Bulletproof your organization against data breach, identity theft, and corporate espionage
In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...
As more and more businesses around the world adopt enterprise systems, it
becomes increasingly important for students to develop a more process-centric
perspective that refl ects the realities of the modern business environment in
which they will work. Because business operations and enterprise systems are
so tightly...
The use of Bayesian methods for the analysis of data has grown substantially in areas as diverse as applied statistics, psychology, economics and medical science. Bayesian Methods for Categorical Data sets out to demystify modern Bayesian methods, making them accessible to students and researchers alike. Emphasizing the use of statistical...
Since I wrote The Green and Virtual Data Center (CRC Press, 2009), I have had the
opportunity to meet and speak with thousands of information technology (IT) professionals
around the world, both in person and virtually via different venues. Even as
that last book was being printed, the ideas to be found in this new book were coming...
DPP IV has been attributed a large array of functions, some of which are mediated by
its exopeptidase activity. Although it only removes two amino acid residues at the N-terminus
of the peptide, this cleavage can inactivate or modify the activity of regulatory peptides, peptide
hormones, chemokines and neuropeptides. Several...
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of...
If there's anything the recession of 2009 taught us, it was the importance of investing in our customers, but when was this any different? So says Joseph Jaffe, bestselling author of Life After the 30-Second Spot and Join the Conversation, and a leading expert and...
“The invaluable advice in How to Wow guarantees your success in any meeting situation, from the boardroom to the breakfast table.”
–Keith Ferrazzi, author of Never Eat Alone
In today’s fast-paced world, where an elevator ride with your CEO can turn into an impromptu meeting, your lunch...
Transformation electromagnetics is a systematic design technique for optical and electromagnetic devices that enables novel wave-material interaction properties. The associated metamaterials technology for designing and realizing optical and electromagnetic devices can control the behavior of light and electromagnetic waves in ways that have...
Fuzzy Cognitive Maps (FCM) constitute cognitive models in the form of fuzzy directed graphs consisting of two basic elements: the nodes, which basically correspond to “concepts” bearing different states of activation depending on the knowledge they represent, and the “edges” denoting the causal effects...
This book considers the question: to what extent does it make sense to qualify technical artefacts as moral entities? The authors’ contributions trace recent proposals and topics including instrumental and non-instrumental values of artefacts, agency and artefactual agency, values in and around technologies, and the moral significance...
This comprehensive and self-contained textbook presents an accessible overview of the state of the art of multivariate algorithmics and complexity. Increasingly, multivariate algorithmics is having significant practical impact in many application domains, with even more developments on the horizon. The text describes how the multivariate...