Skip to main content

Books in Information systems applications

Digital Universalism and Cultural Diversity

  • 1st Edition
  • December 1, 2019
  • Laurence Favier
  • English
Digital Universalism and Cultural Diversity details the concept of digital universalism as a wonderful horizon of an interconnected planet (men and objects) and the expression of a cultural hegemony that formats cultural diversity. It presents a few essential directions that are at the core of the debate between digital universalism and cultural diversity and the future perspectives to fathom. As the smartphone and its interfaces are at the center of most of our activities, it is important that we understand our behaviors and how they fuel connected digital devices. This book tackles these questions in the rapidly moving digital era.

Cognitive Information Systems in Management Sciences

  • 1st Edition
  • February 28, 2017
  • Lidia Dominika Ogiela
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 8 0 3 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 7 5 - 8
Cognitive Information Systems in Management Sciences summarizes the body of work in this area, taking an analytical approach to interpreting the data, while also providing an approach that can be used for practical implementation in the fields of computing, economics, and engineering. Using numerous illustrative examples, and following both theoretical and practical results, Dr. Lidia Ogiela discusses the concepts and principles of cognitive information systems, the relationship between intelligent computer data analysis, and how to utilize computational intelligent approaches to enhance information retrieval. Real world implantation use cases round out the book, with valuable scenarios covering management science, computer science, and engineering. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS  

Sentiment Analysis in Social Networks

  • 1st Edition
  • September 15, 2016
  • Federico Alberto Pozzi + 3 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 4 1 2 - 4
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 4 3 8 - 4
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker. Sentiment analysis has gained even more value with the advent and growth of social networking. Sentiment Analysis in Social Networks begins with an overview of the latest research trends in the field. It then discusses the sociological and psychological processes underling social network interactions. The book explores both semantic and machine learning models and methods that address context-dependent and dynamic text in online social networks, showing how social network streams pose numerous challenges due to their large-scale, short, noisy, context- dependent and dynamic nature. Further, this volume: Takes an interdisciplinary approach from a number of computing domains, including natural language processing, machine learning, big data, and statistical methodologies Provides insights into opinion spamming, reasoning, and social network analysis Shows how to apply sentiment analysis tools for a particular application and domain, and how to get the best results for understanding the consequences Serves as a one-stop reference for the state-of-the-art in social media analytics

Building the Agile Enterprise

  • 2nd Edition
  • September 8, 2016
  • Fred A. Cummins
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 5 1 6 0 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 2 9 2 - 1
Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition covers advances that make technology more powerful and pervasive while, at the same time, improving alignment of technology with business. Using numerous examples, illustrations, and case studies, Fred Cummins, an industry expert, author and former fellow with EDS and Hewlett Packard, updates his first edition incorporating the following industry developments: The ubiquitous use of the Internet along with intelligent, mobile devices, which have enabled everyone and everything to be connected anytime, anywhere The emergence of a “business architecture” discipline that has driven improvements in business design and transformation practices The development of CMMN (Case Management Model and Notation) that will provide automation to support the collaboration of knowledge workers and managers The development of VDML (Value Delivery Modeling Language) that supports modeling of business design from a management perspective The importance of “big data” management and analysis as a new source of insight into evolution of the business and the ecosystem How the architecture of the agile enterprise and business modeling change enterprise governance, management and innovation Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition is a must have reference for business leaders, CTOs; business architects, information systems architects and business process modeling professionals who wish to close the gap between strategic planning and business operations as well as the gap between business and IT and enhance the creation and delivery of business value.

Eleventh Hour CISSP®

  • 3rd Edition
  • September 3, 2016
  • Joshua Feldman + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 1 1 2 4 8 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 1 1 3 7 7 - 6
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.

Discover Digital Libraries

  • 1st Edition
  • July 21, 2016
  • Iris Xie + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 4 1 7 1 1 2 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 1 0 5 - 7
Discover Digital Libraries: Theory and Practice is a book that integrates both research and practice concerning digital library development, use, preservation, and evaluation. The combination of current research and practical guidelines is a unique strength of this book. The authors bring in-depth expertise on different digital library issues and synthesize theoretical and practical perspectives relevant to researchers, practitioners, and students. The book presents a comprehensive overview of the different approaches and tools for digital library development, including discussions of the social and legal issues associated with digital libraries. Readers will find current research and the best practices of digital libraries, providing both US and international perspectives on the development of digital libraries and their components, including collection, digitization, metadata, interface design, sustainability, preservation, retrieval, and evaluation of digital libraries.

Information Security Science

  • 1st Edition
  • June 21, 2016
  • Carl Young
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 9 6 4 6 - 8
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.

Entity Information Life Cycle for Big Data

  • 1st Edition
  • April 20, 2015
  • John R. Talburt + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 5 3 7 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 6 6 5 - 8
Entity Information Life Cycle for Big Data walks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This book explains big data’s impact on MDM and the critical role of entity information management system (EIMS) in successful MDM. Expert authors Dr. John R. Talburt and Dr. Yinle Zhou provide a thorough background in the principles of managing the entity information life cycle and provide practical tips and techniques for implementing an EIMS, strategies for exploiting distributed processing to handle big data for EIMS, and examples from real applications. Additional material on the theory of EIIM and methods for assessing and evaluating EIMS performance also make this book appropriate for use as a textbook in courses on entity and identity management, data management, customer relationship management (CRM), and related topics.

Hacking Web Intelligence

  • 1st Edition
  • April 13, 2015
  • Sudhanshu Chauhan + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 8 6 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 1 2 - 2
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.

Dynamic Modelling of Information Systems

  • 1st Edition
  • June 28, 2014
  • K.M. van Hee + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 8 4 - 1
The use of dynamic models in the development of information systems is regarded by many researchers as a promising issue in design support. Modelling the dynamics of information systems is likely to improve the quality and the performance of the design products. Dynamic modelling as a new approach for dynamic analysis of problems within an existing situation, and design and evaluation of different solution strategies may overcome many difficulties in the design process.