Pattern and Security Requirements

Pattern and Security Requirements: Engineering-Based Establishment of Security Standards. Security threats are a significant problem for information technology companies today....

Project Management Handbook

Project Management Handbook. This practical handbook offers a comprehensive guide to efficient project management. It pursues a broad, well-structured approach,...

Applied Conjoint Analysis

Applied Conjoint Analysis. Conjoint analysis is probably the most significant development in marketing research in the past few decades. It...

R for Cloud Computing

R for Cloud Computing: An Approach for Data Scientists. R for Cloud Computing looks at some of the tasks performed...

Security Planning

Security Planning: An Applied Approach. This book guides readers through building an IT security plan. Offering a template, it helps...

Software Development Metrics

Software Development Metrics. Software Development Metrics teaches you how to gather, analyze, and effectively use the metrics that define your...

Semantic Web

Semantic Web: Implications for Technologies and Business Practices. This book examines recent developments in semantic systems that can respond to...