Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Enhancing Computer Security with Smart Technology
Enhancing Computer Security with Smart Technology
This book is about enhancing computer security through smart technology. This is compiled with the intention of bringing together two groups of people: those coming from a computer security background and those from an artificial intelligence and machine learning background. Toward this objective, this book is organized into two parts. The first...
Software Metrics: A Guide to Planning, Analysis, and Application
Software Metrics: A Guide to Planning, Analysis, and Application
The modern field of software metrics emerged from the computer modeling and "statistical thinking" services of the 1980s. As the field evolved, metrics programs were integrated with project management, and metrics grew to be a major tool in the managerial decision-making process of software companies. Now practitioners in the software...
The ABCs of IP Addressing
The ABCs of IP Addressing
Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to...
Successful Program Management: Complexity Theory, Communication, and Leadership
Successful Program Management: Complexity Theory, Communication, and Leadership

Complexity theory is a great, untapped resource in the field of management. Experts agree that it can be a powerful tool for managing complex and virtual programs, but there is little material available to guide program managers on how to use complexity theory to communicate and lead effectively.

Filling this void,
...

IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. Written as a contribution to the accounting and auditing...

Software Configuration Management
Software Configuration Management

An effective systems development and design process is far easier to explain than it is to implement. A framework is needed that organizes the life cycle activities that form the process. This framework is Configuration Management (CM).

Software Configuration Management discusses the framework from a standards viewpoint, using...

Wireless Internet Handbook: Technologies, Standards, and Applications
Wireless Internet Handbook: Technologies, Standards, and Applications

Wireless applications are definitely the next big thing in communications. Millions of people around the world use the Internet every day—to stay in touch with remote locations, follow the stock market, keep up with the news, check the weather, make travel plans, conduct business, shop, entertain themselves, and learn. The logical next...

A Guide to IT Contracting: Checklists, Tools, and Techniques
A Guide to IT Contracting: Checklists, Tools, and Techniques

Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal...

Real Process Improvement Using the CMMI
Real Process Improvement Using the CMMI
This book offers non-academic, real-world approaches to implementing CMMI-based process improvement in an organization. The author identifies critical concepts of CMMI, and details how to turn them into real process improvement.

Real Process Improvement Using the CMMI provides real-world concepts and techniques for CMMI-based...

The Hands-On Project Office: Guaranteeing ROI and On-Time Delivery
The Hands-On Project Office: Guaranteeing ROI and On-Time Delivery
This text offers processes, techniques, and tools that IT managers can use to immediately improve the delivery of IT products and services.

Economic pressures have forced IT executives to demonstrate the immediate and calculable ROI of new technology deployments. Unfortunately, existing IT service delivery often drifts without serious...

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy