Product verifiable, defensible, and achievable software estimates
Based on data collected by the International Software Benchmarking Standards Group (ISBSG), Practical Software Project Estimation explains how to accurately forecast the size, cost, and schedule of software projects. Get expert advice on generating accurate...
This book is a first sketch of what the overall field of performance could look like as a modern scientific field but not its stylistically differentiated practice, pedagogy, and history. Musical performance is the most complex field of music. It comprises the study of a composition’s expression in terms of...
A close look at cloud computing's transformational role in business
Covering cloud computing from what the business leader needs to know, this book describes how IT can nimbly ramp up revenue initiatives, positively impact business operations and costs, and how this allows business leaders to shed worry about technology so they...
CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
BIS 2011 held in Pozna´n, Poland, was the 14th in a series of international conferences
on business information systems. The BIS conference series has been
recognized by professionals from the very beginning as a forum for the exchange
and dissemination of topical research in the development, implementation, application
and...
With the availability of chips offering constantly increasing computational performance and
functionality, design of more and more complex applications becomes possible. This is particularly
true for the domain of image processing, which is characterized by huge computation
efforts. Unfortunately, this evolution risks to be stopped by...
The Internet plays a significant and growing role in real-time industrial manufacturing, scheduling and management. A considerable research effort has led to the development of new technologies that make it possible to use the Internet for supervision and control of industrial processes.
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...
Bulletproof your organization against data breach, identity theft, and corporate espionage
In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...