Computing Books
John Wiley & Sons Inc 3D Object Processing
Book SynopsisThe arrival, and continuing evolution, of high quality 3D objects has been made possible by recent progress in 3D scanner acquisition and 3D graphics rendering. With this increasing quality comes a corresponding increase in the size and complexity of the data files and the necessity for advances in compression techniques. Effective indexing to facilitate the retrieval of the 3D data is then required to efficiently store, search and recapture the objects that have been compressed. The application of 3D images in fields such as communications, medicine and the military also calls for copyright protection, or watermarking, to secure the data for transmission. Written by expert contributors, this timely text brings together the three important and complementary topics of compression, retrieval and watermarking techniques for 3D objects. 3D object processing applications are developing rapidly and this book tackles the challenges and opportunities presented, focusing on the secureTrade Review"The book is excellent resource for researchers, graduate students, and practioners interested in 3D object processing. The book is well written with a very nice set of references to the literature. I recommend it." (Journal of Electronic Imaging, January - March 2009)Table of ContentsAbout the Contributors vii Introduction 1 1 Basic Background in 3D Object Processing 5 Guillaume Lavoué 1.1 3D Representation and Models 5 1.2 3D Data Source 28 1.3 3D Quality Concepts 34 1.4 Summary 39 References 40 2 3D Compression 45 Guillaume Lavoué, Florent Dupont, Atilla Baskurt 2.1 Introduction 45 2.2 Basic Review of 2D Compression 46 2.3 Coding and Scalability Basis 48 2.4 Direct 3D Compression 51 2.5 Compression Based on Approximation 70 2.6 Normative Aspect: MPEG-4 76 2.7 Conclusion 77 2.8 Summary 78 2.9 Questions and Problems 79 References 80 3 3D Indexing and Retrieval 87 Stefano Berretti, Mohamed Daoudi, Alberto Del Bimbo, Tarik Filali Ansary, Pietro Pala, Julien Tierny, Jean-Phillippe Vandeborre 3.1 Introduction 87 3.2 Statistical Shape Retrieval 96 3.3 Structural Approaches 114 3.4 Transform-based Approaches: Spin Images 120 3.5 View-based Approach 123 3.6 Normative Aspect: MPEG-7 133 3.7 Summary 134 References 135 4 3D Object Watermarking 139 Jihane Bennour, Jean-Luc Dugelay, Emmanuel Garcia, Nikos Nikolaidis 4.1 Introduction 139 4.2 Basic Review of Watermarking 140 4.3 Watermarking Principles Applied to 3D Objects 144 4.4 A Guided Tour of 3D Watermarking Algorithms 153 4.5 Concluding Remarks 172 4.6 Summary 175 4.7 Questions and Problems 176 References 180 Conclusion 185 Index 191
£95.36
John Wiley & Sons Inc Pandoras Box
Book SynopsisComputing technology is constantly evolving and changing, developing and consolidating its position as a vital component of our lives. It no longer plays a minor part in society it is embedded in, and affects, all aspects of life, from education to healthcare to war. Dealing with the implications of this is a major challenge, and one that can impact upon us, both personally and professionally. As a consequence, it is vital that all in the computing industry make wise decisions regarding their conduct. Using case studies and discussion topics drawn from entertaining real world examples, Pandora's Box examines the background of a wide range of vital contemporary issues, encouraging readers to examine the social, legal and ethical challenges they will face in their own careers. Written in an engaging style and packed with international examples, this book addresses topics which have come to the forefront of public consciousness in recent years, such as online crime, pirTrade Review'I.T. has triggered complex social, political, economic and ethical issues that need urgent action if we are to survive the coming decades of unprecedented technological change. This book is a must-read for all those who want to understand the issues or, more important, want to help in their resolution.' -James Burke 'This book provides a breath of fresh air in the subject... with numerous examples. Further, it provides a nice link between ethical behaviour, professionalism and the law' -Karl Jones, Liverpool John Moores University 'I found this an excellent read, covering a wide range of essential social and professional issues for computer scientists. There is a good balance between ethical material and technical material, and it would be suitable for a layperson. An entertaining and thought-provoking book' -Dr. Carron Shankland of the University of StirlingTable of ContentsForeword xxi Preface xxv 1 Introduction 1 Lessig’s Four Modalities Analysis 6 Prophet and Loss: Failing to Foresee the Future 7 Information System Partition 8 The Law is an Ass 10 Globalization 12 The Digital Divide 13 Servant or Master: Computers Making Decisions 15 Discussion Topics 17 Can Laws Be Immoral? 17 Genetically Modified Food, Technologically Modified Humans 17 The Haves and the Have-nots 18 Related Reading 19 2 Emergence and Convergence of Technologies 21 Introduction 21 Emergence 23 The Rise of Print Media 23 The Rise of the Telegraph and the Telephone 24 The Rise of Broadcast Media 28 The Rise of the Computing Industry 31 The Rise of the Content Industry 33 The Rise of the Internet 35 Convergence 39 Content Producers and Distributors 39 Platform Producers and Content Producers or Publishers 41 Corporate Production vs Individual Creativity 43 Market Sector Integration 44 Digitization 48 The Big Challenges Ahead 55 Discussion Topics 56 Fit for Purpose? 56 E-Tax 56 Competing with Free Beer 58 Related Reading 60 3 Digital Entertainment 61 Introduction 61 The Effects of Digital Entertainment Technology 64 Digital Entertainment—Friend or Foe? 64 The Toy Town Divide 64 Boys and Girls Come out to Play: Stereotyping 66 Health-Related Issues 69 Curse of the Couch-Potato Children 69 Physical Problems 71 Digital Equipment—Part of the Modern Family 72 Does Television Cause Adverse Social Behaviour? 74 Creating Monsters—Do Computer Games Make People Violent? 76 Do Computer Games Fuel Addiction and Gambling? 80 Power to the Player—Benefits of Computer Games 84 Harnessing the Power of the Brain 84 Education and Learning 86 The Silver Gamers 88 Game Development Grows up—the Hidden Agenda 88 Discussion Points 91 Should Computer Games Be Regulated? Rated? Censored? 91 Couch-Potato Syndrome 92 Online Gambling: Menace or Natural Progression? 93 Related Reading 95 4 Censorship and Freedom of Speech 97 Introduction 97 Reasons for Censorship 100 Censorship by States 101 Censorship of Speakers by Governments 107 Censorship of Listeners by Governments 109 Censorship by Private Actors 111 Censorship of Speakers by Private Actors 111 Censorship of Listeners by Private Actors 113 Technology for Expression 114 Technological Developments with Expressive Power 114 Censoring Internet Content 115 Client–Server and Peer-to-Peer Architectures 124 Conclusion 125 Discussion Topics 126 Yahoo! France Nazi Memorabilia 126 ISP Liability for Content 127 BT and the IWF 129 Related Reading 130 5 Sex and Technology 131 Introduction 131 The Nature of Sexual Material 132 One Man’s Art. . . 132 The Medium and the Message 133 Use of Technology to (Re)Produce Sexual Material 133 Techno-Sex 134 Anonymity: Reality and Illusion 144 Anon Servers 146 Online Sex and Real Relationships 147 The Future of Online Sex: TeleDildonics? 148 Regulating Sex in Cyberspace 149 Not in Front of the Children: Protecting Children from Sex Online 152 Restricting Access to Broadcast Media 153 Surfing to a Naked Beach 154 ‘Satisfy Her in Bed’: Sex Spam to Minors 157 Online Friendships 159 Child Pornography 161 Types of Material 162 Prohibition, Harm, Possession and Distribution 166 Jurisdictional Anomalies and Conflicts 168 Discovery, Defence and Mitigation 169 Discussion Topics 171 Freedom of Speech vs Censorship of Sexual Material 171 The Toby Studabaker Case 172 Related Reading 173 6 Governance of the Internet 175 Introduction 175 The Internet Protocols 176 The Origins of the Internet 178 Early Arguments 181 The Root of All Evil 185 Commercialization 185 Internet Corporation for Assigned Names and Numbers 186 ccTLDs 188 Alternative Root Servers 188 Commercialization, Ownership and Corporate Identity 189 Trade Marks 189 Trade Marks in Domain Names 191 The Uniform Dispute Resolution Process 196 The Nominet Dispute Resolution Process 198 Criticisms of Dispute Resolution 199 Do Trade Marks Matter in Domain Names or in URLs? 203 The Future of Internet Governance 204 ICANN, DoC, EU and ccTLDs 204 Wiring the World: Who Really Owns ‘The Internet’? 205 Discussion Topics 206 Should Trade Marks Be Valid in Domain Names? 206 What Governance Should ICANN Have? 207 How Many Top-Level Domains Should There Be? 208 7 Privacy and Surveillance 211 Introduction 211 Cryptography and Steganography 212 Definition of Privacy 214 Communication Technology and Eavesdropping 215 Ways to Eavesdrop 215 Identity of Eavesdropper 217 Legality of Eavesdropping 218 The Whole Is Greater than the Sum of its Parts 220 Data Protection 222 Data Protection Issues in EU Law 223 Data Protection Issues in US Regulation 227 International Movement of Data 229 Data Protection, not an Impediment to Life 230 Big Brother is Watching You: Automated CCTV Processing 231 Privacy After 9/11 234 Technological Privacy and Surveillance 235 Discussion Topics 237 Leaving Little Trace: Anonymity in the Digital World? 237 Availability of Cryptography and Steganography 238 Data Retention by ISPs 239 Related Reading 241 8 Information Age Warfare 243 Introduction 243 History of Warfare 245 The Technology of War 248 War News 249 Cyber-Wars 250 Satellites—the View from Space 253 Star Wars Technology 254 Network-centric Warfare 255 The Battlefield 258 Robo-Soldier 258 Man or Machine? 259 The Unseen Enemy 260 Mobile Phones as Weapons 261 War Games 261 Information Dominance 263 Intelligence Gathering and Surveillance 265 Discussion Topics 267 Working for Arms Manufacturers 267 Cyberterrorism: Real Threat or Virtual Bogeyman? 268 Overall Benefit or Drain on Resources? 269 9 Technology and the Human Body 273 Introduction 273 Health Information Systems 275 Treatment 276 Electronic Patient Records 276 E-booking 278 E-prescribing 279 Intranets, the Internet and Call Centres 280 Factors for Success 281 Power to the Patient 283 The Internet and CDs 284 Television Programmes 286 Digital Television 287 Self-Diagnosis Kits 288 Online Pharmacies 290 Online Body Trafficking 291 Techno-Medicine 292 Telemedicine 293 Training and Supporting Nurses and Doctors 294 Virtual Therapy 297 Robots in Hospitals 298 Smart Monitoring 301 Computer Modelling 305 Assistive Technology and Rehabilitation 308 New Medical Technologies 309 Implants for Diagnosis and Healing 310 Implants and Prosthetics for Replacement and Reconstruction 311 Digital Flesh and Cyborgs 315 Discussion Topics 318 The Longevity and Social Justice Debate 318 Suggested Positions 319 Owning the Code of Life 319 What Is a Human? 320 Related Reading 321 10 Professionalism in IT 323 Introduction 323 Conduct 327 Practice 333 Whistleblowing 334 Vulnerability of E-mail 335 ‘Illegal’ espionage 337 Consequences of ‘Whistleblowing’ 337 Due Diligence 338 Personal Responsibility 340 Discussion Topics 340 Self-Incrimination 340 Responsibility for DDoS Attacks 341 Whistleblowing Insecurity 343 11 Online Crime and Real Punishment 345 Introduction 345 A Brief History of Crime and Computers 347 Computer Fraud 348 Malware 351 A Taxonomy of Malware 351 Problems Caused by Malware 352 Malware Authors: Who, How and Why? 359 Hoaxes and Life Imitating Art 362 Computer Security: Cops and Robbers, Poachers and Gamekeepers 363 Historical Roots of Cracking 364 Who are the Crackers? 366 Vulnerability, Risk and Threat 370 Closed vs Open Security 373 Walking the Tightrope: Social Pressures on Security 379 How Much Security Is Necessary? 382 Poachers and Gamekeepers 386 Laws Against Computer Misuse 387 UK Computer Misuse Act 388 US Sequence of Laws 391 Council of Europe Convention on Cybercrime 393 The Growing Problem of Computer Crime 395 Discussion Topics 396 Grey Hat Cracking Should Be Legalized 396 Web Scrapers and Robot Denial Files 397 An Immune System for the Internet 399 Related Reading 400 12 Patents and Copyright 401 Introduction 401 Intellectual Property? 402 Trade mark 402 Patent 403 Copyright 404 The Philosophical Basis of Patents and Copyright 404 Patents 406 A Brief History of Patents 406 Modern Patent Systems 407 Business Methods and Software Patents 411 General Criticisms of Patents 414 Patent-Licensing Companies 417 Copyright 419 Origins and Development of Copyright 420 The Main Provisions of Modern Copyright Statutes 424 US Case Law for Copyright 428 The Current State of Play 434 The Music Industry and Higher Education 435 The Originator’s Rights 436 Software Copyright 437 Copyright and the Architecture of Cyberspace 449 Free Culture 449 Discussion Topics 450 Is Copyright the Correct Way to Reward Artists? Does It Promote Artistic Activity? 450 Lack of Legitimate Downloads Caused the Rise of Peer-to-Peer File-Sharing 452 A New Basis for Copyright Law Is Required 453 Control and the Copyright Bargain 454 Related Reading 455 13 Unwanted Electronic Attentions 457 Introduction 457 Types of Unsolicited Communication 459 Static Visual Communication 459 Audio Communication 460 Types of Communication Media 461 Public Displays 461 Broadcast Non-Interactive Media 461 Broadcast Interactive Media 462 Telephonic Services 463 Internet Services 465 The Economics of Unsolicited Contacts 470 Sender Economics 470 Junk mail 471 Cold calling 472 Receiver Economics 474 Referral Economics 477 Social, Legal and Technological Discouragement 481 Malicious Unwanted Attentions 494 Online and Telephone Fraud 495 Electronic Stalking 496 Online Grooming 499 Discussion Topics 500 Tackling Spam at the Transport Layer 500 Opt-In, Opt-Out, Shake It All About 501 Freedom of Speech or Online Stalking 502 Related Reading 503 14 Education and Online Learning 505 Introduction 505 From the Chalkboard to the Virtual Classroom 507 Technology through the Years 507 Visual Aids to Learning 508 Audio Aids to Learning 510 Audio–Visual Aids to Learning 511 Developing E-Learning Environments 513 ICT and e-Learning in Further Education Colleges in England 515 e-Portfolio 516 Videoconferencing 517 Online Encyclopedia 518 Mobile Education (PDAs and Mobile Devices) 519 Electronic Books 521 Electronic Whiteboards 521 Online Marketing 522 Electronic Application and Admission Systems 523 Digital Library 523 Second Life 524 Web 2.0 525 Developing and Embracing e-Learning Resources 526 The Learner Perspective 527 The Teacher Perspective 529 Accessibility of Education in a Wired World 533 Cheating the System 535 Bogus Degrees 538 Discussion Topics 539 One Person’s Plagiarism Is Another’s Research 539 Overseas Education vs Distance Education 540 The Net of a Million Lies 542 Related Reading 543 15 Living and Working in a Wired World 545 Introduction 545 The Digital Lifestyle 547 Work, Skills and Roles 547 Teleworking 548 The Mobile Office: the ‘Non-Office’ Office Job 551 The New Role of the Office 552 Smarter Travel 552 Smarter Homes 555 Shopping 556 Buying Entertainment 561 The Sporting Life 562 Technology and the Individual 563 Education 563 Health 563 Crime 564 Religion 564 Communication 565 The Changing Face of Communication 565 The Global Village 573 The Digital Divide 574 The Digital Divide in the Industrialized World 577 E-Government 578 The Digital Divide Between the Nations 579 Discussion Topics 580 The Language of the Digital Age 580 Digital Relationships 581 Digital Divides 581 Related Reading 582 Appendix—Ethical Analysis 583 Introduction 583 Traditional Western Moral Philosophy 584 Rationalism 584 Locke vs Hobbes 585 Hume and Human Passion 587 Kant and the Categorical Imperative 587 Legality and Morality 587 Modern Ethical Theory 589 Utilitarian Ethics 589 Relativistic vs Universal Utiliarianism 590 New Utilitarianism: Singer 591 Computer Ethics 591 Metaphysical Foundations for Computer Ethics 593 Informed Consent Theory in Information Technology 594 Ethical Decisions: Using the Back of the Envelope 594 Information Ethics: ICT Professional Responsibility in the Information Environment 595 The Good Computer Professional Does not Cheat at Cards 596 Conclusion 596 Discussion Topics 597 General: The Death Penalty 597 ICT: Artificial Sentience Rights and Wrongs 598 General: Is Religion an Excuse for Discrimination? 599 ICT: Search Ethics 600 General: Lying to Tell the Truth? 601 ICT: Gender Presentation Online 601 General: Fair Fines 602 ICT: Should Internet Access be a Human Right? 603 General: Prediction of Harm 604 ICT: Programmer Responsibility 605 Related Reading 607 Index 609
£45.86
John Wiley & Sons Inc Complex Valued Nonlinear Adaptive Filters
Book SynopsisThe filtering of real world signals requires an adaptive mode of operation to deal with the statistically nonstationary nature of the data. Feedback and nonlinearity within filtering architectures are needed to cater for long time dependencies and possibly nonlinear signal generating mechanisms.Table of ContentsPreface xiii Acknowledgements xvii 1 The Magic of Complex Numbers 1 1.1 History of Complex Numbers 2 1.2 History of Mathematical Notation 8 1.3 Development of Complex Valued Adaptive Signal Processing 9 2 Why Signal Processing in the Complex Domain? 13 2.1 Some Examples of Complex Valued Signal Processing 13 2.2 Modelling in C is Not Only Convenient But Also Natural 19 2.3 Why Complex Modelling of Real Valued Processes? 20 2.4 Exploiting the Phase Information 23 2.5 Other Applications of Complex Domain Processing of Real Valued Signals 26 2.6 Additional Benefits of Complex Domain Processing 29 3 Adaptive Filtering Architectures 33 3.1 Linear and Nonlinear Stochastic Models 34 3.2 Linear and Nonlinear Adaptive Filtering Architectures 35 3.3 State Space Representation and Canonical Forms 39 4 Complex Nonlinear Activation Functions 43 4.1 Properties of Complex Functions 43 4.2 Universal Function Approximation 46 4.3 Nonlinear Activation Functions for Complex Neural Networks 48 4.4 Generalised Splitting Activation Functions (GSAF) 53 4.5 Summary: Choice of the Complex Activation Function 54 5 Elements of CR Calculus 55 5.1 Continuous Complex Functions 56 5.2 The Cauchy–Riemann Equations 56 5.3 Generalised Derivatives of Functions of Complex Variable 57 5.4 CR-derivatives of Cost Functions 62 6 Complex Valued Adaptive Filters 69 6.1 Adaptive Filtering Configurations 70 6.2 The Complex Least Mean Square Algorithm 73 6.3 Nonlinear Feedforward Complex Adaptive Filters 80 6.4 Normalisation of Learning Algorithms 85 6.5 Performance of Feedforward Nonlinear Adaptive Filters 87 6.6 Summary: Choice of a Nonlinear Adaptive Filter 89 7 Adaptive Filters with Feedback 91 7.1 Training of IIR Adaptive Filters 92 7.2 Nonlinear Adaptive IIR Filters: Recurrent Perceptron 97 7.3 Training of Recurrent Neural Networks 99 7.4 Simulation Examples 102 8 Filters with an Adaptive Stepsize 107 8.1 Benveniste Type Variable Stepsize Algorithms 108 8.2 Complex Valued GNGD Algorithms 110 8.3 Simulation Examples 113 9 Filters with an Adaptive Amplitude of Nonlinearity 119 9.1 Dynamical Range Reduction 119 9.2 FIR Adaptive Filters with an Adaptive Nonlinearity 121 9.3 Recurrent Neural Networks with Trainable Amplitude of Activation Functions 122 9.4 Simulation Results 124 10 Data-reusing Algorithms for Complex Valued Adaptive Filters 129 10.1 The Data-reusing Complex Valued Least Mean Square (DRCLMS) Algorithm 129 10.2 Data-reusing Complex Nonlinear Adaptive Filters 131 10.3 Data-reusing Algorithms for Complex RNNs 134 11 Complex Mappings and M¨obius Transformations 137 11.1 Matrix Representation of a Complex Number 137 11.2 The M¨obius Transformation 140 11.3 Activation Functions and M¨obius Transformations 142 11.4 All-pass Systems as M¨obius Transformations 146 11.5 Fractional Delay Filters 147 12 Augmented Complex Statistics 151 12.1 Complex Random Variables (CRV) 152 12.2 Complex Circular Random Variables 158 12.3 Complex Signals 159 12.4 Second-order Characterisation of Complex Signals 161 13 Widely Linear Estimation and Augmented CLMS (ACLMS) 169 13.1 Minimum Mean Square Error (MMSE) Estimation in C 169 13.2 Complex White Noise 172 13.3 Autoregressive Modelling in C 173 13.4 The Augmented Complex LMS (ACLMS) Algorithm 175 13.5 Adaptive Prediction Based on ACLMS 178 14 Duality Between Complex Valued and Real Valued Filters 183 14.1 A Dual Channel Real Valued Adaptive Filter 184 14.2 Duality Between Real and Complex Valued Filters 186 14.3 Simulations 188 15 Widely Linear Filters with Feedback 191 15.1 The Widely Linear ARMA (WL-ARMA) Model 192 15.2 Widely Linear Adaptive Filters with Feedback 192 15.4 The Augmented Kalman Filter Algorithm for RNNs 198 15.5 Augmented Complex Unscented Kalman Filter (ACUKF) 200 15.6 Simulation Examples 203 16 Collaborative Adaptive Filtering 207 16.1 Parametric Signal Modality Characterisation 207 16.2 Standard Hybrid Filtering in R 209 16.3 Tracking the Linear/Nonlinear Nature of Complex Valued Signals 210 16.4 Split vs Fully Complex Signal Natures 214 16.5 Online Assessment of the Nature of Wind Signal 216 16.6 Collaborative Filters for General Complex Signals 217 17 Adaptive Filtering Based on EMD 221 17.1 The Empirical Mode Decomposition Algorithm 222 17.2 Complex Extensions of Empirical Mode Decomposition 226 17.3 Addressing the Problem of Uniqueness 230 17.4 Applications of Complex Extensions of EMD 230 18 Validation of Complex Representations – Is This Worthwhile? 233 18.1 Signal Modality Characterisation in R 234 18.2 Testing for the Validity of Complex Representation 239 18.3 Quantifying Benefits of Complex Valued Representation 243 Appendix A: Some Distinctive Properties of Calculus in C 245 Appendix B: Liouville's Theorem 251 Appendix C: Hypercomplex and Clifford Algebras 253 Appendix D: Real Valued Activation Functions 257 Appendix E: Elementary Transcendental Functions (ETF) 259 Appendix F: The O Notation and Standard Vector and Matrix Differentiation 263 Appendix G: Notions From Learning Theory 265 Appendix H: Notions from Approximation Theory 269 Appendix I: Terminology Used in the Field of Neural Networks 273 Appendix J: Complex Valued Pipelined Recurrent Neural Network (CPRNN) 275 Appendix K: Gradient Adaptive Step Size (GASS) Algorithms in R 279 Appendix L: Derivation of Partial Derivatives from Chapter 8 283 Appendix M: A Posteriori Learning 287 Appendix N: Notions from Stability Theory 291 Appendix O: Linear Relaxation 293 Appendix P: Contraction Mappings, Fixed Point Iteration and Fractals 299 References 309 Index 321
£106.35
John Wiley and Sons Ltd Security Engineering
Book Synopsis"Security engineering is different from any other kind of programming... if you're even thinking of doing any security engineering, you need to read this book. " -- Bruce Schneier "This is the best book on computer security. Buy it, but more importantly, read it and apply it in your work.Trade Review"At over a thousand pages, this is a comprehensive volume." Engineering & Technology Saturday 7 June 2008Table of ContentsPreface to the Second Edition. Foreword by Bruce Schneier. Preface. Acknowledgments. Part I. Chapter 1 What Is Security Engineering? Chapter 2 Usability and Psychology. Chapter 3 Protocols. Chapter 4 Access Control. Chapter 5 Cryptography. Chapter 6 Distributed Systems. Chapter 7 Economics. Part II. Chapter 8 Multilevel Security. Chapter 9 Multilateral Security. Chapter 10 Banking and Bookkeeping. Chapter 11 Physical Protection. Chapter 12 Monitoring and Metering. Chapter 13 Nuclear Command and Control. Chapter 14 Security Printing and Seals. Chapter 15 Biometrics. Chapter 16 Physical Tamper Resistance. Chapter 17 Emission Security. Chapter 18 API Attacks. Chapter 19 Electronic and Information Warfare. Chapter 20 Telecom System Security. Chapter 21 Network Attack and Defense. Chapter 22 Copyright and DRM. Chapter 23 The Bleeding Edge. Part III. Chapter 24 Terror, Justice and Freedom. Chapter 25 Managing the Development of Secure Systems. Chapter 26 System Evaluation and Assurance. Chapter 27 Conclusions. Bibliography. Index.
£65.00
John Wiley & Sons Inc Software Development Rhythms
Book SynopsisAn accessible, innovative perspective on using the flexibility of agile practices to increase software quality and profitability When agile approaches in your organization don''t work as expected or you feel caught in the choice between agility and discipline, it is time to stop and think about software development rhythms! Agile software development is a popular development process that continues to reshape philosophies on the connections between disciplined processes and agile practices. In Software Development Rhythms, authors Lui and Chan explain how adopting one practice and combining it with another builds upon the flexibility of agile practices to create a type of synergy defined as software development rhythms. The authors demonstrate how these rhythms can be harmonized to achieve synergies, making them stronger together than they would be apart. Software Development Rhythms provides programmers with a powerful metaphor for resolving some classic software management Trade Review"It is full of case studies, anecdotes, and exercises, all illustrated with clever, yet instructive cartoons." (Ubiquity, June 10-16, 2008)Table of ContentsPART I: ESSENTIALS. Chapter 1: No Programmer Dies. 1.1 Developing Software vs. Building a Tunnel. 1.1.1 The good old days? 1.1.2 The more things change the more they stay the same? 1.1.3 Behind Software Products. 1.1.4 Deal or not deal. 1.2 Do-Re-Mi Do-Re-Mi. 1.2.1 Iterative Models. 1.2.2 Code and Fix. 1.2.3 Chaos. 1.2.4 Methodology that matters. 1.3 Software Development Rhythms. 1.3.1 Stave Chart by Example. 1.3.2 Game Theory. 1.3.3 IN-OUT Diagram. 1.3.4 Master-Coach Diagram. 1.3.5 No Mathematics. 1.3.6 Where to Explore Rhythms. Chapter 2: Understanding Programmers. 2.1 Personality and Intelligence. 2.1.1 Virtuosi. 2.1.2 Meeting your team. 2.1.3 Recruiting Programmers. 2.2 Outsourced Programmers. 2.2.1 Programmers in Their Environments. 2.2.2 Programmers, Cultures, and Teams. 2.3 Experienced Management. 2.3.1 Being Casual about Causal Relationships. 2.3.2 Not Learning From Experience. 2.3.3 Doing things right right now. Chapter 3: Start with Open Source. 3.1 Process and Practice. 3.1.1 The 4Ps of Projects. 3.1.2 Agile Values. 3.1.3 Zero-point collaboration. 3.2 OSS Development. 3.2.1 Software Cloning. 3.2.2 Software Quality. 3.2.3 Starting Processes. 3.2.4 Open Source Development Community. 3.2.5 Ugrammers. 3.2.6 Participant Roles. 3.2.7 Rapid Release. 3.2.8 Black-box Programming. 3.2.9 Open Source Software Practices. 3.3 OOS-Like Development. 3.3.1 Agile Practices. 3.3.2 Communication Proximity. 3.3.3 Loose and Tight Couple. 3.3.4 Co-located OSS Development. PART II: RHYTHMS. Chapter 4: Plagiarism Programming. 4.1 Plagiarism. 4.1.1 Existing Code. 4.1.2 Social Network Analysis. 4.1.3 Being Plagiarized. 4.1.4 Turn everyone into a programmer. 4.1.5 Pattern Language. 4.1.6 Software Team Capability. 4.1.7 Rough-Cut Design. 4.1.8 Training is not a solution. 4.2 Nothing Faster than Plagiarism. 4.2.1 Immorality. 4.2.2 Unprecedented Code. 4.2.3 People Network. 4.2.4 Rhythm for Plagiarism. 4.2.5 Plagiarism at Work. 4.3 Business and Rhythm for Plagiarism. 4.3.1 15 Minute Business Presentation. 4.3.2 Marketing Research. 4.3.3 Chatting Robot. 4.3.4 Old Song New Singer. Chapter 5: Pair Programming. 5.1 Art and Science. 5.1.1 The Right Partner. 5.1.2 Noisy Programming. 5.1.3 Just Training. 5.1.4 Pay to watch. 5.2 Two Worlds. 5.2.1 Moneyless World. 5.2.2 Money-led World. 5.2.3 Economics. 5.2.4 Mythical Quality-time. 5.2.5 Elapsed Time. 5.2.6 Critical Path Method. 5.2.7 Why two not three: Anti-Group. 5.2.8 Software Requirements are Puzzles. 5.3 Programming Task Demands. 5.3.1 2 and 4 is 6. 5.3.2 2 and 4 is 4. 5.3.3 2 and 4 is 3. 5.3.4 2 and 4 ≥ 2. 5.3.5 2 and 4 is unknown. 5.4 Pair programming is more than programming. 5.4.1 Design by Code. 5.4.2 Pair Design. 5.4.3 Rhythmic Pair Programming. 5.5 Pair programming Team Coached. Chapter 6: Repeat Programming. 6.1 Controversies in Pair Programming. 6.1.1 Is Programming a Unique Work? 6.1.2 Are Three Minds Better Than Two? 6.1.3 Un-replicable Experiments. 6.2 Repeat Programming. 6.2.1 Variances. 6.2.2 Principles. 6.2.3 Triple Programming Unproductive. 6.3 Rhythm: Pair - Solo - Pair - Solo. 6.3.1 Persistence. 6.3.2 Connection. 6.3.3 Motivation. 6.4 An exception that proves Brooks’ Law. 6.4.1 Low Morale. 6.4.2 Communication Costs. 6.4.3 Rhythm for Late Projects. Chapter 7: Agile Teaming. 7.1 Project Teams. 7.1.1 Self-organizing teams. 7.1.2 Teams in Team. 7.1.3 Project Team Composition. 7.1.4 Team Life Cycle vs. Learning Curve. 7.2 Productivity. 7.2.1 The Illusion of Productivity. 7.2.2 Collective Code Ownership. 7.2.3 Accountability, Responsibility and Transparency. 7.3 Problems and Problem Owners. 7.3.1 Rhythm: Trouble - Restructuring. 7.3.2 Teaming Principles. 7.4 Failing Projects Rescued. 7.4.1 Project Traffic Light. 7.4.2 A Business Case. 7.4.3 Steering Committee Meeting. 7.4.4 Agile Teaming in Action. 7.5 Beware of Iago. Chapter 8: Incremental Design. 8.1 Modeling and Planning. 8.1.1 Agile Planning. 8.1.2 Design by Functional Modules. 8.1.3 Simple Design. 8.1.4 Total Cost Concept. 8.2 Rework or reuse. 8.2.1 Unpreventable Rework. 8.2.2 Improvisation. 8.2.3 Up-front Design. 8.3 Just-in-time Software Development. 8.3.1 The CMM Rhythm. 8.3.2 A Factory Tour. 8.3.3 Walking Worker. 8.3.4 Just-in-time Software Development. 8.3.5 Incremental Design. 8.4 Requirements Complexity. 8.4.1 Forgotten Requirements. 8.4.2 Conflicting Requirements. 8.4.3 Rapid Changing Requirements. 8.4.4 Requirements and Design. 8.5 Refactoring. 8.5.1 Refactoring Activities. 8.5.2 Refactoring by Challenging. 8.5.3 Refactoring for Design Patterns. 8.5.4 Making Deliberate Mistakes. Chapter 9: Test-Driven Development. 9.1 Reverse Waterfall. 9.1.1 Design - Code - Test. 9.1.2 Test - Code - Design. 9.2 Test-First Programming. 9.2.1 Testing and Verification. 9.2.2 Break-point testing. 9.2.3 Supporting Practices. 9.3 Rhythm: Test - Code - Refactor. 9.3.1 Simple Example. 9.3.2 Automation. 9.3.3 Revolution in Consciousness! 9.3.4 Test Case for Collaboration. 9.4 Rapid Software Process Improvement. 9.4.1 Training Program. 9.4.2 Project Planning. 9.4.3 Project Tracking. 9.4.4 Software Quality. 9.4.5 Software Configuration. 9.4.6 People Discipline. Epilogue: Medley. Appendix I: Nammik. References.
