Skip to main content

Books in Information systems

    • Concurrency Control in Distributed Database Systems

      • 1st Edition
      • Volume 3
      • June 28, 2014
      • W. Cellary + 2 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 4 4 5
      • eBook
        9 7 8 1 4 8 3 2 9 4 6 4 3
      Distributed Database Systems (DDBS) may be defined as integrated database systems composed of autonomous local databases, geographically distributed and interconnected by a computer network.The purpose of this monograph is to present DDBS concurrency control algorithms and their related performance issues. The most recent results have been taken into consideration. A detailed analysis and selection of these results has been made so as to include those which will promote applications and progress in the field. The application of the methods and algorithms presented is not limited to DDBSs but also relates to centralized database systems and to database machines which can often be considered as particular examples of DDBSs.The first part of the book is devoted to basic definitions and models: the distributed database model, the transaction model and the syntactic and semantic concurrency control models. The second discusses concurrency control methods in monoversion DDBSs: the locking method, the timestamp ordering method, the validation method and hybrid methods. For each method the concept, the basic algorithms, a hierarchical version of the basic algorithms, and methods for avoiding performance failures are given. The third section covers concurrency control methods in multiversion DDBSs and the fourth, methods for the semantic concurrency model. The last part concerns performance issues of DDBSs.The book is intended primarily for DDBMS designers, but is also of use to those who are engaged in the design and management of databases in general, as well as in problems of distributed system management such as distributed operating systems and computer networks.
    • Building an Intelligence-Led Security Program

      • 1st Edition
      • December 5, 2014
      • Allan Liska
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 1 4 5 3
      • eBook
        9 7 8 0 1 2 8 0 2 3 7 0 9
      As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way.
    • The Small Business Computer Guide

      • 1st Edition
      • June 28, 2014
      • Joseph Beckman
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 1 3 6 7
      • eBook
        9 7 8 1 4 8 3 2 9 6 0 8 1
      Anyone who needs information about computer systems for small or home businesses will find The Small Business Computer Guide to be an invaluable, thorough review of all aspects of computer systems and technology suited to small businesses.In clear, easy-to-understand language, The Small Business Computer Guide explains hardware components, software, and telecommunications, with an emphasis on productivity, efficiency, and how systems and components can be configured to best serve anindividual business' needs. Consideration is given to budgetary restraints, and Joseph S Beckman offers numerous tips and suggestions on how to put together the right system. Joseph S Beckman is a lawyer in private practice and has spent many yearsusing coputers in his legal work. He lives in Plantation, Florida.
    • Decision Support Systems: Experiences and Expectations

      • 1st Edition
      • Volume 9
      • June 28, 2014
      • T. Jelassi + 2 more
      • English
      • Paperback
        9 7 8 0 4 4 4 8 9 6 7 3 5
      • eBook
        9 7 8 1 4 8 3 2 9 8 4 3 6
      This proceedings volume aims to consolidate current knowledge of research into the many fields of DSS, and to identify key issues which should be incorporated into the future research agenda. The main themes of this volume include: DSS for distributed decision processes, Embedding knowledge in DSS, and DSS and organizational change.
    • Archives and the Computer

      • 1st Edition
      • May 20, 2014
      • Michael J. Cook
      • English
      • Paperback
        9 7 8 1 4 8 3 1 0 7 4 3 1
      • eBook
        9 7 8 1 4 8 3 1 0 1 0 9 5
      Archives and the Computer deals with the use of the computer and its systems and programs in archiving data and other related materials. The book covers topics such as the scope of automated systems in archives; systems for records management, archival description, and retrieval; and machine-readable archives. The book also features examples of systems for records management from different institutions such as theTyne and Wear Archive Department, Dyfed Record Office, and the University of Liverpool. Included in the last part are appendices. Appendix A is a directory of archival systems, Appendix B contains guidelines for machine-readable and related records for preservation, and Appendix C covers machine-readable archives. The text is recommended for archivists who would like to know more about the use of computers in archiving of records and other related information.
    • The Basics of Digital Privacy

      • 1st Edition
      • February 17, 2013
      • Denny Cherry
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 1 1 3
      • eBook
        9 7 8 0 1 2 8 0 0 1 5 2 3
      Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who’s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!
    • Data Warehousing in the Age of Big Data

      • 1st Edition
      • May 2, 2013
      • Krish Krishnan
      • English
      • Paperback
        9 7 8 0 1 2 4 0 5 8 9 1 0
      • eBook
        9 7 8 0 1 2 4 0 5 9 2 0 7
      Data Warehousing in the Age of the Big Data will help you and your organization make the most of unstructured data with your existing data warehouse. As Big Data continues to revolutionize how we use data, it doesn't have to create more confusion. Expert author Krish Krishnan helps you make sense of how Big Data fits into the world of data warehousing in clear and concise detail. The book is presented in three distinct parts. Part 1 discusses Big Data, its technologies and use cases from early adopters. Part 2 addresses data warehousing, its shortcomings, and new architecture options, workloads, and integration techniques for Big Data and the data warehouse. Part 3 deals with data governance, data visualization, information life-cycle management, data scientists, and implementing a Big Data–ready data warehouse. Extensive appendixes include case studies from vendor implementations and a special segment on how we can build a healthcare information factory. Ultimately, this book will help you navigate through the complex layers of Big Data and data warehousing while providing you information on how to effectively think about using all these technologies and the architectures to design the next-generation data warehouse.
    • Implementing Analytics

      • 1st Edition
      • May 6, 2013
      • Nauman Sheikh
      • English
      • Paperback
        9 7 8 0 1 2 4 0 1 6 9 6 5
      • eBook
        9 7 8 0 1 2 4 0 1 6 8 1 1
      Implementing Analytics demystifies the concept, technology and application of analytics and breaks its implementation down to repeatable and manageable steps, making it possible for widespread adoption across all functions of an organization. Implementing Analytics simplifies and helps democratize a very specialized discipline to foster business efficiency and innovation without investing in multi-million dollar technology and manpower. A technology agnostic methodology that breaks down complex tasks like model design and tuning and emphasizes business decisions rather than the technology behind analytics.
    • Data Mining Applications with R

      • 1st Edition
      • November 26, 2013
      • Yanchang Zhao + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 4 1 1 5 1 1 8
      • Paperback
        9 7 8 0 1 2 8 1 0 0 0 8 0
      • eBook
        9 7 8 0 1 2 4 1 1 5 2 0 0
      Data Mining Applications with R is a great resource for researchers and professionals to understand the wide use of R, a free software environment for statistical computing and graphics, in solving different problems in industry. R is widely used in leveraging data mining techniques across many different industries, including government, finance, insurance, medicine, scientific research and more. This book presents 15 different real-world case studies illustrating various techniques in rapidly growing areas. It is an ideal companion for data mining researchers in academia and industry looking for ways to turn this versatile software into a powerful analytic tool. R code, Data and color figures for the book are provided at the RDataMining.com website.
    • Data Mining and Knowledge Discovery for Geoscientists

      • 1st Edition
      • October 9, 2013
      • Guangren Shi
      • English
      • Hardback
        9 7 8 0 1 2 4 1 0 4 3 7 2
      • eBook
        9 7 8 0 1 2 4 1 0 4 7 5 4
      Currently there are major challenges in data mining applications in the geosciences. This is due primarily to the fact that there is a wealth of available mining data amid an absence of the knowledge and expertise necessary to analyze and accurately interpret the same data. Most geoscientists have no practical knowledge or experience using data mining techniques. For the few that do, they typically lack expertise in using data mining software and in selecting the most appropriate algorithms for a given application. This leads to a paradoxical scenario of "rich data but poor knowledge". The true solution is to apply data mining techniques in geosciences databases and to modify these techniques for practical applications. Authored by a global thought leader in data mining, Data Mining and Knowledge Discovery for Geoscientists addresses these challenges by summarizing the latest developments in geosciences data mining and arming scientists with the ability to apply key concepts to effectively analyze and interpret vast amounts of critical information.