Skip to main content

Books in Information systems

101-110 of 254 results in All results

Writing for Interaction

  • 1st Edition
  • February 26, 2013
  • Linda Newman Lior
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 9 4 8 1 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 3 9 4 8 4 4 - 1
Writing for Interaction focuses on the art of creating the information experience as it appears within software and web applications, specifically in the form of user interface text. It also provides strategies for ensuring a consistent, positive information experience across a variety of delivery mechanisms, such as online help and social media. Throughout this book, you'll learn simple techniques for writing consistent text with the right tone, how to select content delivery mechanisms, and how straightforward, clear layouts help your customer interact with your application. Divided into five sections, the book completely covers the information experience design process from beginning to end. You'll cover everything from understanding your users and their needs, to creating personas, designing the IX strategy, creating your information, and evaluating the resulting information experience. This is your one-stop reference for information experience!

Managing Data in Motion

  • 1st Edition
  • February 26, 2013
  • April Reeve
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 9 7 1 6 7 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 3 9 7 7 9 1 - 5
Managing Data in Motion describes techniques that have been developed for significantly reducing the complexity of managing system interfaces and enabling scalable architectures. Author April Reeve brings over two decades of experience to present a vendor-neutral approach to moving data between computing environments and systems. Readers will learn the techniques, technologies, and best practices for managing the passage of data between computer systems and integrating disparate data together in an enterprise environment. The average enterprise's computing environment is comprised of hundreds to thousands computer systems that have been built, purchased, and acquired over time. The data from these various systems needs to be integrated for reporting and analysis, shared for business transaction processing, and converted from one format to another when old systems are replaced and new systems are acquired. The management of the "data in motion" in organizations is rapidly becoming one of the biggest concerns for business and IT management. Data warehousing and conversion, real-time data integration, and cloud and "big data" applications are just a few of the challenges facing organizations and businesses today. Managing Data in Motion tackles these and other topics in a style easily understood by business and IT managers as well as programmers and architects.

Applied Cyber Security and the Smart Grid

  • 1st Edition
  • February 26, 2013
  • Eric D. Knapp + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 9 9 8 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 4 6 3 8 - 2
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

The Basics of Digital Privacy

  • 1st Edition
  • February 17, 2013
  • Denny Cherry
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 0 1 1 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 1 5 2 - 3
Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who’s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!

Computation and Storage in the Cloud

  • 1st Edition
  • December 31, 2012
  • Dong Yuan + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 0 7 7 6 7 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 4 0 7 8 7 9 - 6
Computation and Storage in the Cloud is the first comprehensive and systematic work investigating the issue of computation and storage trade-off in the cloud in order to reduce the overall application cost. Scientific applications are usually computation and data intensive, where complex computation tasks take a long time for execution and the generated datasets are often terabytes or petabytes in size. Storing valuable generated application datasets can save their regeneration cost when they are reused, not to mention the waiting time caused by regeneration. However, the large size of the scientific datasets is a big challenge for their storage. By proposing innovative concepts, theorems and algorithms, this book will help bring the cost down dramatically for both cloud users and service providers to run computation and data intensive scientific applications in the cloud. Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users Describes several novel strategies for storing application datasets in the cloud Includes real-world case studies of scientific research applications

Introduction to Electronic Document Management Systems

  • 1st Edition
  • December 2, 2012
  • Bozzano G Luisa
  • English
  • eBook
    9 7 8 - 0 - 3 2 3 - 1 4 0 6 2 - 1
Introduction to Electronic Document Management Systems provides an in-depth overview of the technology of electronic document management using modern electronic image processing. It will prove to be a key source of information for management and technical staff of organizations considering a transformation from traditional micrographics-based document storage and retrieval systems to new electronic document capture systems. It will also be useful for those organizations considering improving productivity through electronic management of large volumes of data records.

Databases for Production Management

  • 1st Edition
  • December 2, 2012
  • R. Companys + 2 more
  • English
  • eBook
    9 7 8 - 0 - 4 4 4 - 5 9 8 7 8 - 3
Dealing with many aspects of the design, implementation and operation of databases for production management systems, this book presents research that is important to all those presently concerned with the computerisation of production management.

Logging and Log Management

  • 1st Edition
  • November 29, 2012
  • Kevin Schmidt + 2 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 6 3 5 - 3
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 3 6 - 0
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers.

FISMA and the Risk Management Framework

  • 1st Edition
  • November 27, 2012
  • Daniel R. Philpott + 1 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 6 4 1 - 4
  • eBook
    9 7 8 - 1 - 5 9 7 4 9 - 6 4 2 - 1
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems.

Data Insights

  • 1st Edition
  • November 13, 2012
  • Hunter Whitney
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 8 7 7 9 3 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 7 7 9 4 - 9
Data Insights: New Ways to Visualize and Make Sense of Data offers thought-provoking insights into how visualization can foster a clearer and more comprehensive understanding of data. The book offers perspectives from people with different backgrounds, including data scientists, statisticians, painters, and writers. It argues that all data is useless, or misleading, if we do not know what it means.Organized into seven chapters, the book explores some of the ways that data visualization and other emerging approaches can make data meaningful and therefore useful. It also discusses some fundamental ideas and basic questions in the data lifecycle; the process of interactions between people, data, and displays that lead to better questions and more useful answers; and the fundamentals, origins, and purposes of the basic building blocks that are used in data visualization. The reader is introduced to tried and true approaches to understanding users in the context of user interface design, how communications can get distorted, and how data visualization is related to thinking machines. Finally, the book looks at the future of data visualization by assessing its strengths and weaknesses. Case studies from business analytics, healthcare, network monitoring, security, and games, among others, as well as illustrations, thought-provoking quotes, and real-world examples are included.This book will prove useful to computer professionals, technical marketing professionals, content strategists, Web and product designers, and researchers.