This volume contains papers presented at the International Conference on Software Process (ICSP 2008) held in Leipzig, Germany, ...
Continue readingMaking Grids Work includes selected articles from the CoreGRID Workshop on Grid Programming Models, Grid and P2P Systems ...
Continue readingWhile the original works on Malliavin calculus aimed to study the smoothness of densities of solutions to stochastic differential ...
Continue readingMalware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...
Continue readingDiscusses the IT management tasks and the objects involved. This book outlines traditional IT management; deals with controlling ...
Continue readingThis open access book presents the outcomes of the “Design for Future – Managed Software Evolution” .The different ...
Continue readingExplains key aspects of management, including: business strategy and how to use it to meet goals; how successful marketing ...
Continue readingWith the widespread transformation of information into digital form throughout society – firms and organisations are embracing ...
Continue readingThis volume presents the proceedings of the 11th IFIP/IEEE International Conference on Management of Multimedia and Mobile ...
Continue reading“Joel Demski’s book is an excellent book in accounting that provides an insightful and comprehensive study on managerial ...
Continue readingEach chapter in Managing Complexity focuses on analyzing real-world complex systems and transferring knowledge from the complex-systems ...
Continue readingCollaboration of organizations reshapes traditional managerial practices and creates new inter-organizational contexts for ...
Continue readingManaging Humans is a selection of the best essays from Michael Lopp's web site, Rands in Repose. Drawing on Lopp's management ...
Continue readingIt still holds true: information is not always the answer. Information is often part of the problem. While the main goal ...
Continue readingThe book deals with the management of information systems security and privacy, based on a model that covers technological, ...
Continue readingThis volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
Continue readingTremendous human progress is becoming possible through the development of converging technologies stimulated by advances ...
Continue readingThe 48 revised full papers and 30 revised short papers cover management of distributed networks, network configuration and ...
Continue readingThis edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes ...
Continue readingExamine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on ...
Continue reading