£83.55
John Wiley & Sons Inc Wiley Pathways Personal Computer Hardware
Book SynopsisFrom multicore CPUs and SATA hard drives to PCIe expansion buses and peripherals, this text offers practical and concise explanations of contemporary and popular PC hardware. Along with detailed coverage of essential A+ hardware topics, students will find an indispensable guide to building, maintaining, upgrading, and troubleshooting desktop computers and laptops. Packaged Set (Text + PC Hardware Essentials Project Manual): 0470-221089Table of Contents1. Understanding and Working with Personal Computers 2. Electricity and Power 3. Motherboards 4. Central Processing Units 5. Memory 6. Bus Structures 7. Hard Drives 8. Removable Storage 9. Input and Output Devices 10. Printers 11. Portable Systems 12. Network Fundamentals
£83.66
John Wiley & Sons Inc Collaborative Process Improvement
Book SynopsisThis practical, user-friendly handbook specifically addresses software companies that are interested in implementing effective improvement processes into the daily work life of every employee. A wealth of checklists, templates, exercises, tips, and pitfalls to avoid make it easy for readers to integrate quality awareness into their organization's day-to-day processes at every level.Trade Review"..perfectly suitable for an audience with no or little previous knowledge…experienced readers can also find…reading it worthwhile." (Computing Reviews.com, June 22, 2007)Table of ContentsList of Figures. Preface. How to Read This Book. Introduction. Special Thanks and Acknowledgments. Chapter 1. Your World-Understanding Your Situation and Preparing First Steps. Chapter 2. Welcome to the World-Establishing Advocates and Champions. Chapter 3. Drawing Your Map-Initiating your CPI Program. Chapter 4. World Vision-Training the Organization. Chapter 5. World Views-Addressing the Capital Q. Chapter 6. Around the World-Acknowledging Cultural Diversity. Chapter 7. Move Your World-Managing Change. Chapter 8. Rock Your World-Encouraging Process Perpetual Motion. Chapter 9. Your World of Influence-Sneezing and Spreading the Improvement Virus. Chapter 10. World Climate-Checking for Vital Signs. Chapter 11. World Health-Evaluating Progress. Chapter 12. World News-Rewarding and Recognizing Work. Chapter 13. Modern World-Building Meaningful Quality Pictures. Chapter 14. One World-Uniting Your Change Maps with the New World View. Definitions. Acronyms. References and Resources. Index.
£72.86
John Wiley & Sons Inc Visio 2007 For Dummies
Book SynopsisReveal your inner business artist with Visio Turn your ideas into diagrams and drawings with Visio's stencils and templates If you have an idea you want to get down on electronic paper, Visio 2007 is for you, and so is this book! They're both flexible and user-friendly.Table of ContentsIntroduction 1 Part I: Starting with Visio 2007 Basics 7 Chapter 1: Visio 101 9 Chapter 2: Creating and Saving a Simple Visio Drawing 29 Chapter 3: Printing Visio Drawings 69 Part II: Creating Visio Drawings 89 Chapter 4: Discovering What Visio Shapes Are All About 91 Chapter 5: Adding Text to Your Drawings 119 Chapter 6: Connecting Shapes 145 Part III: Taking Your Drawings to the Next Level 167 Chapter 7: Perfecting Your Drawings 169 Chapter 8: Creating and Customizing Shapes 191 Chapter 9: Working with Pages 227 Chapter 10: Layering Your Drawings 249 Part IV: Advancing Your Knowledge of Visio 265 Chapter 11: Creating Stencils, Master Shapes, and Templates 267 Chapter 12: Managing Shape Information, Behavior, and Protection 281 Chapter 13: Marking Up Drawings for Review 313 Chapter 14: Using Visio with Other Programs 329 Part V: The Part of Tens 357 Chapter 15: Ten Common Tasks in Visio 359 Chapter 16: Ten Web Sites Devoted to Visio 365 Index 371
£17.59
John Wiley & Sons Inc Bioinformatics For Dummies
Book SynopsisProvides tips for using servers and places to seek resources to find out about what's going on in the bioinformatics world. This book helps you: analyze all types of sequences; use all types of databases; work with DNA and protein sequences; conduct similarity searches; build a multiple sequence alignment; and edit and publish alignments.Table of ContentsIntroduction. Part I: Getting Started in Bioinformatics. Chapter 1: Finding Out What Bioinformatics Can Do for You. Chapter 2: How Most People Use Bioinformatics. Part II: A Survival Guide to Bioinformatics. Chapter 3: Using Nucleotide Sequence Databases. Chapter 4: Using Protein and Specialized Sequence Databases. Chapter 5: Working with a Single DNA Sequence. Chapter 6: Working with a Single Protein Sequence. Part III: Becoming a Pro in Sequence Analysis. Chapter 7: Similarity Searches on Sequence Databases. Chapter 8: Comparing Two Sequences. Chapter 9: Building a Multiple Sequence Alignment. Chapter 10: Editing and Publishing Alignments. Part IV: Becoming a Specialist: Advanced Bioinformatics Techniques. Chapter 11: Working with Protein 3-D Structures. Chapter 12: Working with RNA. Chapter 13: Building Phylogenetic Trees. Part V: The Part of Tens. Chapter 14: The Ten (Okay, Twelve) Commandments for Using Servers. Chapter 15: Some Useful Bioinformatics Resources. Index.
£20.79
John Wiley & Sons Inc Symbolic Data Analysis
Book SynopsisThe first book to present a unified account of symbolic data analysis methods in a consistent statistical framework, Symbolic Data Analysis features a substantial number of examples from a range of application areas, including health, the social sciences, economics, and computer science.Trade Review“Primarily aimed at statisticians and Data analysts, SDA is also ideal for scientists…” (Zentralblatt MATH, 2007)Table of Contents1. Introduction. References. 2. Symbolic Data. 2.1 Symbolic and Classical Data. 2.2 Categories, Concepts and Symbolic Objects. 2.3 Comparison of Symbolic and Classical Analysis. 3. Basic Descriptive Statistics: One Variate. 3.1 Some Preliminaries. 3.2 Multi-valued Variables. 3.3 Interval-valued Variables. 3.4 Multi-valued Modal variables. 3.5 Interval-valued Modal Variables. 4. Descriptive Statistics: Two or More Variates. 4.1 Multi-valued Variables. 4.2 Interval-valued Variables. 4.3 Modal Multi-valued Variables. 4.4 Modal Interval-valued Variables. 4.5 Baseball Interval-valued Dataset. 4.6 Measures of Dependence. 5. Principal Component Analysis. 5.1 Vertices Method. 5.2 Centers Method. 5.3 Comparison of the Methods. 6. Regression Analysis. 6.1 Classical Multiple Regression Model. 6.2 Multi-valued Variables. 6.3 Interval-valued Variables. 6.4 Histogram-valued Variables. 6.5 Taxonomy Variables. 6.6 Hierarchical Variables. 7. Cluster Analysis. 7.1 Dissimilarity and Distance Measures. 7.2 Clustering Structures. 7.3 Partitions. 7.4 Hierarchy-Divisive Clustering. 7.5 Hierarchy-Pyramid Clusters. Data Index. Author Index. Subject Index.
£80.06
John Wiley & Sons Inc Developing Java Software
Book SynopsisThis significantly updated new edition of Developing Java Software is a thorough presentation of object-oriented design and programming concepts using the Java 5 programming language. The book takes the reader from the basics of using Java 5 to the creation of complete, object-oriented programs. Following an objects early' approach, the core elements of the Java language are covered, including the use of recently added features such as generics. The encouragement of the proper creation and use of classes, and the demonstration of the strategies used to create good quality code are at the core of this book. You will learn how Java programs work and how they can be designed and implemented in an organized and systematic way. In addition, the book addresses how a Java programming project should be managed and introduces the Ant build tool and the Subversion version control system. Testing has always been an important part of Developing Java Software. This edition provides new cTable of ContentsPreface. Part 1 Programming with Objects and Classes. 1 Introduction. 1.1 The Start. 1.2 A (Very!) Short History of Java. 1.3 Being at the Right Place at the Right Time. 1.4 What is Java? 1.5 Abstraction: The Critical Core of Programming. 1.6 The Java 2 Platform. 1.7 Java is Architecture Neutral. 1.8 Java and its Jokes. 1.9 Summary. 2 Programming Fundamentals. 2.1 Introduction. 2.2 Abstraction and the Big Picture. 2.3 Statement Sequences. 2.4 Iteration. 2.5 Selection. 2.6 State. 2.7 Writing a Simple Java Program. 2.8 Comments. 2.9 Output Statements. 2.10 Input Statements. 2.11 Interactive Programs. 2.12 Summary. Self-review Questions. Programming Exercises. Challenges. 3 Adding Structure. 3.1 Introduction. 3.2 Abstraction and Encapsulation. 3.3 Methods. 3.4 Writing Programs with Methods. 3.5 Procedural Decomposition. 3.6 Encapsulation. 3.7 Some More Operators. 3.8 Some More Control Statements. 3.9 Some More Example Programs. 3.10 Summary. 4 Introducing Containers. 4.1 Introduction. 4.2 Arrays. 4.3 Container Classes. 4.4 Data Files. 4.5 Summary. 5 Drawing Pictures. 5.1 Introduction. 5.2 Creating Drawings. 5.3 Properties of Drawings. 5.4 Drawing Text. 5.5 Example Programs. 5.6 Summary. 6 Classes and Objects. 6.1 Introduction. 6.2 Creating New Data Types. 6.3 Generic Classes. 6.4 Method Names and Scope. 6.5 Object Initialization. 6.6 Objects and References. 6.7 Static Variables and Methods. 6.8 Example Classes. 6.9 Programming with Classes and Objects. 6.10 Enumerated Types. 6.11 An Example—Creating Bridge Hands. 6.12 Summary. 7 Class Relationships. 7.1 Introduction. 7.2 Association. 7.3 Inheritance. 7.4 Reuse: Inheritance vs. Association. 7.5 Inheritance Hierarchies. 7.6 Interfaces and Type Conformance. 7.7 Comparing Objects for Equality. 7.8 Nested Classes. 7.9 Packages. 7.10 Class Matrix Revisited. 7.11 Reusability and Components. 7.12 Summary. 8 Exceptions. 8.1 What’s the Problem? 8.2 Kinds of Errors. 8.3 Representing Exceptions. 8.4 Throwing an Exception. 8.5 Catching Exceptions. 8.6 The Finally Block. 8.7 Plan to Use Exceptions. 8.8 Some Examples. 8.9 Summary. 9 Introducing Concurrency with Threads. 9.1 Doing More Than One Thing At Once. 9.2 Threads. 9.3 Using Threads. 9.4 Thread Synchronization. 9.5 Thread Scheduling. 9.6 Example Programs. 9.7 Summary. 10 User Interfaces. 10.1 Introduction. 10.2 Core GUI Concepts. 10.3 Text Input with a GUI. 10.4 A Very Simple Text Editor. 10.5 Menus. 10.6 Painting. 10.7 Summary. Part 2 The Process of Programming. 11 The Programming Process. 11.1 Introduction. 11.2 Why Object-oriented? 11.3 Development Tasks. 11.4 Testing Strategies. 11.5 UML Class, Object and Sequence Diagrams. 11.6 Practice and Experience. 11.7 Summary. 12 Unit Testing. 12.1 Introduction. 12.2 Unit Testing—A First Example. 12.3 The Core Principles of Unit Testing. 12.4 Test-driven Development. 12.5 The TestNG Framework. 12.6 Extending the Person Class. 12.7 Summary. 13 Test-driven Programming Strategies. 13.1 Introduction. 13.2 Getting Started—Searching for Files. 13.3 The GUI. 13.4 The Complete Searcher. 13.5 Summary. 14 Programming Tools. 14.1 Introduction. 14.2 Project Structure. 14.3 Ant—The Build Tool. 14.4 Version Control. 14.5 Integrated Development Environments. 14.6 Summary. Part 3 Case Studies in Developing Programs. 15 Introducing the Case Studies. 15.1 Introduction. 15.2 The Case Studies. 15.3 The Presentations of the Case Studies. 16 Contacts Book. 16.1 Introduction. 16.2 Wading In. 16.3 Stepping Back—Some Research. 16.4 Data Storage. 16.5 A GUI Design. 16.6 Displaying the List of Contacts. 16.7 Menus and Action. 16.8 More to Do. 17 Pedestrian Crossing Simulation. 17.1 Introduction. 17.2 The Initial Problem Specification. 17.3 The Initial Thinking. 17.4 A First Pass. 17.5 Getting GUI. 17.6 GUIer and GUIer. 17.7 Control… We Have a Problem. 17.8 Onward. 17.9 Summary. Part 4 The Java Programming Language in Detail. 18 A Java Language Reference. 18.1 Introduction. 18.2 Syntax and Semantics. 18.3 The Presentation. 18.4 The Example Programs. 18.5 Summary. 19 Variables, Types and Expressions. 19.1 Introduction. 19.2 Comments. 19.3 Identifiers. 19.4 Unicode Escapes. 19.5 Literals. 19.6 Types. 19.7 Scope. 19.8 Variables. 19.9 Expressions and Operators. 19.10 Source Files. 19.11 Summary. 20 Flow Control. 20.1 Introduction. 20.2 Selection. 20.3 Iteration. 20.4 Transfer Statements. 20.5 Recursion. 20.6 Summary. 21 Classes and Packages. 21.1 Introduction. 21.2 Classes. 21.3 Top-Level Classes. 21.4 Nested Classes. 21.5 Enumerated Types. 21.6 Packages. 21.7 Static Import. 21.8 Summary. 22 Inheritance and Interfaces. 22.1 Introduction. 22.2 Inheritance. 22.3 Interfaces. 22.4 Annotations. 22.5 Summary. 23 Exception Handling. 23.1 Introduction. 23.2 Summary. 24 Threads and Concurrency. 24.1 Introduction. 24.2 Class Thread. 24.3 Synchronized Methods. 24.4 Synchronized Statement. 24.5 Summary. Part 5 Endmatter. Appendix A Glossary. Appendix B The CRC Method. Appendix C The Online Documentation. Appendix D Running Java Programs. Appendix E Class Input. Appendix F Class FileInput. Appendix G Class FileOutput. Appendix H Class DrawFrame. Appendix I Class DrawPanel. Appendix J Bibliography. Index.
£51.26
John Wiley & Sons Inc ServiceOriented Computing
Book SynopsisThis comprehensive textexplains the principles and practice of Web services and relates all concepts to practical examples and emerging standards. Its discussions include: Ontologies Semantic web technologies Peer-to-peer service discovery Service selection Web structure and link analysis Distributed transactions Process modelling Consistency management. Theapplication of these technologiesis clearly explainedwithin the context ofplanning, negotiation, contracts, compliance, privacy, and network policies. Thepresentation ofthe intellectual underpinnings of Web services draws from several key disciplines such as databases, distributed computing, artificial intelligence, and multi-agent systems for techniques and formalisms. Ideas from these disciplines are united in the context of Web services and service-based applications. Featuring an accompanying website and teacher's manual that includes aTable of ContentsAbout the Authors. Preface. Note to the Reader. Acknowledgments. Figures. Tables. Listings. I Basics. 1. Computing with Services. 2. Basic Standards for Web Services. 3. Programming Web Services. 4. Enterprise Architectures. 5. Principles of Service-Oriented Computing. II Description. 6. Modeling and Representation. 7. Resource Description Framework. 8. Web Ontology Language. 9. Ontology Management. III Engagement. 10. Execution Models. 11. Transaction Concepts. 12. Coordination Frameworks for Web Services. 13. Process Specifications. 14. Formal Specification and Enactment. IV Collaboration. 15. Agents. 16. Multiagent Systems. 17. Organizations. 18. Communication. V Solutions. 19. Semantic Service Solutions. 20. Social Service Selection. 21. Economic Service Selection. VI Engineering. 22. Building SOC Applications. 23. Service Management. 24. Security. VII Directions. 25. Challenge and Extensions. VIII Appendices. Appendix A: XML and XML Schema. Appendix B: URI, URN, URL and UUID. Appendix C: XML Namespace Abbreviations. Glossary. About the Authors. Bibliography. Index.
£77.36
John Wiley & Sons Inc ObjectOriented Analysis and Design
Book SynopsisCovering the breadth of this core topic, Object--Oriented Analysis and Design provides a thorough grounding in object--oriented concepts, the software development process, UML and multi--tier technologies.Trade Review"This is an excellent book...a book I greatly enjoyed reading..." (Visual Systems Journal, October 2005)Table of Contents1. Introduction. Part I: Setting the Scene. 2. Object Concepts. 3. Inheritance. 4. Type Systems. 5. Software Development Methodologies. Part II: Understanding the Problem. 6. Gathering Requirements. 7. Analyzing the Problem. Part III: Designing the Solution. 8. Designing the System Architecture. 9. Choosing Technologies. 10. Designing the Subsystems. 11. Reusable Design Patterns. 12. Specifying the Interfaces of Classes. 13. Continuous Testing. Appendix A: Ripple Summary. Appendix B: iCoot Case Study. Appendix C: Summary of UML Notation Used. Bibliography. Index.
£43.65
John Wiley & Sons Inc Concurrency
Book SynopsisConcurrency provides a thoroughly updated approach to the basic concepts and techniques behind concurrent programming. Concurrent programming is complex and demands a much more formal approach than sequential programming.Table of ContentsPreface. Acknowledgments. 1. Introduction. 1.1 Concurrent Programs. 1.2 The Modeling Approach. 1.3 Practice. 1.4 Content Overview. Summary. Notes and Further Reading. 2. Processes and Threads. 2.1 Modeling Processes. 2.2 Implementing Processes. Summary. Notes and Further Reading. Exercises. 3. Concurrent Execution. 3.1 Modeling Concurrency. 3.2 Multi-Threaded Programs. Summary. Notes and Further Reading. Exercises. 4. Shared Objects and Mutual Exclusion. 4.1 Interference. 4.2 Mutual Exclusion in Java. 4.3 Modeling Mutual Exclusion. Summary. Notes and Further Reading. Exercises. 5. Monitors and Condition Synchronization. 5.1 Condition Synchronization. 5.2 Semaphores. 5.3 Bounded Buffers. 5.4 Nested Monitors. 5.5 Monitor Invariants. Summary. Notes and Further Reading. Exercises. 6. Deadlock. 6.1 Deadlock Analysis. 6.2 Dining Philosophers Problem. Summary. Notes and Further Reading. Exercises. 7. Safety and Liveness Properties. 7.1 Safety. 7.2 Single-Lane Bridge Problem. 7.3 Liveness. 7.4 Liveness of the Single-Lane Bridge. 7.5 Readers–Writers Problem. Summary. Notes and Further Reading. Exercises. 8. Model-Based Design. 8.1 From Requirements to Models. 8.2 From Models to Implementation. Summary. Notes and Further Reading Exercises. 9. Dynamic Systems. 9.1 Golf Club Program. 9.2 Golf Club Model. 9.3 Fair Allocation. 9.4 Revised Golf Ball Allocator. 9.5 Bounded Overtaking. 9.6 Bounded Overtaking Golf Ball Allocator. 9.7 Master–Slave Program. 9.8 Master–Slave Model. Summary. Notes and Further Reading. Exercises. 10. Message Passing. 10.1 Synchronous Message Passing. 10.2 Asynchronous Message Passing. 10.3 Rendezvous. Summary. Notes and Further Reading. Exercises. 11. Concurrent Architectures. 11.1 Filter Pipeline. 11.2 Supervisor–Worker. 11.3 Announcer–Listener. Summary. Notes and Further Reading. Exercises. 12. Timed Systems. 12.1 Modeling Timed Systems. 12.2 Implementing Timed Systems. 12.3 Parcel Router Problem. 12.4 Space Invaders. Summary. Notes and Further Reading. Exercises. 13.ihl Program Verification. 13.1 Sequential Processes. 13.2 Modeling Condition Synchronization. 13.3 Modeling Variables and Synchronized Methods. 13.4 Bounded Buffer Example. 13.5 Readers–Writers Example. Summary. Notes and Further Reading. Exercises. 14. Logical Properties. 14.1 Fluent Propositions. 14.2 Temporal Propositions. 14.3 Fluent Linear Temporal Logic (FLTL). 14.4 Database Ring Problem. Summary. Notes and Further Reading. Exercises. Appendix A: FSP Quick Reference. Appendix B: FSP Language Specification. Appendix C: FSP Semantics. Appendix D: UML Class Diagrams. Bibliography. Index.
