159 results (0,23502 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Fraud Auditing Using CAATT A Manual for Auditors and Forensic Accountants to Detect Organizational Fraud

Practical AI for Cybersecurity

Practical AI for Cybersecurity

The world of cybersecurity and the landscape that it possesses is changing on a dynamic basis. It seems like that hardly one threat vector is launched new variants of it are already on the way. IT Security teams in businesses and corporations are struggling daily to fight off any cyberthreats that they are experiencing. On top of this they are also asked by their CIO or CISO to model what future Cyberattacks could potentially look like and ways as to how the lines of defenses can be further enhanced. IT Security teams are overburdened and are struggling to find ways in order to keep up with what they are being asked to do. Trying to model the cyberthreat landscape is a very laborious process because it takes a lot of time to analyze datasets from many intelligence feeds. What can be done to accomplish this Herculean task? The answer lies in Artificial Intelligence (AI). With AI an IT Security team can model what the future Cyberthreat landscape could potentially look like in just a matter of minutes. As a result this gives valuable time for them not only to fight off the threats that they are facing but to also come up with solutions for the variants that will come out later. Practical AI for Cybersecurity explores the ways and methods as to how AI can be used in cybersecurity with an emphasis upon its subcomponents of machine learning computer vision and neural networks. The book shows how AI can be used to help automate the routine and ordinary tasks that are encountered by both penetration testing and threat hunting teams. The result is that security professionals can spend more time finding and discovering unknown vulnerabilities and weaknesses that their systems are facing as well as be able to come up with solid recommendations as to how the systems can be patched up quickly.

GBP 44.99
1

A Standard for Enterprise Project Management

A Standard for Enterprise Project Management

Providing structured yet adaptable models of project success within an organization A Standard for Enterprise Project Management explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. It also supplies an inventory of practical policies procedures techniques and templates for consistent management of projects. The book first discusses project authorization and initiation followed by analysis and planning. It then covers execution control and closure. Each phase contains an explanation and an illustration of how to optimize success. Throughout the text the author refers to numerous appendices that constitute both blank and completed templates. He provides details on how to use these tools with an emphasis on balancing the benefits of standardization and the need for flexibility. The accompanying downloadable resources encompass a color version of the book with four bonus features: Quick start with Project 2003 that offers a one-page tutorial and three pages of screen prints designed to quickly generate readable and concise project plans Complex project readiness grid that suggests how to manage intricate interrelationships in a project or program environment Project management competency development grid that outlines a program for developing key skills among project managers within an organization Traceability matrix that illustrates how various levels of requirements and final solutions are interrelated This book offers a painless guide to quickly getting business initiatives out of the clouds and onto the ground. Blending the rigor and discipline of project management with the thoroughness of business analysis it shows how to successfully build complement and enhance project management and business analysis in any organization.

GBP 160.00
1

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

Effective Methods for Software Engineering

Effective Methods for Software Engineering

Software is important because it is used by a great many people in companies and institutions. This book presents engineering methods for designing and building software. Based on the author’s experience in software engineering as a programmer in the defense and aerospace industries this book explains how to ensure a software that is programmed operates according to its requirements. It also shows how to develop operate and maintain software engineering capabilities by instilling an engineering discipline to support programming design builds and delivery to customers. This book helps software engineers to:Understand the basic concepts standards and requirements of software engineering. Select the appropriate programming and design techniques. Effectively use software engineering tools and applications. Create specifications to comply with the software standards and requirements. Utilize various methods and techniques to identify defects. Manage changes to standards and requirements. Besides providing a technical view this book discusses the moral and ethical responsibility of software engineers to ensure that the software they design and program does not cause serious problems. Software engineers tend to be concerned with the technical elegance of their software products and tools whereas customers tend to be concerned only with whether a software product meets their needs and is easy and ready to use. This book looks at these two sides of software development and the challenges they present for software engineering. A critical understanding of software engineering empowers developers to choose the right methods for achieving effective results. Effective Methods for Software Engineering guides software programmers and developers to develop this critical understanding that is so crucial in today’s software-dependent society.

GBP 42.99
1

Effective Processes for Quality Assurance

Effective Processes for Quality Assurance

Driving innovation can reduce costs for companies institutions military programs and successful businesses. Quality is key to successful innovation. Delivery of complex products must have high quality to reduce customer problems and defects. This book explains how to integrate Quality Assurance processes to produce compliant product management and gap analysis. It shows how Quality Assurance provides a common operating framework in which best practices improvements and cost avoidance activities can be shared. Effective Processes for Quality Assurance emphasizes improving process execution and reducing operational costs. It also focuses on how Quality Assurance personnel must support companies institutions military programs and successful businesses by encouraging a cooperative proactive approach and ensure compliance through management and team member participation. Lean and Agile can provide a competitive advantage and this practical reference explains how to implement these two principles to deliver products that have fewer defects. It also explains:Quality Assurance methodsMeasuring benefits of Quality Assurance process improvementQuality Assurance performance and improvementRisk managementQuality Assurance improvement with metricsEffective processes for Quality AssuranceQuantitative process performance and commitmentsQuality Assurance plansQuality Assurance for customers and suppliersSupporting software configurationEffective Processes for Quality Assurance covers the critical issues for implementing Quality Assurance processes that can deliver high-quality products successfully.

GBP 42.99
1

Requirements Engineering for Software and Systems

Requirements Engineering for Software and Systems

Solid requirements engineering has increasingly been recognized as the key to improved on-time and on-budget delivery of software and systems projects. New software tools are emerging that are empowering practicing engineers to improve their requirements engineering habits. However these tools are not usually easy to use without significant training. Requirements Engineering for Software and Systems Fourth Edition is intended to provide a comprehensive treatment of the theoretical and practical aspects of discovering analyzing modeling validating testing and writing requirements for systems of all kinds with an intentional focus on software-intensive systems. It brings into play a variety of formal methods social models and modern requirements writing techniques to be useful to practicing engineers. The book is intended for professional software engineers systems engineers and senior and graduate students of software or systems engineering. Since the first edition there have been made many changes and improvements to this textbook. Feedback from instructors students and corporate users was used to correct expand and improve the materials. The fourth edition features two newly added chapters: On Non-Functional Requirements and Requirements Engineering: Road Map to the Future. The latter provides a discussion on the relationship between requirements engineering and such emerging and disruptive technologies as Internet of Things Cloud Computing Blockchain Artificial Intelligence and Affective Computing. All chapters of the book were significantly expanded with new materials that keep the book relevant to current industrial practices. Readers will find expanded discussions on new elicitation techniques agile approaches (e. g. Kanpan SAFe and DEVOps) requirements tools requirements representation risk management approaches and functional size measurement methods. The fourth edition also has significant additions of vignettes exercises and references. Another new feature is scannable QR codes linked to sites containing updates tools videos and discussion forums to keep readers current with the dynamic field of requirements engineering.

GBP 59.99
1

TCP Performance over UMTS-HSDPA Systems

TCP Performance over UMTS-HSDPA Systems

The evolution of the mobile communication market is causing a major increase in data traffic demands. This could lead to disrupted mobility and intermittent degraded channel conditions that contribute to poor transmission control protocol (TCP) performance. TCP Performance over UMTS-HSDPA Systems presents a comprehensive study of the effect of TCP on achieved application bit rate performance and system capacity and shows how to reduce the interaction of wireless networks on TCP with minimal cost. With self-contained chapters the book consists of two main sections. The first several chapters provide background and describe the state of the art for wireless networks emphasizing one of the third-generation (3G) wireless technologies: the universal mobile telecommunications system (UMTS). These chapters also include an analysis of the overall cell capacity for UMTS Release 99 and high-speed downlink packet access (HSDPA) systems. The second section focuses on the interaction of TCP with wireless systems presenting an exhaustive list of TCP versions and link layer solutions that adapt TCP (often modifying the original TCP) to a wireless network. This section also displays mathematical modeling of the interaction of hybrid automatic repeat request (HARQ) and TCP in UMTS networks. While offering information for advanced undergraduate students who are unfamiliar with code division multiple access (CDMA) wireless systems as well as UMTS and HSDPA cellular systems the book also provides extensive coverage of TCP over wireless systems problems and solutions for researchers developers and graduate students.

GBP 56.99
1

Fundamentals of Internet of Things for Non-Engineers

Fundamentals of Internet of Things for Non-Engineers

The IoT is the next manifestation of the Internet. The trend started by connecting computers to computers progressed to connecting people to people and is now moving to connect everything to everything. The movement started like a race—with a lot of fanfare excitement and cheering. We’re now into the work phase and we have to figure out how to make the dream come true. The IoT will have many faces and involve many fields as it progresses. It will involve technology design security legal policy business artificial intelligence design Big Data and forensics; about any field that exists now. This is the reason for this book. There are books in each one of these fields but the focus was always an inch wide and a mile deep. There’s a need for a book that will introduce the IoT to non-engineers and allow them to dream of the possibilities and explore the work venues in this area. The book had to be a mile wide and a few inches deep. The editors met this goal by engaging experts from a number of fields and asking them to come together to create an introductory IoT book. Fundamentals of Internet of Things for Non-Engineers Provides a comprehensive view of the current fundamentals and the anticipated future trends in the realm of Internet of Things from a practitioner’s point of view Brings together a variety of voices with subject matter expertise in these diverse topical areas to provide leaders students and lay persons with a fresh worldview of the Internet of Things and the background to succeed in related technology decision-making Enhances the reader’s experience through a review of actual applications of Internet of Things end points and devices to solve business and civic problems along with notes on lessons learned Prepares readers to embrace the Internet of Things era and address complex business social operational educational and personal systems integration questions and opportunities

GBP 52.99
1

Data Analytics for Internal Auditors

Modeling Software with Finite State Machines A Practical Approach

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

Most academics still wrestle with the publish or perish phenomenon. Based on Dr. Liebowitz’s 25 years serving as the editor-in-chief of a leading international journal along with insights from some of the most knowledgeable journal editors this book shares key lessons learned to help new professors doctoral students and practitioner–scholars increase their chances of being published in selective refereed international journals. It focuses on the key practices needed to ensure journal publication with interesting cases and helpful tips sprinkled throughout the book. A Guide to Publishing for Academics provides useful knowledge from leading journal editors of both traditional and online journals as well as various tiers of journals. Although the focus is mainly in the business and IT areas much of the guidance provided can cross into other fields. The book contains interesting vignettes and do’s and don’ts so that potential authors can understand what goes on behind the scenes once the manuscript arrives on the journal editor’s desk. The book provides constructive guidance on choosing what and where to publish what to consider when writing a title for a paper how to prepare and submit journal manuscripts and how to position a paper for publication. It also has valuable information for current and future journal editors including models of editing and editorial boards editorial coaching advice and editing smart practices. With the information in this book the next generation of academics and practitioner–scholars will be well equipped to overcome the publish or perish phenomenon. | A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

GBP 56.99
1

Social Media Warfare Equal Weapons for All

Active and Programmable Networks for Adaptive Architectures and Services

Active and Programmable Networks for Adaptive Architectures and Services

Most conventional networks are passive with only basic traffic monitoring management routing and congestion control. At best they can be called reactive. Deploying new functions and integrating new standards into these architectures is difficult due to the rigid embedding of software and hardware into the network components. Active and Programmable Networks for Adaptive Architectures and Services introduces a new generation of network technologies and architecture that allows the creation customization and management of new services and applications deployed dynamically into network nodes. Following a brief introduction and historical overview the author outlines the architecture of active and programmable networks discusses the enabling technologies for network programmability in detail and introduces several paradigms and prototypes. He then explores packet scheduling management routing and security and examines active wireless and mobile networks. The final chapter presents several real-world examples of currently deployed active and programmable networks. Several tables present information on different schemes and architectures allowing easy comparison among a range of networking options. Placing the new paradigm in contrast with concepts such as TCP/IP and OSI Active and Programmable Networks for Adaptive Architectures and Services makes it easy to see how these new technologies can help you build more flexible and adaptive networks that can seamlessly integrate new functions.

GBP 56.99
1

AI-Based Data Analytics Applications for Business Management

Configuration Management Second Edition Theory and Application for Engineers Managers and Practitioners

Business Strategies for the Next-Generation Network

Business Strategies for the Next-Generation Network

Carriers and service providers have united around the concept of the Next-Generation Network (NGN). Although leveraging a broad basket of Internet technologies the NGN is not being planned as the next-generation Internet. In its intention and architecture it is more accurately described as Broadband-ISDN release 2. 0. The NGN transition is hard for both practitioners and observers to understand because it weaves together a number of distinct strands: the development of a new architecture and technology base including advanced IT automation systems the development of a portfolio of ‘new wave’ products and services which exploits the power of the new network the design of a new kind of organization which can utilize the higher levels of automation in the NGN and reduce costs and the development of an effective transition plan which can smoothly move operators from their current legacy networks systems and processes to the NGN future. The book begins with a review of the failures of previous attempts by carriers to retool for the future. It describes in detail the technologies and capabilities supporting “new wave’” services focusing particularly on multimedia interactive services TV and Video-on-Demand. The author looks at the IMS layer and how it interworks both downwards into the QoS-enabled IP transport layer and upwards to enable new kinds of applications. However equal attention is addressed to the business models of players in the value chain carriers service providers broadcasters and production companies. The author then examines how carriers have attempted to remodel themselves as IP companies along the dimensions of people processes and IT automation systems describing the lessons to be learned from numerous failures. He identifies more innovativebusiness models exploresPeer-to-Peer networking and reviews the prospects for | Business Strategies for the Next-Generation Network

GBP 54.99
1

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

An organization’s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods safeguards and techniques that help protect an organization from insider computer fraud. Drawing from the author’s vast experience assessing the adequacy of IT security for the banking and securities industries the book presents a practical framework for identifying measuring monitoring and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit process and store sensitive data. The author also examines the symbiotic relationship between the risks controls threats and action plans that should be deployed to enhance the overall information security governance processes. Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process. | Insider Computer Fraud An In-depth Framework for Detecting and Defending against Insider IT Attacks

GBP 56.99
1

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

Strategic planning outlines the path between the current status of the business and the desired status. It requires the business to identify its objectives and goals and then make the correct decisions to achieve these objectives and goals. This book provides a complete set of practical strategic planning techniques and tools. It explains how and in what circumstances to use particular tools and how to target them to achieve effective results. Systematic Strategic Planning: A Comprehensive Framework for Implementation Control and Evaluation describes a framework of phases through which each project passes a pattern of procedures for straight-forward planning and the fundamentals involved in any strategic planning project. Designed to be simple to understand and easy to use the book presents techniques case studies and working forms to guide you through preparing a strategic plan for your existing or future business. The book is organized into four parts:Part I explains the steps to take before and after starting the strategic planning work. Part II provides the overall framework and characteristics of the simplified and full versions of systematic strategic planning. Part III describes the sections of systematic strategic planning in detail. Part IV provides a framework for implementation control and evaluation functions in a systematic manner. This book is designed to help both experienced strategic planners and other types of professionals who are faced with creating a strategic plan for their business. The processes and techniques described should be universally applicable to any type of business. With the information in this book you will be well-equipped to create effective strategic plans that drive your business forward. | Systematic Strategic Planning A Comprehensive Framework for Implementation Control and Evaluation

GBP 56.99
1

ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

ERP Systems for Manufacturing Supply Chains: Applications Configuration and Performance provides insight into the core architecture modules and process support of ERP systems used in a manufacturing supply chain. This book explains the building blocks of an ERP system and how they can be used to increase performance of manufacturing supply chains. Starting with an overview of basic concepts of supply chain and ERP systems the book delves into the core ERP modules that support manufacturing facilities and organizations. It examines each module’s structure and functionality as well as the process support the module provides. Cases illustrate how the modules can be applied in manufacturing environments. Also covered is how the ERP modules can be configured to support manufacturing supply chains. Setting up an ERP system to support the supply chain within single manufacturing facility provides insight into how an ERP system is used in the smallest of manufacturing enterprises as well as lays the foundation for ERP systems in manufacturing organizations. The book then supplies strategies for larger manufacturing enterprises and discusses how ERP systems can be used to support a complete manufacturing supply chain across different facilities and companies. The ERP systems on the market today tend to use common terminology and naming for describing specific functions and data units in the software. However there are differences among packages. The book discusses various data and functionalities found in different ERP-software packages and uses generic and descriptive terms as often as possible to make these valid for as many ERP systems as possible. Filled with insight into ERP system’s core modules and functions this book shows how ERP systems can be applied to support a supply chain in the smallest of manufacturing organizations that only consist of a single manufacturing facility as well as large enterprises where the manufacturing supply chain crosses multiple facilities and companies. | ERP Systems for Manufacturing Supply Chains Applications Configuration and Performance

GBP 42.99
1

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership Global Skills for Personal and Business Success

Borderless Leadership is a must read for anyone involved in international business. It enables beginners to avoid common pitfalls and seasoned executives will recognize many of their own mistakes and benefit from the frameworks Dr. Kraljevic provides. — Professor Sibrandes Poppema President University of Groningen NetherlandsI just cannot stop recommending this book to ever so many people—my academic colleagues industry colleagues friends in the government former students students young CEOs of start-ups that I mentor and my media friends. The book is very special deep with several gems of ideas told in absorbing narrative; neither a text book nor a cook book but a candid sincere and extremely effective set of real world lessons for so many global citizens. Dr. Kraljevic uses personal examples from across continents in diverse industry settings. All I can say is this: Go grab the book on a Thursday night and you will have a wonderful weekend reading this amazing book. — Professor S. Sadagopan Director International Institute of Information Technology of Bangalore India Everything I know about international markets I owe it to Zlática. — Sue Payne Former ExxonMobil Area Manager U. S. & Mexico As the global village rapidly expands understanding borderless leadership becomes a prerequisite for international success in this 21st century. Kraljevic brings her vast and unique worldly experiences to open your mind with practical treasures thoughtful how-to models and conceptual insights. Find out about the human fractal on your journey to becoming a borderless leader. — Lane Sloan Former President Shell Chemical Company USA Studies consistently show that international partnerships between organizations fail to generate expected results at a significant cost. The leading cause behind this failure is lack of trust among people at all levels within organizations. Borderless Leadership explores the disparity that exists between the ways that the West and other cultures conduct business. The book’s premise is that if one cannot control the events or circumstances one must learn how to control reactions to new environments. Using real-life examples the book illustrates how to build trust and rapport with business partners across borders and establish relationships that help businesses grow. The book is about achieving success with and through total strangers as you progress from awareness to understanding and from understanding to acquiring internalizing and applying new knowledge so you bring your approach to life up to date. Only then can you transform obstacles into unsuspected opportunities that will have a positive impact on your personal and business success. | Borderless Leadership Global Skills for Personal and Business Success

GBP 42.99
1

Oracle Database Programming with Java Ideas Designs and Implementations

Oracle Database Programming with Java Ideas Designs and Implementations

Databases have become an integral part of modern life. Today’s society is an information-driven society and database technology has a direct impact on all aspects of daily life. Decisions are routinely made by organizations based on the information collected and stored in databases. Database management systems such as Oracle are crucial to apply data in industrial or commercial systems. Equally crucial is a graphical user interface (GUI) to enable users to access and manipulate data in databases. The Apache NetBeans IDE with Java is an ideal candidate for developing a GUI with programming functionality. Oracle Database Programming with Java: Ideas Designs and Implementations is written for college students and software programmers who want to develop practical and commercial database programming with Java and relational databases such as Oracle Database XE 18c. The book details practical considerations and applications of database programming with Java and is filled with authentic examples as well as detailed explanations. Advanced topics in Java Web like Java Web Applications and Java Web Services are covered in real project examples to show how to handle the database programming issues in the Apache NetBeans IDE environment. This book features: A real sample database CSE _ DEPT which is built with Oracle SQL Developer provided and used throughout the book Step by step detailed illustrations and descriptions of how to design and build a practical relational database Fundamental and advanced Java database programming techniques practical to both beginning students and experienced programmers Updated Java desktop and Web database programming techniques such as Java Enterprise Edition 7 JavaServer Pages JavaServer Faces Enterprise Java Beans Web applications and Web services including GlassFish and Tomcat Web servers More than 30 real database programming projects with detailed illustrations Actual JDBC APIs and JDBC drivers along with code explanations Homework and selected solutions for each chapter to strengthen and improve students’ learning and understanding of the topics they have studied | Oracle Database Programming with Java Ideas Designs and Implementations

GBP 82.99
1

Technologies for Sustainable Global Higher Education

Technologies for Sustainable Global Higher Education

Digital technologies are influencing the way we learn live work and exist in different contexts of society in the digital age. There are a variety of learning systems that support innovative digital approaches and universities and organizations around the world are investing in building their own e-learning platforms. Digital technologies are enabling wider access to education and new markets for student recruitment resulting in increased income prospects for global higher education institutions. Technology enables numerous data and information sources which give greater access to information and data. It also enables highly virtual environments which impact teaching and the classroom. The widespread use and application of digital technologies in the teaching and learning process provoke pedagogical inquiry and mediation. It is in this context that Technologies for Sustainable Global Higher Education focuses on analyzing the application of digital technologies in the teaching–learning process. The chapters in this edited collection seek to answer questions relevant to the context of higher education such as: What is the concept of digital technologies? How is digital technology used to mediate the learning process? What technologies are used to qualify education in higher education? This book provides answers to these questions by focusing on issues central to improving education through digital technologies digital learning and pedagogical practices in digital education. It also provides case studies of higher education institutions.

GBP 110.00
1

Secure Data Provenance and Inference Control with Semantic Web

Secure Data Provenance and Inference Control with Semantic Web

With an ever-increasing amount of information on the web it is critical to understand the pedigree quality and accuracy of your data. Using provenance you can ascertain the quality of data based on its ancestral data and derivations track back to sources of errors allow automatic re-enactment of derivations to update data and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes products tools and standards for secure data management secure Semantic Web secure web services and secure cloud computing.

GBP 56.99
1

The Complete Guide for CPP Examination Preparation

GBP 31.99
1