Computing Books

4324 products


  • Business Intelligence Practices Technologies and

    John Wiley & Sons Inc Business Intelligence Practices Technologies and

    3 in stock

    Book SynopsisBusiness professionals who want to advance their careers need to have a strong understanding of how to utilize business intelligence. This new book provides a comprehensive introduction to the basic business and technical concepts they ll need to know. It integrates case studies that demonstrate how to apply the material.Table of ContentsPreface. Acknowledgments. About the Authors. Part I Introduction to Business Intelligence. Chapter 1 Business Intelligence and Its Impacts. Chapter 2 Business Intelligence Capabilities. Part II Technologies Enabling Business Intelligence. Chapter 3 Technologies Enabling Organizational Memory. Chapter 4 Technologies Enabling Information Integration. Chapter 5 Technologies Enabling Insights and Decisions. Chapter 6 Technologies Enabling Presentation. Part III Management and Future of Business Intelligence. Chapter 7 Business Intelligence Tools and Vendors. Chapter 8 Development of Business Intelligence. Chapter 9 Management of Business Intelligence. Chapter 10 The Future of Business Intelligence.

    3 in stock

    £78.80

  • Software Performance and Scalability A

    John Wiley and Sons Ltd Software Performance and Scalability A

    15 in stock

    Book SynopsisGives the reader the ability to set up a proper test environment and conduct software performance and scalability tests. Uses many examples showing software performance problems and applicable solutions. Contains a number of case studies to assist the reader with comprehending all aspects of software performance and scalability.Table of ContentsPREFACE xv ACKNOWLEDGMENTS xxi Introduction 1 Performance versus Scalability 1 PART 1 THE BASICS 3 1. Hardware Platform 5 1.1 Turing Machine 6 1.2 von Neumann Machine 7 1.3 Zuse Machine 8 1.4 Intel Machine 9 1.5 Sun Machine 17 1.6 System Under Test 18 1.7 Odds Against Turing 30 1.8 Sizing Hardware 35 1.9 Summary 37 2. Software Platform 41 2.1 Software Stack 42 2.2 APIs 44 2.3 Multithreading 47 2.4 Categorizing Software 535 2.5 Enterprise Computing 55 2.6 Summary 63 3. Testing Software Performance and Scalability 65 3.1 Scope of Software Performance and Scalability Testing 67 3.2 Software Development Process 83 3.3 Defining Software Performance 86 3.4 Stochastic Nature of Software Performance Measurements 95 3.5 Amdahl’s Law 97 3.6 Software Performance and Scalability Factors 99 3.7 System Performance Counters 111 3.8 Software Performance Data Principles 129 3.9 Summary 131 PART 2 APPLYING QUEUING THEORY 135 4. Introduction to Queuing Theory 137 4.1 Queuing Concepts and Metrics 139 4.2 Introduction to Probability Theory 143 4.3 Applying Probability Theory to Queuing Systems 145 4.4 Queuing Models for Networked Queuing Systems 153 4.5 Summary 172 5. Case Study I: Queuing Theory Applied to SOA 177 5.1 Introduction to SOA 178 5.2 XML Web Services 179 5.3 The Analytical Model 181 5.4 Service Demand 183 5.5 MedRec Application 188 5.6 MedRec Deployment and Test Scenario 189 5.7 Test Results 191 5.8 Comparing the Model with the Measurements 198 5.9 Validity of the SOA Performance Model 200 5.10 Summary 200 6. Case Study II: Queuing Theory Applied to Optimizing and Tuning Software Performance and Scalability 205 6.1 Analyzing Software Performance and Scalability 207 6.2 Effective Optimization and Tuning Techniques 220 6.3 Balanced Queuing System 240 6.4 Summary 244 PART 3 APPLYING API PROFILING 249 7. Defining API Profiling Framework 251 7.1 Defense Lines Against Software Performance and Scalability Defects 252 7.2 Software Program Execution Stack 253 7.3 The PerfBasic API Profiling Framework 254 7.4 Summary 260 8. Enabling API Profiling Framework 263 8.1 Overall Structure 264 8.2 Global Parameters 265 8.3 Main Logic 266 8.4 Processing Files 266 8.5 Enabling Profiling 267 8.6 Processing Inner Classes 270 8.7 Processing Comments 271 8.8 Processing Method Begin 272 8.9 Processing Return Statements 274 8.10 Processing Method End 275 8.11 Processing Main Method 276 8.12 Test Program 277 8.13 Summary 279 9. Implementing API Profiling Framework 281 9.1 Graphics Tool—dot 281 9.2 Graphics Tool—ILOG 284 9.3 Graphics Resolution 286 9.4 Implementation 287 9.5 Summary 300 10. Case Study: Applying API Profiling to Solving Software Performance and Scalability Challenges 303 10.1 Enabling API Profiling 304 10.2 API Profiling with Standard Logs 313 10.3 API Profiling with Custom Logs 320 10.4 API Profiling with Combo Logs 325 10.5 Applying API Profiling to Solving Performance and Scalability Problems 333 10.6 Summary 337 APPENDIX A STOCHASTIC EQUILIBRIUM AND ERGODICITY 339 A.1 Basic Concepts 339 A.2 Classification of Random Processes 343 A.3 Discrete-Time Markov Chains 345 A.4 Continuous-Time Markov Chains 349 A.5 Stochastic Equilibrium and Ergodicity 351 A.6 Birth–Death Chains 357 APPENDIX B MEMORYLESS PROPERTY OF THE EXPONENTIAL DISTRIBUTION 361 APPENDIX C M/M/1 QUEUES AT STEADY STATE 363 C.1 Review of Birth–Death Chains 363 C.2 Utilization and Throughput 364 C.3 Average Queue Length in the System 365 C.4 Average System Time 365 C.5 Average Wait Time 366 INDEX 367

    15 in stock

    £87.26

  • Green Home Computing For Dummies

    Wiley Green Home Computing For Dummies

    15 in stock

    Book SynopsisMake your computer a green machine and live greener at home and at work Get on board the green machine! Green home computing means making the right technology choice for the environment, whether it be a Windows-based or Mac-based computer and all the peripherals.Table of ContentsIntroduction. Part I: Getting a Little Green Behind the Ears. Chapter 1: What Is Green Computing? Chapter 2: Checking Out Your Carbon Footprint. Chapter 3: The Straight Scoop on Power. Part II: Choosing Your Green PC Path. Chapter 4: Assessing What You've Got. Chapter 5: Giving Your Computer a Green Makeover. Chapter 6: Buying a Green Computer. Chapter 7: Choosing Earth-Friendly Peripherals. Chapter 8: Recycling Your Computer. Part III: Greener Under the Hood. Chapter 9: Optimize Your Computer Power Management. Chapter 10: Greening Mobile Devices. Chapter 11: Print Less, Breathe More. Chapter 12: Seamless Sharing across Systems. Part IV: Telecommuting, Teleconferencing, and Teleporting. Chapter 13: Making the Case for Telecommuting. Chapter 14: Telecomm Central: The Green Home Office. Chapter 15: Collaborating and Cloud Computing. Chapter 16: Making the Connection: Virtual Presence. Chapter 17: Your Green Small Business. Part V: The Part of Tens. Chapter 18: Ten Best Ways to Make Your Computer Greener. Chapter 19: Ten (Plus) Online Resources for Green Info, Action, and Products...351 Index.

    15 in stock

    £15.29

  • Green Gadgets For Dummies

    John Wiley & Sons Inc Green Gadgets For Dummies

    15 in stock

    Book SynopsisGreen gadgets encompass everything from iPods to energy-efficient home entertainment devices to solar laptop chargers and crank-powered gizmos. This book explains how to research green gadgets, make a smart purchasing decision, use products you already own in a more environmentally friendly way, and say goodbye to electronics that zap both energy.Table of ContentsForeword xix Introduction 1 About Green Gadgets For Dummies 1 Foolish Assumptions 2 Conventions Used in This Book 3 What You Don’t Have to Read 3 How This Book Is Organized 4 Part I: Settling into a Green Gadget Mindset 4 Part II: Getting Green with Gadgets You Own 4 Part III: Minimizing Your Computer’s Carbon Footprint 4 Part IV: Acquiring Green Gadgets and Gear 5 Part V: Ridding Yourself of Gadgets the Green Way 5 Part VI: The Part of Tens 5 The companion Web site 5 Icons Used in This Book 6 Where to Go from Here 6 Part I: Settling into a Green Gadget Mindset 7 Chapter 1: Mother Nature’s Green-Eyed View of Gadgets 9 Hey, Joe, Where You Goin’ with That Green Gadget in Your Hand? 10 Assessing “green” companies 12 Defining gadgets 14 Defining green gadgets 15 Relating the Four Rs to Green Gadgets 16 Following a Green Gadget’s Carbon Footprint 17 Thoughtful manufacturing 18 Ecofriendly features 19 Other green electronics 20 Understanding Energy Star and EPEAT Green Gadget Labels 22 Implementing Green Living Habits with Gadgets You Already Own 24 Taking a bite out of “energy vampires” 24 Calculating your gadgets’ carbon footprints 25 Taking other simple green gadget steps 26 Staying Informed about Green Gadget Developments 27 Chapter 2: Practicing Green Gadget Living 29 Evaluating Your Energy Waste, er, Usage 30 Reducing Your Gadgets’ Carbon Footprints and E-Waste 33 Reusing Your Gadgets and Electronics Gear 34 Recycling Gadgets the Green Way 35 Rethinking Your Gadget Purchases 36 Sharing Your Gadget Greenness with Others 38 Part II: Getting Green with Gadgets You Own 41 Chapter 3: Saving Money (and the Planet) with Rechargeable Batteries 43 Understanding Basic Battery Pluses and Minuses 44 Hunting and Gathering Battery-Powered Gadgets in Your House 44 Sorting Out and Choosing Rechargeable Batteries and Chargers 46 Gauging matters of size, type, power, and price 47 Picturing how long battery types last 50 Getting a charge out of chargers 50 Choosing rechargeable batteries and chargers 53 Finding Rechargeable Battery Packs 55 Buying rechargeable batteries for less 56 Replacing rechargeable batteries in iPods, iPhones, and other sealed gadgets 56 Properly Disposing of Dead Batteries 57 Disposable batteries 57 Rechargeable batteries 59 Chapter 4: Maximizing Energy Savings for Your Portable Gadgets 61 Getting a Grip on a Gadget’s Energy-Saving Settings 61 Battery-draining items 63 Cellphones and smartphones 65 MP3 and media players 69 Digital cameras and camcorders 71 Running Mobile Applications to Monitor and Adjust Power 72 Chapter 5: Energy Savings All Around the House 75 Practicing Green Living in Your House 75 Reviewing Energy-Saving Opportunities in Your House 77 Televisions 78 Computers and peripheral devices 79 Mobile phones, MP3 players, GPS trackers, and other personal gadgets 79 Adjusting Power-Saving Options on TVs and Entertainment Gear 80 Taming TV power 80 Reducing power consumption in DVD, video game, and other types of players 82 Part III: Minimizing Your Computer’s Carbon Footprint 87 Chapter 6: Your Computer’s Energy Use 89 Quashing Computer Power Myths 89 Evaluating Your Everyday Computer Needs 93 Understanding Computer Energy-Saving Settings 94 Changing your computer’s energy settings the easy way 97 Taking greater control of your computer’s energy settings 98 iPods, Printers, Hard Drives, and Other Connected Devices 101 Chapter 7: Reducing Energy Consumption in Windows 103 Minimizing Windows Energy Use On-the-Fly 106 Adjusting the Windows Automatic Power Options Settings 107 Choosing and customizing Windows Vista’s power plans 109 Customizing Windows Vista’s advanced power settings 112 Choosing and Customizing Windows XP Power Schemes 113 Power Schemes 114 Alarms 115 Power Meter 116 Advanced 116 Hibernate 117 UPS 117 Making Additional Windows Vista and XP Power Options Adjustments 117 Windows Mobility Center (Vista only) 118 Brightness 118 Screen saver 120 Keyboard brightness 121 Wireless networking 121 Bluetooth 122 Sound 123 Indexing options (Vista only) 124 Chapter 8: Conserving Power with Your Mac’s Energy-Saver Settings 127 Minimizing Your Mac’s Energy Use On-the-Fly 128 Adjusting Your Mac’s Automatic Energy- Saver Settings 129 Making Additional Mac Energy-Saving Adjustments 132 Brightness 133 Screen saver 134 Keyboard brightness 135 AirPort 136 Bluetooth 136 Sound 138 Spotlight 138 Part IV: Acquiring Green Gadgets and Gear 141 Chapter 9: Knowing the Difference Between Truly Green and Greenwash Hype 143 Paying to Be (Seen As) Green Is Big Business 143 Reviewing the Greenpeace Guide to Greener Electronics 145 Tapping In to the Greenpeace Electronics Survey 147 Considering Another Take on Green Gadgets: The Consumer Electronics Association 149 Taking Companies at Their Own Green Word, Sort Of 151 Browsing gadget-makers’ ecocentric Web sites 151 Seeking a second, third, or tenth opinion 154 Chapter 10: Choosing Green Mac and Windows Computers 155 Considering Upgrades to Make Your Computer Feel New Again 156 Upgrading hardware 156 Upgrading operating systems and applications 158 Choosing and installing upgrades 158 Getting Up-to-Speed on Computer Energy Standards and Ratings 159 Evaluating Computer Manufacturers’ Levels of Greenness 160 Getting a Handle on Green Computers 161 Picking Green Macs 163 Breaking down the MacBook, piece by piece 164 Considering other Macs and products 165 Looking at Green Windows Computers 166 Two green Windows desktops 167 A pair of green Windows notebooks 169 Chapter 11: Buying Green Mobile Phones and Handheld Gadgets 173 Getting Up to Speed on Green Gadget Matters 173 Dialing in to Green Mobile Phones 175 Motorola MOTO W233 Renew 177 Samsung SGH-W510, SGH-F268, and E200 Eco 178 Nokia 3110 Evolve and N79 eco 179 Looking at Green MP3 and Video Players, and Other Entertaining Gadgets 181 iPod nano 181 Shiro SQ-S solar-powered media player 182 Baylis Eco Media Player 182 eMotion Solar Portable media player 183 Saving Trees by Reading E-Books 184 Mobile phone and computer e-book readers 184 Dedicated e-book readers 187 Electronic bookstores 190 Getting Wound Up Over Green Windup Gadgets 191 Chapter 12: Getting Green Gadgets for on the Go 195 Driving Your Car More Efficiently 195 Tricking Out Your Car with Efficiency Gizmos 197 Tapping into GPS and Mobile Phone Applications for Green Getting-around 199 Talking mobile phone GPS navigator apps 201 Portable GPS navigators 202 GPS and green mobile phone apps 203 Tracking Green Gadgets for Fitness and Outdoor Activities 206 Staying in Charge with Portable Power Chargers and Extenders 208 Leafing Through Green Garments, Bags, and Cases 211 Chapter 13: Adding Green Gadgets around the House 215 Considering Green Gadgets for Every Room in the House 215 Monitoring and Controlling Household Energy Usage 217 Turning Things On and Off Automatically 219 Controlling Your Entire House with Home Automation Systems 221 Looking at Green HDTV, Music, Movie-Watching, and Audio Products 225 Fiddling with Other Ecofriendly Home Gadgets 229 Part V: Ridding Yourself of Gadgets the Green Way 233 Chapter 14: Donating, Gifting, and Selling Unwanted Gadgets 235 Determining whether an Unwanted Gadget Is of Use to Anyone 236 Weighing the Risks and Rewards of Donating, Gifting, and Selling Unwanted Gadgets 238 Giving the Gift of Unwanted Gadgets 240 Doing Good by Donating Computers and Other Gadgets 240 Trading In or Selling Gadgets for Greenbacks 243 The basics of the trade-in process 244 Finding a trade-in site for you 246 Selling Your Old Electronics on Craigslist 249 Auctioning Unwanted Gadgets on eBay and Other Auction Web Sites 251 Chapter 15: Erasing Your Personal Information before Getting Rid of Gadgets 255 Deleting Your Personal Stuff — The Short Way and the Long Way 256 Considering Trust to Decide How to Erase Personal Information 258 To know you is to trust you 258 I want to trust you, but I’m just not sure 259 Deauthorizing Computer Programs before Giving Away Your PC 260 Deleting Your User Account Files before Getting Rid of a Computer 264 Deleting your Windows XP user account and creating a new one 265 Deleting your Windows Vista user account and creating a new one 267 Deleting your Mac user account and creating a new one 270 Restoring Computers to Factory-Fresh Condition 273 Formatting and restoring a Windows hard drive 273 Formatting and restoring a Mac hard drive 277 Completely Erasing Deleted Files and Hard Drives 279 Wiping Windows hard drives 279 Wiping Mac hard drives 280 Chapter 16: Recycling and Properly Disposing of Hopelessly Useless Gadgets 283 Understanding E-Waste and E-Cycling 284 Finding E-Cyclers 286 Reputable or not? 286 Local or from a distance? 286 Finding a local e-cycler 288 National and corporate e-cycling programs 290 Erasing Personal Information 296 Deciding Whether to Break Down E-Waste or Leave It Whole 297 Keeping useful parts 297 Peripherals and other parts and pieces 298 Part VI: The Part of Tens 301 Chapter 17: Ten Cool Green PC Peripherals and Accessories 303 PC TrickleSaver 303 Ecobutton 303 Bamboo Laptop Stand Workstation 304 SimpleTech [re]drive R500U 500 GB Turbo 304 Lenovo ThinkVision L197 Wide 19-inch LCD Display 304 Apple 24-inch LED Cinema Display 305 Ink2image Bulk Ink System 305 Canon Generation Green Printers 305 D-Link DGL-4500 Xtreme N Gaming Router 306 Netgear 3G Broadband Wireless Router 306 Chapter 18: Ten Green Gadget Designs 307 Bware Water Meter 307 Laundry Pod 307 Social-Environmental Station: The Environmental Traffic Light 308 Indoor Drying Rack 308 Thermal Touch 308 Fastronauts 308 Tweet-a-Watt 309 Standby Monsters 309 Power-Hog 309 WattBlocks 309 And the Winners Are 310 Chapter 19: Ten Green Gadget Buying Tips 313 Don’t Buy! 313 Do Your Homework 313 Buy Recycled and Highly Recyclable 314 Buy Reconditioned or Preowned 315 Buy Small, Think Big Picture 315 Take a Bite Out of Energy Vampires 316 Make the Most of Multifunction Gadgets 316 Charge Your Gadgets the Green Way 317 Get Rid of Gadgets the Green Way 317 Buy Carbon Offsets to Minimize Your Carbon Footprint 318 Chapter 20: Ten Frequently Asked Questions about Green Gadgets 319 What Is a Green Gadget? 319 Why Should I Care about Buying Green Gadgets? 320 What Is EPEAT? 321 Which Electronic Products Does EPEAT Cover? 321 What Is Energy Star? 321 How Does a Product Earn the Energy Star Seal of Approval? 322 What Is the “Change the World, Start with Energy Star” Campaign? 322 Should I Donate or Recycle My Old Computer? 323 Should I Donate or Recycle My Old Cellphone? 323 Should I Recycle My Old Rechargeable Batteries? 324 Index 325

    15 in stock

    £15.29

  • Smart Data

    John Wiley & Sons Inc Smart Data

    15 in stock

    Book SynopsisLike many other organizing paradigms, smart data strategy isrevolutionary and essential to enterprise performance. SmartData explores smart data strategy to enhance enterpriseperformance. Smart Data provides valuable tools in business,like skills for better enterprise decision-making, enterpriseperformance, and agility towards change.Table of ContentsForeword. Preface. Acknowledgments. Introduction: A Comprehensive Overview. Predictive Management. IDEF Lexicon for Executives. Organization of This Book. Smart Data in Three Dimensions. Business Rule. Case Study: IT Capital Budgeting Using a Knapsack Problem. Case Study: Better Decision Making: Field Testing, Evaluation and Validation of a Web-Based MedWatch Decision Support System (MWDSS). Engineering an Ubiquitous Strategy for Catalyzing Enterprise Performance Optimization. What Smart Data Provides. References. 1 Context: The Case and Place for Smart Data Strategy. 1.1 Value of Data to the Enterprise. 1.2 Enterprise Performance Versus Enterprise Integration. 1.3 Current Problems and Deficiencies from Poor Data Strategy. 1.4 New Technologies. 1.5 Breaking from Tradition with Improved Results. References. 2 Elements: Smart Data and Smart Data Strategy. 2.1 Performance Outcomes and Attributes. 2.2 Policy and Business Rules. 2.3 Expectations: Managerial and Technical. 2.4 Capacity for Change and Improvement. 2.5 Iteration Versus Big Bang. References. 3 Barriers: Overcoming Hurdles and Reaching a New Performance Trajectory. 3.1 Barriers. 3.2 Overcoming Barriers. 3.3 Top–Down Strategy. 3.4 Balance of Consequences and Reinforcement. 3.5 Collaboration. 3.6 Enterprise Performance Optimization Process. 3.7 Enterprise Performance Optimization Architecture. 3.8 Scoping, Scheduling, Budgeting, and Project and Program Management. References. 4 Visionary Ideas: Technical Enablement. 4.1 Today’s Possibilities. 4.2 Calibrating Executive Expectations. 4.3 Five Years from Now. 4.4 Ten Years From Now. References. 5. CEO’s Smart Data Handbook. 5.1 Strategy. 5.2 Policy. 5.3 Organization. 5.4 Actions. 5.5 Timing. 5.6 Funding and Costing Variables. 5.7 Outcomes and Measurements. References. Index. Wiley Series in Systems Engineering and Management.

    15 in stock

    £109.76

  • Excel 2010 Bible

    John Wiley & Sons Inc Excel 2010 Bible

    10 in stock

    Book SynopsisA comprehensive reference to the newest version of the world s most popular spreadsheet application: Excel 2010 John Walkenbach's name is synonymous with excellence in computer books that decipher complex technical topics. Known as Mr.

    10 in stock

    £33.24

  • Excel 2010 Formulas

    Wiley Excel 2010 Formulas

    10 in stock

    Book Synopsis

    10 in stock

    £34.19

  • Integrated Business Processes with ERP Systems

    John Wiley & Sons Inc Integrated Business Processes with ERP Systems

    1 in stock

    Book SynopsisIntegrated Business Processes with ERP Systems covers the key processes supported by modern ERP systems. This textbook is designed for use as both a reference guide and a conceptual resource for students taking ERP-focused courses using SAP.Table of Contents1 Introduction to Business Processes 1 The Functional Organizational Structure 2 Business Processes 4 Global Bike Incorporated (GBI) 15 How to use This Book 16 2 Introduction to Enterprise Systems 23 Enterprise Systems 23 Data in an Enterprise System 29 Reporting 37 3 Introduction to Accounting 49 Organizational Data 51 Master Data 52 Key Concepts 58 Processes 61 Reporting 72 4 The Procurement Process 83 Organizational Data 84 Master Data 89 Key Concepts 95 Process 102 Reporting 119 5 The Fulfillment Process 127 Organizational Data 128 Master Data 139 Process 145 Credit Management Process 167 Reporting 170 6 The Production Process 179 Master Data 182 Process 196 Reporting 215 7 Inventory and Warehouse Management Processes 221 Inventory Management 222 Organizational Data in Warehouse Management 234 Master Data in Warehouse Management 239 Processes in Warehouse Management 242 Reporting 257 8 The Material Planning Process 269 Master Data 271 Process 285 Reporting 304 9 Process Integration 315 Procurement, Fulfi llment, and IWM Processes 318 Procurement, Fulfi llment, Production, and IWM Processes 332 Index 349

    1 in stock

    £147.56

  • Perceptual Computing

    John Wiley & Sons Inc Perceptual Computing

    Out of stock

    Book SynopsisLotfi Zadeh, the father of fuzzy logic, coined the phrase computing with words (CWW) to describe a methodology in which the computation objects are words drawn from a natural language.Table of ContentsPreface. 1 Introduction. 1.1 Perceptual Computing. 1.2 Examples. 1.3 Historical Origins of Perceptual Computing. 1.4 How to Validate the Perceptual Computer. 1.5 The Choice of Fuzzy Set Models for the Per-C. 1.6 Keeping the Per-C as Simple as Possible. 1.7 Coverage of the Book. 1.8 High-Level Synopses of Technical Details. References. 2 Interval Type-2 Fuzzy Sets. 2.1 A Brief Review of Type-1 Fuzzy Sets. 2.2 Introduction to Interval Type-2 Fuzzy Sets. 2.3 Definitions. 2.4 Wavy-Slice Representation Theorem. 2.5 Set-Theoretic Operations. 2.6 Centroid of an IT2 FS. 2.7 KM Algorithms. 2.8 Cardinality and Average Cardinality of an IT2 FS. 2.9 Final Remark. Appendix 2A. Derivation of the Union of Two IT2 FSs. Appendix 2B. Enhanced KM (EKM) Algorithms. References. 3 Encoding: From a Word to a Model—The Codebook. 3.1 Introduction. 3.2 Person FOU Approach for a Group of Subjects. 3.3 Collecting Interval End-Point Data. 3.4 Interval End-Points Approach. 3.5 Interval Approach. 3.6 Hedges. Appendix 3A. Methods for Eliciting T1 MF Information From Subjects. Appendix 3B. Derivation of Reasonable Interval Test. References. 4 Decoding: From FOUs to a Recommendation. 4.1 Introduction. 4.2 Similarity Measure Used as a Decoder. 4.3 Ranking Method Used as a Decoder. 4.4 Classifier Used as a Decoder. 5 Novel Weighted Averages as a CWW Engine. 5.1 Introduction. 5.2 Novel Weighted Averages. 5.3 Interval Weighted Average. 5.4 Fuzzy Weighted Average. 5.5 Linguistic Weighted Average. 5.6 A Special Case of the LWA. 5.7 Fuzzy Extensions of Ordered Weighted Averages. 6 IF–THEN Rules as a CWW Engine—Perceptual Reasoning. 6.1 Introduction. 6.2 A Brief Overview of Interval Type-2 Fuzzy Logic Systems. 6.3 Perceptual Reasoning: Computations. 6.4 Perceptual Reasoning: Properties. 7 Assisting in Making Investment Choices—Investment Judgment Advisor (IJA). 7.1 Introduction. 7.2 Encoder for the IJA. 7.3 Reduction of the Codebooks to User-Friendly Codebooks. 7.4 CWW Engine for the IJA. 7.5 Decoder for the IJA. 7.6 Examples. 7.7 Interactive Software for the IJA. 7.8 Conclusions. References. 8 Assisting in Making Social Judgments—Social Judgment Advisor (SJA). 8.1 Introduction. 8.2 Design an SJA. 8.3 Using an SJA. 8.4 Discussion. 8.5 Conclusions. References. 9 Assisting in Hierarchical Decision Making—Procurement Judgment Advisor (PJA). 9.1 Introduction. 9.2 Missile Evaluation Problem Statement. 9.3 Per-C for Missile Evaluation: Design. 9.4 Per-C for Missile Evaluation: Examples. 9.5 Comparison with Previous Approaches. 9.6 Conclusions. Appendix 9A: Some Hierarchical Multicriteria Decision-Making Applications. References. 10 Assisting in Hierarchical and Distributed Decision Making— Journal Publication Judgment Advisor (JPJA)/ 10.1 Introduction. 10.2 The Journal Publication Judgment Advisor (JPJA). 10.3 Per-C for the JPJA. 10.4 Examples. 10.4.5 Complete Reviews. 10.5 Conclusions. Reference. 11 Conclusions. 11.1 Perceptual Computing Methodology. 11.2 Proposed Guidelines for Calling Something CWW. Index.

    Out of stock

    £90.86

  • SOA Modeling Patterns for ServiceOriented

    John Wiley & Sons Inc SOA Modeling Patterns for ServiceOriented

    1 in stock

    Book SynopsisLearn the essential tools for developing a sound service-oriented architecture SOA Modeling Patterns for Service-Oriented Discovery and Analysis introduces a universal, easy-to-use, and nimble SOA modeling language to facilitate the service identification and examination life cycle stage. This business and technological vocabulary will benefit your service development endeavors and foster organizational software asset reuse and consolidation, and reduction of expenditure. Whether you are a developer, business architect, technical architect, modeler, business analyst, team leader, or manager, this essential guide-introducing an elaborate set of more than 100 patterns and anti-patterns-will help you successfully discover and analyze services, and model a superior solution for your project,. Explores how to discover services Explains how to analyze services for construction and production How to assess service feasibility for deploymeTable of ContentsPreface xix Foreword xxi CHAPTER 1 Introduction 1 What is Service-Oriented Discovery and Analysis? 2 Service-Oriented Analysis Endeavor 2 Service-Oriented Discovery Endeavor 7 Service-Oriented Discovery and Analysis Proposition 11 Driving Principles of Service-Oriented Discovery and Analysis 13 Service-Oriented Discovery and Analysis Modeling 15 Service-Oriented Discovery and Analysis Patterns 17 Summary 20 PART ONE Service-Oriented Discovery and Analysis Road Map Patterns 21 CHAPTER 2 Vertical Service Discovery and Analysis: Pursuing Inward and Downward Road Map Patterns 25 Service Discovery and Analysis Inward Road Map Pattern 25 Service Discovery and Analysis Downward Road Map Pattern 32 Deliverables 38 Summary 39 CHAPTER 3 Horizontal Service Discovery and Analysis: Pursuing Upward and Outward Road Map Patterns 41 Service-Oriented Discovery and Analysis Upward Road Map Pattern 42 Service Discovery and Analysis Outward Road Map Pattern 46 Deliverables 56 Summary 56 CHAPTER 4 Service-Oriented Discovery and Analysis Best Practices Model: Striving for Balanced Solutions 59 Meet-in-the-Middle Service Discovery: Balancing the Identification Venture 59 Structural and Contextual Analysis and Modeling: Balanced Solutions 61 Focus on Service Discovery and Analysis Cross-Cutting Activities 62 Categorization of Services: Reality Check 64 Service-Oriented Discovery and Analysis Best Practices Model 64 Deliverables 68 Summary 68 PART TWO Service-Oriented Discovery Patterns 69 CHAPTER 5 Top-Down Business Process-Driven Service Discovery Pattern 71 Is Business Process Top-Down Service Discovery Practical? 71 Documenting Business Processes: Industry Standards 72 Understand Business Processes 72 Define Business Process Analysis Maturity Level 76 Study Documented Business Processes 77 Establish Service-Oriented Business Process Model 78 Discover Analysis Services 82 Deliverables 87 Summary 88 CHAPTER 6 Top-Down Attribute-Driven Service Discovery Pattern 89 Study Business and Technology Discovery Sources 89 Attend to the Service Discovery Process 90 Institute Core Attributes 91 Establish Attribution Model 93 Select Attributes for Service Discovery 95 Found Decision Model 97 Discover Analysis Services 100 Establish Service Taxonomy 102 Deliverables 104 Summary 104 CHAPTER 7 Front-to-Back Service Discovery Pattern 105 Front-to-Back Service Discovery Model 105 User Interface Control Services 106 User Interface Content Delivery Services 111 User Interface Content Rendering Services 114 User Interface Value Services 117 Front-to-Back Service Discovery Process 118 Deliverables 122 Summary 122 CHAPTER 8 Back-to-Front Service Discovery Pattern 123 Conceptual Data Model Perspective 123 Logical Data Model Perspective 127 Physical Data Model Perspective 139 Back-to-Front Service Discovery Process 139 Deliverables 144 Summary 144 CHAPTER 9 Bottom-Up Service Discovery Pattern 145 Bottom-Up Business Functionality–Driven Service Discovery 145 Bottom-Up Technology-Driven Service Discovery 152 Bottom-Up Reference Architecture–Driven Service Discovery 157 Deliverables 163 Summary 163 CHAPTER 10 Meet-in-the-Middle Service Discovery Pattern 165 Integration-Oriented Services 165 Common Business Services 172 Infrastructure-Oriented Services 175 Deliverables 179 Summary 180 PART THREE Service-Oriented Categorization Patterns 181 CHAPTER 11 Service Source Categorization Patterns 183 Service Ideas and Concepts 183 Service Abstractions 185 Legacy Entities: Road-Tested Executables 188 Service Portfolio 189 Virtual Entities 191 Deliverables 191 Summary 192 CHAPTER 12 Service Structure Categorization Patterns 193 Service Structure Model 193 Environmental Influences on Service Structure 194 Service Structure Categorization Driving Principles 195 Atomic Service Structure: Indivisible Pattern 195 Composite Service Structure: Hierarchical Pattern 196 Service Cluster: Distributed and Federated Pattern 200 Deliverables 203 Summary 204 CHAPTER 13 Service Contextual Categorization Patterns 205 Contextual Classification Model: Patterns for ServiceContextual Categorization 205 Establishing Leading Service Categories 207 Service Subcategories Establishment Process 211 Deliverables 219 Summary 219 PART FOUR Service-Oriented Contextual Analysis Process and Modeling Patterns 221 CHAPTER 14 Contextual Generalization Analysis Process and Modeling Patterns 225 Contextual Generalization Process 225 Contextual Generalization Patterns 232 Contextual Generalization Anti-Patterns 240 Deliverables 243 Summary 243 CHAPTER 15 Contextual Specification Analysis Process and Modeling Patterns 245 Contextual Specification Process 245 Contextual Specification Patterns 250 Service Specification Anti-Patterns 258 Deliverables 261 Summary 261 CHAPTER 16 Contextual Expansion Analysis Process and Modeling Patterns 263 Contextual Expansion Process 264 Contextual Expansion Levels: Organizational Zones for Distribution of Services 265 Contextual Expansion Patterns 270 Service Contextual Expansion Anti-Patterns 278 Deliverables 281 Summary 281 CHAPTER 17 Contextual Contraction Analysis Process and Modeling Patterns 283 Accommodating Demand for Contextual Contraction 283 Service Contextual Contraction Benefits 284 Service Contextual Contraction Example 285 Contextual Contraction Process 286 Contextual Contraction Patterns 290 Contextual Contraction Anti-Patterns 299 Deliverables 301 Summary 301 PART FIVE Service-Oriented Structural Analysis Process and Modeling Patterns 303 CHAPTER 18 Structural Analysis and Modeling Principles: Introduction to Service Structural Notation and Modeling 305 Structural Analysis Modeling Principles 305 Structural Modeling Notation Introduction 306 Aggregation 310 Decomposition 311 Subtraction 312 Coupling and Decoupling 313 Compounding 315 Unification 316 Transformation 318 Intersection 319 Exclusion 321 Clipping 323 Binding and Unbinding 324 Cloning and Decloning 326 Deliverables 328 Summary 329 CHAPTER 19 Structural Generalization Analysis Process and Modeling Patterns 331 Aggregation Analysis: Patterns and Implementation 332 Unification Analysis: Patterns and Implementation 339 Structural Compounding Analysis: Patterns and Implementation 345 Contract Analysis: Patterns and Implementation 351 Deliverables 357 Summary 357 CHAPTER 20 Structural Specification Analysis Process and Modeling Patterns 359 Decomposition Analysis: Patterns and Implementation 359 Subtraction Analysis: Patterns and Implementation 368 Refactoring Analysis: Patterns and Implementation 375 Contract Analysis: Patterns and Implementation 382 Deliverables 388 Summary 388 CHAPTER 21 Structural Expansion Analysis Process and Modeling Patterns 389 Distribution Analysis: Patterns and Implementation 390 Mediation Analysis: Patterns and Implementation 405 Contract Analysis: Patterns and Implementation 414 Deliverables 420 Summary 420 CHAPTER 22 Structural Contraction Analysis Process and Modeling Patterns 423 Distribution Reduction Analysis: Patterns and Implementation 424 Mediation Rollback Analysis: Patterns and Implementation 435 Contract Analysis: Patterns and Implementation 444 Deliverables 450 Summary 450 Index 451

    1 in stock

    £37.50

  • Still Image and Video Compression with MATLAB

    John Wiley & Sons Inc Still Image and Video Compression with MATLAB

    15 in stock

    Book SynopsisThis book describes the principles of image and video compression techniques and introduces current and popular compression standards, such as the MPEG series. Derivations of relevant compression algorithms are developed in an easy-to-follow fashion. Numerous examples are provided in each chapter to illustrate the concepts.Table of ContentsPreface. 1 Introduction. 1.1 What is Source Coding? 1.2 Why is Compression Necessary? 1.3 Image and Video Compression Techniques. 1.4 Video Compression Standards. 1.5 Organization of the Book. 1.6 Summary. References. 2 Image Acquisition. 2.1 Introduction. 2.2 Sampling a Continuous Image. 2.3 Image Quantization. 2.4 Color Image Representation. 2.5 Summary. References. Problems. 3 Image Transforms. 3.1 Introduction. 3.2 Unitary Transforms. 3.3 Karhunen–Loeve Transform. 3.4 Properties of Unitary Transforms. 3.5 Summary. References. Problems. 4 Discrete Wavelet Transform. 4.1 Introduction. 4.2 Continuous Wavelet Transform. 4.3 Wavelet Series. 4.4 Discrete Wavelet Transform. 4.5 Efficient Implementation of 1D DWT. 4.6 Scaling and Wavelet Filters. 4.7 Two-Dimensional DWT. 4.8 Energy Compaction Property. 4.9 Integer or Reversible Wavelet. 4.10 Summary. References. Problems. 5 Lossless Coding. 5.1 Introduction. 5.2 Information Theory. 5.3 Huffman Coding. 5.4 Arithmetic Coding. 5.5 Golomb–Rice Coding. 5.6 Run–Length Coding. 5.7 Summary. References. Problems. 6 Predictive Coding. 6.1 Introduction. 6.2 Design of a DPCM. 6.3 Adaptive DPCM. 6.4 Summary. References. Problems. 7 Image Compression in the Transform Domain. 7.1 Introduction. 7.2 Basic Idea Behind Transform Coding. 7.3 Coding Gain of a Transform Coder. 7.4 JPEG Compression. 7.5 Compression of Color Images. 7.6 Blocking Artifact. 7.7 Variable Block Size DCT Coding. 7.8 Summary. References. Problems. 8 Image Compression in the Wavelet Domain. 8.1 Introduction. 8.2 Design of a DWT Coder. 8.3 Zero-Tree Coding. 8.4 JPEG2000. 8.5 Digital Cinema. 8.6 Summary. References. Problems. 9 Basics of Video Compression. 9.1 Introduction. 9.2 Video Coding. 9.3 Stereo Image Compression. 9.4 Summary. References. Problems. 10 Video Compression Standards. 10.1 Introduction. 10.2 MPEG-1 and MPEG-2 Standards. 10.3 MPEG-4. 10.4 H.264. 10.5 Summary. References. Problems. Index.

    15 in stock

    £104.36

  • Zoho For Dummies

    John Wiley & Sons Inc Zoho For Dummies

    15 in stock

    Book SynopsisA great way to get started on this new, FREE, Web-based productivity and collaboration tool Zoho is a very cool-and free-alternative to Microsoft Office. Known as "cloud" computing because it's totally Web-based, Zoho provides 18 different applications to help you write documents, create spreadsheets, send e-mail, and much more.Table of ContentsNotations vii Acronyms ix Introduction xi Chapter 1. Uncertainty Representation Based on Set Theory 1 1.1. Basic set definitions: advantages and weaknesses 3 1.1.1. Interval set 5 1.1.2. Ellipsoidal set 7 1.1.3. Polyhedral set 9 1.1.4. Zonotopic set 12 1.2. Main properties of zonotopes 17 Chapter 2. Several Approaches on Zonotopic Guaranteed Set-Membership Estimation 27 2.1. Context 27 2.2. Problem formulation 32 2.2.1. Singular Value Decomposition-based method 35 2.2.2. Optimization-based methods 40 Chapter 3. Zonotopic Guaranteed State Estimation Based on P-Radius Minimization 49 3.1. Single-Output systems approach 49 3.2. Multi-Output systems approaches 63 3.2.1. General formulation 64 3.2.2. Extensions of the Single-Output systems methodology 67 3.2.3. Dedicated approach for Multi-Output systems 85 Chapter 4. Tube Model Predictive Control Based on Zonotopic Set-Membership Estimation 95 4.1. Context 954.2. Problem formulation 100 4.3. Tube-based output feedback Model Predictive Control design 100 4.4. Application on the magnetic levitation system 112 4.4.1. System description 113 4.4.2. Control problem 116 Conclusion and Perspectives 125 Appendix. Basic Matrix Operation Definitions 129 Bibliography 133 Index 149

    15 in stock

    £19.99

  • Word 2010 For Dummies

    John Wiley & Sons Inc Word 2010 For Dummies

    2 in stock

    Book SynopsisDan Gookin gets you up to speed so you can get down to work withall the new features of Word 2010! Bestselling and quintessential For Dummies author DanGookin employs his usual fun and friendly candor while walking youthrough the spectrum of new features of Word 2010.Table of ContentsIntroduction 1 Part I: Your Introduction to Word 7 Chapter 1: Hello, Word! 9 Chapter 2: The Typing Chapter 21 Part II: Your Basic Word 31 Chapter 3: To and Fro in a Document 33 Chapter 4: Text Editing 41 Chapter 5: Search for This, Replace It with That 49 Chapter 6: Blocks o’ Text 63 Chapter 7: Spell It Write 77 Chapter 8: Documents and Such 89 Chapter 9: Publish Your Document 103 Part III: Formatting 117 Chapter 10: Character Formatting 119 Chapter 11: Paragraph Formatting 131 Chapter 12: Tab Formatting 145 Chapter 13: Page Formatting 161 Chapter 14: Document Formatting 173 Chapter 15: Word Formatting Styles 185 Chapter 16: Fun with Themes and Template Formatting 199 Chapter 17: Sundry Formatting 209 Part IV: Spruce Up a Dull Document 219 Chapter 18: Lines and Colors 221 Chapter 19: Able Tables 229 Chapter 20: Columns of Text 241 Chapter 21: Lots of Lists 249 Chapter 22: Here Come the Graphics 257 Chapter 23: Even More Things to Insert in Your Document 271 Part V: Even More Word 281 Chapter 24: Multiple Documents, Windows, and File Formats 283 Chapter 25: Word for Writers 291 Chapter 26: Let’s Work This Out 305 Chapter 27: Mail Merge Mania 315 Chapter 28: Labels of Love 331 Chapter 29: A More Custom Word 339 Part VI: The Part of Tens 347 Chapter 30: The Ten Commandments of Word 349 Chapter 31: Ten Cool Tricks 353 Chapter 32: Ten Bizarre Things 361 Chapter 33: Ten Avuncular Suggestions 367 Index 371

    2 in stock

    £15.29

  • PayPerClick Search Engine Marketing

    John Wiley & Sons Inc PayPerClick Search Engine Marketing

    15 in stock

    Book SynopsisThe complete guide to a winning pay-per-click marketing campaign Pay-per-click advertising-the sponsored results on search engine results pages-is increasingly being used to drive traffic to websites. Marketing and advertising professionals looking for a hands-on, task-based guide to every stage of creating and managing a winning PPC campaign will get the step-by-step instruction they need in this detailed guide. Using the popular An Hour A Day format, this book helps you avoid the pitfalls and plan, develop, implement, manage, and monitor a PPC campaign that gets results. Successful pay-per-click campaigns are a key component of online marketing This guide breaks the project down into manageable tasks, valuable for the small-business owner as well as for marketing officers and consultants Explains core PPC concepts, industry trends, and the mechanics that make a campaign work Shows how to perform keyword research, structuTable of Contents1 The Art and Science of PPC Advertising. 2 How the PPC Machine Works. 3 Core PPC Skills and Objectives. 4 Month 1 — Research Keywords and Establish Campaign Structure. 5 Month 2 — Create Great PPC Ads. 6 Month 3 — Design Effective Landing Pages. 7 Month 4 — Advertise on the Content Network. 8 Month 5 — Launch Your Campaign. 9 Month 6 — Optimize Your Campaign. 10 Month 7 — Test Ads Using Advanced Techniques. 11 Month 8 — Test and Optimize Landing Pages. 12 Month 9 — Migrate Your Campaign to Microsoft and Yahoo!

