A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
This book contains the refereed proceedings of the 16th International Conference on Business Process Modeling, Development and Support, BPMDS 2015, and the 20th International Conference on Exploring Modeling Methods for Systems Analysis and Design, EMMSAD 2015, held together with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015) in Stockholm, Sweden, in …
This book constitutes the refereed proceedings of the 11th International Workshop on Enterprise and Organizational Modeling and Simulation, EOMAS 2015, held at CAiSE 2015, in June 2015 in Stockholm, Sweden. EOMAS was founded with the purpose to become a forum among researchers and practitioners to share their research and practical findings by encouraging the dissemination of research result…
This book contains 15 thoroughly refereed research papers selected from 90 submissions for the 5th, 6th, and 7th International Workshop on Enterprise Systems, Pre-ICIS 2010–2012, held in St. Louis, MO, USA, in December 2010, in Shanghai, China, in December 2011, and in Orlando, FL, USA, in December 2012, respectively. In addition, two invited papers complete this volume. The contributions …
This book constitutes the proceedings of the 6th International IFIP Working Conference on Enterprise Interoperability, IWEI 2015, held in Nîmes, France, in May 2015. The event was organized by the IFIP Working Group 5.8 on Enterprise Interoperability in co-operation with INTEROP-VLab and PGSO (Pole Grand Sud Ouest) from INTEROP-Vlab. The theme for IWEI 2015 was “From Enterprise Interoperabil…
This book contains revised papers from the 17th International Conference on Enterprise Information Systems, ICEIS 2015, held in Barcelona, Spain, in April 2015. The 31 papers presented in this volume were carefully reviewed and selected from a total of 327 submissions. The book also contains one full-paper invited talk. The selected papers reflect state-of-the-art research that is oriented …
This book contains extended and revised papers from the 16th International Conference on Enterprise Information Systems, ICEIS 2014, held in Lisbon, Portugal, in April 2014. The 24 papers presented in this volume were carefully reviewed and selected from a total of 313 submissions. The book also contains two full-paper invited talks. The selected papers reflect state-of-the-art research that…
Learn how to form and execute an enterprise information strategy: topics include data governance strategy, data architecture strategy, information security strategy, big data strategy, and cloud strategy. Manage information like a pro, to achieve much better financial results for the enterprise, more efficient processes, and multiple advantages over competitors. As you’ll discover in Enter…
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…
This book constitutes the proceedings of the 7th International Workshop on Enterprise Applications and Services in the Finance Industry, FinanceCom 2014, held in Sydney, Australia, on December 12, 2014. The workshop spans multiple disciplines, including technical, service, economic, sociological, and behavioral sciences. It reflects on technologically enabled opportunities, implications, and…