£53.96
John Wiley & Sons Inc The Grid Core Technologies
Book SynopsisThis book gives readers a complete, clear and practical understanding of the technologies that enable the hot topic of Grid computing. It systematically explains OGSA (Open Grid Service Architecture), Web Service technologies (SOAP, WSDL, UDDI), GMA (Grid Monitoring Architecture), Grid Portals, Grid Workflow.Trade Review"It could serve as a good textbook and would certainly be a good addition to the reference libraries of technologists, academics, and students." (IEEE Distributed Systems Online, December 2006) "…lots of valuable information." (Computing Reviews.com, May 11, 2006) "…a complete, clear, systematic, and practical understanding of the technologies that enable the Grid." (IEEE Computer Magazine, August 2005) "…a good addition to the reference library…" (IEEE DS Online, January 2007)Table of ContentsAbout the Authors xiii Preface xv Acknowledgements xix List of Abbreviations xxi 1 An Introduction to the Grid 1 1.1 Introduction 1 1.2 Characterization of the Grid 1 1.3 Grid-Related Standards Bodies 4 1.4 The Architecture of the Grid 5 1.5 References 6 Part One System Infrastructure 9 2 OGSA and WSRF 11 Learning Objectives 11 Chapter Outline 11 2.1 Introduction 12 2.2 Traditional Paradigms for Distributed Computing 13 2.2.1 Socket programming 14 2.2.2 RPC 15 2.2.3 Java RMI 16 2.2.4 DCOM 18 2.2.5 CORBA 19 2.2.6 A summary on Java RMI, DCOM and CORBA 20 2.3 Web Services 21 2.3.1 SOAP 23 2.3.2 WSDL 24 2.3.3 UDDI 26 2.3.4 WS-Inspection 27 2.3.5 WS-Inspection and UDDI 28 2.3.6 Web services implementations 29 2.3.7 How Web services benefit the Grid 33 2.4 OGSA 34 2.4.1 Service instance semantics 35 2.4.2 Service data semantics 37 2.4.3 OGSA portTypes 38 2.4.4 A further discussion on OGSA 40 2.5 The Globus Toolkit 3 (GT3) 40 2.5.1 Host environment 41 2.5.2 Web services engine 42 2.5.3 Grid services container 42 2.5.4 GT3 core services 43 2.5.5 GT3 base services 44 2.5.6 The GT3 programming model 50 2.6 OGSA-DAI 53 2.6.1 OGSA-DAI portTypes 54 2.6.2 OGSA-DAI functionality 56 2.6.3 Services interaction in the OGSA-DAI 58 2.6.4 OGSA-DAI and DAIS 59 2.7 WSRF 60 2.7.1 An introduction to WSRF 60 2.7.2 WSRF and OGSI/GT3 66 2.7.3 WSRF and OGSA 69 2.7.4 A summary of WSRF 70 2.8 Chapter Summary 70 2.9 Further Reading and Testing 72 2.10 Key Points 72 2.11 References 73 3 The Semantic Grid and Autonomic Computing 77 Learning Outcomes 77 Chapter Outline 77 3.1 Introduction 78 3.2 Metadata and Ontology in the Semantic Web 79 3.2.1 RDF 81 3.2.2 Ontology languages 83 3.2.3 Ontology editors 87 3.2.4 A summary of Web ontology languages 88 3.3 Semantic Web Services 88 3.3.1 DAML-S 89 3.3.2 OWL-S 90 3.4 A Layered Structure of the Semantic Grid 91 3.5 Semantic Grid Activities 92 3.5.1 Ontology-based Grid resource matching 93 3.5.2 Semantic workflow registration and discovery in myGrid 94 3.5.3 Semantic workflow enactment in Geodise 95 3.5.4 Semantic service annotation and adaptation in ICENI 98 3.5.5 PortalLab – A Semantic Grid portal toolkit 99 3.5.6 Data provenance on the Grid 106 3.5.7 A summary on the Semantic Grid 107 3.6 Autonomic Computing 108 3.6.1 What is autonomic computing? 108 3.6.2 Features of autonomic computing systems 109 3.6.3 Autonomic computing projects 110 3.6.4 A vision of autonomic Grid services 113 3.7 Chapter Summary 114 3.8 Further Reading and Testing 115 3.9 Key Points 116 3.10 References 116 Part Two Basic Services 121 4 Grid Security 123 4.1 Introduction 123 4.2 A Brief Security Primer 124 4.3 Cryptography 127 4.3.1 Introduction 127 4.3.2 Symmetric cryptosystems 128 4.3.3 Asymmetric cryptosystems 129 4.3.4 Digital signatures 130 4.3.5 Public-key certificate 130 4.3.6 Certification Authority (CA) 132 4.3.7 Firewalls 133 4.4 Grid Security 134 4.4.1 The Grid Security Infrastructure (GSI) 134 4.4.2 Authorization modes in GSI 136 4.5 Putting it all Together 140 4.5.1 Getting an e-Science certificate 140 4.5.2 Managing credentials in Globus 146 4.5.3 Generate a client proxy 148 4.5.4 Firewall traversal 148 4.6 Possible Vulnerabilities 149 4.6.1 Authentication 149 4.6.2 Proxies 149 4.6.3 Authorization 150 4.7 Summary 151 4.8 Acknowledgements 151 4.9 Further Reading 151 4.10 References 152 5 Grid Monitoring 153 5.1 Introduction 153 5.2 Grid Monitoring Architecture (GMA) 154 5.2.1 Consumer 155 5.2.2 The Directory Service 156 5.2.3 Producers 157 5.2.4 Monitoring data 159 5.3 Review Criteria 161 5.3.1 Scalable wide-area monitoring 161 5.3.2 Resource monitoring 161 5.3.3 Cross-API monitoring 161 5.3.4 Homogeneous data presentation 162 5.3.5 Information searching 162 5.3.6 Run-time extensibility 162 5.3.7 Filtering/fusing of data 163 5.3.8 Open and standard protocols 163 5.3.9 Security 163 5.3.10 Software availability and dependencies 163 5.3.11 Projects that are active and supported; plus licensing 163 5.4 An Overview of Grid Monitoring Systems 164 5.4.1 Autopilot 164 5.4.2 Control and Observation in Distributed Environments (CODE) 168 5.4.3 GridICE 172 5.4.4 Grid Portals Information Repository (GPIR) 176 5.4.5 GridRM 180 5.4.6 Hawkeye 185 5.4.7 Java Agents for Monitoring and Management (JAMM) 189 5.4.8 MapCenter 192 5.4.9 Monitoring and Discovery Service (MDS3) 196 5.4.10 Mercury 201 5.4.11 Network Weather Service 205 5.4.12 The Relational Grid Monitoring Architecture (R-GMA) 209 5.4.13 visPerf 214 5.5 Other Monitoring Systems 217 5.5.1 Ganglia 217 5.5.2 GridMon 219 5.5.3 GRM/PROVE 220 5.5.4 Nagios 221 5.5.5 NetLogger 222 5.5.6 SCALEA-G 223 5.6 Summary 225 5.6.1 Resource categories 225 5.6.2 Native agents 225 5.6.3 Architecture 226 5.6.4 Interoperability 226 5.6.5 Homogeneous data presentation 226 5.6.6 Intrusiveness of monitoring 227 5.6.7 Information searching and retrieval 231 5.7 Chapter Summary 233 5.8 Further Reading and Testing 236 5.9 Key Points 236 5.10 References 236 Part Three Job Management and User Interaction 241 6 Grid Scheduling and Resource Management 243 Learning Objectives 243 Chapter Outline 243 6.1 Introduction 244 6.2 Scheduling Paradigms 245 6.2.1 Centralized scheduling 245 6.2.2 Distributed scheduling 246 6.2.3 Hierarchical scheduling 248 6.3 How Scheduling Works 248 6.3.1 Resource discovery 248 6.3.2 Resource selection 251 6.3.3 Schedule generation 251 6.3.4 Job execution 254 6.4 A Review of Condor, SGE, PBS and LSF 254 6.4.1 Condor 254 6.4.2 Sun Grid Engine 269 6.4.3 The Portable Batch System (PBS) 274 6.4.4 LSF 279 6.4.5 A comparison of Condor, SGE, PBS and LSF 288 6.5 Grid Scheduling with QoS 290 6.5.1 AppLeS 291 6.5.2 Scheduling in GrADS 293 6.5.3 Nimrod/G 293 6.5.4 Rescheduling 295 6.5.5 Scheduling with heuristics 296 6.6 Chapter Summary 297 6.7 Further Reading and Testing 298 6.8 Key Points 298 6.9 References 299 7 Workflow Management for the Grid 301 Learning Outcomes 301 Chapter Outline 301 7.1 Introduction 302 7.2 The Workflow Management Coalition 303 7.2.1 The workflow enactment service 305 7.2.2 The workflow engine 306 7.2.3 WfMC interfaces 308 7.2.4 Other components in the WfMC reference model 309 7.2.5 A summary of WfMC reference model 310 7.3 Web Services-Oriented Flow Languages 310 7.3.1 XLANG 311 7.3.2 Web services flow language 311 7.3.3 WSCI 313 7.3.4 BPEL4WS 315 7.3.5 BPML 317 7.3.6 A summary of Web services flow languages 318 7.4 Grid Services-Oriented Flow Languages 318 7.4.1 GSFL 318 7.4.2 SWFL 321 7.4.3 GWEL 321 7.4.4 GALE 322 7.4.5 A summary of Grid services flow languages 323 7.5 Workflow Management for the Grid 323 7.5.1 Grid workflow management projects 323 7.5.2 A summary of Grid workflow management 329 7.6 Chapter Summary 330 7.7 Further Reading and Testing 331 7.8 Key Points 332 7.9 References 332 8 Grid Portals 335 Learning Outcomes 335 Chapter Outline 335 8.1 Introduction 336 8.2 First-Generation Grid Portals 337 8.2.1 A three-tiered architecture 337 8.2.2 Grid portal services 338 8.2.3 First-generation Grid portal implementations 339 8.2.4 First-generation Grid portal toolkits 341 8.2.5 A summary of the four portal tools 348 8.2.6 A summary of first-generation Grid portals 349 8.3 Second-Generation Grid Portals 350 8.3.1 An introduction to portlets 350 8.3.2 Portlet specifications 355 8.3.3 Portal frameworks supporting portlets 357 8.3.4 A Comparison of Jetspeed, WebSphere Portal and GridSphere 368 8.3.5 The development of Grid portals with portlets 369 8.3.6 A summary on second-generation Grid portals 371 8.4 Chapter Summary 372 8.5 Further Reading and Testing 373 8.6 Key Points 373 8.7 References 374 Part Four Applications 377 9 Grid Applications – Case Studies 379 Learning Objectives 379 Chapter Outline 379 9.1 Introduction 380 9.2 GT3 Use Cases 380 9.2.1 GT3 in broadcasting 381 9.2.2 GT3 in software reuse 382 9.2.3 A GT3 bioinformatics application 387 9.3 OGSA-DAI Use Cases 387 9.3.1 eDiaMoND 387 9.3.2 ODD-Genes 388 9.4 Resource Management Case Studies 388 9.4.1 The UCL Condor pool 388 9.4.2 SGE use cases 389 9.5 Grid Portal Use Cases 390 9.5.1 Chiron 390 9.5.2 GENIUS 390 9.6 Workflow Management – Discovery Net Use Cases 391 9.6.1 Genome annotation 391 9.6.2 SARS virus evolution analysis 391 9.6.3 Urban air pollution monitoring 392 9.6.4 Geo-hazard modelling 394 9.7 Semantic Grid – myGrid Use Case 394 9.8 Autonomic Computing – AutoMate Use Case 395 9.9 Conclusions 397 9.10 References 398 Glossary 401 Index 419
£84.56
Wiley Professional Java Native Interfaces with SWT
Book SynopsisProfessional Java Native Interfaces takes a solutions--based approach to show how SWT/JFace works and how to harness these two interface--building tools. Each common component is discussed, providing useful, practical ideas and tips and techniques to make working easier.Table of ContentsAbout the Author. Introduction. Part I: Fundamentals. Chapter 1: Overview of Java UI Toolkits and SWT/Jface. Chapter 2: SWT/JFace Mechanisms. Chapter 3: Jump Start with SWT/Jface. Chapter 4: SWT Event Handling, Threading, and Displays. Chapter 5: Basic SWT Widgets. Chapter 6: Layouts. Part II: Design Basics. Chapter 7: Combos and Lists. Chapter 8: Text Controls. Chapter 9: Menus, Toolbars, Cool Bars, and Actions. Chapter 10: Tables. Chapter 11: Trees. Chapter 12: Dialogs. Part III: Dynamic Controls. Chapter 13: Scales, Sliders, and Progress Bars. Chapter 14: Other Important SWT Components. Chapter 15: SWT Graphics and Image Handling. Chapter 16: Drag and Drop and the Clipboard. Chapter 17: Printing. Chapter 18: JFace Windows and Dialogs. Part IV: Application Development. Chapter 19: JFace Wizards. Chapter 20: Creating a Text Editor with JFace Text. Chapter 21: Eclipse Forms. Chapter 22: Programming OLE in Windows. Chapter 23: Drawing Diagrams with Draw2D. Chapter 24: Sample Application. Index.
£27.00
John Wiley & Sons Inc Protocols and Architectures for Wireless Sensor
Book SynopsisLearn all you need to know about wireless sensor networks! Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other.Trade Review"I am deeply impressed by the book of Karl & Willig. It is by far the most complete source for wireless sensor networks...The book covers almost all topics related to sensor networks, gives an amazing number of references, and, thus, is the perfect source for students, teachers, and researchers. Throughout the book the reader will find high quality text, figures, formulas, comparisons etc. - all you need for a sound basis to start sensor network research." (Prof. Jochen Schiller, Institute of Computer Science, Freie Universitat Berlin, January 2006)Table of ContentsPreface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Required mechanisms 9 1.5 Why are sensor networks different? 10 1.5.1 Mobile ad hoc networks and wireless sensor networks 10 1.5.2 Fieldbuses and wireless sensor networks 12 1.6 Enabling technologies for wireless sensor networks 13 Part I Architectures 15 2 Single-node architecture 17 2.1 Hardware components 18 2.1.1 Sensor node hardware overview 18 2.1.2 Controller 19 2.1.3 Memory 21 2.1.4 Communication device 21 2.1.5 Sensors and actuators 31 2.1.6 Power supply of sensor nodes 32 2.2 Energy consumption of sensor nodes 36 2.2.1 Operation states with different power consumption 36 2.2.2 Microcontroller energy consumption 38 2.2.3 Memory 39 2.2.4 Radio transceivers 40 2.2.5 Relationship between computation and communication 44 2.2.6 Power consumption of sensor and actuators 44 2.3 Operating systems and execution environments 45 2.3.1 Embedded operating systems 45 2.3.2 Programming paradigms and application programming interfaces 45 2.3.3 Structure of operating system and protocol stack 47 2.3.4 Dynamic energy and power management 48 2.3.5 Case Study: TinyOS and nesC 50 2.3.6 Other examples 53 2.4 Some examples of sensor nodes 54 2.4.1 The “Mica Mote” family 54 2.4.2 EYES nodes 54 2.4.3 BTnodes 54 2.4.4 Scatterweb 54 2.4.5 Commercial solutions 55 2.5 Conclusion 56 3 Network architecture 59 3.1 Sensor network scenarios 60 3.1.1 Types of sources and sinks 60 3.1.2 Single-hop versus multihop networks 60 3.1.3 Multiple sinks and sources 62 3.1.4 Three types of mobility 62 3.2 Optimization goals and figures of merit 63 3.2.1 Quality of service 64 3.2.2 Energy efficiency 65 3.2.3 Scalability 66 3.2.4 Robustness 67 3.3 Design principles for WSNs 67 3.3.1 Distributed organization 67 3.3.2 In-network processing 67 3.3.3 Adaptive fidelity and accuracy 70 3.3.4 Data centricity 70 3.3.5 Exploit location information 73 3.3.6 Exploit activity patterns 73 3.3.7 Exploit heterogeneity 73 3.3.8 Component-based protocol stacks and cross-layer optimization 74 3.4 Service interfaces of WSNs 74 3.4.1 Structuring application/protocol stack interfaces 74 3.4.2 Expressibility requirements for WSN service interfaces 76 3.4.3 Discussion 77 3.5 Gateway concepts 78 3.5.1 The need for gateways 78 3.5.2 WSN to Internet communication 79 3.5.3 Internet to WSN communication 80 3.5.4 WSN tunneling 81 3.6 Conclusion 81 Part II Communication Protocols 83 4 Physical layer 85 4.1 Introduction 85 4.2 Wireless channel and communication fundamentals 86 4.2.1 Frequency allocation 86 4.2.2 Modulation and demodulation 88 4.2.3 Wave propagation effects and noise 90 4.2.4 Channel models 96 4.2.5 Spread-spectrum communications 98 4.2.6 Packet transmission and synchronization 100 4.2.7 Quality of wireless channels and measures for improvement 102 4.3 Physical layer and transceiver design considerations in WSNs 103 4.3.1 Energy usage profile 103 4.3.2 Choice of modulation scheme 104 4.3.3 Dynamic modulation scaling 108 4.3.4 Antenna considerations 108 4.4 Further reading 109 5 MAC protocols 111 5.1 Fundamentals of (wireless) MAC protocols 112 5.1.1 Requirements and design constraints for wireless MAC protocols 112 5.1.2 Important classes of MAC protocols 114 5.1.3 MAC protocols for wireless sensor networks 119 5.2 Low duty cycle protocols and wakeup concepts 120 5.2.1 Sparse topology and energy management (STEM) 121 5.2.2 S-mac 123 5.2.3 The mediation device protocol 126 5.2.4 Wakeup radio concepts 127 5.2.5 Further reading 128 5.3 Contention-based protocols 129 5.3.1 CSMA protocols 129 5.3.2 Pamas 131 5.3.3 Further solutions 132 5.4 Schedule-based protocols 133 5.4.1 Leach 133 5.4.2 Smacs 135 5.4.3 Traffic-adaptive medium access protocol (TRAMA) 137 5.4.4 Further solutions 139 5.5 The IEEE 802.15.4 MAC protocol 139 5.5.1 Network architecture and types/roles of nodes 140 5.5.2 Superframe structure 141 5.5.3 GTS management 141 5.5.4 Data transfer procedures 142 5.5.5 Slotted CSMA-CA protocol 142 5.5.6 Nonbeaconed mode 144 5.5.7 Further reading 145 5.6 How about IEEE 802.11 and bluetooth? 145 5.7 Further reading 146 5.8 Conclusion 148 6 Link-layer protocols 149 6.1 Fundamentals: tasks and requirements 150 6.2 Error control 151 6.2.1 Causes and characteristics of transmission errors 151 6.2.2 ARQ techniques 152 6.2.3 FEC techniques 158 6.2.4 Hybrid schemes 163 6.2.5 Power control 165 6.2.6 Further mechanisms to combat errors 166 6.2.7 Error control: summary 167 6.3 Framing 167 6.3.1 Adaptive schemes 170 6.3.2 Intermediate checksum schemes 172 6.3.3 Combining packet-size optimization and FEC 173 6.3.4 Treatment of frame headers 174 6.3.5 Framing: summary 174 6.4 Link management 174 6.4.1 Link-quality characteristics 175 6.4.2 Link-quality estimation 177 6.5 Summary 179 7 Naming and addressing 181 7.1 Fundamentals 182 7.1.1 Use of addresses and names in (sensor) networks 182 7.1.2 Address management tasks 183 7.1.3 Uniqueness of addresses 184 7.1.4 Address allocation and assignment 184 7.1.5 Addressing overhead 185 7.2 Address and name management in wireless sensor networks 186 7.3 Assignment of MAC addresses 186 7.3.1 Distributed assignment of networkwide addresses 187 7.4 Distributed assignment of locally unique addresses 189 7.4.1 Address assignment algorithm 189 7.4.2 Address selection and representation 191 7.4.3 Further schemes 194 7.5 Content-based and geographic addressing 194 7.5.1 Content-based addressing 194 7.5.2 Geographic addressing 198 7.6 Summary 198 8 Time synchronization 201 8.1 Introduction to the time synchronization problem 201 8.1.1 The need for time synchronization in wireless sensor networks 202 8.1.2 Node clocks and the problem of accuracy 203 8.1.3 Properties and structure of time synchronization algorithms 204 8.1.4 Time synchronization in wireless sensor networks 206 8.2 Protocols based on sender/receiver synchronization 207 8.2.1 Lightweight time synchronization protocol (LTS) 207 8.2.2 How to increase accuracy and estimate drift 212 8.2.3 Timing-sync protocol for sensor networks (TPSN) 214 8.3 Protocols based on receiver/receiver synchronization 217 8.3.1 Reference broadcast synchronization (RBS) 217 8.3.2 Hierarchy referencing time synchronization (HRTS) 223 8.4 Further reading 226 9 Localization and positioning 231 9.1 Properties of localization and positioning procedures 232 9.2 Possible approaches 233 9.2.1 Proximity 233 9.2.2 Trilateration and triangulation 234 9.2.3 Scene analysis 237 9.3 Mathematical basics for the lateration problem 237 9.3.1 Solution with three anchors and correct distance values 238 9.3.2 Solving with distance errors 238 9.4 Single-hop localization 240 9.4.1 Active Badge 240 9.4.2 Active office 240 9.4.3 Radar 240 9.4.4 Cricket 241 9.4.5 Overlapping connectivity 241 9.4.6 Approximate point in triangle 242 9.4.7 Using angle of arrival information 243 9.5 Positioning in multihop environments 243 9.5.1 Connectivity in a multihop network 244 9.5.2 Multihop range estimation 244 9.5.3 Iterative and collaborative multilateration 245 9.5.4 Probabilistic positioning description and propagation 247 9.6 Impact of anchor placement 247 9.7 Further reading 248 9.8 Conclusion 249 10 Topology control 251 10.1 Motivation and basic ideas 251 10.1.1 Options for topology control 252 10.1.2 Aspects of topology-control algorithms 254 10.2 Controlling topology in flat networks – Power control 256 10.2.1 Some complexity results 256 10.2.2 Are there magic numbers? – bounds on critical parameters 257 10.2.3 Some example constructions and protocols 259 10.2.4 Further reading on flat topology control 265 10.3 Hierarchical networks by dominating sets 266 10.3.1 Motivation and definition 266 10.3.2 A hardness result 266 10.3.3 Some ideas from centralized algorithms 267 10.3.4 Some distributed approximations 270 10.3.5 Further reading 273 10.4 Hierarchical networks by clustering 274 10.4.1 Definition of clusters 274 10.4.2 A basic idea to construct independent sets 277 10.4.3 A generalization and some performance insights 278 10.4.4 Connecting clusters 278 10.4.5 Rotating clusterheads 279 10.4.6 Some more algorithm examples 280 10.4.7 Multihop clusters 281 10.4.8 Multiple layers of clustering 283 10.4.9 Passive clustering 284 10.4.10 Further reading 284 10.5 Combining hierarchical topologies and power control 285 10.5.1 Pilot-based power control 285 10.5.2 Ad hoc Network Design Algorithm (ANDA) 285 10.5.3 Clusterpow 286 10.6 Adaptive node activity 286 10.6.1 Geographic Adaptive Fidelity (GAF) 286 10.6.2 Adaptive Self-Configuring sEnsor Networks’ Topologies (ASCENT) 287 10.6.3 Turning off nodes on the basis of sensing coverage 288 10.7 Conclusions 288 11 Routing protocols 289 11.1 The many faces of forwarding and routing 289 11.2 Gossiping and agent-based unicast forwarding 292 11.2.1 Basic idea 292 11.2.2 Randomized forwarding 292 11.2.3 Random walks 293 11.2.4 Further reading 294 11.3 Energy-efficient unicast 295 11.3.1 Overview 295 11.3.2 Some example unicast protocols 297 11.3.3 Further reading 301 11.3.4 Multipath unicast routing 301 11.3.5 Further reading 304 11.4 Broadcast and multicast 305 11.4.1 Overview 305 11.4.2 Source-based tree protocols 308 11.4.3 Shared, core-based tree protocols 314 11.4.4 Mesh-based protocols 314 11.4.5 Further reading on broadcast and multicast 315 11.5 Geographic routing 316 11.5.1 Basics of position-based routing 316 11.5.2 Geocasting 323 11.5.3 Further reading on geographic routing 326 11.6 Mobile nodes 328 11.6.1 Mobile sinks 328 11.6.2 Mobile data collectors 328 11.6.3 Mobile regions 329 11.7 Conclusions 329 12 Data-centric and content-based networking 331 12.1 Introduction 331 12.1.1 The publish/subscribe interaction paradigm 331 12.1.2 Addressing data 332 12.1.3 Implementation options 333 12.1.4 Distribution versus gathering of data – In-network processing 334 12.2 Data-centric routing 335 12.2.1 One-shot interactions 335 12.2.2 Repeated interactions 337 12.2.3 Further reading 340 12.3 Data aggregation 341 12.3.1 Overview 341 12.3.2 A database interface to describe aggregation operations 342 12.3.3 Categories of aggregation operations 343 12.3.4 Placement of aggregation points 345 12.3.5 When to stop waiting for more data 345 12.3.6 Aggregation as an optimization problem 347 12.3.7 Broadcasting an aggregated value 347 12.3.8 Information-directed routing and aggregation 350 12.3.9 Some further examples 352 12.3.10 Further reading on data aggregation 355 12.4 Data-centric storage 355 12.5 Conclusions 357 13 Transport layer and quality of service 359 13.1 The transport layer and QoS in wireless sensor networks 359 13.1.1 Quality of service/reliability 360 13.1.2 Transport protocols 361 13.2 Coverage and deployment 362 13.2.1 Sensing models 362 13.2.2 Coverage measures 364 13.2.3 Uniform random deployments: Poisson point processes 365 13.2.4 Coverage of random deployments: Boolean sensing model 366 13.2.5 Coverage of random deployments: general sensing model 368 13.2.6 Coverage determination 369 13.2.7 Coverage of grid deployments 374 13.2.8 Further reading 375 13.3 Reliable data transport 376 13.3.1 Reliability requirements in sensor networks 377 13.4 Single packet delivery 378 13.4.1 Using a single path 379 13.4.2 Using multiple paths 384 13.4.3 Multiple receivers 388 13.4.4 Summary 389 13.5 Block delivery 389 13.5.1 PSFQ: block delivery in the sink-to-sensors case 389 13.5.2 RMST: block delivery in the sensors-to-sink case 395 13.5.3 What about TCP? 397 13.5.4 Further reading 399 13.6 Congestion control and rate control 400 13.6.1 Congestion situations in sensor networks 400 13.6.2 Mechanisms for congestion detection and handling 402 13.6.3 Protocols with rate control 403 13.6.4 The CODA congestion-control framework 408 13.6.5 Further reading 411 14 Advanced application support 413 14.1 Advanced in-network processing 413 14.1.1 Going beyond mere aggregation of data 413 14.1.2 Distributed signal processing 414 14.1.3 Distributed source coding 416 14.1.4 Network coding 420 14.1.5 Further issues 421 14.2 Security 422 14.2.1 Fundamentals 422 14.2.2 Security considerations in wireless sensor networks 423 14.2.3 Denial-of-service attacks 423 14.2.4 Further reading 425 14.3 Application-specific support 425 14.3.1 Target detection and tracking 426 14.3.2 Contour/edge detection 429 14.3.3 Field sampling 432 Bibliography 437 Index 481
£97.16
John Wiley & Sons Inc Asterisk For Dummies
Book SynopsisBridge data and voice with Asterisk! Create and maintain an economical Asterisk phone system from scratch Asterisk is the open-source PBX software that offers you the chance to save real money on your voice communications.Table of ContentsForeword. Introduction. Part I: Introducing . . . ASTERISK! Chapter 1: Evaluating the Possibilities with Asterisk. Chapter 2: Installing Asterisk. Chapter 3: Installing AsteriskNOW. Chapter 4: Configuring the Hardware. Part II: Using Dialplans — the Building Blocks of Asterisk. Chapter 5: Comprehending Dialplan Syntax. Chapter 6: Adding Features to Dialplans. Chapter 7: Building Dialplan Infrastructure. Chapter 8: Operating the AsteriskNOW GUI. Chapter 9: Utilizing VoIP Codecs. Part III: Maintaining Your Phone Service with Asterisk. Chapter 10: Troubleshooting VoIP Calls with Packet Captures. Chapter 11: Maintaining Your Telecom Services. Chapter 12: Addressing Call-Quality Concerns and Completion Issues. Chapter 13: Handling Dedicated Digital Troubles. Chapter 14: Managing Asterisk for Peak Capacity. Chapter 15: Providing Long-Term Health for Your Asterisk Switch. Part IV: The Part of Tens. Chapter 16: Ten Things You Should Never Do with Asterisk. Chapter 17: Ten Fun Things to Do with Your Asterisk. Chapter 18: Ten Places to Go for Help. Part V: Appendixes. Appendix A: Visualizing the Dialplan. Appendix B: VoIP Basics. Appendix C: Understanding Basic Linux. Index.
