close
1.

電子ブック

EB
Roger Dube, Roger R. Dube
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
The Elements of Computer Security / 1:
Cryptography Approaches and Attacks / 2:
Key Generation and Distribution Approaches and Attacks / 3:
The Qualities of Workable Security Solutions / 4:
Secure Coprocessors / 5:
Secure bootstrap Loading / 6:
Secure Memory Management and Trusted Execution Technology / 7:
The Trusted Platform Module / 8:
Field-Programmable Gate Arrays / 9:
Hardware-Based Authentication / 10:
A Closer Look At Biometrics / 11:
Tokens: Something You Have / 12:
Location Technologies / 13:
Putting It All Together / 14:
Glossary
Index
The Elements of Computer Security / 1:
Cryptography Approaches and Attacks / 2:
Key Generation and Distribution Approaches and Attacks / 3:
2.

電子ブック

EB
Rebecca S. Busch
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Incorporated, 2008
所蔵情報: loading…
目次情報: 続きを見る
Preface
About the Author
Acknowledgments
Introduction
Market Background / Chapter 1:
E-Health
How is Electronic Information Created?Information Technology Considerations
How is Health Information Created?Review of Primary HCC Market Players
Patients
Providers
Third Party Vendors
Payers
Review of HCC Secondary Market Players
Major Initiative for E-Health
Audit Implication Overview
Industry Application / Chapter 2:
Public Uses
Private Uses
Information Continuum
Market Standards and Initiatives
Agency for Healthcare Research and Quality
Health Level Seven
Certification Commission for Healthcare Information Technology
Department of Defense Records Management Program
Association of Records Managers and Administrators
Impact of E-Health on Case Management / Chapter 3:
Financial Picture
Hospital-Based FCM Application
Background Information and Provider Perspective
Problem: Getting Paid Correctly for Services Provided
Findings
Additional Findings
Summary
Consumer-Based FCM Application
Market Problems: The Industry as It Operates Today
Consumer FCM Model
Healthcare Portfolio Application
Virtual Case Management
VCM Payer Model
VCM Patient Model
VCM Hospital Model
VCM Physician Model
VCM Allied Health Services
VCM Nontraditional Health Services Model
VCM Other Business Services Model
Data in an E-Health Environment / Chapter 4:
Data Library
Data Intelligence
New Data
More New Data
Processed Data
Data Warehouse
Algorithms / Chapter 5:
Background
Understanding Algorithms
Data Elements
Case Study
Algorithm SelectionAuditor Implication Overview
Data-Driven Health Decisions in an E-Health Environment / Chapter 6:
Knowledge Models
Primary Healthcare Continuum
Secondary Healthcare Continuum
Third-Party Vendor Knowledge Model
Knowledge Models For White-Collar and Organized Crime
Sample Identity Theft Case
Medical Identity Theft
Medical Identity Theft - Definition
How Medical Identity Theft Occurs
Damages To Primary Victims
Medical Identity Theft From A Consumer Perspective
When The Consumer Is Not Aware
When The Consumer Is Involved
When An Individual Wants Products Or Services
Damages To Secondary Victims
Medical Identity Theft From An Entity's Perspective
Auditor Considerations
Sample Fraud Case
Sample Pharmaceutical Fraud Case
Examples Of Worldwide Activity
Analytic Tools and Audit Checklists / Chapter 7:
E-Health And Healthcare Business Processes
Patient Business Process
Financial Case Management Advocacy / Problem #1:
Clinical Case Management Advocacy / Problem #2:
Provider Business Process
Lack Of Electronic Internal Controls
Lack Of Internal Controls With User Identity
Lack Of Internal Controls For Services Provided And Charged / Problem #3:
Payer Business Process
Use And Loss Of Health Information - Handling Subcontracted Vendors
Lack Of Insurance - Processing Fraudulent Claims For Enrolled Beneficiaries
Plan Sponsor Business Process
Employee Working Environments
Employer Increase In Healthcare Expenditures
Third-Party Vendor Business Process
Problem Increase In Pharmaceutic
Preface
About the Author
Acknowledgments
3.

電子ブック

EB
Susan Conway, Mara E. Conway, Susan D. Conway
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
4.

電子ブック

EB
Jon D. Harrop, Jonathan D. Harrop
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
Introduction / 1:
Program Structure / 2:
Data Structures / 3:
Numerical Analysis / 4:
Input and Output / 5:
Simple Examples / 6:
Visualization / 7:
Optimization / 8:
Libraries / 9:
Databases / 10:
Interoperability / 11:
Complete Examples / 12:
Bibliography
Introduction / 1:
Program Structure / 2:
Data Structures / 3:
5.

電子ブック

EB
Martin T. Biegelman, Daniel R. Biegelman
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgments
About the Author
Why Ethics and Compliance Will Always Matter / Chapter 1:
Tone at the Top and Throughout / Chapter 2:
The Growth and Evolution of Compliance / Chapter 3:
Caremark and Sarbanes-Oxley: Enhancing Compliance / Chapter 4:
CA's Compliance Rebirth: Don't Lie, Don't Cheat, Don't Steal / Chapter 5:
The International Landscape of Compliance / Chapter 6:
Compliance Programs and Anti-Money Laundering Efforts / Marc B. Sherman ; Laura Connor ; David MeilstrupChapter 7:
About the Chapter Authors
Interview with an Ethics and Compliance Thought Leader / Chapter 8:
Building a World-Class Compliance Program: The Seven Steps in Practice (Part I) / Chapter 9:
Building a World-Class Compliance Program: The Seven Steps in Practice (Part II) / Chapter 10:
Recognizing Compliance Excellence: Premier, Inc. and Winning the Baldrige Award / Chapter 11:
Designing Robust Fraud Prevention Policies: The Airservices Australia Fraud Control Plan / Chapter 12:
The Skunk in the Room / Chapter 13:
Summary of the 2004 Federal Sentencing Guidelines Amendments and Recommended Action Steps / Appendix A:
Sample Compliance Program Charter / Appendix B:
Resources for Compliance Professionals / Appendix C:
Index
Foreword
Preface
Acknowledgments
6.

電子ブック

EB
Ronald H. Bowman
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
Preface
How We Got Here: History of Data Centers and Current Choices / 1:
Acts of God: Mission-Critical Interruptions and Man-Made Challenges / 2:
Origins of the Business Impact Analysis / 3:
Flooding: Be Afraid, Be Very Afraid! / 4:
Data Centers growth Velocity / 5:
Energy use in Data Centers Globally Through 2012 / 6:
Primary and Secondary Data Center Selection: Recent History / 7:
Public Sector Laws: Guidance and Consequences / 8:
Government's Role: Summary of National Infrastructure Protection Plan of 2006 / 9:
Tier 4: Basis of Design / 10:
Unique Challenges of Cooling / 11:
Unique Challenges of Power / 12:
Going Green / 13:
New Methods of Effective Site Selection: Negotiation and Execution / 14:
Cyberterrorism / 15:
Need for Speed / 16:
Future of Data center Efficiencies-Think Outside the Grid / 17:
Glossary
Index
Preface
How We Got Here: History of Data Centers and Current Choices / 1:
Acts of God: Mission-Critical Interruptions and Man-Made Challenges / 2:
7.

