You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Managing Information Technology Resources in Organizations in the Next Millennium contains more than 200 unique perspectives on numerous timely issues of managing information technology in organizations around the world. This book, featuring the latest research and applied IT practices, is a valuable source in support of teaching and research agendas.
Healthcare information systems are crucial to the effective and efficient delivery of healthcare. Healthcare Information Systems: Challenges of the New Millennium reports on the implementation of medical information systems.
Emerging information technologies of the past few decades are now providing organizations with new tools to develop innovative organizational concepts and applications. This book is a collection of timely research and practical papers on the subject of IT management and its role in organizational innovation.
Technological advances of the past decades have allowed organizations of all sizes to use information technology in all aspects of organizational management. This book presents more than 200 papers that address this growing corporate phenomena.
The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly presented by WG 11.1 and WG 11.2 of the International Federation for Information Processing {IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) secure techniques for smart card technology, information security management issues, risk analysis, intranets, electronic commerce protocols, certification an...
"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, createing a vulnerability to a host of attacks and exploitations"--Provided by publisher.
Many experts believe that through the utilization of information technology, organizations can better manage social and economic change. This book investigates the challenges involved in the use of information technologies in managing these changes.
Understanding Terrorism: Challenges, Perspectives, and Issues offers a multidisciplinary, comprehensive exploration of domestic and international terrorism that helps students develop the knowledge and skills needed to critically assess the expressions and underlying causes of terrorism. Martin explores theory and provides in-depth analysis in an accessible, engaging manner that helps readers develop the knowledge and skills they need to engage meaningfully with this robust course.
This book constitutes the proceedings of the 5th International Conference on Advances in Information Technology, IAIT 2012, held in Bangkok, Thailand, in December 2012. The 18 revised papers presented in this volume were carefully reviewed and selected from 37 submissions. They deal with all areas related to applied information technology, such as e-service; information and communication technology; intelligent systems; information management; and platform technology.
The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the International Federation for Information Processing (IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) information security methods, methodologies and techniques, information security management issues, risk analysis, managing information security within electronic com...