Browse Results

Showing 82,926 through 82,950 of 83,224 results

Digital Evidence and Computer Crime

by Eoghan Casey

Digital Evidence and Computer Crime, Second Edition, is a hands-on resource that aims to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This textbook explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. In addition to gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, students will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive unlimited access to the author's accompanying website, which contains simulated cases that integrate many of the topics covered in the text. This text is required reading for anyone involved in computer investigations or computer administration, including computer forensic consultants, law enforcement, computer security professionals, government agencies (IRS, FBI, CIA, Dept. of Justice), fraud examiners, system administrators, and lawyers.Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidenceOffers readers information about relevant legal issuesFeatures coverage of the abuse of computer networks and privacy and security issues on computer networks

Computational Finance: Numerical Methods for Pricing Financial Instruments (Quantitative Finance)

by George Levy

Computational Finance presents a modern computational approach to mathematical finance within the Windows environment, and contains financial algorithms, mathematical proofs and computer code in C/C++. The author illustrates how numeric components can be developed which allow financial routines to be easily called by the complete range of Windows applications, such as Excel, Borland Delphi, Visual Basic and Visual C++.These components permit software developers to call mathematical finance functions more easily than in corresponding packages. Although these packages may offer the advantage of interactive interfaces, it is not easy or computationally efficient to call them programmatically as a component of a larger system. The components are therefore well suited to software developers who want to include finance routines into a new application.Typical readers are expected to have a knowledge of calculus, differential equations, statistics, Microsoft Excel, Visual Basic, C++ and HTML. Enables reader to incorporate advanced financial modelling techniques in Windows compatible software Aids the development of bespoke software solutions covering GARCH volatility modelling, derivative pricing with Partial Differential Equations, VAR, bond and stock options

Groovy Programming: An Introduction for Java Developers

by John Savage Kenneth Barclay

Groovy Programming is an introduction to the Java-based scripting language Groovy. Groovy has much in common with popular scripting languages such as Perl, Python, and Ruby, but is written in a Java-like syntax. And, unlike these other languages, Groovy is sanctioned by the Java community for use on the Java platform. Since it is based on Java, applications written in Groovy can make full use of the Java Application Programmer Interfaces (APIs). This means Groovy can integrate seamlessly with applications written in Java, while avoiding the complexities of the full Java language. This bare-bones structure also means Groovy can be used as an introduction to Java and to programming in general. Its simpler constructions and modern origins make it ideal as a first language and for introducing principles such as object-oriented programming.This book introduces all the major aspects of Groovy development and emphasizes Groovy's potential as a learning tool. Case studies and exercises are included, along with numerous programming examples. The book begins assuming only a general familiarity with Java programming, and progresses to discuss advanced topics such as GUI builders, Groovlets, Unit Testing, and Groovy SQL.The first comprehensive book on Groovy programming that shows how writing applications and scripts for the Java platform is fast and easyWritten by leading software engineers and acclaimed computing instructorsOffers numerous programming examples, code samples, detailed case studies, exercises for self-study, and a companion website with a Windows-based Groovy editor

Integrated Security Systems Design: Concepts, Specifications, and Implementation

by Thomas L. Norman

Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency. An integrated security system is a system that has been incorporated into other programs (such as Access Control, Private Branch Exchanges, Human Relations, Security Video, and Intercommunications) to perform tasks in a manner consistent with corporate or agency policies and procedures. This book explains how to accomplish such integration, thereby saving a company both time and money.Integrated Security Systems Design is arranged to go from the strategic to the technical to the tactical. The strategic section covers the why of design, the technical section explains how it’s done, and the tactical section provides the cultural knowledge that leads to project success. Norman also offers guidance in avoiding pitfalls out of which legal action have arisen. Many of the subjects covered, such as how to make a security system invisible on an Information Technology System network, include material not available in any other book.* Centralize monitoring of security, of business processes and of adherence to policy* Learn the what-not-to-do's of security design from an experienced practitioner* Maximize your organization's safety while reducing liability and operating costs

Database Modeling and Design: Logical Design (The Morgan Kaufmann Series in Data Management Systems)

by Toby J. Teorey Sam S. Lightstone Tom Nadeau H.V. Jagadish

Database Modeling and Design, Fourth Edition, the extensively revised edition of the classic logical database design reference, explains how you can model and design your database application in consideration of new technology or new business needs. It is an ideal text for a stand-alone data management course focused on logical database design, or a supplement to an introductory text for introductory database management. This book features clear explanations, lots of terrific examples and an illustrative case, and practical advice, with design rules that are applicable to any SQL-based system. The common examples are based on real-life experiences and have been thoroughly class-tested. The text takes a detailed look at the Unified Modeling Language (UML-2) as well as the entity-relationship (ER) approach for data requirements specification and conceptual modeling - complemented with examples for both approaches. It also discusses the use of data modeling concepts in logical database design; the transformation of the conceptual model to the relational model and to SQL syntax; the fundamentals of database normalization through the fifth normal form; and the major issues in business intelligence such as data warehousing, OLAP for decision support systems, and data mining. There are examples for how to use the most popular CASE tools to handle complex data modeling problems, along with exercises that test understanding of all material, plus solutions for many exercises. Lecture notes and a solutions manual are also available. This edition will appeal to professional data modelers and database design professionals, including database application designers, and database administrators (DBAs); new/novice data management professionals, such as those working on object oriented database design; and students in second courses in database focusing on design.+ a detailed look at the Unified Modeling Language (UML-2) as well as the entity-relationship (ER) approach for data requirements specification and conceptual modeling--with examples throughout the book in both approaches! + the details and examples of how to use data modeling concepts in logical database design, and the transformation of the conceptual model to the relational model and to SQL syntax; + the fundamentals of database normalization through the fifth normal form;+ practical coverage of the major issues in business intelligence--data warehousing, OLAP for decision support systems, and data mining; + examples for how to use the most popular CASE tools to handle complex data modeling problems. + Exercises that test understanding of all material, plus solutions for many exercises.

Grid Computing: The Savvy Manager's Guide (The Savvy Manager's Guides)

by Pawel Plaszczak Richard Wellner, Jr. Jr.

A decade ago, the corporate world viewed grid computing as a curiosity. Today, it views it as an opportunity--a chance to reduce costs, improve performance, fund new projects, and take advantage of under-utilized capacity. The engineering behind this transformation has been amply documented. Until now, however, little has been written to prepare managers, executives, and other decision-makers to implement grid computing in a sensible and effective way.Grid Computing: The Savvy Manager's Guide examines the technology from a rigorous business perspective, equipping you with the practical knowledge you need to assess your options and determine what grid computing approach is right for your enterprise. This book is heavy on real-world experience, distilling from a rich assortment of case studies the best practices currently at work in a variety of industries. Always attentive to grid computing’s many competitive advantages, it is also realistic about the challenges of selling the idea to staff and making it a part of your company’s culture.Sketches the history of grid computing, showing how it made the leap from academia to business.Examines the criteria you'll need to meet to make your network "grid-enabled."Explains how a grid-based solution can be made to meet key organizational requirements, including security, scheduling, data storage, and fault-tolerance.Surveys the approaches currently available and helps you choose the one that will best meet your needs, both now and in the future.Focuses heavily on the competitive advantages you can reap from grid computing, and provides advice on convincing your organization to adopt grid computing and making a successful transition.

Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)

by Ralf Hartmut Güting Markus Schneider

Moving Objects Databases is the first uniform treatment of moving objects databases, the technology that supports GPS and RFID. It focuses on the modeling and design of data from moving objects — such as people, animals, vehicles, hurricanes, forest fires, oil spills, armies, or other objects — as well as the storage, retrieval, and querying of that very voluminous data. It includes homework assignments at the end of each chapter, exercises throughout the text that students can complete as they read, and a solutions manual in the back of the book. This book is intended for graduate or advanced undergraduate students. It is also recommended for computer scientists and database systems engineers and programmers in government, industry and academia; professionals from other disciplines, e.g., geography, geology, soil science, hydrology, urban and regional planning, mobile computing, bioterrorism and homeland security, etc.Focuses on the modeling and design of data from moving objects--such as people, animals, vehicles, hurricanes, forest fires, oil spills, armies, or other objects--as well as the storage, retrieval, and querying of that very voluminous data.Demonstrates through many practical examples and illustrations how new concepts and techniques are used to integrate time and space in database applications.Provides exercises and solutions in each chapter to enable the reader to explore recent research results in practice.

MEL Scripting for Maya Animators (The Morgan Kaufmann Series in Computer Graphics)

by Mark R. Wilkins Chris Kazmier

Trying to learn Maya programming from the documentation can be daunting whether or not you are a programmer. The first edition of MEL Scripting for Maya Animators earned the reputation as the best introductory book on MEL, Maya’s scripting language. Now fully revised and updated, the second edition also includes new features, such as a discussion of global procedures, new chapters on fixing programming bottlenecks, advanced user interface techniques, and optimizing character rigs. New chapters on utility nodes and Maya's Web Panel feature provide new ideas on how to use MEL in applications. This new edition has kept the popular style of the first edition that offered very clear explanations of programming concepts to those without programming experience. A generous collection of code examples and Maya scene files is included on the companion Web site. This is a book for animators, artists, game developers, visual effects developers, and technical directors who want to learn the fundamentals of Maya, how to automate tasks, personalize user interfaces, build custom tools, and solve problems with MEL.Fully updated with several new chaptersProfusely illustrated and includes a companion Web site with numerous code examples and scene filesThe authors bring their extensive experience in professional production studios to provide expert guidance

Implementing Database Security and Auditing

by Ron Ben Natan

This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to an “internals" level. There are many sections which outline the “anatomy of an attack" – before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape – both from a business and regulatory requirements perspective as well as from a technical implementation perspective.* Useful to the database administrator and/or security administrator - regardless of the precise database vendor (or vendors) that you are using within your organization.* Has a large number of examples - examples that pertain to Oracle, SQL Server, DB2, Sybase and even MySQL.. * Many of the techniques you will see in this book will never be described in a manual or a book that is devoted to a certain database product.* Addressing complex issues must take into account more than just the database and focusing on capabilities that are provided only by the database vendor is not always enough. This book offers a broader view of the database environment - which is not dependent on the database platform - a view that is important to ensure good database security.

Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration (The Morgan Kaufmann Series in Data Management Systems)

by Earl Cox

Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration is a handbook for analysts, engineers, and managers involved in developing data mining models in business and government. As you’ll discover, fuzzy systems are extraordinarily valuable tools for representing and manipulating all kinds of data, and genetic algorithms and evolutionary programming techniques drawn from biology provide the most effective means for designing and tuning these systems. You don’t need a background in fuzzy modeling or genetic algorithms to benefit, for this book provides it, along with detailed instruction in methods that you can immediately put to work in your own projects. The author provides many diverse examples and also an extended example in which evolutionary strategies are used to create a complex scheduling system.Written to provide analysts, engineers, and managers with the background and specific instruction needed to develop and implement more effective data mining systemsHelps you to understand the trade-offs implicit in various models and model architecturesProvides extensive coverage of fuzzy SQL querying, fuzzy clustering, and fuzzy rule inductionLays out a roadmap for exploring data, selecting model system measures, organizing adaptive feedback loops, selecting a model configuration, implementing a working model, and validating the final modelIn an extended example, applies evolutionary programming techniques to solve a complicated scheduling problemPresents examples in C, C++, Java, and easy-to-understand pseudo-codeExtensive online component, including sample code and a complete data mining workbench

Voice over Internet Protocol (VoIP) Security

by James F. Ransome, PhD, CISM, CISSP John Rittinghouse, PhD, CISM

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today’s complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation.* In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.

Developing Practical Wireless Applications

by Dean A. Gratton

In a constant stream of new ideas, wireless technologies continue to emerge offering a range of capabilities, each affording simplicity and ease-of-use. Such diversity and choice should surely beg the question, “are manufacturers using the right technology for the right product?" Developing Practical Wireless Applications will explore this question and, in doing so, will illustrate many of the wireless technologies currently available whilst drawing upon their individual strengths and weaknesses. More specifically, the book will draw your attention to the diverse collection of standardized and proprietary solutions available to manufacturers. As developers and innovators your choices are not restricted to any norm and, as such, a standardized or proprietary solution may afford you greater benefits in realising any product roadmap. Developing Practical Wireless Applications will provide you with a comprehensive understanding of how each technology works, coupled with an exploration into overlapping, complementary and competing technologies. In establishing this foundation, we will explore wireless applications in their context and address their suitability. In contrast, the book also considers the practicality of a wireless world in an attempt to better understand our audience and specific demographic groups. Coupled with a richer understanding of our consumers, along with our technology make-up we can indeed target wireless products more effectively.*Explores techniques used to attack wireless networks including WarXing, WarChalking, BlueJacking, and BlueSnarfing*Discusses applications utilizing ZigBee, NFC, RFID, Ultra-Wideband and WirelessUSB (WiMedia)*Details Bluetooth 2.x +EDR and introduces the v3.0 (BToverUWB) specification *Includes fundamental introductions to WiFi, namely 802.11i, 802.11p and 802.11n*Compares personal-area and wide-area communications including 3G, HSDPA, 4G, and WiMAX, as well as introducing Wireless Convergence

Web Dragons: Inside the Myths of Search Engine Technology (The Morgan Kaufmann Series in Multimedia Information and Systems)

by Marco Gori Ian H. Witten Teresa Numerico

Web Dragons offers a perspective on the world of Web search and the effects of search engines and information availability on the present and future world. In the blink of an eye since the turn of the millennium, the lives of people who work with information have been utterly transformed. Everything we need to know is on the web. It's where we learn and play, shop and do business, keep up with old friends and meet new ones. Search engines make it possible for us to find the stuff we need to know. Search engines — web dragons — are the portals through which we access society's treasure trove of information. How do they stack up against librarians, the gatekeepers over centuries past? What role will libraries play in a world whose information is ruled by the web? How is the web organized? Who controls its contents, and how do they do it? How do search engines work? How can web visibility be exploited by those who want to sell us their wares? What's coming tomorrow, and can we influence it? As we witness the dawn of a new era, this book shows readers what it will look like and how it will change their world. Whoever you are: if you care about information, this book will open your eyes and make you blink.Presents a critical view of the idea of funneling information access through a small handful of gateways and the notion of a centralized index--and the problems that may causeProvides promising approaches for addressing the problems, such as the personalization of web servicesPresented by authorities in the field of digital libraries, web history, machine learning, and web and data miningFind more information at the author's site: webdragons.net

Effective Prototyping for Software Makers (Interactive Technologies)

by Jonathan Arnowitz Michael Arent Nevin Berger

Effective Prototyping for Software Makers is a practical, informative resource that will help anyone—whether or not one has artistic talent, access to special tools, or programming ability—to use good prototyping style, methods, and tools to build prototypes and manage for effective prototyping. This book features a prototyping process with guidelines, templates, and worksheets; overviews and step-by-step guides for nine common prototyping techniques; an introduction with step-by-step guidelines to a variety of prototyping tools that do not require advanced artistic skills; templates and other resources used in the book available on the Web for reuse; clearly-explained concepts and guidelines; and full-color illustrations and examples from a wide variety of prototyping processes, methods, and tools. This book is an ideal resource for usability professionals and interaction designers; software developers, web application designers, web designers, information architects, information and industrial designers.* A prototyping process with guidelines, templates, and worksheets;* Overviews and step-by-step guides for 9 common prototyping techniques;* An introduction with step-by-step guidelines to a variety of prototyping tools that do not require advanced artistic skills;* Templates and other resources used in the book available on the Web for reuse;* Clearly-explained concepts and guidelines;* Full-color illustrations, and examples from a wide variety of prototyping processes, methods, and tools. * www.mkp.com/prototyping

Real-Life MDA: Solving Business Problems with Model Driven Architecture (The MK/OMG Press)

by Michael Guttman John Parodi

Model Driven Architecture (MDA) is a new approach to software development that helps companies manage large, complex software projects and save development costs while allowing new technologies that come along to be readily incorporated. Although it is based on many long-standing industry precepts and best practices, such as UML, it is enough of a departure from traditional IT approaches to require some "proof of the pudding." Real-Life MDA is composed of six case studies of real companies using MDA that will furnish that proof. The authors' approach MDA projects by describing all aspects of the project from the viewpoint of the end-users—from the reason for choosing an MDA approach to the results and benefits. The case studies are preceded by an introductory chapter and are followed by a wrap-up chapter summarizing lessons learned.Written for executives, analysts, architects, and engineers positioned to influence business-oriented software development at the highest levelsFilled with concrete examples and analyses of how MDA is relevant for organizations of various sizesConsiders a range of uses for MDA—from business process analysis to full-scale software modeling and developmentPresents results for each case study in terms of tangible, measured benefits, including automatically generated code, defect reduction, improved visibility, and ROI

CCTV Surveillance: Video Practices and Technology

by Herman Kruegle

This revision of the classic book on CCTV technology, CCTV Surveillance, provides a comprehensive examination of CCTV, covering the applications of various systems, how to design and install a system, and how to choose the right hardware. Taking into account the ever-changing advances in technology using digital techniques and the Internet, CCTV Surveillance, Second Edition, is completely updated with the recent advancements in digital cameras and digital recorders, remote monitoring via the Internet, and CCTV integration with other security systems. Continuing in the celebrated tradition of the first edition, the second edition is written to serve as a useful resource for the end-user as well as the technical practitioner. Each chapter begins with an overview, and presents the latest information on the relevant equipment, describing the characteristics, features and application of each device. Coverage of aging or obsolete technology is reduced to a historical perspective, and eight brand new chapters cover digital video technology, multiplexers, integrated camera-lens-housing, smart domes, and rapid deployment CCTV systems.Serves as an indispensable resource on CCTV theoryIncludes eight new chapters on the use of digital components and other related technologies that have seen a recent explosion in use Fully illustrated, the book contains completely updated photographs and diagrams that represent the latest in CCTV technology advancements

Parallel Computational Fluid Dynamics 2005: Theory and Applications

by Gunther Brenner David R. Emerson James McDonough Damien Tromeur-Dervout N. Satofuka A. Ecer Jacques Periaux A. Deane

The proceedings from Parallel CFD 2005 covering all aspects of the theory and applications of parallel computational fluid dynamics from the traditional to the more contemporary issues.- Report on current research in the field in an area which is rapidly changing- Subject is important to all interested in solving large fluid dynamics problems- Interdisciplinary activity. Contributions include scientists with a variety of backgrounds

UML 2 Certification Guide: Fundamental and Intermediate Exams (The MK/OMG Press)

by Tim Weilkiens Bernd Oestereich

The popular Unified Modeling Language (UML) is both a language and notation developed by the Object Management Group (OMG) used to design and create specifications for software systems. With the recent release of version 2.0 UML, the OMG has started the OMG-Certified UML Professional Program to provide an objective measure of UML knowledge. As a certified UML professional a developer has an important credential to present to employers and clients. Certification also benefits companies looking for skilled UML practitioners by giving them a basis for making hiring and promotion decisions. UML 2 Certification Guide is the only official study guide to passing the new UML exams. This book systematically covers all of the topics covered in the exams, and has been carefully reviewed by the OMG. The book begins by assuming only a basic knowledge of UML and then progresses far enough to allow a reader to pass both the fundamental and the intermediate level exams. Along the way the book also covers topics that are not in introductory books on UML but that are necessary to pass the exams. Tim Weilkiens is considered one of the top ten experts on UML, and both authors have extensive experience training developers to successfully take the exams. The official certification resourceAssumes a basic knowledge of UML so that you can focus immediately on the examsWritten by two authors known for their skill as trainers, consultants, and developersDeveloped systematically to enable you to master all exam topics—without exceptionCovers the use of UML for applications, as required by the exams, both inside and outside of the realm of software developmentIncludes a practice exam, glossary, list of books, and website information

Practical Model-Based Testing: A Tools Approach

by Mark Utting Bruno Legeard

Practical Model-Based Testing gives a practical introduction to model-based testing, showing how to write models for testing purposes and how to use model-based testing tools to generate test suites. It is aimed at testers and software developers who wish to use model-based testing, rather than at tool-developers or academics. The book focuses on the mainstream practice of functional black-box testing and covers different styles of models, especially transition-based models (UML state machines) and pre/post models (UML/OCL specifications and B notation). The steps of applying model-based testing are demonstrated on examples and case studies from a variety of software domains, including embedded software and information systems. From this book you will learn: The basic principles and terminology of model-based testingHow model-based testing differs from other testing processesHow model-based testing fits into typical software lifecycles such as agile methods and the Unified ProcessThe benefits and limitations of model-based testing, its cost effectiveness and how it can reduce time-to-marketA step-by-step process for applying model-based testingHow to write good models for model-based testingHow to use a variety of test selection criteria to control the tests that are generated from your modelsHow model-based testing can connect to existing automated test execution platforms such as Mercury Test Director, Java JUnit, and proprietary test execution environmentsPresents the basic principles and terminology of model-based testingShows how model-based testing fits into the software lifecycle, its cost-effectiveness, and how it can reduce time to marketOffers guidance on how to use different kinds of modeling techniques, useful test generation strategies, how to apply model-based testing techniques to real applications using case studies

Traffic Engineering and QoS Optimization of Integrated Voice and Data Networks

by Gerald R. Ash

This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement, modeling, characterization, and control of network traffic, and the application of techniques to achieve specific performance objectives. The scope of the analysis and recommendations include dimensioning, call/flow and connection routing, QoS resource management, routing table management, dynamic transport routing, and operational requirements. Case studies are included which provide the reader with a concrete way into the technical details and highlight why and how to use the techniques described in the book.Includes Case Studies of MPLS and GMPLS Network OptimizationPresents state-of-the-art traffic engineering and quality of service optimization methods and illustrates the tradeoffs between the various methods discussedContains practical Case Studies based on large-scale service provider implementations and architecture plansWritten by a highly respected and well known active expert in traffic engineering and quality of service

IT Manager's Handbook: Getting Your New Job Done

by Bill Holtsnider Brian D. Jaffe

IT Manager's Handbook, Second Edition, provides essential information to help students understand the responsibilities of today’s IT Management professionals: not only planning network security and implementing disaster recovery plans, but also such vital tasks as creating budgets, administering compliance, and managing staff. In particular, the book discusses business practices that are most critical to effective IT operations: recruiting, budgeting, resource planning, managing personnel, and working with vendor. This updated version includes expanded coverage on such critical IT management topics as security, disaster recovery, storage, government/regulatory compliance, and project management. Information is organized modularly so that instructors and students can delve directly into only the topics needed. Each chapter contains additional resources sections for books, articles, and websites relevant to that topic. It contains new material on key technology topics such as open source, outsourcing, offshoring, and handhelds, plus updated coverage of e-commerce, remote access, intranets, and LAN/WAN management.A completely updated and expanded second edition that provides practical, easily accessible management advice written specifically for new IT managers: · Brings you up to speed on those business practices most critical to effective IT operations: recruiting, budgeting, resource planning, managing personnel, and working with vendors. · Includes expanded coverage on such critical IT management topics as security, disaster recovery, storage, government/regulatory compliance, and project management.· Organizes information modularly so you can delve directly into only the topics that you need. · Provides a unique management perspective on those specific technical issues with the most significant business ramifications.· Includes new material on key technology topics such as open source, wireless, handhelds, outsourcing, offshoring, and operations, as well as updated coverage of e-commerce, remote access, intranets, and LAN/WAN management.

Handbooks in Operations Research and Management Science: Simulation (ISSN #Volume 13)

by Shane G. Henderson Barry L. Nelson

This Handbook is a collection of chapters on key issues in the design and analysis of computer simulation experiments on models of stochastic systems. The chapters are tightly focused and written by experts in each area. For the purpose of this volume “simulation" refers to the analysis of stochastic processes through the generation of sample paths (realization) of the processes. Attention focuses on design and analysis issues and the goal of this volume is to survey the concepts, principles, tools and techniques that underlie the theory and practice of stochastic simulation design and analysis. Emphasis is placed on the ideas and methods that are likely to remain an intrinsic part of the foundation of the field for the foreseeable future. The chapters provide up-to-date references for both the simulation researcher and the advanced simulation user, but they do not constitute an introductory level ‘how to’ guide. Computer scientists, financial analysts, industrial engineers, management scientists, operations researchers and many other professionals use stochastic simulation to design, understand and improve communications, financial, manufacturing, logistics, and service systems. A theme that runs throughout these diverse applications is the need to evaluate system performance in the face of uncertainty, including uncertainty in user load, interest rates, demand for product, availability of goods, cost of transportation and equipment failures.* Tightly focused chapters written by experts* Surveys concepts, principles, tools, and techniques that underlie the theory and practice of stochastic simulation design and analysis* Provides an up-to-date reference for both simulation researchers and advanced simulation users

Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis

by Colleen McCue

It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community hot-spots, and refined resource deployment decisions. In this book Dr. McCue describes her use of "off the shelf" software to graphically depict crime trends and to predict where future crimes are likely to occur. Armed with this data, law enforcement executives can develop "risk-based deployment strategies," that allow them to make informed and cost-efficient staffing decisions based on the likelihood of specific criminal activity.Knowledge of advanced statistics is not a prerequisite for using Data Mining and Predictive Analysis. The book is a starting point for those thinking about using data mining in a law enforcement setting. It provides terminology, concepts, practical application of these concepts, and examples to highlight specific techniques and approaches in crime and intelligence analysis, which law enforcement and intelligence professionals can tailor to their own unique situation and responsibilities.* Serves as a valuable reference tool for both the student and the law enforcement professional* Contains practical information used in real-life law enforcement situations* Approach is very user-friendly, conveying sophisticated analyses in practical terms

Handbook of Constraint Programming (ISSN)

by Toby Walsh

Constraint programming is a powerful paradigm for solving combinatorial search problems that draws on a wide range of techniques from artificial intelligence, computer science, databases, programming languages, and operations research. Constraint programming is currently applied with success to many domains, such as scheduling, planning, vehicle routing, configuration, networks, and bioinformatics.The aim of this handbook is to capture the full breadth and depth of the constraint programming field and to be encyclopedic in its scope and coverage. While there are several excellent books on constraint programming, such books necessarily focus on the main notions and techniques and cannot cover also extensions, applications, and languages. The handbook gives a reasonably complete coverage of all these lines of work, based on constraint programming, so that a reader can have a rather precise idea of the whole field and its potential. Of course each line of work is dealt with in a survey-like style, where some details may be neglected in favor of coverage. However, the extensive bibliography of each chapter will help the interested readers to find suitable sources for the missing details. Each chapter of the handbook is intended to be a self-contained survey of a topic, and is written by one or more authors who are leading researchers in the area.The intended audience of the handbook is researchers, graduate students, higher-year undergraduates and practitioners who wish to learn about the state-of-the-art in constraint programming. No prior knowledge about the field is necessary to be able to read the chapters and gather useful knowledge. Researchers from other fields should find in this handbook an effective way to learn about constraint programming and to possibly use some of the constraint programming concepts and techniques in their work, thus providing a means for a fruitful cross-fertilization among different research areas.The handbook is organized in two parts. The first part covers the basic foundations of constraint programming, including the history, the notion of constraint propagation, basic search methods, global constraints, tractability and computational complexity, and important issues in modeling a problem as a constraint problem. The second part covers constraint languages and solver, several useful extensions to the basic framework (such as interval constraints, structured domains, and distributed CSPs), and successful application areas for constraint programming.- Covers the whole field of constraint programming- Survey-style chapters- Five chapters on applications

Introduction to Financial Technology (Complete Technology Guides for Financial Services)

by Roy S. Freedman

The financial technology environment is a dynamic, high-pressured, fast-paced world in which developing fast and efficient buy-and-sell order processing systems and order executing (clearing and settling) systems is of primary importance. The orders involved come from an ever-changing network of people (traders, brokers, market makers) and technology. To prepare people to succeed in this environment, seasoned financial technology veteran Roy Freedman presents both the technology and the finance side in this comprehensive overview of this dynamic area. He covers the broad range of topics involved in this industry--including auction theory, databases, networked computer clusters, back-office operations, derivative securities, regulation, compliance, bootstrap statistics, optimization, and risk management—in order to present an in-depth treatment of the current state-of-the-art in financial technology. Each chapter concludes with a list of exercises; a list of references; a list of websites for further information; and case studies. With amazing clarity, Freedman explains both the technology side and the finance side of financial technology Accessible to both finance professionals needing to upgrade their technology knowledge and technology specialists needing to upgrade their finance knowledge

Refine Search

Showing 82,926 through 82,950 of 83,224 results