電子ブック

EB
Dubitzky, Werner Dubitzky
出版情報: Wiley Online Library - AutoHoldings Books , John Wiley & Sons, Inc., 2008
所蔵情報: loading…
目次情報: 続きを見る
Preface
List of Contributors
Data mining meets grid computing: time to dance / Alberto Sánchez ; Jesús Montes ; Werner Dubitzky ; Julio J. Valdés ; María S. Pérez ; Pedro de Miguel1:
Introduction / 1.1:
Data mining / 1.2:
Grid computing / 1.3:
Data mining grid - mining grid data / 1.4:
Conclusions / 1.5:
Summary of Chapters in this volume / 1.6:
Data analysis services in the Knowledge Grid / Eugenio Cesario ; Antonio Congiusta ; Domenico Talia ; Paolo Trunfio2:
Approach / 2.1:
Knowledge Grid services / 2.3:
Data analysis services / 2.4:
Design of Knowledge Grid applications / 2.5:
GridMiner: an advanced support for e-science analytics / Peter Brezany ; Ivan Janciak ; A. Min Tjoa2.6:
Rationale behind the design and development of GridMiner / 3.1:
Use case / 3.3:
Knowledge discovery process and its support by GridMiner / 3.4:
Graphical user interface / 3.5:
Future developments / 3.6:
ADaM services: scientific data mining in the service-oriented architecture paradigm / Rahul Ramachandran ; Sara Graves ; John Rushing ; Ken Keiser ; Manil Maskey ; Hong Lin ; Helen Conover3.7:
ADaM system overview / 4.1:
ADaM toolkit overview / 4.3:
Mining in a service-oriented architecture / 4.4:
Mining Web services / 4.5:
Mining grid services / 4.6:
Summary / 4.7:
Mining for misconfigured machines in grid systems / Noam Palatin ; Arie Leizarowitz ; Assaf Schuster ; Ran Wolff5:
Preliminaries and related work / 5.1:
Acquiring, pre-processing and storing data / 5.3:
Data analysis / 5.4:
The GMS / 5.5:
Evaluation / 5.6:
Conclusions and future work / 5.7:
FAEHIM: Federated Analysis Environment for Heterogeneous Intelligent Mining / Ali Shaikh Ali ; Omer F. Rana6:
Requirements of a distributed knowledge discovery framework / 6.1:
Workflow-based knowledge discovery / 6.3:
Data mining toolkit / 6.4:
Data mining service framework / 6.5:
Distributed data mining services / 6.6:
Data manipulation tools / 6.7:
Availability / 6.8:
Empirical experiments / 6.9:
Scalable and privacy preserving distributed data analysis over a service-oriented platform / William K. Cheung6.10:
A service-oriented solution / 7.1:
Background / 7.3:
Model-based scalable, privacy preserving, distributed data analysis / 7.4:
Modelling distributed data mining and workflow processes / 7.5:
Lessons learned / 7.6:
Further research directions / 7.7:
Building and using analytical workflows in Discovery Net / Moustafa Ghanem ; Vasa Curcin ; Patrick Wendel ; Yike Guo7.8:
Discovery Net system / 8.1:
Architecture for Discovery Net / 8.3:
Data management / 8.4:
Example of a workflow study / 8.5:
Future directions / 8.6:
Building workflows that traverse the bioinformatics data landscape / Robert Stevens ; Paul Fisher ; Jun Zhao ; Carole Goble ; Andy Brass9:
The bioinformatics data landscape / 9.1:
The bioinformatics experiment landscape / 9.3:
Taverna for bioinformatics experiments / 9.4:
Building workflows in Taverna / 9.5:
Workflow case study / 9.6:
Discussion / 9.7:
Specification of distributed data mining workflows with DataMiningGrid / Dennis Wegener ; Michael May10:
DataMiningGrid environment / 10.1:
Operations for workflow construction / 10.3:
Extensibility / 10.4:
Case studies / 10.5:
Discussion and related work / 10.6:
Open issues / 10.7:
Anteater: service-oriented data mining / Renato A. Ferreira ; Dorgival O. Guedes ; Wagner Meira10.8:
The architecture / 11.1:
Runtime framework / 11.3:
Parallel algorithms for data mining / 11.4:
Visual metaphors / 11.5:
DMGA: a generic brokering-based data mining grid architecture / Pierre Gueant ; José M. Peña ; Pilar Herrero11.6:
DMGA overview / 12.1:
Horizontal composition / 12.3:
Vertical composition / 12.4:
The need for brokering / 12.5:
Brokering-based data mining grid architecture / 12.6:
Use cases: Apriori, ID3 and J4.8 algorithms / 12.7:
Related work / 12.8:
Grid-based data mining with the Environmental Scenario Search Engine (ESSE) / Mikhail Zhizhin ; Alexey Poyda ; Dmitry Mishin ; Dmitry Medvedev ; Eric Kihn ; Vassily Lyutsarev12.9:
Environmental data source: NCEP/NCAR reanalysis data set / 13.1:
Fuzzy search engine / 13.2:
Software architecture / 13.3:
Applications / 13.4:
Data pre-processing using OGSA-DAI / Martin Swain ; Neil P. Chue Hong13.5:
Data pre-processing for grid-enabled data mining / 14.1:
Using OGSA-DAI to support data mining applications / 14.3:
Data pre-processing scenarios in data mining applications / 14.4:
State of the art solutions for grid data management / 14.5:
Index / 14.6:
Summary of chapters in this volume / Alberto Sánchez ; Jesús Montes ; Julio J. Valdés ; María S. Pérez
Preface
List of Contributors
Data mining meets grid computing: time to dance / Alberto Sánchez ; Jesús Montes ; Werner Dubitzky ; Julio J. Valdés ; María S. Pérez ; Pedro de Miguel1:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