Browse Results

Showing 82,151 through 82,175 of 83,151 results

The Real MCTS/MCITP Exam 70-649 Prep Kit: Independent and Complete Self-Paced Solutions

by Brien Posey

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSE skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640, 70-642, and 70-643.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.* THE independent source of exam day tips, techniques, and warnings not available from Microsoft* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives * Interactive FastTrack e-learning modules help simplify difficult exam topics* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives* Free download of audio FastTracks for use with iPods or other MP3 players* 1000 page "DRILL DOWN" reference for comprehensive topic review

Database Design: Know It All

by Graeme Simsion Patrick O'Neil Markus Schneider Tony Morgan Ralf Hartmut Güting Terry Halpin Jan L. Harrington Lowell Fryman W.H. Inmon Toby J. Teorey Sam S. Lightstone Graham Witt Jim Melton Stephen Buxton Thomas P. Nadeau Bonnie O'Neil Elizabeth O'Neil

This book brings all of the elements of database design together in a single volume, saving the reader the time and expense of making multiple purchases. It consolidates both introductory and advanced topics, thereby covering the gamut of database design methodology ? from ER and UML techniques, to conceptual data modeling and table transformation, to storing XML and querying moving objects databases. The proposed book expertly combines the finest database design material from the Morgan Kaufmann portfolio. Individual chapters are derived from a select group of MK books authored by the best and brightest in the field. These chapters are combined into one comprehensive volume in a way that allows it to be used as a reference work for those interested in new and developing aspects of database design. This book represents a quick and efficient way to unite valuable content from leading database design experts, thereby creating a definitive, one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.Chapters contributed by various recognized experts in the field let the reader remain up to date and fully informed from multiple viewpoints.Details multiple relational models and modeling languages, enhancing the reader’s technical expertise and familiarity with design-related requirements specification. Coverage of both theory and practice brings all of the elements of database design together in a single volume, saving the reader the time and expense of making multiple purchases.

Data Mining: Know It All

by Eibe Frank Jiawei Han Markus Schneider Richard E. Neapolitan Xia Jiang Ralf Hartmut Güting Ian H. Witten Toby J. Teorey Sam S. Lightstone Soumen Chakrabarti Dorian Pyle Thomas P. Nadeau Earl Cox Micheline Kamber Mamdouh Refaat

This book brings all of the elements of data mining together in a single volume, saving the reader the time and expense of making multiple purchases. It consolidates both introductory and advanced topics, thereby covering the gamut of data mining and machine learning tactics ? from data integration and pre-processing, to fundamental algorithms, to optimization techniques and web mining methodology. The proposed book expertly combines the finest data mining material from the Morgan Kaufmann portfolio. Individual chapters are derived from a select group of MK books authored by the best and brightest in the field. These chapters are combined into one comprehensive volume in a way that allows it to be used as a reference work for those interested in new and developing aspects of data mining. This book represents a quick and efficient way to unite valuable content from leading data mining experts, thereby creating a definitive, one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.Chapters contributed by various recognized experts in the field let the reader remain up to date and fully informed from multiple viewpoints.Presents multiple methods of analysis and algorithmic problem-solving techniques, enhancing the reader’s technical expertise and ability to implement practical solutions. Coverage of both theory and practice brings all of the elements of data mining together in a single volume, saving the reader the time and expense of making multiple purchases.

Comprehension of Graphics (ISSN #Volume 108)

by W. Schnotz R. W. Kulhavy

Graphic displays such as charts, graphs, diagrams, and maps play in important role today in the design and presentation of instructional materials education. There is also a strong need in scientific, technical and administrative fields to visually present facts, laws, principles etc. The increasing use of computer-based learning environments has also become an important field where the visual presentation of information plays a central role. Despite the importance of graphical displays as a means of communication and the fact that research about learning and cognition has advanced rapidly in the past two decades, the comprehension of graphics is still a rather unexplored area.The comprehension of graphics is not only a stimulating topic in the fields of science and instructional psychology, but also in related disciplines such as semiotics, and artificial intelligence. Research on the comprehension of graphics complements the scientific investigation of cognitive processes in text comprehension, which has contributed much to our understanding of human cognition and learning. Ultimately, a better understanding of the cognitive processes involved in the comprehension of graphics will have an impact not only on cognitive theory, but also on educational practice.

Human Factors Psychology (ISSN #Volume 47)

by P. A. Hancock

This book is a collection of contemporary applications of psychological insights into practical human factors issues. The topics are arranged largely according to an information processing/energetic approach to human behavior. Consideration is also given to human-computer interaction and organizational design.

Attachment in Social Networks: Contributions to the Bowlby-Ainsworth Attachment Theory (ISSN #Volume 44)

by L W C Tavecchio M. H. Van IJzendoorn

The main objective of the research presented in this book is to broaden the scope of attachment theory by stressing the importance of a social network approach to the study of attachment.This approach forms the integrating theme of this volume, as is testified by various studies of attachment as it develops in an "extended" rearing context over and beyond the limits of the traditional mother-child dyad. In this connection attention is paid to the importance of sibling relationships, attachment relationships with professional caregivers, the role of the father in caring and rearing young children, and the (short-term and long-term) effects on attachment quality of maternal employment in infancy. Also, the cross-cultural validity of Ainsworth's Strange Situation is discussed, with reference to the USA, Sweden, Israel, Japan, The Netherlands, etc. In adopting a social network approach, the attachment theory proves to be a particularly useful instrument for reflecting on the consequence of social change (maternal employment, symmetrical families, socialisation of childrearing) for child development.

Parallel Computer Architecture: A Hardware/Software Approach (ISSN)

by David Culler Jaswinder Pal Singh Anoop Gupta

The most exciting development in parallel computer architecture is the convergence of traditionally disparate approaches on a common machine structure. This book explains the forces behind this convergence of shared-memory, message-passing, data parallel, and data-driven computing architectures. It then examines the design issues that are critical to all parallel architecture across the full range of modern design, covering data access, communication performance, coordination of cooperative work, and correct implementation of useful semantics. It not only describes the hardware and software techniques for addressing each of these issues but also explores how these techniques interact in the same system. Examining architecture from an application-driven perspective, it provides comprehensive discussions of parallel programming for high performance and of workload-driven evaluation, based on understanding hardware-software interactions.synthesizes a decade of research and development for practicing engineers, graduate students, and researchers in parallel computer architecture, system software, and applications developmentpresents in-depth application case studies from computer graphics, computational science and engineering, and data mining to demonstrate sound quantitative evaluation of design trade-offsdescribes the process of programming for performance, including both the architecture-independent and architecture-dependent aspects, with examples and case-studiesillustrates bus-based and network-based parallel systems with case studies of more than a dozen important commercial designs

Paradigms of Artificial Intelligence Programming: Case Studies in Common Lisp

by Peter Norvig

Paradigms of AI Programming is the first text to teach advanced Common Lisp techniques in the context of building major AI systems. By reconstructing authentic, complex AI programs using state-of-the-art Common Lisp, the book teaches students and professionals how to build and debug robust practical programs, while demonstrating superior programming style and important AI concepts. The author strongly emphasizes the practical performance issues involved in writing real working programs of significant size. Chapters on troubleshooting and efficiency are included, along with a discussion of the fundamentals of object-oriented programming and a description of the main CLOS functions. This volume is an excellent text for a course on AI programming, a useful supplement for general AI courses and an indispensable reference for the professional programmer.

The Real MCTS/MCITP Exam 70-643 Prep Kit: Independent and Complete Self-Paced Solutions

by Brien Posey Colin Bowern Jeffery A. Martin John Karnay Arno Theron Mohan Krishnamurthy

This exam is designed to validate Windows Server 2008 applications platform configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understant connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet. Addresses both newcomers to MS certification, and those who are upgrading from Windows 2003Two full-function ExamDay practice exams guarantee double coverage of all exam objectivesFree download of audio FastTracks for use with iPods or other MP3 playersTHE independent source of exam-day tips, techniques, and warnings not available from MicrosoftComprehensive study guide guarantees 100% coverage of all Microsoft's exam objectivesInteractive FastTrack e-learning modules help simplify difficult exam topics

The Real MCTS/MCITP Exam 70-642 Prep Kit: Independent and Complete Self-Paced Solutions

by Brien Posey

This exam is designed to validate Windows Server 2008 network infrastructure configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-642. This is a test for new certification seekers, not for those who are upgrading from Windows 2000/2003 MCSE/MCSA certification.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understand connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.* Study resource for those taking MCTS/MCITP exam 70-642, which is for NEW certification seekers, not for upgraders.* Two full-function ExamDay practice exams guarantee double coverage of all exam objectives* Free download of audio FastTracks for use with iPods or other MP3 players* THE independent source of exam-day tips, techniques, and warnings not available from Microsoft* Comprehensive study guide guarantees 100% coverage of all Microsoft's exam objectives * Interactive FastTrack e-learning modules help simplify difficult exam topics

The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions

by Anthony Piltzecker

This exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or more users; three or more physical locations; and three or more domain controllers. MCTS candidates will manage network services and resources such as messaging, a database, file and print, a proxy server, a firewall, the Internet, an intranet, remote access, and client computer management. In addition MCTS candidates must understand connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet.Designed to help newcomers to Microsoft certification study for and pass MCTS exam for Active Directory on their way to MCITP certificationTHE independent source of exam day tips, techniques, and warnings not available from MicrosoftComprehensive study guide guarantees 100% coverage of all Microsoft's exam objectivesInteractive FastTrack e-learning modules help simplify difficult exam topicsTwo full-function ExamDay practice exams guarantee double coverage of all exam objectives1000 page "DRILL DOWN" reference for comprehensive topic review

SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices

by Joey Hirao

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP implementation and security, despite a great deal of interest. (There are 220,000 members in an on-line SAP 'community' seeking information, ideas and tools on the IT Toolbox Website alone.) Managing SAP user authentication and authorizations is becoming more complex than ever, as there are more and more SAP products involved that have very different access issues. It's a complex area that requires focused expertise.This book is designed for these network and systems administrator who deal with the complexity of having to make judgmental decisions regarding enormously complicated and technical data in the SAP landscape, as well as pay attention to new compliance rules and security regulations.Most SAP users experience significant challenges when trying to manage and mitigate the risks in existing or new security solutions and usually end up facing repetitive, expensive re-work and perpetuated compliance challenges. This book is designed to help them properly and efficiently manage these challenges on an ongoing basis. It aims to remove the 'Black Box' mystique that surrounds SAP security.* The most comprehensive coverage of the essentials of SAP security currently available: risk and control management, identity and access management, data protection and privacy, corporate governance, legal and regulatory compliance.* This book contains information about SAP security that is not available anywhere else to help the reader avoid the "gotchas" that may leave them vulnerable during times of upgrade or other system changes *Companion Web site provides custom SAP scripts, which readers can download to install, configure and troubleshoot SAP.

Next Generation SSH2 Implementation: Securing Data in Motion

by Dale Liu

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into a security environment. It covers the newest features and applications of SSH-2 (which received Proposed Standard status from the IETF in 2006). SSH2 is more secure than previous versions and has many expanded uses on a wider variety of computing platforms. Another particular note driving new SSH2 adoption are the requirements of recent legislation (PCI/HIPAA/SOX/FISMA). SSH 2 has become an even more valuable tool, as it provides communications security compliance with the latest standards.This book offers the most up-to-date information on SSH2 in a practical, hands-on, tutorial-style reference that goes well beyond UNIX implementation. It concentrates on the latest version of SSH 2 with all new information.* Discover why SSH2 offers more robust security than SSH1 and how to incorporate it into your network administration software toolbox.

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure

by Greg Miles Jack Wiles Sean Lowther Ted Claypoole Phil Drake Paul A. Henry Lester J. Johnson Jr. Marc Weber Tobias James H. Windle

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more* Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field

Securing Citrix XenApp Server in the Enterprise

by Tariq Azad

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server. All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp", said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.* The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server.* Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers.* Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.

Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization

by Aaron Tiensivu

Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including: 1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.3. Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.4. Protection against malicious software with User Account Control with a new authentication architecture.5. Increased control over your user settings with Expanded Group Policy....to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.* Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system. * Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.* Describes Windows Server 2008?s security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller* Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008* Covers Microsoft's Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product

Programming Lego Mindstorms NXT

by Owen Bishop

Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques using NXT-G and Microsoft VPL. For hobbyists, and students working on robot projects, Bishop provides the background and tools to program your robot for tasks that go beyond the simple routines provided with the robot kit. The programs range in complexity from simple contact avoidance and path following, to programs generating some degree of artificial intelligence * a how-to guide for programming your robot, using NXT-G and Microsoft VPL* ten robot-specific projects show how to extend your robot's capabilities beyond the manufacturer's provided software. Examples of projects include:Maze solver,Robot House Builder,Search (obstacle avoidance),Song and Dance Act* flowcharts and data flow diagrams are used to illustrate how to develop programs* introduces basic programming structures

Understanding Forensic Digital Imaging

by Herbert L. Blitzer Karen Stein-Ferguson Jeffrey Huang

Understanding Forensic Digital Imaging offers the principles of forensic digital imaging and photography in a manner that is straightforward and easy to digest for the professional and student. It provides information on how to photograph any setting that may have forensic value, details how to follow practices that are acceptable in court, and recommends what variety of hardware and software are most valuable to a practitioner. In addition to chapters on basic topics such as light and lenses, resolution, and file formats, the book contains forensic-science-specific information on SWGIT and the use of photography in investigations and in court. Of particular note is Chapter 17, Establishing Quality Requirements, which offers information on how to create a good digital image, and is more comprehensive than any other source currently available.Covers topics that are of vital importance to the practicing professionalServes as an up-to-date reference in the rapidly evolving world of digital imagingUses clear and concise language so that any reader can understand the technology and science behind digital imaging

Information Flow and Knowledge Sharing (ISSN #Volume 2)

by Flavio Soares Correa da Silva Jaume Agusti-Cullell

Except from the ForewordThe stated aim of the book series "Capturing Intelligence" is to publish books on research from all disciplines dealing with and affecting the issue of understanding and reproducing intelligence artificial systems. Of course, much of the work done in the past decades in this area has been of a highly technical nature, varying from hardware design for robots, software design for intelligent agents, and formal logic for reasoning.It is therefore very refreshing to see Information Flow and Knowledge Sharing. This is a courageous book indeed. It is not afraid to tackle the Big Issues: notions such as information, knowledge, information system, information flow, collaborative problem solving, and ontological reasoning. All of these notions are crucial to our understanding of intelligence and our building of intelligent artificial systems, but all too often, these Big Issues are hidden behind the curtains while the technical topics take center stage. AI has a rich history of philosophical books that have chosen a non-standard structure and narrative. It is nice to see that the authors have succeeded into combining a non-standard approach to deep questions with a non-standard format, resulting in a highly interesting volume.Frank van Harmelen, Series EditorExcerpt from the IntroductionOur interest is to promote, through a better and deeper understanding of the notions of information and knowledge, a better and deeper critical understanding of information technology as situated in the full range of human activities, assuming as a principle that this range of activities cannot be properly appreciated when it is reduced to the simplified means-end schema proposed by Technology. We invite the reader to build his/her own points of view about these notions, considering our propositions as a starting point for a critical analysis and discussion of these points. With that, we believe we are contributing to a better understanding of the impact of technology – and particularly of Information Technology – in everyday life. Flavio Soares Correa da Silva, Jaume Agusti-Cullell*Bridges the gap between the technological and philosophical aspects of information technology*Analyzes essential notions of IT such as information, knowledge, information system, information flow, collaborative problem solving, and ontological reasoning

Embedded DSP Processor Design: Application Specific Instruction Set Processors (ISSN #Volume 2)

by Dake Liu

This book provides design methods for Digital Signal Processors and Application Specific Instruction set Processors, based on the author's extensive, industrial design experience. Top-down and bottom-up design methodologies are presented, providing valuable guidance for both students and practicing design engineers. Coverage includes design of internal-external data types, application specific instruction sets, micro architectures, including designs for datapath and control path, as well as memory sub systems. Integration and verification of a DSP-ASIP processor are discussed and reinforced with extensive examples.Instruction set design for application specific processors based on fast application profilingMicro architecture design methodologyMicro architecture design details based on real examples Extendable architecture design protocolsDesign for efficient memory sub systems (minimizing on chip memory and cost)Real example designs based on extensive, industrial experiences

The Art of Multiprocessor Programming

by Maurice Herlihy Nir Shavit

The Art of Multiprocessor Programming promises to be the first comprehensive presentation of the principles and tools available for programming multiprocessor machines. As the computer industry changes from single-processor to multiprocessor architectures, this revolution requires a fundamental change in how programs are written. To leverage the performance and power of multiprocessor programming, also known as multicore programming, programmers need to learn the new principles, algorithms, and tools. The book will be of immediate use to programmers working with the new architectures. For example, the next generation of computer game consoles will all be multiprocessor-based, and the game industry is currently struggling to understand how to address the programming challenges presented by these machines. This change in the industry is so fundamental that it is certain to require a significant response by universities, and courses on multicore programming will become a staple of computer science curriculums. This book includes fully-developed Java examples detailing data structures, synchronization techniques, transactional memory, and more. Students in multiprocessor and multicore programming courses and engineers working with multiprocessor and multicore systems will find this book quite useful. The book on multicore programming, the new paradigm of computer scienceWritten by the world's most revered experts in multiprocessor programming and performanceIncludes examples, models, exercises, PowerPoint slides, and sample Java programs

Introduction to Security

by Robert Fischer Edward Halibozek

Introduction to Security has been the leading introduction to private security for over 30 years, celebrated for its balanced and professional approach to this increasingly important area. Now the 8th edition expands the key topics and adds material important in the 21st century environment. The author team brings together top-level professional experience in industry with years of teaching experience. As a recommended title for security certifications, it is a crucial resource for the 30,000+ ASIS International members, and is also used as a core security textbook in universities throughout the country. This is Butterworth-Heinemann's best-selling security text of all time, an essential reference for all security professionals.Significantly expanded chapters on computer issues, cargo, homeland security and terrorismNew chapter on Internal Issues and Controls covering crucial information on internal theft, personnel policies, and drugs and violence in the workplaceMore illustrations and photos to make learning easier

The Designer's Guide to VHDL: Analog, Mixed-signal, And Mixed-technology Modeling (ISSN #Volume 3)

by Peter J. Ashenden

VHDL, the IEEE standard hardware description language for describing digital electronic systems, has recently been revised. The Designer's Guide to VHDL has become a standard in the industry for learning the features of VHDL and using it to verify hardware designs. This third edition is the first comprehensive book on the market to address the new features of VHDL-2008.First comprehensive book on VHDL to incorporate all new features of VHDL-2008, the latest release of the VHDL standardHelps readers get up to speed quickly with new features of the new standardPresents a structured guide to the modeling facilities offered by VHDLShows how VHDL functions to help design digital systemsIncludes extensive case studies and source code used to develop testbenches and case study examplesHelps readers gain maximum facility with VHDL for design of digital systems

TCP/IP Sockets in Java: Practical Guide for Programmers (The Practical Guides)

by Kenneth L. Calvert Michael J. Donahoo

The networking capabilities of the Java platform have been extended considerably since the first edition of the book. This new edition covers version 1.5-1.7, the most current iterations, as well as making the following improvements:The API (application programming interface) reference sections in each chapter, which describe the relevant parts of each class, have been replaced with (i) a summary section that lists the classes and methods used in the code, and (ii) a "gotchas" section that mentions nonobvious or poorly-documented aspects of the objects. In addition, the book covers several new classes and capabilities introduced in the last few revisions of the Java platform. New abstractions to be covered include NetworkInterface, InterfaceAddress, Inet4/6Address, SocketAddress/InetSocketAddress, Executor, and others; extended access to low-level network information; support for IPv6; more complete access to socket options; and scalable I/O. The example code is also modified to take advantage of new language features such as annotations, enumerations, as well as generics and implicit iterators where appropriate.Most Internet applications use sockets to implement network communication protocols. This book's focused, tutorial-based approach helps the reader master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Chapter 1 provides a general overview of networking concepts to allow readers to synchronize the concepts with terminology. Chapter 2 introduces the mechanics of simple clients and servers. Chapter 3 covers basic message construction and parsing. Chapter 4 then deals with techniques used to build more robust clients and servers. Chapter 5 (NEW) introduces the scalable interface facilities which were introduced in Java 1.5, including the buffer and channel abstractions. Chapter 6 discusses the relationship between the programming constructs and the underlying protocol implementations in more detail. Programming concepts are introduced through simple program examples accompanied by line-by-line code commentary that describes the purpose of every part of the program. No other resource presents so concisely or so effectively the material necessary to get up and running with Java sockets programming.Focused, tutorial-based instruction in key sockets programming techniques allows reader to quickly come up to speed on Java applications.Concise and up-to-date coverage of the most recent platform (1.7) for Java applications in networking technology.

Information Modeling and Relational Databases (The Morgan Kaufmann Series in Data Management Systems)

by Tony Morgan Terry Halpin

Information Modeling and Relational Databases, Second Edition, provides an introduction to ORM (Object-Role Modeling)and much more. In fact, it is the only book to go beyond introductory coverage and provide all of the in-depth instruction you need to transform knowledge from domain experts into a sound database design. This book is intended for anyone with a stake in the accuracy and efficacy of databases: systems analysts, information modelers, database designers and administrators, and programmers. Terry Halpin, a pioneer in the development of ORM, blends conceptual information with practical instruction that will let you begin using ORM effectively as soon as possible. Supported by examples, exercises, and useful background information, his step-by-step approach teaches you to develop a natural-language-based ORM model, and then, where needed, abstract ER and UML models from it. This book will quickly make you proficient in the modeling technique that is proving vital to the development of accurate and efficient databases that best meet real business objectives.Presents the most indepth coverage of Object-Role Modeling available anywhere, including a thorough update of the book for ORM2, as well as UML2 and E-R (Entity-Relationship) modelingIncludes clear coverage of relational database concepts, and the latest developments in SQL and XML, including a new chapter on the impact of XML on information modeling, exchange and transformationNew and improved case studies and exercises are provided for many topics

Refine Search

Showing 82,151 through 82,175 of 83,151 results