|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 81
reviews
|
|
|
|
|
|
|
|
The impact of advanced analytics and data accuracy on operational performance: a contingent resource based theory (RBT) perspective Chae B., Yang C., Olson D., Sheu C. Decision Support Systems 59119-126, 2014. Type: Article
This paper describes a study that focuses on advanced analytics and accurate manufacturing data as two primary resources for influencing operational performance in a manufacturing context. The study demonstrates that in order for manuf...
|
Sep 18 2014 |
|
|
|
|
|
|
Computational business analytics Das S., Chapman & Hall/CRC, Boca Raton, FL, 2014. 516 pp. Type: Book (978-1-439890-70-7)
This book provides a comprehensive review of computational analytics methods and techniques. It is a rich and readable summary of the field. The approach here is to augment statistical approaches with techniques from symbolic artificia...
|
Jun 3 2014 |
|
|
|
|
|
|
Data science and prediction Dhar V. Communications of the ACM 56(12): 64-73, 2013. Type: Article, Reviews: (1 of 2)
This is an enlightening treatise on data science. There is no hype here--just a thought-provoking piece that articulates fundamental concepts and implications. The natural audience is the IT or business professional (or manage...
|
May 13 2014 |
|
|
|
|
|
|
Software projects secrets: why projects fail Stepanek G., Apress, Berkeley, CA, 2012. 184 pp. Type: Book (978-1-430251-01-9)
This practical, insightful book is about managing projects using agile software development techniques, and the advantages of using such techniques over more traditional waterfall software development methods. It is based upon a solid ...
|
Mar 15 2013 |
|
|
|
|
|
|
Internet architecture and innovation van Schewick B., The MIT Press, Cambridge, MA, 2012. 592 pp. Type: Book (978-0-262518-04-8)
Society has been, and continues to be, transformed by the Internet. Economic, cultural, social, and political landscapes have undergone dramatic change in the past 30 years. As the Internet has expanded and morphed into its current for...
|
Jan 11 2013 |
|
|
|
|
|
|
Bootstrapping trust in modern computers Parno B., McCune J., Perrig A., Springer Publishing Company, Incorporated, New York, NY, 2011. 110 pp. Type: Book (978-1-461414-59-9)
In this book, the authors deal with techniques for bootstrapping trust into commodity computers by providing relevant security information about the computer’s executing environment to interested entities. It is a survey of a...
|
May 23 2012 |
|
|
|
|
|
|
Security and game theory: algorithms, deployed systems, lessons learned Tambe M., Cambridge University Press, New York, NY, 2011. 328 pp. Type: Book (978-1-107096-42-4)
This book deals with the use of game theory as a tool for combating security threats due to terrorism, drug smuggling, and other criminal activity. These threats have accelerated the need to maximize the effectiveness of limited securi...
|
May 9 2012 |
|
|
|
|
|
|
Quantitative risk assessment: the scientific platform Aven T., Cambridge University Press, New York, NY, 2011. 224 pp. Type: Book (978-0-521760-57-7), Reviews: (1 of 2)
This is a timely topic, and a very interesting book. The basic idea of the book is to provide a unifying scientific framework based upon concepts of reliability and validity for analyzing and discussing risk assessment quality. The foc...
|
Jun 14 2011 |
|
|
|
|
|
|
Overview of the PMBOK guide: short cuts for PMP certification Conchúir D., Springer Publishing Company, Incorporated, New York, NY, 2010. 213 pp. Type: Book (978-3-642111-87-7)
As the title suggests, this book is an overview of A guide to the project management body of knowledge (PMBOK guide) [1]. The PMBOK guide, which is now in its 4th edition, is published by the Project Management Institute ...
|
Jan 19 2011 |
|
|
|
|
|
|
Enterprise Mac security: Mac OS X Snow Leopard Edge C., Barker W., Hunter B., Sullivan G., Apress, Berkeley, CA, 2010. 648 pp. Type: Book (978-1-430227-30-4)
In addition to being an excellent reference on Mac security technology, this volume provides an in-depth review of general network security issues. While Mac users almost universally tend to believe that a Mac platform is more secure t...
|
Sep 30 2010 |
|
|
|
|
|
|
|
|
|
|
|