£21.59
John Wiley & Sons Inc Wiley Pathways Introduction to Database
Book SynopsisYou can get there Where do you want to go? You might already be working in the information technology field and may be looking to expand your skills. You might be setting out on a new career path. Or, you might want to learn more about exciting opportunities in database management.Table of Contents1 Introducing to Data and Data Management 1 Introduction 2 1.1 Understanding the Role of Data and Databases 2 1.1.1 A Practical Example 3 1.1.2 Understanding Data Management5 1.1.3 The Need for Data Management 5 Self-Check 7 1.2 Understanding Data Sources7 1.2.1 Picking a Starting Point 7 1.2.2 Identifying Primary Processes 8 1.2.3 Specific Data Sources 9 Self-Check 12 1.3 Potential Data Concerns 12 1.3.1 Managing Data Accuracy 13 1.3.2 Managing Data Security 13 1.3.3 Managing Data Organization 16 1.3.4 Managing Data Access 16 Self-Check 18 Summary 19 Key Terms 19 Assess Your Understanding 20 Summary Questions 20 Applying This Chapter 22 You Try It 23 2 Introducing Databases and Database Management Systems 24 Introduction 25 2.1Introduction to Key Database Concepts 25 2.1.1Database Approach to Data 25 2.1.2Understanding Basic Concepts 26 2.1.3Database Use 29 Self-Check31 2.2 Understanding Basic Database Models 31 2.2.1 The Hierarchical Database Model 32 2.2.2 The Network Database Model 33 2.2.3 The Relational Database Model 34 2.2.4 The Object-Oriented Database Model 35 2.2.5 The Object-Relational Database Model 36 Self-Check 37 2.3 Database Components 38 2.3.1 Hardware Components 40 2.3.2 Software Requirements 43 2.3.3 DBMS Components45 2.3.4 Understanding People and Procedures 50 Self-Check 53 Summary 54 Key Terms 54 Assess Your Understanding 55 Summary Questions 55 Applying This Chapter 57 You Try It 59 3 Data Modeling 60 Introduction 61 3.1 Understanding Database Design 61 3.1.1 Understanding the Design Process 61 3.1.2 Determining the Database Type 63 3.1.3 Understanding Modeling Goals 66 3.1.4 Understanding Business Rules 67 Self-Check 70 3.2 Understanding Relational Database Models 70 3.2.1 Entity-Relationship (E-R) Modeling Concepts 71 3.2.2 Introducing Basic Database Objects 75 Self-Check 79 3.3 Understanding Relationships 79 3.3.1 Binary Relationships 80 3.3.2 Unary Relationships 84 3.3.3 Ternary Relationships 86 3.3.4 Breaking Down Many-to-Many Relationships 87 Self-Check91 3.4 Comparing Data Models 91 3.4.1 Choosing a Modeling Tool 92 3.4.2 The General Hardware Company 93 3.4.3 Good Reading Bookstores 95 Self-Check 97 Summary 97 Key Terms 97 Assess Your Understanding 99 Summary Questions 99 Applying This Chapter 101 You Try It103 4 Designing a Database 104 Introduction 105 4.1Designing Relational Tables 105 4.1.1Converting a Single Entity 105 4.1.2Converting Binary Relationships 106 4.1.3Converting Unary Relationships 113 Self-Check 117 4.2 Comparing Relational Designs 117 4.2.1 Designing General Hardware 117 4.2.2 Designing Good Reading Bookstores 120 Self-Check 123 4.3 Normalizing Data 123 4.3.1 Using Normalization Techniques 123 4.3.2 Normalizing Data by the Numbers 125 4.3.3 Shortening the Process 134 4.3.4 Denormalizing Data 134 Self-Check 136 Summary 136 Key Terms 137 Assess Your Understanding 138 Summary Questions 138 Applying This Chapter 140 You Try It 142 5 Implementing a Database 146 Introduction 147 5.1 Physical Design and Implementation 147 5.1.1 Understanding Design Requirements 147 5.1.2 Business Environment Requirements 149 5.1.3 Data Characteristics 149 5.1.4 Application Characteristics 151 5.1.5 Operational Requirements 152 5.1.6 The Hardware and Software Environment 152 5.1.7 Evaluating Implementation Options 154 Self-Check 158 5.2 Adjusting Your Design to the Real World 158 5.2.1 Ensuring Data Integrity 159 5.2.2 Adjusting Factors Related to Performance 162 Self-Check 171 5.3 Implementing Database Objects 171 5.3.1 Implementing Your Final Table Design 171 5.3.2 Implementing Indexes 173 5.3.3 Implementing Views 175 Self-Check 177 Summary 177 Key Terms 177 Assess Your Understanding 178 Summary Questions 178 Applying This Chapter 180 You Try It182 6 Understanding the SQL Language 184 Introduction 185 6.1 Introducing the SQL Language 185 6.1.1 Understanding SQL Features 185 6.1.2 Using SQL 186 6.1.3 Understanding Command Basics 190 Self-Check 192 6.2 Understanding SELECT Fundamentals 192 6.2.1 Working with SELECT 192 6.2.2 Using Simple Data Retrieval 193 6.2.3 Retrieving Other Values 194 Self-Check 196 6.3 Understanding Operators and Functions 196 6.3.1 Arithmetic Operators 196 6.3.2 Comparison and Logical Operators 197 6.3.3 Standard SQL Functions 201 6.3.4 Function Variations 202 Self-Check 208 6.4 Understanding DML Commands 208 6.4.1 Using INSERT 208 6.4.2 Using UPDATE 209 6.4.3 Using DELETE 211 Self-Check213 6.5 Understanding DDL Commands 213 6.5.1 Using CREATE 214 6.5.2 Using ALTER 216 6.5.3 Using DROP 216 Self-Check 216 Summary 217 Key Terms 217 Assess Your Understanding 218 Summary Questions 218 Applying This Chapter 220 You Try It222 7 Data Access and Manipulation 223 Introduction224 7.1 Using SELECT Statement Advanced Syntax 224 7.1.1 Understanding SELECT Statement Syntax 224 7.1.2 Filtering Your Result 226 7.1.3 Managing Your Result Set 229 7.1.4 Sorting, Organizing, and Grouping Data 231 7.1.5 Understanding Operator Precedence 237 7.1.6 Combining Statement Results 239 7.1.7 Using SELECT with Other Commands 240 Self-Check 242 7.2 Using Joins and Subqueries 242 7.2.1 Understanding Joins 242 7.2.2 Using Different Join Syntaxes 244 7.2.3 Using Basic Subqueries 246 Self-Check 250 7.3 Using Batches and Scripts 250 7.3.1 Writing Batches and Scripts 251 7.3.2 Understanding Basic Programming Concepts 252 Self-Check 256 Summary 256 Key Terms 256 Assess Your Understanding 257 Summary Questions 257 Applying This Chapter 259 You Try It262 8 Improving Data Access 263 Introduction 264 8.1 Understanding Performance Roadblocks 264 8.1.1 Recognizing Potential Bottlenecks 265 8.1.2 Understanding Hardware Performance 265 8.1.3 Understanding Database Performance 270 8.1.4 Performance Monitoring 270 8.1.5 Knowing What to Use 274 Self-Check 275 8.2 Using Indexes and Views 275 8.2.1 Working with Indexes 276 8.2.2 Working with Views 280 Self-Check 283 8.3Using Programmable Objects 284 8.3.1Understanding Procedures 284 8.3.2Understanding Functions 287 Self-Check 292 Summary 292 Key Terms 292 Assess Your Understanding 294 Summary Questions 294 Applying This Chapter 296 You Try It298 9 Database Administration 300 Introduction 301 9.1 Understanding the Need for Administration 301 9.1.1 Identifying Administration Roles 302 9.1.2 Justifying the Need for Administration 302 Self-Check 306 9.2 Identifying Administration Responsibilities 307 9.2.1 Understanding Data Administration Responsibilities 308 9.2.2 Understanding Database Administration Responsibilities 313 Self-Check 318 9.3 Understanding Management Tasks 318 9.3.1 Considering “What” and “When” 319 9.3.2 Considering “When” and “How” 319 9.3.3 Ongoing Management Tasks 321 9.3.4 Considering Troubleshooting 324 Self-Check 326 Summary 326 Key Terms 326 Assess Your Understanding 327 Summary Questions 327 Applying This Chapter 329 You Try It 330 10 Transactions and Locking 332 Introduction333 10.1 Understanding Transaction Basics 333 10.1.1 Understanding Transaction Processing 333 10.1.2 Using Transaction Commands 336 10.1.3 Understanding Transaction Properties 341 10.1.4 Understanding Transaction Scope 341 10.1.5 Recognizing and Resolving Potential Problems 345 Self-Check 347 10.2 Managing Concurrency Control 347 10.2.1 The Need for Concurrency Management 348 10.2.2 Recognizing Concurrency Problems 348 10.2.3 Designing for Concurrency 352 10.2.4 Concurrency Methods 352 Self-Check 355 10.3 SQL Server Transaction Management 355 10.3.1 Understanding Transaction Processing 355 10.3.2 Managing Locks, Locking, and Transaction Isolation 356 10.3.3 Recognizing, Clearing, and Preventing Deadlocks 358 Self-Check 362 Summary 362 Key Terms 363 Assess Your Understanding 364 Summary Questions 364 Applying This Chapter 366 You Try It 367 11 Data Access and Security 368 Introduction369 11.1 Understanding Database Connections 369 11.1.1 Understanding Connectivity Concepts 369 11.1.2 Understanding Client/Server Connectivity 376 11.1.3 Understanding Multitier Connectivity 379 Self-Check 382 11.2 Managing Access Control 382 11.2.1 Controlling Server Access 383 11.2.2 Controlling Database Access 386 11.2.3 Understanding the Connection Process 387 Self-Check 392 11.3 Protecting Your Data 392 11.3.1 Implementing Data Permissions 393 11.3.2 Minimizing Table Access 397 11.3.3 Keeping Data Safe 397 11.3.4 Understanding RAID Configurations 397 11.3.5 Using Data Backups 400 11.3.6 Protecting Your Server 404 Self-Check 405 Summary 406 Key Terms 406 Assess Your Understanding 407 Summary Questions 407 Applying This Chapter 409 You Try It 411 12 Supporting Database Applications 412 Introduction 413 12.1 Supporting a Centralized Database 413 12.1.1 Understanding Local Area Networks (LANs) 413 12.1.2 Understanding Data Configurations 414 12.1.3 Understanding Server Configurations 416 12.1.4 Consolidating Data Sources 417 Self-Check 419 12.2 Supporting a Distributed Database 419 12.2.1 Understanding Distributed Data 419 12.2.2 Understanding Replicated Data 423 12.2.3 Understanding Partitioned Data 425 12.2.4 Distributed Data Support Issues 429 Self-Check 434 12.3 Understanding Internet Issues 434 12.3.1 Managing Performance Issues 435 12.3.2 Managing Availability Issues 436 12.3.3 Managing Security and Privacy Issues 438 Self-Check 441 Summary 442 Key Terms 442 Assess Your Understanding 443 Summary Questions 443 Applying This Chapter 445 You Try It 447 Glossary 448 Index 465
£80.96
John Wiley & Sons Inc Network Security Fundamentals
Book SynopsisAs networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets.Table of Contents1 Network Security Principles 1 Introduction 2 1.1 Importance of Computer and Network Security 2 1.2 Underlying Computer and Network Security Concepts 6 1.3 Threats and Countermeasures 11 1.4 Policies and Standards 20 2 Network and Server Security 30 Introduction 31 2.1 Network Protocols Review 31 2.2 Best Practices for Network Security 45 2.3 Securing Servers 49 2.4 Border Security 57 3 Cryptography 74 Introduction 75 3.1 Cryptography Overview 75 3.2 Symmetric Encryption 83 3.3 Asymmetric Encryption 90 3.4 Hashes 93 3.5 Achieving CIA 97 3.6 Public Key Infrastructure (PKI) 99 4 Authentication 118 Introduction 119 4.1 Authentication Overview 119 4.2 Authentication Credentials 125 4.3 Authentication Protocols 131 4.4 Best Practices for Secure Authentication 136 5 Authentication and Access Control 149 Introduction 150 5.1 Access Control Models 150 5.2 Implementing Access Control on Windows Computers 154 5.3 Implementing Access Control on Unix Computers 174 6 Securing Network Transmission 188 Introduction 189 6.1 Analyzing Security Requirements for Network Traffic 189 6.2 Defining Network Perimeters 195 6.3 Data Transmission Protection Protocols 201 7 Remote Access and Wireless Security 221 7.1 Dial-Up Networking 222 7.2 Virtual Private Networks 230 7.3 RADIUS and TACACS 235 7.4 Wireless Networks 239 8 Server Roles and Security 262 Introduction 263 8.1 Server Roles and Baselines 263 8.2 Securing Network Infrastructure Servers 274 8.3 Securing Domain Controllers 289 8.4 Securing File and Print Servers 292 8.5 Securing Application Servers 298 9 Protecting Against Malware 310 9.1 Viruses and Other Malware 311 9.2 Protecting the Workstation 315 9.3 Web Browser Security 323 9.4 Email Security 336 10 Ongoing Security Management 356 Introduction 357 10.1 Managing Updates 357 10.2 Auditing and Logging 366 10.3 Secure Remote Administration 371 11 Disaster Recovery and Fault Tolerance 395 Introduction 396 11.1 Planning for the Worst 396 11.2 Creating a Backup Strategy 407 11.3 Designing for Fault Tolerance 415 12 Intrusion Detection and Forensics 433 Introduction 434 12.1 Intrusion Detection 434 12.2 Honeypots 439 12.3 Forensics 444 Glossary 462 Index 507
£75.52
John Wiley & Sons Inc HighPerformance Parallel Database Processing and
Book SynopsisThe latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance parallel database processing within a major database management system (DBMS). This important new book provides readers with a fundamental understanding of parallelism in data-intensive applications, and demonstrates how to develop faster capabilities to support them. It presents a balanced treatment of the theoretical and practical aspects of high-performance databases to demonstrate how parallel query is executed in a DBMS, including concepts, algorithms, analytical models, and grid transactions. High-Performance Parallel Database Processing and Grid Databases serves as a valuable resource for researchers working in parallel databases and for practitioners interested in building a high-performance database. It is also a mucTable of ContentsPreface xv Part I Introduction 1. Introduction 3 1.1. A Brief Overview: Parallel Databases and Grid Databases 4 1.2. Parallel Query Processing: Motivations 5 1.3. Parallel Query Processing: Objectives 7 1.3.1. Speed Up 7 1.3.2. Scale Up 8 1.3.3. Parallel Obstacles 10 1.4. Forms of Parallelism 12 1.4.1. Interquery Parallelism 13 1.4.2. Intraquery Parallelism 14 1.4.3. Intraoperation Parallelism 15 1.4.4. Interoperation Parallelism 15 1.4.5. Mixed Parallelism—A More Practical Solution 18 1.5. Parallel Database Architectures 19 1.5.1. Shared-Memory and Shared-Disk Architectures 20 1.5.2. Shared-Nothing Architecture 22 1.5.3. Shared-Something Architecture 23 1.5.4. Interconnection Networks 24 1.6. Grid Database Architecture 26 1.7. Structure of this Book 29 1.8. Summary 30 1.9. Bibliographical Notes 30 1.10. Exercises 31 2. Analytical Models 33 2.1. Cost Models 33 2.2. Cost Notations 34 2.2.1. Data Parameters 34 2.2.2. Systems Parameters 36 2.2.3. Query Parameters 37 2.2.4. Time Unit Costs 37 2.2.5. Communication Costs 38 2.3. Skew Model 39 2.4. Basic Operations in Parallel Databases 43 2.4.1. Disk Operations 44 2.4.2. Main Memory Operations 45 2.4.3. Data Computation and Data Distribution 45 2.5. Summary 47 2.6. Bibliographical Notes 47 2.7. Exercises 47 Part II Basic Query Parallelism 3. Parallel Search 51 3.1. Search Queries 51 3.1.1. Exact-Match Search 52 3.1.2. Range Search Query 53 3.1.3. Multiattribute Search Query 54 3.2. Data Partitioning 54 3.2.1. Basic Data Partitioning 55 3.2.2. Complex Data Partitioning 60 3.3. Search Algorithms 69 3.3.1. Serial Search Algorithms 69 3.3.2. Parallel Search Algorithms 73 3.4. Summary 74 3.5. Bibliographical Notes 75 3.6. Exercises 75 4. Parallel Sort and GroupBy 77 4.1. Sorting, Duplicate Removal, and Aggregate Queries 78 4.1.1. Sorting and Duplicate Removal 78 4.1.2. Scalar Aggregate 79 4.1.3. GroupBy 80 4.2. Serial External Sorting Method 80 4.3. Algorithms for Parallel External Sort 83 4.3.1. Parallel Merge-All Sort 83 4.3.2. Parallel Binary-Merge Sort 85 4.3.3. Parallel Redistribution Binary-Merge Sort 86 4.3.4. Parallel Redistribution Merge-All Sort 88 4.3.5. Parallel Partitioned Sort 90 4.4. Parallel Algorithms for GroupBy Queries 92 4.4.1. Traditional Methods (Merge-All and Hierarchical Merging) 92 4.4.2. Two-Phase Method 93 4.4.3. Redistribution Method 94 4.5. Cost Models for Parallel Sort 96 4.5.1. Cost Models for Serial External Merge-Sort 96 4.5.2. Cost Models for Parallel Merge-All Sort 98 4.5.3. Cost Models for Parallel Binary-Merge Sort 100 4.5.4. Cost Models for Parallel Redistribution Binary-Merge Sort 101 4.5.5. Cost Models for Parallel Redistribution Merge-All Sort 102 4.5.6. Cost Models for Parallel Partitioned Sort 103 4.6. Cost Models for Parallel GroupBy 104 4.6.1. Cost Models for Parallel Two-Phase Method 104 4.6.2. Cost Models for Parallel Redistribution Method 107 4.7. Summary 109 4.8. Bibliographical Notes 110 4.9. Exercises 110 5. Parallel Join 112 5.1. Join Operations 112 5.2. Serial Join Algorithms 114 5.2.1. Nested-Loop Join Algorithm 114 5.2.2. Sort-Merge Join Algorithm 116 5.2.3. Hash-Based Join Algorithm 117 5.2.4. Comparison 120 5.3. Parallel Join Algorithms 120 5.3.1. Divide and Broadcast-Based Parallel Join Algorithms 121 5.3.2. Disjoint Partitioning-Based Parallel Join Algorithms 124 5.4. Cost Models 128 5.4.1. Cost Models for Divide and Broadcast 128 5.4.2. Cost Models for Disjoint Partitioning 129 5.4.3. Cost Models for Local Join 130 5.5. Parallel Join Optimization 132 5.5.1. Optimizing Main Memory 132 5.5.2. Load Balancing 133 5.6. Summary 134 5.7. Bibliographical Notes 135 5.8. Exercises 136 Part III Advanced Parallel Query Processing 6. Parallel GroupBy-Join 141 6.1. Groupby-Join Queries 141 6.1.1. Groupby Before Join 142 6.1.2. Groupby After Join 142 6.2. Parallel Algorithms for Groupby-Before-Join Query Processing 143 6.2.1. Early Distribution Scheme 143 6.2.2. Early GroupBy with Partitioning Scheme 145 6.2.3. Early GroupBy with Replication Scheme 146 6.3. Parallel Algorithms for Groupby-After-Join Query Processing 148 6.3.1. Join Partitioning Scheme 148 6.3.2. GroupBy Partitioning Scheme 150 6.4. Cost Model Notations 151 6.5. Cost Model for Groupby-Before-Join Query Processing 153 6.5.1. Cost Models for the Early Distribution Scheme 153 6.5.2. Cost Models for the Early GroupBy with Partitioning Scheme 156 6.5.3. Cost Models for the Early GroupBy with Replication Scheme 158 6.6. Cost Model for “Groupby-After-Join” Query Processing 159 6.6.1. Cost Models for the Join Partitioning Scheme 159 6.6.2. Cost Models for the GroupBy Partitioning Scheme 161 6.7. Summary 163 6.8. Bibliographical Notes 164 6.9. Exercises 164 7. Parallel Indexing 167 7.1. Parallel Indexing–an Internal Perspective on Parallel Indexing Structures 168 7.2. Parallel Indexing Structures 169 7.2.1. Nonreplicated Indexing (NRI) Structures 169 7.2.2. Partially Replicated Indexing (PRI) Structures 171 7.2.3. Fully Replicated Indexing (FRI) Structures 178 7.3. Index Maintenance 180 7.3.1. Maintaining a Parallel Nonreplicated Index 182 7.3.2. Maintaining a Parallel Partially Replicated Index 182 7.3.3. Maintaining a Parallel Fully Replicated Index 188 7.3.4. Complexity Degree of Index Maintenance 188 7.4. Index Storage Analysis 188 7.4.1. Storage Cost Models for Uniprocessors 189 7.4.2. Storage Cost Models for Parallel Processors 191 7.5. Parallel Processing of Search Queries using Index 192 7.5.1. Parallel One-Index Search Query Processing 192 7.5.2. Parallel Multi-Index Search Query Processing 195 7.6. Parallel Index Join Algorithms 200 7.6.1. Parallel One-Index Join 200 7.6.2. Parallel Two-Index Join 203 7.7. Comparative Analysis 207 7.7.1. Comparative Analysis of Parallel Search Index 207 7.7.2. Comparative Analysis of Parallel Index Join 213 7.8. Summary 216 7.9. Bibliographical Notes 217 7.10. Exercises 217 8. Parallel Universal Qualification—Collection Join Queries 219 8.1. Universal Quantification and Collection Join 220 8.2. Collection Types and Collection Join Queries 222 8.2.1. Collection-Equi Join Queries 222 8.2.2. Collection–Intersect Join Queries 223 8.2.3. Subcollection Join Queries 224 8.3. Parallel Algorithms for Collection Join Queries 225 8.4. Parallel Collection-Equi Join Algorithms 225 8.4.1. Disjoint Data Partitioning 226 8.4.2. Parallel Double Sort-Merge Collection-Equi Join Algorithm 227 8.4.3. Parallel Sort-Hash Collection-Equi Join Algorithm 228 8.4.4. Parallel Hash Collection-Equi Join Algorithm 232 8.5. Parallel Collection-Intersect Join Algorithms 233 8.5.1. Non-Disjoint Data Partitioning 234 8.5.2. Parallel Sort-Merge Nested-Loop Collection-Intersect Join Algorithm 244 8.5.3. Parallel Sort-Hash Collection-Intersect Join Algorithm 245 8.5.4. Parallel Hash Collection-Intersect Join Algorithm 246 8.6. Parallel Subcollection Join Algorithms 246 8.6.1. Data Partitioning 247 8.6.2. Parallel Sort-Merge Nested-Loop Subcollection Join Algorithm 248 8.6.3. Parallel Sort-Hash Subcollection Join Algorithm 249 8.6.4. Parallel Hash Subcollection Join Algorithm 251 8.7. Summary 252 8.8. Bibliographical Notes 252 8.9. Exercises 254 9. Parallel Query Scheduling and Optimization 256 9.1. Query Execution Plan 257 9.2. Subqueries Execution Scheduling Strategies 259 9.2.1. Serial Execution Among Subqueries 259 9.2.2. Parallel Execution Among Subqueries 261 9.3. Serial vs. Parallel Execution Scheduling 264 9.3.1. Nonskewed Subqueries 264 9.3.2. Skewed Subqueries 265 9.3.3. Skewed and Nonskewed Subqueries 267 9.4. Scheduling Rules 269 9.5. Cluster Query Processing Model 270 9.5.1. Overview of Dynamic Query Processing 271 9.5.2. A Cluster Query Processing Architecture 272 9.5.3. Load Information Exchange 273 9.6. Dynamic Cluster Query Optimization 275 9.6.1. Correction 276 9.6.2. Migration 280 9.6.3. Partition 281 9.7. Other Approaches to Dynamic Query Optimization 284 9.8. Summary 285 9.9. Bibliographical Notes 286 9.10. Exercises 286 Part IV Grid Databases 10. Transactions in Distributed and Grid Databases 291 10.1. Grid Database Challenges 292 10.2. Distributed Database Systems and Multidatabase Systems 293 10.2.1. Distributed Database Systems 293 10.2.2. Multidatabase Systems 297 10.3. Basic Definitions on Transaction Management 299 10.4. Acid Properties of Transactions 301 10.5. Transaction Management in Various Database Systems 303 10.5.1. Transaction Management in Centralized and Homogeneous Distributed Database Systems 303 10.5.2. Transaction Management in Heterogeneous Distributed Database Systems 305 10.6. Requirements in Grid Database Systems 307 10.7. Concurrency Control Protocols 309 10.8. Atomic Commit Protocols 310 10.8.1. Homogeneous Distributed Database Systems 310 10.8.2. Heterogeneous Distributed Database Systems 313 10.9. Replica Synchronization Protocols 314 10.9.1. Network Partitioning 315 10.9.2. Replica Synchronization Protocols 316 10.10. Summary 318 10.11. Bibliographical Notes 318 10.12. Exercises 319 11. Grid Concurrency Control 321 11.1. A Grid Database Environment 321 11.2. An Example 322 11.3. Grid Concurrency Control 324 11.3.1. Basic Functions Required by GCC 324 11.3.2. Grid Serializability Theorem 325 11.3.3. Grid Concurrency Control Protocol 329 11.3.4. Revisiting the Earlier Example 333 11.3.5. Comparison with Traditional Concurrency Control Protocols 334 11.4. Correctness of GCC Protocol 336 11.5. Features of GCC Protocol 338 11.6. Summary 339 11.7. Bibliographical Notes 339 11.8. Exercises 339 12. Grid Transaction Atomicity and Durability 341 12.1. Motivation 342 12.2. Grid Atomic Commit Protocol (Grid-ACP) 343 12.2.1. State Diagram of Grid-ACP 343 12.2.2. Grid-ACP Algorithm 344 12.2.3. Early-Abort Grid-ACP 346 12.2.4. Discussion 348 12.2.5. Message and Time Complexity Comparison Analysis 349 12.2.6. Correctness of Grid-ACP 350 12.3. Handling Failure of Sites with Grid-ACP 351 12.3.1. Model for Storing Log Files at the Originator and Participating Sites 351 12.3.2. Logs Required at the Originator Site 352 12.3.3. Logs Required at the Participant Site 353 12.3.4. Failure Recovery Algorithm for Grid-ACP 353 12.3.5. Comparison of Recovery Protocols 359 12.3.6. Correctness of Recovery Algorithm 361 12.4. Summary 365 12.5. Bibliographical Notes 366 12.6. Exercises 366 13. Replica Management in Grids 367 13.1. Motivation 367 13.2. Replica Architecture 368 13.2.1. High-Level Replica Management Architecture 368 13.2.2. Some Problems 369 13.3. Grid Replica Access Protocol (GRAP) 371 13.3.1. Read Transaction Operation for GRAP 371 13.3.2. Write Transaction Operation for GRAP 372 13.3.3. Revisiting the Example Problem 375 13.3.4. Correctness of GRAP 377 13.4. Handling Multiple Partitioning 378 13.4.1. Contingency GRAP 378 13.4.2. Comparison of Replica Management Protocols 381 13.4.3. Correctness of Contingency GRAP 383 13.5. Summary 384 13.6. Bibliographical Notes 385 13.7. Exercises 385 14. Grid Atomic Commitment in Replicated Data 387 14.1. Motivation 388 14.1.1. Architectural Reasons 388 14.1.2. Motivating Example 388 14.2. Modified Grid Atomic Commitment Protocol 390 14.2.1. Modified Grid-ACP 390 14.2.2. Correctness of Modified Grid-ACP 393 14.3. Transaction Properties in Replicated Environment 395 14.4. Summary 397 14.5. Bibliographical Notes 397 14.6. Exercises 398 Part V Other Data-Intensive Applications 15. Parallel Online Analytic Processing (OLAP) and Business Intelligence 401 15.1. Parallel Multidimensional Analysis 402 15.2. Parallelization of ROLLUP Queries 405 15.2.1. Analysis of Basic Single ROLLUP Queries 405 15.2.2. Analysis of Multiple ROLLUP Queries 409 15.2.3. Analysis of Partial ROLLUP Queries 411 15.2.4. Parallelization Without Using ROLLUP 412 15.3. Parallelization of CUBE Queries 412 15.3.1. Analysis of Basic CUBE Queries 413 15.3.2. Analysis of Partial CUBE Queries 416 15.3.3. Parallelization Without Using CUBE 417 15.4. Parallelization of Top-N and Ranking Queries 418 15.5. Parallelization of Cume_Dist Queries 419 15.6. Parallelization of NTILE and Histogram Queries 420 15.7. Parallelization of Moving Average and Windowing Queries 422 15.8. Summary 424 15.9. Bibliographical Notes 424 15.10. Exercises 425 16. Parallel Data Mining—Association Rules and Sequential Patterns 427 16.1. From Databases To Data Warehousing To Data Mining: A Journey 428 16.2. Data Mining: A Brief Overview 431 16.2.1. Data Mining Tasks 431 16.2.2. Querying vs. Mining 433 16.2.3. Parallelism in Data Mining 436 16.3. Parallel Association Rules 440 16.3.1. Association Rules: Concepts 441 16.3.2. Association Rules: Processes 444 16.3.3. Association Rules: Parallel Processing 448 16.4. Parallel Sequential Patterns 450 16.4.1. Sequential Patterns: Concepts 452 16.4.2. Sequential Patterns: Processes 456 16.4.3. Sequential Patterns: Parallel Processing 459 16.5. Summary 461 16.6. Bibliographical Notes 461 16.7. Exercises 462 17. Parallel Clustering and Classification 464 17.1. Clustering and Classification 464 17.1.1. Clustering 464 17.1.2. Classification 465 17.2. Parallel Clustering 467 17.2.1. Clustering: Concepts 467 17.2.2. k-Means Algorithm 468 17.2.3. Parallel k-Means Clustering 471 17.3. Parallel Classification 477 17.3.1. Decision Tree Classification: Structures 477 17.3.2. Decision Tree Classification: Processes 480 17.3.3. Decision Tree Classification: Parallel Processing 488 17.4. Summary 495 17.5. Bibliographical Notes 498 17.6. Exercises 498 Permissions 501 List of Conferences and Journals 507 Bibliography 511 Index 541
£140.35
Wiley-VCH Verlag GmbH Reviews in Computational Chemistry Volume 24
Book SynopsisReviews In Computational Chemistry Martin Schoen and Sabine Klapp Kenny B. Lipkowitz and Thomas Cundari, Series Editors This volume, unlike those prior to it, consists of a single monograph covering the timely topic of confined fluids. Volume 24 features the thermodynamics of confined phases, elements of statistical thermodynamics, one-dimensional hard-rod fluids, mean-field theory, treatments of confined fluids with short-range and long-range interactions, and the statistical mechanics of disordered confined fluids. Six appendices are included, which cover the mathematical derivation of equations used throughout the book. From Reviews Of The Series Reviews in Computational Chemistry remains the most valuable reference to methods and techniques in computational chemistry. -Journal Of Molecular Graphics And Modelling One cannot generally do better than to try to find an appropriate article in the highly
£204.26
John Wiley & Sons Inc Wiley Pathways Introduction to Database
Book SynopsisYou can get there Introduction to Databases Project Manual offers a wealth of easy-to-read, practical, up-to-date activities that reinforce fundamental database design and management concepts. You''ll also learn to develop the core competencies and skills you''ll need in the real world, such as how to: * Install SQL Server 2005 * Read and create an ERD * Design and implement a database * Use DDL and DML commands * Use and monitor transactions * Manage security principles, permissions, and backups * Design data environments * Use replication With five to seven projects per chapter ranging from easy to more advanced, Introduction to Databases Project Manual is ideal for both traditional and online courses that are oriented toward strengthening database management skills. Introduction to Databases Project Manual is an excellent companion to Gillenson''s Introduction to Databases (ISBN: 978-0-470-10186-5Table of Contents1 Introduction to Data and Data Management 1.1 Identifying Business Data 2 1.2 Identifying Human Data Sources 4 1.3 Installing SQL Server 2005 Evaluation Edition 5 1.4 Learning about SQL Server Management Studio 12 1.5 Identifying Key Management Areas 19 2 Introducing Databases and Database Management Systems 2.1 Comparing Database Models 21 2.2 Identifying DBMS Architecture and Components 23 2.3 Reviewing Server Hardware Resources 24 2.4 Investigating SQL Server Databases 32 2.5 Identifying Application Requirements 35 3 Data Modeling 3.1 Understanding Data Modeling Concepts 39 3.2 Recognizing Entities, Attributes, and Identifiers 40 3.3 Recognizing Relationships and Business Rules 42 3.4 Reading an ERD 45 3.5 Creating an ERD 47 3.6 Viewing Basic Database Objects 50 4 Designing a Database 4.1 Understanding Key Concepts 59 4.2 Converting Relationships 60 4.3 Reviewing a Normalized Database 65 4.4 Recognizing Normalization Errors 69 4.5 Normalizing Data 73 5 Implementing a Database 5.1 Understanding Terms and Concepts 78 5.2 Identifying Solution Requirements 79 5.3 Creating a Database 84 5.4 Creating Tables, Part 1 88 5.5 Setting Table Constraints 91 5.6 Creating Tables, Part 2 96 6 Understanding the SQL Language 6.1 Understanding Terms and Concepts 102 6.2 Identifying Help Resources 104 6.3 Comparing Command Environments 111 6.4 Using the SELECT Command 116 6.5 Using DDL Commands 121 6.6 Using DML Commands 126 7 Data Access and Manipulation 7.1 Understanding Data Access 132 7.2 Retrieving Data 133 7.3 Using Advanced Data Retrieval 138 7.4 Using Batches and Scripts 141 7.5 Recognizing and Correcting Syntax Errors 144 8 Improving Data Access 8.1 Understanding Database Monitoring and Optimization 149 8.2 Investigating Resources and Configuration Settings 151 8.3 Monitoring Performance 163 8.4 Recognizing Bottlenecks 172 8.5 Using Indexes and Views 175 8.6 Using Procedures and Functions 179 9 Database Administration 9.1 Understanding Administration 184 9.2 Understanding Roles and Responsibilities 186 9.3 Matching Life Cycle Requirements 188 9.4 Resolving Administration Issues 190 9.5 Managing "As-Needed" and Periodic Tasks 196 10 Transactions and Locking 10.1 Understanding Transactions and Locking 210 10.2 Understanding Transaction Types 212 10.3 Understanding Transaction Isolation and Locking 219 10.4 Using Transactions 226 10.5 Monitoring Transactions and Clearing Blocked Transactions 231 11 Data Access and Security 11.1 Understanding Data Access and Security 236 11.2 Designing for Access and Security 238 11.3 Understanding Your Security Environment 242 11.4 Managing Security Principals 249 11.5 Managing Permissions 255 11.6 Managing Backups 263 12 Supporting Database Applications 12.1 Understanding Data Configurations 267 12.2 Designing Data Environments 269 12.3 Working in a Distributed Environment 277 12.4 Using Distributed Queries 284 12.5 Using Replication 291 12.6 Understanding Data Issues 299
£37.35
John Wiley & Sons Inc Applied Cryptanalysis
Book SynopsisThe book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.Trade Review"…a very good book for students and people who want to learn some real cryptanalysis…" (Computing Reviews.com, October 1, 2007) "…this is not a book to be merely read or studied, but a field manual to be followed." (Computing Reviews.com, August 14, 2007)Table of ContentsPreface. About The Authors . Acknowledgments. 1. Classic Ciphers. 1.1 Introduction . 1.2 Good Guys and Bad Guys. 1.3 Terminology . 1.4 Selected Classic Crypto Topics. 1.4.1 Transposition Ciphers . 1.4.2 Substitution Ciphers. 1.4.3 One-Time Pad . 1.4.4 Codebook Ciphers . 1.5 Summary. 1.6 Problems . 2. World War II Ciphers. 2.1 Introduction . 2.2 Enigma . 2.2.1 Enigma Cipher Machine . 2.2.2 Enigma Keyspace . 2.2.3 Rotors . 2.2.4 Enigma Attack . 2.2.5 More Secure Enigma. 2.3 Purple. 2.3.1 Purple Cipher Machine . 2.3.2 Purple Keyspace . 2.3.3 Purple Diagnosis . 2.3.4 Decrypting Purple. 2.3.5 Purple versus Enigma . 2.4 Sigaba . 2.4.1 Sigaba Cipher Machine. 2.4.2 Sigaba Keyspace . 2.4.3 Sigaba Attack . 2.4.4 Sigaba Conclusion . 2.5 Summary . 2.6 Problems . 3. Stream Ciphers. 3.1 Introduction . 3.2 Shift Registers . 3.2.1 Berlekamp-Massey Algorithm . 3.2.2 Cryptographically Strong Sequences . 3.2.3 Shift Register-Based Stream Ciphers. 3.2.4 Correlation Attack. 3.3 ORYX . 3.3.1 ORYX Cipher. 3.3.2 ORYX Attack. 3.3.3 Secure ORYX. 3.4 RC4. 3.4.1 RC4 Algorithm . 3.4.2 RC4 Attack . 3.4.3 Preventing the RC4 Attack. 3.5 PKZIP. 3.5.1 PKZIP Cipher. 3.5.2 PKZIP Attack. 3.5.3 Improved PKZIP. 3.6 Summary. 3.7 Problems. 4. Block Ciphers. 4.1 Introduction . 4.2 Block Cipher Modes . 4.3 Feistel Cipher. 4.4 Hellman’s Time-Memory Trade-Off. 4.4.1 Cryptanalytic TMTO. 4.4.2 Bad Chains. 4.4.3 Success Probability. 4.4.4 Distributed TMTO. 4.4.5 TMTO Conclusions. 4.5 CMEA. 4.5.1 CMEA Cipher. 4.5.2 SCMEA Cipher. 4.5.3 SCMEA Chosen Plaintext Attack. 4.5.4 CMEA Chosen Plaintext Attack. 4.5.5 SCMEA Known Plaintext Attack. 4.5.6 CMEA Known Plaintext Attack. 4.5.7 More Secure CMEA. 4.6 Akelarre . 4.6.1 Akelarre Cipher. 4.6.2 Akelarre Attack. 4.6.3 Improved Akelarre? 4.7 FEAL . 4.7.1 FEAL-4 Cipher. 4.7.2 FEAL-4 Differential Attack. 4.7.3 FEAL-4 Linear Attack. 4.7.4 Confusion and Diffusion. 4.8 Summary. 4.9 Problems. 5. Hash Functions. 5.1 Introduction . 5.2 Birthdays and Hashing. 5.2.1 The Birthday Problem. 5.2.2 Birthday Attacks on Hash Functions. 5.2.3 Digital Signature Birthday Attack. 5.2.4 Nostradamus Attack. 5.3 MD4. 5.3.1 MD4 Algorithm. 5.3.2 MD4 Attack. 5.3.3 A Meaningful Collision . 5.4 MD5 . 5.4.1 MD5 Algorithm. 5.4.2 A Precise Differential. 5.4.3 Outline of Wang?s Attack. 5.4.4 Wang’s MD5 Differentials. 5.4.5 Reverse Engineering Wang’s Attack. 5.4.6 Stevens’ Attack. 5.4.7 A Practical Attack. 5.5 Summary. 5.6 Problems. 6. Public Key Systems. 6.1 Introduction . 6.2 Merkle-Hellman Knapsack. 6.2.1 Lattice-Reduction Attack . 6.2.2 Knapsack Conclusion. 6.3 Diffie-Hellman Key Exchange . 6.3.1 Man-in-the-Middle Attack . 6.3.2 Diffie-Hellman Conclusion . 6.4 Arithmetica Key Exchange . 6.4.1 Hughes-Tannenbaum Length Attack . 6.4.2 Arithmetica Conclusion . 6.5 RSA . 6.5.1 Mathematical Issues . 6.5.2 RSA Conclusion . 6.6 Rabin Cipher . 6.6.1 Chosen Ciphertext Attack. 6.6.2 Rabin Cryptosystem Conclusion . 6.7 NTRU Cipher . 6.7.1 Meet-in-the-Middle Attack. 6.7.2 Multiple Transmission Attack. 6.7.3 Chosen Ciphertext Attack. 6.7.4 NTRU Conclusion . 6.8 ElGamal Signature Scheme . 6.8.1 Mathematical Issues. 6.8.2 ElGamal Signature Conclusion . 6.9 Summary . 6.10 Problems. 7. Public Key Attacks. 7.1 Introduction . 7.2 Factoring Algorithms . 7.2.1 Trial Division . 7.2.2 Dixon’s Algorithm . 7.2.3 Quadratic Sieve. 7.2.4 Factoring Conclusions. 7.3 Discrete Log Algorithms. 7.3.1 Trial Multiplication . 7.3.2 Baby-Step Giant-Step. 7.3.3 Index Calculus. 7.3.4 Discrete Log Conclusions. 7.4 RSA Implementation Attacks. 7.4.1 Timing Attacks . 7.4.2 Glitching Attack. 7.4.3 Implementation Attacks Conclusions . 7.5 Summary . 7.6 Problems. Appendix . A-1 MD5 Tables . A-2 Math . A-2.1 Number Theory . A-2.2 Group Theory . A-2.3 Ring Theory . A-2.4 Linear Algebra. Annotated Bibliography. Index.
