Page 1

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 1

Books for the Next Generation of

IT Security, & Management from CRC Press

e Se at

wh u yo ’re

rs W ffe NO ail o com UP E em ess. GN IV pr SI CLUS .crc X ww rE w fo at





CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 2

Contents Information Security ............................................3 IT & Project Management ..................................19 Software & Web-based Programming................37

Page 4

Page 10

Join the CRC Press online community! Page 19

Page 20

Sign up for email alerts at and be the first to know about new books in your area of interest. You will also be eligible for: • • • • •

Page 39

Page 41

Exclusive discounts Special content Event announcements New book alerts FREE shipping

only available in our email and print promotions. Take full advantage of your insider savings and free shipping when you buy directly from

To view more information and complete tables of contents for these and many other related books, Visit us at

e-mail: 1-800-634-7064 • 1-859-727-5000 +44 (0) 1235 400 524 CVN14_5.5x8.5 MC 5.13.14_gtr

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 3

Information Security Coming Soon!


PCI Compliance

The State of the Art in Intrusion Prevention and Detection

The Definitive Guide Abhay Bhargav This book explains the payment card industry (PCI) security standards required for organizations storing, processing, or transmitting credit card holder information. This stepby-step guide outlines application development and implementation strategies for Payment Application Data Security Standard (PA-DSS) implementation and validation. It includes case studies and examples from a variety of industries, including banking, retail, outsourcing, software development, and processors. Focused on audit and assessment strategies, the book articulates specific compliance issues and covers the recently released PCI-DSS v 3.0.

Selected Contents: Payment-Card Industry: An Evolution. Card Anatomy: The Essentials. Security and the Payment-Card Industry. Payment Card Industry Data Security Standard (PCI-DSS). The Payment Application Data Security Standard (PA-DSS). Enterprise Approach to PCI Compliance. Scoping for PCI Compliance. Requirement 1: Build and Maintain a Secure Network. Requirement 2: Vendor-Supplied Defaults, System Passwords, and Security Parameters. Requirement 3: Protect Stored Cardholder Data. Requirement 4: Securing Cardholder Information in Transit. Requirement 5: Use and Regularly Update Antivirus Software. Requirement 6: Develop and Maintain Secure Systems. Requirement 7: Restrict Access to Cardholder Data by Business. Requirement 8: Access-Control Requirements for PCI Environments. Requirement 9: Restrict Physical Access to Cardholder Data. Requirement 10: Logging and Monitoring for the PCI Standards. Requirement 11: Security Testing for the PCI Environment. Requirement 12: Information Security Policies and Practices for PCI Compliance. Beyond PCI Compliance. Catalog no. K14041, May 2014, c. 351 pp. ISBN: 978-1-4398-8740-0, $59.95 / £38.99 Also available as an eBook

Edited by

Al-Sakib Khan Pathan International Islamic University Malaysia, Kuala

Presenting cutting-edge research, this book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective. The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection. The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. • Analyzes latest trends and issues about intrusion detection and prevention in computer networks and systems, especially in communications networks • Covers wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks • Reports on new techniques and research on intrusion detection schemes, intrusion prevention schemes, and tracing back mobile attackers

Selected Contents: Network Traffic Analysis and Management For IDS IDS Issues for Different Infrastructures Artificial Intelligence Techniques for IDS IDS for Wireless Systems Catalog no. K21319, January 2014, 514 pp. ISBN: 978-1-4822-0351-6, $119.95 / £76.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 4

Information Security New!

Intrusion Detection in Wireless Ad-Hoc Networks Edited by

Nabendu Chaki and Rituparna Chaki University of Calcutta, Kolkata, West Bengal, India

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code David Kahn

This book explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. The book reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems. Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure nextgeneration wireless networking environments. • Covers the security aspects, particularly intrusion detection systems, for the range of wireless ad-hoc networks • Reviews and evaluates state-of-the-art IDSs for various wireless ad-hoc networks, including MANETs, wireless mesh networks, and sensor networks • Touches on advanced topics such as security for smart power grid and IDS for the cloud environment

Selected Contents: Introduction. Architecture and Organization Issues. Routing for ad-hoc Networks. Different Types of Routing Attacks for WANs. IDSX. HIDS. BHIDS. Intrusion Detection for Wireless Mesh Networks. Security in WAN and Quality of Services (QoS). uture Trends in WAN Security.

New York, New York, USA

Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler’s Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn’s latest book provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany’s Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today’s leaders avoid making the same mistakes that have helped bring at least one global power to its knees. Catalog no. K15960, January 2014, 469 pp. ISBN: 978-1-4665-6199-1, $59.95 / £29.99

Catalog no. K15047, February 2014, 258 pp. ISBN: 978-1-4665-1565-9, $99.95 / £63.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 5

Information Security New!

The Frugal CISO Using Innovation and Smart Approaches to Maximize Your Security Posture Kerry Ann Anderson This book outlines a strategy for managing the information security function in a manner that optimizes cost efficiency and results. This strategy is designed to work across a wide variety of business sectors and economic conditions and focuses on producing long-term results through investment in people and technology. The text illustrates real-world perspectives that reflect the day-to-day issues that you face in running an enterprise’s security operations. Focused on managing information security programs for long-term operational success, in terms of efficiency, effectiveness, and budgeting ability, this book will help you develop the fiscal proficiency required to navigate the budgeting process. • Presents actionable information that information security practitioners can implement immediately • Details how to develop fiscal proficiency to navigate the annual budgeting process • Focuses on long-term operational success in terms of efficiency, effectiveness, and budgeting savvy

Selected Contents: New Normal Information Security Maturity Life Cycle Reducing Complexity Frugal Hiring Frugal Team Management Managing External Parties Effectively

Security without Obscurity A Guide to Confidentiality, Authentication, and Integrity J.J. Stapleton Arlington, Texas, USA

“Jeff's extensive practical experience in applying information security and his expertise in cryptographic standards makes this book a must-read for the information security professional. … deserves a place in your reference library.” —Ralph Spencer Poore, CFE, CISA, CISSP, CHS-III, PCIP, ISSA Distinguished Fellow, ISSA Honor Roll

The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability; however, the author asserts authentication is the third keystone. As the field has become more complex, novices and professionals need a reliable reference that outlines the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication. • Presents insight from the author's experience developing dozens of ISO Technical Committee 68 and ANSI-accredited X9 standards • Provides comprehensive and in-depth coverage of confidentiality, authentication, integrity, non-repudiation, privacy, and key management • Discusses security algorithms in general and the basics of cryptography while avoiding overly complex explanations

Security Awareness: Fluff or Strategic Investment?

Selected Contents:

Information Security Policies and Procedures

Introduction Confidentiality Authentication Integrity Nonrepudiation Privacy Key Management Bibliography

Is This Necessary? Understand the Budgeting Cycle Using the Goldilocks Principle The Hybrid (Frugal) CISO Frugality as a Continuing Strategy for Information Security Management Catalog no. K22183, May 2014, 380 pp. Soft Cover, ISBN: 978-1-4822-2007-0 $49.95 / £31.99 Also available as an eBook

Catalog no. K20548, May 2014, 355 pp. ISBN: 978-1-4665-9214-8, $79.95 / £49.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 6

Information Security New!

Conducting Network Penetration and Espionage in a Global Environment Bruce Middleton Melbourne, Florida, USA

Penetration testing remains one of the best ways to test the security of private, government, military, and corporate computer networks. This book provides step-by-step instruction on how to use tools, available mostly for free, to perform effective penetration tests of today’s computer networks. Covering basic and advanced tools and procedures, it categorizes tools according to their use within the standard testing framework. Readers will learn how to perform an organized and efficient penetration test as well as techniques used to bypass anti-virus software and capture keystrokes of remote systems. • Describes how to perform penetration testing of computer networks using free, open source, and commercially available tools • Explains how to perform an organized and efficient penetration test • Covers basic and advanced tools and procedures • Identifies techniques used to bypass anti-virus software and capture keystrokes of remote systems

Selected Contents: What You Need to Know First Attack from Christmas Island Indirect Target Information Acquisition Direct Target Information Acquisition

Managing Risk and Security in Outsourcing IT Services Onshore, Offshore and the Cloud Frank Siepmann 1 Security Solutions Applied, LLC, Leesburg, Virginia, USA

“The information on the different countries ... provides a great perspective as to what is going on in the world and why it is so important to know who and what country you are dealing with.” —Todd Fitzgerald, Global Information Security Director, Grant Thornton International, Ltd.

This book explains how to address the risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book provides the fundamental understanding and guidance readers need to keep information, processes, and people secure when outsourcing IT services. • Provides background material and guidance on how to keep information, processes, and people secure when outsourcing • Explains how to tailor the right risk approach for any organization • Uses case studies to illustrate what to do and what not to do during implementation


Selected Contents:

MatLab, SimuLink, and R

Outsourcing The Cloud Before You Decide to Outsource Ready to Outsource Day One and Beyond When We Part Outsourcing Anecdotes

Metasploit Pro China, Syria, and the American Intelligence Community Building a Penetration Testing Lab Vendor Default Passwords and Default Unix Ports Oldies but Goodies if You Have Physical Access Order of Operations for Your Tools Using Your iPhone as a Network Scanner Catalog no. K21509, May 2014, 599 pp. ISBN: 978-1-4822-0647-0, $59.95 / £38.99 Also available as an eBook


Catalog no. K13704, December 2013, 244 pp. ISBN: 978-1-4398-7909-2, $69.95 / £44.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 7

Information Security Intrusion Detection Networks

Information Security Fundamentals

A Key to Collaborative Security

Second Edition

Carol Fung Raouf Boutaba University of Waterloo, Ontario, Canada

This book focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. • Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios • Illustrates distributed IDN architecture design • Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. It concludes by highlighting open issues and future challenges.

Selected Contents: Cyber Intrusions Intrusion Detection Collaborative Intrusion Detection Networks Architecture Design Trust Management Collaborative Decision Resource Management Collaborators Selection and Management Knowledge-Based Intrusion Detection Networks and Knowledge Propagation Collaborative Malware Detection Networks Catalog no. K16024, November 2013, 261 pp. ISBN: 978-1-4665-6412-1, $119.95 / £76.99 Also available as an eBook

Thomas R. Peltier Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, this second edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the GrammLeach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program.

Selected Contents: Developing Policies Organization of Information Security Cryptology Risk Management Building and Maintaining an Effective Security Awareness Program Physical Security Disaster Recovery and Business Continuity Continuity of Operations Planning Access Controls Information System Development, Acquisition, and Maintenance Information Security Incident Management Asset Classification Threats to Information Security Information Security Policies: A Practitioner’s View Glossary Appendices: Facilitated Risk Analysis and Assessment Process Business Impact Analysis Catalog no. K10531, October 2013, 438 pp. Soft Cover, ISBN: 978-1-4398-1062-0 $69.95 / £44.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 8

Information Security Information Security Management Handbook

Responsive Security Be Ready to Be Secure Meng-Chow Kang

2013 CD-ROM Edition

Cisco Systems, Singapore

Edited by

James S. Tiller Raleigh, North Carolina, USA

Rich O'Hanley Auerbach Publications, New York, New York, USA

"… the most comprehensive handbook … an authoritative resource that you can search by keyword, it facilitates the understanding required to be ahead of threats, standards, and regulations and brings together the required skills, tools, techniques …" —NeoPopRealism Journal

Containing the complete contents of Volumes 1-7, the Information Security Management Handbook, 2013 CD-ROM Edition is an authoritative resource that is linked and searchable by keyword. This CD updates the benchmark Volume 1 with information on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®). • Updates the sixth edition with new developments in information security and the (ISC)2® CISSP® CBK® • Covers advanced persistent threats, new HIPAA requirements, social networks, virtualization, and SOA • Discusses access control, physical security, cryptography, application security, and operations security In addition to the complete contents of the set, the CD contains an extra volume's worth of information— including chapters from other security and networking books that have never appeared in the print editions. The 2013 CD-ROM Edition features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, secure development, and forensics. Catalog no. K16321, October 2013, CD-ROM ISBN: 978-1-4665-6726-9, $199.95 / £127.00 Also available as an eBook

This book explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint. Utilizing a research study generated from nearly a decade of action research and real-time experience, this book introduces the issues and dilemmas that fueled the study, discusses its key findings, and provides practical methods for managing information security risks. It presents the principles and methods of the responsive security approach, developed from the findings of the study, and details the research that led to the development of the approach. • Demonstrates the viability and practicality of the approach in today’s information security risk environment • Demystifies information security risk management in practice, and reveals the limitations and inadequacies of current approaches • Provides comprehensive coverage of the issues and challenges faced in managing information security risks today The author reviews existing literature that synthesizes current knowledge, supports the need for, and highlights the significance of the responsive security approach. He also highlights the concepts, strategies, and programs commonly used to achieve information security in organizations.

Selected Contents: Introduction Knowledge, Issues, and Dilemmas Practice, Issues, and Dilemmas Responsive Security Conclusions and Implications Appendices References Index Catalog no. K19031, October 2013, 259 pp. Soft Cover, ISBN: 978-1-4665-8430-3 $69.95 / £44.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 9

Information Security Information Security Management Handbook Sixth Edition, Volume 7 Edited by

Richard O'Hanley Auerbach Publications, New York, New York, USA

James S. Tiller Raleigh, North Carolina, USA

Updated annually, this is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. • Updates its bestselling predecessors with new developments in information security and the (ISC)2® CISSP® CBK® • Provides valuable insights from leaders in the field on the theory and practice of computer security technology • Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and nearfield communications.

Selected Contents: Access Control. Telecommunications & Network Security. Information Security & Risk Management. Application Security. Cryptography. Security Architecture & Design. Operations Security. Business Continuity Planning & Disaster Recovery Planning. Legal, Regulations, Compliance & Investigation. Physical Security.

Enterprise Architecture and Information Assurance Developing a Secure Foundation James A. Scholz Computer Security Consulting, Inc., Mabelvale, Arkansas, USA

This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes. It describes how to ensure your organization is prepared for the unexpected. The text also aids in containing liability with guidance on network and application vulnerability assessments, intrusion detection and penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning. Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates how to evaluate your network and business model to determine if they fit well together. • Brings to light knowledge of the different processes of ITIL, MOF, and Business Service Management • Covers the 17 families of management and how they are implemented within an infrastructure • Supplies the tools to document your infrastructure to feed into the continuity of operations and disaster recovery

Selected Contents: Setting the Foundation. Building the Enterprise Infrastructure. Infrastructure Security Model Components. Systems Security Categorization. Business Impact Analysis. Risk. Secure Configuration Management. Contingency Planning. Cloud Computing. Continuous Monitoring. Physical Security. Building Security. The Certification and Accreditation Process. Catalog no. K11935, July 2013, 266 pp. ISBN: 978-1-4398-4159-4, $79.95 / £44.99 Also available as an eBook

Catalog no. K16337, August 2013, 434 pp. ISBN: 978-1-4665-6749-8, $89.95 / £57.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 10

Information Security Conflict and Cooperation in Cyberspace The Challenge to National Security Edited by

Panayotis A. Yannakogeorgos and Adam B Lowther US Air Force Research Institute, Maxwell AFB, Alabama, USA

An examination of the views of military leaders, scholars, cyber operators, and policymakers on the current and future challenges of cyberspace, this book focuses on policy-relevant solutions. It discusses how to prepare for war, while attempting to keep the peace in the cyber domain. It then spells out the challenges involved in establishing a robust system of monitoring, controls, and sanctions to ensure cooperation amongst all stakeholders.

Selected Contents: Introduction KEY CONSIDERATIONS The Future of Things Cyber What’s Wrong with Cyberspace? Cyberspace Security Considerations Two, Maybe Three Cheers for Ambiguity The Essential Features of an Ontology for Cyber Warfare Cyber Defense as Environmental Protection: The Broader Potential Impact of Failed Defensive Counter Cyber Operations TECHNOLOGY Challenges in Monitoring Cyber Arms Compliance Digital Policy Management: A Foundation for Tomorrow; National Security Agency Enterprise Service Division-Identity and Access Branch on Mission Assurance Stuxnet: A Case Study in Cyber Warfare Digital Dissent: The Internet and Dissent in Authoritarian States ETHICS, LAW, AND POLICE Can There be an Ethical Cyber War? Perspectives for Cyber Strategists on Cyber Law for Cyber War A New Normal? The Cultivation of Global Norms as Part of a Cyber Security Strategy The Prospects for Cyber Deterrence: American Sponsorship of Global Norms for Cyberspace Cyber Sovereignty American Cybersecurity Triad: Government-wide Integration, Technological Counterintelligence, and Educational Mobilization Catalog no. K20542, July 2013, 360 pp. ISBN: 978-1-4665-9201-8, $59.95 / £38.99 Also available as an eBook


Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks Mohssen Mohammed University of Cape Town, South Africa

Al-Sakib Khan Pathan International Islamic University Malaysia, Kuala

Bringing together critical knowledge and research, this book details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures. • Supplies unprecedented coverage on how to generate automated signatures for unknown polymorphic worms • Describes attack detection approaches and automated signature generation systems • Discusses experimental implementation of signature-generation algorithms and double-honeynet systems • Details the design of double-honeynet systems

Selected Contents: Introduction. Worm Attacks. Attack Detection Approaches. Automated Signature Generation Systems. Design of Double-honeynet System. Signature Generation Algorithms for Polymorphic Worms. Experimental Investigation of Double-honeynet System. Experimental Implementation of Signature generation Algorithms. What to Expect in the Coming Days? Catalog no. K15460, May 2013, 337 pp. ISBN: 978-1-4665-5727-7, $89.95 / £57.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 11

Information Security The Complete Book of Data Anonymization From Planning to Implementation Balaji Raghunathan Infosys, Bangalore, India Series: Infosys Press

“… provides a comprehensive view of data anonymization both from a program sponsor’s perspective as well as a practitioner’s. The special focus on implementation of data anonymization across the enterprise makes this a valuable reference book for large data anonymization implementation programs.” —Prasad Joshi, Vice President, Infosys Labs, Infosys Ltd.

“… could not have come at a better time, given the rapid adoption of outsourcing within enterprises and an ever-increasing growth of business data. … a must read for enterprise data architects and data managers grappling with the problem of balancing the needs of application outsourcing with the requirements for strong data privacy.” —Dr. Pramod Varma, Chief Architect, Unique Identification Authority of India

A cutting-edge guide to data anonymization implementation, this book delves far beyond data anonymization techniques to supply you with the wide-ranging perspective required to ensure comprehensive protection against misuse of data. • Examines data anonymization from both a practitioner's and a project sponsor's perspective • Details patterns for data anonymization, automation/tool capabilities, and key success factors for data anonymization initiatives • Goes beyond data anonymization techniques to cover planning, implementation, management, and governance

Selected Contents: Drivers for Data Anonymization Overview of Data Anonymization Data Anonymization Project Sponsor's Guidebook Data Anonymization Practitioner's Guidebook Data Anonymization Uncut Index Bibliography Catalog no. K13578, May 2013, 267 pp. ISBN: 978-1-4398-7730-2, $79.95 / £49.99 Also available as an eBook

Iris Biometric Model for Secured Network Access Franjieh El Khoury Université Claude Bernard, Villeurbanne, France

Biometric techniques have proven their ability to provide secure access to shared resources in various domains and software agents. In addition, multi-agent systems (MAS) have shown their efficiency in resolving critical network problems. This volume proposes a new model—the IrisCryptoAgentSystem (ICAS)—which is based on a biometric method for authentication using the iris of the eye. The book explains how MAS can be used to solve security problems in complex systems and demonstrates how the intersection of biometric systems, cryptography, and MAS can apply to iris recognition for secure network access. • Introduces biometric systems, cryptography, and multi-agent systems • Explains and evaluates iris recognition methods • Presents implementation methods and simulations of these techniques

Selected Contents: State of the Art: Security of Computer Network Systems Biometric Systems Cryptography Multi-Agent Systems (MAS) Critical Analysis on the Iris Recognition Methods: Existing Methods for the Localization of the Inner and Outer Edges of the Iris of the Eye Existing Methods for The Elimination of the Effects of the Eyelids Proposed Model: IrisCryptoAgentSystem (lCAS): Biometric Model for the Authentication Using the Iris of the Eye Existing Methods for The Elimination of the Effects of the Eyelids Global Model Integrating Multi-Agents System Implementation and Simulations: Implementation of the New Methods Simulation of the Modules Application Conclusion and Perspectives Acknowledgments Bibliography Catalog no. K14421, May 2013, 220 pp. ISBN: 978-1-4665-0213-0, $119.95 / £76.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 12

Information Security Information Security Policy Development for Compliance ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0

Securing Cloud and Mobility A Practitioner's Guide Ian Lim Ingram Micro, Santa Ana, California, USA

E. Coleen Coolidge Aliso Viejo, California, USA

Barry L. Williams

Paul Hourani

Williams Technology Audit Services, Alton, Illinois, USA

Corona, California, USA

Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. This book provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will help readers elicit management opinions on information security and document the formal and informal procedures currently in place. A valuable resource for policy writers who must meet multiple compliance standards, this guidebook is also available in eBook format.

Laying out decision-making frameworks to help you secure your virtual environment, the book includes coverage of physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, and secure mobile architecture. It includes helpful implementation considerations, technical decision points, and process flows to supply you with practical guidance on how to navigate the undulating terrains of cloud and mobility.

• Provides a way to address the regulatory requirements of an organization by writing comprehensive policy statements • Supplies a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control • Guides policy writers who must meet multiple compliance standards or regulations

Selected Contents: Introduction Entity Level Policies and Procedures Access Control Policies and Procedures Change Control and Change Management System Information Integrity and Monitoring System Services Acquisition and Protection Informational Asset Management Continuity of Operations Catalog no. K18842, March 2013, 152 pp. ISBN: 978-1-4665-8058-9, $59.95 / £38.99 Also available as an eBook

• Covers network, server, and endpoint security • Offers technical discussions of security, based on academic research and real-world experiences • Includes implementation plans, technical decision points, and process consideration points • Provides guidelines and examples of security virtualization

Selected Contents: Rethinking IT and Security Tectonic Shifts The Evolving Threat Landscape Deconstructing Cloud Security The Cloud Dialogues Securing Private Cloud Computing Segmentation and the Private Cloud Orchestration and Cloud Management Encryption Services Threat Intelligence Identity Management for Private Clouds Securing Public Clouds Enterprise Cloud Governance The Cursory Cloud Use Review In-Depth Cloud Assessment Third-Party Cloud Assessment Securing Mobile Mobile Security Infrastructure The Mobile Client Itself Connecting to Enterprise and Third-Party Applications from Mobile Devices Creating Secure Mobile Applications Catalog no. K12301, February 2013, 228 pp. ISBN: 978-1-4398-5055-8, $79.95 / £49.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 13

Information Security PRAGMATIC Security Metrics Applying Metametrics to Information Security W. Krag Brotby

Official (ISC)2® Guide to the CAP® CBK® Second Edition Patrick D. Howard

Enterprise Security Architect, Thousand Oaks, California, USA

Chief Information Security Officer, Nuclear Regulatory Commission, USA

Gary Hinson

Series: (ISC)2 Press

Hastings, New Zealand

“… looks like it may live up to its promise of being able to use metrics not only to track and report performance but to identify problem areas and opportunities, and drive information security improvements. If so, this could be the metrics book a lot of information security professionals have been waiting for.” —Ben Rothke, CISSP, CISM, Information Security Manager, Wyndham Worldwide; and author of Computer Security: 20 Things Every Employee Should Know, writing on the RSA Conference Blog,

Light on mathematics and heavy on utility, this is the ultimate how-to-do-it guide for security metrics. Packed with time-saving tips, the book offers easy-tofollow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system. In addition to its obvious utility in the information security realm, the PRAGMATIC approach, introduced for the first time in this book, has broader application across diverse fields of management.

Selected Contents: Introduction Why Measure Information Security? What To Measure - The Ingredients. How To Measure - The Recipes Presenting and Using PRAGMATIC Metrics Improving the Measurement System Conclusions Catalog no. K13838, January 2013, 512 pp. ISBN: 978-1-4398-8152-1, $69.95 / £44.99 Also available as an eBook

Praise for the Popular First Edition: “… Even if government certification and accreditation is not your concern, the new ISO 27002 (formerly ISO17799) will require all of us to look for a process to make certification and accreditation bearable. Pat has succeeded in doing just that with this practical and readable book.” —Thomas R. Peltier, Peltier Associates, Member of the ISSA Hall of Fame

Providing an overview of certification and accreditation, the second edition of this officially sanctioned guide demonstrates the effectiveness of C&A as a risk management methodology for IT systems in public and private organizations. It enables readers to document the status of their security controls and learn how to secure IT systems via standard, repeatable processes. The text describes what it takes to build a certification and accreditation program at the organization level and analyzes various C&A processes and how they interrelate. • Provides an inclusive analysis of all of the topics covered on the CAP CBK • Presents a usable approach for top-down implementation of information technology security in an organization • Covers U.S. federal polices, including DoD 8500.1 and 8500.2, DISTMAR, DITSCAP, NIACAP, CNSS, NIAP, and NIST FIPS and Special Publications

Selected Contents: Building a Successful Enterprise Certification and Accreditation Program Certification and Accreditation Processes Certification and Accreditation Case Study The Future of Certification and Accreditation Catalog no. K11099, July 2012, 462 pp. ISBN: 978-1-4398-2075-9, $73.95 / £44.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 14

Information Security New Directions of Modern Cryptography

Official (ISC)2 Guide to the CISSP CBK

Zhenfu Cao

Third Edition

Shanghai Jiao Tong University, China

Edited by

The study of cryptography is motivated by and driven forward by security requirements. This volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. Providing vivid demonstrations of how modern cryptographic techniques can be used to solve security problems, the book’s applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography. Catalog no. K14392, December 2012, c. 400 pp. ISBN: 978-1-4665-0138-6, $104.95 / £66.99 Also available as an eBook

Digital Forensics Explained Greg Gogolin Ferris State University, Big Rapids, Michigan, USA

Focusing on the concepts investigators need to know to conduct a thorough investigation, this volume provides an overall description of the forensic practice from a practitioner’s perspective. Based on the author’s decades of experience conducting investigations and working in information technology, the text describes best practices, illustrates the forensic process, explains what it takes to be an investigator, and highlights emerging trends. Filled with helpful templates and contributions from seasoned experts in their respective fields, the book also considers cultural implications, ethics, and the psychological effects that digital forensics investigations can have on investigators. Catalog no. K13476, December 2012, c. 198 pp. ISBN: 978-1-4398-7495-0, $79.95 / £49.99 Also available as an eBook


Steven Hernandez, CISSP Series: (ISC)2 Press

Recognized as one of the best tools available for the information security professional and especially for candidates studying for the (ISC)2 CISSP examination, the Official (ISC)2® Guide to the CISSP® CBK®, Third Edition has been updated and revised to reflect the latest developments in this ever-changing field. Endorsed by the (ISC)2, this book provides unrivaled preparation for the certification exam that is both up to date and authoritative. Compiled and reviewed by CISSPs and (ISC)2 members, the text provides an exhaustive review of the ten current domains of the CBK. Catalog no. K16456, December 2012, 1520 pp. ISBN: 978-1-4665-6976-8, $79.95 / £54.99 Also available as an eBook

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules John J. Trinckes, Jr. PathForwardIT, Cincinnati, Ohio, USA

This volume is a comprehensive manual to ensuring compliance with the implementation standards of the Privacy and Security Rules of HIPAA and provides recommendations based on other related regulations and industry best practices. It can also help those entities that may not be covered by HIPAA regulations but want to assure their customers they are doing their due diligence to protect their information. The book covers administrative, physical, and technical safeguards; organizational requirements; procedures; and documentation requirements. It provides sample documents and directions on using the policies and procedures to establish proof of compliance. Catalog no. K14680, December 2012, 472 pp. ISBN: 978-1-4665-0767-8, $79.95 / £49.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 15

Information Security Advances in Biometrics for Secure Human Authentication and Recognition Edited by

Dakshina Ranjan Kisku, Phalguni Gupta, and Jamuna Kanta Sing This book showcases the technologies and algorithms being used for human authentication and recognition. Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional biometric techniques as well as novel systems developed over the past few years. It includes coverage of new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. The text includes model question papers, mathematical notations, and exercises to reinforce understanding. • Includes model question papers, mathematical notations, exercises, and illustrations • Contains the contributions of some of the world’s most respected biometrics researchers • Showcases the latest technologies and algorithms that are being used for human authentication and recognition • Supplies up-to-date reviews of intelligence techniques and theories used in biometric technologies for human authentication and identification

Selected Contents: Security and Reliability Assessment for Biometric Systems. Review of Human Recognition Based on Retinal Images. Visual Speech as Behavioral Biometric. Human Gait Signature for Biometric Authentication. Hand-Based Biometric for Personal Identification Using Correlation Filter Classifier. On Deciding the Dynamic Periocular Boundary for Human Recognition. Retention of Electrocardiogram Features Insignificantly Devalorized as an Effect of Watermarking for a Multimodal Biometric Authentication System. Facial Feature Point Extraction for Object Identification Using Discrete Contourlet Transform and Principal Component Analysis. Case Studies and Large Scale Biometric Systems. The Legal Aspects and Ethical Issues in the Use of Biometrics: A Study from Norway. Biometric Identification: Device Specification and Actual Performance Considered for the Operations of the Unique Identity Authority of India. Catalog no. K18934, December 2013, 352 pp. ISBN: 978-1-4665-8242-2, $129.95 / £82.00 Also available as an eBook

Data Governance Creating Value from Information Assets Edited by

Neera Bhansali iMEMS Corp.

