- Table View
- List View
A Comprehensive Approach to Digital Manufacturing (Synthesis Lectures on Mechanical Engineering)
by Arif Sirinterlikci Yalcin ErtekinThis book draws a comprehensive approach to digital manufacturing through computer-aided design (CAD) and reverse engineering content complemented by basic CNC machining and computer-aided manufacturing (CAM), 3D printing, and additive manufacturing (AM) knowledge. The reader is exposed to a variety of subjects including the history, development, and future of digital manufacturing, a comprehensive look at 3D printing and AM, a comparative study between 3D printing and AM and CNC machining, and computer-aided engineering (CAE) along with 3D scanning. Applications of 3D printing and AM are presented as well as multiple special topics including design for 3D printing and AM (DfAM), costing, sustainability, environmental, safety, and health (EHS) issues. Contemporary subjects such as bio-printing, intellectual property (IP) and engineering ethics, virtual prototyping including augmented, virtual, and mixed reality (AR/VR/MR), and industrial Internet of Things (IIoT) are also covered.Each chapter comes with in-practice exercises and end-of-chapter questions, which can be used as home-works as well as hands-on or software-based laboratory activities. End-of-chapter questions are of three types mainly: review questions which can be answered by reviewing each chapter, research questions which need to be answered by conducting literature reviews and additional research, and discussion questions. In addition, some of the chapters include relevant problems or challenges which may require additional hands-on efforts. Most of the hands-on and practical content is driven by the authors’ previous experiences. The authors also encourage readers to help improve this book and its exercises by contacting them.
Comprehensive Computers: Understanding Technology (4th edition)
by Floyd Fuller Brian LarsonStudying this book will help prepare students for the workplace of today--and tomorrow--in which some level of computer skills is often an essential requirement for employment. Employees who continually try to improve their skills have an advantage over those who do not. Some would even argue that understanding technology has become a survival skills. This book will help students become survivors.
A Comprehensive Guide for Web3 Security: From Technology, Economic and Legal Aspects (Future of Business and Finance)
by Ken Huang Dyma Budorin Lisa Jy Tan Winston Ma Zhijun William ZhangWith the recent debacle of cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of comprehending the security and regulations of Web3, cryptocurrency, and blockchain projects has been magnified. To avoid similar economic and security failures in future Web3 projects, the book provides an essential guide that offers a comprehensive and systematic approach to addressing security concerns. Written by experts in tech and finance, it provides an objective, professional, and in-depth analysis of security and privacy issues associated with Web3 and blockchain projects.This book highlights the security related to foundational Web3 building blocks such as blockchain, crypto wallets, smart contracts, and token economics, and describes recommended security processes and procedures for Web3 application development such as DevSecOps, data analytics, and data authenticity via the oracle. Moreover, the book discusses the legal and regulatory aspects of Web3 and the reasons behind the failures of well-known Web3 projects. It also contains detailed case studies of web3 projects, analyses of the reasons for their failures, and some pending legal cases.This book is an excellent resource for a diverse range of readers, with particular appeal to web3 developers, architects, project owners, and cybersecurity professionals seeking to deepen their knowledge of Web3 security.
A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years (Studies in Big Data #31)
by Elio Masciari Sergio Flesca Sergio Greco Domenico SaccàThis book offers readers a comprehensive guide to the evolution of the database field from its earliest stages up to the present--and from classical relational database management systems to the current Big Data metaphor. In particular, it gathers the most significant research from the Italian database community that had relevant intersections with international projects. Big Data technology is currently dominating both the market and research. The book provides readers with a broad overview of key research efforts in modelling, querying and analysing data, which, over the last few decades, have became massive and heterogeneous areas.
A Comprehensive Guide to Enterprise Mobility
by Jithesh Sathyan Anoop N. Navin Narayan Shibu Kizhakke VallathaiAlthough enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility has resulted in a lack of books on the subject. A Comprehensive Guide to Enterprise Mobility fills this void. It supplies authoritative guidance on all aspects of enterprise mobility-from technical aspects and applications to
A Comprehensive Guide to Information Security Management and Audit
by Rajkumar Banoth Gugulothu Narsimha Aruna Kranthi GodishalaThe text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization’s assets are managed by asset management, and access control policies Presents seven case studies
The Comprehensive Guide to NFTs, Digital Artwork, and Blockchain Technology
by Marc BeckmanThe ultimate guide to the NFT revolution: How non-fungible tokens are poised to transform the digital world. Non-fungible tokens, or NFTs, are the most important digital innovation since the creation of blockchain and cryptocurrency. NFTs share the best elements of both of these, while also representing an entirely new step forward for technology. But how did NFTs arise, how will they impact art and business in the decades to come, and—perhaps most importantly—how can savvy entrepreneurs position themselves today for success in the NFT-driven world of tomorrow? This guide by industry leader and entrepreneur Marc Beckman delves into the underpinnings of NFT technology in a way that makes the subject clear and comprehensible to the layman, while drawing on Marc&’s branding experience to explore exactly how NFTs are poised to change fashion, sport, fine art, and even social justice. In this book he explores how NFTs will create entirely new asset classes and investment possibilities, such as fractional ownership in dynamic works of art. And in doing so, he also tells the story of how he personally discovered and became entranced by this powerful new tool, and where he believes NFTs will take business and branding throughout the 21st century.
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice
by Jason EdwardsLearn to enhance your organization’s cybersecurit y through the NIST Cybersecurit y Framework in this invaluable and accessible guide The National Institute of Standards and Technology (NIST) Cybersecurity Framework, produced in response to a 2014 US Presidential directive, has proven essential in standardizing approaches to cybersecurity risk and producing an efficient, adaptable toolkit for meeting cyber threats. As these threats have multiplied and escalated in recent years, this framework has evolved to meet new needs and reflect new best practices, and now has an international footprint. There has never been a greater need for cybersecurity professionals to understand this framework, its applications, and its potential. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 readers will also find: Clear, jargon-free language for both beginning and advanced readers Detailed discussion of all NIST framework components, including Govern, Identify, Protect, Detect, Respond, and Recover Hundreds of actionable recommendations for immediate implementation by cybersecurity professionals at all levels A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields.
Comprehensive Healthcare Simulation: Neurosurgery (Comprehensive Healthcare Simulation)
by Ali AlarajThis book is a practical guide for the use of simulation in neurosurgery, with chapters covering high fidelity simulation, animal models simulation, cadaveric simulation, and virtual reality simulation. Readers are introduced to the different simulation modalities and technologies and are guided on the use of simulation for a variety of learners, including medical students, residents, practicing pediatricians, and health-related professionals. Comprehensive Healthcare Simulation: Neurosurgery is written and edited by leaders in the field and includes dozens of high-quality color surgical illustrations and photographs as well as videos.This book is part of the Comprehensive Healthcare Simulation Series which provides focused volumes on the use of simulation in a single specialty or on a specific simulation topic, and emphasizing practical considerations and guidance.
Comprehensive Healthcare Simulation: Pediatrics (Comprehensive Healthcare Simulation #0)
by Vincent J. Grant Adam ChengThis is a practical guide to the use of simulation in pediatric training and evaluation, including all subspecialty areas. It covers scenario building, debriefing and feedback, and it discusses the use of simulation for different purposes: education, crisis resource management and interdisciplinary team training, competency assessment, patient safety and systems integration. Readers are introduced to the different simulation modalities and technologies and guided on the use of simulation with a variety of learners, including medical students, residents, practicing pediatricians, and health-related professionals. Separate chapters on each pediatric subspecialty provide practical advice and strategies to allow readers to integrate simulation into existing curriculum. Pediatric subspecialties covered include: General Pediatrics, Pediatric Emergency Medicine and Trauma, Neonatology, Pediatric Critical Care Medicine, Transport Medicine, Pediatric Anesthesia, and Pediatric Surgery amongst many others. Comprehensive Healthcare Simulation PEDIATRICS Edition is a volume in the series, Comprehensive Healthcare Simulation. The series is designed to complement Levine et al. , eds. , The Comprehensive Textbook of Healthcare Simulation by providing short, focused volumes on the use of simulation in a single specialty or on a specific simulation topic, and emphasizing practical considerations and guidance.
Comprehensive Healthcare Simulation: Interprofessional Team Training And Simulation (Comprehensive Healthcare Simulation)
by John T. Paige Shirley C. Sonesh Deborah D. Garbee Laura S. BonannoThis book focuses on InterProfessional (IP) Team Training and Simulation, from basic concepts to the practical application of IP in different healthcare settings. It thoroughly and comprehensively covers the role of simulation in healthcare, human factors in healthcare, challenges to conducting simulation-based IP, logistics, and applications of simulation-based IP in clinical practice. Supplemented by high-quality figures and tables, readers are introduced to the different simulation modalities and technologies employed in IP team training and are guided on the use of simulation within IP teams.Part of the authoritative Comprehensive Healthcare Simulation Series, InterProfessional Team Training and Simulation can be used in training for a variety of learners, including medical students, residents, practicing physicians, nurses, and health-related professionals.
Comprehensive Healthcare Simulation: Operations, Technology, and Innovative Practice (Comprehensive Healthcare Simulation)
by Scott B. Crawford Lance W. Baily Stormy M. MonksThis practical guide provides a focus on the implementation of healthcare simulation operations, as well as the type of professional staff required for developing effective programs in this field. Though there is no single avenue in which a person pursues the career of a healthcare simulation technology specialist (HSTS), this book outlines the extensive knowledge and variety of skills one must cultivate to be effective in this role. This book begins with an introduction to healthcare simulation, including personnel, curriculum, and physical space. Subsequent chapters address eight knowledge/skill domains core to the essential aspects of an HSTS. To conclude, best practices and innovations are provided, and the benefits of developing a collaborative relationship with industry stakeholders are discussed. Expertly written text throughout the book is supplemented with dozens of high-quality color illustrations, photographs, and tables. Written and edited by leaders in the field, Comprehensive Healthcare Simulation: Operations, Technology, and Innovative Practice is optimized for a variety of learners, including healthcare educators, simulation directors, as well as those looking to pursue a career in simulation operations as healthcare simulation technology specialists.
Comprehensive Ruby Programming
by Jordan HudgensThis book will provide you with all of the tools you need to be a professional Ruby developer. Starting with the core principles, such as syntax and best practices, and up to advanced topics like metaprogramming and big data analysis. About This Book • Provides the core skills required to become a Ruby programmer • Covers how to use the most popular Ruby Gem libraries • Includes details on regular expressions Who This Book Is For This is a complete course written from the ground up for beginners wanting to gain a solid understanding of the Ruby language. It starts at the beginning with how to install Ruby and work with it on multiple machines, so simply have a computer that's connected to the Internet and you'll be ready. What You Will Learn • Learn how to use Ruby code effectively, picking the right tool for the job and not duplicating built-in functionality • Gain best software development practices, and how to identify and fix common errors • Absorb core programming skills, such as variables, strings, loops, conditionals, and much more • Explore object-oriented programming and learn to create modular, reusable code that you can use across projects • Build 10 practical Ruby programs as you work through the book on topics such as big data analysis and solving Euler equations In Detail Ruby is a powerful, general-purpose programming language that can be applied to any task. Whether you are an experienced developer who wants to learn a new language or you are new to programming, this book is your comprehensive Ruby coding guide. Starting with the foundational principles, such as syntax, and scaling up to advanced topics such as big data analysis, this book will give you all of the tools you need to be a professional Ruby developer. A few of the key topics are: object-oriented programming, built-in Ruby methods, core programming skills, and an introduction to the Ruby on Rails and Sinatra web frameworks. You will also build 10 practical Ruby programs. Created by an experienced Ruby developer, this book has been written to ensure it focuses on the skills you will need to be a professional Ruby developer. After you have read this book, you will be ready to start building real-world Ruby projects. Style and approach This is a comprehensive course for learning the Ruby programming language that works methodically through everything that you need to know. It begins with the basics of the language and then works through some complete projects to apply your skills and ensure that you have fully absorbed them and can use them in the real world.
A Comprehensive Study of SQL: Practice and Implementation
by Jagdish Chandra PatniA Comprehensive Study of SQL - Practice and Implementation is designed as a textbook and provides a comprehensive approach to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. It demonstrates how to leverage the two most vital tools for data query and analysis – SQL and Excel – to perform comprehensive data analysis without the need for a sophisticated and expensive data mining tool or application. Features •The book provides a complete collection of modeling techniques, beginning with fundamentals and gradually progressing through increasingly complex real-world case studies. •It explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications. •It also gives a solid foundation in best practices and relational theory. •The book offers self-contained lessons on key SQL concepts or techniques at the end of each chapter using numerous illustrations and annotated examples. This book is aimed primarily at advanced undergraduates and graduates with a background in computer science and information technology. Researchers and professionals will also find this book useful.
Compressed Data Structures for Strings: On Searching and Extracting Strings from Compressed Textual Data (Atlantis Studies in Computing #4)
by Rossano VenturiniData compression is mandatory to manage massive datasets, indexing is fundamental to query them. However, their goals appear as counterposed: the former aims at minimizing data redundancies, whereas the latter augments the dataset with auxiliary information to speed up the query resolution. In this monograph we introduce solutions that overcome this dichotomy. We start by presenting the use of optimization techniques to improve the compression of classical data compression algorithms, then we move to the design of compressed data structures providing fast random access or efficient pattern matching queries on the compressed dataset. These theoretical studies are supported by experimental evidences of their impact in practical scenarios.
Compressed Sensing and Its Applications: Third International MATHEON Conference 2017 (Applied and Numerical Harmonic Analysis)
by Holger Boche Giuseppe Caire Robert Calderbank Gitta Kutyniok Rudolf Mathar Philipp PetersenThe chapters in this volume highlight the state-of-the-art of compressed sensing and are based on talks given at the third international MATHEON conference on the same topic, held from December 4-8, 2017 at the Technical University in Berlin. In addition to methods in compressed sensing, chapters provide insights into cutting edge applications of deep learning in data science, highlighting the overlapping ideas and methods that connect the fields of compressed sensing and deep learning. Specific topics covered include:Quantized compressed sensingClassificationMachine learningOracle inequalitiesNon-convex optimizationImage reconstructionStatistical learning theoryThis volume will be a valuable resource for graduate students and researchers in the areas of mathematics, computer science, and engineering, as well as other applied scientists exploring potential applications of compressed sensing.
Compressed Sensing for Distributed Systems (SpringerBriefs in Electrical and Computer Engineering)
by Giulio Coluccia Chiara Ravazzi Enrico MagliThis book presents a survey of the state-of-the art in the exciting and timely topic of compressed sensing for distributed systems. It has to be noted that, while compressed sensing has been studied for some time now, its distributed applications are relatively new. Remarkably, such applications are ideally suited to exploit all the benefits that compressed sensing can provide. The objective of this book is to provide the reader with a comprehensive survey of this topic, from the basic concepts to different classes of centralized and distributed reconstruction algorithms, as well as a comparison of these techniques. This book collects different contributions on these aspects. It presents the underlying theory in a complete and unified way for the first time, presenting various signal models and their use cases. It contains a theoretical part collecting latest results in rate-distortion analysis of distributed compressed sensing, as well as practical implementations of algorithms obtaining performance close to the theoretical bounds. It presents and discusses various distributed reconstruction algorithms, summarizing the theoretical reconstruction guarantees and providing a comparative analysis of their performance and complexity. In summary, this book will allow the reader to get started in the field of distributed compressed sensing from theory to practice. We believe that this book can find a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in mathematical optimization, network systems, graph theoretical methods, linear systems, stochastic systems, and randomized algorithms. To help the reader become familiar with the theory and algorithms presented, accompanying software is made available on the authors' web site, implementing several of the algorithms described in the book. The only background required of the reader is a good knowledge of advanced calculus and linear algebra.
Compressed Sensing for Privacy-Preserving Data Processing (SpringerBriefs in Electrical and Computer Engineering)
by Matteo Testa Diego Valsesia Tiziano Bianchi Enrico MagliThe objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy or computational efficiency. The reader is guided in exploring the topic by first establishing a shared knowledge about compressed sensing and how it is used nowadays. Then, clear models and definitions for its use as a cryptosystem and a privacy-preserving embedding are laid down, before tackling state-of-the-art results for both applications. The reader will conclude the book having learned that the current results in terms of security of compressed techniques allow it to be a very promising solution to many practical problems of interest. The book caters to a broad audience among researchers, scientists, or engineers with very diverse backgrounds, having interests in security, cryptography and privacy in information retrieval systems. Accompanying software is made available on the authors’ website to reproduce the experiments and techniques presented in the book. The only background required to the reader is a good knowledge of linear algebra, probability and information theory.
Compressed Sensing with Side Information on the Feasible Region (SpringerBriefs in Electrical and Computer Engineering)
by Mohammad RostamiThis book discusses compressive sensing in the presence of side information. Compressive sensing is an emerging technique for efficiently acquiring and reconstructing a signal. Interesting instances of Compressive Sensing (CS) can occur when, apart from sparsity, side information is available about the source signals. The side information can be about the source structure, distribution, etc. Such cases can be viewed as extensions of the classical CS. In these cases we are interested in incorporating the side information to either improve the quality of the source reconstruction or decrease the number of samples required for accurate reconstruction. In this book we assume availability of side information about the feasible region. The main applications investigated are image deblurring for optical imaging, 3D surface reconstruction, and reconstructing spatiotemporally correlated sources. The author shows that the side information can be used to improve the quality of the reconstruction compared to the classic compressive sensing. The book will be of interest to all researchers working on compressive sensing, inverse problems, and image processing.
Compressed Video Over Networks (Signal Processing and Communications)
by null Ming-Ting SunThis volume details the essential elements for designing optimal end-to-end systems. It progresses from the fundamentals of both video compression and networking technologies to an extensive summary of the constant and continuous interaction between the fields. The work seeks to respond to the proliferation of networked digital video applications in daily life with in-depth analyses of technical problems and solutions.
Compression Schemes for Mining Large Datasets: A Machine Learning Perspective (Advances in Computer Vision and Pattern Recognition)
by T. Ravindra Babu M. Narasimha Murty S. V. SubrahmanyaThis book addresses the challenges of data abstraction generation using a least number of database scans, compressing data through novel lossy and non-lossy schemes, and carrying out clustering and classification directly in the compressed domain. Schemes are presented which are shown to be efficient both in terms of space and time, while simultaneously providing the same or better classification accuracy. Features: describes a non-lossy compression scheme based on run-length encoding of patterns with binary valued features; proposes a lossy compression scheme that recognizes a pattern as a sequence of features and identifying subsequences; examines whether the identification of prototypes and features can be achieved simultaneously through lossy compression and efficient clustering; discusses ways to make use of domain knowledge in generating abstraction; reviews optimal prototype selection using genetic algorithms; suggests possible ways of dealing with big data problems using multiagent systems.
Compressive Sensing for Wireless Networks
by Zhu Han Husheng Li Wotao YinCompressive sensing is a new signal processing paradigm that aims to encode sparse signals by using far lower sampling rates than those in the traditional Nyquist approach. It helps acquire, store, fuse and process large data sets efficiently and accurately. This method, which links data acquisition, compression, dimensionality reduction and optimization, has attracted significant attention from researchers and engineers in various areas. This comprehensive reference develops a unified view on how to incorporate efficiently the idea of compressive sensing over assorted wireless network scenarios, interweaving concepts from signal processing, optimization, information theory, communications and networking to address the issues in question from an engineering perspective. It enables students, researchers and communications engineers to develop a working knowledge of compressive sensing, including background on the basics of compressive sensing theory, an understanding of its benefits and limitations, and the skills needed to take advantage of compressive sensing in wireless networks.
CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram
by David L. ProwseCompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) Exam Cram is an all-inclusive study guide designed to help you pass the updated versions of the CompTIA A+ exams. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes, Exam Alerts, and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice test software provides real-time assessment and feedback with four complete exams. <p><p> Covers the critical information needed to score higher on your CompTIA A+ Core 1 (220-1101) and Core 2 (220-1102) exams! <p>* Install, configure, and troubleshoot PC hardware including CPUs, RAM, video cards, network cards, storage drives, and peripherals <p>* Work effectively with mobile devices: laptops, tablets, and smartphones <p><p>* Configure Windows settings, components, and administrative tools <p>* Manage and troubleshoot Linux, macOS, Android, and iOS <p>* Administer and support basic IT infrastructure including IP networking, IoT devices, virtualization, cloud-based systems, and backup systems <p>* Understand security features such as firewalls, multifactor authentication, permissions, and access control * Defend against malware, network threats, and social engineering <p>* Learn the basics of IT documentation, change management, and incident response <p><p> Prepare for your exam with Pearson Test Prep <p><p>* Realistic practice questions and answers <p>* Comprehensive reporting and feedback <p>* Customized testing in study, practice exam, or flash card modes <p>* Complete coverage of A+ Core 1 (220-1101) and Core 2 (220-1102) exam objectives
CompTIA® A+® Rapid Review (Exam 220-801 and Exam 220-802)
by Darril GibsonAssess your readiness for CompTIA A+ Exams 220-801 and 220-802--and quickly identify where you need to focus and practice. This practical, streamlined guide walks you through each exam objective, providing "need to know" checklists, review questions, tips, and links to further study--all designed to help bolster your preparation. Reinforce your exam prep with a Rapid Review of these objectives: Exam 220-801: PC Hardware Networking Laptops Printers Operational Procedures Exam 220-802: Operating Systems Security Mobile Devices Troubleshooting This book is an ideal complement to the in-depth training of the Microsoft Press Training Kit and other exam-prep resources for CompTIA A+ Exams 220-801 and 220-802.
Comptia A+ Certification: All-in-One Exam Guide (7th Edition)
by Michael MeyersGet complete coverage of the latest release of the CompTIA A+ exams inside this fully revised and updated resource. Written by the leading authority on CompTIA A+ certification and training, this expert guide covers CompTIA A+ exams 220-701 and 220-702. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, in-depth explanations, and more than 1,000 photographs and illustrations. Designed to help you pass the CompTIA A+ exams with ease, this definitive volume also serves as an essential on-the-job IT reference. Covers all exam objectives, including how to: Work with CPUs, RAM, motherboards, power supplies, and other PC components Install, partition, and format hard drives Install, upgrade, and troubleshoot Windows 2000, Windows XP, and Windows Vista Troubleshoot PCs and implement security measures Install video and multimedia cards Work with portable PCs, PDAs, smartphones, and wireless technologies Manage printers and connect to networks and the Internet Understand safety and environmental issues Establish good communication skills and adhere to privacy policies The CD-ROM features: Practice exams for 701 & 702 600+ chapter review questions New video introduction to CompTIA A+ One-hour video training segment Mike's favorite PC tools and utilities Searchable e-book Mike Meyers, CompTIA A+, CompTIA Network+, MCP, is the industry's leading authority on CompTIA A+ certification and training. He is the president and founder of Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations throughout the world, and a member of CompTIA.