top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA : , : Morgan Kaufmann, , 2014
Descrizione fisica 1 online resource (xxix, 631 pages) : illustrations (some color)
Disciplina 005.8
Collana Emerging trends in computer science & applied computing
Gale eBooks
Soggetto topico Information technology - Security measures
Computer crimes - Prevention
Cyberterrorism - Prevention
Electronic surveillance
ISBN 0-12-410487-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Emerging Trends in ICT Security; Copyright Page; Contents; Acknowledgments; Review Board; About the Editors; List of Contributors; Preface; 1 Information and Systems Security; 1 Theory/Reviews of the Field; 1 System Security Engineering for Information Systems; Introduction; System security engineering history; The system security engineering process; The revitalization of system security engineering; Established system security engineering methods, processes, and tools; Acquisition program protection planning; Information assurance; Systems engineering critical reviews
Modern and emerging system security engineering methods, processes, and tools Discovery and understanding of complex systems for security; Mission assurance; Formalized security requirements; Early design considerations; Plan for failure; Security and system patterns; Leveraging system architectures for security; Agile and self-organizing system security; Security metrics and evaluation; Identified SSE research areas; Conclusion; Recommendations; Disclaimer; Acknowledgments; References; Further reading; 2 Metrics and Indicators as Key Organizational Assets for ICT Security Assessment
Introduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to...
Introduction Early breakthrough in NL IAS; The conceptual foundation of NL IAS; NL IA applications; NL watermarking; NL tamperproofing; NL sanitizing/downgrading; NL steganography and steganalysis; A sketch of ontological semantic technology; Mature semantic NL IAS; Semantic forensics; Unintended inferences and the meaning of the unsaid; Situational conceptual defaults; The term, its origins, and the canonical case; Default reversal; Are defaults really common sense knowledge?; Underdetermination of reality by language; Scripts; Anonymization; Summary; Acknowledgments; References; 2 Methods
4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications Introduction; UML extensions for XML security; Extensions for policy modeling and integration; Integrating local security policies into a global security policy; Assumptions and equivalence finding; Integration process for local SPSS; Resolving conflicts of integrated security rule sets; Creating the global SPSS; Related work; Conclusion; References; 5 Gamification of Information Security Awareness Training; Introduction; Literature review; General concepts; Serious games
Games adoption in multiple domains
Record Nr. UNINA-9910790864603321
Waltham, MA : , : Morgan Kaufmann, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia
Emerging trends in ICT security / / edited by Babak Akhgar, Hamid R. Arabnia
Edizione [1st edition]
Pubbl/distr/stampa Waltham, MA : , : Morgan Kaufmann, , 2014
Descrizione fisica 1 online resource (xxix, 631 pages) : illustrations (some color)
Disciplina 005.8
Collana Emerging trends in computer science & applied computing
Gale eBooks
Soggetto topico Information technology - Security measures
Computer crimes - Prevention
Cyberterrorism - Prevention
Electronic surveillance
ISBN 0-12-410487-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Emerging Trends in ICT Security; Copyright Page; Contents; Acknowledgments; Review Board; About the Editors; List of Contributors; Preface; 1 Information and Systems Security; 1 Theory/Reviews of the Field; 1 System Security Engineering for Information Systems; Introduction; System security engineering history; The system security engineering process; The revitalization of system security engineering; Established system security engineering methods, processes, and tools; Acquisition program protection planning; Information assurance; Systems engineering critical reviews
Modern and emerging system security engineering methods, processes, and tools Discovery and understanding of complex systems for security; Mission assurance; Formalized security requirements; Early design considerations; Plan for failure; Security and system patterns; Leveraging system architectures for security; Agile and self-organizing system security; Security metrics and evaluation; Identified SSE research areas; Conclusion; Recommendations; Disclaimer; Acknowledgments; References; Further reading; 2 Metrics and Indicators as Key Organizational Assets for ICT Security Assessment
Introduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to...
Introduction Early breakthrough in NL IAS; The conceptual foundation of NL IAS; NL IA applications; NL watermarking; NL tamperproofing; NL sanitizing/downgrading; NL steganography and steganalysis; A sketch of ontological semantic technology; Mature semantic NL IAS; Semantic forensics; Unintended inferences and the meaning of the unsaid; Situational conceptual defaults; The term, its origins, and the canonical case; Default reversal; Are defaults really common sense knowledge?; Underdetermination of reality by language; Scripts; Anonymization; Summary; Acknowledgments; References; 2 Methods
4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications Introduction; UML extensions for XML security; Extensions for policy modeling and integration; Integrating local security policies into a global security policy; Assumptions and equivalence finding; Integration process for local SPSS; Resolving conflicts of integrated security rule sets; Creating the global SPSS; Related work; Conclusion; References; 5 Gamification of Information Security Awareness Training; Introduction; Literature review; General concepts; Serious games
Games adoption in multiple domains
Record Nr. UNINA-9910807239603321
Waltham, MA : , : Morgan Kaufmann, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging trends in image processing, computer vision and pattern recognition / edited by Leonidas Deligiannidis, Hamid R. Arabnia
Emerging trends in image processing, computer vision and pattern recognition / edited by Leonidas Deligiannidis, Hamid R. Arabnia
Autore DELIGIANNIDIS, Leonidas
Pubbl/distr/stampa Waltham, : Morgan Kaufmann, 2015
Descrizione fisica Testo elettronico (PDF) (633 p.)
Disciplina 006.42
Collana Emerging Trends in Computer Science & Applied Computing
Soggetto topico Visione artificiale
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996459752703316
DELIGIANNIDIS, Leonidas  
Waltham, : Morgan Kaufmann, 2015
Risorse elettroniche
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Engineering global e-commerce sites [electronic resource] : a guide to data capture, content, and transactions / James Bean ; foreword by Jorden Woods.
Engineering global e-commerce sites [electronic resource] : a guide to data capture, content, and transactions / James Bean ; foreword by Jorden Woods.
Autore Bean, James (James D.)
Pubbl/distr/stampa San Francisco, Calif. : Morgan Kaufmann
Descrizione fisica xv, 230 p. : ill. ; 24 cm.
Disciplina 005.74
Soggetto topico Electronic commerce
Web sites - Design
XML (Document markup language)
Soggetto genere / forma Electronic books.
ISBN 9781558608924
1558608923
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Global E-Commerce and the Web. Global, Regional, International, and Local. Global Standards. Globalized Data and Transactions. Globalization Process and Techniques. Transaction Engineering. Enterprise Application Integration. The Complexities of Mobile E-Commerce. Appendix.
Record Nr. UNISALENTO-991003249129707536
Bean, James (James D.)  
San Francisco, Calif. : Morgan Kaufmann
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Ensuring digital accessibility through process and policy / / Jonathan Lazar, Daniel Goldstein, Anne Taylor ; acquiring editor, Todd Green ; editorial project manager, Lindsay Lawrence ; designer, Greg Harris
Ensuring digital accessibility through process and policy / / Jonathan Lazar, Daniel Goldstein, Anne Taylor ; acquiring editor, Todd Green ; editorial project manager, Lindsay Lawrence ; designer, Greg Harris
Autore Lazar Jonathan
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (247 p.)
Disciplina 025.04087
Soggetto topico Assistive computer technology - United States
User interfaces (Computer systems) - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Ensuring Digital Accessibility through Process and Policy; Copyright; Critical Acclaim for Ensuring Digital Accessibility through Process and Policy ; Contents; About the Authors; Preface; Chapter 1: Introduction to accessible technology; Introduction; Defining Accessible Technology; Various Types of Disabilities; Accessibility Helps Those Without Disabilities; Various Types of Technologies; Mobile Devices, Apps, and Accessibility; Accessibility in Desktop and Laptop Computers; How does Accessibility Work?; Accessibility in Kiosks and Voting Machines
Accessible Technology vs. Augmentative Communication and ProstheticsVarious Types of Policies; How Policies and Laws Can Lead to Improved Access to Digital Information; Summary; A Note About the Usage of Terms; References; Chapter 2: The history of access technology; Introduction; Early History of Assistive Technologies (through the 1960s); The Invention of the Typewriter; The Record Player and the Audiobook; TTYs for the Deaf and Hard of Hearing; The 1970s-Present; Optical Character Recognition, Synthetic Speech, and the Flatbed Scanner; Captioning; Speech Recognition
Speech Recognition and Learning Disabled StudentsScreen Reader Technology; Assistive and Augmentative Communication; Power Wheelchairs and Prosthetics; Current Events and Trends; How Accessible Technology has Crossed Over into the Mainstream; Understanding Why/How People with Disabilities Adopt Technology; How the Changes in Technology Over Time Must Influence Changes in Solutions; Summary; References; Chapter 3: The discriminatory impact of digital inaccessibility; Introduction; Separate But Equal in the Context of Disability; Same Time; Same Price; Same Content
Same Time, Same Content, Same Price, And Now . . . Same Hardware and SoftwareSummary; References; Chapter 4: Technical standards for accessibility; Accessibility Standards; The World Wide Web Consortium and the Web Accessibility Initiative; Web Accessibility Standards; The Web Content Accessibility Guidelines; Authoring Tool Accessibility Guidelines; Atag 2.0; User Agent Accessibility Guidelines; Relationship to the Web Content Accessibility Guidelines (WCAG) 2.0; Relationship to the Authoring Tool Accessibility Guidelines (ATAG) 2.0; Accessible Rich Internet Application; Epub
Applying WCAG 2.0 to Non-Web Information and Communications TechnologiesSummary; References; Chapter 5: U.S. laws and lawsuits; Introduction; Applicability of American Laws to Technology Developers; The Pace of Change in the Development of Technology Affects the Design of Legal Definitions of Access; Federal Statutes that have an Impact on the Accessibility of Technology; Section 504 of the Rehabilitation Act and Title II of the ADA; Public Colleges: A Case Study in the Application of Title II and 504 to Change the Behavior of Tech and Digital Content Ven ...
Title III of the ADA-Places of Public Accommodation
Record Nr. UNINA-9910788270203321
Lazar Jonathan  
Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Ensuring digital accessibility through process and policy / / Jonathan Lazar, Daniel Goldstein, Anne Taylor ; acquiring editor, Todd Green ; editorial project manager, Lindsay Lawrence ; designer, Greg Harris
Ensuring digital accessibility through process and policy / / Jonathan Lazar, Daniel Goldstein, Anne Taylor ; acquiring editor, Todd Green ; editorial project manager, Lindsay Lawrence ; designer, Greg Harris
Autore Lazar Jonathan
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (247 p.)
Disciplina 025.04087
Soggetto topico Assistive computer technology - United States
User interfaces (Computer systems) - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Ensuring Digital Accessibility through Process and Policy; Copyright; Critical Acclaim for Ensuring Digital Accessibility through Process and Policy ; Contents; About the Authors; Preface; Chapter 1: Introduction to accessible technology; Introduction; Defining Accessible Technology; Various Types of Disabilities; Accessibility Helps Those Without Disabilities; Various Types of Technologies; Mobile Devices, Apps, and Accessibility; Accessibility in Desktop and Laptop Computers; How does Accessibility Work?; Accessibility in Kiosks and Voting Machines
Accessible Technology vs. Augmentative Communication and ProstheticsVarious Types of Policies; How Policies and Laws Can Lead to Improved Access to Digital Information; Summary; A Note About the Usage of Terms; References; Chapter 2: The history of access technology; Introduction; Early History of Assistive Technologies (through the 1960s); The Invention of the Typewriter; The Record Player and the Audiobook; TTYs for the Deaf and Hard of Hearing; The 1970s-Present; Optical Character Recognition, Synthetic Speech, and the Flatbed Scanner; Captioning; Speech Recognition
Speech Recognition and Learning Disabled StudentsScreen Reader Technology; Assistive and Augmentative Communication; Power Wheelchairs and Prosthetics; Current Events and Trends; How Accessible Technology has Crossed Over into the Mainstream; Understanding Why/How People with Disabilities Adopt Technology; How the Changes in Technology Over Time Must Influence Changes in Solutions; Summary; References; Chapter 3: The discriminatory impact of digital inaccessibility; Introduction; Separate But Equal in the Context of Disability; Same Time; Same Price; Same Content
Same Time, Same Content, Same Price, And Now . . . Same Hardware and SoftwareSummary; References; Chapter 4: Technical standards for accessibility; Accessibility Standards; The World Wide Web Consortium and the Web Accessibility Initiative; Web Accessibility Standards; The Web Content Accessibility Guidelines; Authoring Tool Accessibility Guidelines; Atag 2.0; User Agent Accessibility Guidelines; Relationship to the Web Content Accessibility Guidelines (WCAG) 2.0; Relationship to the Authoring Tool Accessibility Guidelines (ATAG) 2.0; Accessible Rich Internet Application; Epub
Applying WCAG 2.0 to Non-Web Information and Communications TechnologiesSummary; References; Chapter 5: U.S. laws and lawsuits; Introduction; Applicability of American Laws to Technology Developers; The Pace of Change in the Development of Technology Affects the Design of Legal Definitions of Access; Federal Statutes that have an Impact on the Accessibility of Technology; Section 504 of the Rehabilitation Act and Title II of the ADA; Public Colleges: A Case Study in the Application of Title II and 504 to Change the Behavior of Tech and Digital Content Ven ...
Title III of the ADA-Places of Public Accommodation
Record Nr. UNINA-9910811478703321
Lazar Jonathan  
Amsterdam, Netherlands : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon
Autore Simon Alan <1958->
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (101 p.)
Disciplina 658.472
Soggetto topico Business intelligence
Data warehousing
Business enterprises - Decision making
Soggetto genere / forma Electronic books.
ISBN 0-12-801540-3
0-12-801746-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""About the author""; ""Preface""; ""Introduction: a provocative question""; ""This book�s premises""; ""References""; ""Chapter 1 - The Challenge of Managing and Leading the Enterprise BI/DW Program""; ""Chapter introduction""; ""The challenges of enterprise-scale bi and data warehousing""; ""Immature Technology""; ""Backlash From Early EDW Failures""; ""Many Competing Enterprise Initiatives (and the Impact of Packaged Software)""; ""“The Need for Speed�""; ""Individual Business Unit BI Often More Valued Than Enterprise BI""
""The Cost and Difficulty of Unwinding Fragmented Data Marts""""Lack of “A Voice of Authority� Champion""; ""Postrecession Retrenchment""; ""Why we can be successful in today�s and tomorrow�s ebi/edw efforts""; ""A Rich, Easily Accessible Body of Knowledge""; ""A New Generation of Game-Changing Technology""; ""Greater Appreciation for the Value of Cross-Functional Business Intelligence""; ""Broader Appreciation for Predictive and Discovery Analytics""; ""“Back on the Table� Capabilities (and New Excitement)""; ""Cost Pressures on the Status Quo""
""Looking ahead: the ebi/edw program manager""""Reference""; ""Chapter 2 - The Role and Charter of the Enterprise Business Intelligence and Data Warehousing Program Manager""; ""Chapter introduction""; ""The program manager job description""; ""Organizational reporting relationship""; ""The program management team""; ""The Program Architect""; ""The Program Administrator/Controller""; ""Portfolio Project Managers""; ""When a multilayered program management team is necessary""; ""Looking ahead: the project portfolio""; ""Chapter 3 - Building the EBI/EDW Program�s Initial Project Portfolio""
""Chapter introduction""""Identifying the program�s portfolio of projects: alternatives and recommendations""; ""The project portfolio “metadata�""; ""Looking ahead: refining the ebi/edw project portfolio""; ""Reference""; ""Chapter 4 - Putting the Finishing Touches on the EBI/EDW Program�s Project Portfolio""; ""Chapter introduction""; ""Identifying overlapping capabilities and potential economies of scale""; ""Prioritizing the list of portfolio projects""; ""Finalizing the program�s architecture""; ""Updating and finalizing the program budget""
""Risk mitigation and contingency planning""""Preparing the program time line and project work plans""; ""Conducting the Critical Design and Schedule Review""; ""Securing buy-in and sponsorship""; ""Looking ahead: risk mitigation and contingency planning""; ""Chapter 5 - Program-Level Risk Management""; ""Chapter introduction""; ""Technology and architecture""; ""Mitigation Strategies""; ""“Many moving parts� interdependencies""; ""Mitigation Strategies""; ""Apathetic and detached leadership""; ""Mitigation Strategies""; ""Nondedicated resources""; ""Mitigation Strategies""
""Delayed budget cuts""
Record Nr. UNINA-9910463648903321
Simon Alan <1958->  
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon
Autore Simon Alan <1958->
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (101 p.)
Disciplina 658.472
Soggetto topico Business intelligence
Data warehousing
Business enterprises - Decision making
ISBN 0-12-801540-3
0-12-801746-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""About the author""; ""Preface""; ""Introduction: a provocative question""; ""This book�s premises""; ""References""; ""Chapter 1 - The Challenge of Managing and Leading the Enterprise BI/DW Program""; ""Chapter introduction""; ""The challenges of enterprise-scale bi and data warehousing""; ""Immature Technology""; ""Backlash From Early EDW Failures""; ""Many Competing Enterprise Initiatives (and the Impact of Packaged Software)""; ""“The Need for Speed�""; ""Individual Business Unit BI Often More Valued Than Enterprise BI""
""The Cost and Difficulty of Unwinding Fragmented Data Marts""""Lack of “A Voice of Authority� Champion""; ""Postrecession Retrenchment""; ""Why we can be successful in today�s and tomorrow�s ebi/edw efforts""; ""A Rich, Easily Accessible Body of Knowledge""; ""A New Generation of Game-Changing Technology""; ""Greater Appreciation for the Value of Cross-Functional Business Intelligence""; ""Broader Appreciation for Predictive and Discovery Analytics""; ""“Back on the Table� Capabilities (and New Excitement)""; ""Cost Pressures on the Status Quo""
""Looking ahead: the ebi/edw program manager""""Reference""; ""Chapter 2 - The Role and Charter of the Enterprise Business Intelligence and Data Warehousing Program Manager""; ""Chapter introduction""; ""The program manager job description""; ""Organizational reporting relationship""; ""The program management team""; ""The Program Architect""; ""The Program Administrator/Controller""; ""Portfolio Project Managers""; ""When a multilayered program management team is necessary""; ""Looking ahead: the project portfolio""; ""Chapter 3 - Building the EBI/EDW Program�s Initial Project Portfolio""
""Chapter introduction""""Identifying the program�s portfolio of projects: alternatives and recommendations""; ""The project portfolio “metadata�""; ""Looking ahead: refining the ebi/edw project portfolio""; ""Reference""; ""Chapter 4 - Putting the Finishing Touches on the EBI/EDW Program�s Project Portfolio""; ""Chapter introduction""; ""Identifying overlapping capabilities and potential economies of scale""; ""Prioritizing the list of portfolio projects""; ""Finalizing the program�s architecture""; ""Updating and finalizing the program budget""
""Risk mitigation and contingency planning""""Preparing the program time line and project work plans""; ""Conducting the Critical Design and Schedule Review""; ""Securing buy-in and sponsorship""; ""Looking ahead: risk mitigation and contingency planning""; ""Chapter 5 - Program-Level Risk Management""; ""Chapter introduction""; ""Technology and architecture""; ""Mitigation Strategies""; ""“Many moving parts� interdependencies""; ""Mitigation Strategies""; ""Apathetic and detached leadership""; ""Mitigation Strategies""; ""Nondedicated resources""; ""Mitigation Strategies""
""Delayed budget cuts""
Record Nr. UNINA-9910787908903321
Simon Alan <1958->  
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon
Enterprise business intelligence and data warehousing : program management essentials / / Alan Simon
Autore Simon Alan <1958->
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (101 p.)
Disciplina 658.472
Soggetto topico Business intelligence
Data warehousing
Business enterprises - Decision making
ISBN 0-12-801540-3
0-12-801746-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Cover""; ""Title Page""; ""Copyright Page""; ""Contents""; ""About the author""; ""Preface""; ""Introduction: a provocative question""; ""This book�s premises""; ""References""; ""Chapter 1 - The Challenge of Managing and Leading the Enterprise BI/DW Program""; ""Chapter introduction""; ""The challenges of enterprise-scale bi and data warehousing""; ""Immature Technology""; ""Backlash From Early EDW Failures""; ""Many Competing Enterprise Initiatives (and the Impact of Packaged Software)""; ""“The Need for Speed�""; ""Individual Business Unit BI Often More Valued Than Enterprise BI""
""The Cost and Difficulty of Unwinding Fragmented Data Marts""""Lack of “A Voice of Authority� Champion""; ""Postrecession Retrenchment""; ""Why we can be successful in today�s and tomorrow�s ebi/edw efforts""; ""A Rich, Easily Accessible Body of Knowledge""; ""A New Generation of Game-Changing Technology""; ""Greater Appreciation for the Value of Cross-Functional Business Intelligence""; ""Broader Appreciation for Predictive and Discovery Analytics""; ""“Back on the Table� Capabilities (and New Excitement)""; ""Cost Pressures on the Status Quo""
""Looking ahead: the ebi/edw program manager""""Reference""; ""Chapter 2 - The Role and Charter of the Enterprise Business Intelligence and Data Warehousing Program Manager""; ""Chapter introduction""; ""The program manager job description""; ""Organizational reporting relationship""; ""The program management team""; ""The Program Architect""; ""The Program Administrator/Controller""; ""Portfolio Project Managers""; ""When a multilayered program management team is necessary""; ""Looking ahead: the project portfolio""; ""Chapter 3 - Building the EBI/EDW Program�s Initial Project Portfolio""
""Chapter introduction""""Identifying the program�s portfolio of projects: alternatives and recommendations""; ""The project portfolio “metadata�""; ""Looking ahead: refining the ebi/edw project portfolio""; ""Reference""; ""Chapter 4 - Putting the Finishing Touches on the EBI/EDW Program�s Project Portfolio""; ""Chapter introduction""; ""Identifying overlapping capabilities and potential economies of scale""; ""Prioritizing the list of portfolio projects""; ""Finalizing the program�s architecture""; ""Updating and finalizing the program budget""
""Risk mitigation and contingency planning""""Preparing the program time line and project work plans""; ""Conducting the Critical Design and Schedule Review""; ""Securing buy-in and sponsorship""; ""Looking ahead: risk mitigation and contingency planning""; ""Chapter 5 - Program-Level Risk Management""; ""Chapter introduction""; ""Technology and architecture""; ""Mitigation Strategies""; ""“Many moving parts� interdependencies""; ""Mitigation Strategies""; ""Apathetic and detached leadership""; ""Mitigation Strategies""; ""Nondedicated resources""; ""Mitigation Strategies""
""Delayed budget cuts""
Record Nr. UNINA-9910823565103321
Simon Alan <1958->  
Waltham, Massachusetts : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Entity information life cycle for big data : master data management and information integration / / John R. Talburt, Yinle Zhou
Entity information life cycle for big data : master data management and information integration / / John R. Talburt, Yinle Zhou
Autore Talburt John R.
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam, [Netherlands] : , : Morgan Kaufmann, , 2015
Descrizione fisica 1 online resource (255 p.)
Disciplina 005.7
Soggetto topico Big data
Pattern recognition systems
Semantic Web
Data mining
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Entity Information Life Cycle for Big Data; Copyright; Contents; Foreword; Preface; THE CHANGING LANDSCAPE OF INFORMATION QUALITY; MOTIVATION FOR THIS BOOK; AUDIENCE; ORGANIZATION OF THE MATERIAL; Acknowledgements; Chapter 1 - The Value Proposition for MDM and Big Data; DEFINITION AND COMPONENTS OF MDM; THE BUSINESS CASE FOR MDM; DIMENSIONS OF MDM; THE CHALLENGE OF BIG DATA; MDM AND BIG DATA - THE N-SQUARED PROBLEM; CONCLUDING REMARKS; Chapter 2 - Entity Identity Information and the CSRUD Life Cycle Model; ENTITIES AND ENTITY REFERENCES; MANAGING ENTITY IDENTITY INFORMATION
ENTITY IDENTITY INFORMATION LIFE CYCLE MANAGEMENT MODELSCONCLUDING REMARKS; Chapter 3 - A Deep Dive into the Capture Phase; AN OVERVIEW OF THE CAPTURE PHASE; BUILDING THE FOUNDATION; UNDERSTANDING THE DATA; DATA PREPARATION; SELECTING IDENTITY ATTRIBUTES; ASSESSING ER RESULTS; DATA MATCHING STRATEGIES; CONCLUDING REMARKS; Chapter 4 - Store and Share - Entity Identity Structures; ENTITY IDENTITY INFORMATION MANAGEMENT STRATEGIES; DEDICATED MDM SYSTEMS; THE IDENTITY KNOWLEDGE BASE; MDM ARCHITECTURES; CONCLUDING REMARKS; Chapter 5 - Update and Dispose Phases - Ongoing Data Stewardship
DATA STEWARDSHIPTHE AUTOMATED UPDATE PROCESS; THE MANUAL UPDATE PROCESS; ASSERTED RESOLUTION; EIS VISUALIZATION TOOLS; MANAGING ENTITY IDENTIFIERS; CONCLUDING REMARKS; Chapter 6 - Resolve and Retrieve Phase - Identity Resolution; IDENTITY RESOLUTION; IDENTITY RESOLUTION ACCESS MODES; CONFIDENCE SCORES; CONCLUDING REMARKS; Chapter 7 - Theoretical Foundations; THE FELLEGI-SUNTER THEORY OF RECORD LINKAGE; THE STANFORD ENTITY RESOLUTION FRAMEWORK; ENTITY IDENTITY INFORMATION MANAGEMENT; CONCLUDING REMARKS; Chapter 8 - The Nuts and Bolts of Entity Resolution; THE ER CHECKLIST
CLUSTER-TO-CLUSTER CLASSIFICATIONSELECTING AN APPROPRIATE ALGORITHM; CONCLUDING REMARKS; Chapter 9 - Blocking; BLOCKING; BLOCKING BY MATCH KEY; DYNAMIC BLOCKING VERSUS PRERESOLUTION BLOCKING; BLOCKING PRECISION AND RECALL; MATCH KEY BLOCKING FOR BOOLEAN RULES; MATCH KEY BLOCKING FOR SCORING RULES; CONCLUDING REMARKS; Chapter 10 - CSRUD for Big Data; LARGE-SCALE ER FOR MDM; THE TRANSITIVE CLOSURE PROBLEM; DISTRIBUTED, MULTIPLE-INDEX, RECORD-BASED RESOLUTION; AN ITERATIVE, NONRECURSIVE ALGORITHM FOR TRANSITIVE CLOSURE; ITERATION PHASE: SUCCESSIVE CLOSURE BY REFERENCE IDENTIFIER
DEDUPLICATION PHASE: FINAL OUTPUT OF COMPONENTSER USING THE NULL RULE; THE CAPTURE PHASE AND IKB; THE IDENTITY UPDATE PROBLEM; PERSISTENT ENTITY IDENTIFIERS; THE LARGE COMPONENT AND BIG ENTITY PROBLEMS; IDENTITY CAPTURE AND UPDATE FOR ATTRIBUTE-BASED RESOLUTION; CONCLUDING REMARKS; Chapter 11 - ISO Data Quality Standards for Master Data; BACKGROUND; GOALS AND SCOPE OF THE ISO 8000-110 STANDARD; FOUR MAJOR COMPONENTS OF THE ISO 8000-110 STANDARD; SIMPLE AND STRONG COMPLIANCE WITH ISO 8000-110; ISO 22745 INDUSTRIAL SYSTEMS AND INTEGRATION; BEYOND ISO 8000-110; CONCLUDING REMARKS
Appendix A - Some Commonly Used ER Comparators
Record Nr. UNINA-9910788125003321
Talburt John R.  
Amsterdam, [Netherlands] : , : Morgan Kaufmann, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui