Skip to main content

Books in Information systems

41-50 of 254 results in All results

Understanding Your Users

  • 2nd Edition
  • May 20, 2015
  • Kathy Baxter + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 3 2 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 6 0 9 - 2
This new and completely updated edition is a comprehensive, easy-to-read, "how-to" guide on user research methods. You'll learn about many distinct user research methods and also pre- and post-method considerations such as recruiting, facilitating activities or moderating, negotiating with product developments teams/customers, and getting your results incorporated into the product. For each method, you'll understand how to prepare for and conduct the activity, as well as analyze and present the data - all in a practical and hands-on way. Each method presented provides different information about the users and their requirements (e.g., functional requirements, information architecture). The techniques can be used together to form a complete picture of the users' needs or they can be used separately throughout the product development lifecycle to address specific product questions. These techniques have helped product teams understand the value of user experience research by providing insight into how users behave and what they need to be successful. You will find brand new case studies from leaders in industry and academia that demonstrate each method in action. This book has something to offer whether you are new to user experience or a seasoned UX professional. After reading this book, you'll be able to choose the right user research method for your research question and conduct a user research study. Then, you will be able to apply your findings to your own products.

Securing SQL Server

  • 3rd Edition
  • April 23, 2015
  • Denny Cherry
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 2 7 5 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 3 7 5 - 5
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.

Entity Information Life Cycle for Big Data

  • 1st Edition
  • April 20, 2015
  • John R. Talburt + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 5 3 7 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 6 6 5 - 8
Entity Information Life Cycle for Big Data walks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This book explains big data’s impact on MDM and the critical role of entity information management system (EIMS) in successful MDM. Expert authors Dr. John R. Talburt and Dr. Yinle Zhou provide a thorough background in the principles of managing the entity information life cycle and provide practical tips and techniques for implementing an EIMS, strategies for exploiting distributed processing to handle big data for EIMS, and examples from real applications. Additional material on the theory of EIIM and methods for assessing and evaluating EIMS performance also make this book appropriate for use as a textbook in courses on entity and identity management, data management, customer relationship management (CRM), and related topics.

Hacking Web Intelligence

  • 1st Edition
  • April 13, 2015
  • Sudhanshu Chauhan + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 8 6 7 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 9 1 2 - 2
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.

Multi-Domain Master Data Management

  • 1st Edition
  • March 21, 2015
  • Mark Allen + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 8 3 5 - 5
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 1 4 7 - 8
Multi-Domain Master Data Management delivers practical guidance and specific instruction to help guide planners and practitioners through the challenges of a multi-domain master data management (MDM) implementation. Authors Mark Allen and Dalton Cervo bring their expertise to you in the only reference you need to help your organization take master data management to the next level by incorporating it across multiple domains. Written in a business friendly style with sufficient program planning guidance, this book covers a comprehensive set of topics and advanced strategies centered on the key MDM disciplines of Data Governance, Data Stewardship, Data Quality Management, Metadata Management, and Data Integration.

CMDB Systems

  • 1st Edition
  • March 20, 2015
  • Dennis Drogseth + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 2 6 5 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 3 7 3 - 1
CMDB Systems: Making Change Work in the Age of Cloud and Agile shows you how an integrated database across all areas of an organization’s information system can help make organizations more efficient reduce challenges during change management and reduce total cost of ownership (TCO). In addition, this valuable reference provides guidelines that will enable you to avoid the pitfalls that cause CMDB projects to fail and actually shorten the time required to achieve an implementation of a CMDB. Drawing upon extensive experience and using illustrative real world examples, Rick Sturm, Dennis Drogseth and Dan Twing discuss: Unique insights from extensive industry exposure, research and consulting on the evolution of CMDB/CMS technology and ongoing dialog with the vendor community in terms of current and future CMDB/CMS design and plans Proven and structured best practices for CMDB deployments Clear and documented insights into the impacts of cloud computing and other advances on CMDB/CMS futures

Conceptual Design for Interactive Systems

  • 1st Edition
  • March 11, 2015
  • Avi Parush
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 9 9 6 9 - 9
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 9 9 8 3 - 5
Conceptual Design for Interactive Systems: Designing for Performance and User Experience provides readers with a comprehensive guide to the steps necessary to take the leap from research and requirements to product design. The text presents a proven strategy for transforming research into a conceptual model, discussing the iterative process that allows users to build the essential foundation for a successful interactive system, while also taking the users’ mental model into consideration. Readers will gain a better understanding of the framework they need to perceive, understand, and experience their tasks and processes in the context of their products. The text is ideal for those seeking a proven, innovative strategy for meeting goals through intuitive and effective thinking.

Data Mining and Predictive Analysis

  • 2nd Edition
  • December 30, 2014
  • Colleen McCue
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 2 2 9 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 4 0 8 - 1
Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively. Rather than being reactive, security agencies can anticipate and prevent crime through the appropriate application of data mining and the use of standard computer programs. Data Mining and Predictive Analysis offers a clear, practical starting point for professionals who need to use data mining in homeland security, security analysis, and operational law enforcement settings.This revised text highlights new and emerging technology, discusses the importance of analytic context for ensuring successful implementation of advanced analytics in the operational setting, and covers new analytic service delivery models that increase ease of use and access to high-end technology and analytic capabilities. The use of predictive analytics in intelligence and security analysis enables the development of meaningful, information based tactics, strategy, and policy decisions in the operational public safety and security environment.

Reliability Assurance of Big Data in the Cloud

  • 1st Edition
  • December 9, 2014
  • Yun Yang + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 5 7 2 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 6 6 8 - 7
With the rapid growth of Cloud computing, the size of Cloud data is expanding at a dramatic speed. A huge amount of data is generated and processed by Cloud applications, putting a higher demand on cloud storage. While data reliability should already be a requirement, data in the Cloud needs to be stored in a highly cost-effective manner. This book focuses on the trade-off between data storage cost and data reliability assurance for big data in the Cloud. Throughout the whole Cloud data lifecycle, four major features are presented: first, a novel generic data reliability model for describing data reliability in the Cloud; second, a minimum replication calculation approach for meeting a given data reliability requirement to facilitate data creation; third, a novel cost-effective data reliability assurance mechanism for big data maintenance, which could dramatically reduce the storage space needed in the Cloud; fourth, a cost-effective strategy for facilitating data creation and recovery, which could significantly reduce the energy consumption during data transfer.

Adaptive User Interfaces

  • 1st Edition
  • December 6, 2014
  • Dermot Browne
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 2 5 - 4
This book describes techniques for designing and building adaptive user interfaces developed in the large AID project undertaken by the contributors.