Computer science Books
CRC Press 3D Game Engine Design
Book SynopsisThe first edition of 3D Game Engine Design was an international bestseller that sold over 17,000 copies and became an industry standard. In the six years since that book was published, graphics hardware has evolved enormously. Hardware can now be directly controlled through techniques such as shader programming, which requires an entirely new thought process of a programmer. In a way that no other book can do, this new edition shows step by step how to make a shader-based graphics engine and how to tame this new technology. Much new material has been added, including more than twice the coverage of the essential techniques of scene graph management, as well as new methods for managing memory usage in the new generation of game consoles and portable game players. There are expanded discussions of collision detection, collision avoidance, and physicsâall challenging subjects for developers. The mathematics coverage is now focused towards the end of the book toTable of ContentsPreface; 1 Introduction; 2 The Graphics System; 3 Renderers; 4 Special Effects Using Shaders; 5 Scene Graphs; 6 Scene Graph Compilers; 7 Memory Management; 8 Controller-Based Animation; 9 Spatial Sorting; 10 Level of Detail; 11 Terrain; 12 Collision Detection; 13 Physics; 14 Object-Oriented Infrastructure; 15 Mathematical Topics; Bibliography; Index
£92.14
McGraw-Hill Education - Europe Schaums Outline of Essential Computer Mathematics
Book SynopsisConfusing Textbooks? Missed Lectures? Not Enough Time?Fortunately for you, there's Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all the essential course information in an easy-to-follow, topic-by-topic format. You also get hundreds of examples, solved problems, and practice exercises to test your skills. This Schaum's Outline gives you Practice problems with full explanations that reinforce knowledge Coverage of the most up-to-date developments in your course field In-depth review of practices and applications Fully compatible with your classroom text, Schaum's highlights all the important facts you need to know. Use Schaum's to shorten your study time-and get your best test scores!Schaum's Outlines-Problem Solved.Table of ContentsBinary Number System.Computer Codes.Computer Arithmetic.Logic. Flowcharts.Sets and Relations.Boolean Algebra, Logic Gates. Simplifying Logic Circuits, Karnaugh Maps.Vectors, Matrices, Subscripted Variables.Linear Equations.Combinatorics.Probability.Statistics, Random Variables.Graph Theory.Trees, Directed Graphs, Machines.
£25.59
Cambridge University Press Convex Optimization
Book SynopsisThe focus of this book is on recognizing convex optimization problems and then finding the most appropriate technique for solving them. It contains many worked examples and homework exercises and will appeal to students, researchers and practitioners in fields such as engineering, computer science, mathematics, statistics, finance and economics.Trade Review'Boyd and Vandenberghe have written a beautiful book that I strongly recommend to everyone interested in optimization and computational mathematics: Convex Optimization is a very readable introduction to this modern field of research.' Mathematics of Operations Research'… a beautiful book that I strongly recommend to everyone interested in optimization and computational mathematics … a very readable and inspiring introduction to this modern field of research. I recommend it as one of the best optimization textbooks that have appeared in the last years.' Mathematical Methods of Operations Research'I highly recommend it either if you teach nonlinear optimization at the graduate level for a supplementary reading list and for your library, or if you solve optimization problems and wish to know more about solution methods and applications.' International Statistical institute'… the whole book is characterized by clarity. … a very good pedagogical book … excellent to grasp the important concepts of convex analysis [and] to develop an art in modelling optimization problems intelligently.' Matapli'The book by Boyd and Vandenberghe reviewed here is one of … the best I have ever seen … it is a gentle, but rigorous, introduction to the basic concepts and methods of the field … this book is meant to be a 'first book' for the student or practitioner of optimization. However, I think that even the experienced researcher in the field has something to gain from reading this book: I have very much enjoyed the easy to follow presentation of many meaningful examples and suggestive interpretations meant to help the student's understanding penetrate beyond the surface of the formal description of the concepts and techniques. For teachers of convex optimization this book can be a gold mine of exercises. MathSciNetTable of ContentsPreface; 1. Introduction; Part I. Theory: 2. Convex sets; 3. Convex functions; 4. Convex optimization problems; 5. Duality; Part II. Applications: 6. Approximation and fitting; 7. Statistical estimation; 8. Geometrical problems; Part III. Algorithms: 9. Unconstrained minimization; 10. Equality constrained minimization; 11. Interior-point methods; Appendices.
£80.74
Cengage Learning, Inc C Programming
Book SynopsisLearn how to program with C++ using today's definitive choice for your first programming language experience -- C++ PROGRAMMING: PROGRAM DESIGN INCLUDING DATA STRUCTURES, 8E. D.S. Malik's time-tested, student-centered methodology incorporates a strong focus on problem-solving with full-code examples that vividly demonstrate the hows and whys of applying programming concepts and utilizing C++ to work through a problem. Thoroughly updated end-of-chapter exercises, more than 20 extensive new programming exercises, and numerous new examples drawn from Dr. Malik's experience further strengthen your understanding of problem solving and program design in this new edition. You review the important features of C++ 14 Standard with timely discussions that ensure this edition equips you to succeed in your CS1 course and beyond.Table of Contents1. An Overview of Computers and Programming Languages 2. Basic Elements of C++ 3. Input/Output 4. Control Structures I (Selection) 5. Control Structures II (Repetition) 6. User-Defined Function 7. Namespaces, the class string, and User-Defined Simple Data Types 8. Arrays a.One dimensional arrays b.Sequential search c.Selection sort d.Two and multi-dimensional arrays e.The class vector 9. Records (structs) 10. Classes and Data Abstraction 11. Inheritance and Composition 12. Pointers, Classes, Virtual Functions, and Abstract Classes 13. Operator Overloading and Templates 14. Exception Handling 15. Recursion 16. Linked Lists 17. Stacks and Queue 18. Searching and Sorting Algorithms a. Binary Search b. Bubble Sort c. Selection Sort d. Insertion Sort e. Quick Sort f. Merge Sort g. Heap Sort 19. Binary Trees 20. Graph Algorithms 21. Standard Template Library
£72.19
John Wiley & Sons Inc The Big DataDriven Business
Book SynopsisGet the expert perspective and practical advice on big data The Big Data-Driven Business: How to Use Big Data to Win Customers, Beat Competitors, and Boost Profits makes the case that big data is for real, and more than just big hype. The book uses real-life examplesfrom Nate Silver to Copernicus, and Apple to Blackberryto demonstrate how the winners of the future will use big data to seek the truth. Written by a marketing journalist and the CEO of a multi-million-dollar B2B marketing platform that reaches more than 90% of the U.S. business population, this book is a comprehensive and accessible guide on how to win customers, beat competitors, and boost the bottom line with big data. The marketplace has entered an era where the customer holds all the cards. With unprecedented choice in both the consumer world and the B2B world, it''s imperative that businesses gain a greater understanding of their customers and prospects. Big data is the key to this insight, beTable of ContentsAcknowledgments vii Introduction: Why We Wrote This Book, and How It Can Help You ix 1 Big Data, Big Benefits 1 2 The Evolution of the Customer-Focused, Data-Driven Business 15 3 The Evolution of the Buyer’s Journey, or How the Internet Killed the Three-Martini Lunch 25 4 The Marketing Stack—Why CMOs and CIOs Are Working Together 35 The Software in the Stack 48 5 How Technology Bridges the Gap between Marketing and Sales 55 Technology Brings Harmony between Sales and Marketing at DocuSign 62 How Bizo Used Data to Boost Marketing–Sales Alignment 64 6 Data and the Rise of Online Advertising 69 Early Uses of Audience Data 72 Early Marketing Analytics—Audience Auditing 73 The Rise of Internet Advertising 74 Ad Networks 75 Audience Platforms 75 Online Advertising Exchanges 76 Retargeted Display Ads 77 Social Media Advertising’s Powerful Leap Forward 78 How Marketers Are Putting Data on Display 79 7 Using Data to Better Understand Customers and Pursue Prospects 85 Netflix Flexes Its Data Muscle 88 SaaS and Its Powerful Window on the Customer 90 The Power of Predictive Lead Modeling 91 Data Isn’t Reserved for Dot-Coms 93 8 The Arrival of Left-Brained Leaders and the Rise of the Marketing Department 97 9 Implementing a Big Data Plan (Sometimes by Thinking Small) 113 Eleven Principles to Follow When Bringing Big Data into Your Business 123 10 Measurement, Testing, and Attribution 133 Data and Measurement 136 Measuring the Power of Display Ads 138 Data and Testing 138 Data and Attribution 140 Attribution’s Big Day 144 11 Data Can Be a Matter of Corporate Life and Death 149 The Dead 155 Near-Death Experience 161 Culture Clash 162 Missed Opportunity 165 Whistling Past the Graveyard? 166 Schadenfreude? 167 12 Using Data Responsibly 169 Privacy and Online Advertising 173 Privacy and the Corporate Database 176 The Responsibility of Corporations 179 13 Big Data’s Big Future 183 How Cleversafe Harnessed the Power of Data 187 Key Trends Defining Big Data’s Future 188 The Human Touch Remains Essential 206 Index 209
£18.39
John Wiley & Sons Inc Computational Methods for Electromagnetics
Book SynopsisTreating both integral and differential equation formulations in a unified manner, this book should be a useful reference for graduate use or self-study. Its primary focus is on open-region formulations, and the majority of the material is presented in the context of electromagnetic scattering.Table of ContentsPreface. Acknowledgments. Electromagnetic Theory. Integral Equation Methods for Scattering from Infinite Cylinders. Differential Equation Methods for Scattering from Infinite Cylinders. Algorithms for the Solution of Linear Systems of Equations. The Discretization Process. Basis/Testing Functions and Convergence. Alternative Surface Integral Equation Formulations. Strip Gratings and Other Two-Dimensional Structures with One-Dimensional Periodicity. Three-Dimensional problems with Translational or Rotational Symmetry. Subsectional Basis Functions for MultiDimensional and Vector Problems. Integral Equation Methods for Three-Dimensional Bodies. Frequency-Domain Differential Equation Formulations for Open Three-Dimensional Problems. Finite-Difference Time-Domain Methods on Orthogonal Meshes. Appendix A: Quadrature. Appendix B: Source-Field Relationships for Cylinders Illuminated by an Obliquely Incident Field. Appendix C: Fortran Codes for TM Scattering From Perfect Electric Conducting Cylinders. Appendix D: Additional Software Available Via the Internet. Index. About the Authors.