This book provides business managers, IT professionals, and students with an integrated approach to designing, developing, and sustaining an effective data governance strategy. Focusing on the organizational, operational, and strategic aspects of data governance, it addresses the issue of how to leverage, derive, and sustain value from informational assets that are housed in the IT infrastructure. It provides an overall understanding of data governance, addressing the burning issue of aligning data assets to both IT assets and organizational strategic goals in order to leverage potential value in data assets. Catalog no. K13707, June 2013, c. 268 pp. ISBN: 978-1-4398-7913-9, $79.95 / £49.99 Also available as an eBook

Network Attacks and Defenses A Hands-on Approach Zouheir Trabelsi, Kadhim Hayawi, Arwa Al Braiki, and Sujith Samuel Mathew Using step-by-step processes to build and generate attacks using offensive techniques, this volume enables readers to implement appropriate network security solutions within a laboratory environment. Topics covered include CAM table poisoning attacks on network switches, ARP cache poisoning attacks, the detection and prevention of abnormal ARP traffic, network traffic sniffing and the detection of NICs running in promiscuous mode, and IP-based DoS attacks. It also examines reconnaissance traffic, network traffic filtering and inspection, and IPsec VPN security solution protocols, standards, types, and deployments. Catalog no. K15137, October 2012, 475 pp. ISBN: 978-1-4665-1794-3, $93.95 / £59.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 16

Information Security Security for Wireless Sensor Networks using Identity-Based Cryptography Harsh Kupwade Patil Fish & Richardson P.C., Dallas, Texas, USA

Stephen A. Szygenda Southern Methodist University, Dallas, Texas, USA

This book introduces new cross-layer design approaches for wireless sensor networks using identity-based cryptography. It starts with a review of the existing layered approach and then examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the authors present a cross layer design approach to address authentication, integrity, and encryption. They also examine new ID-based key management mechanisms using a cross layer design perspective as well as secure routing and new intrusion detection techniques. Catalog no. K13162, October 2012, 232 pp. ISBN: 978-1-4398-6901-7, $125.95 / £81.00 Also available as an eBook

Electronically Stored Information The Complete Guide to Management, Understanding, Acquisition, Storage, Search, and Retrieval David R. Matthews Office of Information Security, Seattle, Washington, USA

Security and Privacy in Smart Grids Edited by

Yang Xiao The University of Alabama, Tuscaloosa, USA

A versatile reference, this book details state-of-the-art approaches and novel technologies for communication networks and security in smart grids. It examines contemporary grid security and discusses how it is being developed and deployed. The chapters cover direct attacks and smart meters, as well as attacks via the networks—providing actionable suggestions for preventing such attacks. The chapters work together to provide a framework for how security should be implemented throughout this growing system. Figures, illustrations, graphs, and charts are included to aid with comprehension. Catalog no. K13608, July 2013, 353 pp. ISBN: 978-1-4398-7783-8, $79.95 / £49.99 Also available as an eBook

Information Technology Control and Audit Fourth Edition Sandra Senft and Frederick Gallegos California State Polytechnic University, Pomona, USA

Aleksandra Davis Glendora, California, USA

Accessible to readers at varied levels of technological understanding, this book covers all aspects of electronic data and how to manage it. It explains what electronic information is and where it is located. It explores different ways it can be stored, why we need to manage it from a legal and organizational perspective, who is likely to control it, and how it should be acquired to meet legal and managerial goals. The text includes links and references to additional information, technical software solutions, as well as helpful forms and time-saving guides.

Updated to address cloud computing, web-based applications, and server virtualization, the fourth edition of this bestselling text provides a comprehensive overview of IT controls and audits. It facilitates a fundamental understanding of IT governance, controls, auditing applications, systems development, and operations. Supporting and analyzing the COBIT model, the book prepares IT professionals for the CISA and CGEIT exams. With summary sections, exercises, review questions, and references for further readings, it promotes the mastery of the concepts and practical implementation of controls needed to effectively manage IT resources.

Catalog no. K13576, July 2012, 400 pp. ISBN: 978-1-4398-7726-5, $73.95 / £46.99 Also available as an eBook

Catalog no. K14177, July 2012, 776 pp. ISBN: 978-1-4398-9320-3, $89.95 / £57.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 17

Information Security Cyberspace and Cybersecurity George Kostopoulos University of Maryland University College, Adelphi, USA

Based on related courses and research of the cyber environment in areas such as Europe, America, and Asia, this book provides comprehensive coverage of cyberspace and cybersecurity. It not only focuses on technologies but also explores human factors and organizational perspectives—emphasizing why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, and ethical and legal issues. The book also describes how to ensure business continuity in the event of adverse incidents, including acts of nature. Catalog no. K14391, July 2012, 236 pp. ISBN: 978-1-4665-0133-1, $83.95 / £51.99 Also available as an eBook

Information Security Management Handbook Sixth Edition, Volume 6 Edited by

Harold F. Tipton and Micki Krause Nozaki This annually updated handbook provides a compilation of the fundamental knowledge, skills, techniques, and tools required by IT security professionals. It covers the CISSP® Common Body of Knowledge (CBK®) that forms the standard on which all IT security programs and certifications are based. Topics covered include access control, physical (environmental) security, cryptography, application security, and operations security. This new edition features the latest developments in information security and the (ISC)2® CISSP CBK, including advanced persistent threats, new HIPAA requirements, social networks, virtualization, and SOA. Catalog no. K14176, March 2012, 504 pp. ISBN: 978-1-4398-9313-5, $104.95 / £66.99 Also available as an eBook


Anonymous Communication Networks Protecting Privacy on the Web Kun Peng Institute for Infocomm Research, Singapore

Effective Surveillance for Homeland Security Balancing Technology and Social Issues Edited by

Francesco Flammini, Roberto Setola, and Giorgio Franceschetti

This book examines anonymous communication networks as a solution to Internet privacy concerns. It explores various anonymous communication networks as possible solutions to Internet privacy concerns and identifies specific scenarios where it is best to remain anonymous. The text details the two main approaches to anonymous communication networks: onion routing and mixed networks. Using examples and case studies, it illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It also includes guidance to help readers download and install Tor, I2P, JAP/JonDo, and QuickSilver.

Since the September 11th attacks, the scientific and engineering communities have been called upon to help the world respond to security challenges. This volume focuses on multidisciplinary problem analysis and systems engineering approaches to security. It presents a comprehensive survey of state-of-the-art methods for the surveillance and protection of citizens and critical infrastructure against both natural and deliberate threats. The first section analyzes technical issues related to surveillance. Next, the book examines legislative, organization, and management issues with a specific emphasis on privacy concerns. Finally, the contributors discuss innovative solutions and new research topics garnering heightened attention.

Catalog no. K13841, April 2014, 203 pp. ISBN: 978-1-4398-8157-6, $79.95 / £49.99 Also available as an eBook

Catalog no. K13920, June 2013, 646 pp. ISBN: 978-1-4398-8324-2, $119.95 / £72.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:14 AM Page 18

Information Security Noiseless Steganography The Key to Covert Communications Abdelrahman Desoky Consultant, Baltimore, Maryland, USA

Official (ISC)2® Guide to the ISSAP® CBK Second Edition Edited by

(ISC)² Corporate

The first book to provide comprehensive coverage of linguistic steganography, graph steganography, and game steganography, Noiseless Steganography: The Key to Covert Communications discusses the implementation and steganalysis validation of ten Nostegabased methodologies. It describes how to establish covert channels by employing the selected domain to serve as justification for the interaction and delivery of the cover among the communicating parties. Instead of using contemporary steganography approaches to camouflage your data as noise that is assumed to look innocent, the text provides you with the tools to prevent your adversaries from suspecting the existence of covert communications altogether. • Introduces a novel noiseless steganography paradigm (Nostega) that neither hides data in a noise nor produces noise

Candidates for the ISSAP® certification need to demonstrate a thorough understanding of the six domains of the ISSAP® CBK® as well as the ability to apply this knowledge to develop detailed security architectures. Supplying an authoritative review of key concepts and requirements of the ISSAP® CBK®, the second edition of this official guide provides the practical understanding required to implement the latest security protocols. Encompassing all of the knowledge elements needed to create secure architectures, the text covers requirements analysis, access control, cryptography, physical security, BCP/DRP, and telecommunications and network security. Catalog no. K16840, August 2013, 600 pp. ISBN: 978-1-4665-7900-2, $79.95 / £49.99 Also available as an eBook

• Explains how to camouflage messages as well as their transmission • Demonstrates how to determine a suitable domain capable of generating an unsuspicious steganographic cover • Presents ten Nostega-based methodologies

Official (ISC)2 Guide to the CSSLP CBK Second Edition

Selected Contents:

Mano Paul

Introduction Related Work

SecuRisk Solutions, Pflugerville, Texas, USA

Graphstega: Graph Steganography Methodology

Series: (ISC)2 Press

Chestega: Chess Steganography Methodology

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.

Edustega: Education-Centric Steganography Methodology Sumstega: Summarization-Based Steganography Methodology Steganalysis Validation Conclusion and Future Work Catalog no. K12069, February 2012, 300 pp. ISBN: 978-1-4398-4621-6, $125.95 / £81.00 Also available as an eBook

Catalog no. K16532, August 2013, 800 pp. ISBN: 978-1-4665-7127-3, $89.95 / £54.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 19

IT & Project Management New!

Empowering Project Teams Using Project Followership to Improve Performance Marco Sampietro Business School of Bocconi University, Milan, Italy

Tiziano Villa Project Management LAB

Examining the project environment from the perspective of project team members, this book re-interprets project management methodologies and behaviors using a bottom-up approach. It explores the application of project followership in the key stages of project management and details the methods and techniques that all project team members need to know. Outlining the behaviors team members should adopt for project success, the text considers project closure and transfer and explains why this is an ideal time to evaluate if efforts invested have been rewarded. • Presents the project management skills that team members should have and outlines the behaviors they should adopt to be successful participants in a project environment • Illustrates the project dynamics through the lenses of project team members • Provides readers with tools and skills to improve project performance while increasing personal satisfaction • Examines the end of a project as an important moment to determine if efforts invested have been rewarded

Selected Contents: Project Followership Introduction to Project Management Project Followership in Action The Kickoff Meeting The Requirements Analysis Planning the Scope Project Scheduling Formulation of Estimates Project Risk Management Change as a Natural Factor in Projects Controlling the Project Projects Never Finish: The Importance of the Lessons Learned Personal Assessment Exercises Solutions Catalog no. K22109, February 2014, 300 pp. ISBN: 978-1-4822-1755-1, $69.95 / £44.99 Also available as an eBook


Agile Strategy Management Techniques for Continuous Alignment and Improvement Soren Lyngso Lyngso Informatique

“Enjoyable reading ... provides answers on how to secure success while practicing agile strategy management. Søren Lyngsø clearly sets up solid guidelines for success implementing strategic initiatives.” —Niels Bonde, Business Engineer at CGI

This book details what it takes to initiate, develop, implement, and govern a strategy that delivers the benefits expected by all stakeholders. It presents insights gained by the author’s organization over the last 25 years helping their clients succeed with their strategic initiatives. It illustrates wide-ranging situations where the author’s company helped clients reach important business objectives. Readers can use the book to look up examples that describe the various ways to use agile methods and techniques for critical business functions, including stakeholder identification, team building, project and program quality management, and procurement of resources. • Presents insights gained by the author’s organization over the last 25 years helping their clients achieve success with their strategic initiatives • Explains how to build agility into the initiation, development, implementation, and governance of strategic initiatives • Supplies guidance on how to respond strategically to changing markets, technology, and legal factors

Selected Contents: Introduction Team Building for a Strategic Initiative Strategy Process Quality Management Solution Provider Procurement Strategy Implementation Strategy Governance Agile Strategic Management Recap Catalog no. K20756, March 2014, 444 pp. ISBN: 978-1-4665-9607-8, $79.95 / £49.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 20

IT & Project Management New!


The SAP Materials Management Handbook

Big Data, Mining, and Analytics Components of Strategic Decision Making

Ashfaque Ahmed SCM Consulting, Bhilai, Chattisgarh, India

Stephan Kudyba

This handbook provides a complete understanding of how to configure and implement the SAP materials management module across various types of projects. It uses system screenshots of SAP environments to illustrate the complete flow of business transactions involved with SAP MM. Supplying detailed explanations of the steps involved, it presents case studies from actual projects that demonstrate how to convert theory into powerful SAP MM solutions. The book explains how to use the SAP MM module to take care of the complete range of business functions related to purchasing and inventory management. • Covers all SAP MM purchase functions, including purchase orders, purchase requisitions, outline contracts, and request for quotation • Examines all SAP MM inventory management functions such as physical inventory, stock overview, stock valuation, movement types, and reservations • Illustrates the procure to pay lifecycle This much-needed reference explains how to use the SAP MM module to take care of the range of business functions related to purchasing, including purchase orders, purchase requisitions, outline contracts, and request for quotation. It also examines all SAP MM inventory management functions such as physical inventory, stock overview, stock valuation, movement types, and reservations—explaining how SAP MM can be used to define and maintain materials in your systems. Catalog no. K18886, March 2014, 443 pp. ISBN: 978-1-4665-8162-3, $79.95 / £49.99 Also available as an eBook

Filled with examples that illustrate the value of analytics throughout, the book outlines a conceptual framework for data modeling that can help you immediately improve your own analytics and decision-making processes. It also provides in-depth coverage of analyzing unstructured data with text mining methods to supply you with the well-rounded understanding required to leverage your information assets into improved strategic decision making. • Covers the spectrum of analytics approaches for decision making, including dashboards , OLAP cubes, data mining, and text mining • Illustrates the value of analytics through numerous practical examples throughout the text • Facilitates a clear understanding of the concept of big data, as well as insight into big data processes and tactics used in decision making

Selected Contents: Introduction to the Big Data Era Information Creation through Analytics Big Data Analytics—Architectures, Implementation Methodology, and Tools Data Mining Methods and the Rise of Big Data Data Management and Model Creation Process of Structured Data for Mining and Analytics The Internet: A Source of New Data for Mining in Marketing Mining and Analytics in E-Commerce Streaming Data in the Age of Big Data Using CEP for Real-Time Data Mining Transforming Unstructured Data into Useful Information Mining Big Textual Data The New Medical Frontier: Real-Time Wireless Medical Data Acquisition for 21st-Century Healthcare and Data Mining Challenges Catalog no. K16400, March 2014, 325 pp. ISBN: 978-1-4665-6870-9, $79.95 / £49.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 21

IT & Project Management Coming Soon!

BYOD for Healthcare Jessica Keyes New Art Technologies, Monroe Township, New Jersey, USA

Written by the president of New Art Technologies, Inc. and former managing director of R&D for the New York Stock Exchange, BYOD for Healthcare provides authoritative guidance to help readers thrive during the healthcare BYOD (hBYOD) revolution. The book explores these new end users and their demands, as well as the strategic and tactical ramifications of these demands. The book examines the broad range of technical considerations and considers the integration of BYOD to current health IT, legal, regulatory, and ethical issues. • Covers risk assessment and mitigation strategies for a BYOD that are in line with medical laws, regulations, ethics, and the HIPAA and HITECH Acts • Examines the broad range of technical considerations, including selection, connectivity, training, support, and security • Explains how to integrate BYOD into resource management with considerations for certification of EMR/EHR software, health informatics, and health information exchange

Selected Contents: The BYOD Revolution Adapted to Health Information Technology Making a Financial Case for BYOD Integrating hBYOD into Performance Measurement and Management Systems Assessment and Mitigation of Risks in an hBYOD Environment Guidelines for Managing and Securing Mobile Devices in the Health Organization Cloud Best Practices Configuration Management in a BYOD Environment Content Management for hBYOD Integrating hBYOD into Resource Management BYOD Means Social Networking Getting a Quick Start on hBYOD Catalog no. K22173, May 2014, 454 pp. ISBN: 978-1-4822-1981-4, $69.95 / £44.99 Also available as an eBook


Buying, Supporting, Maintaining Software and Equipment An IT Manager's Guide to Controlling the Product Lifecycle Gay Gordon-Byrne Digital Right to Repair Coalition, New Jersey, USA

This book presents information about maintenance and support issues for technology products in the order in which users experience them. The first section deals with the initial purchase of equipment and software and associated initial support contracts. The second section delves into post-warranty support options and issues. The third section provides more technological details about how machines are built and how software interacts with hardware. The final section integrates the preceding materials to help prepare readers to fully control the lifecycle of their purchases. • Shows how to acquire more knowledge about products and services being offered than a vendor sales team would offer • Describes what to focus on when negotiating service and support agreements • Explains how to control the useful life of equipment • Demonstrates the power of purchase orders in getting more favorable agreements • Provides tips on how to avoid excessive charges from predatory vendors

Selected Contents: Initial Product Acquisition. Equipment and Application Acquisition. Initial Support and Maintenance. Hardware Warranty Models. Software Warranty Models. Finance and Accounting Issues for Maintenance and Support. Post-Warranty Support and Maintenance. Responsibility for "Defect Support". Post-Warranty Hardware Maintenance. Technology Product Details. Machine Code. Service Parts. Service Restoration and Support Process. Hardware Building Blocks – Components and Reliability. Repair Issues by Product Type. Controlling Product Life. Software Building Blocks - Using the Machine. Software Support Issues. Support Restrictions to Control Purchases. Business Intelligence for Support and Maintenance. End of Service Life and Obsolescence. Catalog no. K22918, June 2014, 328 pp. ISBN: 978-1-4822-3278-3, $69.95 / £44.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 22

