When we began writing this book, we had a fundamental tenet: Write a clear handbook
for creating the organization’s IT audit function and for performing their IT audits. We
wanted this book to provide more than checklists and textbook theories but instead to
provide real-life practical guidance from people who have performed IT...
The world stood on its toes as Steve Jobs announced the iPad in January
2010 as “our most advanced technology in a magical and revolutionary
device at an unbelievable price.”
Do you believe in magic? The iPad has that magical quality of disappearing
into your hands as you explore content with it. You have to hold...
Soft computing, as a collection of techniques exploiting approximation and tolerance for imprecision and uncertainty in traditionally intractable problems, has become very effective and popular especially because of the synergy derived from its components. The integration of constituent technologies provides complementary methods that allow...
In less than a decade, the online delivery of software has transformed
the business software landscape. The concept of online delivery is
simple: A software company develops an application, hosts the
software on its own servers, and makes it available to companies over
the Internet. Companies sign up to use the application and pay for...
Although the basic purposes of finance, and the nature of the core instruments used in
attaining them, are relatively constant, recent years have seen an explosion in complexity of
both products and techniques.
A number of forces are driving this explosion. The first is internationalization encompassing
a dramatic growth in...
I am quite honored that the authors of this book asked me if I could write the foreword. They have a long and concrete experience in implementing business processes, and we have interacted together in the context of telecommunication operators, where they delivered successful business process implementation.
This book provides an overview of steganography and digital watermarking, two areas of research which are
generally referred to as "information hiding." Steganography studies ways to make communication invisible by
hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...
Recently, the rapid and fundamental advances in computing technologies have been driving the role and
scope of software systems to a new level. A number of new types of software systems are emerging,
among which service based systems, cloud computing, pervasive computing, and Internet of Things are
eminent examples. For these systems,...
Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled
with countless stories of product successes and failures— fickle consumer adoptions, clever marketing
campaigns that outsmart the best technologies, better packaging winning over better technology,
and products that are simply...
After being shrouded in esoterica for a long time, Global Navigation Satellite
Systems (GNSS) have become part of everyday life, especially the Global Positioning
System (GPS). Having spent 40 years involved with the subject, it
became clear to me that it would be useful to have a book about the business
aspects of these systems. This...
My entire career has been about learning and applying new technologies. It has also
been about taking on new challenges related to technology and business. I enjoy
learning new things,and I like to share things that I have learned through writing
and public speaking. I like to help others learn challenging subjects,in particular...
All students interested in researching the Internet are living in very interesting and
exciting times. From the Internet’s beginning in the 1960s up to the present day,
the Internet has grown to become a vast platform where there are now 2 billion
users of this global infrastructure.1 Predictions are that this number will rise to...