    15 in stock

    £18.39

  • Excel 2010 For Dummies

    John Wiley & Sons Inc Excel 2010 For Dummies

    15 in stock

    Book SynopsisThe bestselling Excel book on the market, updated for Excel 2010 As the world's leading spreadsheet application, Excel has a huge user base.Table of ContentsIntroduction 1 Part I: Getting In on the Ground Floor 9 Chapter 1: The Excel 2010 User Experience 11 Chapter 2: Creating a Spreadsheet from Scratch 49 Part II: Editing without Tears 95 Chapter 3: Making It All Look Pretty 97 Chapter 4: Going Through Changes 145 Chapter 5: Printing the Masterpiece 175 Part III: Getting Organized and Staying That Way 199 Chapter 6: Maintaining the Worksheet 201 Chapter 7: Maintaining Multiple Worksheets 229 Part IV: Digging Data Analysis 253 Chapter 8: Doing What-If Analysis 255 Chapter 9: Playing with Pivot Tables 267 Part V: Life beyond the Spreadsheet 283 Chapter 10: Charming Charts and Gorgeous Graphics 285 Chapter 11: Getting on the Data List 319 Chapter 12: Linking, Automating, and Sharing Spreadsheets 345 Part VI: The Part of Tens 363 Chapter 13: Top Ten Features in Excel 2010 365 Chapter 14: Top Ten Beginner Basics 369 Chapter 15: The Ten Commandments of Excel 2010 371 Index 373

    15 in stock

    £16.99

  • Trustworthy Compilers

    John Wiley & Sons Inc Trustworthy Compilers

    1 in stock

    Book SynopsisThis unique guide book explains and teaches the concept oftrustworthy compilers based on 50+ years of worldwide experience inthe area of compilers, and on the author s own 30+ years ofexpertise in development and teaching compilers.Trade Review"Overall, however, it is an excellent addition to a computer scientist's bookshelf, and complements the classics in compiler design." (Computing Reviews, 22 November 2011)Table of ContentsPreface. Acknowledgments. 1. Introduction. 1.1. The Concept of a Trustworthy Compiler. 1.2. Kinds of Compilers. 1.3. Evolution of Java Compilers. 1.4. Compilation for .NET. 1.5. Phases of Compilation. 1.6. Overview of Compiler Development Principles and Technologies. 1.7. History of Compiler Development in the U.S.S.R. and in Russia. Exercises to Chapter 1. 2. Theoretical Foundations and Principles of Trustworthy Compilers. 2.1. The Trustworthy Computing (TWC) Initiative. 2.2. TWC and Trustworthy Compilers. 2.3. Verified Compilers. 2.4. Spec#: Microsoft’s Approach to Verifying Compilers. 2.5. Perspectives of Verified and Verifying Compilation. Exercises to Chapter 2. 3. Lexical Analysis and Its Trustworthiness Principles. 3.1. Token Classes. 3.2. The Output of the Lexical Analyzer. 3.3. Processing White Spaces, Comments, and New Lines. 3.4. Theoretical Models of Lexical Analysis. 3.5. Lexical Errors, Error Diagnostics, and Recovery. 3.6. Processing Identifiers and Keywords. 3.7. The Architecture of a Lexical Analyzer and the Principles of Its Implementation. 3.8. The Lexical Analyzer Generator Lex. 3.9. Lexical Analyzer Generation in ANTLR. Exercises to Chapter 3. 4. Parsing and Trustworthy Methods of Syntax Error Recovery. 4.1. Basic Concepts and Principles of Parsing. 4.2. Recursive Descent and Simple Lookahead Mechanism. 4.3. Overview of Error Recovery in Parsing: Error Recovery for Recursive Descent. 4.4. LR(1) and LALR(1) Parsing. 4.5. Error Recovery in LR Parsing. 4.6. The Yacc Parser Generator. 4.7. The Bison Parser Generator: Generalized LR Parsing. 4.8. The Yacc++, JavaCC, SableCC, ANTLR, and CoCo/R Object-Oriented Parser Generators. Exercises to Chapter 4. 5. Semantic Analysis and Typing: Efficient and Trustworthy Techniques. 5.1. Basic Concepts and Principles of Semantic Analysis. 5.2. Formal Model of Semantic Analysis: Attributed Grammars. 5.3. Definition Systems with Forward References and the Algorithm of Their One-Pass Analysis. 5.4. Commonly Used Semantic Attributes for Program Constructs. 5.5. Design Flaws of the Semantic Attribute Evaluation and Our Efficient Methods to Speed It Up. 5.6. Lookup—Traditional and Novel Techniques. 5.7. Typing and Type-Checking: Basic Concepts. 5.8. Representing Types at Compile Time. 5.9. Efficient Method and Algorithm to Represent and Handle Types with Structural Identity. 5.10. Type Identity and Type Compatibility. 5.11. Type-Checking, Typing Error Diagnostics, and Recovery. 5.12. Code Trustworthiness Checks During Semantic Analysis. 5.13. Checks for Context Restrictions in Semantic Analysis. 5.14. Intermediate Code Generation—Principles and Architectural Models. 5.15. Postfix (Reverse Polish) Notation. 5.16. PCC Trees. 5.17. Triples. 5.18. Summary of the Chapter. Exercises to Chapter 5. 6. Trustworthy Optimizations. 6.1. Basic Concepts and Trustworthiness of Optimizations. 6.2. Optimizations as Mixed Computations. 6.3. Overview of the Most Common Kinds of Optimizations. 6.4. Control Flow and Data Flow Dependencies. 6.5. Static Single Assignment (SSA). 6.6. Data Structures Constructed and Used by the Optimizer. 6.7. Optimization in Sun Studio Compilers. 6.8. Optimizations of the Java Bytecode. 6.9. Optimizations of the .NET Common Intermediate Language (CIL) Code. 6.10. Optimizations during JIT Compilation. Exercises to Chapter 6. 7. Code Generation and Runtime Data Representation. 7.1. Target Platforms for Code Generation. 7.2. Overview of Code Generation Tasks and Goals. 7.3. Specifics of Code Generation for .NET. 7.4. Specifics of Code Generation for SPARC Architecture. 7.5. Representing Types and Addressing Variables. 7.6. Representing Procedures, Functions, and Methods. 7.7. Principles of SPARC Architecture. 7.8. Example of Code Generation for SPARC Architecture. 7.9. Generation of Debugging Information. 7.10. Code Generation for Declarations (Definitions), Expressions, and Statements. Exercises to Chapter 7. 8. Runtime, JIT, and AOT Compilation. 8.1. The Tasks of the Runtime. 8.2. The Relationship of the Runtime and the Operating System (OS). 8.3. JIT Compilation. 8.4. The Architecture of FJIT––JIT Compiler for SSCLI/Rotor. 8.5. The Architecture of Optimizing JIT Compiler for SSCLI/Rotor. 8.6. AOT Compilation. Exercises to Chapter 8. 9. Graph Grammars and Graph Compilers. 9.1. Basic Concepts of Graph Grammars and Graph Compilers. 9.2. Categorical Approach to Graph Transformations. 9.3. Reserved Graph Grammars (RGGs). 9.4. Layered Graph Grammars. 9.5. Meta-Modeling Approach to Graph Grammars and Diameta Editor. 9.6. Hypergraph Approach to Graph Grammars in Diagen. 9.7. Graph Compiler Generation Tools. Exercises to Chapter 9. 10. Microsoft Phoenix, Phoenix-Targeted Tools, and Our Phoenix Projects. 10.1. History of Phoenix and of Our Phoenix Projects. 10.2. Overview of Phoenix Architecture. 10.3. Phoenix-Based Tools, Passes, Phases, and Plug-Ins. 10.4. Phoenix Primitives: Strings and Names. 10.5. Phoenix Intermediate Representation (IR). 10.6. Phoenix Symbol System. 10.7. Phoenix Type System. 10.8. Data Flow Analysis, Control Flow Analysis, Graphs, and Static Single Assignment (SSA) in Phoenix. 10.9. Overview of Other Phoenix Features. 10.10. Example of a Phoenix-Based Plug-In. 10.11. Phoenix-Fete—A Compiler Front-End Development Toolkit and Environment Targeted to Phoenix. Exercises to Chapter 10. Conclusions. References. Index.

    1 in stock

    £121.46

  • Risk Centric Threat Modeling

    John Wiley & Sons Inc Risk Centric Threat Modeling

    15 in stock

    Book SynopsisThis book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the fTable of ContentsForeword ix Preface xv List of Figures xvii List of Tables xxiii 1 Threat Modeling Overview 1 Definitions 1 Origins and Use 3 Summary 8 Rationale and Evolution of Security Analysis 9 Summary 19 Building A Better Risk Model 19 Summary 31 Threat Anatomy 33 Summary 48 Crowdsourcing Risk Analytics 48 2 Objectives and Benefits of Threat Modeling 63 Defining a Risk Mitigation Strategy 63 Improving Application Security 82 Building Security in the Software Development Life Cycle 92 Identifying Application Vulnerabilities and Design Flaws 104 Analyzing Application Security Risks 118 3 Existing Threat Modeling Approaches 137 Security Software Risk-Based Variants 137 4 Threat Modeling Within the SDLC 195 Building Security in SDLC with Threat Modeling 195 Integrating Threat Modeling Within The Different Types of SDLCs 205 5 Threat Modeling and Risk Management 235 Data Breach Incidents and Lessons for Risk Management 235 Threats and Risk Analysis 259 Risk-Based Threat Modeling 282 Threat Modeling in Information Security and Risk Management Processes 289 Threat Modeling Within Security Incident Response Processes 306 6 Intro to PASTA 317 Risk-Centric Threat Modeling 317 7 Diving Deeper into PASTA 343 Exploring the Seven Stages and Embedded Threat Modeling Activities 343 Chapter Summary 478 8 PASTA Use Case 479 PASTA Use Case Example Walk-Through 479 Glossary 633 References 653 Index 657

    15 in stock

    £84.56

  • Introducing Maya 2011

    John Wiley & Sons Inc Introducing Maya 2011

    Out of stock

    Book SynopsisA practical, step-by-step guide to Maya 2011 Four previous editions can't be wrong: this book is the perfect introduction to 3D and Maya. Learn to build and animate your own digital models and scenes with step-by-step instruction and fun and practical examples, while you draw inspiration from the striking examples included from talented Maya users. You'll create a simple animation of the planets in the solar system, learn to model a human hand and a decorative boxamong other projectsand master all essential tools. Provides a thorough, step-by-step introduction to Maya 2011 Explains the core concepts of CG and working in 3D Covers modeling, rigging, HDRI lighting, mental ray rendering, and more Provides project files on CD and walks you through the creation of several projects; the CD also includes images, movies, and scene files Includes a color insert with pages of striking examples from talented Maya beginners Table of ContentsIntroduction xv Chapter 1 Introduction to Computer Graphics and 3D 1 Art? 2 Computer Graphics 2 The Stages of Production 4 The CG Production Workflow 8 Core Concepts 12 Basic Film Concepts 24 Summary 30 Chapter 2 Jumping in Headfirst, with Both Feet 31 You Put the U in UI 32 Project Overview: The Solar System 37 The Preproduction Process: Planning 37 Creating a Project 38 The Production Process: Creating and Animating the Objects 40 Hierarchy and Maya Object Structure 54 The Solar System Resumed 57 Outputting Your Work: Playblasting 65 Summary 67 Chapter 3 The Maya 2011 Interface 69 Navigating in Maya 70 Maya’s Layout 70 Panels and Frequently Used Windows 82 Customizing Maya 99 Summary 103 Chapter 4 Beginning Polygonal Modeling 105 Planning Your Model 106 Polygon Basics 112 Poly Editing Tools 115 Putting the Tools to Use: Making a Simple Hand 119 Creating Areas of Detail on a Poly Mesh 125 Modeling Complex Objects: The Classic Steam Locomotive 134 Suggestions for Modeling Polygons 157 Summary 157 Chapter 5 Modeling with NURBS, Subdivisions, and Deformers 159 NURBS! 160 Using NURBS Surfacing to Create Polygons 171 Converting a NURBS Model to Polygons 173 Editing NURBS Surfaces 174 Patch Modeling: A Locomotive Detail 177 Using Artisan to Sculpt NURBS 188 Modeling with Simple Deformers 190 The Lattice Deformer 196 Animating through a Lattice 200 Subdivision Surfaces 203 Creating a Starfish 204 Building a Teakettle 209 Summary 217 Chapter 6 Practical Experience 219 Beginning the Wagon Project 220 Using Reference Planes 220 Modeling the Side Panels 227 Modeling the Wagon Body 249 Inserting the Handlebar 254 Modeling the Wheels 258 Modeling the Wood Railings 264 Adding Extra Details 274 Building a Decorative Box 280 Summary 291 Chapter 7 Maya Shading and Texturing 293 Maya Shading 294 Shader Types 294 Shader Attributes 298 Texturing the Axe 302 Textures and Surfaces 310 Texturing the Red Wagon 320 Photoreal Mapping: The Decorative Box 352 For Further Study 371 Summary 371 Chapter 8 Introduction to Animation 373 Keyframe Animation—Bouncing a Ball 374 Throwing an Axe 384 Replacing an Object 400 Animating Flying Text 402 Rigging the Locomotive, Part 1 406 Animating a Catapult 408 Summary 414 Chapter 9 More Animation! 417 Skeletons and Kinematics 418 Skeletons: The Hand 431 Inverse Kinematics 446 Basic Relationships: Constraints 450 Basic Relationships: Set-Driven Keys 454 Application: Rigging the Locomotive 458 Summary 466 Chapter 10 Maya Lighting 467 Basic Lighting Concepts 468 Maya Lights 472 Light Linking 478 Adding Shadows 479 Raytracing Soft Shadows 483 Mental ray Lighting 484 Mental ray Physical Sun and Sky 486 Lighting Effects 491 Lighting the Decorative Box 495 Further Lighting Practice 501 Tips for Using and Animating Lights 502 Summary 504 Chapter 11 Maya Rendering 505 Rendering Setup 506 Previewing Your Render: The Render View Window 515 Reflections and Refractions 517 Using Cameras 519 Motion Blur 525 Batch Rendering 526 Rendering the Wine Bottle 527 Mental ray for Maya 531 Render Layers 537 Final Gather 546 Ambient Occlusion 549 HDRI 557 Rendering the Decorative Box 559 Summary 573 Chapter 12 Maya Dynamics and Effects 575 An Overview of Dynamics and Maya Nucleus 576 Rigid and Soft Dynamic Bodies 576 Animating with Dynamics: The Pool Table 580 nParticle Dynamics 590 Emitting nParticles 590 Animating a Particle Effect: Locomotive Steam 596 Introduction to Paint Effects 605 Toon Shading 608 Summary 612 Where Do You Go from Here? 612 Appendix About the Companion CD 613 Index 617

    Out of stock

    £30.39

  • Network Security Bible

    John Wiley & Sons Inc Network Security Bible

    15 in stock

    Book SynopsisThe comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side.Table of ContentsIntroduction xxxv Part I: Network Security Landscape Chapter 1: State of Network Security 3 Cyber Security 3 Summary 7 Chapter 2: New Approaches to Cyber Security 9 General Trends 9 The Changing Face of Cyber Security 16 Summary 17 Chapter 3: Interfacing with the Organization 19 An Enterprise Security Methodology 19 Key Questions to Manage Risk 27 Summary 32 Part II: Security Principles and Practices Chapter 4: Information System Security Principles 35 Key Principles of Network Security 35 Formal Processes 37 Risk Management 60 Calculating and Managing Risk 70 Summary 71 Chapter 5: Information System Security Management 73 Security Policies 73 Security Awareness 77 Managing the Technical Effort 79 Configuration Management 87 Business Continuity and Disaster Recovery Planning 90 Physical Security 98 Legal and Liability Issues 105 Summary 107 Chapter 6: Access Control 109 Control Models 109 Types of Access Control Implementations 112 Identification and Authentication 115 Databases 121 Remote Access 123 Summary 125 Chapter 7: Attacks and Threats 127 Malicious Code 127 Review of Common Attacks 129 External Attack Methodologies Overview 136 Internal Threat Overview 140 Summary 142 Part III: Operating Systems and Applications Chapter 8: Windows Security 145 Windows Security at the Heart of the Defense 147 Out-of-the-Box Operating System Hardening 151 Installing Applications 171 Putting the Workstation on the Network 175 Operating Windows Safely 177 Upgrades and Patches 191 Maintain and Test the Security 194 Attacks Against the Windows Workstation 198 Summary 205 Chapter 9: UNIX and Linux Security 207 The Focus of UNIX/Linux Security 207 Physical Security 212 Controlling the Configuration 217 Operating UNIX Safely 224 Hardening UNIX 245 Summary 253 Chapter 10: Web Browser and Client Security 255 Web Browser and Client Risk 255 How a Web Browser Works 259 Web Browser Attacks 268 Operating Safely 271 Web Browser Configurations 276 Summary 286 Chapter 11: Web Security 287 What Is HTTP? 287 How Does HTTP Work? 289 Server Content 301 Client Content 303 State 309 Attacking Web Servers 315 Web Services 317 Summary 321 Chapter 12: Electronic mail (E-mail) Security 323 The E-mail Risk 323 The E-mail Protocols 340 E-mail Authentication 345 Operating Safely When Using E-mail 348 Summary 355 Chapter 13: Domain Name System 357 DNS Basics 358 Purpose of DNS 364 Setting Up DNS 375 Security Issues with DNS 377 DNS Attacks 384 Designing DNS 386 Master Slave DNS 388 Detailed DNS Architecture 388 DNS SEC 389 Summary 393 Chapter 14: Server Security 395 General Server Risks 395 Security by Design 396 Operating Servers Safely 413 Server Applications 417 Multi-Level Security and Digital Rights Management 421 Summary 427 Part IV: Network Security Fundamentals Chapter 15: Network Protocols 431 Protocols 431 The Open Systems Interconnect Model 432 The OSI Layers 433 The TCP/IP Model 439 TCP/IP Model Layers 441 Internet Protocol 442 VoIP 450 Summary 457 Chapter 16: Wireless Security 459 Electromagnetic Spectrum 459 The Cellular Phone Network 462 Placing a Cellular Telephone Call 464 Wireless Transmission Systems 469 Pervasive Wireless Data Network Technologies 473 IEEE Wireless LAN Specifications 478 IEEE 802.11 480 IEEE 802.11 Wireless Security 485 Bluetooth 503 Wireless Application Protocol 504 Future of Wireless 506 Summary 508 Chapter 17: Network Architecture Fundamentals 509 Network Segments 510 Perimeter Defense 511 Network Address Translation 511 Basic Architecture Issues 513 Subnetting, Switching, and VLANs 516 Address Resolution Protocol and Media Access Control 517 Dynamic Host Configuration Protocol and Addressing Control 518 Zero Configuration Networks 519 System Design and Architecture Against Insider Threats 525 Common Attacks 528 Summary 529 Chapter 18: Firewalls 531 Firewalls 531 Firewall Rules 537 The Use of Personal Firewalls 542 Summary 548 Chapter 19: Intrusion Detection/Prevention 549 Intrusion Detection Systems 549 Responses to Intrusion Detection 556 Emerging Technologies in Intrusion Detection Systems 556 Summary 567 Part V: Communication Chapter 20: Secret Communication 571 What is Cryptography? 572 General Terms 576 Principles of Cryptography 577 The Four Cryptographic Primitives 587 Putting These Primitives Together to Achieve CIA 602 The Difference Between Algorithm and Implementation 603 Proprietary Versus Open Source Algorithms 606 Attacks on Hash Functions 607 Quantum Cryptography 617 Summary 628 Chapter 21: Covert Communication 631 Where Hidden Data Hides 631 Where Did It Come From? 633 Where Is It Going? 633 Overview of Steganography 634 History of Steganography 639 Core Areas of Network Security and Their Relation to Steganography 641 Principles of Steganography 643 Steganography Compared to Cryptography 644 Types of Steganography 646 Products That Implement Steganography 654 Steganography Versus Digital Watermarking 673 Types of Digital Watermarking 675 Goals of Digital Watermarking 676 Digital Watermarking and Stego 676 Summary 679 Chapter 22: Applications of Secure/Covert Communication 681 E-mail 682 Authentication Servers 685 Working Model 686 Public Key Infrastructure 688 Virtual Private Networks 692 Secure Sockets Layer/Transport Layer Security 699 SSL Handshake 700 Summary 704 Part VI: The Security Threat and Response Chapter 23: Intrusion Detection and Response 707 Intrusion Detection Mechanisms 707 Honeypots 712 Incident Handling 716 Summary 727 Chapter 24: Digital Forensics 729 Computer Forensics Defined 730 Traditional Computer Forensics 730 Proactive Forensics 746 Future Research Areas 748 The Forensic Life Cycle 750 Summary 750 Chapter 25: Security Assessments, Testing, and Evaluation 751 Information Assurance Approaches and Methodologies 751 Certification and Accreditation 756 Diacap 760 Federal Information Processing Standard 102 763 OMB Circular A-130 764 The National Institute of Standards and Technology Assessment Guidelines 765 Penetration Testing 770 Auditing and Monitoring 772 Summary 774 Part VII: Integrated Cyber Security Chapter 26: Validating Your Security 777 Overview 777 Current State of Penetration Testing 780 Formal Penetration Testing Methodology 783 Steps to Exploiting a System 787 Summary 795 Chapter 27: Data Protection 797 Endpoint Security 799 Insider Threats and Data Protection 805 Summary 806 Chapter 28: Putting Everything Together 809 Critical Problems Facing Organizations 809 General Tips for Protecting a Site 815 Security Best Practices 819 Summary 834 Chapter 29: The Future 835 Approaching the Problem 835 Mission Resilience 837 Limiting Failure Points 844 Summary 847 Index 849

    15 in stock

    £38.00

  • Windows 7 for Seniors for Dummies

    John Wiley & Sons Inc Windows 7 for Seniors for Dummies

    15 in stock

    Book SynopsisThis easy-to-understand guide helps seniors get started with Windows 7! Many seniors use a home computer to stay connected to family and friends.Table of ContentsIntroduction 1 Part I: Getting to Know Windows 7 7 1: Getting Comfortable with the Windows 7 Desktop 9 2: Examining the Anatomy of a Window 29 3: Creating Your First Documents 45 4: Organizing Your Documents 69 Part II: Getting Things Done in Windows 7 93 5: Taking Advantage of the Windows Accessories 95 6: Installing and Removing Programs 115 7: Working with Printers and Other Add-On Devices 127 Part III: Discovering the Internet 141 8: Connecting to the Internet 143 9: Finding What You Need on the Web 153 10: Sending and Receiving E-Mail 179 Part IV: Having Fun with Windows 7 201 11: Playing Games 203 12: Enjoying Photos in Windows 7 213 13: Listening to Music and Watching DVDs 235 Part V: Having It Your Way with Windows 7 259 14: Making Windows 7 More Fun to Use 261 15: Using the Taskbar and Start Menu Smartly 285 16: Making Windows 7 Easier to Use 303 Part VI: Staying Safe and Keeping Windows 7 Healthy 323 17: Updating Windows 7 325 18: Protecting Your Computer 341 19: Keeping Your Data Safe 359 Index 377

    15 in stock

    £15.29

  • eDiscovery for Dummies

    John Wiley & Sons Inc eDiscovery for Dummies

    15 in stock

    Book SynopsisDiscover the process of e-discovery and put good practices in place. Electronic information involved in a lawsuit requires a completely different process for management and archiving than paper information.Table of ContentsIntroduction 1 Who Should Read This Book? 1 About This Book 2 What You’re Not to Read 2 Foolish Assumptions 2 How This Book Is Organized 3 Part I: Examining e-Discovery and ESI Essentials 3 Part II: Guidelines for e-Discovery and Professional Competence 3 Part III: Identifying, Preserving, and Collecting ESI 4 Part IV: Processing, Protecting, and Producing ESI 4 Part V: Getting Litigation Ready 4 Part VI: Strategizing for e-Discovery Success 5 Part VII: The Part of Tens 5 Glossary 5 Icons Used in This Book 5 Where to Go from Here 6 Part I: Examining e-Discovery and ESI Essentials 7 Chapter 1: Knowing Why e-Discovery Is a Burning Issue 9 Getting Thrust into the Biggest Change in the Litigation 10 New rules put electronic documents under a microscope 11 New rules and case law expand professional responsibilities 12 Distinguishing Electronic Documents from Paper Documents 14 ESI has more volume 15 ESI is more complex 15 ESI is more fragile 16 ESI is harder to delete 17 ESI is more software and hardware dependent 18 Viewing the Litigation Process from 1,000 Feet 18 Examining e-Discovery Processes 20 Creating and retaining electronic records 20 Identifying, preserving, and collecting data relevant to a legal matter 21 Processing and filtering to remove the excess 22 Reviewing and analyzing for privilege 22 Producing what’s required 23 Clawing back what sneaked out 23 Presenting at trial 24 Chapter 2: Taking a Close Look at Electronically Stored Information (ESI) 25 Spotting the ESI in the Game Plan 26 Viewing the Life of Electronic Information 27 Accounting for age 27 Tracking the rise and fall of an e-mail 29 Understanding Zubulake I 30 Taking the two-tier test 34 Preserving the Digital Landscape 36 Facing Sticker Shock: What ESI Costs 37 Estimating hard and hidden costs 39 Looking at the costs of being surprised by a request 40 Chapter 3: Building e-Discovery Best Practices into Your Company 43 Setting Up a Reasonable Defensive Strategy 44 Heeding judicial advice 45 Keeping ESI intact and in-reach 46 Braking for Litigation Holds 48 Insuring a stronghold 48 Getting others to buy-in 49 Holding on tight to your ESI 50 Putting Best Practices into Place 51 Forming Response Teams 54 Putting Project Management into Practice 55 Tackling the triple constraints 56 Managing the critical path 57 Maintaining Ethical Conduct and Credibility 57 Part II: Guidelines for e-Discovery and Professional Competence 59 Chapter 4: The Playbook: Federal Rules and Advisory Guidelines 61 Knowing the Rules You Must Play By 62 Deciphering the FRCP 63 FRCP 1 63 FRCP 16 63 FRCP 26 65 FRCP 33 and 34 66 Applying the Rules to Criminal Cases 66 F.R. Crim. P. Rule 41 71 F. R. Crim. P. Rule 16 71 F. R. Crim. P. Rule 17 and 17.1 71 Learning about Admissibility 71 Lessening the Need for Judicial Intervention by Cooperation 73 Limiting e-Discovery 74 Finding Out About Sanctions 75 Rulings on Metadata 77 Getting Guidance but Not Authority from Sedona Think Tanks 79 Collecting the Wisdom of the Chief Justices and National Law Conference 79 Minding the e-Discovery Reference Model 80 Following the Federal Rules Advisory Committee 81 Chapter 5: Judging Professional Competence and Conduct 83 Making Sure Your Attorney Gives a Diligent Effort 84 Looking at what constitutes a diligent effort 84 Searching for evidence 85 Producing ESI 86 Providing a certification 86 Avoiding Being Sanctioned 87 FRCP sanctions 87 Inherent power sanctions 89 Knowing the Risks Introduced by Legal Counsel 91 Acting bad: Attorney e-discovery misconduct 91 Relying on the American Bar Association and state rules of professional conduct 93 Learning from Those Who Gambled Their Cases and Lost 94 Policing e-Discovery in Criminal Cases 96 Part III: Identifying, Preserving, and Collecting ESI 99 Chapter 6: Identifying Potentially Relevant ESI 101 Calling an e-Discovery Team into Action 102 Clarifying the Scope of e-Discovery 104 Reducing the Burden with the Proportionality Principle 107 Proportionality of scale 107 Negotiating with proportionality 108 Mapping the Information Architecture 108 Creating a data map 108 Overlooking ESI 111 Describing data retention policies and procedures 112 Proving the reasonable accessibility of ESI sources 113 Taking Lessons from the Mythical Member 113 Chapter 7: Complying with ESI Preservation and a Litigation Hold 115 Distinguishing Duty to Preserve from Preservation 116 Following The Sedona Conference 116 The Sedona Conference WG1 guidelines 117 Seeing the rules in the WG1 decision tree 119 Recognizing a Litigation Hold Order and Obligation 119 Knowing what triggers a litigation hold 120 Knowing when to issue a litigation hold 120 Knowing when a hold delay makes you eligible for sanctions 122 Accounting for downsizing and departing employees 122 Throwing a Wrench into Digital Recycling 123 Suspending destructive processes 123 Where do you put a terabyte? 124 Implementing the Litigation Hold 125 Documenting that custodians are in compliance 127 Rounding up what needs to be collected 127 Judging whether a forensics-level preservation is needed 130 Chapter 8: Managing e-Discovery Conferences and Protocols 133 Complying with the Meet-and-Confer Session 133 Preparing for the Meet-and-Confer Session 136 Preservation of evidence 136 Form of production 137 Privileged or protected ESI 138 Any other issues regarding ESI 139 Agreeing on a Timetable 139 Selecting a Rule 30(b)(6) Witness 140 Finding Out You and the Opposing Party May Have Mutual Interests 141 Part IV: Processing, Protecting, and Producing ESI 143 Chapter 9: Processing, Filtering, and Reviewing ESI 145 Planning, Tagging, and Bagging 146 Taking a finely tuned approach 147 Finding exactly what you need 147 Stop and identify yourself 149 Two wrongs and a right 150 Learning through Trial and Error 151 Doing Early Case Assessment 152 Vetting vendors 153 Breaking Out the ESI 154 Crafting the Hunt 156 Deciding on filters 156 Keyword or phrase searching 157 Deduping 157 Concept searching 158 Heeding the Grimm roadmap 158 Sampling to Validate 159 Testing the validity of the search 159 Documenting sampling efforts 160 Doing the Review 161 Choosing a review platform 161 How to perform a review 163 Chapter 10: Protecting Privilege, Privacy, and Work Product 165 Facing the Rising Tide of Electronic Information 166 Respecting the Rules of the e-Discovery Game 166 Targeting relevant information 167 Seeing where relevance and privilege intersect 168 Managing e-discovery of confidential information 170 Listening to the Masters 172 Getting or Avoiding a Waiver 172 Asserting a claim 173 Preparing a privilege log 173 Responding to ESI disclosure 175 Applying FRE 502 to disclosure 175 Leveling the Playing Field through Agreement 177 Checking out the types of agreements 177 Shoring up your agreements by court order 178 Chapter 11: Producing and Releasing Responsive ESI 181 Producing Data Sets 182 Packing bytes 183 Staging production 184 Being alert to native production motions 185 Redacting prior to disclosure 187 Providing Detailed Documentation 190 Showing an Unbroken Chain of Custody 192 Keeping Metadata Intact 193 Part V: Getting Litigation Ready 199 Chapter 12: Dealing with Evidentiary Issues and Challenges 201 Looking at the Roles of the Judge and Jury 202 Qualifying an Expert 202 Getting Through the Five Hurdles of Admissibility 204 Admitting Relevant ESI 204 Authenticating ESI 205 Self-authenticating ESI 206 Following the chain of custody 206 Authenticating specific types of ESI 207 Analyzing the Hearsay Rule 208 Providing the Best Evidence 210 Probing the Value of the ESI 210 Chapter 13: Bringing In Special Forces: Computer Forensics 211 Powering Up Computer Forensics 212 Knowing when to hire an expert 212 Knowing what to expect from an expert 214 Judging an expert like judges do 214 Doing a Scientific Forensic Search 215 Testing, Sampling, and Refining Searches for ESI 216 Applying C-Forensics to e-Discovery 218 Following procedure 219 Preparing for an investigation 220 Acquiring and preserving the image 222 Authenticating with hash 223 Recovering deleted ESI 224 Analyzing to broaden or limit 225 Expressing in Boolean 226 Producing and documenting in detail 228 Reinforcing E-Discovery 229 Fighting against forensic fishing attempts 229 Fighting with forensics on your team 230 Defending In-Depth 231 Part VI: Strategizing for e-Discovery Success 233 Chapter 14: Managing and Archiving Business Records 235 Ratcheting Up IT’s Role in Prelitigation 236 Laying the cornerstone of ERM 236 Pitching your tent before the storm 237 Telling Documents and Business Records Apart 238 Designing a Defensible ERM Program 240 Designing by committee 240 Starting with the basics 240 Getting management on board with your ERM program 242 Crafting a risk-reducing policy 244 Punching up your e-mail policy 245 Building an ERM Program 246 Kicking the keep-it-all habit 248 Doing what you say you are 248 Getting an A+ in Compliance 249 Chapter 15: Viewing e-Discovery Law from the Bench 251 Examining Unsettled and Unsettling Issues 252 Applying a reasonableness standard 252 Forcing cooperation 253 Looking at what’s reasonably accessible 254 Determining who committed misconduct 254 Exploring the Role of the Judge 258 Actively participating 258 Scheduling conferences 259 Appointing experts 259 Determining the scope of costs 262 Chapter 16: e-Discovery for Large-Scale and Complex Litigation 263 Preparing for Complex Litigation 263 Ensuring quality control 265 Getting a project management process in place 266 Proving the merits of a case by using ESI 266 Educating the Court about Your ESI 267 Using summary judgment and other tools 268 Employing an identification system 268 Form of production 269 Creating document depositories 269 Avoiding Judicial Resolution 270 Determining the Scope of Accessibility 271 Doing a good-cause inquiry 272 Cost-shifting 273 Getting Help 274 Partnering with vendors or service providers 274 Selecting experts or consulting companies 274 Chapter 17: e-Discovery for Small Cases 277 Defining Small Cases that Can Benefit from e-Discovery 278 Theft of proprietary data and breaches of contract 278 Marital matters 278 Defamation and Internet defamation 279 Characterizing Small Matters 280 Keeping ESI out of evidence 280 Shared characteristics with large cases 281 Unique characteristics and dynamics 282 Proceeding in Small Cases 283 Curbing e-Discovery with Proportionality 286 Sleuthing Personal Correspondence and Files 286 Part VII: The Part of Tens 289 Chapter 18: Ten Most Important e-Discovery Rules 291 FRCP 26(b)(2)(B) Specific Limitations on ESI 291 FRCP 26(b)(5)(B) Protecting Trial-Preparation Materials and Clawback 292 FRCP 26(a)(1)(C) Time for Pretrial Disclosures; Objections 293 FRCP 26(f) Conference of the Parties; Planning for Discovery 294 FRCP 26(g) Signing Disclosures and Discovery Requests, Responses, and Objections 294 FRCP 30(b)(6) Designation of a Witness 295 FRCP 34(b) Form of Production 296 FRCP 37(e) Safe Harbor from Sanctions for Loss of ESI 297 Federal Rules of Evidence 502(b) Inadvertent Disclosure 298 Federal Rule of Evidence 901 Requirement of Authentication or Identification 298 Chapter 19: Ten Ways to Keep an Edge on Your e-Discovery Expertise 301 The Sedona Conference and Working Group Series 302 Discovery Resources 303 Law Technology News 303 Electronic Discovery Law 304 E-Discovery Team Blog 304 LexisNexis Applied Discovery Online Law Library 305 American Bar Association Journal 305 Legal Technology’s Electronic Data Discovery 306 Supreme Court of the United States 306 Cornell Law School Legal Information Institute and Wex 307 Chapter 20: Ten e-Discovery Cases with Really Good Lessons 309 Zubulake v. UBS Warburg, 2003–2005; Employment Discrimination 309 Qualcomm v. Broadcom, 2008; Patent Dispute 310 Victor Stanley, Inc. v. Creative Pipe, Inc., 2008; Copyright Infringement 311 Doe v. Norwalk Community College, 2007; the Safe Harbor of FRCP Rule 37(e) 312 United States v. O’keefe, 2008; Criminal Case Involving e-discovery 313 Lorraine v. Markel American Insurance Co., 2007; Insurance Dispute 314 Mancia v. Mayflower Textile Services Co., et al., 2008; the Duty of Cooperate and FRCP Rule 26(g) 315 Mikron Industries Inc. v. Hurd Windows & Doors Inc., 2008; Duty to Confer 316 Gross Construction Associates, Inc., v. American Mfrs. Mutual Ins Co., 2009; Keyword Searches 317 Gutman v. Klein, 2008; Termination Sanction and Spoliation 318 Glossary 321 Index 333

    15 in stock

    £19.19

  • Fundamentals Signal Processing

    John Wiley & Sons Inc Fundamentals Signal Processing

    15 in stock

    Book SynopsisFundamentals of Signal Processing for Sound and Vibration Engineers is based on Joe Hammond's many years of teaching experience at the Institute of Sound and Vibration Research, University of Southampton.Table of ContentsPreface. 1. Introduction to Signal Processing. 1.1 Descriptions of Physical Data (Signals). 1.2 Classification of Data. PART I: DETERMINISTIC SIGNALS. 2. Classification of Deterministic Data. 2.1 Periodic Signals. 2.2 Almost Periodic Signals. 2.3 Transient Signals. 2.4 Brief Summary and Concluding Remarks. 2.5 MATLAB Examples. 3. Fourier Series. 3.1 Periodic Signals and Fourier Series. 3.2 The Delta Function. 3.3 Fourier Series and the Delta Function. 3.4 The Complex Form of the Fourier Series. 3.5 Spectra. 3.6 Some Computational Considerations. 3.7 Brief Summary. 3.8 MATLAB Examples. 4. Fourier Integrals (Fourier Transform) and Continuous-Time Linear Systems. 4.1 The Fourier Integral. 4.2 Energy Spectra. 4.3 Some Examples of Fourier Transforms. 4.4 Properties of Fourier Transforms. 4.5 The Importance of Phase. 4.6 Echoes. 4.7 Continuous-Time Linear Time-Invariant Systems and Convolution. 4.8 Group Delay (Dispersion). 4.9 Minimum and Non-Minimum Phase Systems. 4.10 The Hilbert Transform. 4.11 The Effect of Data Truncation (Windowing). 4.12 Brief Summary. 4.13 MATLAB Examples. 5. Time Sampling and Aliasing. 5.1 The Fourier Transform of An Ideal Sampled Signal. 5.2 Aliasing and Anti-Aliasing Filters. 5.3 Analogue-to-Digital Conversion and Dynamic Range. 5.4 Some Other Considerations in Signal Acquisition. 5.5 Shannon’s Sampling Theorem (Signal Reconstruction). 5.6 Brief Summary. 5.7 MATLAB Examples. 6. The Discrete Fourier Transform. 6.1 Sequences and Linear Filters. 6.2 Frequency Domain Representation of Discrete Systems and Signals. 6.3 The Discrete Fourier Transform. 6.4 Properties of the DFT. 6.5 Convolution of Periodic Sequences. 6.6 The Fast Fourier Transform. 6.7 Brief Summary. 6.8 MATLAB Examples. PART II: INTRODUCTION TO RANDOM PROCESSES. 7. Random Processes. 7.1 Basic Probability Theory. 7.2 Random Variables and Probability Distributions. 7.3 Expectations of Functions of a Random Variable. 7.4 Brief Summary. 7.5 MATLAB Examples. 8. Stochastic Processes; Correlation Functions and Spectra. 8.1 Probability Distribution Associated with a Stochastic Process. 8.2 Moments of a Stochastic Process. 8.3 Stationarity. 8.4 The Second Moments of a Stochastic Process; Covariance. (Correlation) Functions. 8.5 Ergodicity and Time Averages. 8.6 Examples. 8.7 Spectra. 8.8 Brief Summary. 8.9 MATLAB Examples. 9. Linear System Response to Random Inputs: System Identification. 9.1 Single-Input, Single-Output Systems. 9.2 The Ordinary Coherence Function. 9.3 System Identification. 9.4 Brief Summary. 9.5 MATLAB Examples. 10. Estimation Methods and Statistical Considerations. 10.1 Estimator Errors and Accuracy. 10.2 Mean Value and Mean Square Value. 10.3 Correlation and Covariance Functions. 10.4 Power Spectral Density Function. 10.5 Cross-spectral Density Function. 10.6 Coherence Function. 10.7 Frequency Response Function. 10.8 Brief Summary. 10.9 MATLAB Examples. 11. Multiple-Input/Response Systems. 11.1 Description of Multiple-Input, Multiple-Output (MIMO) Systems. 11.2 Residual Random Variables, Partial and Multiple Coherence Functions. 11.3 Principal Component Analysis. Appendices. References. Index.

    15 in stock

    £79.16

  • Digital Multimedia

    John Wiley & Sons Inc Digital Multimedia

    15 in stock

    Book SynopsisDesigned as the foundation text in multimedia, and now in full color, this comprehensive resource covers basic principles of each media type - text, graphics, audio, animation and video - describing their digitization and progressing onto issues that arise when media are combined.Table of ContentsPreface. 1 Introduction. 2 Fundamentals. 3 Vector Graphics. 4 Bitmapped Images. 5 Colour. 6 Video. 7 Animation. 8 Sound. 9 Text and Typography. 10 Hypermedia. 11 Design Principles. 12 Interactivity. 13 Accessibility. 14 Scripting. 15 XML and Multimedia. 16 Multimedia and Networks. Appendix: Standards.

    15 in stock

    £51.26

  • Core and Metro Networks

    John Wiley & Sons Inc Core and Metro Networks

    10 in stock

    Book SynopsisWritten by leading practitioners from such cutting-edge companies as Alcatel, Siemens, Lucent, France Telecom, BT, and Telefonica, Core and Metro Networks provides a comprehensive overview of the status, the challenges, the architectures, and technological solutions for core and metropolitan networks aiming to support broadband services.Table of ContentsPreface 1 The Emerging Core and Metropolitan Networks Andrea Di Giglio, Angel Ferreiro and Marco Schiano 1.1 Introduction 1.2 General Characteristics of Transport Network 1.3 Future Networks Challenges 1.4 New Transport Networks Architectures 1.5 Transport Networks Economics Acronyms References 2 The Advances in Control and Management for Transport Networks Dominique Verchere and Bela Berde 2.1 Drivers Towards More Uniform Management and Control Networks 2.2 Control Plane as Main Enabler to Autonomic Network Integration 2.3 Multilayer Interactions and Network Models 2.4 Evolution of Connection Services and Special Cases of Optical Networks 2.5 Conclusion References 3 Elements from Telecommunications Engineering Chris Matrakidis, John Mitchell and Benn Thomsen 3.1 Digital Optical Communication Systems 3.2 Performance Estimation References 4 Enabling Technologies Stefano Santoni, Roberto Cigliutti, Massimo Giltrelli, Pasquale Donadio, Chris Matrakidis, Andrea Paparella, Tanya Politi, Marcello Potenza, Erwan Pincemin and Alexandros Stavdas 4.1 Introduction 4.2 Transmitters 4.3 Receiver 4.4 The Optical Fiber 4.5 Optical Amplifiers 4.6 Optical Filters and Multiplexers References 5 Assessing Physical Layer Degradations Andrew Lord, Marcello Potenza, Marco Forzati and Erwan Pincemin 5.1 Introduction and Scope 5.2 Optical Power Budgets, Part I 5.3 System Bandwidth 5.4 Comments on Budgets for Nonlinear Effects and Optical Transients 5.5 Semianalytical Models for Penalties 5.6 Translucent or Hybrid Networks 5.7 Appendix References 6 Combating Physical Layer Degradations Herbert Haunstein, Harald Rohde, Marco Forzati, Erwan Pincemin, Jonas Martensson, Anders Djupsj€obacka and Tanya Politi 6.1 Introduction 6.2 Dispersion-Compensating Components and Methods for CD and PMD 6.3 Modulation Formats 6.4 Electronic Equalization of Optical Transmission Impairments 6.5 FEC in Lightwave Systems 6.6 Appendix: Experimental Configuration and Measurement Procedure for Evaluation and Comparison for Different Modulation Formats for 40 Gbit/s Transmission Acknowledgments References Dictionary of Optical Networking Didier Colle, Chris Matrakidis and Josep Sol_e-Pareta Acronyms Index

    10 in stock

    £110.15

  • Changing Software Development

    John Wiley & Sons Inc Changing Software Development

    15 in stock

    Book SynopsisChanging Software Development explains why software development is an exercise in change management and organizational intelligence. An underlying belief is that change is learning and learning creates knowledge. By blending the theory of knowledge management, developers and managers will gain the tools to enhance learning and change to accommodate new innovative approaches such as agile and lean computing. Changing Software Development is peppered with practical advice and case studies to explain how and why knowledge, learning and change are important in the development process. Today, managers are pre-occupied with knowledge management, organization learning and change management; while software developers are often ignorant of the bigger issues embedded in their work. This innovative book bridges this divide by linking the software world of technology and processes to the business world of knowledge, learning and change.Table of ContentsPreface. Acknowledgements. 1 Introduction. 1.1 Why read this book? 1.2 Who are software developers? 1.3 Software developers are knowledge workers. 1.4 Drucker’s challenge. 1.5 Prototype of future knowledge workers. 1.6 Software: embedded knowledge. 1.7 Authority and leadership. 1.8 Practical theory. 1.9 Begin with yourself. 1.10 Book organisation. 2 Understanding Agile. 2.1 Roots of Agile thinking. 2.2 Positioning Agile. 2.3 Common practices of Agile teams. 2.4 Applicability outside of software development. 2.5 Conclusion. 3 Knowledge. 3.1 The difference between Knowledge and Information. 3.2 Knowledge into action. 3.3 Explicit and Tacit knowledge. 3.4 Sticky knowledge. 3.5 Problems with knowledge. 3.6 Where is knowledge in software development? 3.7 Knowledge creations. 3.8 Conclusion. 4 Learning. 4.1 Three knowledge domains. 4.2 Developing software is learning. 4.3 Learning benefits your business. 4.4 Learning theories. 4.5 Learning, change, innovation, problem solving. 4.6 The role of leaders. 4.7 Seed learning. 4.8 Conclusion. 5 The learning organisation. 5.1 Defining the learning organisation. 5.2 The infinite and the finite game. 5.3 Layers of the organisations. 5.4 Learning in practice: Senge’s view. 5.5 Blocks to learning. 5.6 Conclusion. 6 Information Technology – the bringer of change. 6.1 Change. 6.2 Benefits of technology change. 6.3 Change is what IT people do to other people. 6.4 Software projects fail: why are we surprised? 6.5 Change starts with business requirements. 6.6 Conclusion. 7 Understanding change. 7.1 Defining change. 7.2 Change spectrum. 7.3 Radical change. 7.4 Routine change in software development. 7.5 Continuous improvement. 7.6 Charting a course. 7.7 Internal and External forces for change. 7.8 Conclusion. 8 Change models. 8.1 Learning and Change. 8.2 Lewin’s change theory. 8.3 Satir’s theory of change. 8.4 Kotter. 8.5 Theory E and Theory O of change. 8.6 Appreciative inquiry. 8.7 Models, models, models. 8.8 Motivating change. 8.9 When not to change. 8.10 Conclusion. 9 Making change happen. 9.1 Build a case for change. 9.2 Slack in action: make time and space for learning and change. 9.3 Leading the change. 9.4 Create feedback loops. 9.5 Remove barriers. 9.6 Conclusion. 10. Individuals and empowerment. 10.1 Involve people. 10.2 Coaching. 10.3 Empowerment. 10.4 That difficult individual. 10.5 Developing the next leaders. 10.6 Time to go. 10.7 Conclusion. 11. Rehearsing tomorrow. 11.1 Future memories. 11.2 Planning. 11.3 Change events. 11.4 Outsiders. 11.5 Conclusion. 12 New beginnings. 12.1 The change problem. 12.2 Bottom-up over top-down. 12.3 Begin with yourself. 12.4 Making learning happen. 12.5 Create a vision, draw up a plan. 12.6 Three interlocking ideas. 12.7 Change never ends. 12.8 Conclusion. Further reading. Agile and Lean software development. Business. Knowledge. Learning and Change. Futher Reading. References. Index.

    15 in stock

    £23.99

  • SIP Security

    John Wiley & Sons Inc SIP Security

    1 in stock

    Book SynopsisInternet Telephony is one of the most important and fastest growing technologies for emerging mobile networks, as it provides a viable technical and economical alternative to current telecommunication networks. SIP is a standard protocol that has become the de-facto standard for VoIP and multimedia services.Table of ContentsForeword. About the Authors. Acknowledgment. 1 Introduction. 2 Introduction to Cryptographic Mechanisms. 2.1 Cryptographic Algorithms. 2.2 Secure Channel Establishment. 2.3 Authentication in 3GPP Networks. 2.4 Security Mechanisms Threats and Vulnerabilities. 3 Introduction to SIP. 3.1 What is SIP, Why Should we Bother About it and What are Competing Technologies? 3.2 SIP: the Common Scenarios. 3.3 Introduction to SIP Operation: the SIP Trapezoid. 3.4 SIP Components. 3.5 Addressing in SIP. 3.6 SIP Message Elements. 3.7 SIP Dialogs and Transactions. 3.8 SIP Request Routing. 3.9 Authentication, Authorization, Accounting. 3.10 SIP and Middleboxes. 3.11 Other Parts of the SIP Eco-system. 3.12 SIP Protocol Design and Lessons Learned. 4 Introduction to IMS. 4.1 SIP in IMS. 4.2 General Architecture. 4.3 Session Control and Establishment in IMS. 5 Secure Access and Interworking in IMS. 5.1 Access Security in IMS. 5.2 Network Security in IMS. 6 User Identity in SIP. 6.1 Identity Theft. 6.2 Identity Authentication using S/MIME. 6.3 Identity Authentication in Trusted Environments. 6.4 Strong Authenticated Identity. 6.5 Identity Theft Despite Strong Identity. 6.6 User Privacy and Anonymity. 6.7 Subscription Theft. 6.8 Fraud and SIP. 7 Media Security. 7.1 The Real-time Transport Protocol. 7.2 Secure RTP. 7.3 Key Exchange. 8 Denial-of-service Attacks on VoIP and IMS Services. 8.1 Introduction. 8.2 General Classification of Denial-of-service Attacks. 8.3 Bandwidth Consumption and Denial-of-service Attacks on SIP Services. 8.4 Bandwidth Depletion Attacks. 8.5 Memory Depletion Attacks. 8.6 CPU Depletion Attacks. 8.7 Misuse Attacks. 8.8 Distributed Denial-of-service Attacks. 8.9 Unintentional Attacks. 8.10 Address Resolution-related Attacks. 8.11 Attacking the VoIP Subscriber Database. 8.12 Denial-of-service Attacks in IMS Networks. 8.13 DoS Detection and Protection Mechanisms. 8.14 Detection of DoS Attacks. 8.15 Reacting to DoS Attacks. 8.16 Preventing DoS Attacks. 8.17 DDoS Signature Specification. 9 SPAM over IP Telephony. 9.1 Introduction. 9.2 Spam Over SIP: Types and Applicability. 9.3 Why is SIP Good for Spam? 9.4 Legal Side of Unsolicited Communication. 9.5 Fighting Unsolicited Communication. 9.6 General Antispam Framework. Bibliography. Index.

    1 in stock

    £80.96

  • The H.264 Advanced Video Compression Standard

    John Wiley & Sons Inc The H.264 Advanced Video Compression Standard

    15 in stock

    Book SynopsisH.264 Advanced Video Coding or MPEG-4 Part 10 is fundamental to a growing range of markets such as high definition broadcasting, internet video sharing, mobile video and digital surveillance. This book reflects the growing importance and implementation of H.264 video technology. Offering a detailed overview of the system, it explains the syntax, tools and features of H.264 and equips readers with practical advice on how to get the most out of the standard. Packed with clear examples and illustrations to explain H.264 technology in an accessible and practical way. Covers basic video coding concepts, video formats and visual quality. Explains how to measure and optimise the performance of H.264 and how to balance bitrate, computation and video quality. Analyses recent work on scalable and multi-view versions of H.264, case studies of H.264 codecs and new technological developments such as the popular High Profile extensions. An Table of ContentsAbout the Author. Preface. Glossary. List of figures. List of tables. 1 Chapter 1: Introduction. 1.1 A change of scene. 1.2 Driving the change. 1.3 The role of standards. 1.4 Why H.264 Advanced Video Coding is important. 1.5 About this book. 2 Chapter 2: Video Formats and Quality. 2.1 Introduction. 2.2 Natural video scenes. 2.3 Capture. 2.4 Colour spaces. 2.5 Video Formats. 2.6 Quality. 2.7 Summary. 2.8 References. 3 Chapter 3: Video Coding Concepts. 3.1 Introduction. 3.2 Video CODEC. 3.3 Prediction model. 3.4 Image model. 3.5 Entropy coder. 3.6 The hybrid DPCM/DCT video CODEC model. 3.7 Summary. 3.8 References. 4 Chapter 4: What is H.264? 4.1 Introduction. 4.2 What is H.264? 4.3 How does an H.264 codec work? 4.4 The H.264/AVC Standard. 4.5 H.264 Profiles and Levels. 4.6 The H.264 Syntax. 4.7 H.264 in practice. 4.8 Summary. 4.9 References. 5 H.264 syntax. 5.1 Introduction. 5.2 H.264 syntax. 5.3 Frames, fields and pictures. 5.4 NAL unit. 5.5 Parameter Sets 5.6 Slice Layer. 5.7 Macroblock Layer. 5.8 Summary. 5.9 References. 6 Chapter 6: H.264 Prediction. 6.1 Introduction. 6.2 Macroblock Prediction. 6.3 Intra Prediction. 6.4 Inter Prediction. 6.5 Loop filter. 6.6 Summary. 6.7 References. 7 Chapter 7: H.264 transform and coding. 7.1 Introduction. 7.2 Transform and quantization. 7.3 Block scan orders. 7.4 Coding. 7.5 Summary. 7.6 References. 8 H.264 conformance, transport and licensing. 8.1 Introduction. 8.2 Conforming to the Standard. 8.3 H.264 coding tools for transport support. 8.4 Transport of H.264 data. 8.5 Supplemental Information. 8.6 Licensing H.264/AVC. 8.7 Summary. 8.8 References. 9 Chapter 9: H.264 performance. 9.1 Introduction. 9.2 Experimenting with H.264. 9.3 Performance comparisons. 9.4 Rate control. 9.5 Mode selection. 9.6 Low complexity coding. 9.7 Summary. 9.8 References. 10 Chapter 10: Extensions and directions. 10.1 Introduction. 10.2 Scalable Video Coding. 10.3 Multiview Video Coding. 10.4 Configurable Video Coding. 10.5 Beyond H.264/AVC. 10.6 Summary. 10.7 References. Index.

    15 in stock

    £79.16

  • Digital Forensics

    John Wiley and Sons Ltd Digital Forensics

    10 in stock

    Book SynopsisThe vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements traditional scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidentTrade Review?This book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations.? (Reviews, May 2009)Table of ContentsPreface. Acknowledgments. 1. Introduction. 1.1 Key developments. 1.2 Digital Devices in Society. 1.3 Technology and Culture. 1.4 Comment. 2. Evidential Potential of Digital Devices. 2.1 Closed vs. Open Systems. 2.2 Evaluating Digital Evidence Potential. 3. Device Handling. 3.1 Seizure Issues. 3.2 Device Identification. 3.3 Networked Devices. 3.4 Contamination. 4. Examination Principles. 4.1 Previewing. 4.2 Imaging. 4.3 Continuity and Hashing. 4.4 Evidence locations. 5. Evidence Creation. 5.1 A 7-element security model. 5.2 A developmental model of digital systems. 5.3 Knowing. 5.4 Unknowing. 5.5 Audit and Logs. 6. Evidence Interpretation. 6.1 Data Content. 6.2 Data Context. 7. Internet Activity. 7.1 A little bit of history. 7.2 The ISO/OSI model. 7.3 The Internet Protocol Suite. 7.4 DNS. 7.5 Internet Applications. 8. Mobile Devices. 8.1 Mobile Phones & PDAs. 8.2 GPS. 8.3 Other Personal Technology. 9. Intelligence. 9.1 Device usage. 9.2 Profiling and Cyberprofiling. 9.3 Evaluating Online Crime: Automating the Model. 9.4 Application of the formula to Case Studies. 9.5 From success estimates to profiling. 9.6 Comments. 10. Case Studies and Examples. 10.1 Introduction. 10.2 Copyright Violation. 10.3 Missing person and Murder. 10.4 The view of a defence witness. A The "Aircraft Carrier" PC. B Additional Resources. C SIM card data report. Index.

    10 in stock

    £158.14

  • Digital Forensics

    John Wiley and Sons Ltd Digital Forensics

    15 in stock

    Book SynopsisThe vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements traditional scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations. The book provides investigators/SSMs/other managers with sufficient contextual and technical information to be able to make more effective use of digital evidence sources in support of a range of investigations. In particular, it considers the roles played by digital devices in society and hence in criminal activities. From this, it examines the role and nature of evidentTrade Review?This book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in support of investigations.? (Reviews, May 2009)Table of ContentsPreface vii Acknowledgments xi List of Tables xii List of Figures xiii 1 Introduction 1 1.1 Key developments 1 1.2 Digital devices in society 5 1.3 Technology and culture 6 1.4 Comment 7 2 Evidential Potential of Digital Devices 9 2.1 Closed vs. open systems 10 2.2 Evaluating digital evidence potential 17 3 Device Handling 19 3.1 Seizure issues 21 3.2 Device identification 31 3.3 Networked devices 36 3.4 Contamination 40 4 Examination Principles 43 4.1 Previewing 43 4.2 Imaging 47 4.3 Continuity and hashing 48 4.4 Evidence locations 49 5 Evidence Creation 55 5.1 A seven-element security model 56 5.2 A developmental model of digital systems 60 5.3 Knowing 61 5.4 Unknowing 63 5.5 Audit and logs 68 6 Evidence Interpretation 69 6.1 Data content 69 6.2 Data context 83 7 Internet Activity 85 7.1 A little bit of history 85 7.2 The ISO/OSI model 86 7.3 The internet protocol suite 90 7.4 DNS 94 7.5 Internet applications 96 8 Mobile Devices 109 8.1 Mobile phones and PDAs 109 8.2 GPS 116 8.3 Other personal technology 118 9 Intelligence 119 9.1 Device usage 119 9.2 Profiling and cyberprofiling 121 9.3 Evaluating online crime: automating the model 124 9.4 Application of the formula to case studies 126 9.5 From success estimates to profiling 129 9.6 Comments 129 10 Case Studies and Examples 131 10.1 Introduction 131 10.2 Copyright violation 131 10.3 Missing person and murder 133 10.4 The view of a defence witness 137 Appendix A The “Aircraft Carrier” PC 141 Appendix B Additional Resources 145 B.1 Hard disc and storage laboratory tools 145 B.2 Mobile phone/PDA tools 146 B.3 Live CDs 146 B.4 Recommended reading 146 Appendix C SIM Card Data Report 149 References 157 Index 161

    15 in stock

    £45.86

  • Ultrafast AllOptical Signal Processing Devices

    John Wiley & Sons Inc Ultrafast AllOptical Signal Processing Devices

    1 in stock

    Book SynopsisSemiconductor-based Ultra-Fast All-Optical Signal Processing Devices a key technology for the next generation of ultrahigh bandwidth optical communication systems! The introduction of ultra-fast communication systems based on all-optical signal processing is considered to be one of the most promising ways to handle the rapidly increasing global communication traffic. Such systems will enable real time super-high definition moving pictures such as high reality TV-conference, remote diagnosis and surgery, cinema entertainment and many other applications with small power consumption. The key issue to realize such systems is to develop ultra-fast optical devices such as light sources, all-optical gates and wavelength converters. Ultra-Fast All-Optical Signal Processing Devices discusses the state of the art development of semiconductor-based ultrafast all-optical devices, and their various signal processing applications for bit-rates 100Gb/s to 1Tb/s. UltTable of ContentsContributors ix Preface xi 1 Introduction 1Hiroshi Ishikawa 1.1 Evolution of Optical Communication Systems and Device Technologies 1 1.2 Increasing Communication Traffic and Power Consumption 2 1.3 Future Networks and Technologies 4 1.3.1 Future Networks 4 1.3.2 Schemes for Huge Capacity Transmission 5 1.4 Ultrafast All-Optical Signal Processing Devices 6 1.4.1 Challenges 6 1.4.2 Basics of the Nonlinear Optical Process 7 1.5 Overview of the Devices and Their Concepts 11 1.6 Summary 13 References 13 2 Light Sources 15Yoh Ogawa and Hitoshi Murai 2.1 Requirement for Light Sources 15 2.1.1 Optical Short Pulse Source 16 2.1.2 Optical Time Division Multiplexer 19 2.2 Mode-locked Laser Diodes 20 2.2.1 Active Mode Locking 20 2.2.2 Passive Mode Locking 23 2.2.3 Hybrid Mode Locking 25 2.2.4 Optical Synchronous Mode Locking 27 2.2.5 Application for Clock Extraction 29 2.3 Electro-absorption Modulator Based Signal Source 30 2.3.1 Overview of Electro-absorption Modulator 30 2.3.2 Optical Short Pulse Generation Using EAM 33 2.3.3 Optical Time Division Multiplexer Based on EAMs 38 2.3.4 160-Gb/s Optical Signal Generation 41 2.3.5 Detection of a 160-Gb/s OTDM Signal 43 2.3.6 Transmission Issues 46 2.4 Summary 47 References 47 3 Semiconductor Optical Amplifier Based Ultrafast Signal Processing Devices 53Hidemi Tsuchida and Shigeru Nakamura 3.1 Introduction 53 3.2 Fundamentals of SOA 53 3.3 SOA as an Ultrafast Nonlinear Medium 56 3.4 Use of Ultrafast Response Component by Filtering 57 3.4.1 Theoretical Background 57 3.4.2 Signal Processing Using the Fast Response Component of SOA 60 3.5 Symmetric Mach–Zehnder (SMZ) All-Optical Gate 64 3.5.1 Fundamentals of the SMZ All-Optical Gate 64 3.5.2 Technology of Integrating Optical Circuits for an SMZ All-Optical Gate 67 3.5.3 Optical Demultiplexing 68 3.5.4 Wavelength Conversion and Signal Regeneration 73 3.6 Summary 83 References 83 4 Uni-traveling-carrier Photodiode (UTC-PD) and PD-EAM Optical Gate Integrating a UTC-PD and a TravelingWave Electro-absorption Modulator 89Hiroshi Ito and Satoshi Kodama 4.1 Introduction 89 4.2 Uni-traveling-carrier Photodiode (UTC-PD) 91 4.2.1 Operation 91 4.2.2 Fabrication and Characterization 96 4.2.3 Characteristics of the UTC-PD 98 4.2.4 Photo Receivers 114 4.3 Concept of a New Opto-electronic Integrated Device 117 4.3.1 Importance of High-output PDs 117 4.3.2 Monolithic Digital OEIC 118 4.3.3 Monolithic PD-EAM Optical Gate 118 4.4 PD-EAM Optical Gate Integrating UTC-PD and TW-EAM 119 4.4.1 Basic Structure 119 4.4.2 Design 120 4.4.3 Optical Gating Characteristics of PD-EAM 123 4.4.4 Fabrication 125 4.4.5 Gating Characteristics 127 4.4.6 Applications for Ultrafast All-Optical Signal Processing 131 4.4.7 Future Work 143 4.5 Summary and Prospects 147 References 148 5 Intersub-band Transition All-Optical Gate Switches 155Nobuo Suzuki, Ryoichi Akimoto, Hiroshi Ishikawa and Hidemi Tsuchida 5.1 Operation Principle 155 5.1.1 Transition Wavelength 156 5.1.2 Matrix Element 157 5.1.3 Saturable Absorption 157 5.1.4 Absorption Recovery Time 158 5.1.5 Dephasing Time and Spectral Linewidth 160 5.1.6 Gate Operation in Waveguide Structure 162 5.2 GaN/AlN ISBT Gate 164 5.2.1 Absorption Spectra 165 5.2.2 Saturation of Absorption in Waveguides 168 5.2.3 Ultrafast Optical Gate 170 5.3 (CdS/ZnSe)/BeTe ISBT Gate 172 5.3.1 Growth of CdS/ ZnSe/ BeTe QWs and ISBT Absorption Spectra 173 5.3.2 Waveguide Structure for a CdS/ ZnSe/ BeTe Gate 177 5.3.3 Characteristics of a CdS/ ZnSe/ BeTe Gate 181 5.4 InGaAs/AlAs/AlAsSb ISBT Gate 183 5.4.1 Device Structure and its Fabrication 183 5.4.2 Saturation Characteristics and Time Response 184 5.5 Cross-phase Modulation in an InGaAs/AlAs/AlAsSb-based ISBT Gate 186 5.5.1 Cross-phase Modulation Effect and its Mechanisms 187 5.5.2 Application to Wavelength Conversion 192 5.6 Summary 195 References 196 6 Wavelength Conversion Devices 201Haruhiko Kuwatsuka 6.1 Introduction 201 6.2 Wavelength Conversion Schemes 202 6.2.1 Optical Gate Switch Type 202 6.2.2 Coherent Type Conversion 204 6.3 Physics of Four-wave Mixing in LDs or SOAs 205 6.3.1 Model 205 6.3.2 Asymmetric χ(3) for Positive and Negative Detuning 210 6.3.3 Symmetric χ(3) in Quantum Dot SOAs 212 6.4 Wavelength Conversion of Short Pulses Using FWM in Semiconductor Devices 214 6.4.1 Model 214 6.4.2 The Effect of the Stop Band in DFB-LDs 217 6.4.3 The Effect of the Depletion of Gain 218 6.4.4 The Pulse Width Broadening in FWM Wavelength Conversion 219 6.5 Experimental Results ofWavelength Conversion Using FWM in SOAs or LDs 220 6.5.1 Wavelength Conversion of Short Pulses Using a DFB-LD 220 6.5.2 Wavelength Conversion of 160-Gb/s OTDM Signal Using a Quantum Dot SOAs 221 6.5.3 Format-free Wavelength Conversion 222 6.5.4 Chromatic Dispersion Compensation of Optical Fibers Using FWM in DFB-LDs 224 6.6 The Future View ofWavelength Conversion Using FWM 225 6.7 Summary 226 References 226 7 Summary and Future Prospects 231Hiroshi Ishikawa 7.1 Introduction 231 7.2 Transmission Experiments 231 7.2.1 FESTA Experiments 231 7.2.2 Test Bed Field Experiment 235 7.2.3 Recent Transmission Experiments above 160-Gb/s 236 7.3 Requirements on Devices and Prospects 238 7.3.1 Devices Described in this Book 238 7.3.2 Necessity for New Functionality Devices and Technology 240 7.4 Summary 241 References 242 Index 243

