Handbook of Service Description


Book Description

The Handbook of Service Description introduces an in-depth overview of service description efforts. The book also highlights the recent Unified Service Description Language (USDL) in detail and discusses its methods. The Handbook of Service Description is the normative scientific reference for the upcoming standardization of the Unified Service Description Language (USDL). Complete documentation is included. The Handbook of Service Description is designed for those working in the service science industry as a reference book. Advanced-level students focused on computer science, engineering and business will also find this book a valuable asset.




Member Service Descriptions


Book Description







Member Service Descriptions


Book Description




Information and Knowledge Management in Complex Systems


Book Description

This book constitutes the refereed proceedings of the 16th IFIP WG 8.1 International Conference on Informatics and Semiotics in Organisations, ICISO 2015, held in Toulouse, France, in March 2015. The 21 revised papers presented were carefully reviewed and selected from 46 submissions. The papers are organized in the following topical sections: organisational semiotics: theory and concepts; organisational semiotics and applications; information systems and services; complex system modeling and simulation; and innovation and organisational learning.







"Code of Massachusetts regulations, 2007"


Book Description

Archival snapshot of entire looseleaf Code of Massachusetts Regulations held by the Social Law Library of Massachusetts as of January 2020.




"Code of Massachusetts regulations, 2013"


Book Description

Archival snapshot of entire looseleaf Code of Massachusetts Regulations held by the Social Law Library of Massachusetts as of January 2014.




Naval Military Personnel Manual


Book Description




Cybersecurity


Book Description

Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare.