Covert channels. These are hidden (covert) ways of passing information against organizational policy. There are two main types of covert channels: timing (signaling from one system to another) and storage (the storing of data in an ...
This text takes students where IT lives-in today's businesses and in our daily lives while helping students understand how valuable information technology is to their future careers.
The text introduces the challenges and risks of computer crimes, hacking, and cyberterrorism. It also presents some of the most current research on virtual communities, global IS work solutions, and social networking.
Information Systems: What Every Business Student Needs to Know takes a new approach to the required information systems course for business majors.For each topic covered, the text highlights key "Take-Aways" that aler
This book describes the theory, algorithms, and practical implementation techniques behind transaction processing in information technology systems.
This book is composed of a selection of articles from The 2021 World Conference on Information Systems and Technologies (WorldCIST'21), held online between 30 and 31 of March and 1 and 2 of April 2021 at Hangra de Heroismo, Terceira Island, ...
This book also scrutinizes the current applications of multimedia information systems, and examines how they can be developed.
Christensen, C. (1997). The innovator's dilemma. Boston: Harvard Business School Press. Christensen, C. (2001). The past and future of competitive advantage. MIT Sloan Management Review, 42 (2), 105109. College of Healthcare Information ...
This book is a thoroughly arranged anthology outlining the state of the art in the emerging area of visual informationsystems.
This guide unravels the mysteries of HIS by breaking these technologies down to their component parts and providing a clear and reader-friendly account of the concepts involved.