This text offers processes, techniques, and tools that IT managers can use to immediately improve the delivery of IT products and services.
Economic pressures have forced IT executives to demonstrate the immediate and calculable ROI of new technology deployments. Unfortunately, existing IT service delivery often drifts without serious...
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated...
This book provides a concise introduction to numerical concepts in engineering analysis, using FORTRAN, QuickBASIC, MATLAB, and Mathematica to illustrate the examples. Discussions include:omatrix algebra and analysisosolution of matrix equationsomethods of curve fitomethods for finding the roots of polynomials and transcendental...
Focusing on the scientific aspect of network design, Practical Network Design Techniques uses mathematical models to illustrate important networking concepts and show how to solve many common design problems. Taking an inclusive approach, the author examines the cost and performance issues that can also be used by network analysts and designers as...
It is with great pleasure that we accepted the offer by CRC Press to assemble and edit this
compilation of reviews on flavonoids and their properties and functions for the present
volume. We considered the volume timely in that the last book of this general type, The
Flavonoids—Advances in Research Since 1986 (edited by...
MATLABä-the tremendously popular computation, numerical analysis, signal processing, data analysis, and graphical software package-allows virtually every scientist and engineer to make better and faster progress. As MATLAB's world-wide sales approach a half-million with an estimated four million users, it becomes a near necessity...
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies....
The graphical nature of LabVIEW makes it ideal for test and measurement applications and its use brings significant improvements in productivity over conventional programming languages. However, comprehensive treatments of the more advanced topics have been scattered and difficult to find-until now.
LabVIEW Advanced Programming...
Certification and accreditation has become a major topic of discussion in the information security arena over the past two to three years, at least in U.S. government circles. Many government organizations are currently engaged in employing certification and accreditation processes in response to the requirements of the Federal...
This volume incorporates more than a decade of experience with ISO 9001, a standard created by committees of volunteers working under the aegis of the International Organization for Standardization (ISO). This volume is intended for individuals who are responsible for using ISO 9001 to implement or revitalize systematic process improvement in...
Cytokine involvement in the immune system's response to stress is now very well documented. Cytokine activity has been implicated in a variety of mental and physical diseases, and has been shown to have a significant role in fueling the vicious circle of depression and illness.
What if you were suddenly in charge? After the initial excitement of a "battlefield promotion" wears off, you need to get in the trenches and get the job done. And if you are already in the trenches, you need quick access to information that will make your job easier. A comprehensive desk reference and guide, Clinical Studies...