IT & Project Management Business Analytics

Program Management Leadership

An Introduction Edited by

Jay Liebowitz University of Maryland University College, Adelphi, USA

This book explains how to use business analytics to sort through an ever-increasing amount of data and improve the decision-making capabilities of an organization. Covering the key areas of business analytics, the book explores the concepts, techniques, applications, and emerging trends that professionals across a wide range of industries need to be aware of. It also examines legal and privacy issues and explores social media in analytics. With this book, readers can develop the understanding required to use Big Data and high-performance computing in complex environments to improve strategic decision making. • Introduces business analytics concepts, techniques, issues, applications, and emerging trends • Includes software-generic exercises and labs along with answers to labs/exercises • Examines legal and privacy issues • Explores social media in analytics Figure slides are available upon qualifying course adoption

Selected Contents: The Value of Business Analytics Producing Insights from Information through Analytics Executive/Performance Dashboards Data Mining: Helping To Make Sense of Big Data Big Data Analytics for Business Intelligence Text Mining Fundamentals Neural Network Fundamentals Measuring Success in Social Media: An Information Strategy in a Data Obese World The Legal and Privacy Implications of Data Mining Epilogue: Parting Thoughts about Business Analytics Catalog no. K20757, December 2013, 288 pp. ISBN: 978-1-4665-9609-2, $89.95 / £57.99 Also available as an eBook

Creating Successful Team Dynamics Mark C. Bojeun Identifying critical success factors specific to program management, this book examines various leadership styles and traits—providing helpful insights on the tough choices leaders are often forced to make. Next, it examines teams and explains how to bring disparate people together to work towards common goals and visions. It describes how to build and maintain a High Performing Team as well as how to instill a competitive spirit and culture of cooperation and mutual respect in your team to make sure your team remains focused on the right things. • Identifies critical success factors specific to program management • Uses real-world scenarios to demonstrate the impact of good and bad leadership styles on program success • Explains how to make sure a team is driven towards success through the use of a competitive spirit, cooperation, and mutual respect

Selected Contents: Introduction Leadership and Program Management Leadership Study Developing and Achieving a Common Vision The History of Project and Program Management Distinction between Portfolio, Program, and Project Management Leadership Introduction to Leadership External Factors Affecting Leadership Individual Motivation Leadership Theories Leadership in Program Management Leadership and Teams Building Teams Team Dynamics High-Performing Teams (HPTs) Conflict Resolution Case Study in Leading Teams Formal Leadership Processes Formal Processes Catalog no. K16766, December 2013, 226 pp. ISBN: 978-1-4665-7709-1, $69.95 / £44.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 23

IT & Project Management Successful Program Management Complexity Theory, Communication, and Leadership Wanda Curlee Deloitte, Philadelphia, Pennsylvania, USA

Robert Lee Gordon American Public University System, Charlestown, West Virginia, USA

Successful Program Management: Complexity Theory, Communication, and Leadership identifies the best leadership types for complex program environments. It goes beyond what is currently available in program management standards to outline powerful solutions to the macro and micro program issues facing program managers. Using language that is easy to understand, it explains what it takes to communicate strategically to all parties involved and addresses the communication issues common to most programs, including stakeholder communication, project team communication, and shareholder communication. • Addresses the communication issues common to programs, including stakeholder communication, project team communication, and shareholder communication • Describes complexity theory techniques for building effective communication in a virtual environment • Identifies the best leadership types for complex program environments • Goes beyond what is available in program management standards to address the macro and micro issues facing program managers

Selected Contents: Introduction. Complexity Theory. Course Materials #1. Leadership in Program Management. Leadership and Program Management. Complexity and Program Management. Course Materials #2. Communication and Program Management. Technology-Based Communication, Complexity, and Program Management. Course Materials #3. Complexity-Based Program Management. Applied Complexity and Program Management. Successful Program Management and Complexity. Course Materials #4. The Future of Program Management and Complexity. Advancing the Future of Program Management. Course Materials #5. Catalog no. K16403, October 2013, 246 pp. ISBN: 978-1-4665-6879-2, $69.95 / £44.99 Also available as an eBook

Creative, Efficient, and Effective Project Management Ralph L. Kliem LeanPM, LLC, Redmond, Washington, USA

This book provides an in-depth discussion of creativity and its relationship to project management. Examining the five processes executed in a project, it discusses common and not some common tools and techniques for developing project management deliverables. It also provides suggestions for overcoming common challenges that project managers face. Each chapter includes a checklist and a case study on the application of the concepts presented. The book also indicates how the topics of discussion relate to the Project Management Institute's (PMI®) Project Management Body of Knowledge (PMBOK®). • Identifies challenges to creativity in a project and how to overcome them • Describes the tools and techniques of creativity and how to apply them to the major processes within project management • Establishes the groundwork for encouraging and sustaining creativity in a project • Unveils ten secrets about creativity in projects

Selected Contents: Creativity and Project Management Creative Thinking Abilities Groups and Creativity Challenges and Constraints Laying the Groundwork for a Creative Environment Common Creativity Tools and Techniques Creativity Life Cycle Models Creativity and the Defining Process Creativity and the Organizing Process Creativity and the Planning Process Creativity and the Executing Process Creativity and the Monitoring and Controlling Process Creativity and the Closing Process A Baker’s Dozen of Takeaways Catalog no. K16757, October 2013, 320 pp. ISBN: 978-1-4665-7692-6, $69.95 / £44.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 24

IT & Project Management The Complete Project Management Office Handbook

Sustainable Program Management Gregory T. Haugan The world is undergoing major transitions due to changes in three driving forces—population, climate, and energy resources—making it essential for us to achieve sustainability in the implementation of projects and programs as well as our everyday life. This book provides essential information on the three major driving forces of the coming decades and presents options to assist us in moving toward a sustainable future. It uses a format that makes it easy to understand and apply to medium and long-range planning.

Selected Contents: Overlay Concept and Structure for Sustainability Sustainability Sustainability Definitions and Concepts Sustainable Development Rules and Sustaining the Commons Population Overview: Population and Demographics Overlay Introduction to Demographics World Population United States Population World Age Distribution and Sustainability... Climate Change Climate Change: Introduction and Definitions History and Background of the Science Greenhouse Effect Climate Change Overlays Mitigation Planning for a Warmer Future Energy Resources Energy Constraint Overlay Nonrenewable Energy Source Overlays Non-Renewable Energy: Coal Non-Renewable Energy: Liquid Fuels Non-Renewable Energy: Natural Gas Nuclear Energy Source Overlays Nuclear Energy and Sustainability Renewable Energy Source Overlays Renewable Energy Sources: Introduction Solar Power. Wind Energy Geothermal Energy Biomass Energy Hydropower Systems Planning for Sustainability Pathways toward a Sustainable System Sustainability Policies Glossary Bibliography Index Catalog no. K16683, October 2013, 384 pp. ISBN: 978-1-4665-7516-5, $79.95 / £49.99 Also available as an eBook


Third Edition Gerard M. Hill Principal, Hill Consulting Group, Woodbridge, Virginia, USA

Expanded and thoroughly revised, this book extends the concepts and considerations of "modern project management" into the realm of project management oversight, control, and support. It recognizes the need for a centralized organizational entity—the project management office (PMO)—to perform in this capacity. It also positions the PMO as a business integrator, whether that role is limited to managing multiple projects as a program, or expanded to serve both project and business management interests in the organization. The PMO model defined in this book helps both project managers and the organization to understand and apply professional practices in project management, and to adapt and integrate business practices into the project management environment.

Selected Contents: Practice Management Project Management Methodology Project Management Tools Standards and Metrics Project Knowledge Management Infrastructure Management Project Governance Assessment Organization and Structure Facilities and Equipment Support Resource Integration Resource Management Training and Education Career Development Team Development Technical Support Mentoring Project Planning Project Auditing Project Recovery Business Alignment Project Portfolio Management Customer Relationship Management Vendor/Contractor Relationship Management Business Performance Management Appendices Catalog no. K16277, September 2013, 741 pp. ISBN: 978-1-4665-6631-6, $89.95 / £57.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 25

IT & Project Management From Projects to Programs A Project Manager's Journey Samir Penkar

This book tells the story of an up-and-coming project manager that’s been handed a large program to lead. Readers follow along as she struggles, leads, stumbles, and grows into the program manager role. Introducing key program management concepts throughout, the book provides a backstage view into the workings of program management, program organization, team dynamics, and the skills required to manage programs. Told through the eyes of a program manager, readers will experience the ins and outs of program management. • Facilitates a clear understanding of how to run successful programs • Presents new ideas on program structure and organization • Outlines ways to simplify program reporting needs • Explains how to coordinate and prioritize resources across projects

Leading Virtual Project Teams Adapting Leadership Theories and Communications Techniques to 21st Century Organizations Margaret R. Lee Leading Virtual Project Teams addresses the challenges today’s virtual project management environment poses to traditional methods of leadership and communication.It explores many facets of e-leadership—from traditional leadership theories to virtual project communications. The book provides fresh approaches for adapting existing leadership theories to e-leadership as well as progressive tools to improve virtual project communications. For educational institutions, this text can be used to increase the body of knowledge for project management leadership and communications outside the traditional project environment. • Managing and motivating the multicultural team • Communicating in a distributed work environment • Avoiding social isolation

• Details an approach to program governance structure

• Cyber-bullying in the virtual environment and e-ethics

• Supplies techniques to keep the program focused on program goals

• Cultural management issues

Selected Contents: The Birth of My First Program What Is it Really I Do? Program Roadmap Estimates and Program Financials Why Do It? Benefits, Benefits, Benefits The Prosperity Game for Governance Program Integration Challenges The Long Implementation Phase Benefits Management The Fruits of Growth Reflections Selected Bibliography Glossary Catalog no. K20532, September 2013, 157 pp. Soft Cover, ISBN: 978-1-4665-9181-3 $49.95 / £31.99 Also available as an eBook

This book provides the virtual project manager with the tools and techniques to improve e-leadership and communications. Complete with case studies that illustrate real-world applications to the virtual challenges presented in each chapter, the book is a suitable text for educational institutions looking to increase understanding of project management leadership and communications outside the traditional project environment.

Selected Contents: Overview e-Leadership for Projects Enhancing Virtual Project Communications Cultural Communication Issues and Effective e-Leadership Virtual Project Leadership Competencies Catalog no. K16755, July 2013, 217 pp. ISBN: 978-1-4665-7688-9, $69.95 / £44.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 26

IT & Project Management Green Computing

Construction Program Management Joseph Delaney President and General Manager, CMS Delany

Although the construction industry is one of the largest enterprises in the United States, widely accepted management principles, such as those contained in PMI®’s Standard for Program Management are still not widely implemented. This book explores how an improved understanding of these principles could boost construction program success rates. It outlines a process-based approach to construction program management that leverages structure to bring order to what can otherwise feel like an overwhelming challenge. The book includes case studies that illustrate the proper implementation of the steps outlined in the book. • Explains how the principles of PMI®’s Standard for Program Management can be effectively implemented on construction programs • Illustrates the difference between strategic (program) and tactical (project) management techniques • Describes the difference between leadership (strategic) and management (tactical) skills • Uses language that’s easy to understand • Shares valuable lessons learned through the use of case studies • Explores the differences and similarities between program management principles included in the PMI® Body of Knowledge and the CMAA® (Construction Management Association of America)

Selected Contents: Process-Based Management Approach Program Management Process Groups Initiation Process Planning Process Execution Process The Closure Process

Tools and Techniques for Saving Energy, Money, and Resources Bud E. Smith Connecting the green agenda in IT to the broader overall green agenda, this book shows how going green can pay for itself with reduced hardware, software, support, and energy costs. It also ties green computing to the broader corporate agendas of risk management, brand management, and reputation management. This authoritative text provides quotable budget justifications that can be used by executives, IT management, suppliers, and market analysts to help place IT stakeholders on the same page for a new agenda that will save energy, money, resources, and the planet. • Demonstrates not only savings but increased business resiliency from green computing • Describes how to use the cloud to make software available and store data • Shows readers how to make the case for green computing to a wide range of internal and even external audiences

Selected Contents: Green Computing and Your Reputation Green Computing and Saving Money Green Computing and the Environment A New Vision of Computing Building a Green Device Portfolio Finding Green Devices Green Servers and Data Centers Saving Energy Reducing Greenhouse Gas Emissions Reducing Resource Use Green Computing by Industry Segment The Future: Deep Green Computing Catalog no. K14462, July 2013, 262 pp. ISBN: 978-1-4665-0340-3, $69.95 / £44.99 Also available as an eBook

Catalog no. K16673, July 2013, 199 pp. ISBN: 978-1-4665-7504-2, $79.95 / £49.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 27

IT & Project Management Applying Guiding Principles of Effective Program Delivery Kerry R. Wills Southington, Connecticut, USA

While today’s programs continue to grow in size and complexity, their success rates remain low. To manage programs effectively in this environment, project managers and program managers must take a consultative approach that applies a core set of guiding principles across every function of the program. This book explains what it means to take a consultative approach. Instead of focusing on specific program management techniques, it covers the guiding principles required to make those techniques effective— making it applicable to any program in any industry. Intended for IT professionals tasked with managing large projects or programs, the book is an ideal reference for project managers and program managers who have a fundamental background in project and program management and are ready to improve their skill set and thinking on how to manage their work more effectively. • Identifies the critical guiding principles for running a program office • Supplies in-depth coverage of each function of the program office • Highlights leadership, transparency, and influencing stakeholders • Provides proven guidelines for successfully implementing the program management tools covered in the text • Includes case studies based on actual programs in the insurance industry

Selected Contents: Context and Case Consultative Approach and the Program Office Guiding Principles Program Management Functions Conclusions Catalog no. K20360, July 2013, 247 pp. ISBN: 978-1-4665-8789-2, $69.95 / £44.99 Also available as an eBook

PgMP® Exam Challenge! Ginger Levin, PMP, PgMP J. LeRoy Ward, PMP, PgMP ESI International, New York, New York, USA Series: ESI International Project Management Series

Up to date with the third edition of PMI’s Program Management Standard, The PgMP® Exam Challenge! contains more than 300 practice questions to help readers hone their knowledge and test their skills. It covers all five of the program management domains: Strategic Program Management, Program Management Life Cycle, Benefits Management, Stakeholder Management, and Governance. It also examines all of the sub domains of the lifecycle domain. With an easy-to-use format, this is an ideal resource for those preparing to take the PgMP exam. • Reflects the third edition of PMI's Program Management Standard (2013) • Includes more than 300 questions to help readers hone their knowledge and test their skills • Covers all five of the program management domains • Examines all sub domains in the Life Cycle domain

Selected Contents: Introduction Strategic Program Management Benefits Management Stakeholder Engagement Governance Program Management Life Cycle Initiating Planning Executing Monitoring and Controlling Closing Catalog no. K21191, June 2013, 544 pp. Soft Cover, ISBN: 978-1-4822-0208-3 $49.95 / £31.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 28

IT & Project Management PgMP® Exam Practice Test and Study Guide Fourth Edition Ginger Levin Project Management Consultant, Lighthouse Point, Florida, USA

J. LeRoy Ward ESI International, New York, New York, USA Series: ESI International Project Management Series

Up to date with the third edition of PMI’s Standard for Program Management, this is the most comprehensive resource available to help prepare readers for the PgMP® Exam. Updated with new and changed terminology, this edition incorporates the concepts from the five performance domains. The book features practical study hints, a list of major topics covered on the exam, and a bibliographic reference for further study. The two challenging, 170-question practice tests are available in the book and online so readers can retake the practice tests as many times necessary. • Reflects the third edition of PMI's Program Management Standard • Includes two challenging, 170-question practice tests that are available in the book and online • Supplies an insider's look at the questions, phrases, terminology, and sentence construction of the actual PgMP® exam • Provides study hints, a list of major topics covered on the exam, and multiple-choice practice questions for each domain • Includes a comprehensive answer key and a bibliographic reference for further study

