Encyclopedia of Information Systems and Technology - Two Volume Set

دانلود کتاب Encyclopedia of Information Systems and Technology - Two Volume Set

51000 تومان موجود

کتاب دایره المعارف سیستم های اطلاعات و فناوری - مجموعه دو جلدی نسخه زبان اصلی

دانلود کتاب دایره المعارف سیستم های اطلاعات و فناوری - مجموعه دو جلدی بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 7


توضیحاتی در مورد کتاب Encyclopedia of Information Systems and Technology - Two Volume Set

نام کتاب : Encyclopedia of Information Systems and Technology - Two Volume Set
ویرایش : 1
عنوان ترجمه شده به فارسی : دایره المعارف سیستم های اطلاعات و فناوری - مجموعه دو جلدی
سری :
نویسندگان :
ناشر : CRC Press
سال نشر : 2015
تعداد صفحات : 1307
ISBN (شابک) : 9781482214321 , 9781351235716
زبان کتاب :
فرمت کتاب : pdf
حجم کتاب : 47 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Topical Table of Contents:

IT Fundamentals

Decision Sciences; Sven Axsäter and Johan Marklund

Decision Support Systems; Marek J. Druzdzel and Roger R. Flynn

Information Flow; Sean M. Price

Information Management; Brian Detlor

Information Science; Tefko Saracevic

Information Systems; E. Burton Swanson

Information Theory; Paul B. Kantor

Human-Computer Interaction

Pervasive Computing; Sian Lun Lau

Social Networking: Legal, Privacy, and Security Issues; Jessica Keyes

Social Networking: Tools; Jessica Keyes

Information Assurance and Security

AES: Advanced Encryption Standard; Ben Rothke

ANSI: American National Standards Institute; Jana Zabinski

Application Security; Walter S. Kobus, Jr

Assurance: Science of; Jason W. Rupe

Availability of IS/IT; Ulrik Franke

Cryptography; Javek Ikbal

Cyberforensics; Keith Jones

Cybernetics; Christopher Brown-Syed

Hackers: Attacks and Defenses; Ed Skoudis

Hackers: Tools and Techniques; Ed Skoudis

Incident Response and Digital Forensics; Joanna F. DeFranco

Information Protection; Rebecca Herold

Information Security Controls: Types; Harold F. Tipton

Intelligence and Security Informatics; Hsinchun Chen, Zhenhua Lai, Yan Dang, and Yulei Zhang

Penetration Testing; Chuck Bianco

PKI: Public Key Infrastructure; Harry B. DeMaio

Vulnerability Management; Park Foreman

WiMAX Networks: Security Issues; Mohamad Badra and Sherali Zeadally

Information Management

Artificial Intelligence; Jianhua Chen

Artificial Neural Networks and Natural Language Processing; Hermann Moisl

Big Data: Applications; Stephan Kudyba and Matthew Kwatinetz

Big Data: Concepts, Technologies, and Applications; Bernice M. Purcell

Big Data: Structured and Unstructured Data; Arun K. Majumdar and John F. Sowa

Bioinformatics; Carrie L. Iwema and Ansuman Chattopadhyay

Business Informatics; Markus Helfert

Database Design for a Cultural Artifact Repository; Todor Todorov, Galina Bogdanova, and Nikolay Noev

EDRMS: Electronic Document and Records Management Systems; Azad Adam

Information Flow; Sean M. Price

ITIL: IT Infrastructure Library: Operational Excellence Framework; Joshua L. Kissee

Knowledge Management; Kimiz Dalkir

Knowledge Management Systems; Dick Stenmark

Integrative Programming and Technologies

Application Systems Development; Lowell Bruce McCulley

Data Analytics; Stephan Kudyba

Data Analytics: Architectures, Implementation, Methodology, and Tools; Wullianallur Raghupathi and Viju Raghupathi

Data Analytics: Mutivariate Temporal Data; Artur Dubrawski

Data Mining; Monte F. Hancock, Jr.

Data Mining: Big Data; Wayne Thompson

Data Mining: Forensic Analysis; Monte F. Hancock, Jr.

Data Mining: Healthcare; Katherine Marconi, Matt Dobra, and Charles Thompson

Data Mining: Knowledge; Monte F. Hancock, Jr.

Data Mining: Process; Monte F. Hancock, Jr.

Data Mining: Supervised Learning; Monte F. Hancock, Jr.

GIS: Geographic Information Systems; Timothy F. Leslie and Nigel M. Waters

Healthcare Informatics; Stephan Kudyba and Richard Temple

Healthcare Informatics: Analytics; Jason Burke

Healthcare Informatics: Data Mining; Wullianallur Raghupathi

Healthcare Information Technology; Bernice M. Purcell

Search Engines; Randolph Hock

Mathematics and Statistics for IT

Boolean Algebras; A. R. Bednarek

Fuzzy Set Theory; Donald Kraft, Gloria Bordogna, and Gabriella Pasi

Hash Algorithms; Keith Pasley

Steganography; Mark Edmead

Networking

Ad Hoc Networks: Technologies; Marco Conti

CDMA: Code Division Multiple Access Networks; Tero Ojanperä and Steven D. Gray

Cellular Systems; Lal C. Godara

Communication Protocols and Services; William Hugh Murray

Firewall Architectures; Paul A. Henry

Mobile Ad-Hoc Networks; Jonathan Loo, Shafiullah Khan, and Ali Naser Al-Khwildi

Mobile Applications Development; Antonio Ghezzi

Mobile Business Models and Value Networks; Marcelo Nogueira Cortimiglia, Alejandro Germán Frank, and Antonio Ghezzi

Mobile Data Security; George G. McBride

Network Management; Jianguo Ding and Ranganai Chaparadza

Network Security; Bonnie A. Goins Pilewski and Christopher A. Pilewski

VPNs: Virtual Private Networks; James S. Tiller

Programming Fundamentals

Programming Languages; D.E. Stevenson

Software Development Lifecycles: Security Assessments; George G. McBride

Platform Technologies

IPv6: Expanding Internet Support; Gilbert Held

Portable Computing Environments; Phillip Q. Maier

SOA: Service-Oriented Architecture; Glenn Cater

VNC Systems: Virtual Network Computing Systems; Chris Hare

WLANs: Wireless Local Area Networks: Design; Suresh Singh

WLANs: Wireless Local Area Networks: IEEE 802.11; José Antonio Garcia-Macias and Leyla Toumi

WLANs: Wireless Local Area Networks: Security; Franjo Majstor

Systems Administration and Maintenance

Configuration Management; Leighton Johnson, III

Resources: Measurement and Management; Greg Schulz

Root Cause Analysis and Troubleshooting Techniques; Gary G. Jing

System Integration and Architecture

Cloud Computing; Brian J.S. Chee and Curtis Franklin, Jr

Cloud Computing: Grids and High-Performance Computers; Brian J.S. Chee and Curtis Franklin, Jr.

Cloud Computing: History and Evolution; John W. Rittinghouse and James F. Ransome

Cloud Computing: Mobile Devices; John W. Rittinghouse and James F. Ransome

Cloud Computing: Security; John W. Rittinghouse and James F. Ransome

Cloud Computing: Standards; John W. Rittinghouse and James F. Ransome

Cloud Computing: Virtualization versus; Brian J.S. Chee and Curtis Franklin, Jr.

Complexity and Self-Organization; Francis Heylighen

Enterprise Architecture: Challenges; Kirk Hausman

Enterprise Architecture: Planning; Kirk Hausman

Enterprise Architecture: Security; Kirk Hausman

Enterprise Architecture: Virtualization; Kirk Hausman

Green Computing: Data Centers; Greg Schulz

Green Computing: Devices; Floyd (Bud) E. Smith

Image Processing and Measurement; John C. Russ

Information Architecture; Andrew Dillon and Don Turnbull

Meta-Systems; G. Reza Djavanshir and M. Jafar Tarokh

Six Sigma; Christine B. Tayntor

Social and Professional Issues

Ethics; Tandy Gold

HIPAA: Health Insurance Portability and Accountability Act; Ross A. Leo

ISO Standards and Certification; Scott Erkonen

ISSEP: Information Systems Security Engineering Professional; Robert B. Batie, Jr.

ITGI: IT Governance Institute; Mollie E. Krehnke

Open Standards; David O`Berry

SIM: Society for Information Management; Leon Kappelman

Web Systems and Technologies

Location-Based Services; Ben Falchuk, Dave Famolari, and Shoshana Loeb

Semantic Web: Applications; Kieron O`Hara and Wendy Hall

Semantic Web: Languages, Tools, and Standards; Valentina Janev and Sanja Vraneš

W3C: World Wide Web Consortium; Terrence Brooks

Web Retrieval and Mining; Carlos Castillo and Ricardo Baeza-Yates

Web Services; John W. Rittinghouse and James F. Ransome

Web Services: Security; Lynda L. McGhie

XML and Other Metadata Languages; William Hugh Murray





پست ها تصادفی