Résultats de recherche de titre
Articles 141 à 160 sur 3154
Computer Games and Software Engineering (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)
Par Kendra M. L. Cooper, Walt Scacchi. 2015
Computer games represent a significant software application domain for innovative research in software engineering techniques and technologies. Game developers, whether…
focusing on entertainment-market opportunities or game-based applications in non-entertainment domains, thus share a common interest with software engineers and developers on how toMultimedia Ontology: Representation and Applications
Par Santanu Chaudhury, Anupama Mallik, Hiranmay Ghosh. 2016
The result of more than 15 years of collective research, Multimedia Ontology: Representation and Applications provides a theoretical foundation for…
understanding the nature of media data and the principles involved in its interpretation. The book presents a unified approach to recent advances in multimedia and explains how a multimedia ontology canThe Practical Guide to HIPAA Privacy and Security Compliance
Par Rebecca Herold, Kevin Beaver. 2015
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is…
a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules. Updated andThe Asia-Pacific Century: Challenges and Opportunities
Par Adam B. Lowther. 2013
When Secretary of State Hillary Clinton published "America's Pacific Century" in Foreign Policy magazine in November 2011, the administration was…
clearly indicating to domestic and international audiences that the United States is beginning a pivot toward the Asia-Pacific. Clinton's article served as a spark for renewed interest in the nation's AsiPhysical Security and Safety: A Field Guide for the Practitioner (Occupational Safety & Health Guide Series #17)
Par Truett A. Ricks, Bobby E. Ricks, Jeff Dingle. 2015
How-To Guide Written By Practicing ProfessionalsPhysical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of…
safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the procedures and processes needed for loss reduction, pHoneypots and Routers: Collecting Internet Attacks
Par Mohssen Mohammed, Habib-Ur Rehman. 2016
As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more…
and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to accomplish this using hRisk Analysis and Security Countermeasure Selection
Par Thomas L. Norman CPP/PSP/CSC. 2016
This new edition of Risk Analysis and Security Countermeasure Selection presents updated case studies and introduces existing and new methodologies…
and technologies for addressing existing and future threats. It covers risk analysis methodologies approved by the U.S. Department of Homeland Security and shows how to apply them to other organizationsPfMP Exam Practice Tests and Study Guide (Best Practices in Portfolio, Program, and Project Management)
Par Levin Pmp PgMP, Levin Pmp PgMP. 2014
Recognizing the importance of portfolio management, the Project Management Institute (PMI) has launched a new certification entitled the Portfolio Management…
Professional (PfMP). PfMP Exam Practice Tests and Study Guide is the most comprehensive resource available to help you prepare for and pass the PfMP certification exam. It provides coveraProgram Governance
Par Muhammad Ehsan Khan. 2015
Although program management has received much attention in recent books, program governance remains a relatively new subject. While selected books…
and standards touch on this important topic, few are devoted to program governance as a subject. This book fills that need.Program Governance provides a thorough understanding of governance while reviewiLeveraging the Wisdom of the Crowd in Software Testing
Par Mukesh Sharma, Rajini Padmanaban. 2015
Its scale, flexibility, cost effectiveness, and fast turnaround are just a few reasons why crowdsourced testing has received so much…
attention lately. While there are a few online resources that explain what crowdsourced testing is all about, there's been a need for a book that covers best practices, case studies, and the future of this technique. Filling this need, Leveraging the Wisdom of the Crowd in Software Testing shows you how to leverage the wisdom of the crowd in your software testing process. Its comprehensive coverage includes the history of crowdsourcing and crowdsourced testing, implementation practices, and future trends. The book discusses best practices in implementation-explaining what, when, and how to crowdsource in a testing effort. It also includes case studies that illustrate how both product and service companies have successfully applied crowdsourcing in their testing programs. Explaining how to use the combined advantages of crowdsourcing and cloud computing for software testing, the book examines various engagement models in which you could implement crowdsourced testing. It addresses effective defect management in crowdsourced testing and considers both the business and engineering aspects of crowdsourced testing. The book explores the challenges, limitations, and situations when crowdsourced testing will not work and provides powerful best practices for mitigating the constraints and challenges, including how to build a crowdsourcing platform to test software products. Covering career opportunities for crowd testers, the book concludes by taking a look at the need to build a crowdsourced testing ecosystem, who the players of such an ecosystem would be, and who would need to champion such an effort.Successful Program Management: Complexity Theory, Communication, and Leadership (Best Practices in Portfolio, Program, and Project Management #7)
Par Wanda Curlee, Robert Lee Gordon. 2014
Complexity theory is a great, untapped resource in the field of management. Experts agree that it can be a powerful…
tool for managing complex and virtual programs, but there is little material available to guide program managers on how to use complexity theory to communicate and lead effectively.Filling this void, Successful Program Management: ComDescribing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the…
Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts-which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition, support, and maintenance Examines hardware and software warranty and support models Considers finance and accounting issues for maintenance and support Spells out technology product details Explains postwarranty support and maintenance Provides the understanding to better negotiate with vendor sales teams Illustrating the types of problems typically experienced during product use, the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term, this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating.While many police officers undertake their work conforming to the highest ethical standards, the fact remains that unethical police conduct…
continues to be a recurring problem around the world. With examples from a range of jurisdictions, Police Corruption: Preventing Misconduct and Maintaining Integrity examines the causes of police misconduct andFading and Interference Mitigation in Wireless Communications
Par Stefan Panic, Mihajlo Stefanovic, Jelena Anastasov, Petar Spalevic. 2013
Fading and Interference Mitigation in Wireless Communications will help readers stay up to date with recent developments in the performance…
analysis of space diversity reception over fading channels in the presence of cochannel interference. It presents a unified method for computing the performance of digital communication systems characterized by a variety of modulation and detection types and channel models. The book includes coverage of multichannel reception in various fading environments, influence of cochannel interference, and macrodiversity reception when channels are simultaneously affected by various types of fading and shadowing.Describes global best practices, competencies, and standards of superior project organizations based on research conducted by the Top 500 Project…
Management Forum. It emphasizes the selection process, performance evaluation, and personnel development to provide the key elements for adjusting and adapting to flexible conditions. The text also highliBusiness Continuity Planning: A Project Management Approach
Par Ralph L. Kliem, Gregg D. Richie. 2016
If a major event such as a terrorist attack, 7.2 earthquake, tsunami, or hacker attack were to disrupt business operations,…
would your organization be prepared to respond to the financial, political, and social impacts? In order for your company to be resilient, it must be ready to respond and recover quickly from the impact of such events. BusinesSecuring Cyber-Physical Systems
Par Al-Sakib Khan Pathan. 2016
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control.…
Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployLearn to Play: Designing Tutorials for Video Games
Par Matthew M. White. 2014
See How to Unobtrusively Incorporate Good Teaching into Your Game's MechanicsLearn to Play: Designing Tutorials for Video Games shows how…
to embed a tutorial directly into your game design mechanics so that your games naturally and comfortably teach players to have fun. The author deciphers years of research in game studies, education, psychology,This book describes patterns of language and culture in human-computer interaction (HCI). Through numerous examples, it shows why these patterns…
matter and how to exploit them to design a better user experience (UX) with computer systems. It provides scientific information on the theoretical and practical areas of the interaction and communication design for research experts and industry practitioners and covers the latest research in semiotics and cultural studies, bringing a set of tools and methods to benefit the process of designing with the cultural background in mind.Ready Technology: Fast-Tracking New Business Technologies
Par Stephen J. Andriole. 2015
Companies understand that their ability to compete is tied directly to their ability to leverage the very latest technology advances.…
Fortunately, deploying new technology has never been easier, primarily due to early maturity and cloud delivery. One approach that is helping companies rapidly pilot and affordably deploy new technologies is ready te