Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 3166

Every enterprise architect faces similar problems when designing and governing the enterprise architecture of a medium to large enterprise. Design patterns are a well-established concept in software engineering, used to define universally applicable solution schemes. By applying this approach to enterprise architectures, recurring problems in the design and implementation of enterprise architectures can be solved over all layers, from... more...

by Dumas
First published in 2005. Routledge is an imprint of Taylor & Francis, an informa company.

For courses in Management Information Systems (MIS) The authoritative, case-based view into how businesses leverage information systems Kenneth and Jane Laudon’s popular  Management Information Systems: Managing the Digital Firm  continues to define the way MIS courses are taught. Designed for business students, the text provides insight into how contemporary businesses leverage information technologies and... more...

Imagine that you are the CEO of a software company. You know you compete in an environment that does not permit you to treat innovation as a secondary issue. But how should you manage your software innovation to get the most out of it? This book will provide you with the answer. Software innovation is multifaceted and the approaches used by companies can be very different. The team of authors that wrote this book took the assumption that there is no... more...

This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in... more...


This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block... more...

Continuously changing customer and market requirements as well as new developments in information technology have become a dominating factor in today's business environment. To be successful enterprises have to adapt quickly to new opportunities and threats. They have to take smart decision and execute fast. Innovation and agility become important success factors. The Management of Process Excellence (MPE) is the main enabler. It helps achieving... more...

Most textbooks on modern heuristics provide the reader with detailed descriptions of the functionality of single examples like genetic algorithms, genetic programming, tabu search, simulated annealing, and others, but fail to teach the underlying concepts behind these different approaches. The author takes a different approach in this textbook by focusing on the users' needs and answering three fundamental questions: First, he tells us which problems... more...

This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality... more...

This book presents the results of several years’ research work on how to characterize complexity in engineering design with a specific regard to dependency modeling. The 52 complexity metrics that are presented show different facets of how complexity takes shape in design processes.  The metrics are supported by a modeling method and a measurement framework to employ the metrics in a goal-oriented manner.  The detailed description of all involved... more...