£157.45
Cengage Learning, Inc Python Programming for the Absolute Beginner
Book SynopsisTrade ReviewIntroduction. 1. Getting Started: The Game Over Program. 2. Types, Variables, and Simple I/O: The Useless Trivia Program. 3. Branching, while Loops, and Program Planning: The Guess My Number Game. 4. for Loops, Strings, and Tuples: The Word Jumble Game. 5. Lists and Dictionaries: The Hangman Game. 6. Functions: Tic-Tac-Toe. 7. Files and Exceptions: The Trivia Challenge Game. 8. Software Objects: The Critter Caretaker Program. 9. Object-Oriented Programming: The Blackjack Game. 10. GUI Development: The Mad Lib Program.Table of ContentsIntroduction. 1. Getting Started: The Game Over Program. 2. Types, Variables, and Simple I/O: The Useless Trivia Program. 3. Branching, while Loops, and Program Planning: The Guess My Number Game. 4. for Loops, Strings, and Tuples: The Word Jumble Game. 5. Lists and Dictionaries: The Hangman Game. 6. Functions: Tic-Tac-Toe. 7. Files and Exceptions: The Trivia Challenge Game. 8. Software Objects: The Critter Caretaker Program. 9. Object-Oriented Programming: The Blackjack Game. 10. GUI Development: The Mad Lib Program.
£37.79
Cengage Learning, Inc Technology for Success
Book SynopsisGain a thorough understanding of today's sometimes daunting, ever-changing world of technology as you learn how to apply the latest technology to your academic, professional and personal life with TECHNOLOGY FOR SUCCESS: COMPUTER CONCEPTS. Written by a team of best-selling technology authors and based on extensive research and feedback from students like you, this edition breaks each topic into brief, inviting lessons that address the what, why and how behind digital advancements to ensure deep understanding and application to today's real world. Optional online MindTap and SAM (Skills Assessment Manager) learning tools offer hands-on and step-by-step training, videos that cover the more difficult concepts and simulations that challenge you to solve problems in the actual world. You leave this course able to read the latest technology news and understand its impact on your daily life, the economy and society.Table of ContentsModule 1: Impact of Digital Technology Module 2: The Web Module 3: Computer Hardware Module 4: Operating Systems and File Management Module 5: Software and Apps Module 6: Security and Safety Module 7: Digital Media Module 8: Program and App Use and Development Module 9: Web Development Module 10: Networking Module 11: Digital Communication Module 12: Digital Transformation: Cloud, E-commerce, and AI Module 13: Databases Module 14: Digital Ethics and Lifestyle
£52.24
Copperhill Media Corporation A Comprehensible Guide to Controller Area Network
£14.25
O'Reilly Media Raspberry Pi Cookbook 4E
Book SynopsisThe fourth edition of this popular cookbook provides more than 200 hands-on recipes (complete with code) that show you how to run this tiny low-cost computer with Linux, program it with Python, hook it up to sensors and motors, and use it with the internet of things (IoT).
£39.74
Pearson Education Edexcel GCSE 91 Computer Science Student Book
Book SynopsisThe Pearson Edexcel GCSE (9-1) Computer Science Student Book will support you through your GCSE in computer science with a scenario-based approach to problem solving and computational thinking. The content is designed to inspire and motivate by helping you to relate and apply your skills to real-world contexts and make learning relevant.Table of Contents Chapter 1: Problem solving Chapter 2: Programming Chapter 3: Data Chapter 4: Computers Chapter 5: Communication and the internet Chapter 6: The bigger picture Glossary
£26.39
John Wiley & Sons Inc Building Winning Algorithmic Trading Systems
Book SynopsisDevelop your own trading system with practical guidance and expert advice In Building Algorithmic Trading Systems: A Trader's Journey From Data Mining to Monte Carlo Simulation to Live Training, award-winning trader Kevin Davey shares his secrets for developing trading systems that generate triple-digit returns.Table of ContentsAcknowledgments ix About the Author x Introduction 1 Part I A Trader’s Journey 7 Chapter 1 The Birth of a Trader 9 Chapter 2 Enough Is Enough 15 Chapter 3 World Cup Championship of Futures Trading ® Triumph 23 Chapter 4 Making the Leap—Transitioning to Full Time 33 Part II Your Trading System 41 Chapter 5 Testing and Evaluating a Trading System 43 Chapter 6 Preliminary Analysis 53 Chapter 7 Detailed Analysis 61 Chapter 8 Designing and Developing Systems 71 Part III Developing a Strategy 77 Chapter 9 Strategy Development—Goals and Objectives 79 Chapter 10 Trading Idea 83 Chapter 11 Let’s Talk about Data 93 Chapter 12 Limited Testing 103 Chapter 13 In-Depth Testing/Walk-Forward Analysis 115 Chapter 14 Monte Carlo Analysis and Incubation 129 Chapter 15 Diversification 133 Chapter 16 Position Sizing and Money Management 139 Chapter 17 Documenting the Process 147 Part IV Creating a System 153 Chapter 18 Goals, Initial and Walk-Forward Testing 155 Chapter 19 Monte Carlo Testing and Incubation 163 Part V Considerations Before Going Live 175 Chapter 20 Account and Position Sizing 177 Chapter 21 Trading Psychology 187 Chapter 22 Other Considerations before Going Live 195 Part VI Monitoring a Live Strategy 203 Chapter 23 The Ins and Outs of Monitoring a Live Strategy 205 Chapter 24 Real Time 219 Part VII Cautionary Tales 233 Chapter 25 Delusions of Grandeur 235 Conclusion 243 Appendix A Monkey Trading Example, TradeStation Easy Language Code 247 Appendix B Euro Night Strategy, TradeStation Easy Language Format 255 Appendix C Euro Day Strategy, TradeStation Easy Language Format 259 About the Companion Web Site 263 Index 265
£51.00
John Wiley & Sons Inc Beyond Cybersecurity
Book SynopsisMove beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprietary research, client experience, and interviews with over 200 executives, regulators, and security experts, offering you a well-rounded, thoroughly researched resource that presents its findings in an organized, approachable style. Members of the global economy have spent years and tens of billions of dollars fighting cyber threatsbut attacks remain an immense concern in the world of online business. The threat of data compromise that can lead to the leak of important financial and personal details can make consumers suspicious of the digital economy, and cause a noseTable of ContentsForeword vii Preface xi Executive Summary xxi 1 Cyber-attacks Jeopardize Companies’ Pace of Innovation 1 2 It Could Get Better—or $3 Trillion Worse 31 3 Prioritize Risks and Target Protections 53 4 Do Business in a Digitally Resilient Way 77 5 Modernize IT to Secure IT 101 6 Engage Attackers with Active Defense 123 7 After the Breach: Improve Incident Response across Business Functions 141 8 Build a Program that Drives toward Digital Resilience 157 9 Creating a Resilient Digital Ecosystem 185 Conclusion 209 Acknowledgments 213 About the Authors 215 Index 217
£24.79
Centre for the Study of Language & Information Things a Computer Scientist Rarely Talks About
Book SynopsisHow does a computer scientist understand infinity? What can probability theory teach us about free will? Can mathematical notions be used to enhance one's personal understanding of the Bible? This book contains six informal lectures by computer scientist Donald E. Knuth exploring the relationship between his vocation and his faith, revealing the unique perspective that his work with computing has lent to his understanding of God. Knuth's starting point is his 3:16 project, an application of mathematical "random sampling" to the books of the Bible. The first lectures tell the story of the project's conception and execution, exploring the complex dimensions of language translation, aesthetics, and theological history. Knuth also reveals the many insights that he has gained along the way from such interdisciplinary work. The theological musings culminate in a final lecture which tackles infinity, free will, and the other "big questions" that lie at the juncture of theology and computation. Each lecture ends with a question and answer exchange.
£19.00
MIT Press Category Theory for the Sciences The MIT Press
Book SynopsisAn introduction to category theory as a rigorous, flexible, and coherent modeling language that can be used across the sciences.Category theory was invented in the 1940s to unify and synthesize different areas in mathematics, and it has proven remarkably successful in enabling powerful communication between disparate fields and subfields within mathematics. This book shows that category theory can be useful outside of mathematics as a rigorous, flexible, and coherent modeling language throughout the sciences. Information is inherently dynamic; the same ideas can be organized and reorganized in countless ways, and the ability to translate between such organizational structures is becoming increasingly important in the sciences. Category theory offers a unifying framework for information modeling that can facilitate the translation of knowledge between disciplines.Written in an engaging and straightforward style, and assuming little background in mathematics, the book is
£49.40
Technics Publications LLC DAMA-DMBOK Guide: The DAMA Guide to the Data
Book Synopsis
£61.59
John Wiley & Sons Inc Green IT For Dummies
Book SynopsisGreen technology is not only good for the environment; it's also good for your bottom line. If your organization is exploring ways to save energy and reduce environmental waste, Green IT For Dummies can help you get there. This guide is packed with cost-saving ways to make your company a leader in green technology.Table of ContentsIntroduction. Part I: Understanding the World of Green IT. Chapter 1: Win-Win-Winning with Green IT. Chapter 2: Making the Business Case for Green IT. Chapter 3: Green Journeys in Action. Part II: Getting a Running Start. Chapter 4: Getting to Know the Standards and Metrics. Chapter 5: Assessing Your Current Energy Use and Needs. Chapter 6: Go Green in 12 Months: Putting Together a Plan. Part III: Greening the Data Center. Chapter 7: Laying the Foundation for Green Data Management. Chapter 8: Maximizing Data Center Efficiency. Chapter 9: Racking Up Green Servers. Chapter 10: Cooling Your Data Center. Chapter 11: Building a Green Storage System. Chapter 12: Grooming the Network for Green. Chapter 13: Using Virtualization. Part IV: Greening the Office. Chapter 14: Moving to Green Screens and Computing Machines. Chapter 15: Reducing Desktop Energy Waste. Chapter 16: Pursuing the Less-Paper Office. Chapter 17: Evaluating Green Gadgetry. Part V: Greening the Organization. Chapter 18: Greening the Facility. Chapter 19: e-Waste Not, e-Want Not. Chapter 20: Virtually There: Collaboration Technologies for a Greener World. Part VI: The Part of Tens. Chapter 21: Ten Organizations That Can Help with Green IT Objectives. Chapter 22: Ten Creative Computer Recycling Tips. Chapter 23: Ten Tips for a Green Home Office. Appendix A: Consumption and Savings Worksheets. Index.
£20.69
Princeton University Press Discrete and Computational Geometry
Book SynopsisAn essential introduction to discrete and computational geometryDiscrete geometry is a relatively new development in pure mathematics, while computational geometry is an emerging area in applications-driven computer science. Their intermingling has yielded exciting advances in recent years, yet what has been lacking until now is an undergraduate textbook that bridges the gap between the two. Discrete and Computational Geometry offers a comprehensive yet accessible introduction to this cutting-edge frontier of mathematics and computer science.This book covers traditional topics such as convex hulls, triangulations, and Voronoi diagrams, as well as more recent subjects like pseudotriangulations, curve reconstruction, and locked chains. It also touches on more advanced material, including Dehn invariants, associahedra, quasigeodesics, Morse theory, and the recent resolution of the Poincaré conjecture. Connections to real-world applications are made throughout, and algorithms are presented independently of any programming language. This richly illustrated textbook also features numerous exercises and unsolved problems. The essential introduction to discrete and computational geometry Covers traditional topics as well as new and advanced material Features numerous full-color illustrations, exercises, and unsolved problems Suitable for sophomores in mathematics, computer science, engineering, or physics Rigorous but accessible An online solutions manual is available (for teachers only) Trade Review"Discrete and Computational Geometry meets an urgent need for an undergraduate text bridging the theoretical sides and the applied sides of the field. It is an excellent choice as a textbook for an undergraduate course in discrete and computational geometry! The presented material should be accessible for most mathematics or computer science majors in their second or third year in college. The book also is a valuable resource for graduate students and researchers."--Egon Schulte, Zentralblatt MATH "[W]e recommend this book for an undergraduate course on computational geometry. In fact, we hope to use this book ourselves when we teach such a class."--Brittany Terese Fasy and David L. Millman, SigAct News
£56.00
Automatic Press / VIP Philosophy of Computing and Information: 5 Questions
£18.65
John Wiley & Sons Inc Cryptography for Dummies
Book SynopsisCryptography is the most effective way to achieve data security and is essential to e-commerce activities such as online shopping, stock trading, and banking. This book explains the basics of encryption and various techniques and introduces readers to the terminology used in the subject.Trade Review“…a useful guide for anyone bamboozled by encryption…” (PC Utilities, June 2004) “The reader can dip into it whenever the mood takes them…” (MicroMart, 29th April 2004)Table of ContentsIntroduction 1 About This Book 2 How to Use This Book 2 What You Don’t Need to Read 3 Foolish Assumptions 3 How This Book Is Organized 3 Part I: Crypto Basics & What You Really Need to Know 4 Part II: Public Key Infrastructure 4 Part III: Putting Encryption Technologies to Work for You 4 Part IV: The Part of Tens 4 Part V: Appendixes 5 Icons Used in This Book 5 Where to Go from Here 5 Part I: Crypto Basics & What You Really Need to Know 7 Chapter 1: A Primer on Crypto Basics 9 It’s Not about James Bond 9 Go with the rhythm 10 Rockin’ the rhythm 11 Getting to Know the Basic Terms 12 What Makes a Cipher? 13 Concealment ciphers 13 Substitution ciphers 14 Transposition ciphers 15 Hash without the corned beef 16 XOR what? 17 Breaking Ciphers 20 Not-so-secret keys 20 Known plaintext 21 Pattern recognition 21 What a brute! 21 Cryptosystems 22 Everyday Uses of Encryption 23 Network logons and passwords 23 Secure Web transactions 25 ATMs 26 Music and DVDs 27 Communication devices 28 Why Encryption Isn’t More Commonplace 28 Difficulty in understanding the technology 29 You can’t do it alone 29 Sharing those ugly secrets 30 Cost may be a factor 30 Special administration requirements 31 Chapter 2: Major League Algorithms 33 Beware of “Snake Oil” 34 Symmetric Keys Are All the Same 37 The key table 37 Key generation and random numbers 38 Protecting the Key 39 Symmetric Algorithms Come in Different Flavors 40 Making a hash of it 40 Defining blocks and streams 42 Which is better: Block or stream? 44 Identifying Symmetric Algorithms 45 Des 45 Triple DES 45 Idea 46 Aes 46 Asymmetric Keys 47 Rsa 48 Diffie-Hellman (& Merkle) 49 Pgp 50 Elliptical Curve Cryptography 50 Working Together 52 Chapter 3: Deciding What You Really Need 53 Justifying the Costs to Management 53 Long-term versus short-term 54 Tangible versus intangible results 55 Positive ROI 55 Government due diligence 60 Insurers like it! 61 Presenting your case 61 Do You Need Secure Communications? 62 Secure e-mail 62 Instant Messaging (IM) 64 Secure e-commerce 64 Online banking 66 Virtual Private Networks (VPNs) 66 Wireless (In)security 68 Do You Need to Authenticate Users? 69 Who are your users? 70 Authentication tokens 71 Smart cards 72 Java tokens 73 Biometrics 74 Do You Need to Ensure Confidentiality and Integrity? 75 Protecting Personal Data 75 What’s It Gonna Cost? 77 Chapter 4: Locks and Keys 79 The Magic Passphrase 80 The weakest link 81 Mental algorithms 82 Safety first! 84 Passphrase attacks 86 Don’t forget to flush! 87 The Key Concept 88 Key generation 89 Protecting your keys 90 What to do with your old keys 91 Some cryptiquette 91 Part II: Public Key Infrastructure 93 Chapter 5: The PKI Primer 95 What Is PKI? 96 Certificate Authorities (CAs) 97 Digital Certificates 98 Desktops, laptops, and servers 100 Key servers 102 Registration Authorities (RAs) 103 Uses for PKI Systems 103 Common PKI Problems 105 Chapter 6: PKI Bits and Pieces 107 Certificate Authorities 108 Pretenders to the throne 110 Registration Authorities 110 Certificate Policies (CPs) 111 Digital Certificates and Keys 112 D’basing Your Certificates 113 Certificate Revocation 114 Picking the PKCS 115 PKCS #1: RSA Encryption Standard 115 PKCS #3: Diffie-Hellman Key Agreement Standard 115 PKCS #5: Password-Based Cryptography Standard 115 PKCS #6: Extended-Certificate Syntax Standard 116 PKCS #7: Cryptographic Message Syntax Standard 116 PKCS #8: Private-Key Information Syntax Standard 116 PKCS #9: Selected Attribute Types 117 PKCS #10: Certification Request Syntax Standard 117 PKCS #11: Cryptographic Token Interface Standard 117 PKCS #12: Personal Information Exchange Syntax Standard 118 PKCS #13: Elliptic Curve Cryptography Standard 118 PKCS #14: Pseudo-Random Number Generation Standard 118 PKCS #15: Cryptographic Token Information Format Standard 118 Chapter 7: All Keyed Up! 119 So, What Exactly IS a Key? 120 Making a Key 120 The Long and Short of It 121 Randomness in Keys Is Good 122 Storing Your Keys Safely 123 Keys for Different Purposes 124 Keys and Algorithms 124 One Key; Two Keys 125 Public/private keys 126 The magic encryption machine 127 The magic decryption machine 128 Symmetric keys (again) 129 Trusting Those Keys 129 Key Servers 130 Keeping keys up to date 131 Policies for keys 132 Key escrow and key recovery 132 Part III: Putting Encryption Technologies to Work for You 135 Chapter 8: Securing E-Mail from Prying Eyes 137 E-Mail Encryption Basics 138 S/mime 138 Pgp 139 Digital Certificates or PGP Public/Private Key Pairs? 140 What’s the diff? 140 When should you use which? 141 Sign or encrypt or both? 141 Remember that passphrase! 142 Using S/MIME 142 Setting up S/MIME in Outlook Express 143 Backing up your Digital Certificates 151 Fun and Games with PGP 153 Setting up PGP 154 Deciding on the options 156 Playing with your keyring 160 Sending and receiving PGP messages 162 PGP in the enterprise 164 Other Encryption Stuff to Try 164 Chapter 9: File and Storage Strategies 167 Why Encrypt Your Data? 168 Encrypted Storage Roulette 170 Symmetric versus asymmetric? 171 Encrypting in the air or on the ground? 173 Dealing with Integrity Issues 174 Message digest/hash 174 MACs 175 HMACs 175 Tripwire 176 Policies and Procedures 177 Examples of Encryption Storage 178 Media encryption 179 Encrypting File System 180 Secure e-mail 181 Program-specific encryption 181 Encrypted backup 181 Chapter 10: Authentication Systems 183 Common Authentication Systems 185 Kerberos 185 Ssh 186 Radius 187 Tacacs+ 188 Authentication Protocols 188 How Authentication Systems Use Digital Certificates 190 Tokens, Smart Cards, and Biometrics 191 Digital Certificates on a PC 191 Time-based tokens 192 Smartcard and USB Smartkeys 193 Biometrics 194 Chapter 11: Secure E-Commerce 197 SSL Is the Standard 198 A typical SSL connection 199 Rooting around your certificates 201 Time for TLS 203 Setting Up an SSL Solution 204 What equipment do I need? 205 The e-commerce manager’s checklist 206 XML Is the New Kid on the Block 209 Going for Outsourced E-Commerce 210 Chapter 12: Virtual Private Network (VPN) Encryption 213 How Do VPNs Work Their Magic? 214 Setting Up a VPN 214 What devices do I need? 215 What else should I consider? 216 Do VPNs affect performance? 216 Don’t forget wireless! 217 Various VPN Encryption Schemes 217 PPP and PPTP 217 L2tp 218 IPsec 218 Which Is Best? 220 Testing, Testing, Testing 221 Chapter 13: Wireless Encryption Basics 223 Why WEP Makes Us Weep 224 No key management 225 Poor RC4 implementation 225 Authentication problems 226 Not everything is encrypted 226 WEP Attack Methods 227 Finding wireless networks 228 War chalking 228 Wireless Protection Measures 230 Look for rogue access points 230 Change the default SSIDs 230 Turn on WEP 231 Position your access points well 232 Buy special antennas 232 Use a stronger encryption scheme 232 Use a VPN for wireless networks 232 Employ an authentication system 233 Part IV: The Part of Tens 235 Chapter 14: The Ten Best Encryption Web Sites 237 Mat Blaze’s Cryptography Resource on the Web 237 The Center for Democracy and Technology 237 SSL Review 238 How IPsec Works 238 Code and Cipher 238 CERIAS — Center for Education and Research in Information Assurance and Security 238 The Invisible Cryptologists — African Americans, WWII to 1956 239 Bruce Schneier 239 North American Cryptography Archives 239 RSA’s Crypto FAQ 239 Chapter 15: The Ten Most Commonly Misunderstood Encryption Terms 241 Military-Grade Encryption 241 Trusted Third Party 241 X 509 Certificates 242 Rubber Hose Attack 242 Shared Secret 242 Key Escrow 242 Initialization Vector 243 Alice, Bob, Carol, and Dave 243 Secret Algorithm 243 Steganography 244 Chapter 16: Cryptography Do’s and Don’ts 245 Do Be Sure the Plaintext Is Destroyed after a Document Is Encrypted 245 Do Protect Your Key Recovery Database and Other Key Servers to the Greatest Extent Possible 246 Don’t Store Your Private Keys on the Hard Drive of Your Laptop or Other Personal Computing Device 246 Do Make Sure Your Servers’ Operating Systems Are “Hardened” before You Install Cryptological Systems on Them 246 Do Train Your Users against Social Engineering 247 Do Create the Largest Key Size Possible 247 Do Test Your Cryptosystem after You Have It Up and Running 248 Do Check the CERT Advisories and Vendor Advisories about Flaws and Weaknesses in Cryptosystems 248 Don’t Install a Cryptosystem Yourself If You’re Not Sure What You Are Doing 248 Don’t Use Unknown, Untested Algorithms 249 Chapter 17: Ten Principles of “Cryptiquette” 251 If Someone Sends You an Encrypted Message, Reply in Kind 251 Don’t Create Too Many Keys 251 Don’t Immediately Trust Someone Just Because He/She Has a Public Key 252 Always Back Up Your Keys and Passphrases 252 Be Wary of What You Put in the Subject Line of Encrypted Messages 252 If You Lose Your Key or Passphrase, Revoke Your Keys as Soon as Possible 253 Don’t Publish Someone’s Public Key to a Public Key Server without His/Her Permission 253 Don’t Sign Someone’s Public Key Unless You Have Reason To 253 If You Are Corresponding with Someone for the First Time, Send an Introductory Note Along with Your Public Key 254 Be Circumspect in What You Encrypt 254 Chapter 18: Ten Very Useful Encryption Products 255 PGP: Pretty Good Privacy 255 Gaim 255 madeSafe Vault 256 Password Safe 256 Kerberos 256 OpenSSL and Apache SSL 256 SafeHouse 257 WebCrypt 257 Privacy Master 257 Advanced Encryption Package 257 Part V: Appendixes 259 Appendix A: Cryptographic Attacks 261 Known Plaintext Attack 262 Chosen Ciphertext Attacks 262 Chosen Plaintext Attacks 263 The Birthday Attack 263 Man-in-the-Middle Attack 263 Timing Attacks 264 Rubber Hose Attack 264 Electrical Fluctuation Attacks 265 Major Boo-Boos 265 Appendix B: Glossary 267 Appendix C: Encryption Export Controls 279 Index 283
£23.99
Dorling Kindersley Ltd Help Your Kids with Computer Science Key Stages
Book SynopsisFrom coding languages and hardware to cyberbullying and gaming, this comprehensive homework helper for kids and parents covers the essentials of computer science. This unique visual study guide examines the technical aspects of computers, such as how they function, the latest digital devices and software, and how the Internet works. It also builds the confidence of parents and kids when facing challenges such as staying safe online, digital etiquette, and how to navigate the potential pitfalls of social media.Help Your Kids with Computer Science supports the Key Stage 1 to 5 curriculum in the UK, including GCSE and A-level Computer Science, and beyond. Jargon-free language helps to explain difficult and potentially dread-inducing homework such as hacking, big data and malware, while colourful graphics help make learning about the world of computer science exciting.Whether at home or school, this clear and helpful guide to computer science is theTrade ReviewThis is one in a superb series from DK, which covers the key subjects taught at school * Parents in Touch *
£15.29
Cengage Learning, Inc Fundamentals of Python
Book SynopsisMaster today's required computer science topics while preparing for further study with Lambert's FUNDAMENTALS OF PYTHON: FIRST PROGRAMS. This book's easygoing approach is ideal, no matter what your background. The approach starts with simple algorithmic code and then scales into working with functions, objects, and classes as the problems become more complex and require new abstraction mechanisms. Rather than working only with numeric or text-based applications like other introductory texts, this edition presents graphics, image manipulation, GUIs, and simple networked client/server applications. The author uses Python's standard Turtle graphics module to introduce graphics and to provide open source frameworks for easy image processing and GUI application development.Table of Contents1. Introduction. 2. Data Types and Expressions. 3. Control Statements. 4. Strings and Text Files. 5. Lists and Dictionaries. 6. Design with Functions. 7. Simple Graphics and Image Processing. 8. Graphical User Interfaces. 9. Design with Classes. 10. Network Applications and Client/Server Programming. 11. Searching, Sorting, and Complexity. Appendices. Glossary. Index.
£66.49
Pragmatic Bookshelf Practical Programming, 3e: An Introduction to
Book SynopsisClassroom-tested by tens of thousands of students, this new edition of the bestselling intro to programming book is for anyone who wants to understand computer science. Learn about design, algorithms, testing, and debugging. Discover the fundamentals of programming with Python 3.6--a language that's used in millions of devices. Write programs to solve real-world problems, and come away with everything you need to produce quality code. This edition has been updated to use the new language features in Python 3.6. No programming experience required! Incremental examples show you the steps and missteps that happen while developing programs, so you know what to expect when you tackle a problem on your own. Inspired by "How to Design Programs" (HtDP), discover a five-step recipe for designing functions, which helps you learn the concepts--and becomes an integral part of writing programs. In this detailed introduction to Python and to computer programming, find out exactly what happens when your programs are executed. Work with numbers, text, big data sets, and files using real-world examples. Create and use your own data types. Make your programs reliable, work with databases, download data from the web automatically, and build user interfaces. As you use the fundamental programming tools in this book, you'll see how to document and organize your code so that you and other programmers can more easily read and understand it. This new edition takes advantage of Python 3.6's new features, including type annotations on parameters, return types and variable declarations, and changes to string formatting. Most importantly, you'll learn how to think like a professional programmer. What You Need: You'll need to download Python 3.6, available from https://python.org. With that download comes IDLE, the editor we use for writing and running Python programs. (If you use Linux, you may need to install Python 3.6 and IDLE separately.)
£37.99
University of Minnesota Press Debates in the Digital Humanities
Book SynopsisLeading figures in the digital humanities explore the field’s rapid revolutionTrade Review"Is there such a thing as ‘digital’ humanities? From statistical crunches of texts to new forms of online collaboration and peer review, it’s clear something is happening. This book is an excellent primer on the arguments over just how much is changing—and how much more ought to—in the way scholars study the humanities." —Clive Thompson, columnist for Wired and contributing writer for the New York Times Magazine "I look forward to the day when anxieties about the disruptive nature of ‘digital humanities’ fade into memory and the innovative methods, theories, and approaches championed by those who have contributed to this valuable volume are respected across academia for their rigor and utility. This book will go a long way toward clarifying the debates within and about digital humanities." —Siva Vaidhyanathan, author of The Googlization of Everything—and Why We Should Worry"Though Debates in the Digital Humanities is well over 500 pages in length, there is no fat in it; all essays contain important information and concepts relating to DH. Taken together, the book as a whole and every essay in it is a must-read for anyone who claims to be a digital humanist whether she or he works in theory, pedagogy, and/or practice." —Leonardo ReviewsTable of ContentsContentsIntroduction: The Digital Humanities MomentMatthew K. GoldPart I. Defining the Digital Humanities1. What Is Digital Humanities and What’s It Doing in English Departments?Matthew Kirschenbaum2. The Humanities, Done DigitallyKathleen Fitzpatrick3. This Is Why We Fight: Defining the Values of the Digital HumanitiesLisa Spiro4. Beyond the Big TentPatrik SvenssonBlog PostsThe Digital Humanities SituationRafael AlvaradoWhere’s the Beef? Does Digital Humanities Have to Answer Questions?Tom ScheinfeldtWhy Digital Humanities Is “Nice”Tom ScheinfeldtAn Interview with Brett BobleyMichael Gavin and Kathleen Marie SmithDay of DH: Defining the Digital HumanitiesPart II. Theorizing the Digital Humanities5. Developing Things: Notes toward an Epistemology of Building in the Digital HumanitiesStephen Ramsay and Geoffrey Rockwell6. Humanistic Theory and Digital ScholarshipJohanna Drucker7. This Digital Humanities which Is Not OneJamie “Skye” Bianco8. A Telescope for the Mind?Willard McCartyBlog PostsSunset for Ideology, Sunrise for Methodology?Tom ScheinfeldtHas Critical Theory Run Out of Time for Data-Driven Scholarship?Gary HallThere Are No Digital HumanitiesGary HallPart III. Critiquing the Digital Humanities9. Why Are the Digital Humanities So White?, or, Thinking the Histories of Race and ComputationTara McPherson10. Hacktivism and the Humanities: Programming Protest in the Era of the Digital UniversityElizabeth Losh11. Unseen and Unremarked On: Don DeLillo and the Failure of the Digital HumanitiesMark L. Sample12. Disability, Universal Design, and the Digital HumanitiesGeorge H. Williams13. The Digital Humanities and Its UsersCharlie EdwardsBlog PostsDigital Humanities Triumphant?William PannapackerWhat Do Girls Dig?Bethany NowviskieThe Turtlenecked HairshirtIan BogostEternal September of the Digital HumanitiesBethany NowviskiePart IV. Practicing the Digital Humanities14. Canons, Close Reading, and the Evolution of MethodMatthew Wilkens15. Electronic Errata: Digital Publishing, Open Review, and the Futures of CorrectionPaul Fyfe16. The Function of Digital Humanities Centers at the Present TimeNeil Fraistat17. Time, Labor, and “Alternate Careers” in Digital Humanities Knowledge WorkJulia Flanders18. Can Information Be Unfettered?: Race and the New Digital Humanities CanonAmy E. EarhartBlog PostsThe Social Contract of Scholarly PublishingDaniel J. CohenIntroducing Digital Humanities NowDaniel J. CohenText: A Massively Addressable ObjectMichael WitmoreThe Ancestral TextMichael WitmorePart V. Teaching the Digital Humanities19. Digital Humanities and the “Ugly-Stepchildren” of American Higher EducationLuke Waltzer20. Graduate Education and the Ethics of the Digital HumanitiesAlexander Reid21. Should Liberal Arts Campuses Do Digital Humanities?: Process and Products in the Small College WorldBryan Alexander and Rebecca Frost Davis22. Where’s the Pedagogy?: The Role of Teaching and Learning in the Digital HumanitiesStephen BrierBlog PostsVisualizing Millions of WordsMills KellyWhat’s Wrong with Writing EssaysMark L. SampleLooking for Whitman: A Grand, Aggregated ExperimentMatthew K. Gold and Jim
£25.19
Princeton University Press A Students Guide to Python for Physical Modeling
Book Synopsis
£22.50
Cengage Learning, Inc Data Communication and Computer Networks
Book SynopsisTable of Contents1. Introduction to Computer Networks and Data Communications. 2. Conducted and Radiated Media. 3. Fundamentals of Data and Signals. 4. Connections and Errors. 5. Wired and Wireless Local Area Networks. 6. Network Systems, Services, and Software. 7. Beyond the Local Area Network. 8. Risk, Security, and Compliance. 9. Wide Area Networks. 10. Connecting Networks. 11. Network Design and Management. 12. Business Principles in the Cloud.
£75.99
Cengage Learning, Inc Programming with Python
Book SynopsisIdeal for anyone who has never programmed, McMullen/Matthews/Parsons' PROGRAMMING WITH PYTHON uses a beginner's approach that combines conceptual content with rich examples and hands-on learning activities. Straightforward and student friendly, it emphasizes fundamental computer concepts from a Python programming perspective using a clear presentation with little technical jargon. Modules introduce important computer science concepts, procedural programming and object-oriented programming in short segments, while real-world examples, streamlined code and descriptive figures help you better understand today's computing concepts. As you strengthen your computer science knowledge, you will also sharpen critical-thinking and problem-solving skills -- and build confidence.Table of Contents1. Computational Thinking. 2. Programming Tools. 3. Literals, Variables, and Constants. 4. Numeric Data Types and Expressions. 5. Character and String Data Types. 6. Decision Control Structures. 7. Repetition Control Structures. 8. Lists. 9. Functions. 10. Exceptions. 11. File Operations. 12. Recursion. 13. Modules. 14. Classes and Objects. 15. Methods. 16. Encapsulation. 17. Inheritance. 18. Polymorphism. 19. Linked List Data Structures. 20. Stacks, Queues, and Tables. 21. Trees and Graphs. 22. Algorithm Complexity and Big-O Notation. 23. Search Algorithms. 24. Sorting Algorithms. 25. Processor Architecture. 26. Data Representation. 27. Programming Paradigms. 28. User Interfaces. 29. Software Development Methodologies. 30. Pseudocode, Flowcharts, and Decision Tables. 31. Unified Modeling Language.
£62.69
Cengage Learning, Inc CompTIA A Guide to IT Technical Support
Book SynopsisTable of ContentsCORE 1. Module 1. Taking a Computer Apart and Putting It Back Together. Module 2. All About Motherboards. Module 3. Supporting Processors and Upgrading Memory. Module 4. Power Supplies and Troubleshooting Computer Problems. Module 5. Hard Drives and Other Storage Devices. Module 6. Supporting I/O Devices. Module 7. Networking Fundamentals. Module 8. Network Infrastructure and Cloud Computing. Module 9. Supporting Mobile Devices. Module 10. Supporting Printers. CORE 2. Module 11. The Complex World of IT Professionals. Module 12. Installing Windows. Module 13. Maintaining Windows. Module 14. Troubleshooting Windows After Startup. Module 15. Troubleshooting Windows Startup. Module 16. Security Strategies. Module 17. Securing and Sharing Windows Resources. Module 18. Mobile Device Security. Module 19. Network Security and Troubleshooting. Module 20. Supporting MacOS. Module 21. Linux and Scripting. Appendix A. Safety Procedures and Environmental Concerns. Appendix B. Entry Points for Windows Startup Processes. Appendix C. CompTIA A+ Acronyms.
£71.24
McGraw-Hill Education OCP Java SE 8 Programmer II Exam Guide Exam
Book Synopsis Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. A Complete, Integrated Study System for OCP Exam 1Z0-809 Study for the OCP Java SE 8 Programmer II exam using this effective exam preparation guide from Oracle Press. Written by a team of experts, including two developers of the original exam, OCP Java SE 8 Programmer II Exam Guide (Exam 1Z0-809) offers comprehensive coverage of every subject on the test and lays out essential Java programming skills. Throughout, step-by-step exercises; self-tests; and âœExam Watch,â âœInside the Exam,â and âœOn the Jobâ sections highliTable of ContentsChapter 1: Declarations, Access Control, and EnumsChapter 2: Object OrientationChapter 3: Assertions and ExceptionsChapter 4: Dates, Times, Locales, and Resource BundlesChapter 5: I/O and NIOChapter 6: Generics and CollectionsChapter 7: Inner ClassesChapter 8: Lambda Expressions and Functional InterfacesChapter 9: StreamsChapter 10: ThreadsChapter 11: ConcurrencyChapter 12: JDBC
£43.48
Lonely Scholar Algorithmic Barriers Falling: P=np?
£14.99
WW Norton & Co The Case Against Reality Why Evolution Hid the
Book SynopsisCan we trust our senses to tell us the truth?Trade Review"A masterpiece of logic, rationality, science, and mathematics. Read this book carefully and you will forever change your understanding of reality, both that of the universe and your own self." -- Deepak Chopra, author of The Healing Self"Hoffman’s truly radical theory will force us to ponder reality in a completely different light. Handle with care. Your perception of the world around you is about to be dismantled!" -- Chris Anderson, author of TED Talks"Think you know what’s really out there? Read this breathtaking, whistle-stop tour of a book that illuminates all the profound weirdness masked by our experience and assumptions." -- David Eagleman, best-selling author of The Brain and Incognito"A fresh view into who we truly are—one that transcends the perceptions that we accept as reality. Hoffman unapologetically takes us down a rabbit hole where we learn that all reality is virtual and that truth lies solely in you, the creator." -- Rudolph Tanzi, coauthor of Super Brain"Captivating and courageous…anyone who reads this book will likely never look at the world the same way again. Hoffman challenges us to rethink some of the most basic foundations of neuroscience and physics, which could prove to be exactly what we need to make progress on the most difficult questions we face about the nature of reality." -- Annaka Harris, author of Conscious"In the mood to have your mind blown? In this fascinating, deeply original, and wonderfully engaging book, Hoffman takes us on a tour of the uncharted territory where cognitive science, fundamental physics, and evolutionary biology meet— and where the nature of reality hangs in the balance. You’ll never look at the world— or, rather, your interface— the same way again." -- Amanda Gefter, author of Trespassing on Einstein’s Lawn"Woody Allen once said, ‘I hate reality, but . . . where else can you get a good steak dinner?’ Hoffman turns that joke on its head: What we have always been after is the steak dinner; what we call reality is our best adapted strategy for getting it. Sink your teeth into that!" -- Christopher A. Fuchs, professor of physics, University of Massachusetts Boston"This book is a must-read if you want to bring your understanding of ‘reality’ in sync with the way the World is. You are in for some major surprises and mind expanding. A good read that will set you thinking about yourself, others and the world." -- Jan Koenderink, author of Color for the Sciences
£14.24
Pearson Education (US) OpenACC for Programmers
Book SynopsisSunita Chandrasekaran is assistant professor in the Computer and Information Sciences Department at the University of Delaware. Her research interests include exploring the suitability of high-level programming models and runtime systems for HPC and embedded platforms, and migrating scientific applications to heterogeneous computing systems. Dr. Chandrasekaran was a post-doctoral fellow at the University of Houston and holds a Ph.D. from Nanyang Technological University, Singapore. She is a member of OpenACC, OpenMP, MCA and SPEC HPG. She has served on the program committees of various conferences and workshops including SC, ISC, ICPP, CCGrid, Cluster, and PACT, and has co-chaired parallel programming workshops co-located with SC, ISC, IPDPS, and SIAM. Guido Juckeland is head of the Computational Science Group, Department for Information Services and Computing, Helmholtz-Zentrum Dresden-Rossendorf, and coordinates the work of the GPU Center Table of ContentsForeword xv Preface xxi Acknowledgments xxiii About the Contributors xxv Chapter 1: OpenACC in a Nutshell 1 1.1 OpenACC Syntax 3 1.2 Compute Constructs 6 1.3 The Data Environment 11 1.4 Summary 15 1.5 Exercises 15 Chapter 2: Loop-Level Parallelism 17 2.1 Kernels Versus Parallel Loops 18 2.2 Three Levels of Parallelism 21 2.3 Other Loop Constructs 24 2.4 Summary 30 2.5 Exercises 31 Chapter 3: Programming Tools for OpenACC 33 3.1 Common Characteristics of Architectures 34 3.2 Compiling OpenACC Code 35 3.3 Performance Analysis of OpenACC Applications 36 3.4 Identifying Bugs in OpenACC Programs 51 3.5 Summary 53 3.6 Exercises 54 Chapter 4: Using OpenACC for Your First Program 59 4.1 Case Study 59 4.2 Creating a Naive Parallel Version 68 4.3 Performance of OpenACC Programs 71 4.4 An Optimized Parallel Version 73 4.5 Summary 78 4.6 Exercises 79 Chapter 5: Compiling OpenACC 81 5.1 The Challenges of Parallelism 82 5.2 Restructuring Compilers 88 5.3 Compiling OpenACC 92 5.4 Summary 97 5.5 Exercises 97 Chapter 6: Best Programming Practices 101 6.1 General Guidelines 102 6.2 Maximize On-Device Compute 105 6.3 Optimize Data Locality 108 6.4 A Representative Example 112 6.5 Summary 118 6.6 Exercises 119 Chapter 7: OpenACC and Performance Portability 121 7.1 Challenges 121 7.2 Target Architectures 123 7.3 OpenACC for Performance Portability 124 7.4 Code Refactoring for Performance Portability126 7.5 Summary 132 7.6 Exercises133 Chapter 8: Additional Approaches to Parallel Programming 135 8.1 Programming Models135 8.2 Programming Model Components142 8.3 A Case Study 155 8.4 Summary170 8.5 Exercises170 Chapter 9: OpenACC and Interoperability 173 9.1 Calling Native Device Code from OpenACC 174 9.2 Calling OpenACC from Native Device Code 181 9.3 Advanced Interoperability Topics 182 9.4 Summary185 9.5 Exercises185 Chapter 10: Advanced OpenACC 187 10.1 Asynchronous Operations 187 10.2 Multidevice Programming 204 10.3 Summary 213 10.4 Exercises 213 Chapter 11: Innovative Research Ideas Using OpenACC, Part I 215 11.1 Sunway OpenACC 215 11.2 Compiler Transformation of Nested Loops for Accelerators 224 Chapter 12: Innovative Research Ideas Using OpenACC, Part II 237 12.1 A Framework for Directive-Based High-Performance Reconfigurable Computing 237 12.2 Programming Accelerated Clusters Using XcalableACC 253 Index 269
£35.14
McGraw-Hill Education CISA Certified Information Systems Auditor
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Hundreds of accurate practice questions that cover every topic on the latest version of the CISA examWritten by an IT security and audit expert, this highly effective self-study guide covers all five domains included on the 2019 release of the Certified Information Systems Auditor exam. To reinforce important skills and facilitate retention, every question is accompanied by explanations for both correct and incorrect answers. Designed to help you pass the test with greater confidence, this book is also an ideal companion to the bestselling CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition. Covers all five exam domains:â Information Systems Auditing Processâ Governance and ManagemenTable of ContentsChapter 1: Becoming a CISAChapter 2: IT Governance and ManagementChapter 3: The Audit ProcessChapter 4: IT Life Cycle ManagementChapter 5: IT Service Delivery and InfrastructureChapter 6: Information Asset ProtectionAppendix A: Conducting a Professional AuditAppendix B: Popular Methodologies, Frameworks, and Guidance
£23.24
Elsevier Science & Technology Computers as Components
Book Synopsis
£66.56
SDC Publications Design Integration Using Autodesk Revit 2023:
Book SynopsisDesign Integration Using Autodesk Revit 2023 is designed to provide you with a well-rounded knowledge of Autodesk Revit tools and techniques. All three disciplines of the Revit platform are introduced in this textbook.
£68.40
SDC Publications Autodesk AutoCAD Architecture 2024 Fundamentals
Book Synopsis
£59.84
O'Reilly Media Python in a Nutshell
Book SynopsisCarefully curated by recognized experts in Python, this updated fourth edition focuses on version 3.10, bringing this seminal work on the Python language fully up to date on five releases, including preview coverage of upcoming 3.11 features.
£53.99
MIT Press Ltd The Little Learner
Book Synopsis
£45.00
SDC Publications Official Guide to Certified SOLIDWORKS Associate
Book Synopsis
£56.99
HarperCollins UK Collins International Primary Computing
Book SynopsisCollins International Primary Computing series is structured around six themes relating to computing and digital literacy and offers learners a comprehensive and engaging approach to learning, enhanced by real-world applications. Each chapter is organised to develop essential skills, leading learners towards the creation of a final project.
£12.23
John Wiley & Sons Inc AI for Humanity
Book SynopsisCapture the value of cutting-edge AI while mitigating its most salient risks AI For Humanity: Building a Sustainable AI for the Future delivers an incisive and timely discussion of how to design, build, and implement cutting-edge AI in for-profit firms and other organizations in a responsible, sustainable, and ethical way. The book walks you through the three pillars of human-focused AI developmentgovernance, technology, and commercializationand dives deep into each one, showing you how to create AI products and services that better humanity and advance universally held values. You'll find methodologies and frameworks that mitigate against some of the most profound and unsettling risks of unchecked artificial intelligence development, and roadmaps to help you avoid the numerous pitfalls and traps awaiting unsuspecting companies, managers, and executives. You'll also discover: Real-world case studies, from companies including SAP, Huawei, and Tencent, demonstrating the actual dilemmas and questions firms face when developing and implementing this extraordinary techActionable commitments you can make to help ensure you and your company avoid the ethical and reputational risks associated with AIStrategies for AI product and service development consistent with sustainable growth Perfect for managers, executives, directors, and other business leaders with a stake in responsible artificial intelligence design, development, and implementation, AI For Humanity will also interest regulators, academics, thought leaders, and policy makers doing their best to capture AI's substantial potential value while mitigating its most serious risks.
£24.79
Illustrated Microsoft 365 Office Introductory
Book SynopsisIncluding the latest Microsoft 365 features and enhanced support for Mac users in introductory level modules, Beskeen/Cram/Duffy/Wermers/Wilson's ILLUSTRATED MICROSOFT 365 & OFFICE INTRODUCTORY, FIRST EDITION, helps you quickly master the nuances of Microsoft Office. A concise, student-friendly approach uses a two-page layout, allowing you to work through an entire task without turning the page. Modules begin with an overview of the principles covered while large, full-color screen images illustrate what you see on your computer. Module Learning Objectives are mapped to Microsoft Office Specialist (MOS) certification objectives, and module scenarios are based on data from market insights, helping you sharpen the critical skills you need for real-world success. In addition, MindTap and SAM (Skills Assessment Manager) digital resources help maximize your study time and results.
£187.08
SDC Publications Creo Parametric 9.0 Advanced Tutorial
Book SynopsisThe purpose of Creo Parametric 9.0 Advanced Tutorial is to introduce you to some of the more advanced features, commands, and functions in Creo Parametric. Each lesson concentrates on a few of the major topics and the text attempts to explain the whyâs of the commands in addition to a concise step-by-step description of new command sequences.This book is suitable for a second course in Creo Parametric and for users who understand the features already covered in Roger Toogoodâs Creo Parametric Tutorial. The style and approach of the previous tutorial have been maintained from the previous book and the text picks up right where the last tutorial left off.The material covered in this tutorial represents an overview of what is felt to be the most commonly used and important functions. These include customization of the working environment, advanced feature creation (sweeps, round sets, draft and tweaks, UDFs, patterns and family tables), layers, Pro/PROGRAM, and advanced drawing and assembly functions.Creo Parametric 9.0 Advanced Tutorial consists of eight lessons. A continuing theme throughout the lessons is the creation of parts for a medium-sized modeling project. The project consists of a small three-wheeled utility cart. Project parts are given at the end of each lesson that utilize functions presented earlier in that lesson. Final assembly is performed in the last lesson.
£61.75
Cengage Learning, Inc The Shelly Cashman Series Microsoft Office 365Â
Book SynopsisTable of ContentsExcel Module 1: Creating a Worksheet and a Chart. Excel Module 2: Formulas, Functions, and Formatting. Excel Module 3: Working with Large Worksheets, Charting, and What-If Analysis. Excel Module 4: Financial Functions, Data Tables, and Amortization Schedules. Excel Module 5: Working with Multiple Worksheets and Workbooks. Excel Module 6: Creating, Sorting, and Querying a Table. Excel Module 7: Creating Templates, Importing Data, and Working with SmartArt, Images, and Screenshots. Excel Module 8: Working with Trendlines, PivotTable Reports, PivotChart Reports, and Slicers. Excel Module 9: Formula Auditing, Data Validation, and Complex Problem Solving. Excel Module 10: Data Analysis with Power Tools and Creating Macros. Excel Module 11: User Interfaces, Visual Basic for Applications (VBA), and Collaboration Features in Excel.
£69.34
SDC Publications Autodesk Revit 2023 Architecture Basics: From the
Book SynopsisAutodesk Revit 2023 Architecture Basics is geared towards beginning architectural students or professional architects who want to get a jump-start into 3D parametric modeling for commercial structures.
£62.70
O'Reilly Media The Rules of Programming
Book SynopsisThis philosophy-of-programming guide presents a unique and entertaining take on how to think about programming. A collection of 21 pragmatic rules, each presented in a standalone chapter, captures the essential wisdom that every freshly minted programmer needs to know and provides thought-provoking insights for more seasoned programmers.
£27.74
Cengage Learning, Inc Programming With Microsoft Visual Basic 20192022
Book SynopsisWith PROGRAMMING WITH MICROSOFT VISUAL BASIC 2019/2022 by bestselling technology author Diane Zak, even readers with no prior programming experience can quickly learn how to effectively plan and create interactive Visual Basic 2019/2022 applications. A dynamic visual presentation, timely examples, step-by-step tutorials and practical exercises addressing a variety of learning styles make this the ideal introduction to programming. Through hands-on applications in a real-world setting, you will master the fundamentals of effective programming while working through Visual Basic 2019/2022's latest features. In addition to planning and creating your own Windows applications, you will learn about graphical user interface design skills, object-oriented programming concepts and planning tools such as Planning Charts, pseudocode and flowcharts. Also available: MindTap online learning platform.Table of Contents1. An Introduction to Visual Studio 2019/2022 and Visual Basic. 2. Planning Applications and Designing Interfaces. 3. Coding with Variables, Named Constants, and Calculations. 4. The Selection Structure. 5. The Repetition Structure. 6. Sub and Function Procedures. 7. String Manipulation. 8. Arrays. 9. Sequential Access Files and Menus. 10. Classes and Objects. 11. SQL Server Databases. 12. Database Queries with SQL. 13. Web Applications. Appendix A: GUI Design Guidelines. Appendix B: Additional Topics. Appendix C: Finding and Fixing Program Errors. Appendix D: Visual Basic 2019/2022 Cheat Sheet. Appendix E: Case Projects.
