eBooks-it.org Logo
eBooks-IT.org Inner Image

IGI Global eBooks Page 7

Download free IGI Global eBooks Page 7

Handbook of Research on Web Log Analysis

Handbook of Research on Web Log Analysis Image
Whether searching, shopping, or socializing, Web users leave behind a great deal of data revealing their information needs, mindset, and approaches used, creating vast opportunities for Web service providers as well as a host of security and privacy concerns for consumers. The Handbook of Research on Web Log Analysis reflects on the multifaceted themes of Web use and presents various approaches to log analysis. This expansive collection reviews the history of Web log analysis and examines new trends including the issues of privacy, social interaction and community building. Over 20 research contributions from 44 international experts comprehensively cover the latest user-behavior analytic and log analysis methodologies, and consider new research dire...

Handbook of Research on Wireless Security

Handbook of Research on Wireless Security Image
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. The Handbook of Research on Wireless Security combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless security. As an innovative and current reference source for students, educators, faculty members, researchers, engineers in the field of wireless security, this ha...

Handbook of Research on Information Security and Assurance

Handbook of Research on Information Security and Assurance Image
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks. The Handbook of Research on Information Security and Assurance offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social and ethical concerns in enterprise security. Edited by scholars in information science, this reference provides tools to combat the growing risk associated with ...

Handbook of Research on Global Diffusion of Broadband Data Transmission

Handbook of Research on Global Diffusion of Broadband Data Transmission Image
Large investments have been made by various governments for the deployment of broadband within their respective nations; however, the citizens of such countries have demonstrated a slow adoption of this technology. The Handbook of Research on Global Diffusion of Broadband Data Transmission explores broadband adoption and the digital divide through a global perspective, providing up-to-date research on constructs such as relative advantage, utilitarian outcomes, hedonic outcomes, and service quality. Compiling cutting-edge research from over 100 noted experts in nearly 30 countries, this invaluable reference source allows policy makers, internet service providers, and others to gain multicultural insight into what factors actively influence consumers ...

Handbook of Enterprise Systems Architecture in Practice

Handbook of Enterprise Systems Architecture in Practice Image
Enterprise architecture (EA) is the organizing logic for a firms core business processes and IT capabilities captured in a set of policies and technical choices. Handbook of Enterprise Systems Architecture in Practice provides a comprehensive and unified reference overview of practical aspects of enterprise architecture. This Premier Reference Source includes a complete analysis of EA theory, concepts, strategies, implementation challenges, and case studies. The impact of effective enterprise architecture on IT governance, IT portfolio management, IT risks, and IT outsourcing are described in this authoritative reference tool. Researchers and IT professionals will gain insights into how firms can maximize the business value of IT and increase competi...



2007 - 2017 © eBooks-IT.org