Account
Orders
Advanced search
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could...
This book presents a theory of consciousness which is unique and sustainable in nature, based on physiological and cognitive-linguistic principles controlled by a number of socio-psycho-economic factors. In order to anchor this theory, which draws upon various...
This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access: information...
This book is about complexity in Information Systems (IS). The subject is addressed from both conceptual and applied perspectives. Concepts are drawn from information theory, industrial design and software engineering. Its content capitalizes on experiences gathered by...
Competitive Intelligence and Decision Problems The development of a research, teaching, or application of competitive (economic) intelligence requires a strategic and transverse vision in regards to related issues. It is essential to integrate the role of culture when...
This book introduces policy, government, and security professionals to the concept of “information warfare,” covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text...
Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and...
The latest edition of this classic is updated with new problem sets and materialThe Second Edition of this fundamental textbook maintains the book's tradition of clear, thought-provoking instruction. Readers are provided once again with an instructive mix of...
Electronic Health Record: Standards, Coding Systems, Frameworks, and Infrastructures Discover HowElectronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new...
Revision Notes: CCEA ICT for GCSE has been written by experienced teachers and examiners so that you can be confident that it covers only the facts and ideas you will be expected to recall and use in the exam.- Essential facts are carefully organised to make revising...
A pragmatic approach to project management Many projects fail to deliver on time or on budget, or even to deliver a workable product that satisfies the customer. While good project management goes a long way towards ensuring success, managers often fail to follow the...
IMS Application Developer's Handbook gives a hands-on view of exactly what needs to be done byIMS application developers to develop an application and take it "live" on an operator's network. It offers practical guidance on building innovative applications using the...
Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the dog in most corporations, the cham-pions of IT, the CIOs, are constantly...
The topics of Advances in Information Technology and Communication in Health, the proceedings of ITCH 2009, include telemedicine and telehealth, electronic health records, software assurance and usability, terminology, classification and standards, software selection...
Get a clear picture of IP Multicast applications for delivering commercial high-quality video services This book provides a concise guide to current IP Multicast technology and its applications, with a focus on IP-based Television (IPTV) and Digital Video...
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of...
Introducing the basic concepts in total program control of the intelligent agents and machines, Intelligent Internet Knowledge Networks explores the design and architecture of information systems that include and emphasize the interactive role of modern...
Understanding Information Transmission introduces you to the entire field of information technology. In this consumer handbook and introductory student resource, seven chapters span the gamut of the field—the nature, storage, transmission, networking, and protection of...
How to use information and communication technologies in organizations and how to manage their impact has been the traditional domain of computer specialists and management consultants. The former have offered multiple ways to represent, model, and build applications...
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and presents them in an...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers