ABSTRACT

Spanning the multi-disciplinary scope of information technology, the Encyclopedia of Information Systems and Technology draws together comprehensive coverage of the inter-related aspects of information systems and technology.

The topics covered in this encyclopedia encompass internationally recognized bodies of knowledge, including those of The IT BOK, the Chartered Information Technology Professionals Program, the International IT Professional Practice Program (British Computer Society), the Core Body of Knowledge for IT Professionals (Australian Computer Society), the International Computer Driving License Foundation (European Computer Driving License Foundation), and the Guide to the Software Engineering Body of Knowledge.

Using the universally recognized definitions of IT and information systems from these recognized bodies of knowledge, the encyclopedia brings together the information that students, practicing professionals, researchers, and academicians need to keep their knowledge up to date.

Also Available Online
This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including:

 Citation tracking and alerts

 Active reference linking

 Saved searches and marked lists

 HTML and PDF format options

Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages.
US: (Tel) 1.888.318.2367; (E-mail) e-reference@taylorandfrancis.com
International: (Tel) +44 (0) 20 7017 6062; (E-mail) online.sales@tandf.co.uk

chapter |12 pages

Ad Hoc Networks: Technologies

chapter |6 pages

AES: Advanced Encryption Standard

chapter |5 pages

Application Security

chapter |11 pages

Artificial Intelligence

chapter |13 pages

Assurance: Science of

chapter |8 pages

Availability of IS/IT

chapter |6 pages

Boolean Algebras

chapter |6 pages

Business Informatics

chapter |10 pages

Cellular Systems

chapter |9 pages

Cloud Computing

chapter |8 pages

Configuration Management

chapter |13 pages

Cryptography

chapter |8 pages

Cyberforensics

chapter |7 pages

Cybernetics

chapter |15 pages

Data Analytics

chapter |10 pages

Data Mining

chapter |16 pages

Data Mining: Big Data

chapter |15 pages

Data Mining: Knowledge

chapter |10 pages

Data Mining: Process

chapter |8 pages

Decision Sciences

chapter |13 pages

Enterprise Architecture: Planning

chapter |15 pages

Ethics

chapter |19 pages

Firewall Architectures

chapter |8 pages

Green Computing: Data Centers

chapter |12 pages

Green Computing: Devices

chapter |8 pages

Hackers: Attacks and Defenses

chapter |12 pages

Hackers: Tools and Techniques

chapter |6 pages

Hash Algorithms

chapter |11 pages

Healthcare Informatics: Analytics

chapter |14 pages

Image Processing and Measurement

chapter |9 pages

Information Flow

chapter |7 pages

Information Management

chapter |14 pages

Information Protection

chapter |16 pages

Information Science

chapter |8 pages

Information Systems

chapter |10 pages

Information Theory

chapter |5 pages

IPv6: Expanding Internet Support

chapter |6 pages

ISO Standards and Certification

chapter |10 pages

Knowledge Management

chapter |9 pages

Knowledge Management Systems

chapter |9 pages

Meta-Systems

chapter |7 pages

Mobile Data Security

chapter |19 pages

Network Management

chapter |8 pages

Open Standards

chapter |5 pages

Penetration Testing

chapter |9 pages

Pervasive Computing

chapter |15 pages

Programming Languages

chapter |9 pages

Search Engines

chapter |6 pages

Six Sigma

chapter |13 pages

SOA: Service-Oriented Architecture

chapter |9 pages

Social Networking: Tools

chapter |4 pages

Steganography

chapter |12 pages

VPNs: Virtual Private Networks

chapter |11 pages

Vulnerability Management

chapter |13 pages

Web Services

chapter |8 pages

Web Services: Security