Computer and information technologies hardware Books

31 products


  • How to Rebuild  Modify Ford Flathead V8 Engines

    Quarto Publishing Group USA Inc How to Rebuild Modify Ford Flathead V8 Engines

    5 in stock

    Book SynopsisKeep it mild or build it wild, but either way, How to Rebuild and Modify Ford Flathead V8 Engines will help ensure your flathead is delivering the power you need.

    5 in stock

    £20.79

  • BlackBox Testing

    John Wiley & Sons Inc BlackBox Testing

    15 in stock

    Book SynopsisFrom a leading expositor of testing methods, a practical, comprehensive, hands-on guide to the state-of-the-art black-box testing techniques This book fills a long-standing need in the software and general systems development communities to make the essential aspects of black-box testing available in one comprehensive work. Written by one of the world''s most respected figures in the field of testing, it is both a valuable working resource for independent testers and programmers and an excellent practical introduction for students. Dr. Boris Beizer clearly explains the principles behind behavioral testing in general and behind the most important black-box testing techniques in use today, which involve testing a system based on its desired behavior or function and for conformance to its specifications. Then, with fully worked examples, he leads you step-by-step from specifications to finished test cases. Complete coverage of all important test techniquesæincluding those that appTable of ContentsGraphs and Relations. Control-Flow Testing. Loop Testing. Data-Flow Testing. Transaction-Flow Testing. Domain Testing. Syntax Testing. Finite-State Testing. Tools and Automation. Appendix. Cited References and Bibliography. Index.

    15 in stock

    £28.49

  • Effective Coding with VHDL

    MIT Press Ltd Effective Coding with VHDL

    5 in stock

    Book Synopsis

    5 in stock

    £46.80

  • UML in Practice

    John Wiley & Sons Inc UML in Practice

    15 in stock

    Book SynopsisUML is the de facto industry standard modeling language for specifying, visualizing, constructing, and documenting aspects of the design of software systems. UML in Practice offers practical, clear guidance on the real--life usage of UML, mentoring software developers through every aspect of the modeling process.Table of ContentsForeword ix Introduction xi Acknowledgements xv PART 1 FUNCTIONAL VIEW 1 1 Case study: automatic teller machine 3 1.1 Step 1 – Identifying the actors of the ATM 5 1.2 Step 2 – Identifying use cases 8 1.3 Step 3 – Creating use case diagrams 10 1.4 Step 4 – Textual description of use cases 14 1.5 Step 5 – Graphical description of use cases 20 1.6 Step 6 – Organising the use cases 26 2 Complementary exercises 37 2.1 Step 1 – Business modelling 53 2.2 Step 2 – Defining system requirements 57 Appendix A: Glossary & tips 65 PART 2 STATIC VIEW 71 3 Case study: flight booking system 73 3.1 75 3.2 Step 2 – Modelling sentences 6, 7 and 10 77 3.3 Step 3 – Modelling sentences 8 and 9 82 3.4 Step 4 – Modelling sentences 3, 4 and 5 86 3.5 Step 5 – Adding attributes, constraints and qualifiers 89 3.6 Step 6 – Using analysis patterns 94 3.7 Step 7 – Structuring into packages 98 3.8 Step 8 – Generalisation and re-use 105 4 Complementary exercises 113 Appendix B: Glossary & tips 149 Step 1– Modelling sentences 1 and 2 PART 3 DYNAMIC VIEW 157 5 Case study: coin-operated pay phone 159 5.1 Step 1 – Identifying the actors and use cases 161 5.2 Step 2 – Realising the system sequence diagram 164 5.3 Step 3 – Representing the dynamic context 166 5.4 Step 4 – In-depth description using a state diagram 168 6 Complementary exercises 185 Apendix C: Glossary & tips 207 PART 4 DESIGN 213 7 Case study: training request 215 7.1 Step 1 – Defining iterations 217 7.2 Step 2 – Defining the system architecture 219 7.3 Step 3 – Defining system operations (iteration 1) 224 7.4 Step 4 – Operation contracts (iteration 1) 225 7.5 Step 5 – Interaction diagrams (iteration 1) 228 7.6 Step 6 – Design class diagrams (iteration 1) 237 7.7 Step 7 – Defining the system operations (iteration 2) 245 7.8 Step 8 – Operation contracts (iteration 2) 247 7.9 Step 9 – Interaction diagrams (iteration 2) 250 7.10 Step 10 – Design class diagrams (iteration 2) 252 7.11 Step 11 – Back to architecture 253 7.12 Step 12 – Transition to Java code 254 7.13 Step 13 – Putting the application into action 262 8 Complementary exercises 267 Appendix D: Glossary & tips 283 Index 293

    15 in stock

    £27.20

  • Principles of Network and System Administration

    John Wiley & Sons Inc Principles of Network and System Administration

    15 in stock

    Book SynopsisA comprehensive resource that responds to the high demand for specialists who can provide advice to users and handle day-to-day administration, maintenance, and support of computer systems and networks. It shows how to discover customer needs and then use that information to identify, interpret, and evaluate system and network requirements.Table of ContentsPreface to Second Edition. 1. Introduction. 2. System Components. 3. Networked Communities. 4. Host Management. 5. User Management 6. Models of Network and System Administration. 7. Configuration and Maintenance. 8. Diagnostics, Fault and Change Management. 9. Application Level Services. 10. Network Level Services. 11. Principles of Security. 12. Security Implications. 13. Analytical System Administration. 14. Summary and Outlook. A. Some Useful Unix Commands. B. Programming and Compiling. C. Example Telnet Session. D. Glossary. E. Recommended Reading. Bibliography. Index.

    15 in stock

    £55.76

  • Antipatterns

    John Wiley & Sons Inc Antipatterns

    15 in stock

    Book SynopsisPatterns are popular in software development and used to identify different types of procedures, designs, or codes that work. AntiPatterns are the exact opposite, targeting common errors and issues that can cause a project to fail. This book provides practical guidelines on detecting AntiPatterns and the refactored solutions that correct them.Table of ContentsINTRODUCTION TO ANTIPATTERNS. Introduction to Patterns and AntiPatterns. AntiPatterns Reference Model. Templates for Patterns and AntiPatterns. Advice for Using AntiPatterns. ANTIPATTERNS Software Development AntiPatterns. Software Architecture AntiPatterns. Software Project Management AntiPatterns. CONCLUSIONS AND RESOURCES. Appendices. Index.

    15 in stock

    £39.00

  • Interconnect Analysis and Synthesis

    John Wiley & Sons Inc Interconnect Analysis and Synthesis

    15 in stock

    Book SynopsisBottlenecks in signal distribution systems are becoming more serious and set a limit on achievable speeds. This book examines methods to optimize performance, featuring a detailed discussion of a taxonomy of problem formulation.Table of ContentsInterconnect Models. Device Models. Interconnect Analysis. Inductance and Inductive Coupling for On-chip Interconnect. Synthesis: Overview and Static Topology Optimization. Global Routing Topology Synthesis. Optimization of Multi-Source Nets. Timing Driven Maze Routing.

    15 in stock

    £122.35

  • The Data Model Resource Book Revised Edition Vol

    John Wiley & Sons Inc The Data Model Resource Book Revised Edition Vol

    1 in stock

    Book SynopsisIndustry experts raved about The Data Model Resource CD because it provided a simple, cost-effective way to design generic databases for business functions like marketing, sales, inventory control, billing, and human resources. This CD-ROM shows readers how to tailor these data models to meet their specific requirements.Trade Review"I thought the models in the books were well thought out and adequately explained." (Computer Shopper, February 2002)Table of ContentsForeword xiii Acknowledgments xv About the Author xvii Chapter 1 Introduction 1 Why is There a Need for This Book? 1 To Integrate or Disintegrate? That is the Question 2 Approach of This Book 4 Who is the Intended Audience for This Book? 5 General Industry Models versus More Specific Industry Models 5 Industry Data Models versus Data Model Applications 7 The Volume 2 Models: Customized and New Models for Each Industry 8 Conventions and Standards Used in This Book 8 Entities 8 Subtypes and Supertypes 15 Non-Mutually Exclusive Sets of Subtypes 16 Attributes 17 Relationships 18 Relationship Optionality 18 Relationship Cardinality 19 Foreign Key Relationships 20 Foreign Key Inheritance 20 Intersection or Association Entities to Handle Many-to Many Relationships 21 Exclusive Arcs 22 Recursive Relationships 22 Physical Models 23 Conventions Used for Illustration Tables 24 Conventions Used to Reference Figures 25 The Data Model Resource Book, Volume 2, Industry Download Products 25 Chapter 2 Manufacturing 27 People and Organizations in Manufacturing 31 Product Models in Manufacturing 33 Products and Parts 33 Design Engineering 36 Part Specifications and Documentation 36 Part Specification Roles and Status 40 Engineering Change 41 Product Bill of Material, Substitutes, and Inventory Configurations 43 Product Bill of Materials 44 Part Substitutions 46 Inventory Item Configurations 50 Other Product Models 53 Orders 54 Usage of the Order Models for Manufacturers 54 Materials Requirements Planning 56 Delivery 57 Deployment and Use of Products 58 Deployments 58 Deployment Usage 60 Inventory Ownership 62 Work Effort 63 Process Plan 63 Production Runs 65 Invoicing, Accounting, Budgeting, and Human Resources Models 67 Star Schema for Manufacturing 69 Production Run Fact 70 Dimensions 71 Variation of Product Run Data Mart 72 Manufacturing Summary 73 Chapter 3 Telecommunications 75 People and Organizations in Telecommunications 80 Generic Person and Organization Roles from Volume 1 80 Party Roles and Relationships for Telecommunications 80 Example of Party Roles and Relationships for Telecommunications 83 Telecommunications Products 84 Telecommunications Modifications to the Generic Product Data Models 84 Telecommunications Services 86 Telecommunications Goods 88 Telecommunications Features 88 Product Feature Interaction 89 Telecommunications Product and Product Feature Example 89 Product Deployment 91 Telecommunications Product Associations 93 Network Data Models 98 Network Components 99 Network Assemblies 101 Circuits 104 Product, Circuit, and Network Assembly Capabilities 106 Communication IDs and Contact Mechanisms 109 Orders 111 Service Orders 111 Product Availability 113 Delivery 114 Deployment Usage 114 Invoicing 118 Work Effort, Accounting, and Human Resources Models 120 Star Schema for Telecommunications 121 Product Deployment Usage Fact 122 Customers 123 Deployment Usage Types and Unit of Measures Dimensions 123 Products 123 Facilities 124 Time by Hour 124 Telecommunications Summary 124 Chapter 4 Health Care 127 People and Organizations in Health Care 129 Person Roles 129 Organization Roles 132 Insured Party Roles 133 Party Relationships 134 Party Roles Example 134 Health Care Facilities and Contact Mechanisms 138 Patient, Practitioner, and Provider Information 138 Health Care Products 141 Health Care Offering Definition 141 Health Care “Orders” 144 Agreement Definition 145 Health Care Shipments and Delivery 148 Health Care Episodes, Incidents and Visits 148 Health Care Delivery 151 Health Care Claims 154 Invoice Data Models versus Claims Data Models 154 Health Care Claims Submission 156 Claim Header Information 157 Claim Codes 159 Insurance Policy Information 160 Payment Settlement 162 Health Care Referrals 164 Star Schema for Health Care 165 Health Care Summary 167 Chapter 5 Insurance 171 People and Organizations in Insurance 173 Person Roles 176 Organization Roles 178 Person or Organization Roles 179 Insurance Party Relationships 181 Insurance Product 184 Insurance Products and Categories 185 Insurance Product Coverage 188 Details behind Coverage Types and Coverage Levels 190 Insurance Product Features 194 Insurance Product Rules 196 Insurance Pricing 200 Community-Based Rating 200 Insurance Rate Tables 203 Experienced-Based Insurance Rating 206 Insurance Policies (Orders for Insurance) 206 Insurance Application 206 Insurance Quote 208 The Insurance Agreement or Insurance Policy 213 Insurance Policy Roles 214 Insurance Policy Items 216 Health Care Insurance Agreement 219 Casualty Insurance Agreement 224 Property Insurance Agreement 225 Life Insurance Agreement 226 Premium Schedule 227 Premium Invoicing and Payments 231 Policy Claims 231 Insurance Claim Incidents 232 Insurance Claims Submission 234 Claims Settlement 237 Delivery, Work Efforts, Accounting, and Human Resources for Insurance Enterprises 240 Star Schemas for Insurance 241 Analysis Information 241 Claim Star Schema 241 Fact Table 242 Dimensions 242 Insurance Summary 245 Chapter 6 Financial Services 247 People and Organizations in Financial Services 249 Generic Party Role Subtypes 252 Financial Service Party Roles 252 Financial Service Relationships 254 Financial Objectives, Needs, and Plans 257 Financial Services Products 261 Financial Services Product Definition 262 Product Categories 264 Product Feature and Functional Setting 264 Financial Product and Functional Setting 265 Features and Functional Settings for Product Categories 266 Features and Functional Settings for Products 267 Example of Predefined Financial Products with Product Features and Functional Settings 267 Financial Products That are Customized for the Specific Needs of a Customer 268 Product Category Roll-ups 272 Financial Product Regulations and Rules 273 Agreements 276 Financial Agreements 276 Agreement Subtypes and Roles 276 Asset Roles and Agreement Asset Usage 278 Agreement Status 279 Delivery 279 Financial Account 279 Account Product 280 Account Roles 282 Account Relationships 282 Media 283 Account Status 283 Account Transaction 284 Account Transaction Type 284 Account Transaction Status 286 Account Transaction Relationships 286 Account Transaction Tasks 288 Work Efforts 290 Account Notification 290 Notification Task Types 291 Invoicing and Statement Tasks 291 Marketing Tasks 293 Alert Tasks 294 Other Notification Tasks 294 Example of Account Notification Tasks 295 Analysis Task 295 Analysis Task Data Model 297 Example of Risk Analysis Task 299 Invoicing, Accounting, and Human Resources 299 Star Schemas for Financial Services 300 Analysis Information 300 Account Star Schema 300 Fact Table 302 Dimensions 302 Account Transaction Star Schema 304 Fact Table 304 Dimensions 304 Financial Services Summary 306 Chapter 7 Professional Services 309 People and Organizations in Professional Services 311 Person Roles 313 Organization Roles 314 Professional Services Roles and Relationships Examples 314 Professional Services Products 316 Professional Services Products Model 317 Applicability of Other Product Models 319 Professional Service Product Associations 321 Orders 321 Professional Services Requirements 322 Professional Services Requests and Quotes 325 Professional Services Requests 328 Professional Service Quotes (Proposals and Statements of Work) 330 Engagements 333 Types of Engagement Items 333 Engagement Rates 335 Placement versus Deliverables-Based Consulting 336 Engagement Example 336 Professional Services Agreements 338 Delivery 341 Professional Services Entries 341 Work Efforts 343 Invoicing 346 Accounting and Human Resources Management 347 Star Schema for Professional Services 348 Time Entry Fact 349 Dimensions 350 Professional Services Summary 350 Chapter 8 Travel 353 People and Organizations in Travel 355 Person Roles 357 Organization Roles 357 Party Relationships 359 Travel Preferences 362 Travel Products 364 Product Definition 364 Travel Orders (Reservations) 369 Order Models 370 Ticketing 373 Agreements 376 Travel Agreements 376 Pricing of Agreements and Products 376 Delivery (Travel Experience) 379 Invoicing 383 Work Efforts 383 Travel Programs and Travel Accounts 383 Travel Programs, Rules, and Factors 385 Travel Account Example 385 Star Schemas for Travel 386 Passenger Transportation Offering Star Schema 386 Fact Table 386 Dimensions 387 Non-Transportation Travel Product Star Schema 388 Fact Table 388 Dimensions 388 Travel Summary 389 Chapter 9 E-Commerce Models 393 People and Organizations in E-Commerce 395 E-Commerce Parties, Roles, and Relationships 397 Automated Agent Party Subtype 398 Generic Party Roles from Volume 1 399 E-Commerce Party Roles and Relationships 399 Is There Always a PARTY for a PARTY ROLE? 400 Example Data for E-Commerce Party Roles and Relationships 400 Party Contact Mechanisms in E-Commerce 402 Web Site Content and User Login Information 405 Web Site Content 405 Login Account 407 E-Commerce Products and Objects 408 Orders in E-Commerce 410 Party and Product Needs 412 Subscriptions 414 Web Visits 418 Web Hits and Web Logs 419 Web Visits Model 420 VISIT Information 422 SERVER HIT Information 422 Defining a Visit 423 Delivery, Work Efforts, Invoicing, Accounting, and Human Resources 426 Web Server Hits Star Schema 426 Server Hit Star Schema 427 Server Hit Fact 428 Visitors Dimension 428 ISPS Dimension 429 Referrers Dimension 429 Web Contents Dimension 429 User Agent Types Dimension 430 Products Dimension 430 Time by Hour Dimension 430 Web Visit Star Schema 431 E-Commerce Summary 433 Chapter 10 Using the Industry Models in the Real World 435 Using the Models to Build Transaction-Oriented Systems and Data Warehouses 436 Enterprises in Other Industries 437 Relevance of Models to Very Specific Industries 438 Diverse Enterprises Needing Models from Several Chapters 438 Setting Up Modularized Data Models for Use Across Industries 439 For More Information 439 Appendix A Entities and Attributes for Manufacturing Models 443 Entities and Attributes Listing for Manufacturing 445 Appendix B Entities and Attributes for Telecommunications Models 453 Entities and Attributes Listing for Telecommunications Models 454 Appendix C Entities and Attributes for Health Care Models 463 Entities and Attributes Listing for Health Care Models 464 Appendix D Entities and Attributes for Insurance Models 475 Entities and Attributes Listing for Insurance Models 476 Appendix E Entities and Attributes for Financial Services Models 487 Entities and Attributes Listing for Financial Services Models 488 Appendix F Entities and Attributes for Professional Services Models 497 Entities and Attributes Listing for Professional Services Models 498 Appendix G Entities and Attributes for Travel Models 507 Entities and Attributes Listing for Travel Models 508 Appendix H Entities and Attributes for E-Commerce Models 519 Entities and Attributes Listing for E-Commerce Models 520 Appendix I List of Entities and Their Associated Figures 525 Other Reusable Data Model and Data Warehouse Design Resources 541 Reusable Data Model Resources 541 Reusable Data Warehouse Design Resources 542 How to Use the Volume 2 Industry Electronic Products 543 Contents of the Industry Electronic Products 544 Using the Scripts 545 How to Use the Industry Electronic Products in Conjunction with the Data Model Resource CD-ROM, Volume 1 545 Platform-Specific and Other Information on the Electronic Products 545 Index 547

    1 in stock

    £54.00

  • The Data Model Resource Book Volume 1 A Library

    John Wiley & Sons Inc The Data Model Resource Book Volume 1 A Library

    15 in stock

    Book SynopsisThe development of corporate database systems is complex, time-consuming, and expensive, causing developers to look for ways to cut costs. Len Silverston found a way to do this by identifying core data models that most companies share, standardizing them, and making them available on this CD-ROM.Trade Review"I thought the models in the books were well thought out and adequately explained" (Computer Shopper February 2002)Table of ContentsForeword. Acknowledgments. About the Author. Introduction. People and Organizations. Products. Ordering Products. Shipments. Work Effort. Invoicing. Accounting and Budgeting. Human Resources. Creating the Data Warehouse Data Model from the Enterprise Data Model. A Sample Data Warehouse Data Model. Star Schema Designs for Sales Analysis. Star Schema Designs for Human Resources. Additional Star Schema Designs. Implementing the Universal Data Models. Appendix A: Logical Data Model Entities and Attributes. Appendix B: Data Warehouse Data Model Tables and Columns. Appendix C: Star Schema Design Tables and Columns. How to Use the CD-ROM Product. Other Reusable Data Model and Data Warehouse Design Resources. Index.

    15 in stock

    £54.00

  • System Safety HAZOP and Software HAZOP

    John Wiley & Sons Inc System Safety HAZOP and Software HAZOP

    15 in stock

    Book SynopsisProvides an indispensable and thorough description of HAZOP (hazard and operability study) - the most powerful technique for the identification and analysis of hazards, a technique which is unknown in many industries and where it is employed, it often does not fulfil its potential because of incorrect use.Trade Review"(The authors) provide a much-needed reference on HAZOP ... provides extensive useful guidance additional to that already available in Interim Defence Standard 00-58 and in most parts is extremely readable and well written. ... this book is highly recommended for anyone contemplating the use of HAZOP, the extension of HAZOP to software-based systems or the use of other similar hazard identification technqiues.", Iain Johnstone, , The Hazards Forum Newsletter#"(The book) fully describes the entire [HAZOP] process from A to Z. It also provides all of the necessary information and details to understand HAZOP and the steps involved in performing a HAZOP on any type of system. ... If you are looking for a guide that thoroughly describes HAZOP with examples, insight and obvious experience, I highly recommend this book.", , , Hazard Prevention: Journal of the System Safety Society#"... a very useful contribution that should help practising engineers, particularly software engineers, to design safer systems.", , , Computing and Control Engineering Journal#"....a helpful and authoritative reference....", , , The Hazards Forum Newsletter, Number 29#Table of ContentsIntroduction; The Role of Hazard Identification in the Management of Safety; An Overview of HAZOP; Representations and Attributes; The Study Initiator's Role in HAZOP; Team Selection and the Roles of Team Members; The Use of Guide Words; Planning a HAZOP Study; Conduct of a Meeting; Recording, Signing-off and Follow-up Work; Hazard Identification throughout the Life of a System; Dealing with Particular Difficulties; HAZOP of Human-centred Systems; HAZOP of Systems in an Environment that Changes during Operation; Example PES HAZOP Sessions; Introduction, Auditing and Improvement of HAZOP.

    15 in stock

    £144.85

  • Hypermedia and the Web

    John Wiley & Sons Inc Hypermedia and the Web

    Out of stock

    Book SynopsisThis work offers guidance on how to apply a systematic, disciplined and quantifiable approach to developing and maintaining online information with associative linking websites. Issues in the development process include application usability, cognitive management and productivity.Trade Review"...a good reference source and a guide for deeper study of the issues in hypermedia engineering and its relationship to the World Wide Web." --Internet Research, August 2000Table of ContentsHYPERMEDIA DEVELOPMENT FUNDAMENTALS. Hypermedia. What is Hypermedia Engineering? Product Issue in Hypermedia Development. Process Issues in Hypermedia Development. Approaches to Hypermedia Development. HYPERMEDIA DEVELOPMENT PRACTICE: Hypermedia Development: Current Practice. Hypermedia Development: Best Practice. Hypermedia Development: Future Practice. CASE STUDIES ON CUTTING-EDGE HYPERMEDIA DEVELOPMENT: Current Research. MATILDA. Microcosm. Hyper-G. Amsterdam. RMM. Comparison of Approaches. Conclusions.

    Out of stock

    £53.19

  • Solaris 8 Administrators Guide

    O'Reilly Media Solaris 8 Administrators Guide

    Out of stock

    Book SynopsisThis guide covers all aspects of deploying Solaris as an enterprise-level network operating system, with a focus on e-commerce. It covers installation on the Intel and Sparc platforms, and instructs you how to set up Solaris as a file server, application server, and database server.Table of ContentsTable of Contents Preface 1. The Network Is the Computer Sun ONE (Open Network Environment) Solaris Releases Solaris Resources 2. Building Solaris Networks System Concepts Network Architectures Internet Protocols Using inetd Using snoop 3. Installing Solaris Pre-Installation Checklist Solaris Installations (SPARC) Solaris Installations (Intel) Preparing for Installation (SPARC) Preparing for Installation (Intel) Web Start Wizard Installation 4. Network Configuration Creating Networks and Subnets Configuring Network Interfaces Obtaining Network Statistics Routing 5. Naming Services Domains and Name Services Domain Name Service Network Information Service Network Information Service+ Lightweight Directory Access Protocol 6. Host Administration User Management Software Package Management Printer Management Quotas Installing Sendmail 7. File Serving Samba Network File System Servers NFS Performance Measurement 8. Data Management Data Management Principles Revision Control Tools Understanding Backups Selecting a Backup Media Backup and Restore Methods Backup/Restore Packages 9. Network Security Password Security Secure Shell Disabling IP Ports Packet Filtering Kerberos 5 IPsec SOCKS Internet Proxy MD5 10. Network Information Systems Understanding Web Information Systems Configuring a Web Server Running Servlets Writing Servlets CORBA Enterprise JavaBeans Installing a Database Server Index

    Out of stock

    £23.99

  • T1 A Survival Guide

    O'Reilly Media T1 A Survival Guide

    Out of stock

    Book SynopsisThis practical, applied reference to T1 for system and network administrators brings together the information needed to set up, test and troubleshoot T1.Table of ContentsPreface. 1. History of the U.S. Telephone Network 1876-1950: Analog Beginnings 1951-1970: The Birth of T-carrier 1970-Present: The Modern Telephone Network. 2. T1 Architectural Overview Telecommunications Puzzle Pieces. 3. Basic Digital Transmission on Telephone Networks Introduction to DS0 Alternate Mark Inversion B8ZS and Clear Channel Capability. 4. Multiplexing and the T-carrier Hierarchy Building the T-carrier Hierarchy with Multiplexing The Original Superframe The Extended Superframe (ESF) Telephone Signaling on T1 Links. 5. Timing, Clocking, and Synchronizationin the T-carrier System A Timing Taxonomy T1 Circuit Timing Slips: When Timing Goes Bad. 6. Mysteries of the CSU/DSU Line Build Out: Moving Between Theory and Practice T1 CSU/DSUs CSU/DSU Configuration Summary of Settings. 7. Connecting the Umbilicus: Getting T1 Connectivity Ordering T1 Installation and Termination Pre-Connection Tasks Trading Packets Post-Connection. 8. High-Level Data Link Control Protocol (HDLC) Introduction to HDLC HDLC Framing Cisco HDLC. 9. PPP Introduction to PPP PPP Logical Link States and State Machines PPP Encapsulation and Framing Link Control Protocol (LCP) PPP Network Control and the IP Control Protocol Configuring PPP. 10. Frame Relay Frame Relay Network Overview The Frame Relay Link Layer Multiprotocol Encapsulation with RFC 1490 The Local Management Interface Configuring Frame Relay. 11. T1 Troubleshooting Basic Troubleshooting Tools and Techniques Troubleshooting Outline Physical Layer Problems Link Layer Problems A. Access Aggregation with cT1 and ISDN PRI B. Multilink PPP C. T1 Performance Monitoring D. SNMP E. Cable Pinouts and Serial Information F. Reference Glossary Index

    Out of stock

    £23.99

  • Hardening Cisco Routers

    O'Reilly Media Hardening Cisco Routers

    Out of stock

    Book SynopsisNetwork administrators, auditors and architects know the importance of securing networks and finding security solutions that can be implemented quickly. This text focuses on ways to secure Cisco routers, it is a reference for protecting the protectors.Trade Review"This slim tome is a veritable gem of a book. It is written in a logical and clear style that permits reading from start to finish, but each specific section is complete in it's own right and as such it allows the reader to pick up the book and dip read satisfactorily. I learnt things from this book, and for me that is the best recommendation I can give." - Raza Rizvi, news@UKTable of ContentsPreface 1. Router Security Router Security? Routers: The Foundation of the Internet What Can Go Wrong What Routers Are at Risk? Moving Forward 2. IOS Version Security The Need for a Current IOS Determining the IOS Version IOS Versions and Vulnerabilities IOS Security Checklist 3. Basic Access Control Authentication Versus Authorization Points of Access Basic Access Control Remote Administration Protection with IPSec Basic Access Control Security Checklist 4. Passwords and Privilege Levels Password Encryption Clear-Text Passwords service password-encryption Enable Security Strong Passwords Keeping Configuration Files Secure Privilege Levels Password Checklist 5. AAA Access Control Enabling AAA Local Authentication TACACS+ Authentication RADIUS Authentication Kerberos Authentication Token-Based Access Control AAA Security Checklist 6. Warning Banners Legal Issues Example Banner Adding Login Banners Warning Banner Checklist 7. Unnecessary Protocols and Services ICMP Source Routing Small Services Finger HTTP CDP Proxy ARP Miscellaneous SNMP Unnecessary Protocols and Services Checklist 8. SNMP Security SNMP Versions Securing SNMP v1 and v2c Securing SNMP v3 SNMP Management Servers SNMP Security Checklist 9. Secure Routing and Antispoofing Antispoofing Routing Protocol Security Routing Protocol and Antispoofing Checklist 10. NTP NTP Overview Configuring NTP NTP Checklist 11. Logging Logging in General Router Logging ACL Violation Logging AAA Accounting Logging Checklist A. Checklist Quick Reference B. Physical Security C. Incident Response D. Configuration Examples E. Resources Index

    Out of stock

    £15.99

  • Software Engineering Risk Management

    IEEE Computer Society Press,U.S. Software Engineering Risk Management

    15 in stock

    Book SynopsisThis book is designed for those who manage software development projects. It explores software and risk management both from a technology and a business perspective. Issues regarding costs, schedules, technical performance, and strategies for software development are discussed. The author approaches software development from a just-in-time viewpoint and details strategies for implementing and planning development plans in a cost-effective and timely manner. The book presents a significant discussion of software risk issues pertaining to organizational costs and schedules. It also identifies metrics and presents several models for measuring and predicting risk. The information featured in the book is supported by actual proven case studies derived from the author''s experience. The text addresses many different concepts, strategies, and tools that could make the management of your next software development project less of a guess and more predictable.

    15 in stock

    £80.06

  • Troubleshooting LC Systems A Comprehensive

    Humana Press Inc. Troubleshooting LC Systems A Comprehensive

    Out of stock

    Book SynopsisOver the last 15 years, high-performance liquid chromatogra phy (LC) has made the transition from an instrument used only by experts in research labs to a tool used for routine applications by relatively unskilled workers.Table of ContentsGeneral Considerations. Logical Approaches to Troubleshooting. Separation Basics. Principles of Troubleshooting. Prevention of Problems. Individual HPLC Modules. Reservoirs and Degassing. Pumps. Tubing. Fittings. Injectors and Autosamplers. Columns. Detectors. Recorders and Data Systems.Troubleshooting the Separation plus Other Problems. Separation Problems: Band Tailing and Peak Distortion. Separation Problems: Other Changes in the Appearance of the Chromatogram. Problems in Quantitation. Other Problems. Index.

    Out of stock

    £152.52

  • An Introduction to Lambda Calculi for Computer Scientists

    Kings College Publications An Introduction to Lambda Calculi for Computer Scientists

    15 in stock

    15 in stock

    £13.75

  • Set Up and Manage Your Virtual Private Server

    APress Set Up and Manage Your Virtual Private Server

    1 in stock

    Book SynopsisChapter 1: What is a Virtual Private Server?.- Chapter 2: Selecting a VPS Provider.- Chapter 3: Basic Linux Administration via Command-Line.- Chapter 4: Basic Linux Administration via GUI (Webmin).- Chapter 5: Basics of Linux Security.- Chapter 6: Basics of Backups and Version Control.- Chapter 7: Basics of Server Software Administration.- Chapter 8: Installing an Open Source Software Product Wordpress.- Chapter 9: Administrators Weekly Checklist.- Chapter 10: Open Source Application Possibilities.Table of ContentsChapter 1: What is a Virtual Private Server?Chapter Goal: Go over basic terminology of how the internet operates, how servers run, and how virtualization allows individuals to have their own server for a very small cost per month.• How does the magic happen?o How does a webpage appear on my screen? How does email route through the internet to someone else? How do domain names work?• What options does someone have if they want to get into this?o Who provides services (data centers, co-locations, virtual servers, cloud computing)o How much does it cost?o How much do I have to do?o How much time does it take?• Am I ready for this?o Do I have the necessary skills and time to learn skills I need?o Am I OK with being my own system administrator?o Who do I call if I need help? Or can I call someone?Chapter 2: Selecting a VPS ProviderChapter Goal: Walk the reader through identifying and selecting a VPS provider.• How do I find a provider? o Low-end, High-end, Cloudo Trust and Reliability, what is an SLA?o Warning signs• Resources & Budgetingo What do I really need? o How much does it cost?o Extras that can cost money.• Setting up a New Accounto Security of your account.o Extras you may or may not need.o Terms of Serviceo Choosing your Linux distribution: CentOS or Debian (Throughout the book, commands for both CentOS 8 and Debian 10 will be provided).Chapter 3: Basic Linux Administration via Command-LineChapter Goal: Providing the basic commands to administer your server, finding files, and adding and configuring software.• Logging into your servero Shell accesso SSHo SFTPo Setting up your user account• Basic commandso Linux Directory Structureo Ls, cp, mv, and the most dangerous: rmo Finding fileso Su / sudo and file permissions.o Disk usage, memory usage, and overall server health commands.o How do I edit files: Vim and Nano• How your System Starts up and Shuts Downo Services, what they are and how to enable/disableo The right and wrong way to shutdown, and why it’s important.o Graphical user modes versus command-line.o Files that you might want to keep copies of.• How do I install software? o Package managers (apt / yum)o Compiling from Sourceo Updating / upgrading / removing softwareo Configuring software through configuration files.Chapter 4: Basic Linux Administration via GUI (Webmin)Chapter Goal: To provide a basic overview of the Open Source project “Webmin” for configuration of your server though a graphical interface.• Deciding if a GUI is needed or not. Pros and Cons• Downloading and installing Webmin• Setting up Webmin security, including SSL and 2 Factor authentication.• Delegating tasks to others using Webmin Users.• Basic walkthrough of the modules that you’ll need to access, with an eye on settings you don’t want to change.• Webmin’s Usermin module: GUI for users to access files, mail, databases, and more. Chapter 5: Basics of Linux SecurityChapter Goal: The basics of setting up security on your server, with a discussion of auditing and verifying files haven’t changed.• What is a firewall and how do I set it up?• How do I give some users access to administrative functions, but not all?• Advanced File Permissions, and more on users and groups.• SELinux• Auditing and log file management.Chapter 6: Basics of Backups and Version ControlChapter Goal: How to keep your files backed up and safe.• Backup Basics: What to back up, where to back it up, and how often to back up.• Backup Method 1: Gzipped Tar files and shell scripts.• Backup Method 2: Duplicati GUI• Simulated disaster recovery, and migration to a new server.Chapter 7: Basics of Server Software AdministrationChapter Goal: How to get the most common software up and running on your VPS, customizing it to be secure and reliable.• Web Server Basics (Apache 2)o Extending the Server with PHPo SSL certificates.• Database Server Basics (MySQL)• Mail Server Basics (Postfix)• DNS Server Basics (Bind)• Monitoring your Server (Nagios)Chapter 8: Installing an Open Source Software Product – WordpressChapter Goal: How to get a basic website up and running quickly using an open source content management system, Wordpress.• Do you need a full CMS or are your needs more basic?• Downloading and installing Wordpress• Configuring Wordpress to be secure.• Backing up Wordpress• Extending Wordpress with Plugins.Chapter 9: Administrators Weekly ChecklistChapter Goal: Describe concept of preventive maintenance – what one needs to do regularly to keep the server running smoothly. • Software update basics• Following mailing lists and security discussions.• Monitoring for potential security breaches.• Verifying backups.Chapter 10: Open Source Application PossibilitiesChapter Goal: Introduce the reader to software packages that will allow them to up their productivity by hosting their own content on their server. Basic installations will be covered, but not in-depth customization as was done in Chapter 8.• Moodle: Open Source Learning Management System• osTicket: Open Source Helpdesk / Issue Tracking.• YoURLS: Open Source URL Shortener• OpenVPN: Open Source VPN software• Odoo: Open Source CRM Software• LimeSurvey: Open Source Survey Software (Covered in my previous book, Practical R 4 – but less in-depth here)• Other possibilities, including writing

    1 in stock

    £41.24

  • Quick Changeover for Operators: The SMED System

    Taylor & Francis Inc Quick Changeover for Operators: The SMED System

    2 in stock

    Book SynopsisThe powerful knowledge contained in this book can make your workplace more productive, your job simpler, and everything more satisfying. It's about how to do equipment or product changeovers in record time--often in less than 10 minutes. The method you'll learn here is called SMED, short for "Single-Minute Exchange of Die" (the "single" here means a single-digit number of minutes).Developed from a longer book, A Revolution in Manufacturing: The SMED System (cat no. PP9903), written for managers, this book is written for frontline production and assembly associates. It presents an overview of the reasons why SMED is important for companies and employees, sets out the three basic stages of SMED, and then devotes a separate chapter to each of these stages. The first chapter of the book is like an "owner's manual" that tells you how to get the most out of your reading time by using the margin assists, summaries, and other features of the book to help pull out exactly what you need. One of the most effective ways to use this book is to read and discuss it with other employees. The authors planned the book so that it can be used this way, organizing the book into chunks of information that can be covered in a series of short sessions. Each chapter includes reflection questions to stimulate group discussion. A Learning Package is also available (catalog no.PP7126), which includes a leader's guide, overhead transparencies to summarize major points, and color slides showing examples of SMED applications in different kinds of companies. Table of ContentsPublisher's Message Chart: SMED's Conceptual Stages and Practical Techniques Chapter 1. Getting Started Chapter 2. Important Terms and Concepts Chapter 3. Getting Ready for SMED Chapter 4. Stage 1: Separating Internal and External Setup Chapter 5. Stage 2: Converting Internal Setup to External Setup Chapter 6. Stage 3: Streamlining All Aspects of the Setup Operation Chapter 7. Reflections and Conclusions About the Authors

    2 in stock

    £30.39

  • Managing NFS and NIS: Covers Nfs Version 3

    O'Reilly Media Managing NFS and NIS: Covers Nfs Version 3

    Out of stock

    Book SynopsisA modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem. Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP). The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems. As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including: * How to plan, set up, and debug an NFS network * Using the NFS automounter * Diskless workstations * PC/NFS * A new transport protocol for NFS (TCP/IP) * New security options (IPSec and Kerberos V5) * Diagnostic tools and utilities * NFS client and server tuning NFS isn't really complete without its companion, NIS, a distributed database service for managing the most important administrative files, such as the passwd file and the hosts file. NIS centralizes administration of commonly replicated files, allowing a single change to the database rather than requiring changes on every system on the network. If you are managing a network of Unix systems, or are thinking of setting up a Unix network, you can't afford to overlook this book.Trade Review"If you administrate a collection of Unix systems of any flavour then buy this book. There will always be something of interest that will make your Unix network easier to use and manage - guaranteed. If your network involves NT interconnectivity then still buy it but read the opinion on PCNFS verses SAMBA with an open mind." - Jon Wilks, Cvu, June 2002Table of ContentsPreface 1. Networking Fundamentals Networking overview Physical and data link layers Network layer Transport layer The session and presentation layers 2. Introduction to Directory Services Purpose of directory services Brief survey of common directory services Name service switch Which directory service to use 3. Network Information Service Operation Masters, slaves, and clients Basics of NIS management Files managed under NIS Trace of a key match 4. System Management Using NIS NIS network design Managing map files Advanced NIS server administration Managing multiple domains 5. Living with Multiple Directory Servers Domain name servers Implementation Fully qualified and unqualified hostnames Centralized versus distributed management Migrating from NIS to DNS for host naming What next? 6. System Administration Using the Network File System Setting up NFS Exporting filesystems Mounting filesystems Symbolic links Replication Naming schemes 7. Network File System Design and Operation Virtual filesystems and virtual nodes NFS protocol and implementation NFS components Caching File locking NFS futures 8. Diskless Clients NFS support for diskless clients Setting up a diskless client Diskless client boot process Managing client swap space Changing a client's name Troubleshooting Configuration options Brief introduction to JumpStart administration Client/server ratios 9. The Automounter Automounter maps Invocation and the master map Integration with NIS Key and variable substitutions Advanced map tricks Side effects 10. PC/NFS Clients PC/NFS today Limitations of PC/NFS Configuring PC/NFS Common PC/NFS usage issues Printer services 11. File Locking What is file locking? NFS and file locking Troubleshooting locking problems 12. Network Security User-oriented network security How secure are NIS and NFS? Password and NIS security NFS security Stronger security for NFS Viruses 13. Network Diagnostic and Administrative Tools Broadcast addresses MAC and IP layer tools Remote procedure call tools NIS tools Network analyzers 14. NFS Diagnostic Tools NFS administration tools NFS statistics snoop Publicly available diagnostics Version 2 and Version 3 differences NFS server logging Time synchronization 15. Debugging Network Problems Duplicate ARP replies Renegade NIS server Boot parameter confusion Incorrect directory content caching Incorrect mount point permissions Asynchronous NFS error messages 16. Server-Side Performance Tuning Characterization of NFS behavior Measuring performance Benchmarking Identifying NFS performance bottlenecks Server tuning 17. Network Performance Analysis Network congestion and network interfaces Network partitioning hardware Network infrastructure Impact of partitioning Protocol filtering 18. Client-Side Performance Tuning Slow server compensation Soft mount issues Adjusting for network reliability problems NFS over wide-area networks NFS async thread tuning Attribute caching Mount point constructions Stale filehandles A. IP Packet Routing B. NFS Problem Diagnosis C. Tunable Parameters Index

    Out of stock

    £32.99

  • Lotus Domino Administration in a Nutshell

    O'Reilly Media Lotus Domino Administration in a Nutshell

    Out of stock

    Book SynopsisDomino is one of the most effective platforms for developing and deploying e-business applications, allowing new communities of developers to enjoy its collaborative capabilities. With over 55 million seats worldwide, Domino already provided a strong foundation for messaging and web applications, and the release of R5 builds on that to make Domino easier to use than ever before. For example, Lotus Domino R5 has been expanded to interact with most browsers and other non-Notes clients, so developers can choose their favorite language to design web applications. With R5, administrators can centrally modify client configurations instead of hopping from one terminal to the next throughout the company. The new Domino interface allows administrators to visually monitor the health and status of the Domino servers in a network from a single screen. All this capability implies complexity, and it's easy to forget which menu to go to. Here's where Lotus Domino Administration in a Nutshell can help. It's a quick reference that will come in handy again and again for finding solutions to administrative problems. This book covers: * Domino architecture and key concepts * R5 administration tools * Domino directory and console commands * Database properties and Access Control * Configuring Domino Enterprise Connection Services (DECS) * Supporting the Notes client * Domino for IIS Whether the task is messaging servers, modifying administration tasks to a simpler and more efficient level, or ensuring the security and flexibility of a web application server, Lotus Domino Administration in a Nutshell is the reference developers need to make the most of this reliable and scalable integrated server platform.Table of ContentsPreface. Chapter 1. Notes and Domino Overview The Basics Product Background and Version History Domino R5 New Features A Sample Implementation International Versions of Domino. Chapter 2. Domino Directories Domino Directory Directory Catalog Directory Assistance LDAP Support. Chapter 3. Domino Databases Database Templates Database Properties. Chapter 4. Mail Domino Mail Architecture Calendars and Scheduling Internet Mail Clients (POP3, IMAP) WebMail Shared Mail. Chapter 5. Domino as a Web Server Configuration Domino URLs. Chapter 6. Domino Administration Tools Domino Administrator User Registration User Registration from a Text File Web Administrator Using the Administration Process (AdminP Task). Chapter 7. Monitoring Domino Statistics and Events Mail Tracking Log Databases and Files. Chapter 8. Supporting the Notes Client The New R5 Design Basic Notes Configuration Remote Connection Other New Features EasySync: Synchronize Notes with PalmPilots Common Notes Keyboard Shortcuts. Chapter 9. DECS Configuring DECS Using the DECS Administrator Database. Chapter 10. Domino for Microsoft IIS Prerequisites IIS Configuration Authentication. Chapter 11. Internet Cluster Manager (ICM) Clustering Basics ICM Overview Creating a Cluster and Configuring the ICM. Chapter 12. R4/R5 Coexistence and Migration Upgrade Considerations Suggested Upgrade Sequence. Chapter 13. Domino Server Tasks and Console Commands Domino Server Tasks Domino Server Console. Chapter 14. NOTES.INI Appendix A. Domino/ Windows NT Integration Appendix B. Using InstallShield's Silent Installation Option Appendix C. Domino for AS/400 Appendix D. Domino on Linux Appendix E. TCP/IP Ports Appendix F. Web Links Appendix G. Domino Updates: QMRs and QMUs. Glossary. Index

    Out of stock

    £23.99

  • Managing Complex Technical Projects: A Systems Engineering Approach

    Artech House Publishers Managing Complex Technical Projects: A Systems Engineering Approach

    15 in stock

    Book SynopsisThis resource discusses the management of complex technical projects through systems engineering. Written for a wide spectrum of readers, from novices to experienced practitioners, it explores solutions for delivering projects on time and within budget, avoiding the failures and inefficiencies of past efforts. It provides a framework that encapsulates all areas of systems engineering, showing where the multitude of systems engineering activities fit within the overall effort. The top-down approach introduces the reader to the philosophical aspects of this discipline, and offers an understanding of a plethora of important terms, standards and practices that have been developed independently. Moreover, the authors present key systems engineering issues in a manner that seeks to promote individual thinking and unique approaches to the various projects encountered in the field.Table of ContentsIntroduction to Systems Engineering. Conceptual Design. Preliminary Design. Detailed Design and Development. Systems Engineering Management. Systems Engineering Management Tools. Systems Engineering Process Tools. Related Disciplines.

    15 in stock

    £92.14

  • Advanced Systems Thinking in Engineering and Management

    Artech House Publishers Advanced Systems Thinking in Engineering and Management

    15 in stock

    Book SynopsisWritten by an exponent of systems engineering, this is a comprehensive examination of systems thinking and methods, demonstrating how to use the ideas to create and manage more effective engineering systems. Using this resource, engineers should be able to apply systems thinking to the design, implementation and management of engineering systems.Table of ContentsPart A Systems philosophy, systems science: the need for, and value of systems; measure for measure; the human element; systems engineering philosophy; a theory of complexity; systems lifecycle theory; the social genotype. Part B Systems thinking: tools and methods for systems thinking; system thinking at work - cases. Part C System engineering: system concept and design; classification of systems engineering; from systems thinking to systems in operation; operational systems engineering. Part D Systems management and organization: managing systems; societal systems evolution.

    15 in stock

    £91.17

  • Design, Performance & Scalability of the

    Nova Science Publishers Inc Design, Performance & Scalability of the

    Out of stock

    Book SynopsisEnterprise systems supporting business processes in large companies and organizations, are critical for their business survival, and expensive to build and run. This book describes successful approaches to designing, and tuning for performance, large enterprise systems. In contrast to earlier mainframes, the modern distributed systems contain large numbers of components and simple capacity planning methods, applicable to mainframes, cannot be used for design or tuning of complex distributed systems. Methods that have proven to be successful are based on building predictive models that take into account key characteristics of hardware, software, data and communications.

    Out of stock

    £52.69

  • On-Line Monitoring Systems & Computer Tool

    Nova Science Publishers Inc On-Line Monitoring Systems & Computer Tool

    Out of stock

    Book SynopsisThis book presents new results in the construction and methodology of tools to support the development of parallel programs. It focuses on tools for debugging and performance analysis. We can observe two major trends in recent years: on one hand, tool developers want to solve the problem of tool interoperability. This question is crucial for application developers as they want to apply different tools from different producers to their programs at the same time. An infrastructure that provides interoperability could allow us to see synergetic effects when using multiple tools, thus increasing the programmer''s productivity during implementation and testing. On the other hand, there are substantial efforts to automate parts of parallel program development. While this tool automation is not a new area, there remains much to be done. Parallel program development remains the domain of the expert and aficionado. This area continues to be an important one for the programmers and users of high performance computing.

    Out of stock

    £63.19

  • Ford Focus petrol & diesel (Oct '14-'18) 64 to 18

    Haynes Publishing Group Ford Focus petrol & diesel (Oct '14-'18) 64 to 18

    15 in stock

    Book SynopsisEvery manual is written from hands-on experience gained from stripping down and rebuilding each vehicle in the Haynes Project Workshop. The practical step-by-step instructions and clear photos are easy to follow and provide information on maintenance, servicing, fault finding, the MoT, brakes, electrics and Haynes tips to make many tasks easier.

    15 in stock

    £25.20

  • How to Set Up Information Systems: A

    Taylor & Francis Ltd How to Set Up Information Systems: A

    15 in stock

    Book SynopsisThis introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.Trade Review[An] excellent book.' Guy Fitzgerald, , Professor of Information Systems, Brunel University 'The book stands out in its field through the intelligent and constructive use of the soft systems methodology to develop the themes' Peter Roberts, former Visiting Professor, Open University and City University 'A useful text for teachers and practitioners of a Multiview approach to information analysis and design. It has matured and gained focus in this new edition' Gilbert Mansell, Head of Department of Multimedia and Information Systems, University of Huddersfield 'A textbook for people intending to practice information systems analysis and design.' SciTech Book NewsTable of ContentsInformation Systems and Organization * What is Systems Analysis and Systems Design? * The Role of the Systems Planner or Systems Analyst * Selecting Planning and Development Tools * The Human Activity System: Making a Model * Information Modelling: Making a Workable System * Technical and Social Needs: The Balance * The Human-Computer Interface * Technical Aspects: What is Needed? * Total Design, Training, Hardware, Software and Implementation * Glossary, Appendices, Further Reading, Index

    15 in stock

    £123.50

  • How to Set Up Information Systems: A

    Taylor & Francis Ltd How to Set Up Information Systems: A

    15 in stock

    Book SynopsisThis introductory user's guide to systems analysis and systems design focuses on building sustainable information systems to meet tomorrow's needs. It shows how practitioners can apply multiple participatory perspectives in development, so as to avoid future problems. As a practical guide, it is presented to be readily comprehensible and is organized to enable users to concentrate on their goals efficiently, and with minimum theoretical elaboration. The chapters follow the sequence involved in planning an information system, explaining key words, the time involved in each step, ending with a tutorial or exercises.Trade Review[An] excellent book.' Guy Fitzgerald, , Professor of Information Systems, Brunel University 'The book stands out in its field through the intelligent and constructive use of the soft systems methodology to develop the themes' Peter Roberts, former Visiting Professor, Open University and City University 'A useful text for teachers and practitioners of a Multiview approach to information analysis and design. It has matured and gained focus in this new edition' Gilbert Mansell, Head of Department of Multimedia and Information Systems, University of Huddersfield 'A textbook for people intending to practice information systems analysis and design.' SciTech Book NewsTable of ContentsInformation Systems and Organization * What is Systems Analysis and Systems Design? * The Role of the Systems Planner or Systems Analyst * Selecting Planning and Development Tools * The Human Activity System: Making a Model * Information Modelling: Making a Workable System * Technical and Social Needs: The Balance * The Human-Computer Interface * Technical Aspects: What is Needed? * Total Design, Training, Hardware, Software and Implementation * Glossary, Appendices, Further Reading, Index

    15 in stock

    £52.24

  • Manual of Repairing & Reconditioning Starter Motors and Alternators

    15 in stock

    £14.76

  • A Risk Management Approach to Business Continuity: Aligning Business Continuity with Corporate Governance

    15 in stock

    £63.00

  • Effective Call Center Training: Soft Skills

    Excel Books Effective Call Center Training: Soft Skills

    1 in stock

    Book Synopsis

    1 in stock

    £17.24

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account