Selected Contents: Introduction Strategic Program Management Initiating the Program Planning the Program Executing the Program Controlling the Program Closing the Program Benefits Management Stakeholder Management Governance Practice Test 1 Practice Test 2 References

PMP® Exam Challenge! Sixth Edition J. LeRoy Ward, PMP, PgMP ESI International, New York, New York, USA

Ginger Levin, PMP, PgMP Preparing for and passing the PMP® exam is no small feat. Although the number of certified PMP®s continues at a phenomenal rate, the exam failure rate remains uncommonly high. PMP® Exam Challenge! is designed to help you pass the exam by giving you an easy-to-use, highly portable publication, containing key relevant topics you are certain to encounter on your exam. Featuring 660 practice questions, this sixth edition completely reflects the PMBOK® Guide, Fifth Edition and covers the guide’s ten knowledge areas. • Reflects the PMBOK® Guide, Fifth Edition • Includes 660 practice test questions • Covers the newest knowledge area—Stakeholder Management

Selected Contents: Project Integration Management Project Scope Management Project Time Management Project Cost Management Project Quality Management Project Human Resource Management Project Communications Management Project Risk Management Project Procurement Management Project Stakeholder Management Catalog no. K20985, June 2013, 636 pp. Soft Cover, ISBN: 978-1-4665-9982-6 $49.95 / £31.99 Also available as an eBook

Catalog no. K21134, June 2013, 400 pp. Soft Cover, ISBN: 978-1-4822-0135-2 $69.95 / £44.99 Also available as an eBook


Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 29

IT & Project Management PMP® Exam Practice Test and Study Guide Ninth Edition J. LeRoy Ward, PMP, PgMP ESI International, New York, New York, USA

Ginger Levin Project Management Consultant, Lighthouse Point, Florida, USA

PMP® Exam: Practice Test and Study Guide, Ninth Edition uses self-study to help readers increase their chances of passing the PMP certification exam the first time. This spiral-bound edition includes 40 multiplechoice practice questions in each of the ten knowledge areas and in the professional and social responsibilities domain. It presents a 200-question practice test that simulates the actual PMP exam, fully referenced answers keyed to the five project management process groups, and a study matrix to help readers key in on areas that require further study. • Provides updated material to reflect the PMBOK® Guide, Fifth Edition • Presents more than 400 practice test questions with fully referenced answers • Covers the newest knowledge area: Stakeholder Management • Includes a study matrix to help readers key in on specific areas that require further study

Selected Contents: Acronyms Introduction Project Integration Management Project Scope Management Project Time Management Project Cost Management Project Quality Management Project Human Resource Management Project Communications Management Project Risk Management Project Procurement Management Project Stakeholder Management Practice Test References Answer Sheet Appendix: Study Matrix Answer Key Catalog no. K21206, June 2013, 536 pp. Soft Cover, ISBN: 978-1-4822-0224-3 $69.95 / £44.99 Also available as an eBook

Implementing Program Management Templates and Forms Aligned with the Standard for Program Management, Third Edition (2013) and Other Best Practices Ginger Levin Project Management Consultant, Lighthouse Point, Florida, USA

Allen R. Green Science Applications International Corporation, Frederick, Maryland, USA

Success in program management requires discipline, complete plans, well-run meetings, accurate record keeping, and adherence to global best practices. Implementing Program Management: Templates and Forms Aligned with the Standard for Program Management, Third Edition (2013) and Other Best Practices provides the templates and guidelines for the plans, forms, agendas, registers, and procedures you will need. Based on PMI’s Standard for Program Management— Third Edition (2013) and other best practices, the updated edition of this bestselling reference provides a program management methodology consisting of reports, forms, templates, and documents. It includes identifiable documents referenced in the latest Standard for Program Management as well as other helpful ones omitted from prior editions. The authors have updated the templates and forms in this book to complement what is included in the Third Edition and to include what they feel are best practices for managing programs. All the templates included in the book can be accessed online and can be easily customized to meet the unique requirements of your organization. • Provides a program management methodology consisting of reports, forms, templates, and documents • Includes templates that can be customized for each organization's unique requirements • Filled with best practices that complement PMI's Program Management Standard

Selected Contents: Introduction. Getting Started. Strategic Program Management. Program Life Cycle. Benefits Management. Stakeholder Management. Governance. Catalog no. K20851, June 2013, c. 328 pp. ISBN: 978-1-4665-9771-6, $79.95 / £49.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 30

IT & Project Management Ethics in IT Outsourcing Tandy Gold Sanford, Florida, USA

“… a surprisingly great read … Gold tackles the ethics in IT outsourcing head on. From its roots in US economics and public policy through globalization, quickly linking the issues and trends to corporate ethics and IT ethics. The book is full of thoughtful lessons in ethics and morality faced by CIO’s at an increasing rate.” —Book Review by The Higher Ed CIO

• Identifies tools that support the establishment of ethical program principles • Examines certification programs—including the online ethics training and certification offered by the Code of Ethics and Business Practice Standards for Outsourcing Professionals • Highlights future IT career paths to help readers implement pro-active career planning in a way that supports their value to the firm • Describes how to align existing and new outsourcing programs to ethical standards

Selected Contents: Overview of Ethics in IT Outsourcing – an Oxymoron? The Cost of Ethical Compromise - An Overview of Current and Historical Research and Business Practices Applied Ethics in IT Outsourcing: A Checklist for New IT Offshore Programs Applied Ethics in IT Outsourcing: Alignment of Existing IT Offshore Programs Case Study I: Avoidable Compromise Case Study II: Minimizing Negative Impact Case Study III: Re-Calibrating the Reality. Summary: The Future of IT Ethics Catalog no. K12305, May 2012, 211 pp. ISBN: 978-1-4398-5062-6, $93.95 / £58.99 Also available as an eBook


Guide to the De-Identification of Personal Health Information Khaled El Emam University of Ottawa & Privacy Analytics, Ontario, Canada

“… a practical methodology for the use of de-identification techniques and re-identification risk measurement tools, this book provides a valuable and much-needed resource for all data custodians who use or disclose personal health information for secondary purposes. Doubly enabling, privacy-enhancing tools like these, that embrace privacy by design, will ensure the continued availability of personal health information for valuable secondary purposes that benefit us all.” —Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada

Selected Contents: The Case for De-Identifying Personal Health Information Permitted Disclosures, Consent, and De-identification of PHI Permitted Uses and Disclosures of Health Information The Impact of Consent Data Breach Notifications Peeping and Snooping Unplanned but Legitimate Uses and Disclosures Public Perception and Privacy Protective Behaviors Alternative Methods for Data Access Understanding Disclosure Risks Scope, Terminology, and Definitions Frequently Asked Questions about De-identification A Methodology for Managing Re-identification Risk Definitions of Identifiability Data Masking Methods Theoretical Re-identification Attacks Measuring Re-Identification Risk Measuring the Probability of Re-identification Measures of Uniqueness Modeling the Threat Choosing Metric Thresholds Practical Methods for De-Identification De-identification Methods Practical Tips End Matter An Analysis of Historical Breach Notification Trends Methods of Attack for Maximum Journalist Risk How Many Friends Do We Have? Cell Size Precedents The Invasion of Privacy Construct General Information on Mitigating Controls Assessing Motives and Capacity Invasion of Privacy Catalog no. K16841, May 2013, 413 pp. ISBN: 978-1-4665-7906-4, $69.95 / £44.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 31

IT & Project Management Big Data and Business Analytics

Bring Your Own Devices (BYOD) Survival Guide

Edited by

Jessica Keyes

Jay Liebowitz

New Art Technologies, Monroe Township, New Jersey, USA

University of Maryland University College, Adelphi, USA

“Even in organizations that pride themselves on having a vibrant marketplace of ideas, converting data and insights into better business outcomes is a pressing and strategic challenge for senior executives. ... The chapters in this volume offer useful case studies, technical roadmaps, lessons learned, and a few prescriptions to ‘do this, avoid that.’" —From the Foreword by Joe LaCugna, Ph.D. Enterprise Analytics and Business Intelligence Starbucks Coffee Company

Selected Contents: Architecting the Enterprise via Big Data Analytics Jack and the Big Data Beanstalk: Capitalizing on a Growing Marketing Opportunity Frontiers of Big Data Business Analytics: Patterns and Cases in Online Marketing The Intrinsic Value of Data Finding Big Value in Big Data: Unlocking the Power of High-Performance Analytics Competitors, Intelligence, and Big Data Saving Lives with Big Data: Unlocking the Hidden Potential in Electronic Health Records Innovation Patterns and Big Data Big Data at the U.S. Department of Transportation Putting Big Data at the Heart of the Decision-Making Process Extracting Useful Information from Multivariate Temporal Data Large-Scale Time-Series Forecasting Using Big Data and Analytics to Unlock Generosity The Use of Big Data in Healthcare Big Data: Structured and Unstructured Index Catalog no. K16118, April 2013, 304 pp. ISBN: 978-1-4665-6578-4, $69.95 / £44.99 Also available as an eBook

This book explains and then helps readers live with the psycho-techno phenomenon that is bring your own technology (BYOT). Readers will learn how to understand these new end-users and their demands, as well as the strategic and tactical ramifications of these demands. Next, it covers the broad range of technical considerations such as selection, connectivity, training, support, and security. The text includes best practices and case studies of well-known companies, including IBM, Ford, and CarFax. • Covers the broad range of technical considerations such as selection, connectivity, training, support and security • Explains the new end-users and their demands, as well as the strategic and tactical ramifications of their demands • Includes an extensive set of best practices and case studies, including IBM, Ford, and CarFax • Examines the business aspects of BYOT: selection, purchasing, and corporate culture

Selected Contents: Consumerization of IT New generation of workers Good idea or bad The technology aspects of BYOT: virtualization, connecting to the network, etc Business aspects of BYOT: selection, purchasing, corporate culture Training Support Security Best practices in deploying BYOT Resources Appendices Catalog no. K16077, March 2013, 451 pp. ISBN: 978-1-4665-6503-6, $79.95 / £49.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 32

IT & Project Management Leading Effective Virtual Teams Overcoming Time and Distance to Achieve Exceptional Results Nancy M. Settle-Murphy “Organizations are only now beginning to realize that specialized skills and competencies are needed to lead effective virtual teams ... . I particularly enjoyed the practical tips that can be applied to almost any kind of virtual team. Nancy knows what works and shares it with us in a way that is both easy to read and apply. She covers the gamut, from building trust to cross-cultural tripwires, in a way that will work for virtual teams, whatever their makeup.” —Dr. Penny Pullan, Director, Making Projects Work Ltd.

Written as a series of bulleted tips drawn from client experiences and best practices, Leading Effective Virtual Teams: Overcoming Time and Distance to Achieve Exceptional Results presents practical tips to help leaders engage and motivate their geographically dispersed project team members. If you’re a leader of any type of virtual team and want to help your team members collaborate more effectively, then buy this book. • Explains how to influence without authority, motivate and galvanize a virtual team for top performance • Details how to blend asynchronous and synchronous communication tools to get the most out of any virtual team • Provides tips on how to design and facilitate virtual meetings that are well run, focused, and completely engaging • Discusses how to build trust and cultivate relationships across a virtual team • Addresses how to navigate cross-cultural and generational differences in the absence of visual cues

Selected Contents: Why Virtual Teams Fail. Profile of Successful Virtual Teams. What Makes a Great Virtual Team. How to Lean a Virtual Team. Accelerating Virtual Team Performance. How to Facilitate High-Impact Team Performance. Virtual Team Launch Kit. Catalog no. K15492, December 2012, 236 pp. Soft Cover, ISBN: 978-1-4665-5786-4 $52.95 / £33.99 Also available as an eBook


A Guide to IT Contracting Checklists, Tools, and Techniques Michael R. Overly Foley & Lardner LLP, Los Angeles, California, USA

Matthew A. Karlyn Technology Transactions Practice, Cooley LLP, Boston, Massachusetts, USA

“Overly and Karlyn have been top-rated speakers at many of our CIO magazine events, and expert sources for our stories, as well. They truly understand the world of senior IT leaders and the legal complexities of technology vendor management. A Guide to IT Contracting: Checklists, Tools and Techniques, delivers the kind of practical, actionable advice that CIOs crave.” —Maryfran Johnson, Editor-in-Chief, CIO Magazine & Events

• Uses checklists throughout the book to organize key concepts for ready reference • Provides helpful tips for addressing common pitfalls in negotiating technology contracts • Includes a CD with reusable checklists and a complete glossary to define key legal, business, and technical terms • References Internet resources and online aids on contract drafting and other useful information

Selected Contents: Nondisclosure Agreements. Professional Services Agreements. Statements of Work. Idea Submission Agreements. Cloud Computing Agreements. Joint Marketing Agreements. Software Development Kit Agreements. Original Equipment Manufacturer Development Agreements. Health Insurance Portability and Accountability Act Compliance. Key Issues and Guiding Principles for Negotiating a Software License or OEM Agreement. Drafting OEM Agreements. Collecting Basic Deal Information. Reducing Security Risks in IT Contracts. Website Assessment Audits. Critical Considerations for Protecting IP in a Software Development Environment. Click-Wrap, Shrink-Wrap, and Web-Wrap Agreements. Transactions Involving Financial Services Companies as the Customer. Maintenance and Support Agreements. Source Code Escrow Agreements. Integrating Information Security into the Contracting Life Cycle. Software Development Kit Agreements. Distribution Agreements. Data Agreements. Service Level Agreements. Critical Considerations for Records Management and Retention Checklist. Website Development Agreements. Social Media Policies. Software License Agreements. Catalog no. K13556, December 2012, 448 pp. ISBN: 978-1-4398-7657-2, $79.95 / £49.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 33

IT & Project Management Reducing Process Costs with Lean, Six Sigma, and Value Engineering Techniques Kim H. Pries Co-Founder, Value Transformation, LLC, Texas, USA Stonebridge Electronics North America, El Paso, Texas, USA

Jon M. Quigley This book reviews the multiple techniques and areas for improving the cost of products, processes, and services. It presents multiple approaches that can help readers select the best solution for their companies’ culture and capabilities. The authors emphasize home-grown techniques that fit an organization’s culture and do not require the implementation of new methodology. They present Six Sigma cost savings techniques, including Manufacturing Six Sigma, Services Six Sigma, and design for Six Sigma. The book also covers costs with traditional Lean and Lean Six Sigma.

Business Analysis for Business Intelligence Bert Brijs Aligning your business intelligence (BI) infrastructure with your strategy process can help to enhance your organization's responsiveness to changing environments and create added value for investments in BI infrastructure and development. This book explains how to use business intelligence to improve your analysis activities and provides a framework for developing data models and solutions that fit your organization’s strategy. Offering the concepts, tools, and background required for success, the book details the infrastructure required for carrying out successful business intelligence activities. Providing you with the tools to achieve enduring success, the book can help your organization develop successful BI projects and fine-tune them to match the strategic decision making process in your organization.

