"A very rich book sprinkled with real-life examples as well as battle-tested advice.”
—Pierre Haren, VP ILOG, IBM
"James does a thorough job of explaining Decision Management Systems as enablers
of a formidable business transformation.”
—Deepak Advani, Vice President,...
For Java developers this is the ultimate guide to coding business rules using the Drools platform. It's a chance to get a deep grounding in it all through a logical step by step approach using many real-life examples.
Learn the power of Drools as a platform for writing your business rules
Prepare yourself for the dramatic changes in today's auditing environment by using Johnstone/Gramling/Rittenberg's AUDITING: A RISK-BASED APPROACH TO CONDUCTING QUALITY AUDITS, 9th EDITION. This newest edition reflects the clarified auditing standards and the newest PCAOB standards, discusses COSO's updated Internal...
Employ heuristic adjustments for truly accurate analysis
Heuristics in Analytics presents an approach to analysis that accounts for the randomness of business and the competitive marketplace, creating a model that more accurately reflects the scenario at hand. With an emphasis on the importance of proper analytical...
This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...
The sixth edition of ACCOUNTING INFORMATION SYSTEMS provides thorough and up-to-date coverage of accounting information systems and related technologies. It features an early presentation of transaction cycles, as well as an emphasis on ethics, fraud, and the modern manufacturing environment. The book focuses on the needs and responsibilities...
Living with the Internet and Online Dangers highlights the risks and problems that come with modern Web technology, as well as what teens can do to protect themselves. Chapters explore online job hunting, email scams and Internet fraud, finding that special someone online, and wireless security. Written in straightforward language, this new...
The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version...
The series ‘‘Springer Theses’’ brings together a selection of the very best Ph.D.
theses from around the world and across the physical sciences. Nominated and
endorsed by two recognized specialists, each published volume has been selected
for its scientific excellence and the high impact of its contents for...
Whether you’re shopping for clothes from your computer or mobile
phone, or selling artworks around the globe, you face a dizzying array of
choices and decisions. How do I pay? How do I get paid? What if something
goes wrong?
From time immemorial, the security realm and personal identification task had
shown progress by employing technological means like secret knowledge as passwords
and Personal Identification Numbers, and by using personal possessions as
identity cards and Radio Frequency Identification chips. As opposed to these means
which are...
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer...