Computer science Books
Pearson Education Edexcel GCSE 91 Computer Science Student Book
Book SynopsisThe Pearson Edexcel GCSE (9-1) Computer Science Student Book will support you through your GCSE in computer science with a scenario-based approach to problem solving and computational thinking. The content is designed to inspire and motivate by helping you to relate and apply your skills to real-world contexts and make learning relevant.Table of Contents Chapter 1: Problem solving Chapter 2: Programming Chapter 3: Data Chapter 4: Computers Chapter 5: Communication and the internet Chapter 6: The bigger picture Glossary
£26.39
John Wiley & Sons Inc Building Winning Algorithmic Trading Systems
Book SynopsisDevelop your own trading system with practical guidance and expert advice In Building Algorithmic Trading Systems: A Trader's Journey From Data Mining to Monte Carlo Simulation to Live Training, award-winning trader Kevin Davey shares his secrets for developing trading systems that generate triple-digit returns.Table of ContentsAcknowledgments ix About the Author x Introduction 1 Part I A Trader’s Journey 7 Chapter 1 The Birth of a Trader 9 Chapter 2 Enough Is Enough 15 Chapter 3 World Cup Championship of Futures Trading ® Triumph 23 Chapter 4 Making the Leap—Transitioning to Full Time 33 Part II Your Trading System 41 Chapter 5 Testing and Evaluating a Trading System 43 Chapter 6 Preliminary Analysis 53 Chapter 7 Detailed Analysis 61 Chapter 8 Designing and Developing Systems 71 Part III Developing a Strategy 77 Chapter 9 Strategy Development—Goals and Objectives 79 Chapter 10 Trading Idea 83 Chapter 11 Let’s Talk about Data 93 Chapter 12 Limited Testing 103 Chapter 13 In-Depth Testing/Walk-Forward Analysis 115 Chapter 14 Monte Carlo Analysis and Incubation 129 Chapter 15 Diversification 133 Chapter 16 Position Sizing and Money Management 139 Chapter 17 Documenting the Process 147 Part IV Creating a System 153 Chapter 18 Goals, Initial and Walk-Forward Testing 155 Chapter 19 Monte Carlo Testing and Incubation 163 Part V Considerations Before Going Live 175 Chapter 20 Account and Position Sizing 177 Chapter 21 Trading Psychology 187 Chapter 22 Other Considerations before Going Live 195 Part VI Monitoring a Live Strategy 203 Chapter 23 The Ins and Outs of Monitoring a Live Strategy 205 Chapter 24 Real Time 219 Part VII Cautionary Tales 233 Chapter 25 Delusions of Grandeur 235 Conclusion 243 Appendix A Monkey Trading Example, TradeStation Easy Language Code 247 Appendix B Euro Night Strategy, TradeStation Easy Language Format 255 Appendix C Euro Day Strategy, TradeStation Easy Language Format 259 About the Companion Web Site 263 Index 265
£51.00
John Wiley & Sons Inc Beyond Cybersecurity
Book SynopsisMove beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprietary research, client experience, and interviews with over 200 executives, regulators, and security experts, offering you a well-rounded, thoroughly researched resource that presents its findings in an organized, approachable style. Members of the global economy have spent years and tens of billions of dollars fighting cyber threatsbut attacks remain an immense concern in the world of online business. The threat of data compromise that can lead to the leak of important financial and personal details can make consumers suspicious of the digital economy, and cause a noseTable of ContentsForeword vii Preface xi Executive Summary xxi 1 Cyber-attacks Jeopardize Companies’ Pace of Innovation 1 2 It Could Get Better—or $3 Trillion Worse 31 3 Prioritize Risks and Target Protections 53 4 Do Business in a Digitally Resilient Way 77 5 Modernize IT to Secure IT 101 6 Engage Attackers with Active Defense 123 7 After the Breach: Improve Incident Response across Business Functions 141 8 Build a Program that Drives toward Digital Resilience 157 9 Creating a Resilient Digital Ecosystem 185 Conclusion 209 Acknowledgments 213 About the Authors 215 Index 217
£24.79
Centre for the Study of Language & Information Things a Computer Scientist Rarely Talks About
Book SynopsisHow does a computer scientist understand infinity? What can probability theory teach us about free will? Can mathematical notions be used to enhance one's personal understanding of the Bible? This book contains six informal lectures by computer scientist Donald E. Knuth exploring the relationship between his vocation and his faith, revealing the unique perspective that his work with computing has lent to his understanding of God. Knuth's starting point is his 3:16 project, an application of mathematical "random sampling" to the books of the Bible. The first lectures tell the story of the project's conception and execution, exploring the complex dimensions of language translation, aesthetics, and theological history. Knuth also reveals the many insights that he has gained along the way from such interdisciplinary work. The theological musings culminate in a final lecture which tackles infinity, free will, and the other "big questions" that lie at the juncture of theology and computation. Each lecture ends with a question and answer exchange.
£19.00
MIT Press Category Theory for the Sciences The MIT Press
Book SynopsisAn introduction to category theory as a rigorous, flexible, and coherent modeling language that can be used across the sciences.Category theory was invented in the 1940s to unify and synthesize different areas in mathematics, and it has proven remarkably successful in enabling powerful communication between disparate fields and subfields within mathematics. This book shows that category theory can be useful outside of mathematics as a rigorous, flexible, and coherent modeling language throughout the sciences. Information is inherently dynamic; the same ideas can be organized and reorganized in countless ways, and the ability to translate between such organizational structures is becoming increasingly important in the sciences. Category theory offers a unifying framework for information modeling that can facilitate the translation of knowledge between disciplines.Written in an engaging and straightforward style, and assuming little background in mathematics, the book is
£49.40
Technics Publications LLC DAMA-DMBOK Guide: The DAMA Guide to the Data
Book Synopsis
£61.59
John Wiley & Sons Inc Green IT For Dummies
Book SynopsisGreen technology is not only good for the environment; it's also good for your bottom line. If your organization is exploring ways to save energy and reduce environmental waste, Green IT For Dummies can help you get there. This guide is packed with cost-saving ways to make your company a leader in green technology.Table of ContentsIntroduction. Part I: Understanding the World of Green IT. Chapter 1: Win-Win-Winning with Green IT. Chapter 2: Making the Business Case for Green IT. Chapter 3: Green Journeys in Action. Part II: Getting a Running Start. Chapter 4: Getting to Know the Standards and Metrics. Chapter 5: Assessing Your Current Energy Use and Needs. Chapter 6: Go Green in 12 Months: Putting Together a Plan. Part III: Greening the Data Center. Chapter 7: Laying the Foundation for Green Data Management. Chapter 8: Maximizing Data Center Efficiency. Chapter 9: Racking Up Green Servers. Chapter 10: Cooling Your Data Center. Chapter 11: Building a Green Storage System. Chapter 12: Grooming the Network for Green. Chapter 13: Using Virtualization. Part IV: Greening the Office. Chapter 14: Moving to Green Screens and Computing Machines. Chapter 15: Reducing Desktop Energy Waste. Chapter 16: Pursuing the Less-Paper Office. Chapter 17: Evaluating Green Gadgetry. Part V: Greening the Organization. Chapter 18: Greening the Facility. Chapter 19: e-Waste Not, e-Want Not. Chapter 20: Virtually There: Collaboration Technologies for a Greener World. Part VI: The Part of Tens. Chapter 21: Ten Organizations That Can Help with Green IT Objectives. Chapter 22: Ten Creative Computer Recycling Tips. Chapter 23: Ten Tips for a Green Home Office. Appendix A: Consumption and Savings Worksheets. Index.
£20.69
Princeton University Press Discrete and Computational Geometry
Book SynopsisAn essential introduction to discrete and computational geometryDiscrete geometry is a relatively new development in pure mathematics, while computational geometry is an emerging area in applications-driven computer science. Their intermingling has yielded exciting advances in recent years, yet what has been lacking until now is an undergraduate textbook that bridges the gap between the two. Discrete and Computational Geometry offers a comprehensive yet accessible introduction to this cutting-edge frontier of mathematics and computer science.This book covers traditional topics such as convex hulls, triangulations, and Voronoi diagrams, as well as more recent subjects like pseudotriangulations, curve reconstruction, and locked chains. It also touches on more advanced material, including Dehn invariants, associahedra, quasigeodesics, Morse theory, and the recent resolution of the Poincaré conjecture. Connections to real-world applications are made throughout, and algorithms are presented independently of any programming language. This richly illustrated textbook also features numerous exercises and unsolved problems. The essential introduction to discrete and computational geometry Covers traditional topics as well as new and advanced material Features numerous full-color illustrations, exercises, and unsolved problems Suitable for sophomores in mathematics, computer science, engineering, or physics Rigorous but accessible An online solutions manual is available (for teachers only) Trade Review"Discrete and Computational Geometry meets an urgent need for an undergraduate text bridging the theoretical sides and the applied sides of the field. It is an excellent choice as a textbook for an undergraduate course in discrete and computational geometry! The presented material should be accessible for most mathematics or computer science majors in their second or third year in college. The book also is a valuable resource for graduate students and researchers."--Egon Schulte, Zentralblatt MATH "[W]e recommend this book for an undergraduate course on computational geometry. In fact, we hope to use this book ourselves when we teach such a class."--Brittany Terese Fasy and David L. Millman, SigAct News
£56.00
Automatic Press / VIP Philosophy of Computing and Information: 5 Questions
£18.65
John Wiley & Sons Inc Cryptography for Dummies
Book SynopsisCryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking. This book explains the basics of encryption and various techniques and introduces readers to the terminology used in the subject.Trade Review“…a useful guide for anyone bamboozled by encryption…” (PC Utilities, June 2004) “The reader can dip into it whenever the mood takes them…” (MicroMart, 29th April 2004)Table of ContentsIntroduction 1 About This Book 2 How to Use This Book 2 What You Don’t Need to Read 3 Foolish Assumptions 3 How This Book Is Organized 3 Part I: Crypto Basics & What You Really Need to Know 4 Part II: Public Key Infrastructure 4 Part III: Putting Encryption Technologies to Work for You 4 Part IV: The Part of Tens 4 Part V: Appendixes 5 Icons Used in This Book 5 Where to Go from Here 5 Part I: Crypto Basics & What You Really Need to Know 7 Chapter 1: A Primer on Crypto Basics 9 It’s Not about James Bond 9 Go with the rhythm 10 Rockin’ the rhythm 11 Getting to Know the Basic Terms 12 What Makes a Cipher? 13 Concealment ciphers 13 Substitution ciphers 14 Transposition ciphers 15 Hash without the corned beef 16 XOR what? 17 Breaking Ciphers 20 Not-so-secret keys 20 Known plaintext 21 Pattern recognition 21 What a brute! 21 Cryptosystems 22 Everyday Uses of Encryption 23 Network logons and passwords 23 Secure Web transactions 25 ATMs 26 Music and DVDs 27 Communication devices 28 Why Encryption Isn’t More Commonplace 28 Difficulty in understanding the technology 29 You can’t do it alone 29 Sharing those ugly secrets 30 Cost may be a factor 30 Special administration requirements 31 Chapter 2: Major League Algorithms 33 Beware of “Snake Oil” 34 Symmetric Keys Are All the Same 37 The key table 37 Key generation and random numbers 38 Protecting the Key 39 Symmetric Algorithms Come in Different Flavors 40 Making a hash of it 40 Defining blocks and streams 42 Which is better: Block or stream? 44 Identifying Symmetric Algorithms 45 Des 45 Triple DES 45 Idea 46 Aes 46 Asymmetric Keys 47 Rsa 48 Diffie-Hellman (& Merkle) 49 Pgp 50 Elliptical Curve Cryptography 50 Working Together 52 Chapter 3: Deciding What You Really Need 53 Justifying the Costs to Management 53 Long-term versus short-term 54 Tangible versus intangible results 55 Positive ROI 55 Government due diligence 60 Insurers like it! 61 Presenting your case 61 Do You Need Secure Communications? 62 Secure e-mail 62 Instant Messaging (IM) 64 Secure e-commerce 64 Online banking 66 Virtual Private Networks (VPNs) 66 Wireless (In)security 68 Do You Need to Authenticate Users? 69 Who are your users? 70 Authentication tokens 71 Smart cards 72 Java tokens 73 Biometrics 74 Do You Need to Ensure Confidentiality and Integrity? 75 Protecting Personal Data 75 What’s It Gonna Cost? 77 Chapter 4: Locks and Keys 79 The Magic Passphrase 80 The weakest link 81 Mental algorithms 82 Safety first! 84 Passphrase attacks 86 Don’t forget to flush! 87 The Key Concept 88 Key generation 89 Protecting your keys 90 What to do with your old keys 91 Some cryptiquette 91 Part II: Public Key Infrastructure 93 Chapter 5: The PKI Primer 95 What Is PKI? 96 Certificate Authorities (CAs) 97 Digital Certificates 98 Desktops, laptops, and servers 100 Key servers 102 Registration Authorities (RAs) 103 Uses for PKI Systems 103 Common PKI Problems 105 Chapter 6: PKI Bits and Pieces 107 Certificate Authorities 108 Pretenders to the throne 110 Registration Authorities 110 Certificate Policies (CPs) 111 Digital Certificates and Keys 112 D’basing Your Certificates 113 Certificate Revocation 114 Picking the PKCS 115 PKCS #1: RSA Encryption Standard 115 PKCS #3: Diffie-Hellman Key Agreement Standard 115 PKCS #5: Password-Based Cryptography Standard 115 PKCS #6: Extended-Certificate Syntax Standard 116 PKCS #7: Cryptographic Message Syntax Standard 116 PKCS #8: Private-Key Information Syntax Standard 116 PKCS #9: Selected Attribute Types 117 PKCS #10: Certification Request Syntax Standard 117 PKCS #11: Cryptographic Token Interface Standard 117 PKCS #12: Personal Information Exchange Syntax Standard 118 PKCS #13: Elliptic Curve Cryptography Standard 118 PKCS #14: Pseudo-Random Number Generation Standard 118 PKCS #15: Cryptographic Token Information Format Standard 118 Chapter 7: All Keyed Up! 119 So, What Exactly IS a Key? 120 Making a Key 120 The Long and Short of It 121 Randomness in Keys Is Good 122 Storing Your Keys Safely 123 Keys for Different Purposes 124 Keys and Algorithms 124 One Key; Two Keys 125 Public/private keys 126 The magic encryption machine 127 The magic decryption machine 128 Symmetric keys (again) 129 Trusting Those Keys 129 Key Servers 130 Keeping keys up to date 131 Policies for keys 132 Key escrow and key recovery 132 Part III: Putting Encryption Technologies to Work for You 135 Chapter 8: Securing E-Mail from Prying Eyes 137 E-Mail Encryption Basics 138 S/mime 138 Pgp 139 Digital Certificates or PGP Public/Private Key Pairs? 140 What’s the diff? 140 When should you use which? 141 Sign or encrypt or both? 141 Remember that passphrase! 142 Using S/MIME 142 Setting up S/MIME in Outlook Express 143 Backing up your Digital Certificates 151 Fun and Games with PGP 153 Setting up PGP 154 Deciding on the options 156 Playing with your keyring 160 Sending and receiving PGP messages 162 PGP in the enterprise 164 Other Encryption Stuff to Try 164 Chapter 9: File and Storage Strategies 167 Why Encrypt Your Data? 168 Encrypted Storage Roulette 170 Symmetric versus asymmetric? 171 Encrypting in the air or on the ground? 173 Dealing with Integrity Issues 174 Message digest/hash 174 MACs 175 HMACs 175 Tripwire 176 Policies and Procedures 177 Examples of Encryption Storage 178 Media encryption 179 Encrypting File System 180 Secure e-mail 181 Program-specific encryption 181 Encrypted backup 181 Chapter 10: Authentication Systems 183 Common Authentication Systems 185 Kerberos 185 Ssh 186 Radius 187 Tacacs+ 188 Authentication Protocols 188 How Authentication Systems Use Digital Certificates 190 Tokens, Smart Cards, and Biometrics 191 Digital Certificates on a PC 191 Time-based tokens 192 Smartcard and USB Smartkeys 193 Biometrics 194 Chapter 11: Secure E-Commerce 197 SSL Is the Standard 198 A typical SSL connection 199 Rooting around your certificates 201 Time for TLS 203 Setting Up an SSL Solution 204 What equipment do I need? 205 The e-commerce manager’s checklist 206 XML Is the New Kid on the Block 209 Going for Outsourced E-Commerce 210 Chapter 12: Virtual Private Network (VPN) Encryption 213 How Do VPNs Work Their Magic? 214 Setting Up a VPN 214 What devices do I need? 215 What else should I consider? 216 Do VPNs affect performance? 216 Don’t forget wireless! 217 Various VPN Encryption Schemes 217 PPP and PPTP 217 L2tp 218 IPsec 218 Which Is Best? 220 Testing, Testing, Testing 221 Chapter 13: Wireless Encryption Basics 223 Why WEP Makes Us Weep 224 No key management 225 Poor RC4 implementation 225 Authentication problems 226 Not everything is encrypted 226 WEP Attack Methods 227 Finding wireless networks 228 War chalking 228 Wireless Protection Measures 230 Look for rogue access points 230 Change the default SSIDs 230 Turn on WEP 231 Position your access points well 232 Buy special antennas 232 Use a stronger encryption scheme 232 Use a VPN for wireless networks 232 Employ an authentication system 233 Part IV: The Part of Tens 235 Chapter 14: The Ten Best Encryption Web Sites 237 Mat Blaze’s Cryptography Resource on the Web 237 The Center for Democracy and Technology 237 SSL Review 238 How IPsec Works 238 Code and Cipher 238 CERIAS — Center for Education and Research in Information Assurance and Security 238 The Invisible Cryptologists — African Americans, WWII to 1956 239 Bruce Schneier 239 North American Cryptography Archives 239 RSA’s Crypto FAQ 239 Chapter 15: The Ten Most Commonly Misunderstood Encryption Terms 241 Military-Grade Encryption 241 Trusted Third Party 241 X 509 Certificates 242 Rubber Hose Attack 242 Shared Secret 242 Key Escrow 242 Initialization Vector 243 Alice, Bob, Carol, and Dave 243 Secret Algorithm 243 Steganography 244 Chapter 16: Cryptography Do’s and Don’ts 245 Do Be Sure the Plaintext Is Destroyed after a Document Is Encrypted 245 Do Protect Your Key Recovery Database and Other Key Servers to the Greatest Extent Possible 246 Don’t Store Your Private Keys on the Hard Drive of Your Laptop or Other Personal Computing Device 246 Do Make Sure Your Servers’ Operating Systems Are “Hardened” before You Install Cryptological Systems on Them 246 Do Train Your Users against Social Engineering 247 Do Create the Largest Key Size Possible 247 Do Test Your Cryptosystem after You Have It Up and Running 248 Do Check the CERT Advisories and Vendor Advisories about Flaws and Weaknesses in Cryptosystems 248 Don’t Install a Cryptosystem Yourself If You’re Not Sure What You Are Doing 248 Don’t Use Unknown, Untested Algorithms 249 Chapter 17: Ten Principles of “Cryptiquette” 251 If Someone Sends You an Encrypted Message, Reply in Kind 251 Don’t Create Too Many Keys 251 Don’t Immediately Trust Someone Just Because He/She Has a Public Key 252 Always Back Up Your Keys and Passphrases 252 Be Wary of What You Put in the Subject Line of Encrypted Messages 252 If You Lose Your Key or Passphrase, Revoke Your Keys as Soon as Possible 253 Don’t Publish Someone’s Public Key to a Public Key Server without His/Her Permission 253 Don’t Sign Someone’s Public Key Unless You Have Reason To 253 If You Are Corresponding with Someone for the First Time, Send an Introductory Note Along with Your Public Key 254 Be Circumspect in What You Encrypt 254 Chapter 18: Ten Very Useful Encryption Products 255 PGP: Pretty Good Privacy 255 Gaim 255 madeSafe Vault 256 Password Safe 256 Kerberos 256 OpenSSL and Apache SSL 256 SafeHouse 257 WebCrypt 257 Privacy Master 257 Advanced Encryption Package 257 Part V: Appendixes 259 Appendix A: Cryptographic Attacks 261 Known Plaintext Attack 262 Chosen Ciphertext Attacks 262 Chosen Plaintext Attacks 263 The Birthday Attack 263 Man-in-the-Middle Attack 263 Timing Attacks 264 Rubber Hose Attack 264 Electrical Fluctuation Attacks 265 Major Boo-Boos 265 Appendix B: Glossary 267 Appendix C: Encryption Export Controls 279 Index 283
£23.99
Cengage Learning, Inc Fundamentals of Python
Book SynopsisMaster today's required computer science topics while preparing for further study with Lambert's FUNDAMENTALS OF PYTHON: FIRST PROGRAMS. This book's easygoing approach is ideal, no matter what your background. The approach starts with simple algorithmic code and then scales into working with functions, objects, and classes as the problems become more complex and require new abstraction mechanisms. Rather than working only with numeric or text-based applications like other introductory texts, this edition presents graphics, image manipulation, GUIs, and simple networked client/server applications. The author uses Python's standard Turtle graphics module to introduce graphics and to provide open source frameworks for easy image processing and GUI application development.Table of Contents1. Introduction. 2. Data Types and Expressions. 3. Control Statements. 4. Strings and Text Files. 5. Lists and Dictionaries. 6. Design with Functions. 7. Simple Graphics and Image Processing. 8. Graphical User Interfaces. 9. Design with Classes. 10. Network Applications and Client/Server Programming. 11. Searching, Sorting, and Complexity. Appendices. Glossary. Index.
£66.49
Pragmatic Bookshelf Practical Programming, 3e: An Introduction to
Book SynopsisClassroom-tested by tens of thousands of students, this new edition of the bestselling intro to programming book is for anyone who wants to understand computer science. Learn about design, algorithms, testing, and debugging. Discover the fundamentals of programming with Python 3.6--a language that's used in millions of devices. Write programs to solve real-world problems, and come away with everything you need to produce quality code. This edition has been updated to use the new language features in Python 3.6. No programming experience required! Incremental examples show you the steps and missteps that happen while developing programs, so you know what to expect when you tackle a problem on your own. Inspired by "How to Design Programs" (HtDP), discover a five-step recipe for designing functions, which helps you learn the concepts--and becomes an integral part of writing programs. In this detailed introduction to Python and to computer programming, find out exactly what happens when your programs are executed. Work with numbers, text, big data sets, and files using real-world examples. Create and use your own data types. Make your programs reliable, work with databases, download data from the web automatically, and build user interfaces. As you use the fundamental programming tools in this book, you'll see how to document and organize your code so that you and other programmers can more easily read and understand it. This new edition takes advantage of Python 3.6's new features, including type annotations on parameters, return types and variable declarations, and changes to string formatting. Most importantly, you'll learn how to think like a professional programmer. What You Need: You'll need to download Python 3.6, available from https://python.org. With that download comes IDLE, the editor we use for writing and running Python programs. (If you use Linux, you may need to install Python 3.6 and IDLE separately.)
£37.99
University of Minnesota Press Debates in the Digital Humanities
Book SynopsisLeading figures in the digital humanities explore the field’s rapid revolutionTrade Review"Is there such a thing as ‘digital’ humanities? From statistical crunches of texts to new forms of online collaboration and peer review, it’s clear something is happening. This book is an excellent primer on the arguments over just how much is changing—and how much more ought to—in the way scholars study the humanities." —Clive Thompson, columnist for Wired and contributing writer for the New York Times Magazine "I look forward to the day when anxieties about the disruptive nature of ‘digital humanities’ fade into memory and the innovative methods, theories, and approaches championed by those who have contributed to this valuable volume are respected across academia for their rigor and utility. This book will go a long way toward clarifying the debates within and about digital humanities." —Siva Vaidhyanathan, author of The Googlization of Everything—and Why We Should Worry"Though Debates in the Digital Humanities is well over 500 pages in length, there is no fat in it; all essays contain important information and concepts relating to DH. Taken together, the book as a whole and every essay in it is a must-read for anyone who claims to be a digital humanist whether she or he works in theory, pedagogy, and/or practice." —Leonardo ReviewsTable of ContentsContentsIntroduction: The Digital Humanities MomentMatthew K. GoldPart I. Defining the Digital Humanities1. What Is Digital Humanities and What’s It Doing in English Departments?Matthew Kirschenbaum2. The Humanities, Done DigitallyKathleen Fitzpatrick3. This Is Why We Fight: Defining the Values of the Digital HumanitiesLisa Spiro4. Beyond the Big TentPatrik SvenssonBlog PostsThe Digital Humanities SituationRafael AlvaradoWhere’s the Beef? Does Digital Humanities Have to Answer Questions?Tom ScheinfeldtWhy Digital Humanities Is “Nice”Tom ScheinfeldtAn Interview with Brett BobleyMichael Gavin and Kathleen Marie SmithDay of DH: Defining the Digital HumanitiesPart II. Theorizing the Digital Humanities5. Developing Things: Notes toward an Epistemology of Building in the Digital HumanitiesStephen Ramsay and Geoffrey Rockwell6. Humanistic Theory and Digital ScholarshipJohanna Drucker7. This Digital Humanities which Is Not OneJamie “Skye” Bianco8. A Telescope for the Mind?Willard McCartyBlog PostsSunset for Ideology, Sunrise for Methodology?Tom ScheinfeldtHas Critical Theory Run Out of Time for Data-Driven Scholarship?Gary HallThere Are No Digital HumanitiesGary HallPart III. Critiquing the Digital Humanities9. Why Are the Digital Humanities So White?, or, Thinking the Histories of Race and ComputationTara McPherson10. Hacktivism and the Humanities: Programming Protest in the Era of the Digital UniversityElizabeth Losh11. Unseen and Unremarked On: Don DeLillo and the Failure of the Digital HumanitiesMark L. Sample12. Disability, Universal Design, and the Digital HumanitiesGeorge H. Williams13. The Digital Humanities and Its UsersCharlie EdwardsBlog PostsDigital Humanities Triumphant?William PannapackerWhat Do Girls Dig?Bethany NowviskieThe Turtlenecked HairshirtIan BogostEternal September of the Digital HumanitiesBethany NowviskiePart IV. Practicing the Digital Humanities14. Canons, Close Reading, and the Evolution of MethodMatthew Wilkens15. Electronic Errata: Digital Publishing, Open Review, and the Futures of CorrectionPaul Fyfe16. The Function of Digital Humanities Centers at the Present TimeNeil Fraistat17. Time, Labor, and “Alternate Careers” in Digital Humanities Knowledge WorkJulia Flanders18. Can Information Be Unfettered?: Race and the New Digital Humanities CanonAmy E. EarhartBlog PostsThe Social Contract of Scholarly PublishingDaniel J. CohenIntroducing Digital Humanities NowDaniel J. CohenText: A Massively Addressable ObjectMichael WitmoreThe Ancestral TextMichael WitmorePart V. Teaching the Digital Humanities19. Digital Humanities and the “Ugly-Stepchildren” of American Higher EducationLuke Waltzer20. Graduate Education and the Ethics of the Digital HumanitiesAlexander Reid21. Should Liberal Arts Campuses Do Digital Humanities?: Process and Products in the Small College WorldBryan Alexander and Rebecca Frost Davis22. Where’s the Pedagogy?: The Role of Teaching and Learning in the Digital HumanitiesStephen BrierBlog PostsVisualizing Millions of WordsMills KellyWhat’s Wrong with Writing EssaysMark L. SampleLooking for Whitman: A Grand, Aggregated ExperimentMatthew K. Gold and Jim
£25.19
Princeton University Press A Students Guide to Python for Physical Modeling
Book Synopsis
£22.50
Cengage Learning, Inc Data Communication and Computer Networks
Book SynopsisTable of Contents1. Introduction to Computer Networks and Data Communications. 2. Conducted and Radiated Media. 3. Fundamentals of Data and Signals. 4. Connections and Errors. 5. Wired and Wireless Local Area Networks. 6. Network Systems, Services, and Software. 7. Beyond the Local Area Network. 8. Risk, Security, and Compliance. 9. Wide Area Networks. 10. Connecting Networks. 11. Network Design and Management. 12. Business Principles in the Cloud.
£75.99
Cengage Learning, Inc Programming with Python
Book SynopsisIdeal for anyone who has never programmed, McMullen/Matthews/Parsons' PROGRAMMING WITH PYTHON uses a beginner's approach that combines conceptual content with rich examples and hands-on learning activities. Straightforward and student friendly, it emphasizes fundamental computer concepts from a Python programming perspective using a clear presentation with little technical jargon. Modules introduce important computer science concepts, procedural programming and object-oriented programming in short segments, while real-world examples, streamlined code and descriptive figures help you better understand today's computing concepts. As you strengthen your computer science knowledge, you will also sharpen critical-thinking and problem-solving skills -- and build confidence.Table of Contents1. Computational Thinking. 2. Programming Tools. 3. Literals, Variables, and Constants. 4. Numeric Data Types and Expressions. 5. Character and String Data Types. 6. Decision Control Structures. 7. Repetition Control Structures. 8. Lists. 9. Functions. 10. Exceptions. 11. File Operations. 12. Recursion. 13. Modules. 14. Classes and Objects. 15. Methods. 16. Encapsulation. 17. Inheritance. 18. Polymorphism. 19. Linked List Data Structures. 20. Stacks, Queues, and Tables. 21. Trees and Graphs. 22. Algorithm Complexity and Big-O Notation. 23. Search Algorithms. 24. Sorting Algorithms. 25. Processor Architecture. 26. Data Representation. 27. Programming Paradigms. 28. User Interfaces. 29. Software Development Methodologies. 30. Pseudocode, Flowcharts, and Decision Tables. 31. Unified Modeling Language.
£62.69
Cengage Learning, Inc CompTIA A Guide to IT Technical Support
Book SynopsisTable of ContentsCORE 1. Module 1. Taking a Computer Apart and Putting It Back Together. Module 2. All About Motherboards. Module 3. Supporting Processors and Upgrading Memory. Module 4. Power Supplies and Troubleshooting Computer Problems. Module 5. Hard Drives and Other Storage Devices. Module 6. Supporting I/O Devices. Module 7. Networking Fundamentals. Module 8. Network Infrastructure and Cloud Computing. Module 9. Supporting Mobile Devices. Module 10. Supporting Printers. CORE 2. Module 11. The Complex World of IT Professionals. Module 12. Installing Windows. Module 13. Maintaining Windows. Module 14. Troubleshooting Windows After Startup. Module 15. Troubleshooting Windows Startup. Module 16. Security Strategies. Module 17. Securing and Sharing Windows Resources. Module 18. Mobile Device Security. Module 19. Network Security and Troubleshooting. Module 20. Supporting MacOS. Module 21. Linux and Scripting. Appendix A. Safety Procedures and Environmental Concerns. Appendix B. Entry Points for Windows Startup Processes. Appendix C. CompTIA A+ Acronyms.
£71.24
Lonely Scholar Algorithmic Barriers Falling: P=np?
£14.99
WW Norton & Co The Case Against Reality Why Evolution Hid the
Book SynopsisCan we trust our senses to tell us the truth?Trade Review"A masterpiece of logic, rationality, science, and mathematics. Read this book carefully and you will forever change your understanding of reality, both that of the universe and your own self." -- Deepak Chopra, author of The Healing Self"Hoffman’s truly radical theory will force us to ponder reality in a completely different light. Handle with care. Your perception of the world around you is about to be dismantled!" -- Chris Anderson, author of TED Talks"Think you know what’s really out there? Read this breathtaking, whistle-stop tour of a book that illuminates all the profound weirdness masked by our experience and assumptions." -- David Eagleman, best-selling author of The Brain and Incognito"A fresh view into who we truly are—one that transcends the perceptions that we accept as reality. Hoffman unapologetically takes us down a rabbit hole where we learn that all reality is virtual and that truth lies solely in you, the creator." -- Rudolph Tanzi, coauthor of Super Brain"Captivating and courageous…anyone who reads this book will likely never look at the world the same way again. Hoffman challenges us to rethink some of the most basic foundations of neuroscience and physics, which could prove to be exactly what we need to make progress on the most difficult questions we face about the nature of reality." -- Annaka Harris, author of Conscious"In the mood to have your mind blown? In this fascinating, deeply original, and wonderfully engaging book, Hoffman takes us on a tour of the uncharted territory where cognitive science, fundamental physics, and evolutionary biology meet— and where the nature of reality hangs in the balance. You’ll never look at the world— or, rather, your interface— the same way again." -- Amanda Gefter, author of Trespassing on Einstein’s Lawn"Woody Allen once said, ‘I hate reality, but . . . where else can you get a good steak dinner?’ Hoffman turns that joke on its head: What we have always been after is the steak dinner; what we call reality is our best adapted strategy for getting it. Sink your teeth into that!" -- Christopher A. Fuchs, professor of physics, University of Massachusetts Boston"This book is a must-read if you want to bring your understanding of ‘reality’ in sync with the way the World is. You are in for some major surprises and mind expanding. A good read that will set you thinking about yourself, others and the world." -- Jan Koenderink, author of Color for the Sciences
£14.24
Pearson Education (US) OpenACC for Programmers
Book SynopsisSunita Chandrasekaran is assistant professor in the Computer and Information Sciences Department at the University of Delaware. Her research interests include exploring the suitability of high-level programming models and runtime systems for HPC and embedded platforms, and migrating scientific applications to heterogeneous computing systems. Dr. Chandrasekaran was a post-doctoral fellow at the University of Houston and holds a Ph.D. from Nanyang Technological University, Singapore. She is a member of OpenACC, OpenMP, MCA and SPEC HPG. She has served on the program committees of various conferences and workshops including SC, ISC, ICPP, CCGrid, Cluster, and PACT, and has co-chaired parallel programming workshops co-located with SC, ISC, IPDPS, and SIAM. Guido Juckeland is head of the Computational Science Group, Department for Information Services and Computing, Helmholtz-Zentrum Dresden-Rossendorf, and coordinates the work of the GPU Center Table of ContentsForeword xv Preface xxi Acknowledgments xxiii About the Contributors xxv Chapter 1: OpenACC in a Nutshell 1 1.1 OpenACC Syntax 3 1.2 Compute Constructs 6 1.3 The Data Environment 11 1.4 Summary 15 1.5 Exercises 15 Chapter 2: Loop-Level Parallelism 17 2.1 Kernels Versus Parallel Loops 18 2.2 Three Levels of Parallelism 21 2.3 Other Loop Constructs 24 2.4 Summary 30 2.5 Exercises 31 Chapter 3: Programming Tools for OpenACC 33 3.1 Common Characteristics of Architectures 34 3.2 Compiling OpenACC Code 35 3.3 Performance Analysis of OpenACC Applications 36 3.4 Identifying Bugs in OpenACC Programs 51 3.5 Summary 53 3.6 Exercises 54 Chapter 4: Using OpenACC for Your First Program 59 4.1 Case Study 59 4.2 Creating a Naive Parallel Version 68 4.3 Performance of OpenACC Programs 71 4.4 An Optimized Parallel Version 73 4.5 Summary 78 4.6 Exercises 79 Chapter 5: Compiling OpenACC 81 5.1 The Challenges of Parallelism 82 5.2 Restructuring Compilers 88 5.3 Compiling OpenACC 92 5.4 Summary 97 5.5 Exercises 97 Chapter 6: Best Programming Practices 101 6.1 General Guidelines 102 6.2 Maximize On-Device Compute 105 6.3 Optimize Data Locality 108 6.4 A Representative Example 112 6.5 Summary 118 6.6 Exercises 119 Chapter 7: OpenACC and Performance Portability 121 7.1 Challenges 121 7.2 Target Architectures 123 7.3 OpenACC for Performance Portability 124 7.4 Code Refactoring for Performance Portability126 7.5 Summary 132 7.6 Exercises133 Chapter 8: Additional Approaches to Parallel Programming 135 8.1 Programming Models135 8.2 Programming Model Components142 8.3 A Case Study 155 8.4 Summary170 8.5 Exercises170 Chapter 9: OpenACC and Interoperability 173 9.1 Calling Native Device Code from OpenACC 174 9.2 Calling OpenACC from Native Device Code 181 9.3 Advanced Interoperability Topics 182 9.4 Summary185 9.5 Exercises185 Chapter 10: Advanced OpenACC 187 10.1 Asynchronous Operations 187 10.2 Multidevice Programming 204 10.3 Summary 213 10.4 Exercises 213 Chapter 11: Innovative Research Ideas Using OpenACC, Part I 215 11.1 Sunway OpenACC 215 11.2 Compiler Transformation of Nested Loops for Accelerators 224 Chapter 12: Innovative Research Ideas Using OpenACC, Part II 237 12.1 A Framework for Directive-Based High-Performance Reconfigurable Computing 237 12.2 Programming Accelerated Clusters Using XcalableACC 253 Index 269
£35.14
Elsevier Science & Technology Computers as Components
Book Synopsis
£66.56
SDC Publications Design Integration Using Autodesk Revit 2023:
Book SynopsisDesign Integration Using Autodesk Revit 2023 is designed to provide you with a well-rounded knowledge of Autodesk Revit tools and techniques. All three disciplines of the Revit platform are introduced in this textbook.
£68.40
SDC Publications Autodesk AutoCAD Architecture 2024 Fundamentals
Book Synopsis
£59.84
O'Reilly Media Python in a Nutshell
Book SynopsisCarefully curated by recognized experts in Python, this updated fourth edition focuses on version 3.10, bringing this seminal work on the Python language fully up to date on five releases, including preview coverage of upcoming 3.11 features.
£53.99
MIT Press Ltd The Little Learner
Book Synopsis
£45.00
SDC Publications Official Guide to Certified SOLIDWORKS Associate
Book Synopsis
£56.99
John Wiley & Sons Inc AI for Humanity
Book SynopsisCapture the value of cutting-edge AI while mitigating its most salient risks AI For Humanity: Building a Sustainable AI for the Future delivers an incisive and timely discussion of how to design, build, and implement cutting-edge AI in for-profit firms and other organizations in a responsible, sustainable, and ethical way. The book walks you through the three pillars of human-focused AI developmentgovernance, technology, and commercializationand dives deep into each one, showing you how to create AI products and services that better humanity and advance universally held values. You'll find methodologies and frameworks that mitigate against some of the most profound and unsettling risks of unchecked artificial intelligence development, and roadmaps to help you avoid the numerous pitfalls and traps awaiting unsuspecting companies, managers, and executives. You'll also discover: Real-world case studies, from companies including SAP, Huawei, and Tencent, demonstrating the actual dilemmas and questions firms face when developing and implementing this extraordinary techActionable commitments you can make to help ensure you and your company avoid the ethical and reputational risks associated with AIStrategies for AI product and service development consistent with sustainable growth Perfect for managers, executives, directors, and other business leaders with a stake in responsible artificial intelligence design, development, and implementation, AI For Humanity will also interest regulators, academics, thought leaders, and policy makers doing their best to capture AI's substantial potential value while mitigating its most serious risks.
£24.79
SDC Publications Creo Parametric 9.0 Advanced Tutorial
Book SynopsisThe purpose of Creo Parametric 9.0 Advanced Tutorial is to introduce you to some of the more advanced features, commands, and functions in Creo Parametric. Each lesson concentrates on a few of the major topics and the text attempts to explain the whyâs of the commands in addition to a concise step-by-step description of new command sequences.This book is suitable for a second course in Creo Parametric and for users who understand the features already covered in Roger Toogoodâs Creo Parametric Tutorial. The style and approach of the previous tutorial have been maintained from the previous book and the text picks up right where the last tutorial left off.The material covered in this tutorial represents an overview of what is felt to be the most commonly used and important functions. These include customization of the working environment, advanced feature creation (sweeps, round sets, draft and tweaks, UDFs, patterns and family tables), layers, Pro/PROGRAM, and advanced drawing and assembly functions.Creo Parametric 9.0 Advanced Tutorial consists of eight lessons. A continuing theme throughout the lessons is the creation of parts for a medium-sized modeling project. The project consists of a small three-wheeled utility cart. Project parts are given at the end of each lesson that utilize functions presented earlier in that lesson. Final assembly is performed in the last lesson.
£61.75
Cengage Learning, Inc The Shelly Cashman Series Microsoft Office 365Â
Book SynopsisTable of ContentsExcel Module 1: Creating a Worksheet and a Chart. Excel Module 2: Formulas, Functions, and Formatting. Excel Module 3: Working with Large Worksheets, Charting, and What-If Analysis. Excel Module 4: Financial Functions, Data Tables, and Amortization Schedules. Excel Module 5: Working with Multiple Worksheets and Workbooks. Excel Module 6: Creating, Sorting, and Querying a Table. Excel Module 7: Creating Templates, Importing Data, and Working with SmartArt, Images, and Screenshots. Excel Module 8: Working with Trendlines, PivotTable Reports, PivotChart Reports, and Slicers. Excel Module 9: Formula Auditing, Data Validation, and Complex Problem Solving. Excel Module 10: Data Analysis with Power Tools and Creating Macros. Excel Module 11: User Interfaces, Visual Basic for Applications (VBA), and Collaboration Features in Excel.
£69.34
SDC Publications Autodesk Revit 2023 Architecture Basics: From the
Book SynopsisAutodesk Revit 2023 Architecture Basics is geared towards beginning architectural students or professional architects who want to get a jump-start into 3D parametric modeling for commercial structures.
£62.70
O'Reilly Media The Rules of Programming
Book SynopsisThis philosophy-of-programming guide presents a unique and entertaining take on how to think about programming. A collection of 21 pragmatic rules, each presented in a standalone chapter, captures the essential wisdom that every freshly minted programmer needs to know and provides thought-provoking insights for more seasoned programmers.
£27.74
Cengage Learning, Inc Programming With Microsoft Visual Basic 20192022
Book SynopsisWith PROGRAMMING WITH MICROSOFT VISUAL BASIC 2019/2022 by bestselling technology author Diane Zak, even readers with no prior programming experience can quickly learn how to effectively plan and create interactive Visual Basic 2019/2022 applications. A dynamic visual presentation, timely examples, step-by-step tutorials and practical exercises addressing a variety of learning styles make this the ideal introduction to programming. Through hands-on applications in a real-world setting, you will master the fundamentals of effective programming while working through Visual Basic 2019/2022's latest features. In addition to planning and creating your own Windows applications, you will learn about graphical user interface design skills, object-oriented programming concepts and planning tools such as Planning Charts, pseudocode and flowcharts. Also available: MindTap online learning platform.Table of Contents1. An Introduction to Visual Studio 2019/2022 and Visual Basic. 2. Planning Applications and Designing Interfaces. 3. Coding with Variables, Named Constants, and Calculations. 4. The Selection Structure. 5. The Repetition Structure. 6. Sub and Function Procedures. 7. String Manipulation. 8. Arrays. 9. Sequential Access Files and Menus. 10. Classes and Objects. 11. SQL Server Databases. 12. Database Queries with SQL. 13. Web Applications. Appendix A: GUI Design Guidelines. Appendix B: Additional Topics. Appendix C: Finding and Fixing Program Errors. Appendix D: Visual Basic 2019/2022 Cheat Sheet. Appendix E: Case Projects.
£68.39
John Wiley & Sons Inc Practical Industrial Cybersecurity
Book SynopsisTable of ContentsIntroduction xxiii Chapter 1 Industrial Control Systems 1 Introduction 2 Basic Process Control Systems 3 Closed- Loop Control Systems 5 Industrial Process Controllers 6 Supervisory Control and Data Acquisition Systems 20 System Telemetry 21 Utility Networks 23 OT/IT Network Integration 25 Industrial Safety and Protection Systems 28 Safety Instrument Systems 29 Review Questions 39 Exam Questions 41 Chapter 2 ICS Architecture 43 Introduction 44 Network Transmission Media 45 Copper Cabling 45 Fiber- Optic Cabling 46 Industrial Network Media Standards 49 Ethernet Connectivity 52 External Network Communications 53 Transmission Media Vulnerabilities 55 Field Device Architecture 56 PLC I/O Sections 58 PLC Implementations 62 Industrial Sensors 63 Final Control Elements/Actuators 71 Relays 73 Process Units 76 Industrial Network Protocols 79 Common Industrial Protocols 79 EtherNet/IP Protocol 79 Modbus 80 ProfiNet/ProfiBus 81 Dnp3 82 Iccp 83 Opc 83 BACnet 83 Enterprise Network Protocols 84 Tcp/ip 84 Dynamic Host Configuration Protocol 89 Review Questions 90 Exam Questions 91 Chapter 3 Secure ICS Architecture 95 Introduction 96 Boundary Protection 97 Firewalls 98 Proxies 104 Security Topologies 105 Network Switches 106 Routers 108 Security Zoning Models 109 Flat Network Topologies 113 Network Segmentation 122 Controlling Intersegment Data Movement 128 Tunneling 128 Wireless Networking 129 Wireless Sensors 131 Wireless Gateways 134 Modems 135 Review Questions 137 Exam Questions 139 Chapter 4 ICS Module and Element Hardening 143 Introduction 145 Endpoint Security and Hardening 145 User Workstation Hardening 145 BIOS Security Subsystems 147 Additional Outer Perimeter Access Hardening 148 Mobile Device Protection 154 OS Security/Hardening 155 File System Security 156 Operating System Security Choices 160 Linux SystemV vs Systemd 160 Hardening Operating Systems 162 Common Operating System Security Tools 162 Virtualization 169 Application Software Security 172 Software Exploitation 172 Information Leakage 173 Applying Software Updates and Patches 174 Database Hardening 174 SQL Injection 175 Anti-Malware 177 Antivirus 178 Anti-spyware 178 Anti- Malware: Sanitization 181 Embedded Device Security 182 Meters 184 Network Hardening 189 OT/IT Network Security 189 Server Security 191 Hardening the Server OS 193 Logical Server Access Control 194 Hardening Network Connectivity Devices 196 Review Questions 201 Exam Questions 202 Chapter 5 Cybersecurity Essentials for ICS 205 Introduction 207 Basic Security Tenets 208 Confidentiality, Integrity, and Availability 208 Availability in ICS Networks 209 Nonrepudiation 210 Principle of Least Privilege 211 Separation of Duties 211 Vulnerability and Threat Identification 212 Nation- States 213 Cyberterrorists 213 Cybercriminals 214 Insider Threats 216 Events, Incidents, and Attacks 217 Threat Vectors 217 Weaponization 230 Delivery 230 Exploitation 231 Installation 232 Command and Control 233 Actions on Objectives 233 Attack Methods 234 Unauthorized Access 251 Cryptographics 260 Encryption 262 Digital Certificates 264 Public Key Infrastructure 264 Hashing 266 Resource Constraints 267 Review Questions 268 Exam Questions 268 Chapter 6 Physical Security 271 Introduction 272 Infrastructure Security 273 Access Control 274 Physical Security Controls 276 Authentication Systems 278 Remote Access Monitoring and Automated Access Control Systems 286 Intrusion Detection and Reporting Systems 289 Security Controllers 290 Video Surveillance Systems 295 Cameras 297 IP Cameras 297 Pan- Tilt- Zoom Cameras 298 Physical Security for ICS 306 Industrial Processes/Generating Facilities 307 Control Center/Company Offices 307 Nerc Cip-006-1 309 Review Questions 311 Exam Questions 312 Chapter 7 Access Management 315 Introduction 316 Access Control Models 317 Mandatory Access Control 317 Discretionary Access Control 318 Role- Based Access Control 318 Rule- Based Access Control 319 Attribute- Based Access Control 319 Context- Based Access Control 320 Key Security Components within Access Controls 320 Directory Services 321 Active Directory 321 Linux Directory Services 324 Application Runtime and Execution Control 326 User Access Management 326 Establishing User and Group Accounts 328 Group Account Security 330 Network Authentication Options 331 Establishing Resource Controls 332 ICS Access Control 334 Remote ICS Access Control 336 Access Control for Cloud Systems 340 Review Questions 343 Exam Questions 344 Chapter 8 ICS Security Governance and Risk Management 347 Introduction 348 Security Policies and Procedure Development 348 Requirements 349 Exceptions and Exemptions 350 Standards 351 ICS Security Policies 356 Risk Management 357 Asset Identification 358 Risk Assessment 359 Risk Identification Vulnerability Assessment 362 Impact Assessment 363 ICS Risk Assessments 364 Risk Mitigation 366 Nerc Cip-008 367 Review Questions 369 Exam Questions 370 Chapter 9 ICS Security Assessments 373 Introduction 374 Security Assessments 374 ICS Device Testing 376 Vulnerability 376 Supply Chain 377 Communication Robustness Testing 382 Fuzzing 382 ICS Penetration Testing 384 The Pentest Process 385 Security Testing Tools 392 Packet Sniffers 392 Network Enumeration/Port Scanning 393 Port Scanning 395 Vulnerability Scanning 395 Review Questions 401 Exam Questions 402 Chapter 10 ICS Security Monitoring and Incident Response 405 Introduction 407 ICS Lifecycle Challenges 408 Change Management 408 Establishing a Security Baseline 409 Change Management Documentation 411 Configuration Change Management 412 Controlling Patch Distribution and Installation for Systems 414 Monitoring 419 Event Monitoring 420 Network Monitoring 421 Security Monitoring 423 Logging and Auditing 424 Event Logging 425 Incident Management 433 The Incident Response Lifecycle 434 Preparation 435 Incident Response 442 Recovery 445 Post- Incident Activities 446 Review Questions 449 Exam Questions 450 Chapter 11 Disaster Recovery and Business Continuity 453 Introduction 454 Business Continuity Plans 455 System Redundancy 455 Local Virtualized Storage 459 System Backup and Restoration 462 Backup Options 463 Backup Media Rotation 466 Securing Backup Media 467 Other BCP Considerations 467 Disaster Recovery 469 Planning 470 Documenting the Disaster Recovery Plan 472 The Disaster Response/Recovery Team 473 Nerc Cip-009-6 475 Review Questions 477 Exam Questions 478 Appendix A GICSP Objective Map 481 ICS410.1 ICS: Global Industrial Cybersecurity Professional (GICSP) Objectives 482 Overview 482 ICS410.2: Architecture and Field Devices 483 ICS410.3: Communications and Protocols 484 ICS410.4: Supervisory Systems 485 ICS410.5: Security Governance 485 Appendix B Glossary 487 Appendix C Standards and References 533 Reference Links 536 Appendix D Review and Exam Question Answers 539 Chapter 1: Industrial Control Systems 540 Review Question Answers 540 Exam Question Answers 541 Chapter 2: ICS Architecture 542 Review Question Answers 542 Exam Question Answers 544 Chapter 3: Secure ICS Architecture 545 Review Question Answers 545 Exam Question Answers 547 Chapter 4: ICS Modules and Element Hardening 548 Review Question Answers 548 Exam Question Answers 550 Chapter 5: Cybersecurity Essentials for ICS 551 Review Question Answers 551 Exam Question Answers 553 Chapter 6: Physical Security 554 Review Question Answers 554 Exam Question Answers 556 Chapter 7: Access Management 556 Review Question Answers 556 Exam Question Answers 558 Chapter 8: ICS Security Governance and Risk Management 559 Review Question Answers 559 Exam Question Answers 560 Chapter 9: ICS Security Assessments 561 Review Question Answers 561 Exam Question Answers 563 Chapter 10: ICS Security Monitoring and Incident Response 564 Review Question Answers 564 Exam Question Answers 565 Chapter 11: Disaster Recovery and Business Continuity 567 Review Question Answers 567 Exam Question Answers 568 Index 571
£30.39
John Wiley & Sons Inc Search Engine Optimization AllinOne For Dummies
Book SynopsisTable of ContentsIntroduction 1 Book 1: How Search Engines Work 5 Chapter 1: Putting Search Engines in Context 7 Chapter 2: Meeting the Search Engines 23 Chapter 3: Recognizing and Reading Search Results 37 Chapter 4: Getting Your Site to Appear in the Right Results 53 Chapter 5: Knowing What Drives Search Results 77 Chapter 6: Spam Issues: When Search Engines Get Fooled 87 Book 2: Keyword Strategy 101 Chapter 1: Employing Keyword Research Techniques and Tools 103 Chapter 2: Selecting Keywords 113 Chapter 3: Exploiting Pay Per Click Lessons Learned 127 Chapter 4: Assigning Keywords to Pages 135 Chapter 5: Adding and Maintaining Keywords 145 Book 3: Competitive Positioning 155 Chapter 1: Identifying Your Competitors 157 Chapter 2: Competitive Research Techniques and Tools 167 Chapter 3: Applying Collected Data 187 Book 4: SEO Web Design 201 Chapter 1: The Basics of SEO Web Design 203 Chapter 2: Building an SEO-Friendly Site 223 Chapter 3: Page Experience Update 249 Chapter 4: Making Your Page Search Engine Compatible 261 Chapter 5: Perfecting Navigation and Linking Techniques 289 Book 5: Creating Content 303 Chapter 1: Selecting a Style for Your Audience 305 Chapter 2: Establishing Content Depth and Page Length 321 Chapter 3: Adding Keyword-Specific Content 347 Chapter 4: Adapting Your Content for Local Search 363 Chapter 5: Dealing with Duplicate Content 373 Chapter 6: Crediting Your Content 391 Chapter 7: Using SEO to Build Your Brand 403 Book 6: Linking 421 Chapter 1: Employing Linking Strategies 423 Chapter 2: Structuring Internal Links 441 Chapter 3: Obtaining Links 457 Chapter 4: Vetting Inbound Links 479 Chapter 5: Connecting with Social Networks 497 Book 7: Optimizing the Foundations 511 Chapter 1: Server Issues: Why Your Server Matters 513 Chapter 2: Domain Names: What Your URL Says about You 537 Chapter 3: Using Redirects for SEO 555 Chapter 4: Implementing 301 Redirects 563 Chapter 5: Watching Your Backend: Content Management System Troubles 577 Chapter 6: Solving SEO Roadblocks 595 Book 8: Analyzing Results 605 Chapter 1: Employing Site Analytics 607 Chapter 2: Tracking Behavior with Web Analytics 627 Chapter 3: Mastering SEO Tools and Reports 641 Book 9: International SEO 655 Chapter 1: Discovering International Search Engines 657 Chapter 2: Tailoring Your Marketing Message for Asia 671 Chapter 3: Staking a Claim in Europe 683 Chapter 4: Getting Started in Latin America 693 Appendix: The Value of Training 699 Index 715
£24.64
Wolfram Media New Kind of Science
Book Synopsis
£14.20
Hodder Education Cambridge International AS & A Level Computer
Book SynopsisThis title is endorsed by Cambridge Assessment International Education to support the full syllabus for examination from 2021. Develop computational thinking and ensure full coverage of the revised Cambridge Assessment International Education AS & A Level Computer Science syllabus (9618) with this comprehensive Student's Book written by experienced authors and examiners.- Improve understanding with clear explanations, examples, illustrations and diagrams, plus a glossaryof key terms- Reinforce learning with a range of activities, exercises, and exam-style questions- Prepare for further study with extension activities that go beyond the requirements of the syllabus and prompt further investigation about new developments in technology- Follow a structured route through the course with in-depth coverage of the full AS & A Level syllabus- Answers are available online www.hoddereducation.co.uk/cambridgeextras
£46.55
Oxford University Press, USA Physical Computation A Mechanistic Account
Book SynopsisComputation permeates our world, but a satisfactory philosophical theory of what it is has been lacking. Gualtiero Piccinini presents a mechanistic account of what makes a physical system a computing system. He argues that computation does not entail representation or information-processing, although information-processing entails computation.Trade Reviewthe mechanistic account of physical computation is the best that we currently have . . . Physical Computation is eminently readable and well presented, with a clear structure and helpful introduction . . . It provides a thorough . . . introduction to the philosophical issues associated with computation in the physical sense and would serve as a good basis for a postgraduate or upper-level undergraduate course on the subject. Piccinini delivers a comprehensive summary of previous work on physical computation, alongside the definitive presentation of his mechanistic account, and I have no doubt that this book will become a valuable resource for future work on the topic. * Joe Dewhurst, Philosophical Psychology *Table of ContentsAcknowledgements Introduction 1: Towards an Account of Physical Computation 2: Mapping Accounts 3: Semantic Accounts 4: Pancomputationalism 5: From Functional Analysis to Mechanistic Explanation 6: The Ontology of Functional Mechanisms 7: The Mechanistic Account 8: Primitive Components of Computing Mechanisms 9: Complex Components of Computing Mechanisms 10: Digital Calculators 11: Digital Computers 12: Analog Computers 13: Parallel Computers and Neural Networks 14: Information Processing 15: The Bold Physical Church-Turing Thesis 16: The Modest Physical Church-Turing Thesis Epilogue: The Nature of Computation Appendix: Computability Bibliography Index
£31.49
CRC Press Interactive Data Visualization
Book SynopsisAn Updated Guide to the Visualization of Data for Designers, Users, and ResearchersInteractive Data Visualization: Foundations, Techniques, and Applications, Second Edition provides all the theory, details, and tools necessary to build visualizations and systems involving the visualization of data. In color throughout, it explains basic terminology and concepts, algorithmic and software engineering issues, and commonly used techniques and high-level algorithms. Full source code is provided for completing implementations. New to the Second Edition New related readings, exercises, and programming projects Better quality figures and numerous new figures New chapter on techniques for time-oriented data This popular book continues to explore the fundamental components of the viTrade ReviewPraise for the First Edition:A 2010 CHOICE Outstanding Academic Title"College-level collections strong in concepts and theory surrounding data visualization will find Interactive Data Visualization: Foundations, Techniques, and Applications to be a powerful addition, covering all the details and tools needed for building visualizations around data. From math and statistical graphs to cartography and scientific displays, this offers plenty of details for creating visual displays of data, offering color illustrations throughout and plenty of refinement details."—The Midwest Book Review, August 2011"With chapters on elaborating on the importance of visualization, understanding the data without it, the relation to the human eyes and mind, what technology has brought in the avenues of displaying and interacting data, no concept is really left untouched. Enhanced with example data, samples, a history of computer graphics, and more, Interactive Data Visualization is a solid text to have on hand for any community or college library collection."—James A. Cox, The Midwest Book Review, August 2010Table of ContentsIntroduction. Data Foundations. Human Perception and Information Processing. Visualization Foundations. Visualization Techniques for Spatial Data. Visualization Techniques for Geospatial Data. Visualization Techniques for Time-Oriented Data. Visualization Techniques for Multivariate Data. Visualization Techniques for Trees, Graphs, and Networks. Text and Document Visualization. Interaction Concepts. Interaction Techniques. Designing Effective Visualizations. Comparing and Evaluating Visualization Techniques. Visualization Systems. Research Directions in Visualization. Appendices. Bibliography. Index.
£42.74
Elsevier Science & Technology Digital Design and Computer Architecture, RISC-V Edition
Book SynopsisTable of Contents1. From Zero to One 2. Combinational Logic Design 3. Sequential Logic Design 4. Hardware Description Languages 5. Digital Building Blocks 6. Architecture 7. Microarchitecture 8. Memory Systems 9. I/O Systems e9. I/O Systems A. Digital System Implementation eA. Digital System Implementation B. ARM Instructions C. C Programming eC. C Programming
£71.09
College Publications Handbook of Paraconsistency
£20.42
Hodder Education OCR AS/A-level Computer Science Workbook 1:
Book SynopsisExam board: OCRLevel: A-levelSubject: Computer ScienceFirst teaching: September 2015First exams: Summer 2017Strengthen your students' understanding and upgrade their confidence and exam skills with our OCR Computer Science workbooks, full of self-contained exercises to consolidate knowledge and exam practice questions to improve performance. Written by an experienced Computer Science author, these full colour workbooks provide stimulus materials on all AS and A-level topics, followed by sets of questions designed to develop and test skills in the unit.· Thoroughly prepares students for their examinations as they work through numerous practice questions that cover every question type in the specification.· Helps students identify their revision needs and see how to target the top grades using online answers for each question.· Encourages ongoing revision throughout the course as students progressively develop their skills in class and at home. · Packed full with consolidation and exam practice questions, these workbooks can save valuable preparation time and expense, with self-contained exercises that don't need photocopying and provide instant lesson and homework solutions for specialist and non-specialist teachers.· Ensures that students feel confident tackling their exams as they know what to expect in each section.
£11.57
McGraw-Hill Education GPEN GIAC Certified Penetration Tester AllinOne
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester examThis effective self-study guide fully prepares you for the Global Information Assurance Certificationâs challenging Penetration Tester exam, which validates advanced IT security skills. The book features exam-focused coverage of penetration testing methodologies, legal issues, and best practices. GPEN GIAC Certified Penetration Tester All-in-One Exam Guide contains useful tips and tricks, real-world examples, and case studies drawn from authorsâ extensive experience. Beyond exam preparation, the book also serves as a valuable on-the-job reference. Covers every topic on the exam, including:Pre-engagement and planning Table of ContentsChapter 1: Penetration Testing FundamentalsChapter 2: Pre-Engagement ActivityChapter 3: Penetration Testing Lab SetupChapter 4: Reconnaissance, Open Source Intelligence (OSINT)Chapter 5: Scanning, Enumerating Targets and VulnerabilitiesChapter 6: Exploiting TargetsChapter 7: Advanced MetasploitChapter 8: Password AttacksChapter 9: Stealing Data, Maintaining Access and PivotingChapter 10: PowerShell for Penetration TestingChapter 11: Web Application HackingChapter 12: Proxies, Crawlers, and SpidersChapter 13: OWASP Top 10Appendix A: Tools Reference
£35.24
John Wiley & Sons Inc Enterprise AI For Dummies
Book SynopsisTable of ContentsIntroduction 1 Part 1: Exploring Practical AI and How It Works 7 Chapter 1: Demystifying Artificial Intelligence 9 Chapter 2: Looking at Uses for Practical AI 29 Chapter 3: Preparing for Practical AI 45 Chapter 4: Implementing Practical AI 63 Part 2: Exploring Vertical Market Applications 81 Chapter 5: Healthcare/HMOs: Streamlining Operations 83 Chapter 6: Biotech/Pharma: Taming the Complexity 91 Chapter 7: Manufacturing: Maximizing Visibility 99 Chapter 8: Oil and Gas: Finding Opportunity in Chaos 111 Chapter 9: Government and Nonprofits: Doing Well by Doing Good 119 Chapter 10: Utilities: Renewing the Business 133 Chapter 11: Banking and Financial Services: Making It Personal 141 Chapter 12: Retail: Reading the Customer’s Mind 149 Chapter 13: Transportation and Travel: Tuning Up Your Ride 157 Chapter 14: Telecommunications: Connecting with Your Customers 167 Chapter 15: Legal Services: Cutting Through the Red Tape 173 Chapter 16: Professional Services: Increasing Value to the Customer 181 Chapter 17: Media and Entertainment: Beating the Gold Rush 189 Part 3: Exploring Horizontal Market Applications 197 Chapter 18: Voice of the Customer/Citizen: Finding Coherence in the Cacophony 199 Chapter 19: Asset Performance Optimization: Increasing Value by Extending Lifespans 207 Chapter 20: Intelligent Recommendations: Getting Personal 217 Chapter 21: Content Management: Finding What You Want, When You Want It 231 Chapter 22: AI-Enhanced Content Capture: Gathering All Your Eggs into the Same Basket 239 Chapter 23: Regulatory Compliance and Legal Risk Reduction: Hitting the Bullseye On a Moving Target 249 Chapter 24: Knowledge Assistants and Chatbots: Monetizing the Needle in the Haystack 265 Chapter 25: AI-Enhanced Security: Staying Ahead by Watching Your Back 275 Part 4: The Part of Tens 287 Chapter 26: Ten Ways AI Will Influence the Next Decade 289 Chapter 27: Ten Reasons Why AI Is Not a Panacea 297 Index 313
£22.94
John Wiley & Sons Inc Design and Analysis of Distributed Algorithms 56
Book SynopsisThis text is based on a simple and fully reactive computational model that allows for intuitive comprehension and logical designs. The principles and techniques presented can be applied to any distributed computing environment (e.g. , distributed systems, communication networks, data networks, grid networks, internet, etc.).Table of ContentsPreface. 1. Distributed Computing Environments. 1.1 Entities. 1.2 Communication. 1.3 Axioms and Restrictions. 1.3.1 Axioms. 1.3.2 Restrictions. 1.4 Cost and Complexity. 1.4.1 Amount of Communication Activities. 1.4.2 Time. 1.5 An Example: Broadcasting. 1.6 States and Events. 1.6.1 Time and Events. 1.6.2 States and Configurations. 1.7 Problems and Solutions (*). 1.8 Knowledge. 1.8.1 Levels of Knowledge. 1.8.2 Types of Knowledge. 1.9 Technical Considerations. 1.9.1 Messages. 1.9.2 Protocol. 1.9.3 Communication Mechanism. 1.10 Summary of Definitions. 1.11 Bibliographical Notes. 1.12 Exercises, Problems, and Answers. 1.12.1 Exercises and Problems. 1.12.2 Answers to Exercises. 2. Basic Problems And Protocols. 2.1 Broadcast. 2.1.1 The Problem. 2.1.2 Cost of Broadcasting. 2.1.3 Broadcasting in Special Networks. 2.2 Wake-Up. 2.2.1 Generic Wake-Up. 2.2.2 Wake-Up in Special Networks. 2.3 Traversal. 2.3.1 Depth-First Traversal. 2.3.2 Hacking (*). 2.3.3 Traversal in Special Networks. 2.3.4 Considerations on Traversal. 2.4 Practical Implications: Use a Subnet. 2.5 Constructing a Spanning Tree. 2.5.1 SPT Construction with a Single Initiator: Shout. 2.5.2 Other SPT Constructions with Single Initiator. 2.5.3 Considerations on the Constructed Tree. 2.5.4 Application: Better Traversal. 2.5.5 Spanning-Tree Construction with Multiple Initiators. 2.5.6 Impossibility Result. 2.5.7 SPT with Initial Distinct Values. 2.6 Computations in Trees. 2.6.1 Saturation: A Basic Technique. 2.6.2 Minimum Finding. 2.6.3 Distributed Function Evaluation. 2.6.4 Finding Eccentricities. 2.6.5 Center Finding. 2.6.6 Other Computations. 2.6.7 Computing in Rooted Trees. 2.7 Summary. 2.7.1 Summary of Problems. 2.7.2 Summary of Techniques. 2.8 Bibliographical Notes. 2.9 Exercises, Problems, and Answers. 2.9.1 Exercises. 2.9.2 Problems. 2.9.3 Answers to Exercises. 3. Election. 3.1 Introduction. 3.1.1 Impossibility Result. 3.1.2 Additional Restrictions. 3.1.3 Solution Strategies. 3.2 Election in Trees. 3.3 Election in Rings. 3.3.1 All the Way. 3.3.2 As Far As It Can. 3.3.3 Controlled Distance. 3.3.4 Electoral Stages. 3.3.5 Stages with Feedback. 3.3.6 Alternating Steps. 3.3.7 Unidirectional Protocols. 3.3.8 Limits to Improvements (*). 3.3.9 Summary and Lessons. 3.4 Election in Mesh Networks. 3.4.1 Meshes. 3.4.2 Tori. 3.5 Election in Cube Networks. 3.5.1 Oriented Hypercubes. 3.5.2 Unoriented Hypercubes. 3.6 Election in Complete Networks. 3.6.1 Stages and Territory. 3.6.2 Surprising Limitation. 3.6.3 Harvesting the Communication Power. 3.7 Election in Chordal Rings (*). 3.7.1 Chordal Rings. 3.7.2 Lower Bounds. 3.8 Universal Election Protocols. 3.8.1 Mega-Merger. 3.8.2 Analysis of Mega-Merger. 3.8.3 YO-YO. 3.8.4 Lower Bounds and Equivalences. 3.9 Bibliographical Notes. 3.10 Exercises, Problems, and Answers. 3.10.1 Exercises. 3.10.2 Problems. 3.10.3 Answers to Exercises. 4. Message Routing and Shortest Paths. 4.1 Introduction. 4.2 Shortest Path Routing. 4.2.1 Gossiping the Network Maps. 4.2.2 Iterative Construction of Routing Tables. 4.2.3 Constructing Shortest-Path Spanning Tree. 4.2.4 Constructing All-Pairs Shortest Paths. 4.2.5 Min-Hop Routing. 4.2.6 Suboptimal Solutions: Routing Trees. 4.3 Coping with Changes. 4.3.1 Adaptive Routing. 4.3.2 Fault-Tolerant Tables. 4.3.3 On Correctness and Guarantees. 4.4 Routing in Static Systems: Compact Tables. 4.4.1 The Size of Routing Tables. 4.4.2 Interval Routing. 4.5 Bibliographical Notes. 4.6 Exercises, Problems, and Answers. 4.6.1 Exercises. 4.6.2 Problems. 4.6.3 Answers to Exercises. 5. Distributed Set Operations. 5.1 Introduction. 5.2 Distributed Selection. 5.2.1 Order Statistics. 5.2.2 Selection in a Small Data Set. 5.2.3 Simple Case: Selection Among Two Sites. 5.2.4 General Selection Strategy: RankSelect. 5.2.5 Reducing the Worst Case: ReduceSelect. 5.3 Sorting a Distributed Set. 5.3.1 Distributed Sorting. 5.3.2 Special Case: Sorting on a Ordered Line. 5.3.3 Removing the Topological Constraints: Complete Graph. 5.3.4 Basic Limitations. 5.3.5 Efficient Sorting: SelectSort. 5.3.6 Unrestricted Sorting. 5.4 Distributed Sets Operations. 5.4.1 Operations on Distributed Sets. 5.4.2 Local Structure. 5.4.3 Local Evaluation (*). 5.4.4 Global Evaluation. 5.4.5 Operational Costs. 5.5 Bibliographical Notes. 5.6 Exercises, Problems, and Answers. 5.6.1 Exercises. 5.6.2 Problems. 5.6.3 Answers to Exercises. 6. Synchronous Computations. 6.1 Synchronous Distributed Computing. 6.1.1 Fully Synchronous Systems. 6.1.2 Clocks and Unit of Time. 6.1.3 Communication Delays and Size of Messages. 6.1.4 On the Unique Nature of Synchronous Computations. 6.1.5 The Cost of Synchronous Protocols. 6.2 Communicators, Pipeline, and Transformers. 6.2.1 Two-Party Communication. 6.2.2 Pipeline. 6.2.3 Transformers. 6.3 Min-Finding and Election: Waiting and Guessing. 6.3.1 Waiting. 6.3.2 Guessing. 6.3.3 Double Wait: Integrating Waiting and Guessing. 6.4 Synchronization Problems: Reset, Unison, and Firing Squad. 6.4.1 Reset /Wake-up. 6.4.2 Unison. 6.4.3 Firing Squad. 6.5 Bibliographical Notes. 6.6 Exercises, Problems, and Answers. 6.6.1 Exercises. 6.6.2 Problems. 6.6.3 Answers to Exercises. 7. Computing in Presence of Faults. 7.1 Introduction. 7.1.1 Faults and Failures. 7.1.2 Modelling Faults. 7.1.3 Topological Factors. 7.1.4 Fault Tolerance, Agreement, and Common Knowledge. 7.2 The Crushing Impact of Failures. 7.2.1 Node Failures: Single-Fault Disaster. 7.2.2 Consequences of the Single Fault Disaster. 7.3 Localized Entity Failures: Using Synchrony. 7.3.1 Synchronous Consensus with Crash Failures. 7.3.2 Synchronous Consensus with Byzantine Failures. 7.3.3 Limit to Number of Byzantine Entities for Agreement. 7.3.4 From Boolean to General Byzantine Agreement. 7.3.5 Byzantine Agreement in Arbitrary Graphs. 7.4 Localized Entity Failures: Using Randomization. 7.4.1 Random Actions and Coin Flips. 7.4.2 Randomized Asynchronous Consensus: Crash Failures. 7.4.3 Concluding Remarks. 7.5 Localized Entity Failures: Using Fault Detection. 7.5.1 Failure Detectors and Their Properties. 7.5.2 The Weakest Failure Detector. 7.6 Localized Entity Failures: Pre-Execution Failures. 7.6.1 Partial Reliability. 7.6.2 Example: Election in Complete Network. 7.7 Localized Link Failures. 7.7.1 A Tale of Two Synchronous Generals. 7.7.2 Computing With Faulty Links. 7.7.3 Concluding Remarks. 7.7.4 Considerations on Localized Entity Failures. 7.8 Ubiquitous Faults. 7.8.1 Communication Faults and Agreement. 7.8.2 Limits to Number of Ubiquitous Faults for Majority. 7.8.3 Unanimity in Spite of Ubiquitous Faults. 7.8.4 Tightness. 7.9 Bibliographical Notes. 7.10 Exercises, Problems, and Answers. 7.10.1 Exercises. 7.10.2 Problems. 7.10.3 Answers to Exercises. 8. Detecting Stable Properties. 8.1 Introduction. 8.2 Deadlock Detection. 8.2.1 Deadlock. 8.2.2 Detecting Deadlock: Wait-for Graph. 8.2.3 Single-Request Systems. 8.2.4 Multiple-Requests Systems. 8.2.5 Dynamic Wait-for Graphs. 8.2.6 Other Requests Systems. 8.3 Global Termination Detection. 8.3.1 A Simple Solution: Repeated Termination Queries. 8.3.2 Improved Protocols: Shrink. 8.3.3 Concluding Remarks. 8.4 Global Stable Property Detection. 8.4.1 General Strategy. 8.4.2 Time Cuts and Consistent Snapshots. 8.4.3 Computing A Consistent Snapshot. 8.4.4 Summary: Putting All Together. 8.5 Bibliographical Notes. 8.6 Exercises, Problems, and Answers. 8.6.1 Exercises. 8.6.2 Problems. 8.6.3 Answers to Exercises. 9. Continuous Computations. 9.1 Introduction. 9.2 Keeping Virtual Time. 9.2.1 Virtual Time and Causal Order. 9.2.2 Causal Order: Counter Clocks. 9.2.3 Complete Causal Order: Vector Clocks. 9.2.4 Concluding Remarks. 9.3 Distributed Mutual Exclusion. 9.3.1 The Problem. 9.3.2 A Simple And Efficient Solution. 9.3.3 Traversing the Network. 9.3.4 Managing a Distributed Queue. 9.3.5 Decentralized Permissions. 9.3.6 Mutual Exclusion in Complete Graphs: Quorum. 9.3.7 Concluding Remarks. 9.4 Deadlock: System Detection and Resolution. 9.4.1 System Detection and Resolution. 9.4.2 Detection and Resolution in Single-Request Systems. 9.4.3 Detection and Resolution in Multiple-Requests Systems. 9.5 Bibliographical Notes. 9.6 Exercises, Problems, and Answers. 9.6.1 Exercises. 9.6.2 Problems. 9.6.3 Answers to Exercises. Index.
£147.56
HarperCollins Publishers Shinoy and the Chaos Crew The Day of the
Book SynopsisCollins Big Cat supports every primary child on their reading journey from phonics to fluency. Top authors and illustrators have created fiction and non-fiction books that children love to read. Book banded for guided and independent reading, there are reading notes in the back, comprehensive teaching and assessment support and ebooks available.When Shinoy downloads the Chaos Crew app on his phone, a glitch in the system gives him the power to summon his TV heroes into his world. With the team on board, Shinoy can figure out what dastardly plans S.N.A.I.R. has come up with, and save the day.Location: Flat Hill shopping centreOperative: Super-strong SalamaMission: Investigate the UFOs hovering over Flat Hill, and the monsters rampaging through the town.This exciting title is part of the Shinoy and the Chaos Crew series by Chris Callaghan.Gold/Band 9 books offer developing readers literary language and stories with distinctive characters.Ideas for reading in the back of the book provide
£9.53
HarperCollins Publishers OCR GCSE 91 Computer Science Revision Cards
Book SynopsisExam Board: OCRLevel: GCSE Grade 9-1Subject: Computer ScienceSuitable for the 2025 examsIdeal GCSE grade 9-1 practice in handy revision cardsWhat can you remember? Test your OCR GCSE 9-1 Computer Science knowledge!Revise, practise and test yourself on every topic. Mix them up to revise and test yourself on the go.Suitable for the 2016 and 2020 specification 100 topic-based GCSE revision cards How to Use cards include revision tips and games Revise cards: recap key facts Memorise cards: learn important terms and definitions Test cards: quick-fire questionsTrade Review“Generally excellent. Attractive layout, clear and easy to access. There is necessary focus on exam skills, but presented in an interesting, step-by-step format.” Susan Stirrup, King’s Ely “I like the clear layout, especially the spacing of the questions – it is very accessible.” Fiona Hall, Sheringham High School “Colourful and informative.” Jane Hamilton, Alsager School
£11.57
McGraw-Hill Education - Europe Schaums Outline of Programming with C
Book SynopsisTough Test Questions? Missed Lectures? Not Enough Time?Fortunately for you, there's Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all the essential course information in an easy-to-follow, topic-by-topic format. You also get hundreds of examples, solved problems, and practice exercises to test your skills. This Schaum's Outline gives you Practice problems with full explanations that reinforce knowledge Coverage of the most up-to-date developments in your course field In-depth review of practices and applications Fully compatible with your classroom text, Schaum's highlights all the important facts you need to know. Use Schaum's to shorten your study time-and get your best test scores!Schaum's Outlines-Problem Solved.Table of ContentsChapter 1: Elementary C++ Programming. Chapter 2: Fundamental Types. Chapter 3: Selection. Chapter 4: Iteration. Chapter 5: Functions. Chapter 6: Arrays. Chapter 7: Pointers and References. Chapter 8: C-Strings. Chapter 9: Standard C++ Strings. Chapter 10: Classes. Chapter 11: Overloading Operators. Chapter 12: Composition and Inheritance. Chapter 13: Templates and Iterators. Chapter 14: Standard C++ Vectors. Chapter 15: Container Classes. Appendices: A: Character Codes. B: Standard C++ Keywords. C: Standard C++ Operators. D: Standard C++ Container Classes. E: Standard C++ Generic Algorithms. F: The Standard C Library. G: Hexadecimal Numbers. H: References.
£26.39
McGraw-Hill Education - Europe TCPIP Protocol Suite
Book SynopsisIn a world where the number of people who need to learn about data communications and networking is exploding, Forouzan's book is the answer. The book's visual approach makes it easy for students to learn about and understand the concepts involved in this rapidly developing field.TCP/IP Protocol Suite teaches students and professionals, with no prior knowledge of TCP/IP everything they need to know about the subject. This comprehensive book uses hundreds of figures to make technical concepts easy to grasp as well as many examples which help tie the material to the real-world. The fourth edition of TCP/IP Protocol Suite has been fully updated to include all of the recent technology changes in the field. Additionally, out-of-date material has been overhauled to reflect recent changes in technology.Table of ContentsPart 1 Introduction and Underlying Technologies1 Introduction2 The OSI Model and the TCP/IP Protocol Suite3 Underlying TechnologiesPart 2 Network Layer4 Introduction to Network Layer5 IPv4 Addresses6 Delivery and Forwarding, of IP Packets7 Internet Protocol Version 4 (IPv4)8 Address Resolution Protocol (ARP)9 Internet Control Message Protocol Version 4 (ICMPv4)10 Mobile IP11 Unicast Routing Protocols (RIP, OSPF, and BGP)12 Multicasting and Multicast Routing ProtocolsPart 3 Transport Layer13 Introduction to the Transport Layer14 User Datagram Protocol (UDP)15 Transmission Control Protocol (TCP)16 Stream Control Transmission Protocol (SCTP)Part 4 Application Layer17 Introduction to the Application Layer18 Host Configuration: DHCP19 Domain Name System (DNS)20 Remote Login: TELNET and SSH21 File Transfer: FTP and TFTP22 World Wide Web and HTTP23 Electronic Mail: SMTP, POP, IMAP, and MIME24 Network Management: SNMP25 MultimediaPart 5 Next Generation26 IPv6 Addressing27 IPv6 Protocol28 ICMPv6Part 6 Security29 Cryptography and Network Security30 Internet SecurityPart 7 AppendicesAppendix A UnicodeAppendix B Positional Numbering SystemsAppendix C Error Detection CodesAppendix D ChecksumAppendix E HTML, XHTML, XML,and XSL Appendix F Client-Server Programming in JavaAppendix G Miscellaneous Information
£204.33