentially innovative ICT (information and communication technology) architectures from an East Asian regional perspective. The business environment brought about by the development of ICT intensified global competition and caused dramatic changes in the industrial architecture. Firms that are involved in manufacturing and maintenance of ICT hardware and that offer services for software development are continuously being created, giving rise to the provision of new and diverse services to an increasingly growing East Asian regional market. Such industrial activities are advancing the shift from an old to a new industrial architecture. Some parts of emerging economies have grasped this edge on economic globalization and informatization and have adopted business models that enable them to enter the world economy. Entering this century, China, the Philippines, and Vietnam in East Asia have been rapidly expanding their ICT-BPO (Business Process Outsourcing) businesses as destinations of offshoring of service activities by firms in the advanced economies, following India's example. Policy makers and firms in those countries are also meeting the challenge of catching up with advanced economies through the development of such industries. It has enabled those economies to exploit new possibilities of further development, which may mean a new stage of manufacturing cum services in an ICT- and knowledge-based economy.

Innovative Security Solutions for Information Technology and Communications

by Pooya Farshim Emil Simion

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017. The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.

Refine Search

Showing 29,051 through 29,075 of 53,536 results