£68.39
John Wiley & Sons Inc Practical Industrial Cybersecurity
Book SynopsisTable of ContentsIntroduction xxiii Chapter 1 Industrial Control Systems 1 Introduction 2 Basic Process Control Systems 3 Closed- Loop Control Systems 5 Industrial Process Controllers 6 Supervisory Control and Data Acquisition Systems 20 System Telemetry 21 Utility Networks 23 OT/IT Network Integration 25 Industrial Safety and Protection Systems 28 Safety Instrument Systems 29 Review Questions 39 Exam Questions 41 Chapter 2 ICS Architecture 43 Introduction 44 Network Transmission Media 45 Copper Cabling 45 Fiber- Optic Cabling 46 Industrial Network Media Standards 49 Ethernet Connectivity 52 External Network Communications 53 Transmission Media Vulnerabilities 55 Field Device Architecture 56 PLC I/O Sections 58 PLC Implementations 62 Industrial Sensors 63 Final Control Elements/Actuators 71 Relays 73 Process Units 76 Industrial Network Protocols 79 Common Industrial Protocols 79 EtherNet/IP Protocol 79 Modbus 80 ProfiNet/ProfiBus 81 Dnp3 82 Iccp 83 Opc 83 BACnet 83 Enterprise Network Protocols 84 Tcp/ip 84 Dynamic Host Configuration Protocol 89 Review Questions 90 Exam Questions 91 Chapter 3 Secure ICS Architecture 95 Introduction 96 Boundary Protection 97 Firewalls 98 Proxies 104 Security Topologies 105 Network Switches 106 Routers 108 Security Zoning Models 109 Flat Network Topologies 113 Network Segmentation 122 Controlling Intersegment Data Movement 128 Tunneling 128 Wireless Networking 129 Wireless Sensors 131 Wireless Gateways 134 Modems 135 Review Questions 137 Exam Questions 139 Chapter 4 ICS Module and Element Hardening 143 Introduction 145 Endpoint Security and Hardening 145 User Workstation Hardening 145 BIOS Security Subsystems 147 Additional Outer Perimeter Access Hardening 148 Mobile Device Protection 154 OS Security/Hardening 155 File System Security 156 Operating System Security Choices 160 Linux SystemV vs Systemd 160 Hardening Operating Systems 162 Common Operating System Security Tools 162 Virtualization 169 Application Software Security 172 Software Exploitation 172 Information Leakage 173 Applying Software Updates and Patches 174 Database Hardening 174 SQL Injection 175 Anti-Malware 177 Antivirus 178 Anti-spyware 178 Anti- Malware: Sanitization 181 Embedded Device Security 182 Meters 184 Network Hardening 189 OT/IT Network Security 189 Server Security 191 Hardening the Server OS 193 Logical Server Access Control 194 Hardening Network Connectivity Devices 196 Review Questions 201 Exam Questions 202 Chapter 5 Cybersecurity Essentials for ICS 205 Introduction 207 Basic Security Tenets 208 Confidentiality, Integrity, and Availability 208 Availability in ICS Networks 209 Nonrepudiation 210 Principle of Least Privilege 211 Separation of Duties 211 Vulnerability and Threat Identification 212 Nation- States 213 Cyberterrorists 213 Cybercriminals 214 Insider Threats 216 Events, Incidents, and Attacks 217 Threat Vectors 217 Weaponization 230 Delivery 230 Exploitation 231 Installation 232 Command and Control 233 Actions on Objectives 233 Attack Methods 234 Unauthorized Access 251 Cryptographics 260 Encryption 262 Digital Certificates 264 Public Key Infrastructure 264 Hashing 266 Resource Constraints 267 Review Questions 268 Exam Questions 268 Chapter 6 Physical Security 271 Introduction 272 Infrastructure Security 273 Access Control 274 Physical Security Controls 276 Authentication Systems 278 Remote Access Monitoring and Automated Access Control Systems 286 Intrusion Detection and Reporting Systems 289 Security Controllers 290 Video Surveillance Systems 295 Cameras 297 IP Cameras 297 Pan- Tilt- Zoom Cameras 298 Physical Security for ICS 306 Industrial Processes/Generating Facilities 307 Control Center/Company Offices 307 Nerc Cip-006-1 309 Review Questions 311 Exam Questions 312 Chapter 7 Access Management 315 Introduction 316 Access Control Models 317 Mandatory Access Control 317 Discretionary Access Control 318 Role- Based Access Control 318 Rule- Based Access Control 319 Attribute- Based Access Control 319 Context- Based Access Control 320 Key Security Components within Access Controls 320 Directory Services 321 Active Directory 321 Linux Directory Services 324 Application Runtime and Execution Control 326 User Access Management 326 Establishing User and Group Accounts 328 Group Account Security 330 Network Authentication Options 331 Establishing Resource Controls 332 ICS Access Control 334 Remote ICS Access Control 336 Access Control for Cloud Systems 340 Review Questions 343 Exam Questions 344 Chapter 8 ICS Security Governance and Risk Management 347 Introduction 348 Security Policies and Procedure Development 348 Requirements 349 Exceptions and Exemptions 350 Standards 351 ICS Security Policies 356 Risk Management 357 Asset Identification 358 Risk Assessment 359 Risk Identification Vulnerability Assessment 362 Impact Assessment 363 ICS Risk Assessments 364 Risk Mitigation 366 Nerc Cip-008 367 Review Questions 369 Exam Questions 370 Chapter 9 ICS Security Assessments 373 Introduction 374 Security Assessments 374 ICS Device Testing 376 Vulnerability 376 Supply Chain 377 Communication Robustness Testing 382 Fuzzing 382 ICS Penetration Testing 384 The Pentest Process 385 Security Testing Tools 392 Packet Sniffers 392 Network Enumeration/Port Scanning 393 Port Scanning 395 Vulnerability Scanning 395 Review Questions 401 Exam Questions 402 Chapter 10 ICS Security Monitoring and Incident Response 405 Introduction 407 ICS Lifecycle Challenges 408 Change Management 408 Establishing a Security Baseline 409 Change Management Documentation 411 Configuration Change Management 412 Controlling Patch Distribution and Installation for Systems 414 Monitoring 419 Event Monitoring 420 Network Monitoring 421 Security Monitoring 423 Logging and Auditing 424 Event Logging 425 Incident Management 433 The Incident Response Lifecycle 434 Preparation 435 Incident Response 442 Recovery 445 Post- Incident Activities 446 Review Questions 449 Exam Questions 450 Chapter 11 Disaster Recovery and Business Continuity 453 Introduction 454 Business Continuity Plans 455 System Redundancy 455 Local Virtualized Storage 459 System Backup and Restoration 462 Backup Options 463 Backup Media Rotation 466 Securing Backup Media 467 Other BCP Considerations 467 Disaster Recovery 469 Planning 470 Documenting the Disaster Recovery Plan 472 The Disaster Response/Recovery Team 473 Nerc Cip-009-6 475 Review Questions 477 Exam Questions 478 Appendix A GICSP Objective Map 481 ICS410.1 ICS: Global Industrial Cybersecurity Professional (GICSP) Objectives 482 Overview 482 ICS410.2: Architecture and Field Devices 483 ICS410.3: Communications and Protocols 484 ICS410.4: Supervisory Systems 485 ICS410.5: Security Governance 485 Appendix B Glossary 487 Appendix C Standards and References 533 Reference Links 536 Appendix D Review and Exam Question Answers 539 Chapter 1: Industrial Control Systems 540 Review Question Answers 540 Exam Question Answers 541 Chapter 2: ICS Architecture 542 Review Question Answers 542 Exam Question Answers 544 Chapter 3: Secure ICS Architecture 545 Review Question Answers 545 Exam Question Answers 547 Chapter 4: ICS Modules and Element Hardening 548 Review Question Answers 548 Exam Question Answers 550 Chapter 5: Cybersecurity Essentials for ICS 551 Review Question Answers 551 Exam Question Answers 553 Chapter 6: Physical Security 554 Review Question Answers 554 Exam Question Answers 556 Chapter 7: Access Management 556 Review Question Answers 556 Exam Question Answers 558 Chapter 8: ICS Security Governance and Risk Management 559 Review Question Answers 559 Exam Question Answers 560 Chapter 9: ICS Security Assessments 561 Review Question Answers 561 Exam Question Answers 563 Chapter 10: ICS Security Monitoring and Incident Response 564 Review Question Answers 564 Exam Question Answers 565 Chapter 11: Disaster Recovery and Business Continuity 567 Review Question Answers 567 Exam Question Answers 568 Index 571
£30.39