• Presents Six Sigma cost savings techniques

• Offers the concepts, tools, and background required for successful business intelligence projects

• Discusses optimization techniques from Manufacturing Six Sigma

• Explains the role of business intelligence in successful strategy implementation

• Explains optimization techniques from operations research methods

• Details the infrastructure required for carrying out business intelligence activities

• Considers cost savings with traditional Lean and Lean Six Sigma

• Supplies tools to enhance the value of business analysis activities and planning business intelligence projects

Selected Contents:

• Demonstrates how to use continuous improvement to create a strategic knowledge organization

Introduction. Saving Money with Homegrown Ideas. Arbitrary Cost Down Approach. Rubric for Costing Down. The Isuzu Approach to Tear Downs. The DOD Approach. Classical Value Analysis / Value Engineering Techniques. Classical Techniques. Saving Money with Six Sigma Projects. Saving Money with Lean Manufacturing. Saving Money with Optimization. Regaining Money with Cost Recovery. Other Methods. Finding Cost Reductions. When Cost Improvement Goes Wrong. Catalog no. K14036, December 2012, 365 pp. ISBN: 978-1-4398-8725-7, $83.95 / £51.99 Also available as an eBook

Selected Contents: Background Business Analysis and Management Areas Business Analysis and the Project Life Cycle The Business Analyst's Toolbox Annexes Catalog no. K12718, October 2012, 400 pp. ISBN: 978-1-4398-5834-9, $93.95 / £59.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 34

IT & Project Management Determining Project Requirements, Second Edition Mastering the BABOK® and the CBAP® Exam Hans Jonasson Gothenburg, Sweden

From enterprise analysis to planning requirements gathering and documentation, this book covers the entire business analysis cycle as well as modeling techniques. The second edition of this popular reference aligns with the BABOK® Guide 2.0 to provide an even better tool for preparing to take the Certified Business Analysis Professional (CBAP®) examination. The text covers all of the BABOK® knowledge areas and features a new preparatory section that contains 300 questions. With its many examples and business requirements document templates, this book is ideal for practitioners. Students of business analysis will benefit from the book's case study, exercises, and solutions. • Contains 300 exam prep question for readers preparing to obtain the Certified Business Analysis Professional™ (CBAP®) designation

A Comprehensive Guide to Enterprise Mobility Jithesh Sathyan Anoop Narayanan Navin Narayan Shibu Kizhakke Vallathai This book provides comprehensive coverage of enterprise mobility. It emphasizes the value and impact of enterprise mobility, discusses the technology that backs this business change, and explains how enterprise mobility will be used in different industries. Focusing on mobility concepts, Section I addresses the needs of business managers and decision makers in an enterprise. Section II presents mobile solutions and case studies in different industries. Section III covers mobile application development. Section IV provides details on the key technology considerations in mobility. Catalog no. K13025, September 2012, c. 556 pp. ISBN: 978-1-4398-6735-8, $83.95 / £46.99 Also available as an eBook

• Aligns with the Guide to the Business Analysis Body of Knowledge 2.0® • Includes business requirements document templates • Considers the entire business analysis cycle from enterprise analysis and planning to requirements gathering and documentation • Covers requirements modeling techniques including use cases, data modeling, and process modeling as well as hybrid techniques

Selected Contents: Introduction. Laying the Foundation. Business Analysis Planning and Monitoring. Elicitation. Requirements Management and Communication. Enterprise Analysis. Requirements Analysis. Solution Assessment and Validation. Preparing for the Test. Swede-Mart Case Study. Answers to Test Questions. Activity Solutions for Swede-Mart Case Study. Sources and Bibliography. Appendices: Acronyms. Business Requirements Document Templates. United Nations Organizational Chart. Catalog no. K14270, September 2012, 403 pp. ISBN: 978-1-4398-9651-8, $69.95 / £44.99 Also available as an eBook


Team Planning for Project Managers and Business Analysts Gail Levitt President, Levitt Communications Inc., Ontario, Canada

Filled with time-tested tips and templates for developing teams efficiently and effectively, this book provides the planning materials required to increase team collaboration and productivity in a global workplace. It offers insights and access to critical resources for creating, proposing, executing, and evaluating team development plans. Dr. Levitt's insights will help readers transform their visions, mission statements, goals, and deliverables into actionable plans for their teams. In addition to templates and guidelines, the book offers a variety of practical team development guidelines to ensure team activities are both engaging and productive. Catalog no. K12584, September 2012, 225 pp. ISBN: 978-1-4398-5543-0, $69.95 / £44.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 35

IT & Project Management Total Quality Management for Project Management

Program Management

Kim H. Pries

Edited by

Co-Founder, Value Transformation, LLC, Texas, USA Stonebridge Electronics North America, El Paso, Texas, USA

Project Management Consultant, Lighthouse Point, Florida, USA

Jon M. Quigley Co-Founder, Value Transformation, LLC, Texas, USA

Total Quality Management (TQM) tools alone are insufficient to guarantee successful endeavors. Project management expertise is also required. This book shows you how to apply project management tools in conjunction with TQM activities and projects. It covers the application of TQM tools to the project management discipline by treating it as a process with deliverables. For the section of the book that covers the application of TQM to scrum, the authors demonstrate how these analytical methods can be used on the data produced within a scrum project. Catalog no. K13986, August 2012, 295 pp. ISBN: 978-1-4398-8505-5, $73.95 / £46.99 Also available as an eBook

Enterprise 2.0 Social Networking Tools to Transform Your Organization Jessica Keyes

A Life Cycle Approach Ginger Levin Program management is an emerging offshoot of project management. A recent sign of its growing acceptance is AT&T's and IBM's push to certify program managers. There are few references to guide program managers in this field that requires a broad and deep level of professional experience. This handbook is the definitive reference on program management, providing managers this much-needed guidance. Edited by Ginger Levin, the second person to become a PMI certified program manager (PgMP®), the handbook is a cohesive compilation of program management knowledge written by more than 20 certified PgMPs. Catalog no. K15076, August 2012, 584 pp. ISBN: 978-1-4665-1687-8, $79.95 / £49.99 Also available as an eBook

Projects and Complexity Edited by

Francesco Varanini Walter Ginevri

Examining the advancement of business enterprise through social networking, this book offers a hands-on, practical assessment of not only what to do, but how to do it to master the social networking paradigm and achieve a competitive advantage. Discussing the spectrum of social media and social activities available to business today, it explains the functions of social networking in a business context, shows how to measure and manage social networking, details the utility and role of social networking on a department specific basis, and considers security, risk, legal, and privacy issues.

This book introduces a new way of looking at projects and fostering the culture needed to achieve sustainable results. It brings together experts from the academic, military, and business worlds to explore project management in the context of complexity theory and organizations. The book provides a clear understanding of the roots of project management in complexity theory and the human sciences. Exploring seven principles of complexity theory and applying them to project management, it examines project needs and features in terms of success parameters, team and stakeholders’ perspectives, the project manager’s perspective, and the perspectives of theory and practice.

Catalog no. K13781, August 2012, c. 425 pp. ISBN: 978-1-4398-8043-2, $83.95 / £51.99 Also available as an eBook

Catalog no. K14446, May 2012, 327 pp. ISBN: 978-1-4665-0279-6, $93.95 / £59.99 Also available as an eBook

New Art Technologies, Monroe Township, New Jersey, USA

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 36

IT & Project Management Strategy and Business Process Management Techniques for Improving Execution, Adaptability, and Consistency Carl F. Lehmann

Hans Ottosson Projsam Quality, Sävedalen, Sweden Series: ESI International Project Management Series

BPMethods LLC, Duxbury, Massachusetts, USA

This book prepares readers to master an IT and managerial discipline quickly gaining momentum— Business Process Management (BPM). It describes how BPM treats processes as a portfolio of strategic assets that create and deliver customer and shareholder value and adapt, when necessary, to enable competitive advantages. The book defines the planning framework and managerial mindset needed to craft and drive highly effective business process improvement projects and continuous improvement programs. Readers will learn the techniques used by industry leaders to formulate and execute business strategy that adapts organizational behavior, business processes and information technology as a dynamic system designed to ensure consistent performance. Catalog no. K14106, March 2012, c. 295 pp. ISBN: 978-1-4398-9023-3, $69.95 / £44.99 Also available as an eBook

Project Management Concepts, Methods, and Techniques Claude H. Maley

This book gives general information about construction management, project management, project life cycle processes, project phases, and key documents. It presents information about the 14 knowledge areas of project management important to construction business. For each knowledge area, the text explains the processes for scope, time, risk, cost, and resource management. It describes procurement management including strategies, contract types, remuneration forms, and contract close out. The chapters also examine change management, working environment, quality, and communication. Catalog no. K14272, July 2012, 328 pp. ISBN: 978-1-4398-9655-6, $73.95 / £46.99 Also available as an eBook

The New Triple Constraints for Sustainable Projects, Programs, and Portfolios Gregory T. Haugan

Illustrating the why, what, and how of project management, Project Management Concepts, Methods, and Techniques will help readers develop and refine the skills needed to achieve strategic objectives. It presents a balanced blend of detailed explanatory texts and more than 200 illustrations to supply readers with actionable knowledge that can be put to use immediately. Completely aligned with the Project Management Institute Body of Knowledge (PMBOK®), this book is the ideal platform for developing the understanding needed to plan, schedule, and deliver successful projects. Catalog no. K14449, May 2012, 482 pp. ISBN: 978-1-4665-0288-8, $73.95 / £46.99 Also available as an eBook


Practical Project Management for Building and Construction

The ongoing changes in population, climate, and the availability of energy have resulted in unprecedented threats and opportunities. This book offers a clear look at how these constraints will impact project undertakings. It presents current facts on population, climate change, and energy issues—identifying trends and outlining opportunities in the form of a set of overlays (summary conclusions). The overlays are indexed to current changes that collectively represent a major turning point in the way we use resources and our growing need to seek sustainability. Catalog no. K14552, July 2012, 420 pp. ISBN: 978-1-4665-0518-6, $73.95 / £46.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 37

Software & Web-based Programming New!

Wi-Fi Enabled Healthcare Ali Youssef Douglas McDonald II Jon Linton Bob Zemke Aaron Earle An examination of the recent proliferation of Wi-Fi in hospital systems, this book explains how Wi-Fi transforms clinical work flows and infuses new life into the types of mobile devices implemented in hospitals. Drawing on years of consulting with hospitals in the US and abroad, and with first-hand experiences from one of the largest healthcare systems in the United States, it covers the key areas associated with wireless network design, security, and support. Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture. • Covers best practices in design and security • Supplies examples of lessons learned from large-scale deployments • Outlines design consideration for employee wireless coverage, voice over wireless (including smart phones), mobile medical devices, and wireless guest services • Provides a high-level understanding of the complex issues within healthcare • Addresses the challenges behind adding Wi-Fi to a healthcare setting

Selected Contents: Brief History of Wi-Fi Wireless Architecture Considerations Site Survey Process Wireless Security Wi-Fi Wireless Guest Services Mobile Medical Devices Voice over Wi-Fi Real Time Location Services The Wireless Project Management Process Support Considerations and Lifecycle Emerging Trends and Technologies Catalog no. K15890, February 2014, 300 pp. ISBN: 978-1-4665-6040-6, $79.95 / £49.99 Also available as an eBook


The Art of Linux Kernel Design Illustrating the Operating System Design Principle and Implementation Lixiang Yang Graduate University of the Chinese Academy of Sciences, Beijing, China

This book uses the real source code of a multi-process operating system (OS) as the blueprint and its actual running operation as the main thread. It uses the concept of "master-slave mechanism" and provides more than 300 figures, illustrating the complex relationships within the OS. Divided into two sections, it provides detailed insight on the complete process from booting up to system idling. The second part uses a few carefully designed real-life user operations as study cases to explicate important OS concepts. • Provides more than 300 high-resolution figures to illustrate the actual inside status of the operating system (OS) • Presents thorough explanations of the original source code, helping readers to learn how an actual OS operates and understand common problems faced • Uses the running operation of the OS as the main thread to explain how it works • Includes a concise summary, special notes, and author’s comments to help the reader gain a better understanding of the material

Selected Contents: From Power-Up to the Main Function Device Initialization and Process 0 Activation Creation and Execution of Process 1 Creation and Execution of Process 2 File Operation The User Process and Memory Management Buffer and Multiprocess Operating File Inter-Process Communication Operating System’s Design Guidelines Catalog no. K15142, April 2014, 534 pp. Soft Cover, ISBN: 978-1-4665-1803-2 $69.95 / £49.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 38

Software & Web-based Programming New!


Introduction to Software Project Management

Programming Languages for MIS

Adolfo Villafiorita

Hai Wang

Bruno Kessler Foundation

Saint Mary's University, Halifax, Nova Scotia, Canada

Concepts and Practice

Providing the know-how to manage software projects effectively, this book supplies an accessible introduction to software project management. It begins with an overview of the fundamental techniques of project management and the technical aspects of software development. The second part of the book illustrates the technical activities of software development in a coherent process— describing how to customize this process to fit a wide range of software development scenarios. The book examines open source development practices and tools so readers can adopt best practices and get started. • Examines project management frameworks and software development standards, including ESA and NASA guidelines, PRINCE2®, and PMBOK® • Addresses open source development practices and tools so readers can adopt best practices and get started with tools that are available for free • Explains how to tailor the development process to different kinds of products and formalities, including the development of web applications

Shouhong Wang University of Massachusetts Dartmouth, USA

Ideal for undergraduate students in IS and IT programs, this text supplies a synopsis of the major computer programming languages, including C++, HTML, JavaScript, CSS, VB.NET, C#.NET, ASP.NET, PHP (with MySQL), XML (with XSLT, DTD, and XML Schema), and SQL. Focused on web application development, the book considers client-side computing, server-side computing, and database applications. It emphasizes programming techniques, including structured programming, object-oriented programming, client-side programming, server-side programming, and graphical user interface. This book supplies professors with the opportunity to structure a course consisting of two distinct modules: the teaching module and the project module. The teaching module supplies an overview of representative computer languages. The project module provides students with the opportunity to gain hands-on experience with the various computer languages through projects.

• Includes access to additional material for both practitioners and teachers at

• Focuses on web application development, including client-side computing, server-side computing, and database applications

Selected Contents:

• Includes hands-on examples for each language covered

Introduction The Basics: Software Development Activities and Their Organization Making IT Right: Managing Goals, Time, and Costs Making IT Better: Managing Changes, Risks, and Quality Making IT Perfect: Managing People and Organizing Communication Software Project Pricing Managing Software Development Projects Development and Management Standards Open Source Tools for Managing Projects Catalog no. K15541, February 2014, 296 pp. ISBN: 978-1-4665-5953-0, $89.95 / £57.99 Also available as an eBook


• Emphasizes programming techniques, including structured programming, object-oriented programming, client-side programming, server-side programming, graphical user interface, and database for web applications An instructor's manual, figure slides, and a test bank are available upon qualifying course adoption

Selected Contents: Introduction. C++. HTML, JavaScript , and CSS. VB.NET. C#.NET. ASP.NET. PHP. XML. SQL. Catalog no. K22290, January 2014, 317 pp. ISBN: 978-1-4822-2266-1, $79.95 / £49.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 39

Software & Web-based Programming New!

C From Theory to Practice George S. Tselikis 4Plus company, Athens, Greece

Nikolaos D. Tselikas University of Peloonnese, Tripolis, Greece

Designed for a compulsory fundamental course, this easy-to-use, classroom-tested textbook presents the theory and principles of C. The book tests readers’ skills by providing an easy-toread compilation of the C theory enriched with tips and advice as well as difficulty-scaled solved programming exercises. It decodes the secrets of the C language, providing inside information and programming knowledge through practical examples and meaningful advice. The examples are designed to be short, concrete, and substantial, quickly giving students the know-how they need. • Presents the theory behind C in an accessible way with hints and advice • Gives thorough explanations of complicated concepts, such as pointers, structures, memory management, and files • Provides concrete examples that illustrate hands-on programming • Includes exercises to test students’ programming skills • Offers source code online Instructor's manual and PowerPoint slides are available upon qualifying course adoption

Selected Contents: Introduction to C Data Types, Variables, and Data Output Getting Input with scanf() Operators Program Control Loops Arrays Pointers Characters Strings Functions Searching and Sorting Arrays Structures and Unions Memory Management and Data Structures Files Preprocessor Directives and Macros Review Exercises Appendices Catalog no. K21756, February 2014, 518 pp. Soft Cover, ISBN: 978-1-4822-1450-5 $79.95 / £49.99 Also available as an eBook


Formal Languages and Computation Models and Their Applications Alexander Meduna Brno University of Technology, Czech Republic

This book gives a clear, comprehensive introduction to formal language theory and its applications in computer science. It is ideal as the basis of a one-term course on this subject at the undergraduate level. It covers all rudimental topics concerning formal languages and their models, especially grammars and automata. It sketches the basic ideas underlying the theory of computation, including computability, decidability, and computational complexity. From a practical viewpoint, it explains how these models underlie computer science engineering techniques for language processing, such as lexical and syntax analysis. • Pays a special attention to language processors and their supporting language-defining models • Presents theoretical results informally, then sketches their proofs intuitively, step by step, gently leading students to formal versions of these proofs • Emphasizes real-world applications, demonstrating how theory and practice work together Figure slides are available upon qualifying course adoption

Selected Contents: Introduction: Mathematical Background. Formal Languages and Rewriting Systems. Regular Languages and Their Models: Models for Regular Languages and their Applications in Lexical Analysis. Properties of Regular Languages. Context-Free Languages and Their Models: Models for ContextFree Languages and their Applications in Syntax Analysis. Properties of Context-Free Languages. Turing Machines and Computation: Turing Machines and Their Variants. Applications of Turing Machines: Theory of Computation. Turing Machines and General Grammars. Conclusion: Concluding and Bibliographical Remarks. Catalog no. K14956, February 2014, 315 pp. ISBN: 978-1-4665-1345-7, $99.95 / £63.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 40

Software & Web-based Programming New!


Security for Service Oriented Architectures

Secure Data Provenance and Inference Control with Semantic Web

Walter Williams This book examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance through the design of distributed and resilient applications, it provides an overview of the various standards that service oriented and distributed applications leverage to provide the understanding required to make intelligent decisions regarding their design. The book reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for webbased workflows. • Details recent standards that address web service security, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation • Explains what web services and SOA implementation mean for identification, authentication, and authorization with respect to security aspects such as integrity, confidentiality, availability, utility, control, authenticity, and privacy • Examines emerging issues of privacy and discusses how to design applications within a secure context so that existing and emerging privacy regulations can be met • Discusses the use of the malicious user story in application and security design, specifically in the context of service oriented applications

Selected Contents: Introduction. Four Kinds of Architectures. Implementing and Securing SOA. Web 2.0. Other SOA Platforms. Auditing Service-Oriented Architectures. Defending and Detecting Attacks. Architecture. Bibliography. Index. Catalog no. K19019, May 2014, 341 pp. Soft Cover, ISBN: 978-1-4665-8402-0 $69.95 / £44.99 Also available as an eBook


Bhavani Thuraisingham Tyrone Cadenhead Murat Kantarcioglu Vaibhav Khadilkar University of Texas at Dallas, Richardson, USA

With the explosion of information on the web, it is critical to understand the provenance of the data, which includes its pedigree, quality, and accuracy. At the same time, the provenance data must be secured. This book describes a detailed step-by-step approach to securing provenance data and ensuring that the data cannot be subject to inference attacks. It presents solutions with case studies in the healthcare domain, describes the design and implementation of a policy engine for provenance, and demonstrates the use of Semantic Web technologies as well as cloud computing technologies for enhancing the scalability of solutions.

Selected Contents: SUPPORTING TECHNOLOGIES. Security and Provenance. Access Control and Semantic Web. The Inference Problem. Inference Engines. Inference Examples. Cloud Computing Tools and Frameworks. SECURE DATA PROVENANCE. Scalable and Efficient RBAC for Provenance. A Language for Provenance Access Control. Transforming Provenance Using Redaction. INFERENCE CONTROL. Architecture for An Inference Controller. Inference Controller Design. Provenance Data Representation for Inference Control. Queries with Regular Path Expressions. Inference Control through Query Modification. Inference and Provenance. Implementing the Inference Controller. UNIFYING FRAMEWORK. Risk Control and Inference. Novel Approaches to Handle the Inference Problem. A Cloud-Based Policy Manager for Assured Information Sharing. Security and Privacy With Respect to Inference. Big Data Analytics and Inference Control. Unifying Framework. Summary and Directions. APPENDICES. Catalog no. K16438, July 2014, 462 pp. ISBN: 978-1-4665-6943-0, $89.95 / £57.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:15 AM Page 41

Software & Web-based Programming Coming Soon!

Coming Soon!

Adaptive, Dynamic, and Resilient Systems

Large Scale and Big Data

Edited by

Processing and Management Edited by

Niranjan Suri

Sherif Sakr

Florida Institute for Human & Machine Cognition, Pensacola, USA

National ICT Australia, Alexandria

Mohamed Gaber

Giacomo Cabri

University of Portsmouth, UK

University of Modena and Reggio Emilia, Italy

This book provides a central source of reference on the various data management techniques of large scale data processing and its technology application. This book presents chapters written by leading researchers, academics, and practitioners in the field, all of which have been reviewed by independent reviewers. The book covers the latest research discoveries and applications. Coverage includes cloud data management architectures, big data analytics visualization, data management, analytics for vast amounts of unstructured data, clustering, classification, link analysis of big data, scalable data mining, and machine learning techniques.

Examining cutting-edge adaptive systems research, this book addresses the challenges of understanding, predicting, and controlling systems of networked computers, along with the human component behind these complex systems. The authors unveil novel approaches to building adaptive, dynamic, and resilient systems—including agile computing; multiagent-based, biologically inspired approaches; grid computing; autonomic computing; ResiliNets; and self-organizing systems. • Considers the human component of complex systems • Supplies the authoritative perspective of an international team of contributors

• Examines cloud data management architectures • Covers big data analytics and visualization

• Examines resilient adaptive systems from the perspectives of mobile systems, infrastructure systems, enterprise systems, and protecting critical infrastructure

• Considers data management and analytics for vast amounts of unstructured data

• Illustrates cutting-edge developments in adaptive systems that address the need for resilient and dynamic environments

• Reviews scalable data mining and machine learning techniques

• Details various approaches for building adaptive, dynamic, and resilient systems—including agile computing; multi-agent-based, biologically inspired approaches; grid computing; autonomic computing; ResiliNets; and self-organizing systems

Selected Contents:

Selected Contents: Fundamentals. Perspectives on the problem. Different Approaches. Orthogonal Enabling Capabilities. Human System Integration. Addressing the Challenge of Understandability. Addressing the Challenge of Predictability. Addressing the Challenge of Controllability. Over-arching Issues.

• Explores clustering, classification, and link analysis of big data

Basics of Large Scale Data Management Systems and Techniques Advanced Aspects in Large Scale Data Processing Systems Data Mining of Big Data Applications in Various Domains Catalog no. K18876, June 2014, 626 pp. ISBN: 978-1-4665-8150-0, $119.95 / £76.99 Also available as an eBook

Catalog no. K13118, June 2014,365 pp. ISBN: 978-1-4398-6848-5, $99.95 / £63.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 42

Software & Web-based Programming New!


Core Software Security

ComponentOriented Development and Assembly

Security at the Source James Ransome Senior Director, Product Security, McAfee - An Intel Company, Santa Clara, California, USA

Anmol Misra

Paradigm, Principles, and Practice using Java

Cisco Systems, Inc., San Jose, California, USA

Piram Manickam and S. Sangeetha and S. V. Subrahmanya

"... will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."

“… a carefully thought-out treatment of software components and component-oriented development. ... a valuable addition to any software engineer’s bookshelf!”

—Dr. Dena Haritos Tsamitis. Carnegie Mellon University

"... a must read for security specialists, software developers, and software engineers. ... should be part of every security professional’s library." —Dr. Larry Ponemon, Ponemon Institute

"... the definitive how-to guide for software security professionals. ... A must-have for anyone on the front lines of the cyber war ..." —Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates

"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book—the methodology and process to build security into the entire software development life cycle so that the software is secured at the source!" —Eric S. Yuan, Zoom Video Communications

Selected Contents: Introduction The Secure Development Lifecycle Security Assessment (A1): SDL Activities and Best Practices Architecture (A2): SDL Activities and Best Practices Design and Development (A3): SDL Activities and Best Practices Design and Development (A4): SDL Activities and Best Practices Ship (A5): SDL Activities and Best Practices Post-Release Support (PRSA1–5) Applying the SDL Framework to the Real World Pulling It All Together: Using the SDL to Prevent RealWorld Threats Catalog no. K15922, December 2013, 416 pp. ISBN: 978-1-4665-6095-6, $79.95 / £49.99 Also available as an eBook


—Professor Nenad Medvidovi , Computer Science Department, University of Southern California

This book supplies comprehensive coverage of the principles, practice, and paradigm of component-oriented development and assembly. The first part provides the conceptual foundation for component-oriented software. Part II focuses on the various standard Java component models and describes how to develop a component-oriented system using these component models. Part III covers the various aspects of the component-oriented development paradigm. The text focuses on component-oriented software development from a technical concepts perspective, designer’s perspective, programmer’s perspective, and manager’s perspective. • Covers the principles, practice, and paradigm of component-oriented development and assembly • Details the conceptual foundation for componentoriented software • Focuses on the various standard Java component models and describes how to develop a component-oriented system using these component models

Selected Contents: Component Paradigm. Software Paradigms. Component Oriented Software Paradigm. Component Principles. Theory of Software Components. Software Component Models and Frameworks. Principles of Component Based Software Engineering. Component Practices. Component Oriented Development and Assembly using OSGi. Component Oriented Development and Assembly using SCA. Architecting Component Based Systems. Component Design Principles & Patterns. Developing Components. Assembling Components. Testing Components and Component-Based Systems. Appendices. Catalog no. K18864, December 2013, 298 pp. ISBN: 978-1-4665-8099-2, $69.95 / £44.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 43

Software & Web-based Programming PhoneGap Build Developing Cross Platform Mobile Applications in the Cloud Bintu Harwani PhoneGap is a standardsbased, open-source development framework that can be deployed to any mobile device without losing the features of the native app—allowing for access to device contacts, the local file system, camera, and media on multiple platforms without requiring users to write a single line of code. Ideal for intermediate to advanced users, this book offers the comprehensive coverage you need to harness the power of this dynamic tool. It provides complete coverage of the cloud computing platform and the theories behind cloud computing, using a series of engaging examples. • Explains how to use HTML5, CSS3, and JavaScript to develop apps for devices that operate on different mobile operating systems • Exploits the features provided by PhoneGap and PhoneGap Build to develop cross platform mobile applications for the cloud • Suitable for developers and instructors that want to learn or teach mobile programming • Describes how to use back end databases to store and retrieve information

Selected Contents: Introducing PhoneGap Beginning with PhoneGap Creating Cross Platform Applications Using PhoneGap Build Using Geolocation Using Contacts Storing Data Understanding Accelerometer Using Compass Media Using Camera Capture Using PhoneGap with Sencha Touch Using PhoneGap with jQuery Mobile Catalog no. K20423, November 2013, 303 pp. ISBN: 978-1-4665-8974-2, $69.95 / £44.99

Developing and Securing the Cloud Bhavani Thuraisingham The University of Texas at Dallas, USA

This book provides a comprehensive overview of cloud computing technology. With step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds. • Examines the importance of good communication • Defines the four types of poor-quality communication • Covers how to create a climate of communication • Explains how to establish a climate of communication that encourages the development of quality relationships

Selected Contents: Introduction Supporting Technologies Secure Services Technologies Cloud Computing Concepts Experimental Cloud Computing Systems Secure Cloud Computing Concepts Experimental Secure Cloud Computing Systems Experimental Cloud Systems for Security Applications Toward a Trustworthy Cloud Building an Infrastructure, an Education Initiative, and a Research Program for a Secure Cloud Catalog no. K12920, October 2013, 730 pp. ISBN: 978-1-4398-6291-9, $79.95 / £49.99 Also available as an eBook

Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 44

Software & Web-based Programming Requirements Engineering for Software and Systems

Software Testing A Craftsman’s Approach, Fourth Edition

Second Edition

Paul C. Jorgensen Grand Valley State University, Allendale, Michigan, USA

The fourth edition of this widely adopted text and reference book is completely revised and updated and features a new section on Life Cycle-Based Testing. New chapters include Software Complexity and Mutation Testing and Error Seeding and a new section covers methods for testing software in an Agile programming environment. The text continues to provide a solid mathematical background in discrete mathematics and linear graph theory that is fundamental to understating software testing. The book describes specification-based (functional) and code-based (structural) test development techniques, while extending this theoretical approach to less understood levels of integration and system testing. A solutions manual and figure slides are available upon qualifying course adoption.

Selected Contents: A Mathematical Context: A Perspective on Testing Examples Discrete Math for Testers Graph Theory for Testers Unit Testing: Boundary Value Testing Equivalence Class Testing Decision Table–Based Testing Path Testing Data Flow Testing Retrospective on Unit Testing Beyond Unit Testing: Life Cycle–Based Testing Model-Based Testing Integration Testing System Testing Object-Oriented Testing Software Complexity Model-Based Testing for Systems of Systems Exploratory Testing Test-Driven Development A Closer Look at All Pairs Testing Evaluating Test Cases Software Technical Reviews Epilogue: Software Testing Excellence Appendix: Complete Technical Inspection Packet Catalog no. K15906, October 2013, 494 pp. ISBN: 978-1-4665-6068-0, $99.95 / £63.99 Also available as an eBook


Phillip A. Laplante The Pennsylvania State University, Malvern, USA

This second edition of a bestseller presents new material derived from the experiences of professors who have used the text in their classrooms. In addition to new exercises and updated references in every chapter, this edition updates all chapters with the latest applied research and industry practices. It illustrates key ideas associated with requirements engineering using case studies and example systems, including an airline baggage handling system, a point of sale system for a large pet store chain, a control system for a smart home, and a wet well pumping system. • Assesses practical and theoretical aspects of discovering, analyzing, modeling, validating, testing, and writing requirements for various systems • Offers formal methods, social models, and representation tools useful in the classroom and in the field • Illustrates all theory with real-world examples • Considers four example systems that demonstrate how to engineer requirements and how to practice requirements engineering Figure slides are available upon qualifying course adoption

Selected Contents: Introduction to Requirements Engineering Preparing for Requirements Elicitation Requirements Elicitation Writing the Requirements Document Requirements Risk Management Formal Methods Requirements Specification and Agile Methodologies Tool Support for Requirements Engineering Requirements Management Value Engineering of Requirements Appendices: Software Requirements Specification for a Smart Home Software Requirements for a Wastewater Pumping Station Wet Well Control System Catalog no. K15914, October 2013, 324 pp. ISBN: 978-1-4665-6081-9, $99.95 / £63.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 45

Software & Web-based Programming Cloud Database Development and Management Lee Chao

Data Mining Mobile Devices Jesus Mena Triangular Marketing, El Paso, Texas, USA

• Introduces the SQL language and demonstrates how to use SQL to create database objects

With today’s consumers spending more time on their mobiles than on their PCs, new methods of empirical stochastic modeling have emerged that can provide marketers with detailed information about the products, content, and services their customer’s desire. This book defines the collection of machine-sensed environmental data pertaining to human social behavior. It explains how the integration of data mining and machine learning can enable the modeling of conversation context, proximity sensing, and geospatial location throughout large communities of mobile users. Describing how to analyze Wi-Fi and GPS data from websites and apps, it explains how to model mined data through the use of artificial intelligence software. It also discusses the monetization of mobile devices’ desires and preferences that can lead to the triangulated marketing of content, products, or services to billions of consumers—in a relevant, anonymous, and personal manner.