£95.36
John Wiley & Sons Inc Dreamweaver CS3 For Dummies
Book SynopsisDo you want to create a sophisticated Web site that's easy to develop and maintain? Whether you're a beginner or an experienced Web developer, this guide shows you how to utilize Dreamweaver's enhancements to build and manage state-of-the-art, professional Web sites quickly and easily.Table of ContentsIntroduction. Part I: Creating Great Web Sites. Chapter 1: The Many Ways to Design a Web Page. Chapter 2: Opening and Creating Sites in Dreamweaver. Chapter 3: Adding Graphics. Chapter 4: Managing, Testing, and Publishing a Site. Part II: Appreciating Web Design Options. Chapter 5: Cascading Style Sheets. Chapter 6: Creating CSS Layouts. Chapter 7: Coming to the HTML Table. Chapter 8: Framing Your Pages. Chapter 9: Coordinating Your Design Work. Part III: Making It Cool with Multimedia and JavaScript. Chapter 10: Adding Interactivity with Behaviors. Chapter 11: Showing Off with Multimedia. Chapter 12: Forms Follow Function. Part IV: Working with Dynamic Content. Chapter 13: Building a Dynamic Web Site: Getting Started. Chapter 14: Bringing Data into the Mix. Chapter 15: Using Forms to Manage Your Dynamic Web Site. Part V: The Part of Tens. Chapter 16: Ten Resources You May Need. Chapter 17: Ten Timesaving Tips. Chapter 18: Ten Great Web Sites Designed in Dreamweaver. Index.
£13.59
John Wiley & Sons Inc Microsoft Expression Web For Dummies
Book SynopsisCovers tools for beginners and Web design pros Create and maintain dynamic Web sites that express your personality! Expression Web is Microsoft's latest program for designing attractive, easy-to-navigate Web sites. Design beginners will love this book's plain-English explanations on how to set up a new site and create Web pages.Table of ContentsIntroduction. Part I: Getting Started with Expression Web. Chapter 1: Creating a Web Site with Expression Web. Chapter 2: Working with Web Pages. Part II: Coaxing Content onto the Page. Chapter 3: Just the Text, Ma’am. Chapter 4: Getting Around with Hyperlinks. Chapter 5: Graphically Speaking. Chapter 6: Forms for Any Purpose. Part III: Great Design Doesn’t Have to Be Difficult. Chapter 7: Using Styles to Gussy Up Your Content. Chapter 8: Putting Page Elements in Their Place. Chapter 9: External Style Sheets and CSS Code. Chapter 10: Tables for Data (And Layout, If You Must). Chapter 11: Streamlining Sites with Dynamic Web Templates. Part IV: Going Live and Keeping House. Chapter 12: Making Your Worldwide Debut. Chapter 13: Web Site Management. Chapter 14: Getting Cozy with Code. Part V: The Part of Tens. Chapter 15: Ten Cool Gizmos for Your Web Site. Chapter 16: Ten Essential Resources for Web Designers. Bonus Online Material. Chapter 17: Ten Ways to Make Your Web Site Better, Even Before You Begin. Chapter 18: Ten Ways to Drag a Site Out of the Stone Age. Index.
£21.59
John Wiley & Sons Inc Home Networking For Dummies 4th Edition For
Book SynopsisHaving a network in your home increases work efficiency and minimizes confusion. If you want to set up a network in your home but you're not quite sure where to start, then Home Networking for Dummies makes it easy for you to become your household's network administrator.Table of ContentsIntroduction 1 Part I: Network Basics 7 Chapter 1: Planning the Lay of the LAN 9 Chapter 2: Installing Network Adapters 27 Chapter 3: Installing Ethernet Cable 35 Chapter 4: Using Wires That Are Already There 53 Chapter 5: Look Ma, No Wires 69 Part II: Configuring Computers for Networking 85 Chapter 6: Putting It All Together 87 Chapter 7: Configuring Computer Sharing 113 Chapter 8: Setting Up Users 127 Part III: Communicating Across the Network 139 Chapter 9: Printing Across the Network 141 Chapter 10: Getting Around the Neighborhood 165 Chapter 11: Using Files from Other Computers 183 Part IV: Network Security and Maintenance 203 Chapter 12: Making Your Network Secure 205 Chapter 13: Disaster Planning and Recovery 235 Chapter 14: Using Windows Maintenance Tools 257 Part V: The Part of Tens 283 Chapter 15: Ten Clever Things to Do on Your Network 285 Chapter 16: Ten Fun Things to Do on Your Network 301 Chapter 17: Ten Ways to Make the Internet Safe for Children 307 Index 321
£16.99
John Wiley & Sons Inc Connections
Book SynopsisIn their fascinating analysis of the recent history of information technology, H. Peter Alesso and Craig F. Smith reveal the patterns in discovery and innovation that have brought us to the present tipping point. . . . A generation from now, every individual will have personally tailored access to the whole of knowledge . . . the sooner we all begin to think about how we got here, and where we''re going, the better. This exciting book is an essential first step. From the Foreword by James Burke Many people envision scientists as dispassionate characters who slavishly repeat experiments until eurekasomething unexpected happens. Actually, there is a great deal more to the story of scientific discovery, but seeing the big picture is not easy. Connections: Patterns of Discovery uses the primary tools of forecasting and three archetypal patterns of discoverySerendipity, Proof of Principle, and 1% Inspiration and 99% Perspirationto discern relationships of past develoTable of ContentsForeword. Introduction. Acknowledgements. Organization of this Book. Chapter 1: Connecting Information. The Google Story. Information Revolution. Defining Information. Looking Good. Google Connects Information. Patterns of Discovery. Forecast for Connecting Information. Chapter 2: Connecting Circuits. The Moore' Law Story. Edison's Electric Light. The Vacuum Tube Diode. The First Programmable Computers. ENIAC. The Transistor. How Transistors Work. The Proof of Principle for the Transistor. The Microprocessor. How Microprocessors Work. Moore's law. Patterns of Discovery. Forecast for Connecting Circuits . Chapter 3: Connecting Chips. The Personal Computer Story. Vannevar Bush. Robert Taylor. J.C.R. Licklider. Alan Kay. Butler Lampson. Charles (Chuck) Thacker. Personal Computing. The Xerox Alto. Apple Computer. IBM PC. Patterns of Discovery. Forecast for Connecting Chips. Chapter 4: Connecting Processes. The Software Story. John Von Neumann. Claude Shannon. The Evolution of Programming Languages. Sir Charles Antony Richard (Tony) Hoare. Software as an Industry. Software Productivity. Fourth Generation Languages. Proprietary versus Open Standards. Emergent Fifth Generation Languages (5GLs). Charles Simonyi. William H. Gates. Linus Torvalds. Patterns of Discovery. Forecast for Connecting Processes. Chapter 5: Connecting Machines. The Ethernet Story. Xerox PARC and Ethernet. Robert Metcalf. Patterns of Discovery. Forecast for Connecting Machines. Chapter 6: Connecting Networks. The Internet Story. Vint Cerf. Transition to the World Wide Web. Berners-Lee. Patterns of Discovery. Forecast for Connecting Machines. Chapter 7: Connecting Devices. The Ubiquitous Computing Story. Ubiquitous Computing. Mark Weiser. Jeff Hawkins. Patterns of Discovery. Forecast for Connecting Devices. Chapter 8: Connecting the Web. The Ubiquitous Web Story. Michael Dertouzos. Project Oxygen. Perfect Search. Berners-Lee and the Semantic Web. Patterns of Discovery. Forecast for Connecting the Web. Chapter 9: Connecting the Intelligence. The Ubiquitous Intelligence Story. Kurt Gödel. Alan Turing. Marvin Minsky. Ubiquitous Intelligence . The Web 'Brain'. What is Web Intelligence? Patterns of Discovery. Forecast for Connecting Intelligence. Chapter 10: Connecting Patterns. Ray Kurzweil. Evolving Complex Intelligence. The Law of Accelerating Returns. Singularities. The Software of Intelligence. Patterns. Connecting Pattern. Patterns of Discovery. Forecasts for Connecting Patterns. Epilog. Bibliography. Glossary. Index.
£62.06
John Wiley & Sons Inc Flash CS3 For Dummies For Dummies
Book SynopsisPack pizzazz into your Web sites with Flash! Start with simple animation, or create whole pages in Flash The newest version of Flash offers all sorts of cool options for designing Web sites that stand out from the crowd, and this handy guide makes it easy.Table of ContentsIntroduction. Part I: A Blast of Flash. Chapter 1: Getting Acquainted with Flash CS3. Chapter 2: Your Basic Flash. Part II: 1,000 Pictures and 1,000 Words. Chapter 3: Getting Graphic. Chapter 4: You Are the Object Editor. Chapter 5: What’s Your Type? Chapter 6: Layering It On. Part III: Getting Symbolic. Chapter 7: Heavy Symbolism. Chapter 8: Pushing Buttons. Part IV: Total Flash-o-Rama. Chapter 9: Getting Animated. Chapter 10: Getting Interactive. Chapter 11: Extravagant Audio, High-Velocity Video. Part V: The Movie and the Web. Chapter 12: Putting It All Together. Chapter 13: Publishing Your Flash Files. Part VI: The Part of Tens. Chapter 14: Ten Frequently Asked Questions. Chapter 15: Ten Best Flash Resources. Chapter 16: Ten Flash Designers to Watch. Part VII: Appendixes. Appendix A: Installing Flash and Setting Your Preferences. Appendix B: The Property Inspector and the Panels. Appendix C: What’s on the Companion Web Site. Index.
£19.99
John Wiley & Sons Inc Puzzles for Programmers and Pros
Book SynopsisPuzzles for Programmers and Pros.Table of ContentsAcknowledgments v Introduction xi Part I: Mind Games 1 We can't all be winners. 3 Sweet Tooth 4 Byzantine Bettors 6 A Touch of Luck 8 Information Gain 10 Reach for the Sky! 12 Pork Politics 14 Social Games 15 Escape Management 19 Flu Math 21 Imagination rules... 23 Whipping Ice 24 Optimal Jargon 29 Using Your Marbles 31 Flipping Colors 33 Scheduling Tradition 34 Fractal Biology 35 As Easy as Pie 37 Getting on the right side of luck 41 Lucky Roulette 42 Legal Logic 44 The Box Chip Game 47 Feedback Dividends 49 What are you thinking? 53 Number Clues 54 Mind Games 56 Refuse and Reveal 59 A Biting Maze 61 Mad Mix 63 Doing more with less 65 Dig That! 66 Preferential Romance 68 No Change for the Holidays 71 Quiet in the Depths 73 Solutions 74 Solution to Sweet Tooth 74 Solution to Byzantine Bettors 74 Solution to A Touch of Luck 76 Solution to Information Gain 78 Solution to Reach for the Sky! 78 Solution to Pork Politics 79 Solution to Social Games 80 Solution to Escape Management 81 Solution to Flu Math 83 Solution to Whipping Ice 84 Solution to Optimal Jargon 86 Solution to Using Your Marbles 88 Solution to Flipping Colors 89 Solution to Scheduling Tradition 90 Solution to Fractal Biology 91 Solution to As Easy as Pie 94 Solution to Lucky Roulette 96 Solution to Legal Logic 96 Solution to The Box Chip Game 97 Solution to Feedback Dividends 102 Solution to Number Clues 103 Solution to Mind Games 104 Solution to Refuse and Reveal 108 Solution to A Biting Maze 110 Solution to Mad Mix 112 Solution to Dig That! 113 Solution to Preferential Romance 116 Solution to No Change for the Holidays 117 Solution to Quiet in the Depths 118 Part II: The Secret of the Puzzle 121 Order the Ages 126 Urban Planning 128 Solution to Urban Planning 129 Finding a Schedule That Works 131 Solution to Finding a Schedule That Works 132 Picturing the Treasure 133 Solution to Picturing the Treasure 135 Sudoku 138 Solution to Sudoku 146 Number Encoding 147 Solution to Number Encoding 149 Selective Greed 150 Solution to Selective Greed 155 Sweet Packs 156 Solution to Sweet Packs 158 Revisiting a Traveling Salesman 159 Solution to Revisiting a Traveling Salesman 163 Overloaded Scheduling and Freezing Crystals 164 Solution to Overloaded Scheduling and Freezing Crystals 170 Wordsnakes 171 Solution to Wordsnakes 173 Maximal Friends 174 Solution to Maximal Friends 176 Winning at the Slots 177 Solution to Winning at the Slots 179 Understanding Dice 181 Solution to Understanding Dice 183 Bait and Switch 184 Solution to Bait and Switch 186 Part III: Faithful Foes 189 Index 221
£13.59
John Wiley & Sons Inc Actionable Web Analytics Using Data to Make Smart
Book SynopsisKnowing everything you can about each click to your Web site can help you make strategic decisions regarding your business. This book is about the why, not just the how, of web analytics and the rules for developing a "culture of analysis" inside your organization. Why you should collect various types of data. Why you need a strategy.Table of ContentsForeword xv Introduction xxvii Part I The Changing Landscape of Marketing Online 1 Chapter 1 The Big Picture 3 New Marketing Trends 4 The Consumer Revolution 5 The Shift from Offline to Online Marketing 8 Instant Brand Building (and Destruction) 10 Rich Media and Infinite Variety 12 The Analysis Mandate 13 ROI Marketing 14 Innovation 15 Some Final Thoughts 16 Chapter 2 Performance Marketing 17 Data vs. Design 18 Web Design Today 18 The Web Award Fallacy 19 When Visual Design Goes Wrong 19 Where Data Goes Wrong 21 Performance-Driven Design: Balancing Logic and Creativity 22 Case Study: Dealing with Star Power 23 Case Study: Forget Marketing at All 24 Recap 25 Part II Shifting to a Culture of Analysis 27 Chapter 3 What “Culture of Analysis” Means 29 What Is a Data-Driven Organization? 30 Data-Driven Decision Making 31 Dynamic Prioritization 32 Perking Up Interest in Web Analytics 34 Establishing a Web Analytics Steering Committee 34 Starting Out Small with a Win 35 Empowering Your Employees 36 Managing Up 36 Impact on Roles beyond the Analytics Team 37 Cross-Channel Implications 40 Questionnaire: Rating Your Level of Data Drive 41 Recap 42 Chapter 4 Avoiding Stumbling Points 43 Do You Need an Analytics Intervention? 44 Analytics Intervention Step 1: Admitting the Problem 44 Analytics Intervention Step 2: Admit That You Are the Problem 46 Analytics Intervention Step 3: Agree That This Is a Corporate Problem 47 The Road to Recovery: Overcoming Real Gaps 48 Issue #1: Lack of Established Processes and Methodology 49 Issue #2: Failure to Establish Proper KPIs and Metrics 49 Issue #3: Data Inaccuracy 50 Issue #4: Data Overload 52 Issue #5: Inability to Monetize the Impact of Changes 53 Issue #6: Inability to Prioritize Opportunities 54 Issue #7: Limited Access to Data 54 Issue #8: Inadequate Data Integration 55 Issue #9: Starting Too Big 56 Issue #10: Failure to Tie Goals to KPIs 57 Issue #11: No Plan for Acting on Insight 58 Issue #12: Lack of Committed Individual and Executive Support 58 Recap 59 Part III Proven Formula for Success 61 Chapter 5 Preparing to Be Data-Driven 63 Web Analytics Methodology 64 The Four Steps of Web Analytics 65 Defining Business Metrics (KPIs) 65 Reports 66 Analysis 67 Optimization and Action 67 Results and Starting Again 68 Recap 68 Chapter 6 Defining Site Goals, KPIs, and Key Metrics 71 Defining Overall Business Goals 72 Defining Site Goals: The Conversion Funnel 73 Awareness 73 Interest 73 Consideration 74 Purchase 74 Website Goals and the Marketing Funnel 74 Understanding Key Performance Indicators (KPIs) 75 Constructing KPIs 76 Creating Targets for KPIs 79 Common KPIs for Different Site Types 80 E-Commerce 80 Lead Generation 82 Customer Service 83 Content Sites 85 Branding Sites 87 Recap 88 Chapter 7 Monetizing Site Behaviors 89 The Monetization Challenge 90 Case Study: Monetization and Motivation 90 Web-Monetization Models 93 Top 10 Ways Monetization Models Can Help Your Company 94 How to Create Monetization Models 95 Assembling a Monetization Model 97 Monetization Models for Different Site Types and Behaviors 100 E-Commerce Opportunity 100 Lead Generation 102 Customer Service 104 Ad-Supported Content Sites 106 Recap 108 Chapter 8 Getting the Right Data 109 Primary Data Types 110 Warning: Avoid Data Smog 110 Behavioral Data 111 Attitudinal Data 112 Balancing Behavioral and Attitudinal Data 112 Competitive Data 113 Secondary Data Types 116 Customer Interaction and Data 116 Third-Party Research 117 Usability Benchmarking 117 Heuristic Evaluation and Expert Reviews 118 Community Sourced Data 119 Leveraging These Data Types 120 Comparing Performance with Others 120 What Is a Relative Index? 122 Examples of Relative Indices 122 Customer Engagement 123 Methodology: Leveraging Indices across Your Organization 124 Case Study: Leveraging Different Data Types to Improve Site Performance 126 Recap 128 Chapter 9 Analyzing Site Performance 129 Analysis vs. Reporting 130 Don’t Blame Your Tools 131 Examples of Analysis 132 Analyzing Purchasing Processes to Find Opportunities 132 Analyzing Lead Processes to Find Opportunities 135 Understanding What Onsite Search Is Telling You 136 Evaluating the Effectiveness of Your Home Page 138 Evaluating the Effectiveness of Branding Content: Branding Metrics 138 Evaluating the Effectiveness of Campaign Landing Pages 140 Segmenting Traffic to Identify Behavioral Differences 142 Segmenting Your Audience 142 Case Study: Segmenting for a Financial Services Provider 143 Analyzing Drivers to Offline Conversion 144 Tracking Online Partner Handoffs and Brick-And-Mortar Referrals 144 Tracking Offline Handoffs to Sales Reps 144 Tracking Visitors to a Call Center 145 Delayed Conversion 146 Tracking Delayed Conversion 146 Reporting in a Timely Manner 147 Recap 147 Chapter 10 Prioritizing 149 How We Prioritize 150 The Principles of Dynamic Prioritization 150 Traditional Resource Prioritization 151 Dynamic Prioritization 152 Dynamic Prioritization Scorecard 154 Dynamic Prioritization in Action 154 Forecasting Potential Impact 155 Comparing Opportunities 157 Moving Your Company Toward Dynamic Prioritization 157 Overcoming Common Excuses 158 Conclusion 159 Recap 160 Chapter 11 Moving from Analysis to Site Optimization 161 Testing Methodologies and Tools 162 A/B Testing 162 A/B/n Testing 162 Multivariate Tests 162 How to Choose a Test Type 163 Testing Tools 164 What to Test 164 Prioritizing Tests 166 Creating a Successful Test 167 Understanding Post-Test Analysis 168 Optimizing Segment Performance 168 Example One: Behavior-Based Testing 169 Example Two: Day-of-the-Week Testing 169 Planning for Optimization 169 Budgeting for Optimization 170 Skills Needed for a Successful Optimization Team 171 Overcoming IT Doubts 173 IT Doesn’t Understand the Process 174 Testing Prioritization 174 Lack of Executive Support 174 Learning from Your Successes and Mistakes 175 Learning from the Good and the Bad 175 A Quick Way Up the Learning Curve 176 Spreading the Word 176 Test Examples 176 Price 177 Promotional 178 Message 179 Page Layout 180 New Site Launches or New Functionality 180 Site Navigation and Taxonomy 181 Recap 182 Chapter 12 Agencies 185 Why Use an Agency at All? 186 Finding an Agency 187 Creating an RFP 188 Introduction and Company Background 189 Scope of Work and Business Goals 191 Timelines 193 Financials 194 The Rest of the RFP: Asking the Right Questions 195Mutual Objective: Success 196 Doing the Work 198 The Secret Agency Sauce 199 Recap 200 Chapter 13 The Creative Brief 201 What Is a Creative Brief? 202 The Brief 202 Components of a Data-Driven Brief 203 Creative Brief Metrics 203 Analytics and Creativity 205 The Iterative Design Cycle 206 A Sample Creative Brief 206 Creative Brief: Robotwear.Com 206 Recap 210 Chapter 14 Staffing and Tuning Your Web Team 211 Skills That Make a Great Web Analyst 212 Technical vs. Interpretive Expertise 212 Key Web Analyst Skills 213 The Roles of the Web Analyst 214 Building Your Web-Analytics Team: Internal and External Teams 215 Estimating Your Cost 215 Key Analytics Positions 216 Expanding the Circle of Influence 217 Internal vs. External Teams 217 Education and Training for Web Analysts 219 Web Analytics Association 219 Conferences 219 University of British Columbia Courses 220 Message Boards 220 ClickZ and Other Online Media 220 Blogs 220 Web Analytics Wednesdays 220 Vendor Training 221 Agency Partners 221 Hands-on Experience 221 Recap 221 Chapter 15 Partners 223 When to Choose an Analytics Tool Vendor 224 Methodology for Selecting a Tool 225 Selecting a Review Committee 225 Establishing a Timeline 226 Criteria to Review and Select Vendors 226 10 Questions to Ask Web Analytics Vendors 228 Comparing to Free Tools 229 ASP or Software Version 229 Data Capture 230 Total Cost of Ownership 230 Support 231 Data Segmentation 232 Data Export and Options 232 Data Integration 233 The Future 233 References 234 Recap 234 Conclusion 235 Appendix:Web Analytics “Big Three” Definitions 237 How We Define Terms 238 Definition Framework Overview 239 Term: Unique Visitors 239 Term: Visits/Sessions 240 Term: Page Views 240 Index 243
£18.99
John Wiley & Sons Inc Pragmatic Software Testing
Book SynopsisA hands-on guide to testing techniques that deliver reliable software and systems Testing even a simple system can quickly turn into a potentially infinite task. Faced with tight costs and schedules, testers need to have a toolkit of practical techniques combined with hands-on experience and the right strategies in order to complete a successful project. World-renowned testing expert Rex Black provides you with the proven methods and concepts that test professionals must know. He presents you with the fundamental techniques for testing and clearly shows you how to select and apply successful strategies to test a system with budget and time constraints. Black begins by discussing the goals and tactics of effective and efficient testing. Next, he lays the foundation of his technique for risk-based testing, explaining how to analyze, prioritize, and document risks to the quality of the system using both informal and formal techniques. He then clearly describes howTable of ContentsAcknowledgments. Introduction. Part I Goals, Strategies, and Tactics. Chapter 1 What Does It Mean to Be Pragmatic? What Do Effective and Efficient Mean? What Effects Do You Want? What Is the Right Level of Efficiency? Avoiding Redundancy. Reducing Cost. What Software Testing Isn’t…But Is Often Thought to Be. Five Phases of a Tester’s Mental Life. Other Founding Views on Testing. Testing as a Form of Quality Risk Management. So What Is the Test Team All About? What Does “Quality” Mean to You? Chapter 2 Triangle Test Exercise. Exercise: The Triangle Test. Your Solution for the Triangle Test. Your Solution for the Triangle Test (Continued). Author’s Triangle Test Solution. Chapter 3 Aligning Testing with the Project. Why Do Organizations Test? Perspectives on Testing. Testing in Context. Common Test Phases and Objectives. Testing Throughout the Organization. The V Model. Evolutionary and Incremental Models. The Spiral Model. Regrettably Common Model: Code and Fix. Testing Maintenance Releases. System Integration. Hardware/Software Development. The Test Process. Chapter 4 Understanding Test Strategies, Tactics, and Design. Aligning Mission, Strategies, and Tactics. Analytical Test Strategies. Model-Based Test Strategies. Methodical Test Strategies. Process-Oriented Test Strategies. Dynamic Test Strategies. Philosophical Test Strategies. Regression. Regression Strategy 1: Repeat All Tests. Regression Strategy 2: Repeat Some Tests. Three Other Regression Strategies. Tactics: Categories of Testing Techniques. Strategic and Tactical Considerations. The Test System. Classic Principles for Test Design. Phases of Test Development. Synopsis of Test Strategies, Tactics, and Design. Part II Risk-Based Testing. Chapter 5 Understanding Risks to System Quality. Categories of Quality Risks. Functionality. Performance and Reliability. Stress, Capacity, and Volume. States. Transactions. Installation and Deinstallation. Operations. Maintenance and Maintainability. Regression. Usability and User Interface. Data Quality. Error and Disaster Handling and Recovery. Date and Time Handling. Localization. Configuration and Compatibility. Networked, Internetworked, and Distributed. Standards and Regulatory Compliance. Security. Timing and Coordination. Documentation. Can You Think of Other Quality Risks? Chapter 6 Aligning Testing with Quality Risks. Prioritize Risks to System Quality. Testing, Customer Usage, and System Configurations. Approaches for Quality Risks Analysis. Informal Quality Risk Analysis. Tips for Risk Analysis. Challenges of Risk Analysis. Chapter 7 Quality Risk Analysis Exercise. My Solution. Comments on My Solution. A Funny Thing Happened to Me on the Way to the Quality Risks… . Bonus Exercise. Template. My Solution. Comments on My Solution. Bonus Example: Grays and Blues Quality Risk Analysis. Part III Static Testing. Chapter 8 Reviews and Other Static Tests. Testing Requirements and Designs. Reviews Costs and Benefits. Types of Reviews. Reviews for Verification and Validation. Reviews as a Way to Improve the Process, Improve the System, and Reduce Costs. Answers to the Three Questions about Static Testing. Reviews as a Way to Achieve Consensus and Understanding. The Review Process, Roles, and Responsibilities. Deliverables and Ground Rules from Reviews. Common Requirements and Design Bugs. Reviewing (and Testing) Documentation. Other Static Tests. Chapter 9 Review Exercise. Reviews. Your Solution. My Solution. Comments on My Solution. Bonus Exercise: Reviewing Triangle Requirements Title Page. Triangle Requirements Review Using Wiegers’s List. The Requirements Bugs You Found. My Solution: Requirements Bugs. Comments on My Solution. Part IV Behavioral Testing. Chapter 10 Equivalence Classes and Boundary Values. Equivalence Partitioning. Boundary Value Analysis. Integer. Real Numbers. Character and String. Date. Time. Currency. Beyond Functional Classes and Boundaries. Chapter 11 Equivalence Classes and Boundary Values Exercise. Functional Boundaries and Classes. My Solution and Comments. Nonfunctional Boundaries and Classes. Omninet Marketing Requirements Document (v0.3). Omninet System Requirements Document (v0.2). Chapter 12 Use Cases, Live Data, and Decision Tables. Use Cases and Scenario Tests. Nouns and Verbs, Adjectives and Adverbs. Live Data and Customer Tests. Decision Tables. Chapter 13 Decision Table Exercise. Decision Table Tests. My Solution and Comments. Decision Tables and Boundary Values. My Solution and Comments. Building a Decision Table for Testing. My Solution and Comments. Chapter 14 State Transition Diagrams. Describing Systems with States Using State Transition Diagrams. State Tables. Printer Server State Transition Diagram. Chapter 15 State Transition Diagram Exercise. Kiosk States. My Solution and Comments. ATM State Models. My Solution and Comments. Grays and Blues and State Transition Diagrams. My Solution and Comments. Chapter 16 Domain Testing. Combinatorial Explosions. A Domain Example Using Frequent-Flyer Programs. Possible Domain Test Values. An Aerospace Example. When Domain Rules Change. Domain Analysis Summary. Complex Domain Testing Example. A General Rule for Complex Domains. Chapter 17 Domain Testing Exercise. My Solution and Comments. Chapter 18 Orthogonal Arrays and All Pairs. Combinatorial Explosions. Orthogonal Arrays and All-Pairs Tables. Two Orthogonal Arrays. Selecting an Orthogonal Array. Applying Orthogonal Arrays to a Complicated Real-World Example. All-Pairs Tables. Other Thoughts on Configuration Testing. Chapter 19 Orthogonal Arrays Exercise. My Solution and Comments. Chapter 20 Reactive Testing. General Facts about Reactive Tests. Error Guessing, Attacks, and Bug Taxonomies. Bug Hunting. Exploratory Tests. Checklists. Other Sources of Inspiration for Reactive Testing. Advantages and Disadvantages. A Case Study of Exploratory Testing. Part V Structural Testing. Chapter 21 Control-Flow Testing. Code Coverage. McCabe Cyclomatic Complexity. Chapter 22 Control-Flow Testing Exercise. My Solution and Comments. Chapter 23 Data-Flow Testing. Chapter 24 Data-Flow Testing Exercise. My Solutions and Comments. Chapter 25 Integration Testing. Drivers and Stubs. Integration Techniques. Backbone Integration. McCabe Basis Paths for Integration. Enhanced Hex Converter Program. Call Flow. Chapter 26 Integration Basis Test Exercise. My Solution and Comments. Part VI Appendices. Appendix A Omninet: The Internet Everywhere Marketing Requirements Document. 1 Scope. 1.1 Terms, Acronyms, and Abbreviations. 1.2 Applicable Documents. 2 Required release date. 3 Description of requirements. 3.1 General technical requirements. 3.1.1 Welcome. 3.1.2 Payment. 3.1.3 Internet Browser. 3.1.4 Performance. 3.1.5 Localization. 3.1.6 Content Control. 3.1.7 Session Termination. 3.1.8 Confidentiality. 3.2 Administration. 3.2.1 Software Updates. 3.2.2 View Kiosks. 3.2.3 View Users. 3.2.4 Modify User. 3.2.5 Terminate User. Appendix B Omninet: The Internet Everywhere System Requirements Document. Functionality System Requirements. Reliability System Requirements. Usability System Requirements. Efficiency System Requirements. Maintainability System Requirements. Portability System Requirements. Design Models. Omninet System Architecture. Payment Processing Decision Table. Kiosk Module Flow. Kiosk State-Transition Diagram. Kiosk State-Transition Table. Kiosk OS/Browser/Connection Speed Configuration Orthogonal Array. Appendix C Bibliography and Other Recommended Readings. RBCS Company Profile. Index.
£31.35
John Wiley & Sons Inc Wiley Pathways Network Security Fundamentals
Book SynopsisAs networks around the world have become more and more connected, an understanding of network security has become an integral part of a network administrator's job. People who design, implement, and manage networks on a day-to-day basis must understand the threats that exist and how to mitigate them to protect a company's assets.Table of Contents1. Computer and Network Security Principles 1.1. Identifying and Analyzing Risk 2 1.2. Installing Windows XP Professional 6 1.3. Installing Windows Server 2003 9 1.4. Using Microsoft Security Baseline Analyzer 13 1.5. Viewing Local Security Policy 18 1.6. Creating a Written Security Policy 24 2. Network and Server Security 2.1. Managing Server Roles 28 2.2. Managing Services and Ports 34 2.3. Using Network Monitor 38 2.4. Configuring Windows Firewall 42 2.5. Designing Border Security 45 3. Cryptography 3.1. Understanding Cryptography Concepts 48 3.2. Managing Driver Signing 49 3.3. Using Encrypting File System 53 3.4. Installing Certificate Services 57 3.5. Managing Certificate Authority Trusts 63 3.6. Requesting and Issuing Certificates 67 3.7. Revoking Certificates 70 4. Authentication 4.1. Comparing Credentials 75 4.2. Creating User Accounts 76 4.3. Configuring an Active Directory Domain Controller 82 4.4. Joining a Domain 89 4.5. Managing Password and Account Lockout Policies 93 4.6. Managing Authentication Protocols 101 4.7. Managing Logon Restrictions 103 5. Authorization and Access Control 5.1. Comparing Access Control Models 111 5.2. Managing Groups 112 5.3. Assigning Permissions 117 5.4. Troubleshooting Effective Permissions 125 5.5. Viewing User Right Assignments 129 6. Securing Network Transmission 6.1. Designing Network Perimeters 133 6.2. Implementing IP Address Filtering on IIS 135 6.3. Using IPsec Default Policies 139 6.4. Implementing Packet Filtering with IPsec 143 6.5. Implementing IPsec Encryption 150 7. Remote Access and Wireless Security 7.1. Understanding Remote Access Protocols and Wireless Security 156 7.2. Designing Remote Access and Wireless Access 158 7.3. Enabling Routing and Remote Access 160 7.4. Configuring a Dial-up Client 166 7.5. Configuring a VPN Client 171 7.6. Defining Remote Access Policies 176 8. Server Roles and Security 8.1. Using Default Templates 183 8.2. Creating and Applying a Baseline Template 188 8.3. Creating and Applying an Incremental Template 193 8.4. Securing DNS 197 8.5. Securing a File Server 203 8.6. Securing a Web and FTP Server 209 9. Protecting Against Malware 9.1. Identifying Malware 217 9.2. Comparing Antivirus, Anti-Spyware, and Anti-Malware Programs 218 9.3. Creating a Managed Computer 221 9.4. Securing Internet Explorer 224 9.5. Securing Outlook Express 232 10. Ongoing Security Management 10.1. Configuring Automatic Updates 237 10.2. Configuring Auditing 241 10.3. Using Event Viewer 245 10.4. Performing Remote Management with MMC 250 10.5. Using Telnet 256 10.6. Using Remote Desktop for Administration 260 11. Disaster Recovery and Fault Tolerance 11.1. Planning for the Worst 264 11.2. Responding to a Security Incident 270 11.3. Configuring Backups 272 11.4. Planning a RAID Configuration 282 11.5. Eliminating Single Points of Failure 284 12. Intrusion Detection and Forensics 12.1. Understanding Terminology 288 12.2. Comparing Intrusion Detection System Types 290 12.3. Investigating the Honeynet Project 292 12.4. Using Forensics Tools 294 12.5. Investigating an Attack 299
£38.25
Wiley Information Security Governance
Book SynopsisThis book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance.Table of ContentsINTRODUCTION. CHAPTER 1: GOVERNANCE OVERVIEW. 1.1 What Is It? 1.2 Back to Basics. 1.3 Origins of Governance. 1.4 Governance Definition. 1.5 Information Security Governance. 1.6 Six Outcomes of Effective Security Governance. 1.7 Defining Information, Data, Knowledge. 1.8 Value of Information. CHAPTER 2: WHY GOVERNANCE? 2.1 Benefits of Good Governance. 2.1.1 Aligning Security with Business Objectives. 2.1.2 Providing the structure and framework to optimize allocations of limited resources. 2.1.3 Providing assurance that critical decisions are not based on faulty information. 2.1.4 Ensuring accountability for safeguarding critical assets. 2.1.5 Increasing trust of customers and stakeholders. 2.1.6 Increasing the company’s worth. 2.1.7 Reducing liability for information inaccuracy or lack of due care in protection. 2.1.8 Increasing predictability and reducing uncertainty of business operations. 2.2 A Management Problem. CHAPTER 3: LEGAL AND REGULATORY REQUIREMENTS. 3.1 Security Governance and Regulation. CHAPTER 4: ROLES & RESPONSIBILITIES. 4.1 The Board of Directors. 4.2 Executive Management. 4.3 Security Steering Committee. 4.4 The CISCO. CHAPTER: STRATEGIC METRICS. 5.1 Governance Objectives. 5.1.1 Strategic Direction. 5.1.2 Ensuring Objectives are Achieved. 5.1.3. Risks Managed Appropriately. 5.1.4 Verifying Resources are Used Responsibly. CHAPTER 6: INFORMATION SECURITY OUTCOMES. 6.1 Defining Outcomes. 6.1.1 Strategic alignment. 6.1.2 Risk Management. 6.1.3 Business process assurance / convergence. 6.1.4 Value delivery. 6.1.5 Resource management. 6.1.6 Performance measurement. CHAPTER 7: SECURITY GOVERNANCE OBJECTIVES. 7.1 Security Architecture. 7.1.1 Managing Complexity. 7.1.2 Providing a Framework & Road Map. 7.1.3 Simplicity & Clarity through Layering & Modularisation. 7.1.4 Business Focus beyond the Technical Domain. 7.1.5 Objectives of Information Security Architectures. 7.1.6 SABSA Framework for Security Service Management. 7.1.7 SABSA Development Process. 7.1.8 SABSA Lifecycle. 7.1.9 SABSA Attributes. 7.2 COBIT. 7.3 Capability Maturity Model. 7.4 ISO/IEC 27001/ 27002. 7.4.1 ISO 27001. 7.4.2 ISO 27002. 7.5 Other Approaches. 7.5.1 National Cybersecurity Task Force. CHAPTER 8: RISK MANAGEMENT OBJECTIVES. Risk Management Responsibilities. Managing Risk Appropriately. 8.1 Determining Risk Management Objectives. 8.1.1 Recovery Time Objectives. CHAPTER 9: CURRENT STATE. 9.1 Current State of Security. 9.2 Current State of Risk Management. 9.3 Gap Analysis - Unmitigated Risk. 9.3.1 SABSA. 9.3.2 CMM. CHAPTER 10: DEVELOPING A SECURITY STRATEGY. 10.1 Failures of Strategy. 10.2 Attributes of A Good Security Strategy. 10.3 Strategy Resources. 10.3.1 Utilizing Architecture for Strategy Development. 10.3.2 Using Cobit for Strategy Development. 10.3.3 Using CMM for Strategy Development. 10.4 STRATEGY CONSTRAINTS. 10.4.1 Contextual constraints. 10.4.2 Operational constraints. CHAPTER 11: SAMPLE STRATEGY DEVELOPMENT. 11.1 The Process. CHAPTER 12: IMPLEMENTING STRATEGY. Action Plan Intermediate Goals. Action Plan Metrics. Re-engineering. Inadequate Performance. 12.1 Elements Of Strategy. 12.1.1 Policy Development. Attributes of Good Policies. Sample Policy Development. Other Policies. 12.1.2 Standards. Attributes of Good Standards. Sample Standards. Classifications. Standard Statement. CHAPTER 13: SECURITY PROGRAM DEVELOPMENT METRICS. 13.1 Information Security Program Development Metrics. 13.2 Program Development Operational Metrics. CHAPTER 14: INFORMATION SECURITY MANAGEMENT METRICS. 14.1 Management Metrics. 14.2 Security Management Decision Support Metrics. 14.4 CISO Decisions. 14.2.1 Strategic alignment. 14.2.2 Risk Management. 14.2.3 Metrics for Risk Management. 14.2.4 Assurance Process Integration. 14.2.5 Value Delivery. 14.2.6 Resource Management. 14.2.7 Performance Measurement. 14.7 Information Security Operational Metrics. 14.3.1 IT and Information Security Management. 14.3.2 Compliance Metrics. CHAPTER 15: INCIDENT MANAGEMENT AND RESPONSE METRICS. 15.1 Incident Management Decision Support Metrics. Conclusion. Appendix A. SABSA Business Attributes & Metrics. Appendix B. Cultural Worldviews. Heirarchists. Egalitarians. Individualists. Fatalists.
£77.36
John Wiley & Sons Inc The Webs Awake
Book SynopsisThe central thesis of The Web''s Awake is that the phenomenal growth and complexity of the web is beginning to outstrip our capability to control it directly. Many have worked on the concept of emergent properties within highly complex systems, concentrating heavily on the underlying mechanics concerned. Few, however, have studied the fundamentals involved from a sociotechnical perspective. In short, the virtual anatomy of the Web remains relatively uninvestigated. The Web''s Awake attempts to seriously explore this gap, citing a number of provocative, yet objective, similarities from studies relating to both real world and digital systems. It presents a collage of interlinked facts, assertions, and coincidences, which boldly point to a Web with powerful potential for life.Trade Review"I recommend this book to anyone who has an interest in how the World Wide Web has developed, and continues to evolve." (British Computer Society Book Reviews) "…a surprisingly easy and engaging book to read…an essential book for anyone interested in artificial life, artificial intelligence and information studies." (CHOICE, October 2007) "...a compelling and enjoyable read, enthralling and thought-provoking...a fascinating and provocative perspective on what the Web is and what it will be." (SirReadaLot.org, June 2007)Table of ContentsForeword. Preface. Acknowledgments. Prologue. CHAPTER 1 THE WEB AND LIFE. Introduction. Almost None of This Is New. Where to Begin?—Web Misconceptions and Folklore. Our Understandings of the Web. Power of the People. The Dark Side of the Force. What Would a Web Be Without the Holes? Structure Abounds. Four Dimensions Are Not Enough. Our Understandings of Life. Life’s Playground—A Universe of Infinite Possibilities. Enquiries into the Definition of Life. More Contemporary Viewpoints on Life. CHAPTER 2 THE SPECTRUM OF COMPLEXITY. A Complex Web. The Natural Mix of Order and Disorder. Emergence—The Complexity Sweet Spot. Mankind, Complexity, and Our Attempts to Understand the Unreal. Could You Repeat That Please? Self-Similarity and Recursion. Back to Measures of Complexity. The Theory of Complexity. The Crossover Between Orderly and Chaotic Systems. Onwards to Chaos. Modern-Day Approaches to Complexity. CHAPTER 3 THE IMPORTANCE OF DISCRETENESS AND SYMMETRY IN SYSTEMS. Let’s Be Discrete. A Brief Word of Warning. Boiling the Numbers Out of Computing. The Power of Two. Let’s Split the Difference. Symmetry in Systems. CHAPTER 4 NATURAL STRUCTURES FOR MAN-MADE MACHINES— CURVATURE IN INFORMATION AND COMPUTATION. Engineering Problems. Arrows Everywhere—Graph Theory and Feynman-Like Diagrams. Relays and Switches by Any Other Name. Differentiation Through Divergence. Relationships and Twisting Sequences. Growth Spirals, Fibonacci Progressions, and Other Sequential Patterns. L-Systems. Information Compression and Maximization in Biological Systems. Degrees of Freedom and Information Representation in Biological Systems. A More Detailed Account of DNA’s Structure. More Evidence of Efficiency at Play in DNA and Higher Levels of Physiology. Books, Bytes, Computers, and Biological Systems—An Analogy. CHAPTER 5 POSITIONAL INFORMATION AND SCALE-FREE NETWORKS. A Right Place for Everything. What Is Information Anyway? A Bow to Tie Coincidence Together. Why Is Kevin Bacon so Important? Scale-Free Networks. The Web’s Body Mass. DNA as an Ontogenetic Database. Back to Gödel—Compression, Keys, Catalysts, and Restrictors. CHAPTER 6 EVOLUTION THROUGH ENGINEERING. Some Key Questions Still Remain. Memes and Universal Darwinism. Boolean Logic, Regulatory Networks, and New Forms of Life. Binary Biological Machines. nK Networks. “X” as a Canonical Super Pattern. Autocatalytic Sets. CHAPTER 7 A LESS-THAN-SIMPLE MATTER OF BOUNDLESS ORGANICS. Open Worlds, Feedback, and Critical Self-Organization. Gödel, Incompleteness, and Maintenance Through Changing Boundaries. An Abstractionless Universe. Self-Sustaining, Self-Organizing Systems. CHAPTER 8 EMERGENT INTELLIGENCE AND POSTHUMAN CONCEPTS. Why on the Web? Technology Lock-In. Swarm Behavior. Artificial Life. The Swarm Being that Is the Web. The Web’s Core Memory and Its Place in Information Value. The Apparent Failure of Artificial Intelligence. Posthuman Philosophies and Collective Consciousness. The Penrose Paradox. CHAPTER 9 THE PHYSICS OF INFORMATION AND COMPUTING. The Attraction of “Why” and the Ubiquity of Complexity as a Metaproperty. Spin Glass. Quantum Comparisons. More about Dimensions. Strange Loops, Spin Networks, and Problems with the Web’s Constitution. Computational Duality. The Web’s Superposition. Could Penrose Be Right After All? Quantum Brains. One Big Spiny String Thing. Quantum Darwinism. CHAPTER 10 COUNTER ARGUMENTS. All Those Against. Computing the Incomputable. Observation and Practicality in Computation. Spaceships Can Come in Handy. When Is a Curve not a Curve, When Is a Brain not a Brain? A Matter of What, not How. CHAPTER 11 OBJECTIVE OPINIONS. Opinions of the Uber-Geeks. Are We Right to Talk about a Global “Brain”? Over the Horizon. A Final Sprinkle of Philosophy. APPENDIX A AN OUTLINE OF THE SEMANTIC WEB AND ITS POTENTIAL FOR SOFTWARE ENGINEERING. Blue Chips. Semantic Web Technologies Make the Web’s Meaning Much More Specific. Autonomic Systems and Software Engineering. The Future of Software Engineering Lies with Discovery. Smushing. Runtime Autonomic Semantic Applications. StumbleUpon. APPENDIX B BEYOND THE SEMANTIC WEB. Overlaps. A Semantic Web Primer for Object-Oriented Software Practitioners. References. Index. About the Author.
£62.06
John Wiley & Sons Inc Computer Education for Teachers
Book SynopsisComputer Education for Teachers: Integrating Technology into Classroom Teaching is designed to introduce future teachers to computer technology in a meaningful, practical fashion. It is written for undergraduate and graduate students who want an up-to-date, readable, practical, concise introduction to computers for teachers.Table of ContentsPART 1 An Introduction to Computers and Educational Technology 1 1 Historical Past 3 Before the Modern Computer 3 Beginning of the Computer 4 The Modern Computer 4 The First Generation of Computers 6 The Second Generation of Computers 7 The Third Generation of Computers 7 The Fourth Generation of Computers—The Microcomputer 7 The Fifth Generation of Computers 10 Computers in Education 10 Summary 14 Chapter 1 Online Resources 14 Chapter Mastery Test 14 Key Terms 15 Computer Lab: Activities for Mastery and Your Portfolio 15 Suggested Readings and References 15 2 Getting Started on the Computer 17 What is a Computer? 17 Elements of a Computer 18 Hardware Overview 23 Input Devices 23 Computer Selection Criteria 28 The Hardware Checklist 31 Summary 32 Chapter 2 Online Resources 32 Chapter Mastery Test 32 Key Terms 33 Computer Lab: Activities for Mastery and Your Portfolio 33 Suggested Readings and References 33 PART 2 Integrating the Internet into the Classroom 35 3 Networking, Internet, and Distance Learning 37 What is Networking? 37 Networks 38 The Internet 39 Connecting to the Internet 40 Internet Service Providers (ISPs) 42 Internet Resources 42 World Wide Web 45 Distance Education and Distance Learning Defined 45 Distance Learning: A Brief History 45 Distance Learning Technologies 46 Different Approaches to Distance Learning 48 The Future of Distance Education 48 Drawbacks of Distance Education 50 Suggestions for Integrating the Internet into the Classroom 51 Sample Classroom Lesson Plans 51 Summary 54 Chapter 3 Online Resources 54 Chapter Mastery Test 55 Key Terms 55 Computer Lab: Activities for Mastery and Your Portfolio 55 Suggested Readings and References 55 4 The Web 57 What is the World Wide Web? 57 A Brief History 58 World Wide Web 1.0 and World Wide Web 2.0 59 Finding a Web Page 59 Search Engines 59 Multimedia via the Internet 62 Web Site Evaluation 63 Integrating the Web into the Classroom 64 Web Sites to Use in the Classroom 64 Web Site Rating Scale 65 Sample Classroom Lesson Plans 72 WebQuests 73 Web Page Creation 75 Summary 81 Chapter 4 Online Resources 81 Chapter Mastery Test 81 Key Terms 81 Computer Lab: Activities for Mastery and Your Portfolio 82 Suggested Readings and References 82 5 Internet Issues 83 Internet Problems 83 Software Piracy 92 Security 95 Unequal Access 97 Health Risks Using Computers 97 Summary 99 Chapter 5 Online Resources 99 Chapter Mastery Test 99 Key Terms 99 Computer Lab: Activities for Mastery and Your Portfolio 100 Suggested Readings and References 100 PART 3 Using and Selecting Educational Technology 101 6 Word Processing 103 Historical Background 103 What is a Word Processor? 104 Components of Word Processing 104 Standard Word Processing Features 105 Basic Word Processing Editing Features 105 Standard Formatting Functions 108 Advanced Word Processing Features 108 Evaluation of Word Processing Programs 112 Word Processing Program Checklist 116 Integrating a Word Processor into the Classroom 116 Sample Classroom Lesson Plans 118 Summary 123 Chapter 6 Online Resources 123 Chapter Mastery Test 123 Key Terms 123 Computer Lab: Activities for Mastery and Your Portfolio 124 Suggested Readings and References 124 7 Desktop Publishing 125 Word Processing versus Desktop Publishing 125 Historical Background 125 What is Desktop Publishing? 126 Basic Desktop Publishing Features 127 Learning to Use a Desktop Publishing Program 132 How to Choose a Good Desktop Publishing Program 135 Desktop Publishing Program Checklist 137 Integrating Desktop Publishing into the Classroom 137 Sample Classroom Lesson Plans 140 Additional Activities 144 Summary 145 Chapter 7 Online Resources 145 Chapter Mastery Test 145 Key Terms 146 Computer Lab: Activities for Mastery and Your Portfolio 146 Suggested Readings and References 146 8 Databases 147 What is a Database? 147 Advantages of an Electronic Database 148 How a Database Works 149 Types of Databases 152 How to Choose a Database for the Classroom 155 Hardware Compatibility 155 General Features 156 Advanced Features 156 Flexibility 157 Ease of Use 157 Consumer Value 157 Support 158 Integrating the Database into the Classroom 159 Teacher Practice Activities 159 Database Checklist 160 Sample Classroom Lesson Plans 163 Summary 169 Chapter 8 Online Resources 170 Chapter Mastery Test 170 Key Terms 170 Computer Lab: Activities for Mastery and Your Portfolio 170 Suggested Readings and References 171 9 Spreadsheets and Integrated Programs 172 What is a Spreadsheet? 172 Historical Overview 172 Components of a Spreadsheet 173 How a Spreadsheet Operates 174 Why Use an Electronic Spreadsheet? 177 Basic Features of a Spreadsheet 178 Advanced Features of a Spreadsheet 178 How to Select a Good Spreadsheet for the Classroom 179 Integrating a Spreadsheet into the Classroom 182 Spreadsheet Checklist 183 Teacher Practice Activity 185 Sample Classroom Lesson Plans 186 Integrated Programs 191 Alternatives to Integrated Programs 191 Summary 192 Chapter 9: Online Resources 193 Chapter Mastery Test 193 Key Terms 193 Computer Lab: Activities for Mastery and Your Portfolio 193 Suggested Readings and References 194 10 Digital Photography and Newer Technologies 195 Introduction 195 What is a Digital Camera? 195 Advantages and Disadvantages of Digital Photography 196 How to Choose a Digital Camera 197 Megapixels 197 Liquid Crystal Displays and Viewfinders 198 Memory Cards 198 Optical versus Digital Zoom 199 Power Supply 199 Formats 199 Cost, Weight, Price, and Feel 200 Photography Software 200 Digital Cameras in the Classroom 201 Digital Camera Checklist 202 Emerging Web Technologies 204 Sample Classroom Lesson Plans 209 Summary 213 Chapter 10 Online Resources 213 Chapter Mastery Test 213 Key Terms 214 Computer Lab: Activities for Mastery and Your Portfolio 214 Suggested Readings and References 214 11 Multimedia and Video Technology 216 What is Multimedia? 216 Historical Perspective 216 Hypertext and Hypermedia 217 Hypermedia Authoring Tools 218 Classroom Suggestions for Using Hypermedia 220 Guidelines for Creating a Multimedia Presentation 221 Computer Multimedia Project Checklist 223 Multimedia Software 224 Video Camera in the Classroom 225 How to Choose a Video Camera 227 Digital Video Camera Checklist 228 Video Editing Technology 229 Movies in the Classroom 229 YouTube 230 Video Blog 230 Digital Storytelling 231 Video and Sound Players 231 Morphing and Warping Technology 232 Virtual Reality 233 Second Life 234 Sample Classroom Lesson Plans 235 Summary 239 Chapter 11 Online Resources 239 Chapter Mastery Test 239 Key Terms 239 Computer Lab: Activities for Mastery and Your Portfolio 240 Suggested Readings and References 240 12 Selecting Software and Integrating It into the Classroom 242 Computer-Assisted Instruction 242 Historical Background 242 Types of CAI 243 Subject-Area Software 249 Computer-Managed Instruction 252 Integrated Learning Systems 253 Public Domain Software, Freeware, Shareware, and Open Source 255 Software Selection: A General Guide 255 Software Program Checklist 259 Guidelines for Setting up a Software Library 260 Sample Classroom Lesson Plans 260 Summary 262 Chapter 12 Online Resources 263 Chapter Mastery Test 263 Key Terms 263 Computer Lab: Activities for Mastery and Your Portfolio 264 Suggested Readings and References 264 13 Technology in Special Education: Assistive Technology 265 Students with Disabilities 265 Adaptive Technology 269 Universal Design for Learning 272 Software for the Special Education Classroom 273 Assistive/Adaptive Technology Checklist 279 Laws Affecting Special Education 280 Mainstreaming 280 Inclusion 281 Adapting Classroom Lesson Plans for Students with Disabilities 281 Sample Classroom Lesson Plans 281 Summary 287 Chapter 13 Online Resources 287 Chapter Mastery Test 287 Key Terms 288 Computer Lab: Activities for Mastery and Your Portfolio 288 Suggested Readings and References 288 14 Teacher Support Tools and Music, Art, and Graphic Software 290 What Are Teacher Support Tools? 290 Teacher Support Tools 291 Teacher Support Tools on the Internet 299 Electronic Portfolios 300 Clip Art Collections 302 Teacher Support Tools Checklist 303 Individualized Education Plan Generators 304 What is Graphics Software? 304 Graphics Software 304 Presentation Graphics Programs 306 Print Graphics Programs 307 Computer-Aided Design Applications 309 Music Technology 310 Sample Classroom Lesson Plans 311 Summary 315 Chapter 14 Online Resources 316 Chapter Mastery Test 316 Key Terms 316 Computer Lab: Activities for Mastery and Your Portfolio 316 Suggested Readings and References 317 PART 4 What Teachers Should Know about Educational Technology 319 15 One Computer in the Classroom 321 One Computer in the Classroom 321 Computer Labs 330 The Wireless Mobile Lab 331 Summary 332 Chapter 15 Online Resources 332 Chapter Mastery Test 332 Key Terms 332 Computer Lab: Activities for Mastery and Your Portfolio 332 Suggested Readings and References 333 16 Learning Theorists and Research 334 Learning Theories and Technology Integration 334 Computer-Assisted Instruction Research Findings 337 Achievement 337 Summary 343 Chapter 16 Study Online Resources 344 Chapter Mastery Test 344 Key Terms 344 Computer Lab: Activities for Mastery and Your Portfolio 344 Suggested Readings and References 345 17 The Future 348 Future Trends 348 Emerging Technologies in Education 360 Software 361 Trends and Interesting Developments 362 Concluding Thoughts 363 Lessons We Have Learned 363 Summary 364 Chapter 17 Online Resources 364 Chapter Mastery Test 364 Key Terms 365 Computer Lab: Activities for Mastery and Your Portfolio 365 Suggested Readings and References 365 Appendix A Directory of Selected Software Publishers 367 Appendix B Recommended Mail-Order and Online Software Sources 370 Glossary 371 Index 381
£135.85
John Wiley & Sons Inc ServiceOriented Modeling
Book SynopsisAnswers to your most pressing SOA development questions How do we start with service modeling? How do we analyze services for better reusability? Who should be involved? How do we create the best architecture model for our organization? This must-read for all enterprise leaders gives you all the answers and tools needed to develop a sound service-oriented architecture in your organization. Praise for Service-Oriented Modeling Service Analysis, Design, and Architecture Michael Bell has done it again with a book that will be remembered as a key facilitator of the global shift to Service-Oriented Architecture. . . . With this book, Michael Bell provides that foundation and more-an essential bible for the next generation of enterprise IT. -Eric Pulier, Executive Chairman, SOA Software Michael Bell''s insightful book provides common language and techniques for business and technology organizations to take advantage of thTable of ContentsPreface. Chapter 1. Introduction. Service-Oriented Modeling: What Is It About? Driving Principles Of Service-Oriented Modeling. Organizational Service-Oriented Software Assets. Service-Oriented Modeling Process Stakeholders. Modeling Services Introduction: A Metamorphosis Embodiment. Service-Oriented Modeling Disciplines: Introduction. Modeling Environments. Service-Oriented Modeling Framework. Summary. Part One. Service-Oriented Life Cycle. Chapter 2. Service-Oriented Life Cycle Model. Service-Oriented Life Cycle Model Principles. Service-Oriented Life Cycle Model Structure. Service-Oriented Life Cycle Disciplines. Summary. Chapter 3. Service-Oriented Life Cycle Perspectives. Service-Oriented Life Cycle Workflows: Introduction. Planning Service-Life Cycle Workflows. Service Life Cycle Progress View. Service Life Cycle Iteration View. Service Life Cycle Touch-Points View. Summary. Part Two. Service-Oriented Conceptualization. Chapter 4. Attribution Analysis. Establishing Core Attributes. Establishing An Attribution Model. Attribution Analysis. Attribute Selection. Deliverables. Summary. Chapter 5. Conceptual Service Identification. Service Conceptualization Toolbox. Conceptual Service Identification And Categorization. Conceptual Service Association Process. Conceptual Service Structure. Deliverables. Summary. Part Three. Service-Oriented Discovery And Analysis. Chapter 6. Service-Oriented Typing And Profiling Model. Service-Oriented Typing. Service-Oriented Profiling. Service Typing Namespaces. Service Typing And Profiling Deliverables. Summary. Chapter 7. Service-Oriented Discovery And Analysis: Implementation Mechanisms. Service-Oriented Assets And Analysis Activites. Service Discovery And Analysis Toolbox. Granularity Analysis. Aggregation Analysis. Decomposition Analysis. Unification Analysis. Intersection Analysis. Subtraction Analysis. Combining Service Analysis Methods. Service-Oriented Discovery And Analysis Deliverables Model. Summary. Chapter 8. Service-Oriented Analysis Modeling. Analysis Modeling Guiding Principles. Analysis Proposition Diagrams. Analysis Notation. Analysis Modeling Rules. Analysis Modeling Process. Service-Oriented Analysis Modeling Operations. Deliverables. Summary. Part Four. Service-Oriented Business Integration. Chapter 9. Business Architecture Contextual Perspectives. Business Model Perspectives. Problem-Solving Perspectives. Deliverables. Summary. Chapter 10. Business Architecture Structural Perspectives. Business Architecture Structural Integration Model. Business Domain Integration Structures. Business Domain Geographic Boundaries. Business Domain Distribution Formations. Business Domain Control Structures. Deliverables. Summary. Chapter 11. Service-Oriented Business Integration Modeling. Service-Oriented Business Integration Modeling Principles. Service-Oriented Business Integration Diagram. Modeling Process. Business Architecture Deliverables Model. Summary. Part Five. Service-Oriented Design Model. Chapter 12. Service-Oriented Logical Design Relationship. Design Logical Relationship Major Influences. A Formal Service Logical Relationship Notation. Roles In The Service-Oriented Design Context. Service Design Visibility Aspects. Service Cardinality. Synchronization. Service-Oriented Logical Design Relationship Diagram. Deliverables Model. Summary. Chapter 13. Service-Oriented Logical Design Composition. What Is A Service-Oriented Logical Design Composition? Service-Oriented Design Composition Components Service-Oriented Design Composition Styles. Logical Design Composition Strategies. Deliverables. Summary. Chapter 14. Service-Oriented Transaction Model. Service-Oriented Transaction Planning Success Criteria. Logical Design View: Service-Oriented Transaction Diagram. Conveying Functionality In The Activity Section. Planning Service-Oriented Transactions. Deliverables. Summary. Part Six. Service-Oriented Software Architecture Principles. Chapter 15. Service-Oriented Conceptual Architecture Principles. Conceptual Architecture Elements. Architectural Concepts As Machines. Modeling Conceptual Architecture. Deliverables. Summary. Chapter 16. Service-Oriented Logical Architecture Principles. Logical Architecture Building Blocks. Logical Architecture Perspectives. Asset Utilization Diagram. Reusability Perspective. Discoverability Perspective. Behavioral Perspective. Loose-Coupling Perspective. Interoperability Perspective. Deliverables. Summary. Index.
£37.50
John Wiley & Sons Inc The Data Warehouse Lifecycle Toolkit
Book SynopsisA thorough update to the industry standard for designing, developing, and deploying data warehouse and business intelligence systems The world of data warehousing has changed remarkably since the first edition of The Data Warehouse Lifecycle Toolkit was published in 1998.Table of ContentsChapter 1 Introducing the Kimball Lifecycle 1 Chapter 2 Launching and Managing the Project/Program 15 Chapter 3 Collecting the Requirements 63 Chapter 4 Introducing the Technical Architecture 109 Chapter 5 Creating the Architecture Plan and Selecting Products 179 Chapter 6 Introducing Dimensional Modeling 233 Chapter 7 Designing the Dimensional Model 287 Chapter 8 Designing the Physical Database and Planning for Performance 327 Chapter 9 Introducing Extract, Transformation, and Load 369 Chapter 10 Designing and Developing the ETL System 425 Chapter 11 Introducing Business Intelligence Applications 473 Chapter 12 Designing and Developing Business Intelligence Applications 505 Chapter 13 Deploying and Supporting the DW/BI System 541 Chapter 14 Expanding the DW/BI System 579
£35.10
John Wiley & Sons Inc SAS 9 Study Guide
Book SynopsisA thorough and self-contained treatment for SAS users preparing for the Base Programming Certification Exam for SAS 9complete with explanations, tips, and practice exam questions SAS 9 Study Guide is designed to help users of SAS 9 become familiar with the fine points of the software as well as develop solid study strategies that will shorten preparation time and ensure successful exam results. The following five study topics are addressed with a focused chapter devoted to each: accessing data; creating data structures; managing data; generating reports; and handling errors. SAS 9 Study Guide provides both a conceptual and practical approach to each of these areas with detailed explanations followed by examples. Each chapter presents concepts, processes, and applications in a clear, step-by-step format along with detailed explanations and examples. Individual chapters also contain: A Two-Minute Drill that provides a checklist of key points for review Table of ContentsContents. Preface. Introduction. I. Accessing Data. 2. Creating Data Structures. 3. Managing Data. 4. Generating Reports. 5. Handling Errors. Index.
£73.76
John Wiley & Sons Inc Software Architecture
Book SynopsisSoftware architecture is foundational to the development of large, practical software-intensive applications. This brand-new text covers all facets of software architecture and how it serves as the intellectual centerpiece of software development and evolution. Critically, this text focuses on supporting creation of real implemented systems. Hence the text details not only modeling techniques, but design, implementation, deployment, and system adaptation -- as well as a host of other topics -- putting the elements in context and comparing and contrasting them with one another. Rather than focusing on one method, notation, tool, or process, this new text/reference widely surveys software architecture techniques, enabling the instructor and practitioner to choose the right tool for the job at hand. Software Architecture is intended for upper-division undergraduate and graduate courses in software architecture, software design, component-based software engineering, and distributed systemsTable of Contents1 The Big Idea 1 1.1 The Power of Analogy: The Architecture of Buildings, 2 1.1.1 Limitations of the Analogy, 5 1.1.2 So, What’s the Big Idea?, 6 1.2 The Power and Necessity of Big Ideas: The Architecture of the Web, 7 1.3 The Power of Architecture in the Small: Architecture on the Desktop, 12 1.4 The Power of Architecture in Business: Productivity and Product Lines, 15 1.5 End Matter, 20 1.6 Review Questions, 21 1.7 Exercises, 21 1.8 Further Reading, 21 2 Architectures in Context: The Reorientation of Software Engineering 23 2.1 Fundamental Understandings, 24 2.2 Requirements, 25 2.3 Design, 29 2.3.1 Design Techniques, 31 2.4 Implementation, 33 2.4.1 Implementation Strategies, 35 2.5 Analysis and Testing, 38 2.6 Evolution and Maintenance, 40 2.7 Processes, 42 2.7.1 The Turbine Visualization, 43 2.7.2 Example Process Depictions, 49 2.8 End Matter, 52 2.9 Review Questions, 53 2.10 Exercises, 54 2.11 Further Reading, 55 3 Basic Concepts 57 3.1 Terminology, 58 3.1.1 Architecture, 58 3.1.2 Component, 68 3.1.3 Connector, 70 3.1.4 Configuration, 72 3.1.5 Architectural Style, 72 3.1.6 Architectural Pattern, 73 3.2 Models, 75 3.3 Processes, 75 3.4 Stakeholders, 79 3.5 End Matter, 79 3.6 Review Questions, 80 3.7 Exercises, 80 3.8 Further Reading, 81 4 Designing Architectures 83 4.1 The Design Process, 85 4.2 Architectural Conception, 87 4.2.1 Fundamental Conceptual Tools, 87 4.2.2 The Grand Tool: Refined Experience, 90 4.3 Refined Experience in Action: Styles and Architectural Patterns, 91 4.3.1 Domain Specific Software Architectures, 93 4.3.2 Architectural Patterns, 94 4.3.3 Introduction to Styles, 99 4.3.4 Simple Styles, 102 4.3.5 More Complex Styles, 124 4.3.6 Discussion: Patterns and Styles, 137 4.3.7 Design Recovery, 139 4.4 Architectural Conception in Absence of Experience: Unprecedented Design, 144 4.5 Putting it All Together: Design Processes Revisited, 149 4.5.1 Insights from Requirements, 150 4.5.2 Insights from Implementation, 151 4.6 End Matter, 152 4.7 Review Questions, 153 4.8 Exercises, 154 4.9 Further Reading, 154 5 Connectors 157 5.1 Connectors in Action: A Motivating Example, 159 5.2 Connector Foundations, 161 5.3 Connector Roles, 163 5.4 Connector Types and Their Variation Dimensions, 164 5.4.1 Procedure Call Connectors, 165 5.4.2 Event Connectors, 166 5.4.3 Data Access Connectors, 167 5.4.4 Linkage Connectors, 168 5.4.5 Stream Connectors, 169 5.4.6 Arbitrator Connectors, 170 5.4.7 Adaptor Connectors, 170 5.4.8 Distributor Connectors, 171 5.5 Example Connectors, 172 5.5.1 Event-Based Data Distribution Connectors, 173 5.5.2 Grid-Based Data Distribution Connectors, 174 5.5.3 Client-Server–Based Data Distribution Connectors, 175 5.5.4 P2P-Based Data Distribution Connectors, 176 5.6 Using the Connector Framework, 176 5.6.1 Selecting Appropriate Connectors, 177 5.6.2 Detecting Mismatches, 180 5.7 End Matter, 181 5.8 Review Questions, 182 5.9 Exercises, 183 5.10 Further Reading, 183 6 Modeling 185 6.1 Modeling Concepts, 186 6.1.1 Stakeholder-Driven Modeling, 186 6.1.2 Basic Architectural Concepts, 188 6.1.3 Elements of the Architectural Style, 189 6.1.4 Static and Dynamic Aspects, 190 6.1.5 Functional and Non-Functional Aspects, 191 6.2 Ambiguity, Accuracy, and Precision, 191 6.2.1 Ambiguity, 192 6.2.2 Accuracy and Precision, 192 6.3 Complex Modeling: Mixed Content and Multiple Views, 194 6.3.1 Views and Viewpoints, 194 6.3.2 Consistency among Views, 196 6.4 Evaluating Modeling Techniques, 198 6.5 Specific Modeling Techniques, 199 6.5.1 Generic Techniques, 199 6.5.2 Early Architecture Description Languages, 209 6.5.3 Domain- and Style-Specific ADLs, 221 6.5.4 Extensible ADLs, 229 6.6 When Systems Become Too Complex to Model, 242 6.7 End Matter, 243 6.8 Review Questions, 246 6.9 Exercises, 246 6.10 Further Reading, 246 7 Visualization 249 7.1 Visualization Concepts, 250 7.1.1 Canonical Visualizations, 250 7.1.2 Textual Visualizations, 251 7.1.3 Graphical Visualizations, 253 7.1.4 Hybrid Visualizations, 255 7.1.5 The Relationship between Visualizations and Views, 255 7.2 Evaluating Visualizations, 259 7.2.2 Constructing a Visualization, 261 7.2.3 Coordinating Visualizations, 264 7.2.4 Beyond Design: Using Visualization Dynamically, 266 7.3 Common Issues in Visualization, 268 7.3.1 Same Symbol, Different Meaning, 268 7.3.2 Differences without Meaning, 269 7.3.3 Decorations without Meaning, 269 7.3.4 Borrowed Symbol, Different Meaning, 270 7.4 Evaluating Visualization Techniques, 272 7.5 Techniques, 272 7.5.1 Textual Visualizations, 272 7.5.2 Informal Graphical Editors, 274 7.5.3 UML: The Unified Modeling Language, 276 7.5.4 Rapide, 280 7.5.5 The Labeled Transition State Analyzer (LTSA), 282 7.5.6 xADL 2.0, 284 7.6 End Matter, 288 7.7 Review Questions, 289 7.8 Exercises, 290 7.9 Further Reading, 290 8 Analysis 291 8.1 Analysis Goals, 295 8.1.1 Completeness, 295 8.1.2 Consistency, 296 8.1.3 Compatibility, 302 8.1.4 Correctness, 303 8.2 Scope of Analysis, 303 8.2.1 Component- and Connector-Level Analysis, 304 8.2.2 Subsystem- and System-Level Analysis, 305 8.2.3 Data Exchanged in the System or Subsystem, 307 8.2.4 Architectures at Different Abstraction Levels, 308 8.2.5 Comparison of Two or More Architectures, 310 8.3 Architectural Concern being Analyzed, 310 8.4 Level of Formality of Architectural Models, 312 8.5 Type of Analysis, 313 8.6 Level of Automation, 314 8.7 System Stakeholders, 315 8.8 Analysis Techniques, 317 8.8.1 Inspections and Reviews, 317 8.8.2 Model-Based Analysis, 322 8.8.3 Simulation-Based Analysis, 328 8.9 End Matter, 333 8.10 Review Questions, 334 8.11 Exercises, 335 8.12 Further Reading, 336 9 Implementation 337 9.1 Concepts, 338 9.1.1 The Mapping Problem, 338 9.1.2 Architecture Implementation Frameworks, 340 9.1.3 Evaluating Frameworks, 343 9.1.4 Middleware, Component Models, and Application Frameworks, 343 9.1.5 Building a New Framework, 346 9.1.6 Concurrency, 347 9.1.7 Generative Technologies, 348 9.1.8 Ensuring Architecture-to-Implementation Consistency, 349 9.2 Existing Frameworks, 350 9.2.1 Frameworks for the Pipe-and-Filter Architectural Style, 350 9.2.2 Frameworks for the C2 Architectural Style, 352 9.3 Examples, 360 9.3.1 Implementing Lunar Lander in the Pipe-and-Filter Style using the java.io Framework, 360 9.3.2 Implementing Lunar Lander in the C2-Style Using the Lightweight C2 Framework, 366 9.4 End Matter, 377 9.5 Review Questions, 378 9.6 Exercises, 378 9.7 Further Reading, 379 10 Deployment and Mobility 381 10.1 Overview of Deployment and Mobility Challenges, 385 10.2 Software Architecture and Deployment, 387 10.2.1 Basic Concepts, 388 10.2.2 Deployment Activities, 388 10.2.3 Tool Support, 402 10.3 Software Architecture and Mobility, 405 10.3.1 Basic Concepts, 405 10.3.2 Mobility Paradigms, 405 10.3.3 Challenges in Migrating Code, 406 10.4 End Matter, 408 10.5 Review Questions, 409 10.6 Exercises, 409 10.7 Further Reading, 410 11 Applied Architectures and Styles 413 11.1 Distributed and Networked Architectures, 414 11.1.1 Limitations of the Distributed Systems Viewpoint, 415 11.2 Architectures for Network-Based Applications, 416 11.2.1 The REpresentational State Transfer Style (REST), 416 11.2.2 Commercial Internet-Scale Applications, 422 11.3 Decentralized Architectures, 424 11.3.1 Shared Resource Computation: The Grid World, 425 11.3.2 Peer-to-Peer Styles, 426 11.3.3 Summary Notes on Latency and Agency, 432 11.4 Service-Oriented Architectures and Web Services, 433 11.5 Architectures from Specific Domains, 437 11.5.1 Robotics, 437 11.5.2 Wireless Sensor Networks, 443 11.6 End Matter, 443 11.7 Review Questions, 445 11.8 Exercises, 445 11.9 Further Reading, 446 12 Designing for Non-Functional Properties 447 12.1 Efficiency, 450 12.1.1 Software Components and Efficiency, 451 12.1.2 Software Connectors and Efficiency, 453 12.1.3 Architectural Configurations and Efficiency, 455 12.2 Complexity, 459 12.2.1 Software Components and Complexity, 460 12.2.2 Software Connectors and Complexity, 463 12.2.3 Architectural Configurations and Complexity, 464 12.3 Scalability and Heterogeneity, 467 12.3.1 Software Components and Scalability, 468 12.3.2 Software Connectors and Scalability, 471 12.3.3 Architectural Configurations and Scalability, 473 12.4 Adaptability, 475 12.4.1 Software Components and Adaptability, 475 12.4.2 Software Connectors and Adaptability, 476 12.4.3 Architectural Configurations and Adaptability, 477 12.5 Dependability, 478 12.5.1 Software Components and Dependability, 480 12.5.2 Software Connectors and Dependability, 480 12.5.3 Architectural Configurations and Dependability, 481 12.6 End Matter, 483 12.7 Review Questions, 484 12.8 Exercises, 484 12.9 Further Reading, 485 13 Security and Trust 487 13.1 Security, 489 13.2 Design Principles, 492 13.3 Architectural Access Control, 497 13.3.1 Access Control Models, 498 13.3.2 Connector-Centric Architectural Access Control, 499 13.4 Trust Management, 508 13.4.1 Trust, 509 13.4.2 Trust Model, 510 13.4.3 Reputation-Based Systems, 510 13.4.4 Architectural Approach to Decentralized Trust Management, 514 13.5 End Matter, 522 13.6 Review Questions, 523 13.7 Exercises, 523 13.8 Further Reading, 524 14 Architectural Adaptation 525 14.1 Concepts of Architecture-Centric Adaptation, 526 14.1.1 Sources and Motivations for Change, 526 14.1.2 Shearing Layers, 529 14.1.3 Structural Elements Subject to Change, 532 14.1.4 Change Agents and Context, 535 14.1.5 Architecture: The Central Abstraction, 539 14.2 A Conceptual Framework for Architectural Adaptation, 539 14.3 Techniques for Supporting Architecture-Centric Change, 542 14.3.1 Basic Techniques Corresponding to Activities of the Conceptual Framework, 542 14.3.2 Architectures/Styles that Support Adaptation, 551 14.3.3 The Special Problems of On-the-Fly and Autonomous Adaptation, 557 14.4 End Matter, 561 14.5 Review Questions, 562 14.6 Exercises, 563 14.7 Further Reading, 563 15 Domain-Specific Software Engineering 565 15.1 Domain-Specific Software Engineering in a Nutshell, 570 15.1.1 Similar Problems, Similar Solutions, 570 15.1.2 Viewing DSSE through the Prism of Domain, Business, and Technology, 573 15.2 Domain-Specific Software Architecture, 574 15.2.1 Domain Knowledge, 574 15.2.2 Canonical Requirements, 585 15.2.3 Canonical Solution Strategies—Reference Architectures, 588 15.2.4 Product Lines and Architecture, 591 15.2.5 Product-Line Concepts, 592 15.2.6 Specifying the Architecture of a Product Line, 594 15.2.7 Capturing Variations over Time, 559 15.2.8 Using Product Lines as Tools for What-If Analysis, 600 15.2.9 Implementing Product Lines, 602 15.2.10 Unifying Product Architectures with Different Intellectual Heritage, 604 15.2.11 Organizational Issues in Creating and Managing Product Lines, 606 15.3 DSSAs, Product Lines, and Architectural Styles, 606 15.4 DSSE Examples, 608 15.4.1 Koala and Consumer Electronics, 608 15.4.2 Software-Defined Radios, 611 15.5 End Matter, 616 15.6 Review Questions, 618 15.7 Exercises, 618 15.8 Further Reading, 619 16 Standards 621 16.1 What Are Standards?, 622 16.1.1 Why Use Standards?, 623 16.1.2 Drawbacks of Standards, 624 16.1.3 When to Adopt, 625 16.2 Specific Standards, 627 16.2.1 Conceptual Standards, 627 16.2.2 Notational Standards, 639 16.2.3 SysML, 641 16.2.4 Standard Tools, 645 16.2.5 Telelogic System Architect, 647 16.3 Process Standards, 648 16.3.1 Rational Unified Process, 648 16.3.2 Model-Driven Architecture, 650 16.4 End Matter, 651 16.5 Review Questions, 653 16.6 Exercises, 653 16.7 Further Reading, 654 17 People, Roles, and Teams 655 17.1 Who Are Software Architects?, 657 17.1.1 Architect as a Software Designer, 658 17.1.2 Architect as a Domain Expert, 658 17.1.3 Architect as a Software Technologist, 659 17.1.4 Architect as a Standards Compliance Expert, 660 17.1.5 Architect as a Software Engineering Economist, 661 17.1.6 Some Bad Habits, 661 17.2 What Do Software Architects Do?, 663 17.2.1 Develop Project Strategy, 663 17.2.2 Design Systems, 664 17.2.3 Communicate with Stakeholders, 664 17.2.4 Lead, 664 17.3 How Do Software Architects Work?, 665 17.3.1 Balance of Skills, 665 17.3.2 Allegiance to the Project, 666 17.3.3 Allegiance to the Organization, 667 17.3.4 Duration of Involvement, 668 17.3.5 Team Structure, 669 17.4 How Do Software Architects Relate to Other Stakeholders?, 669 17.4.1 Architects and Engineers, 670 17.4.2 Architects and Managers, 671 17.4.3 Other Stakeholders, 671 17.5 Remaining Challenges, 673 17.6 End Matter, 673 17.7 Review Questions, 674 17.8 Further Reading, 674 Bibliography 675 Index 691
£131.35
Wiley Analysis of DNA Microarrays
Book SynopsisThe rapid uncontrolled growth of classification methods in DNA microarray studies has resulted in a body of information scattered throughout literature, numerous conference proceedings, and others. This book brings together many of the unsupervised and supervised classification methods now dispersed in the literature.
£83.66
John Wiley & Sons Inc ServiceOriented Architecture Governance for the
Book SynopsisA must-have guide for all companies undertaking service-oriented architecture (SOA) and IT governance Service-Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance, security, and technology facets of SOA and IT governance. This book provides a comprehensive enterprise view of governance from a strategic and tactical perspective, as well as modeling and planning tools to help evolve a company''s ongoing governance requirements. Written by Eric Marks and the industry''s leading SOA authorities, this essential book provides a refreshing business-driven perspective to SOA and IT governance.Table of ContentsPreface. Acknowledgments. CHAPTER 1: The SOA Governance Imperative. The Inevitable SOA Trend. Introduction to Governance. Introduction to Enterprise SOA Governance. Governance and Resource Management and Allocation. Do Not Confuse Governance with Management. Governance Is About Results and Appropriate Use of Resources. Information Technology Governance. IT Process Frameworks: ITIL, COBIT, CMMI, and Others. IT Governance Approaches. Who Are the SOA Stakeholders? Addressing SOA Stakeholder Biases. SOA Governance Impacts IT Governance and Enterprise Architecture. SOA Governance Requirements Vary by SOA Maturity. SOA Bill of Rights. Pursue the ‘‘Right’’ SOA Strategy. Apply SOA to the "Right" Challenges. Identify and Build the "Right" Services. Build Your Services the "Right" Way (Design-Time Governance). Get Your SOA Tools Platform "Right" Create the "Right" Organizational, Cultural, and Behavioral Model. Achieve the ‘‘Right’’ SOA Results. Establish the "Right" SOA Governance Model and Policies. Common SOA Governance Mistakes. Right-Sized SOA Governance: How Much Governance Do We Need? Summary. CHAPTER 2: SOA Governance Reference Model. Why an SOA Governance Reference Model? Elements of the SOA Governance Reference Model. Decomposing the SOA Governance Reference Model. SOA Environmental Dimensions. Applying the SOA Governance Reference Model. Summary. CHAPTER 3: Four Tiers of SOA Governance. Expanded Four Tiers of Governance. Tier 1: Enterprise/Strategic Governance Tier. Tier 2: SOA Operating Model Governance Tier. Tier 3: SOA and Services Development Lifecycle Tier. Tier 4: SOA Governance Enabling Technology Tier. Summary. CHAPTER 4: Organizing Your SOA Governance Toolkit. SOA Governance Assessment Tools. SOA Maturity Assessments. Governance Model Design Tools. Policy Model. Governance and Policy Enforcement Model. Governance Execution Model. Summary. CHAPTER 5: SOA Governance Model Design Process. Governance Model Design Prerequisites. Governance Model Validation, Refinement, and Implementation Planning. SOA Governance Model Design Framework Checklist. Summary. CHAPTER 6: SOA Governance Goals, Principles, and Policies. Overview of the Goals–Principles–Policy Cycle. SOA Strategy and SOA Goals. SOA Governance Goals. Turning SOA Goals into SOA Principles. Deriving SOA Governance Principles. SOA Governance Policies. Introduction to Policies. What Policies Are Required? Suggested Policy Definition Process. Decoupling Policies from Services. Identifying Technical Policies. Toward an Integrated Model of SOA Policies. Policy Taxonomy and Vocabulary. Policy Granularity. Multi-Level or Multi-Tiered Policies. Vertical and Horizontal Policy Enforcement. Policy Enforcement Models: Manual, Technology-Assisted, and Automated. Policy Categories Determine Policy Enforcement Mechanisms. Governance Threads and Governance Process Orchestration. Barriers to a Unified Policy Model. Integrated Policy Enforcement Model. Barriers to Integrated Policy Enforcement Models. Policy Provisioning Model (and Process). SOA Goals, Principle, and Policy Management. Transforming SOA Policies into Behavioral Norms. Summary. CHAPTER 7: SOA Governance Organizational Models. First Things First: Understand Your Current Organizational Structure. Conway’s Law and Enterprise SOA Governance. Marks’s Law? Organization Reflects Funding. Organizational Analysis Steps. Purpose of the SOA Governance Organization. Governance Organization Patterns and Best Practices. Other SOA Governance Board Considerations. Specific Governance Organizational Models to Consider. Federated Organizational Models. SOA Governance for Federated IT Models. Best Practice SOA Governance Organizational Roadmap. SOA Governance Organizational Modeling Steps. SOA Governance Organizational Roadmap. SOA Governance Organizational Model Summary. SOA Governance Organizational Model by SOA Adoption Phase. Summary. CHAPTER 8: SOA and Services Lifecycle Governance. Lifecycle Governance Matrix. Lifecycle Governance Tools and Platforms. Production versus Consumption Perspective. Service Reusability. Governance Gaps in a Typical Enterprise. Service Lifecycle Governance Best Practices. Summary. CHAPTER 9: SOA Governance Enabling Technology and Tools. Policy Management Model (PMM). Policy Enforcement Model (PEM). Policy Provisioning Model (PPM). Introduction to the Governance Technical Reference Model. Technology and Standards of SOA Governance and Policies. Design Time. QA and Testing. Publishing and Discovery. Run Time. Battle for Control of SOA Technology Governance. Summary. CHAPTER 10: SOA Governance and Beyond. Governance as a Strategic Competency. Governance Beyond Policies and Edicts. Evolving Governance: Policies to Norms to Culture. Community Models for Governance: Open Source as a Guide. Governance Open Source Style. Governance of the Internet: The Mac Daddy of Communities. Integrating Governance Paradigms. Governance Performance Management: A Necessary Discipline. Creation of an Enterprise Governance Executive. Separation of Enterprise and IT Governance from the PMO. Plan for the Structural Accordion: Centralized to Decentralized to Centralized Again. Governance Going Forward: The Way Ahead. Develop a Unified Model of Policies. Integrated Policy Enforcement Models. Development of Governance Collaboration Tools. "That Governance Is Best that Governs Best with Least" Summary. Index.
£45.00
John Wiley & Sons Inc Writing Compilers and Interpreters
Book SynopsisLong-awaited revision to a unique guide that covers both compilers and interpreters Revised, updated, and now focusing on Java instead of C++, this long-awaited, latest edition of this popular book teaches programmers and software engineering students how to write compilers and interpreters using Java. You?ll write compilers and interpreters as case studies, generating general assembly code for a Java Virtual Machine that takes advantage of the Java Collections Framework to shorten and simplify the code. In addition, coverage includes Java Collections Framework, UML modeling, object-oriented programming with design patterns, working with XML intermediate code, and more.Table of ContentsIntroduction xxi Chapter 1 Introduction 1 Goals and Approach 1 What Are Compilers and Interpreters? 2 Comparing Compilers and Interpreters 4 The Picture Gets a Bit Fuzzy 5 Why Study Compiler Writing? 6 Conceptual Design 6 Syntax and Semantics 8 Lexical, Syntax, and Semantic Analyses 10 Chapter 2 Framework I: Compiler and Interpreter 11 Goals and Approach 11 Language-Independent Framework Components 12 Front End 13 Parser 16 Intermediate Tier 34 Back End 36 Pascal-Specific Front End Components 37 Pascal Parser 37 Pascal Scanner 39 A Front End Factory 41 Initial Back End Implementations 43 Interpreter 44 A Back End Factory 45 Program 2: Program Listings 46 Chapter 3 Scanning 55 Goals and Approach 55 Program 3: Pascal Tokenizer 57 Syntax Error Handling 65 How to Scan for Tokens 72 A Pascal Scanner 75 Pascal Tokens 77 Syntax Diagrams 80 Word Tokens 81 String Tokens 82 Special Symbol Tokens 85 Number Tokens 88 Chapter 4 The Symbol Table 97 Goals and Approach 97 Symbol Table Conceptual Design 98 The Symbol Table Stack 98 Symbol Table Interfaces 100 A Symbol Table Factory 105 Symbol Table Implementation 107 Program 4: Pascal Cross-Referencer I 113 Chapter 5 Parsing Expressions and Assignment Statements 121 Goals and Approach 121 Syntax Diagrams 122 Intermediate Code Conceptual Design 125 Intermediate Code Interfaces 126 An Intermediate Code Factory 129 Intermediate Code Implementation 130 Printing Parse Trees 135 Parsing Pascal Statements and Expressions 141 Parsing Statements 145 Parsing the Compound Statement 148 Parsing the Assignment Statement 149 Parsing Expressions 151 Program 5: Pascal Syntax Checker I 161 Chapter 6 Interpreting Expressions and Assignment Statements 167 Goals and Approach 167 Runtime Error Handling 168 Executing Assignment Statements and Expressions 170 The Statement Executor Subclasses 170 Executing Statements 173 Executing the Compound Statement 175 Executing the Assignment Statement 175 Executing Expressions 177 Program 6: Simple Interpreter I 184 Chapter 7 Parsing Control Statements 189 Goals and Approach 189 Syntax Diagrams 190 Error Recovery 191 Program 7: Syntax Checker Ii 192 Control Statement Parsers 193 Parsing Pascal Control Statements 198 Parsing the REPEAT Statement 198 Parsing the WHILE Statement 202 Parsing the FOR Statement 207 Parsing the IF Statement 214 Parsing the CASE Statement 219 Chapter 8 Interpreting Control Statements 233 Goals and Approach 233 Program 8: Simple Interpreter Ii 233 Interpreting Control Statements 234 Executing a Looping Statement 236 Executing the IF Statement 240 Executing the SELECT Statement 241 An Optimized SELECT Executor 245 Chapter 9 Parsing Declarations 249 Goals and Approach 249 Pascal Declarations 250 Types and the Symbol Table 253 Type Specification Interfaces 253 Pascal Type Specification Implementation 255 A Type Factory 260 Scope and the Symbol Table Stack 261 How Identifiers Are Defined 266 Predefined Types and Constants 268 Parsing Pascal Declarations 271 Parsing Constant Definitions 277 Parsing Type Definitions and Type Specifications 283 Parsing Variable Declarations 301 Program 9: Pascal Cross-referencer II 306 Chapter 10 Type Checking 331 Goals and Approach 331 Type Checking 331 Type Checking Expressions 335 Type Checking Control Statements 350 Program 10: Pascal Syntax Checker III 358 Chapter 11 Parsing Programs, Procedures, and Functions 371 Goals and Approach 371 Program, Procedure, and Function Declarations 372 Nested Scopes and the Symbol Table Stack 375 New Declarations Parser Subclasses 378 Parsing a Program Declaration 382 Parsing Procedure and Function Declarations 382 Formal Parameter Lists 388 Parsing Procedure and Function Calls 394 Calls to Declared Procedures and Functions 398 Calls to the Standard Procedures and Functions 400 Actual Parameter Lists 408 Program 11: Pascal Syntax Checker IV 418 Chapter 12 Interpreting Pascal Programs 431 Goals and Approach 431 Runtime Memory Management 432 The Runtime Stack and Activation Records 432 The Runtime Display 436 Recursive Calls 439 Memory Management Interfaces and Implementation 440 The Memory Factory 459 Executing Statements and Expressions 460 The Executor Superclass 461 The Statement Executor 462 The Assignment and Expression Executors 469 Executing Procedure and Function Calls 478 Parameter Passing 478 Calling Procedures and Functions 478 Program 12-1: Pascal Interpreter 493 Chapter 13 An Interactive Source-Level Debugger 501 Goals and Approach 501 Machine-Level vs. Source-Level Debugging 502 Debugger Architecture 503 Runtime Data Input vs. Debugger Command Input 514 Creating a Command-Line Debugger 516 A Simple Command Language 517 Displaying Values 522 Parsing Variable Names 525 Executing Commands 529 Program 13-1: Command-Line Source-Level Debugger 540 Chapter 14 Framework II: An Integrated Development Environment (IDE) 543 Goals and Approach 544 The IDE Window 544 The Edit Window 545 The Debug Window 545 The Call Stack Window 547 The Console Window 548 Program 14: Pascal IDE 548 The IDE Process and the Debugger Process 549 The IDE Framework 549 Interprocess Communication 550 The Control Interface 560 The Debugger Process 566 Chapter 15 Jasmin Assembly Language and Code Generation for the Java Virtual Machine 577 Goals and Approach 577 Organization of the Java Virtual Machine 578 The Class Area 578 The Heap Area 579 The Java Runtime Stack 579 JVM Limitations 580 The Jasmin Assembly Language 581 Assembly Statements 581 Program Structure 593 Emitting Instructions 604 Load and Store Instructions 607 Data Manipulation Instructions 617 Control Instructions 620 Remaining Code Generation Methods 623 Chapter 16 Compiling Programs, Assignment Statements, and Expressions 625 Goals and Approach 625 Compiling Programs 626 Program Header 627 Class Constructor 627 Fields 627 Main Method 628 Code Generator Subclasses 629 Compiling Procedures and Functions 635 Parser and Symbol Table Changes 637 Generating Code for Procedures and Functions 639 Compiling Assignment Statements and Expressions 643 The Statement Code Generator 643 The Compound Statement Code Generator 645 The Assignment Statement Code Generator 646 The Expression Code Generator 648 The Pascal Runtime Library 655 Range Checking 655 Pascal Text Input 656 Building the Library 657 Program 16-1: Pascal Compiler I 657 Chapter 17 Compiling Procedure and Function Calls and String Operations 661 Goals and Approach 661 Compiling Procedure and Function Calls 662 Value Parameters and VAR Parameters 664 Calls to Declared Procedures and Functions 666 Calls to the Standard Procedures and Functions 678 The Pascal Runtime Library 691 Pascal Input Text 692 Building the Library 697 Compiling Strings and String Assignments 698 Allocating String Variables 698 String Assignments 701 String Comparisons 705 Program 17-1: Pascal Compiler II 711 Chapter 18 Compiling Control Statements, Arrays, and Records 719 Goals and Approach 719 Compiling Control Statements 719 Looping Statements 720 The IF Statement 730 The SELECT Statement 735 Compiling Arrays and Subscripted Variables 744 Allocating Memory for Arrays 744 Subscripted Variables in Expressions and Assignments 757 Compiling Records and Record Fields 767 Allocating Records 768 Record Fields in Expressions and Assignments 772 Program 18-1: Pascal Compiler III 777 Chapter 19 Additional Topics 791 Scanning 791 Deterministic Finite Automata (DFA) 791 Table-Driven Scanners 793 Syntax Notation 796 Backus-Naur Form (BNF) 796 Extended BNF (EBNF) 797 Grammars and Languages 797 Parsing 798 Top-Down Parsers 798 Bottom-Up Parsers 798 Context-Free and Context-Sensitive Grammars 800 Code Generation 800 Instruction Selection 800 Instruction Scheduling 801 Register Allocation 803 Code Optimization 803 Debugging Compilers and Optimizing Compilers 804 Speed Optimizations 804 Runtime Memory Management 807 Heap and Stack 807 Garbage Collection 808 Compiling Object-Oriented Languages 809 Method Overloading and Name Mangling 809 Inheritance 810 Virtual Methods 810 Compiler-Compilers 811 JavaCC 811 Lex and Yacc 813 Index 817
£61.20
John Wiley and Sons Ltd Wiley Pathways Introduction to Database
Book Synopsis
£133.20
John Wiley & Sons Inc The Data Model Resource Book
Book SynopsisThis third volume of the best-selling Data Model Resource Book series revolutionizes the data modeling discipline by answering the question How can you save significant time while improving the quality of any type of data modeling effort? In contrast to the first two volumes, this new volume focuses on the fundamental, underlying patterns that affect over 50 percent of most data modeling efforts. These patterns can be used to considerably reduce modeling time and cost, to jump-start data modeling efforts, as standards and guidelines to increase data model consistency and quality, and as an objective source against which an enterprise can evaluate data models. Table of ContentsForeword xxv Chapter 1 Introduction 1 Why Is There a Need for This Book? 1 Extending the Discipline of Data Modeling 4 What Is a Pattern and What Is a Universal Pattern? 5 What Is the Significance of Patterns? 6 Approach of This Book 6 The Different Pattern Levels 7 Who Is the Intended Audience for This Book? 14 What Is in This Book 15 Other Patterns for Data Modeling 17 Conventions and Standards Used in This Book 18 Entities 18 Subtypes and Supertypes 19 Attributes 20 Relationships 22 Relationship Optionality 23 Relationship Cardinality 25 Foreign Key Relationships 26 Associative Entities to Handle Many-to-Many Relationships 26 Exclusive Arcs 27 Example Data in Illustration Tables 28 Data Modeling Notation 29 Summary 33 References 33 Chapter 2 Setting Up Roles: What Parties Do 35 What Is the Significance of This Type of Pattern? 36 What Is in This Chapter? 36 What Is a Declarative Role? 37 Level 1 Declarative Role Pattern 38 Why Do We Need This Pattern? 40 How Does This Pattern Work? 41 When Should This Pattern Be Used? 44 What Are the Weaknesses of the Pattern? 45 Synopsis 46 Level 2 Declarative Role Pattern 47 Why Do We Need This Pattern? 48 How Does This Pattern Work? 48 When Should This Pattern Be Used? 53 What Are the Weaknesses of the Pattern? 54 Synopsis 55 Level 3 Declarative Role Pattern 56 Why Do We Need This Pattern? 56 How Does This Pattern Work? 57 When Should This Pattern Be Used? 63 What Are the Weaknesses of the Pattern? 64 Synopsis 65 Summary of Patterns 65 References 69 Chapter 3 Using Roles: How Parties Are Involved 71 What Is the Significance of This Type of Pattern? 72 What Is in This Chapter? 72 What Is a Contextual Role? 73 Level 1 Contextual Role Pattern, Attributes 74 Why Do We Need This Pattern? 74 How Does This Pattern Work? 76 When Should This Pattern Be Used? 78 What Are the Weaknesses of the Pattern? 79 Synopsis 80 Level 1 Contextual Role Pattern, Relationships 80 Why Do We Need This Pattern? 81 How Does This Pattern Work? 81 When Should This Pattern Be Used? 87 What Are the Weaknesses of the Pattern? 87 Synopsis 88 Level 2 Contextual Role Pattern 88 Why Do We Need This Pattern? 89 How Does This Pattern Work? 89 When Should This Pattern Be Used? 97 What Are the Weaknesses of the Pattern? 98 Synopsis 99 Level 2 Contextual Role Pattern, PARTY Only Alternative 99 Why Do We Need This Pattern? 100 How Does This Pattern Work? 100 When Should This Pattern Be Used? 106 What Are the Weaknesses of the Pattern? 106 Synopsis 107 Level 3 Contextual Role Pattern 107 Why Do We Need This Pattern? 108 How Does This Pattern Work? 108 When Should This Pattern Be Used? 114 What Are the Weaknesses of the Pattern? 115 Synopsis 116 Hybrid Contextual Role Pattern 117 Why Do We Need This Pattern? 117 How Does This Pattern Work? 118 When Should This Pattern Be Used? 123 What Are the Weaknesses of the Pattern? 123 Synopsis 124 Summary of Patterns 124 References 131 Chapter 4 Hierarchies, Aggregations, and Peer-to-Peer Relationships: The Organization of Similar Data 133 What Is the Significance of This Type of Pattern? 133 What Is in This Chapter? 134 What Is a Recursive Relationship and How Is Data Organized by Recursive Relationships? 134 Level 1 Recursive Pattern 138 Why Do We Need This Pattern? 138 How Does This Pattern Work? 139 When Should This Pattern Be Used? 144 What Are the Weaknesses of the Pattern? 145 Synopsis 145 Level 2 Recursive Pattern 146 Why Do We Need This Pattern? 146 How Does This Pattern Work? 147 When Should This Pattern Be Used? 152 What Are the Weaknesses of the Pattern? 153 Synopsis 154 Level 2 Expanded Recursive Pattern 155 Why Do We Need This Pattern? 155 How Does This Pattern Work? 156 When Should This Pattern Be Used? 162 What Are the Weaknesses of the Pattern? 162 Synopsis 163 Level 3 Recursive Pattern 164 Why Do We Need This Pattern? 165 How Does This Pattern Work? 165 When Should This Pattern Be Used? 170 What Are the Weaknesses of the Pattern? 171 Synopsis 172 Level 3 Recursive Pattern with Rules 173 Why Do We Need This Pattern? 173 How Does This Pattern Work? 174 When Should This Pattern Be Used? 179 What Are the Weaknesses of the Pattern? 180 Synopsis 180 Summary of Patterns 180 References 186 Chapter 5 Types and Categories: the Classification of Data 187 What Is the Significance of This Type of Pattern? 187 What Is in This Chapter? 188 What Are Types, Categorizations, and Taxonomies? 189 Level 1 Classification Pattern 190 Why Do We Need This Pattern? 190 How Does This Pattern Work? 190 When Should This Pattern Be Used? 195 What Are the Weaknesses of the Pattern? 196 Synopsis 197 Level 2 Classification Pattern 197 Why Do We Need This Pattern? 197 How Does This Pattern Work? 198 When Should This Pattern Be Used? 205 What Are the Weaknesses of the Pattern? 206 Synopsis 207 Level 3 Classification Pattern 208 Why Do We Need This Pattern? 208 How Does This Pattern Work? 208 When Should This Pattern Be Used? 219 What Are the Weaknesses of the Pattern? 220 Synopsis 221 Level 3 Classification Pattern with Rollups and Schemes 222 Why Do We Need This Pattern? 222 How Does This Pattern Work? 223 When Should This Pattern Be Used? 229 What Are the Weaknesses of the Pattern? 230 Synopsis 230 Summary of Patterns 230 References 235 Chapter 6 Status: The States of Data 237 What Is the Significance of This Type of Pattern? 238 What Is in This Chapter? 239 What Is a Status? 240 Level 1 Status Pattern 244 Why Do We Need This Pattern? 245 How Does This Pattern Work? 246 When Should This Pattern Be Used? 251 What Are the Weaknesses of the Pattern? 253 Synopsis 253 Level 2 Status Pattern, Current Status 254 Why Do We Need This Pattern? 255 How Does This Pattern Work? 255 When Should This Pattern Be Used? 260 What Are the Weaknesses of the Pattern? 260 Synopsis 261 Level 3 Status Pattern 261 Why Do We Need This Pattern? 261 How Does This Pattern Work? 262 When Should This Pattern Be Used? 267 What Are the Weaknesses of the Pattern? 267 Synopsis 268 Level 4 Status Pattern 269 Why Do We Need This Pattern? 269 How Does This Pattern Work? 269 When Should This Pattern Be Used? 277 What Are the Weaknesses of the Pattern? 278 Synopsis 279 Status Category Pattern 280 Why Do We Need This Pattern? 280 How Does This Pattern Work? 280 When Should This Pattern Be Used? 282 What Are the Weaknesses of the Pattern? 285 Synopsis 285 Status Type with Multi Rollup and Rules Pattern 286 Why Do We Need This Pattern? 286 How Does This Pattern Work? 287 When Should This Pattern Be Used? 293 What Are the Weaknesses of the Pattern? 294 Synopsis 294 Summary of Patterns 294 References 301 Chapter 7 Contact Mechanisms: How to Get in Touch 303 What Is the Significance of This Type of Pattern? 303 What Is in This Chapter? 304 What Is a Contact Mechanism? 305 Level 1 Contact Mechanism Pattern 308 Why Do We Need This Pattern? 309 How Does This Pattern Work? 310 When Should This Pattern Be Used? 321 What Are the Weaknesses of the Pattern? 322 Synopsis 323 Level 2 Contact Mechanism Pattern 324 Why Do We Need This Pattern? 325 How Does This Pattern Work? 325 When Should This Pattern Be Used? 342 What Are the Weaknesses of the Pattern? 343 Synopsis 344 Level 3 Contact Mechanism Pattern 345 Why Do We Need This Pattern? 346 How Does This Pattern Work? 346 When Should This Pattern Be Used? 361 What Are the Weaknesses of the Pattern? 361 Synopsis 362 Level 4 Contact Mechanism Pattern 364 Why Do We Need This Pattern? 364 How Does This Pattern Work? 364 When Should This Pattern Be Used? 378 What Are the Weaknesses of the Pattern? 378 Synopsis 379 Contact Mechanism Pattern with Geographic Boundary 380 Why Do We Need This Pattern? 381 How Does This Pattern Work? 384 When Should This Pattern Be Used? 389 What Are the Weaknesses of the Pattern? 390 Synopsis 390 Contact Mechanism with Flexible Address Parts Pattern 391 Why Do We Need This Pattern? 393 How Does This Pattern Work? 394 When Should This Pattern Be Used? 398 What Are the Weaknesses of the Pattern? 398 Synopsis 399 Other Common Contact Mechanism Data 399 Non-Solicitation 400 Instructions 401 Directions 402 Telephone Extensions 402 Synopsis 403 Summary of Patterns 403 References 410 Chapter 8 Business Rules: How Things Should Work 411 What Is the Significance of This Type of Pattern? 411 What Is in This Chapter? 414 What Is a Business Rule? 415 Level 2 Business Rules Pattern 417 Why Do We Need This Pattern? 417 How Does This Pattern Work? 419 When Should This Pattern Be Used? 442 What Are the Weaknesses of the Pattern? 444 Synopsis 444 Level 3 Business Rules Pattern 446 Why Do We Need This Pattern? 446 How Does This Pattern Work? 447 When Should This Pattern Be Used? 460 What Are the Weaknesses of the Pattern? 461 Synopsis 461 Business Rules with Party Roles 462 Why Do We Need This Pattern? 462 How Do These Patterns Work? 463 When Should This Pattern Be Used? 465 What Are the Weaknesses of the Pattern? 465 Synopsis 465 Summary of Patterns 465 References 468 Chapter 9 Using the Patterns 469 What Is in This Chapter? 470 The Scenario 471 Prototype Models, Scope Statements 472 The Scenario for These Models 472 How Do These Models Work? 473 Why Do We Do It This Way? 478 What Are the Strengths of Using Patterns for the Solution? 481 What Are the Weaknesses of Using Patterns for the Solution? 482 Synopsis 483 Application Data Models 483 The Scenario for This Model 484 How Do These Models Work? 484 Why Do We Do It This Way? 488 What Are the Strengths of Using Patterns for the Solution? 490 What Are the Weaknesses of Using Patterns for the Solution? 491 Synopsis 492 Enterprise Data Models 492 The Scenario for This Model 495 How Do These Models Work? 498 Why Do We Do It This Way? 501 What Are the Strengths of Using Patterns for the Solution? 501 What Are the Weaknesses of Using Patterns for the Solution? 502 Synopsis 502 Data Warehouse Models 503 The Scenario for This Model 504 Data Warehouse Data Models — Relational Approach 506 How Do These Models Work? 507 Why Do We Do It This Way? 513 What Are the Strengths of Using Patterns for the Solution? 514 What Are the Weaknesses of Using Patterns for the Solution? 515 Synopsis 515 Data Warehouse/Data Mart Data Models — Star Schemas 516 How Do These Models Work? 516 Why Do We Do It This Way? 527 What Are the Strengths of Using Patterns for the Solution? 528 What Are the Weaknesses of Using Patterns for the Solution? 529 Synopsis 530 Master Data Management 530 The Scenario for This Model 530 How Does This Model Work? 534 Why Do We Do It This Way? 543 What Are the Strengths of Using Patterns for the Solution? 544 What Are the Weaknesses of Using Patterns for the Solution? 545 Synopsis 545 Other Thoughts Regarding Using the Patterns 546 Physical Database Design 546 Other Applications for Patterns 547 Other Considerations When Using Generalized Patterns 547 Summary of Using the Patterns 548 References 552 Chapter 10 Socializing the Patterns 553 What Is the Significance of Socializing the Patterns? 554 What Is in This Chapter? 554 Experiences Using and Socializing These Patterns 555 What Makes the Difference In Socializing the Patterns? 558 Understanding Motivations — Why Would Someone Use or Not Use the Patterns? 559 Creating a Clear, Common, Compelling Purpose and Vision for Using the Patterns 566 Developing Trust so People Can Rely on the Patterns 569 Managing Resistance and/or Conflict Regarding Patterns 573 Other Comments about Socializing the Patterns 580 Patterns May Need to Be Socialized in Many Types of Circumstances 581 What about Upper-Level Management Commitment? 581 What Is the Return on Investment Regarding Using These Patterns? 582 Summary 584 References 585 Index 587
£54.00
John Wiley & Sons Inc Mimo Radar Signal Processing
Book SynopsisThe first book to present a systematic and coherent picture of MIMO radars Due to its potential to improve target detection and discrimination capability, Multiple-Input and Multiple-Output (MIMO) radar has generated significant attention and widespread interest in academia, industry, government labs, and funding agencies.Table of ContentsPREFACE. CONTRIBUTORS. 1 MIMO Radar — Diversity Means Superiority (Jian Li and Petre Stoica). 1.1 Introduction. 1.2 Problem Formulation. 1.3 Parameter Identifiability. 1.4 Nonparametric Adaptive Techniques for Parameter Estimation. 1.5 Parametric Techniques for Parameter Estimation. 1.6 Transmit Beampattern Designs. 1.7 Conclusions. Appendix IA Generalized Likelihood Ratio Test. Appendix 1B Lemma and Proof. Acknowledgments. References. 2 MIMO Radar: Concepts, Performance Enhancements, and Applications (Keith W. Forsythe and Daniel W. Bliss). 2.1 Introduction. 2.2 Notation. 2.3 MIMO Radar Virtual Aperture. 2.4 MIMO Radar in Clutter-Free Environments. 2.5 Optimality of MIMO Radar for Detection. 2.6 MIMO Radar with Moving Targets in Clutter: GMTI Radars. 2.7 Summary. Appendix 2A A Localization Principle. Appendix 2B Bounds on R(N). Appendix 2C An Operator Norm Inequality. Appendix 2D Negligible Terms. Appendix 2E Bound on Eigenvalues. Appendix 2F Some Inner Products. Appendix 2G An Invariant Inner Product. Appendix 2H Kro¨necker and Tensor Products. Acknowledgments. References. 3 Generalized MIMO Radar Ambiguity Functions (Geoffrey San Antonio, Daniel R. Fuhrmann, and Frank C. Robey). 3.1 Introduction. 3.2 Background. 3.3 MIMO Signal Model. 3.4 MIMO Parametric Channel Model. 3.5 MIMO Ambiguity Function. 3.6 Results and Examples. 3.7 Conclusion. References. 4 Performance Bounds and Techniques for Target Localization Using MIMO Radars (Joseph Tabrikian). 4.1 Introduction. 4.2 Problem Formulation. 4.3 Properties. 4.4 Target Localization. 4.5 Performance Lower Bound for Target Localization. 4.6 Simulation Results. 4.7 Discussion and Conclusions. Appendix 4A Log-Likelihood Derivation. Appendix 4B Transmit–Receive Pattern Derivation. Appendix 4C Fisher Information Matrix Derivation. References. 5 Adaptive Signal Design For MIMO Radars (Benjamin Friedlander). 5.1 Introduction. 5.2 Problem Formulation. 5.3 Estimation. 5.4 Detection. 5.5 MIMO Radar and Phased Arrays. Appendix 5A Theoretical SINR Calculation. References. 6 MIMO Radar Spacetime Adaptive Processing and Signal Design (Chun-Yang Chen and P. P. Vaidyanathan). 6.1 Introduction. 6.2 The Virtual Array Concept. 6.3 Spacetime Adaptive Processing in MIMO Radar. 6.4 Clutter Subspace in MIMO Radar. 6.5 New STAP Method for MIMO Radar. 6.6 Numerical Examples. 6.7 Signal Design of the STAP Radar System. 6.8 Conclusions. Acknowledgments. References. 7 Slow-Time MIMO SpaceTime Adaptive Processing (Vito F. Mecca, Dinesh Ramakrishnan, Frank C. Robey, and Jeffrey L. Krolik). 7.1 Introduction. 7.2 SIMO Radar Modeling and Processing. 7.3 Slow-Time MIMO Radar Modeling. 7.4 Slow-Time MIMO Radar Processing. 7.5 OTHr Propagation and Clutter Model. 7.6 Simulations Examples. 7.7 Conclusion. Acknowledgment. References. 8 MIMO as a Distributed Radar System (H. D. Griffiths, C. J. Baker, P. F. Sammartino, and M. Rangaswamy). 8.1 Introduction. 8.2 Systems. 8.3 Performance. 8.4 Conclusions. Acknowledgment. References. 9 Concepts and Applications of A MIMO Radar System with Widely Separated Antennas (Hana Godrich, Alexander M. Haimovich, and Rick S. Blum). 9.1 Background. 9.2 MIMO Radar Concept. 9.3 NonCoherent MIMO Radar Applications. 9.4 Coherent MIMO Radar Applications. 9.5 Chapter Summary. Appendix 9A Deriving the FIM. Appendix 9B Deriving the CRLB on the Location Estimate Error. Appendix 9C MLE of Time Delays — Error Statistics. Appendix 9D Deriving the Lowest GDOP for Special Cases. Acknowledgments. References. 10 SpaceTime Coding for MIMO Radar (Antonio De Maio and Marco Lops). 10.1 Introduction. 10.2 System Model. 10.3 Detection In MIMO Radars. 10.4 Spacetime Code Design. 10.5 The Interplay Between STC and Detection Performance. 10.6 Numerical Results. 10.7 Adaptive Implementation. 10.8 Conclusions. Acknowledgment. References. INDEX.
£126.85
John Wiley & Sons Inc Peachtree For Dummies
Book SynopsisNot feeling too peachy about computerizing your accounting system? Relax! Peachtree For Dummies, 3rd Edition will show you how to set up your company in Peachtree and then use it to pay bills, invoice customers, pay employees, produce financial reports, and more. You'll quickly discover how Peachtree can save you time, effort, and money so that you no longer have to do your accounting by hand or pay someone else to do it for you. Publishing to coincide with the latest release of Peachtree, this third edition is revised to cover the newest updates and enhancements made to the most recent version of Peachtree. Veteran authors Elaine Marmel and Diane Koers break down the capabilities of Peachtree Premium Accounting, from building an effective chart of accounts, to customizing forms and modifying reports, to setting up default information that will save you time down the line. You'll also discover how to: Work with purchase orders Sell Table of ContentsIntroduction. Part I: Getting Started. Chapter 1. Mastering Peachtree Basics. Chapter 2. Setting Up Your Company. Chapter 3. Designing the Cart of Accounts. Chapter 4. Setting Up Background Information. Part II: the Daily Drudge. Chapter 5. Buying Goods. Chapter 6. Payment Bills. Chapter 7. Selling Products and Services. Chapter 8. Collecting the Money. Chapter 9. Paid Employees Are Happy Employees. Chapter 10. Billing for Your Time. Chapter 11. Counting Your Stuff. Chapter 12. Tracking Project Costs. Part III: The Fancy Stuff. Chapter 13. Working with Forms. Chapter 14. Making Reports Work for You. Chapter 15. Reviewing the Financial Picture. Chapter 16. When the Bank Statement Arrives. Chapter 17. When Accounting Cycles End and Other Miscellaneous Stuff. Chapter 18. Keeping Your House Safe. Chapter 19. Real-Life Ways to Use Peachtree. Part IV: The Part of Tens. Chapter 20. Ten or So Common Peachtree Messages (And What You Can Do About Them). Chapter 21. ten or So Things You Can Get From the Web. Index.
£17.84
John Wiley & Sons Inc Digital Signal Processing Techniques and
Book SynopsisThis self contained reference text gives engineers insights into applying the DSP principles to solve the problems of radar imaging. Covers the development of new hardware (higher speed DSP, larger capacity with reduced cost memory, FPGA, ASIC) and the system architecture to impact the radar imaging processing.Table of ContentsPreface. List of Symbols. List of Illustrations. 1. Signal Theory and Analysis. 2. Discrete Time and Frequency Transformation. 3. Basics of Antenna Theory. 4. Fundamentals of Radar. 5. Radar Modulation and Target Detection Techniques. 6. Basics of Radar Imaging. 7. System Model and Data Acquisitions of SAR Image. 8. Range-Doppler Processing on SAR Images. 9. Stolt Interpolation Processing on SAR Images. Further Reading. Index.
£110.66