Skip to main content

Books in Information systems

This portfolio covers enterprise systems, cloud computing, and information management strategies. Featuring research, case studies, and practical frameworks, it supports IT professionals, managers, and researchers in optimizing organizational information flows. Addressing digital transformation, cybersecurity, and data governance, these resources foster effective, secure, and innovative information system solutions.

  • Temporal Data Mining via Unsupervised Ensemble Learning

    • 1st Edition
    • Yun Yang
    • English
    Temporal Data Mining via Unsupervised Ensemble Learning provides the principle knowledge of temporal data mining in association with unsupervised ensemble learning and the fundamental problems of temporal data clustering from different perspectives. By providing three proposed ensemble approaches of temporal data clustering, this book presents a practical focus of fundamental knowledge and techniques, along with a rich blend of theory and practice. Furthermore, the book includes illustrations of the proposed approaches based on data and simulation experiments to demonstrate all methodologies, and is a guide to the proper usage of these methods. As there is nothing universal that can solve all problems, it is important to understand the characteristics of both clustering algorithms and the target temporal data so the correct approach can be selected for a given clustering problem. Scientists, researchers, and data analysts working with machine learning and data mining will benefit from this innovative book, as will undergraduate and graduate students following courses in computer science, engineering, and statistics.
  • Sentiment Analysis in Social Networks

    • 1st Edition
    • Federico Alberto Pozzi + 3 more
    • English
    The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and sentiments, in order to create structured and actionable knowledge to be used by either a decision support system or a decision maker. Sentiment analysis has gained even more value with the advent and growth of social networking. Sentiment Analysis in Social Networks begins with an overview of the latest research trends in the field. It then discusses the sociological and psychological processes underling social network interactions. The book explores both semantic and machine learning models and methods that address context-dependent and dynamic text in online social networks, showing how social network streams pose numerous challenges due to their large-scale, short, noisy, context- dependent and dynamic nature. Further, this volume: Takes an interdisciplinary approach from a number of computing domains, including natural language processing, machine learning, big data, and statistical methodologies Provides insights into opinion spamming, reasoning, and social network analysis Shows how to apply sentiment analysis tools for a particular application and domain, and how to get the best results for understanding the consequences Serves as a one-stop reference for the state-of-the-art in social media analytics
  • Building the Agile Enterprise

    With Capabilities, Collaborations and Values
    • 2nd Edition
    • Fred A. Cummins
    • English
    Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition covers advances that make technology more powerful and pervasive while, at the same time, improving alignment of technology with business. Using numerous examples, illustrations, and case studies, Fred Cummins, an industry expert, author and former fellow with EDS and Hewlett Packard, updates his first edition incorporating the following industry developments: The ubiquitous use of the Internet along with intelligent, mobile devices, which have enabled everyone and everything to be connected anytime, anywhere The emergence of a “business architecture” discipline that has driven improvements in business design and transformation practices The development of CMMN (Case Management Model and Notation) that will provide automation to support the collaboration of knowledge workers and managers The development of VDML (Value Delivery Modeling Language) that supports modeling of business design from a management perspective The importance of “big data” management and analysis as a new source of insight into evolution of the business and the ecosystem How the architecture of the agile enterprise and business modeling change enterprise governance, management and innovation Building the Agile Enterprise with Capabilities, Collaborations and Values, Second Edition is a must have reference for business leaders, CTOs; business architects, information systems architects and business process modeling professionals who wish to close the gap between strategic planning and business operations as well as the gap between business and IT and enhance the creation and delivery of business value.
  • Eleventh Hour CISSP®

    Study Guide
    • 3rd Edition
    • Joshua Feldman + 2 more
    • English
    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.
  • The Data and Analytics Playbook

    Proven Methods for Governed Data and Analytic Quality
    • 1st Edition
    • Lowell Fryman + 2 more
    • English
    The Data and Analytics Playbook: Proven Methods for Governed Data and Analytic Quality explores the way in which data continues to dominate budgets, along with the varying efforts made across a variety of business enablement projects, including applications, web and mobile computing, big data analytics, and traditional data integration. The book teaches readers how to use proven methods and accelerators to break through data obstacles to provide faster, higher quality delivery of mission critical programs. Drawing upon years of practical experience, and using numerous examples and an easy to understand playbook, Lowell Fryman, Gregory Lampshire, and Dan Meers discuss a simple, proven approach to the execution of multiple data oriented activities. In addition, they present a clear set of methods to provide reliable governance, controls, risk, and exposure management for enterprise data and the programs that rely upon it. In addition, they discuss a cost-effective approach to providing sustainable governance and quality outcomes that enhance project delivery, while also ensuring ongoing controls. Example activities, templates, outputs, resources, and roles are explored, along with different organizational models in common use today and the ways they can be mapped to leverage playbook data governance throughout the organization.
  • Discover Digital Libraries

    Theory and Practice
    • 1st Edition
    • Iris Xie + 1 more
    • English
    Discover Digital Libraries: Theory and Practice is a book that integrates both research and practice concerning digital library development, use, preservation, and evaluation. The combination of current research and practical guidelines is a unique strength of this book. The authors bring in-depth expertise on different digital library issues and synthesize theoretical and practical perspectives relevant to researchers, practitioners, and students. The book presents a comprehensive overview of the different approaches and tools for digital library development, including discussions of the social and legal issues associated with digital libraries. Readers will find current research and the best practices of digital libraries, providing both US and international perspectives on the development of digital libraries and their components, including collection, digitization, metadata, interface design, sustainability, preservation, retrieval, and evaluation of digital libraries.
  • e-Health Systems

    Theory and Technical Applications
    • 1st Edition
    • Joel J.P.C. Rodrigues + 2 more
    • English
    e-Health Systems: Theory, Advances and Technical Applications offers a global vision of all the parties involved with e-health system deployment and its operation process, presenting the state of the art in major trends for improving healthcare quality and efficiency of healthcare management. The authors focus on ICT technologies and solutions for health management and healthcare applications, specifically emerging ICT to help reduce costs and improve healthcare quality, and healthcare trends in consumer empowerment and information-rich "Smart Care", with ubiquitous care access from anywhere, at any time, by any authorized person(s) when needed. Split into two parts, this book provides a comprehensive introduction to the concepts of e-health and delves into the processes carried out to store information, as well as the standards that are used; the authors explore applications and implementation of e-health systems, explaining in depth the types of wireless networks and security protocols employed to convert these systems into robust solutions avoiding any kind of data corruption and vulnerabilities.
  • Perspectives on Data Science for Software Engineering

    • 1st Edition
    • Tim Menzies + 2 more
    • English
    Perspectives on Data Science for Software Engineering presents the best practices of seasoned data miners in software engineering. The idea for this book was created during the 2014 conference at Dagstuhl, an invitation-only gathering of leading computer scientists who meet to identify and discuss cutting-edge informatics topics. At the 2014 conference, the concept of how to transfer the knowledge of experts from seasoned software engineers and data scientists to newcomers in the field highlighted many discussions. While there are many books covering data mining and software engineering basics, they present only the fundamentals and lack the perspective that comes from real-world experience. This book offers unique insights into the wisdom of the community’s leaders gathered to share hard-won lessons from the trenches. Ideas are presented in digestible chapters designed to be applicable across many domains. Topics included cover data collection, data sharing, data mining, and how to utilize these techniques in successful software projects. Newcomers to software engineering data science will learn the tips and tricks of the trade, while more experienced data scientists will benefit from war stories that show what traps to avoid.
  • Information Security Science

    Measuring the Vulnerability to Data Compromises
    • 1st Edition
    • Carl Young
    • English
    Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
  • Formative Assessment, Learning Data Analytics and Gamification

    In ICT Education
    • 1st Edition
    • Santi Caballé + 1 more
    • English
    Formative Assessment, Learning Data Analytics and Gamification: An ICT Education discusses the challenges associated with assessing student progress given the explosion of e-learning environments, such as MOOCs and online courses that incorporate activities such as design and modeling. This book shows educators how to effectively garner intelligent data from online educational environments that combine assessment and gamification. This data, when used effectively, can have a positive impact on learning environments and be used for building learner profiles, community building, and as a tactic to create a collaborative team. Using numerous illustrative examples and theoretical and practical results, leading international experts discuss application of automatic techniques for e-assessment of learning activities, methods to collect, analyze, and correctly visualize learning data in educational environments, applications, benefits and challenges of using gamification techniques in academic contexts, and solutions and strategies for increasing student participation and performance.