Breadcrumbs Section. Click here to navigate to respective pages.
Book

Book
Encyclopedia of Information Systems and Technology
DOI link for Encyclopedia of Information Systems and Technology
Encyclopedia of Information Systems and Technology book
Encyclopedia of Information Systems and Technology
DOI link for Encyclopedia of Information Systems and Technology
Encyclopedia of Information Systems and Technology book
Get Citation
ABSTRACT
Spanning the multi-disciplinary scope of information technology, the Encyclopedia of Information Systems and Technology draws together comprehensive coverage of the inter-related aspects of information systems and technology.
The topics covered in this encyclopedia encompass internationally recognized bodies of knowledge, including those of The IT BOK, the Chartered Information Technology Professionals Program, the International IT Professional Practice Program (British Computer Society), the Core Body of Knowledge for IT Professionals (Australian Computer Society), the International Computer Driving License Foundation (European Computer Driving License Foundation), and the Guide to the Software Engineering Body of Knowledge.
Using the universally recognized definitions of IT and information systems from these recognized bodies of knowledge, the encyclopedia brings together the information that students, practicing professionals, researchers, and academicians need to keep their knowledge up to date.
Also Available Online
This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including:
Citation tracking and alerts
Active reference linking
Saved searches and marked lists
HTML and PDF format options
Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages.
US: (Tel) 1.888.318.2367; (E-mail) [email protected]
International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]
TABLE OF CONTENTS
entry |12 pages
Ad Hoc Networks: Technologies
entry |6 pages
AES: Advanced Encryption Standard
entry |3 pages
ANSI: American National Standards Institute
entry |5 pages
Application Security
entry |14 pages
Application Systems Development
entry |11 pages
Artificial Intelligence
entry |14 pages
Artificial Neural Networks and Natural Language Processing
entry |13 pages
Assurance: Science of
entry |8 pages
Availability of IS/IT
entry |7 pages
Big Data: Applications
entry |11 pages
Big Data: Concepts, Technologies, and Applications
entry |10 pages
Big Data: Structured and Unstructured Data
entry |9 pages
Bioinformatics
entry |6 pages
Boolean Algebras
entry |6 pages
Business Informatics
entry |13 pages
CDMA: Code Division Multiple Access Networks
entry |10 pages
Cellular Systems
entry |9 pages
Cloud Computing
entry |10 pages
Cloud Computing: Grids and HPCs (High-Performance Computers)
entry |15 pages
Cloud Computing: History and Evolution
entry |13 pages
Cloud Computing: Mobile Devices
entry |14 pages
Cloud Computing: Security
entry |14 pages
Cloud Computing: Standards
entry |9 pages
Cloud Computing: Virtualization versus
entry |7 pages
Communication Protocols and Services
entry |10 pages
Complexity and Self-Organization
entry |8 pages
Configuration Management
entry |13 pages
Cryptography
entry |8 pages
Cyberforensics
entry |7 pages
Cybernetics
entry |15 pages
Data Analytics
entry |10 pages
Data Analytics: Architectures, Implementation, Methodology, and Tools
entry |10 pages
Data Analytics: Mutivariate Temporal Data
entry |10 pages
Data Mining
entry |16 pages
Data Mining: Big Data
entry |15 pages
Data Mining: Forensic Analysis
entry |9 pages
Data Mining: Healthcare
entry |15 pages
Data Mining: Knowledge
entry |10 pages
Data Mining: Process
entry |16 pages
Data Mining: Supervised Learning
entry |12 pages
Database Design for a Cultural Artifact Repository
entry |8 pages
Decision Sciences
entry |9 pages
Decision Support Systems
entry |7 pages
EDRMS: Electronic Document and Records Management Systems
entry |15 pages
Enterprise Architecture: Challenges
entry |13 pages
Enterprise Architecture: Planning
entry |6 pages
Enterprise Architecture: Security
entry |6 pages
Enterprise Architecture: Virtualization
entry |15 pages
Ethics
entry |19 pages
Firewall Architectures
entry |19 pages
Fuzzy Set Theory
entry |12 pages
GIS: Geographic Information Systems
entry |8 pages
Green Computing: Data Centers
entry |12 pages
Green Computing: Devices
entry |8 pages
Hackers: Attacks and Defenses
entry |12 pages
Hackers: Tools and Techniques
entry |6 pages
Hash Algorithms
entry |9 pages
Healthcare Informatics
entry |11 pages
Healthcare Informatics: Analytics
entry |7 pages
Healthcare Informatics: Data Mining
entry |12 pages
Healthcare Information Technology
entry |19 pages
HIPAA: Health Insurance Portability and Accountability Act
entry |14 pages
Image Processing and Measurement
entry |12 pages
Incident Response and Digital Forensics
entry |8 pages
Information Architecture
entry |9 pages
Information Flow
entry |7 pages
Information Management
entry |14 pages
Information Protection
entry |16 pages
Information Science
entry |8 pages
Information Security Controls: Types
entry |8 pages
Information Systems
entry |10 pages
Information Theory
entry |7 pages
Intelligence and Security Informatics
entry |5 pages
IPv6: Expanding Internet Support
entry |6 pages
ISO Standards and Certification
entry |4 pages
ISSEP: Information Systems Security Engineering Professional
entry |5 pages
IT Value Chain and Competitive Advantage
entry |4 pages
ITGI: IT Governance Institute
entry |13 pages
ITIL: IT Infrastructure Library: Operational Excellence Framework
entry |10 pages
Knowledge Management
entry |9 pages
Knowledge Management Systems
entry |8 pages
Location-Based Services
entry |9 pages
Meta-Systems
entry |9 pages
Mobile Ad-Hoc Networks
entry |8 pages
Mobile Applications Development
entry |9 pages
Mobile Business Models and Value Networks
entry |7 pages
Mobile Data Security
entry |19 pages
Network Management
entry |8 pages
Network Security
entry |8 pages
Open Standards
entry |5 pages
Penetration Testing
entry |9 pages
Pervasive Computing
entry |8 pages
PKI: Public Key Infrastructure
entry |6 pages
Portable Computing Environments
entry |15 pages
Programming Languages
entry |13 pages
Resources: Measurement and Management
entry |16 pages
Root Cause Analysis and Troubleshooting Techniques
entry |9 pages
Search Engines
entry |14 pages
Semantic Web: Applications
entry |12 pages
Semantic Web: Languages, Tools, and Standards
entry |1 pages
SIM: Society for Information Management
entry |6 pages
Six Sigma
entry |13 pages
SOA: Service-Oriented Architecture
entry |7 pages
Social Networking: Legal, Privacy, and Security Issues
entry |9 pages
Social Networking: Tools
entry |9 pages
Software Development Lifecycles: Security Assessments
entry |4 pages
Steganography
entry |14 pages
VNC Systems: Virtual Network Computing Systems
entry |12 pages
VPNs: Virtual Private Networks
entry |11 pages
Vulnerability Management
entry |5 pages
W3C: World Wide Web Consortium
entry |8 pages
Web Retrieval and Mining
entry |13 pages
Web Services
entry |8 pages
Web Services: Security
entry |11 pages
WiMAX Networks: Security Issues
entry |9 pages
WLANs: Wireless Local Area Networks: Design
entry |3 pages
WLANs: Wireless Local Area Networks: IEEE 802.11
entry |7 pages
WLANs: Wireless Local Area Networks: Security
entry |6 pages
XML and Other Metadata Languages