Hanqing Wu, Liz Zhao
April 6, 2015
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of the biggest data breaches ever, clearly showed that many companies need to significantly improve their information security strategies. Web Security: ...
Adam Gordon
March 11, 2015
As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. (ISC)² conducts this process on ...
Santanu Chaudhury, Anupama Mallik, Hiranmay Ghosh
June 26, 2015
The result of more than 15 years of collective research, Multimedia Ontology: Representation and Applications provides a theoretical foundation for understanding the nature of media data and the principles involved in its interpretation. The book presents a unified approach to recent advances in...
Thomas A. Trier
June 22, 2015
In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to...
Yung-Hsiang Lu
June 16, 2015
Teach Your Students How to Program Well Intermediate C Programming provides a stepping-stone for intermediate-level students to go from writing short programs to writing real programs well. It shows students how to identify and eliminate bugs, write clean code, share code with others, and use...
Mario Tokoro
June 16, 2015
The book describes a fundamentally new approach to software dependability, considering a software system as an ever-changing system due to changes in service objectives, users’ requirements, standards and regulations, and to advances in technology. Such a system is viewed as an Open System since...
Pethuru Raj, Anupama C. Raman
June 15, 2015
The emergence of highly promising and potent technologies has enabled the transition of ordinary objects into smart artifacts—providing wider connectivity of digitized entities that can facilitate the building of connected cities. This book provides readers with a solid foundation on the latest...
Hsiang-Chuan Liu, Wen-Pei Sung, Wenli Yao
June 11, 2015
This book contains selected Computer, Management, Information and Educational Engineering related papers from the 2014 International Conference on Management, Information and Educational Engineering (MIEE 2014) which was held in Xiamen, China on November 22-23, 2014. The conference aimed to provide...
Bogdan Księżopolski
June 10, 2015
In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and...
Ally Leung
June 05, 2015
2014 International Conference on Multimedia, Communication and Computing Application (MCCA2014), Xiamen, China, Oct 16-17, 2014, provided a forum for experts and scholars of excellence from all over the world to present their latest work in the area of multimedia, communication and computing...
Chongfu Huang, Abdelouahid Lyhyaoui, Zhai Guofang, Nesrin Benhayoun
May 26, 2015
RACR is a series of biennial international conferences on risk analysis, crisis response, and disaster prevention for specialists and stakeholders. RACR-2015, held June 1-3, 2015 in Tangier, Morocco, was the fifth conference in this series, following the successful RACR-2007 in Shanghai (China),...
C. Ravindranath Pandian, Murali Kumar
May 20, 2015
Although there are countless books on statistics, few are dedicated to the application of statistical methods to software engineering. Simple Statistical Methods for Software Engineering: Data and Patterns fills that void. Instead of delving into overly complex statistics, the book details simpler...
Brook S. E. Schoenfield
May 20, 2015
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This...
Qi Luo
May 18, 2015
Sports Engineering and Computer Science contains papers presented at the 2014 International Conference on Sport Science and Computer Science (SSCS 2014), held September 16-17, 2014 in Singapore and at the 2014 International Conference on Biomechanics and Sports Engineering (BSE 2014), held October...