• Discusses the management tasks that keep both SQL Azure and Windows Azure running smoothly

• Examines the construction and leveraging of mobile sites

Selected Contents:

• Describes how to use mobile apps to gather key data about consumers’ behavior and preferences

University of Houston-Victoria, Sugar Land, Texas, USA

Nowadays, cloud computing is almost everywhere. However, one can hardly find a textbook that utilizes cloud computing for teaching database and application development. This cloud-based database development book teaches both the theory and practice with step-by-step instructions and examples. This book helps readers to set up a cloud computing environment for teaching and learning database systems. The book covers adequate conceptual content for students and IT professionals to gain necessary knowledge and hands-on skills to set up cloud-based database systems. • Covers all three aspects of database design: conceptual design, logical design, and physical design

Introduction to Database Systems and Cloud Computing Database Design and Windows Azure Data Storage Table Normalization and Windows Azure SQL Database Database Development and Management with SQL Importing and Exporting Database Objects Querying Information in Windows Azure SQL Database Windows Azure SQL Database Procedures and Functions Windows Azure SQL Database Views, Indexes, and Federations Database Application Development Windows Azure and Deployment of Applications to Cloud Windows Azure Storage. Windows Azure Management Catalog no. K16078, July 2013, 487 pp. ISBN: 978-1-4665-6505-0, $79.95 / £49.99 Also available as an eBook

• Discusses mobile mobs, which can be differentiated as distinct marketplaces—including Apple®, Google®, Facebook®, Amazon®, and Twitter® • Provides detailed coverage of mobile analytics via clustering, text, and classification AI software and techniques

Selected Contents: Mobile Sites Mobile Apps Mobile Data Mobile Mobs Mobile Analytics Catalog no. K15401, June 2013, 328 pp. ISBN: 978-1-4665-5595-2, $69.95 / £44.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 46

Software & Web-based Programming Return On Process (ROP)

Android Security Cisco Systems, Inc., San Jose, California, USA

Getting Real Performance Results from Process Improvement

Abhishek Dubey

Michael West

Webroot Software, San Mateo, California, USA

Natural SPI Inc., Salt Lake City, Utah, USA

“... Dubey and Misra have filled a critical gap in software security literature by providing a unique and holistic approach to addressing this critical and often misunderstood topic.”

“… I thoroughly recommend reading the book from cover to cover, but once you have, you'll want to keep it close by because you will find yourself referring to it again and again.”

Attacks and Defenses Anmol Misra

—James Ransome, Senior Director of Product Security, McAfee, An Intel Company

“… A must have book for all security professionals.” —Sanjay Kartkar, Cofounder of Quick Heal Technologies

“… gives security professionals and executives a practical guide to the security implications and best practices for deploying Android platforms and applications in the (corporate) environment.” —Steve Martino, VP Information Security, Cisco

Starting with an introduction to Android architecture and applications, this book covers security features and issues specific to the Android platform and applications—including possible attacks and the means to prevent them. It describes mobile devices pen-testing methodology and techniques for data leak prevention (DLP). The text also discusses advanced topics, including reverse engineering and forensics, malware analysis, and secure coding and hardening guidelines for Android. The book explains how to perform threat modeling for Android mobile devices/applications and incorporate them into enterprise SDLC processes.

Selected Contents: Introduction Android Architecture Android Application Architecture Android (in)Security Pen Testing Android Reverse Engineering Android Applications Modifying the Behavior of Android Applications without Source Code Hacking Android Securing Android for the Enterprise Environment Browser Security and Future Threat Landscape Catalog no. K14268, April 2013, c. 280 pp. ISBN: 978-1-4398-9646-4, $59.95 / £38.99 Also available as an eBook


—Rob Wyatt, IT Director, Product and Supply Chain, Dell

Many organizations spend hundreds of thousands or millions of dollars on process improvement but never realize business performance results. Executives and organizational leaders pursue only those improvement initiatives that can yield measurable performance gains. This book defines how to achieve real business performance results from process improvement, thus filling a major information void in the economy. It explains how to set performance and process improvement goals, shows how to measure process improvement results, and details how to lead a performance culture. It also presents metrics for business performance and defines the relationship between performance and process. • Provides "how to" information based on three role categories: executive, manager, and practitioner • Includes many examples and case studies that illustrate the major concepts • Describes non-traditional and innovative ways to achieve process and performance improvement • Includes action plan guides at the end of each chapter

Selected Contents: Introduction Real Performance Real Process Improvement Building a Performance Culture What Could Be Catalog no. K14019, March 2013, 390 pp. ISBN: 978-1-4398-8639-7, $69.95 / £44.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 47

Software & Web-based Programming The Art of Agile Practice A Composite Approach for Projects and Organizations Bhuvan Unhelkar Consultant, New South Wales, Australia

Windows Networking Tools The Complete Guide to Management, Troubleshooting, and Security Gilbert Held 4-Degree Consulting, Macon, Georgia, USA

Addressing the growing popularity of Agile software development, this book begins by identifying the challenges currently facing organizations in terms of their development and maintenance approaches. It presents a comprehensive Composite Agile Method and Strategy (CAMS) as a carefully constructed combination of process elements. The book creates and applies relevant metrics and measurements to the entire CAMS lifecycle—opening up the possibility of improving estimations by project managers. It includes figures, case studies, and tables that illustrate key concepts.

This book discusses how built-in and third-party networking tools can be used to diagnose network problems and performance issues as well as enhance the security of computer systems. The author covers a variety of networking tools and demonstrates how they can be used to determine ahead of time whether or not existing Internet connectivity can support such activities as voice and video over IP. Coverage of other tools shows readers how to prevent keyboard hacking and negate the operation of unwanted advertisement trackers through checking for and eliminating different types of attack software.

Catalog no. K12339, November 2012, 527 pp. ISBN: 978-1-4398-5118-0, $83.95 / £51.99 Also available as an eBook

Catalog no. K14816, November 2012, 390 pp. Soft Cover, ISBN: 978-1-4665-1106-4 $62.95 / £40.99 Also available as an eBook

Data Mining for Bioinformatics Sumeet Dua Lousiana Tech University, Ruston, USA

Cloud Enterprise Architecture Pethuru Raj

Louisiana Tech University, Ruston, USA

Enterprise Architecture Consultant, Wipro Consulting Services, Bangalore, India WiPro Technologies, Bangalore, India

Data Mining for Bioinformatics enables researchers to meet the challenge of mining vast amounts of biomolecular data to discover real knowledge. Covering theory, algorithms, and methodologies, as well as data mining technologies, it presents a thorough discussion of data-intensive computations used in data mining applied to bioinformatics. The book explains data mining design concepts to build applications and systems. Showing how to prepare raw data for the mining process, the text is filled with heuristics that speed the data mining process.

This book examines enterprise architecture (EA) in the context of the surging popularity of cloud computing. It explains the transformation of EA resulting from the strategically significant convergence that cloud computing can achieve. Chapters cover each of the contributing architectures of EA, illustrating the current and impending implications of the cloud on each of them. The author ties together these topics with chapters on cloud integration and composition architecture. He also examines the Enterprise Cloud, federated clouds, and the vision to establish the InterCloud.

Catalog no. 2801, November 2012, 348 pp. ISBN: 978-0-8493-2801-5, $93.95 / £59.99 Also available as an eBook

Catalog no. K14431, October 2012, 528 pp. ISBN: 978-1-4665-0232-1, $83.95 / £51.99 Also available as an eBook

Pradeep Chowriappa

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 48

Software & Web-based Programming Drupal Web Profiles

The Internet of Things in the Cloud

Timi Ogunjobi Web Sesame, Ibadan, Nigeria

A Middleware Perspective Honbo Zhou This book provides a panoramic view of the IoT landscape, focusing on the overall technological architecture and design of a tentatively unified IoT system underpinned by different cloud computing paradigms from a middleware perspective. It is based on the author’s two previous bestselling books (in Chinese) on IoT and cloud computing and decades of software/middleware programming and architecting experience. The first part of the book describes IoT, related concepts, and a number of key vertical IoT applications. The second part focuses on middleware. The third part covers cloud computing and IoT as well as their synergy based on the common background of distributed processing.

This book demystifies Drupal, one of the most popular content management systems in use today. With step-by-step instruction and worked examples, this is a crucial guide to the next level in content management. This project-based guide offers a complete introduction to installation, configuration, and administration; web analytics; optimization through automatic throttling, bandwidth optimization, and page caching; as well as customization to facilitate the creation, installation, and debugging of modules. Catalog no. K14493, July 2012, 259 pp. ISBN: 978-1-4665-0381-6, $62.95 / £40.99 Also available as an eBook

Catalog no. K14173, October 2012, 391 pp. ISBN: 978-1-4398-9299-2, $104.95 / £62.99 Also available as an eBook

Open Source Data Warehousing and Business Intelligence

Software Engineering Design

Lakshman Bulusu

This text uses examples, review questions, lab exercises, and case study assignments to explain the concepts that are immediately relevant to software designers. Providing students and practitioners with the understanding needed to design complex software systems, it starts with a review of software design fundamentals. It presents a formal top-down design process that consists of several design activities with varied levels of detail. For each topic discussed, it includes a step-by-step breakdown of the execution of the design solution, along with an evaluation, discussion, and justification for using that solution.

Theory and Practice Carlos Otero

Examining implementation in terms of the systems development life cycle, this book highlights the practical aspects of implementing and using open-source data warehousing and business intelligence technologies. The text explains the key differences between open source, vendor data warehousing, and business intelligence technologies and provides end-to-end solutions that are scalable, high performance, and stable. It covers data warehouse design, real-time processing, data integration, presentation services, and real-time reporting. Emphasizing how they can be used in realworld applications, the author also presents best practices that can save time, effort, cost, and resources. Catalog no. K10843, August 2012, 432 pp. ISBN: 978-1-4398-1640-0, $83.95 / £51.99 Also available as an eBook


Catalog no. K12371, June 2012, 368 pp. ISBN: 978-1-4398-5168-5, $99.95 / £60.99 Also available as an eBook

Save when you order online at

CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 49

Software & Web-based Programming Effective Methods for Software and Systems Integration Boyd L. Summers The Boeing Company, Seattle, Washington, USA

This book supplies the understanding needed to achieve continuous improvements in quality throughout the software life cycle. It defines time-tested methods for systems engineering, software design, software engineering informal/formal builds, software engineering installations, software and systems integration, delivery activities, and product evaluations. Complete with helpful forms, plans, and checklists, the book will help readers deliver projects that are on time and within budget constraints in military and aerospace programs as well as the software industry. Catalog no. K13560, June 2012, 183 pp. ISBN: 978-1-4398-7662-6, $104.95 / £66.99 Also available as an eBook

Developing Essbase Applications Advanced Techniques for Finance and IT Professionals Edited by

Cameron Lackpour Essbase is a powerful tool used to build useful analytical models, reporting systems, and forecasting applications. This book represents a group effort from some of the most experienced Essbase practitioners from around the world. Infrastructure, data sourcing and transformation, database design, calculations, automation, APIs, reporting, and project implementation are covered by experts who specialize in the tools and techniques on a day-to-day basis. The book includes practical cases that stem from the authors’ decades of combined experience. Catalog no. K15268, June 2012, 445 pp. ISBN: 978-1-4665-5330-9, $69.95 / £44.99 Also available as an eBook

The 7 Qualities of Highly Secure Software Mano Paul SecuRisk Solutions, Pflugerville, Texas, USA

Providing a framework for designing, developing, and deploying hack-resilient software, this book uses engaging anecdotes and analogies— from Aesop’s fables and athletics to architecture and video games—to illustrate the qualities needed for the development of highly secure software. Each chapter details one of the seven qualities that make software less susceptible to hacker threats. Filled with realworld examples, the book explains complex security concepts in language that’s easy to understand to supply readers with the understanding needed to building secure software. Catalog no. K10743, May 2012, 160 pp. ISBN: 978-1-4398-1446-8, $52.95 / £33.99 Also available as an eBook

Media Networks Architectures, Applications, and Standards Edited by

Hassnaa Moustafa France Telecom Research and Development

Sherali Zeadally University of the District of Columbia, Washington, USA

With a focus on video and audio-visual services, this book considers different media network architectures along with related protocols and standards. It presents different digital TV technologies along with their deployment architectures, discussing promising media content delivery architectures, including Future Internet, Content Delivery Networks, and Content Centric Networks. The author addresses related technical challenges and standardization efforts. Chapters cover the management of media information and immersive technologies that account for advanced services personalization, immersive technologies architectures and applications, e-health, and e-learning. Catalog no. K13577, May 2012, 555 pp. ISBN: 978-1-4398-7728-9, $93.95 / £59.99 Also available as an eBook

For more information and complete contents, visit


CVN14_5.5x8.5_MC_Temp 5/13/14 9:16 AM Page 50

Software & Web-based Programming Machine-toMachine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5) Jesus Mena Triangular Marketing, El Paso, Texas, USA

This book examines the technologies, software, networks, mechanisms, techniques, and solution providers that are shaping the next generation of mobile advertising. Discussing the interactive environments that comprise the web, it explains how to deploy Machine-to-Machine Marketing (M3) and Anonymous Advertising Apps Anywhere Anytime (A5). The book’s case studies illustrate M3 and A5 implementations at JP Morgan Chase, Hyundai, Dunkin’ Donuts, New York Life, Twitter, Best Buy, JetBlue, IKEA, Urban Outfitters, JC Penney, Sony, eHarmony, and NASCAR. Catalog no. K13871, May 2012, 436 pp. Soft Cover, ISBN: 978-1-4398-8191-0 $73.95 / £46.99 Also available as an eBook

Handbook of Mobile Systems Applications and Services Edited by

The IFPUG Guide to IT and Software Measurement Edited by

IFPUG Leading software measurement experts share their insight on topics such as measurement programs, function points in measurement, measurement and new technologies, and metrics analysis. Edited by IFPUG's Management and Reporting Committee, the text is intended for IT project managers, process improvement specialists, measurement professionals, and business professionals interacting with IT. Topics covered include cloud computing, agile development, quantitative project management, process improvement, measurement as a tool in accountability, measuring project ROI, metrics for the CIO, value stream mapping, and benchmarking. Catalog no. K13177, April 2012, 848 pp. ISBN: 978-1-4398-6930-7, $83.95 / £51.99 Also available as an eBook

TV Content Analysis Techniques and Applications Edited by

Yiannis Kompatsiaris

Anup Kumar University of Louisville, Kentucky, USA

Informatics and Telematics Institute, Thermi-Thessaloniki, Greece

Bin Xie

Bernard Merialdo

University of Cincinnati, Ohio, USA

An investigation of the evolution of mobile services technologies, this book provides a complete understanding of these technologies, from fundamentals and theories to implementation protocols and applications. It contains chapters written by internationally recognized researchers who discuss concepts, theory, algorithms, implementations, and new applications. The three sections cover: Building Blocks for Mobile Services Architecture, Middleware for Mobile Services, and Applications, Standards and Performance Evaluation of Mobile Services. It provides a comprehensive reference for students, instructors, researchers, engineers, and other professionals, building their understanding of mobile service computing. Catalog no. K10094, April 2012, 612 pp. ISBN: 978-1-4398-0152-9, $125.95 / £81.00 Also available as an eBook



Shiguo Lian France Telecom R&D, Beijing, China

Leaving no stone unturned, this book provides a detailed exploration of TV program analysis techniques. It supplies scientifically sound treatment of the state of the art across the related subject areas— such as systems, architectures, algorithms, applications, research results, emerging approaches, and open issues. The book includes coverage of content extraction, content structuring, content recommendation, content quality, web and social TV, and content production. Catalog no. K12594, March 2012, 674 pp. ISBN: 978-1-4398-5560-7, $104.95 / £66.99 Also available as an eBook

Save when you order online at

IT Security, & Management  

Books for the Next Generation of IT Security, & Management from CRC Press

Read more
Read more
Similar to
Popular now
Just for you