- Table View
- List View
Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design
by Premchand S. NairWhile Java texts are plentiful, it's difficult to find one that takes a real-world approach, and encourages novice programmers to build on their Java skills through practical exercise. Written by an expert with 19 experience teaching computer programming, Java Programming Fundamentals presents object-oriented programming by employing examples taken
The Universal Access Handbook (Human Factors and Ergonomics)
by Constantine StephanidisIn recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles
Conceptual Structures in Practice (Chapman & Hall/CRC Studies in Informatics Series)
by Pascal Hitzler Henrik SchärfeExploring fundamental research questions, Conceptual Structures in Practice takes you through the basic yet nontrivial task of establishing conceptual relations as the foundation for research in knowledge representation and knowledge mining. It includes contributions from leading researchers in both the conceptual graph and formal concept analysis
Introduction to Logic Design
by Svetlana N. Yanushkevich Vlad P. ShmerkoWith an abundance of insightful examples, problems, and computer experiments, Introduction to Logic Design provides a balanced, easy-to-read treatment of the fundamental theory of logic functions and applications to the design of digital devices and systems. Requiring no prior knowledge of electrical circuits or electronics, it supplies the
Securing Windows NT/2000: From Policies to Firewalls
by Michael A. SimonyiIn today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From
Discrete Mathematics: Proofs, Structures and Applications, Third Edition
by John Taylor Rowan GarnierTaking an approach to the subject that is suitable for a broad readership, Discrete Mathematics: Proofs, Structures, and Applications, Third Edition provides a rigorous yet accessible exposition of discrete mathematics, including the core mathematical foundation of computer science. The approach is comprehensive yet maintains an easy-to-follow prog
Embedded Linux System Design and Development
by P. Raghavan Amol Lad Sriram NeelakandanBased upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux.This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications.This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.
Computer Forensics: Evidence Collection and Management
by Robert C. NewmanComputer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution. The book is divided into two major parts for easy reference. The first part explores various crimes, laws, policies, forensic tools, and the information needed to understand the underlying concepts of computer forensic investigations. The second part presents information relating to crime scene investigations and management, disk and file structure, laboratory construction and functions, and legal testimony. Separate chapters focus on investigations involving computer systems, e-mail, and wireless devices. Presenting information patterned after technical, legal, and managerial classes held by computer forensic professionals from Cyber Crime Summits held at Kennesaw State University in 2005 and 2006, this book is an invaluable resource for thosewho want to be both efficient and effective when conducting an investigation.
Introduction to Data Technologies (Chapman & Hall/CRC Computer Science & Data Analysis)
by Paul MurrellProviding key information on how to work with research data, Introduction to Data Technologies presents ideas and techniques for performing critical, behind-the-scenes tasks that take up so much time and effort yet typically receive little attention in formal education. With a focus on computational tools, the book shows readers how to improve thei
Building an Enterprise-Wide Business Continuity Program
by Kelley OkolitaIf you had to evacuate from your building right now and were told you couldn't get back in for two weeks, would you know what to do to ensure your business continues to operate? Would your staff? Would every person who works for your organization? Increasing threats to business operations, both natural and man-made, mean a disaster could occur at any time. It is essential that corporations and institutions develop plans to ensure the preservation of business operations and the technology that supports them should risks become reality. Building an Enterprise-Wide Business Continuity Program goes beyond theory to provide planners with actual tools needed to build a continuity program in any enterprise. Drawing on over two decades of experience creating continuity plans and exercising them in real recoveries, including 9/11 and Hurricane Katrina, Master Business Continuity Planner, Kelley Okolita, provides guidance on each step of the process. She details how to validate the plan and supplies time-tested tips for keeping the plan action-ready over the course of time. Disasters can happen anywhere, anytime, and for any number of reasons. However, by proactively planning for such events, smart leaders can prepare their organizations to minimize tragic consequences and readily restore order with confidence in the face of such adversity.
Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
by Daniel MinoliEnterprise Architecture A to Z examines cost-saving trends in architecture planning, administration, and management. The text begins by evaluating the role of Enterprise Architecture planning and Service-Oriented Architecture (SOA) modeling. It provides an extensive review of the most widely-deployed architecture framework models, including The Open Group Architecture and Zachman Architectural Frameworks, as well as formal architecture standards. The first part of the text focuses on the upper layers of the architecture framework, while the second part focuses on the technology architecture. Additional coverage discusses Ethernet, WAN, Internet communication technologies, broadband, and chargeback models.
Handbook of IPv4 to IPv6 Transition: Methodologies for Institutional and Corporate Networks
by Daniel Minoli John J. AmossThe implementation of IPv6 is essential to the continued growth of the Internet and the development of new applications. The Handbook of IPv4 to IPv6 Transition Methodologies provides a wealth of best practices and procedures that will help corporations plan and implement a smooth transition to IPv6.A blueprint for successful transition, the Handbo
Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI
by Debra S. HerrmannWhile it has become increasingly apparent that individuals and organizations need a security metrics program, it has been exceedingly difficult to define exactly what that means in a given situation. There are hundreds of metrics to choose from and an organization's mission, industry, and size will affect the nature and scope of the task as well as
Elliptic Curves: Number Theory and Cryptography, Second Edition (Discrete Mathematics and Its Applications)
by Lawrence C. WashingtonLike its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications. With additional exercises, this edition offers more comprehensive coverage of the fundamental theory, techniques, and application
Network Design for IP Convergence
by Yezid DonosoThe emergence of quality-of-service (QoS) mechanisms continues to propel the development of real-time multimedia services such as VoIP and videoconferencing. However, many challenges remain in achieving optimized standardization convergence. Network Design for IP Convergence is a comprehensive, global guide to recent advances in IP network implementation. Providing an introduction to basic LAN/WAN/MAN network design, the author covers the latest equipment and architecture, addressing, QoS policies, and integration of services, among other topics. The book explains how to integrate the different layers of reference models and various technological platforms to mirror the harmonization that occurs in the real world of carrier networks. It furnishes appropriate designs for traditional and critical services in the LAN and carrier networks (both MAN and WAN), and it clarifies how a specific layer or technology can cause those services to malfunction. This book lays a foundation for understanding with concepts and applicability of QoS parameters under the multilayer scheme, and a solid explanation of service infrastructure. It goes on to describe integration in both real time and "not real time," elaborating on how both processes can co-exist within the same IP network and concluding with the designs and configurations of service connections.Learn How to Overcome Obstacles to Improve TechnologyThis sweeping analysis of the implementation of IP convergence and QoS mechanisms helps designers and operators get past key obstacles, such as integrating platform layers and technologies and implementing various associated QoS concepts, to improve technology and standards.
Bioinformatics: A Practical Approach
by Shui Qing YeAn emerging, ever-evolving branch of science, bioinformatics has paved the way for the explosive growth in the distribution of biological information to a variety of biological databases, including the National Center for Biotechnology Information. For growth to continue in this field, biologists must obtain basic computer skills while computer spe
Building an Information Security Awareness Program
by Mark B. DesmanIn his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what ca
OpenGL Insights
by Patrick Cozzi Christophe RiccioGet Real-World Insight from Experienced Professionals in the OpenGL CommunityWith OpenGL, OpenGL ES, and WebGL, real-time rendering is becoming available everywhere, from AAA games to mobile phones to web pages. Assembling contributions from experienced developers, vendors, researchers, and educators, OpenGL Insights presents real-world techniques
Near Field Communications Handbook
by Mohammad Ilyas Syed A. AhsonFrom basic concepts to research grade material and future directions, the Near Field Communications Handbook provides comprehensive technical coverage of this rapidly emerging field. Walking readers through emerging applications, it offers a glimpse at a future in which near field communication (NFC) technology is fully integrated into daily life.
Mobile Opportunistic Networks: Architectures, Protocols and Applications
by Mieso K. DenkoFrom fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest experimental studies-including simulation tools and implementation test beds.
Modeling Software with Finite State Machines: A Practical Approach
by Thomas Wagner Ferdinand Wagner Ruedi Schmuki Peter WolstenholmeModeling Software with Finite State Machines: A Practical Approach explains how to apply finite state machines to software development. It provides a critical analysis of using finite state machines as a foundation for executable specifications to reduce software development effort and improve quality. It discusses the design of a state machine and of a system of state machines. It also presents a detailed analysis of development issues relating to behavior modeling with design examples and design rules for using finite state machines. This text demonstrates the implementation of these concepts using StateWORKS software and introduces the basic components of this software.
Building a Project Work Breakdown Structure: Visualizing Objectives, Deliverables, Activities, and Schedules (ESI International Project Management Series)
by Dennis P. MillerMost people do not truly understand a concept until they can visualize it. This applies to all fields, including Project Management. The best way to effectively manage projects is to help your team visualize the end result as well as the steps needed to achieve that result.Help Your Team Visualize the Right Path to SuccessBuilding a Project Work Br
Intelligence Support Systems: Technologies for Lawful Intercepts
by Paul Hoffmann Kornel TerplanTelecommunications service providers face increasing information assistance requests to help law enforcement while they simultaneously struggle with CapEx and OpEx reductions. On the other hand, law enforcement agencies face expensive telecommunication interface options for data collection as they battle with a growing backlog of subpoena requests.
IT's All about the People: Technology Management That Overcomes Disaffected People, Stupid Processes, and Deranged Corporate Cultures
by Stephen J. AndrioleThis book explains how to achieve dramatic improvements in service and agility by enhancing the people, processes, and culture within your organization. It details the various roles within the technology management process and supplies insight into the realities of human behavior-including the range of best and worst behaviors from managers, executives, and corporate culture. Industry veteran Stephen J. Andriole provides a fresh perspective on the old basics of IT management through a twenty-first-century lens.
Practical Rendering and Computation with Direct3D 11
by Jason Zink Matt Pettineo Jack HoxleyDirect3D 11 offers such a wealth of capabilities that users can sometimes get lost in the details of specific APIs and their implementation. While there is a great deal of low-level information available about how each API function should be used, there is little documentation that shows how best to leverage these capabilities. Written by active me