    1 in stock

    £115.16

  • Protocols and Architectures for Wireless Sensor

    John Wiley & Sons Inc Protocols and Architectures for Wireless Sensor

    15 in stock

    Book SynopsisLearn all you need to know about wireless sensor networks! Protocols and Architectures for Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other.Trade Review"…this book represents an authoritative yet open-minded source to acquire a solid understanding of the fundamentals of WSNs. It is a recommended and enjoy read." (Computing Reviews, March 11, 2008)Table of ContentsPreface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Required mechanisms 9 1.5 Why are sensor networks different? 10 1.5.1 Mobile ad hoc networks and wireless sensor networks 10 1.5.2 Fieldbuses and wireless sensor networks 12 1.6 Enabling technologies for wireless sensor networks 13 Part I Architectures 15 2 Single-node architecture 17 2.1 Hardware components 18 2.1.1 Sensor node hardware overview 18 2.1.2 Controller 19 2.1.3 Memory 21 2.1.4 Communication device 21 2.1.5 Sensors and actuators 31 2.1.6 Power supply of sensor nodes 32 2.2 Energy consumption of sensor nodes 36 2.2.1 Operation states with different power consumption 36 2.2.2 Microcontroller energy consumption 38 2.2.3 Memory 39 2.2.4 Radio transceivers 40 2.2.5 Relationship between computation and communication 44 2.2.6 Power consumption of sensor and actuators 44 2.3 Operating systems and execution environments 45 2.3.1 Embedded operating systems 45 2.3.2 Programming paradigms and application programming interfaces 45 2.3.3 Structure of operating system and protocol stack 47 2.3.4 Dynamic energy and power management 48 2.3.5 Case Study: TinyOS and nesC 50 2.3.6 Other examples 53 2.4 Some examples of sensor nodes 54 2.4.1 The “Mica Mote” family 54 2.4.2 EYES nodes 54 2.4.3 BTnodes 54 2.4.4 Scatterweb 54 2.4.5 Commercial solutions 55 2.5 Conclusion 56 3 Network architecture 59 3.1 Sensor network scenarios 60 3.1.1 Types of sources and sinks 60 3.1.2 Single-hop versus multihop networks 60 3.1.3 Multiple sinks and sources 62 3.1.4 Three types of mobility 62 3.2 Optimization goals and figures of merit 63 3.2.1 Quality of service 64 3.2.2 Energy efficiency 65 3.2.3 Scalability 66 3.2.4 Robustness 67 3.3 Design principles for WSNs 67 3.3.1 Distributed organization 67 3.3.2 In-network processing 67 3.3.3 Adaptive fidelity and accuracy 70 3.3.4 Data centricity 70 3.3.5 Exploit location information 73 3.3.6 Exploit activity patterns 73 3.3.7 Exploit heterogeneity 73 3.3.8 Component-based protocol stacks and cross-layer optimization 74 3.4 Service interfaces of WSNs 74 3.4.1 Structuring application/protocol stack interfaces 74 3.4.2 Expressibility requirements for WSN service interfaces 76 3.4.3 Discussion 77 3.5 Gateway concepts 78 3.5.1 The need for gateways 78 3.5.2 WSN to Internet communication 79 3.5.3 Internet to WSN communication 80 3.5.4 WSN tunneling 81 3.6 Conclusion 81 Part II Communication Protocols 83 4 Physical layer 85 4.1 Introduction 85 4.2 Wireless channel and communication fundamentals 86 4.2.1 Frequency allocation 86 4.2.2 Modulation and demodulation 88 4.2.3 Wave propagation effects and noise 90 4.2.4 Channel models 96 4.2.5 Spread-spectrum communications 98 4.2.6 Packet transmission and synchronization 100 4.2.7 Quality of wireless channels and measures for improvement 102 4.3 Physical layer and transceiver design considerations in WSNs 103 4.3.1 Energy usage profile 103 4.3.2 Choice of modulation scheme 104 4.3.3 Dynamic modulation scaling 108 4.3.4 Antenna considerations 108 4.4 Further reading 109 5 MAC protocols 111 5.1 Fundamentals of (wireless) MAC protocols 112 5.1.1 Requirements and design constraints for wireless MAC protocols 112 5.1.2 Important classes of MAC protocols 114 5.1.3 MAC protocols for wireless sensor networks 119 5.2 Low duty cycle protocols and wakeup concepts 120 5.2.1 Sparse topology and energy management (STEM) 121 5.2.2 S-mac 123 5.2.3 The mediation device protocol 126 5.2.4 Wakeup radio concepts 127 5.2.5 Further reading 128 5.3 Contention-based protocols 129 5.3.1 CSMA protocols 129 5.3.2 PAMAS 131 5.3.3 Further solutions 132 5.4 Schedule-based protocols 133 5.4.1 LEACH 133 5.4.2 SMACS 135 5.4.3 Traffic-adaptive medium access protocol (TRAMA) 137 5.4.4 Further solutions 139 5.5 The IEEE 802.15.4 MAC protocol 139 5.5.1 Network architecture and types/roles of nodes 140 5.5.2 Superframe structure 141 5.5.3 GTS management 141 5.5.4 Data transfer procedures 142 5.5.5 Slotted CSMA-CA protocol 142 5.5.6 Nonbeaconed mode 144 5.5.7 Further reading 145 5.6 How about IEEE 802.11 and bluetooth? 145 5.7 Further reading 146 5.8 Conclusion 148 6 Link-layer protocols 149 6.1 Fundamentals: tasks and requirements 150 6.2 Error control 151 6.2.1 Causes and characteristics of transmission errors 151 6.2.2 ARQ techniques 152 6.2.3 FEC techniques 158 6.2.4 Hybrid schemes 163 6.2.5 Power control 165 6.2.6 Further mechanisms to combat errors 166 6.2.7 Error control: summary 167 6.3 Framing 167 6.3.1 Adaptive schemes 170 6.3.2 Intermediate checksum schemes 172 6.3.3 Combining packet-size optimization and FEC 173 6.3.4 Treatment of frame headers 174 6.3.5 Framing: summary 174 6.4 Link management 174 6.4.1 Link-quality characteristics 175 6.4.2 Link-quality estimation 177 6.5 Summary 179 7 Naming and addressing 181 7.1 Fundamentals 182 7.1.1 Use of addresses and names in (sensor) networks 182 7.1.2 Address management tasks 183 7.1.3 Uniqueness of addresses 184 7.1.4 Address allocation and assignment 184 7.1.5 Addressing overhead 185 7.2 Address and name management in wireless sensor networks 186 7.3 Assignment of MAC addresses 186 7.3.1 Distributed assignment of networkwide addresses 187 7.4 Distributed assignment of locally unique addresses 189 7.4.1 Address assignment algorithm 189 7.4.2 Address selection and representation 191 7.4.3 Further schemes 194 7.5 Content-based and geographic addressing 194 7.5.1 Content-based addressing 194 7.5.2 Geographic addressing 198 7.6 Summary 198 8 Time synchronization 201 8.1 Introduction to the time synchronization problem 201 8.1.1 The need for time synchronization in wireless sensor networks 202 8.1.2 Node clocks and the problem of accuracy 203 8.1.3 Properties and structure of time synchronization algorithms 204 8.1.4 Time synchronization in wireless sensor networks 206 8.2 Protocols based on sender/receiver synchronization 207 8.2.1 Lightweight time synchronization protocol (LTS) 207 8.2.2 How to increase accuracy and estimate drift 212 8.2.3 Timing-sync protocol for sensor networks (TPSN) 214 8.3 Protocols based on receiver/receiver synchronization 217 8.3.1 Reference broadcast synchronization (RBS) 217 8.3.2 Hierarchy referencing time synchronization (HRTS) 223 8.4 Further reading 226 9 Localization and positioning 231 9.1 Properties of localization and positioning procedures 232 9.2 Possible approaches 233 9.2.1 Proximity 233 9.2.2 Trilateration and triangulation 234 9.2.3 Scene analysis 237 9.3 Mathematical basics for the lateration problem 237 9.3.1 Solution with three anchors and correct distance values 238 9.3.2 Solving with distance errors 238 9.4 Single-hop localization 240 9.4.1 Active Badge 240 9.4.2 Active office 240 9.4.3 Radar 240 9.4.4 Cricket 241 9.4.5 Overlapping connectivity 241 9.4.6 Approximate point in triangle 242 9.4.7 Using angle of arrival information 243 9.5 Positioning in multihop environments 243 9.5.1 Connectivity in a multihop network 244 9.5.2 Multihop range estimation 244 9.5.3 Iterative and collaborative multilateration 245 9.5.4 Probabilistic positioning description and propagation 247 9.6 Impact of anchor placement 247 9.7 Further reading 248 9.8 Conclusion 249 10 Topology control 251 10.1 Motivation and basic ideas 251 10.1.1 Options for topology control 252 10.1.2 Aspects of topology-control algorithms 254 10.2 Controlling topology in flat networks – Power control 256 10.2.1 Some complexity results 256 10.2.2 Are there magic numbers? – bounds on critical parameters 257 10.2.3 Some example constructions and protocols 259 10.2.4 Further reading on flat topology control 265 10.3 Hierarchical networks by dominating sets 266 10.3.1 Motivation and definition 266 10.3.2 A hardness result 266 10.3.3 Some ideas from centralized algorithms 267 10.3.4 Some distributed approximations 270 10.3.5 Further reading 273 10.4 Hierarchical networks by clustering 274 10.4.1 Definition of clusters 274 10.4.2 A basic idea to construct independent sets 277 10.4.3 A generalization and some performance insights 278 10.4.4 Connecting clusters 278 10.4.5 Rotating clusterheads 279 10.4.6 Some more algorithm examples 280 10.4.7 Multihop clusters 281 10.4.8 Multiple layers of clustering 283 10.4.9 Passive clustering 284 10.4.10 Further reading 284 10.5 Combining hierarchical topologies and power control 285 10.5.1 Pilot-based power control 285 10.5.2 Ad hoc Network Design Algorithm (ANDA) 285 10.5.3 Clusterpow 286 10.6 Adaptive node activity 286 10.6.1 Geographic Adaptive Fidelity (GAF) 286 10.6.2 Adaptive Self-Configuring sEnsor Networks’ Topologies (ASCENT) 287 10.6.3 Turning off nodes on the basis of sensing coverage 288 10.7 Conclusions 288 11 Routing protocols 289 11.1 The many faces of forwarding and routing 289 11.2 Gossiping and agent-based unicast forwarding 292 11.2.1 Basic idea 292 11.2.2 Randomized forwarding 292 11.2.3 Random walks 293 11.2.4 Further reading 294 11.3 Energy-efficient unicast 295 11.3.1 Overview 295 11.3.2 Some example unicast protocols 297 11.3.3 Further reading 301 11.3.4 Multipath unicast routing 301 11.3.5 Further reading 304 11.4 Broadcast and multicast 305 11.4.1 Overview 305 11.4.2 Source-based tree protocols 308 11.4.3 Shared, core-based tree protocols 314 11.4.4 Mesh-based protocols 314 11.4.5 Further reading on broadcast and multicast 315 11.5 Geographic routing 316 11.5.1 Basics of position-based routing 316 11.5.2 Geocasting 323 11.5.3 Further reading on geographic routing 326 11.6 Mobile nodes 328 11.6.1 Mobile sinks 328 11.6.2 Mobile data collectors 328 11.6.3 Mobile regions 329 11.7 Conclusions 329 12 Data-centric and content-based networking 331 12.1 Introduction 331 12.1.1 The publish/subscribe interaction paradigm 331 12.1.2 Addressing data 332 12.1.3 Implementation options 333 12.1.4 Distribution versus gathering of data – In-network processing 334 12.2 Data-centric routing 335 12.2.1 One-shot interactions 335 12.2.2 Repeated interactions 337 12.2.3 Further reading 340 12.3 Data aggregation 341 12.3.1 Overview 341 12.3.2 A database interface to describe aggregation operations 342 12.3.3 Categories of aggregation operations 343 12.3.4 Placement of aggregation points 345 12.3.5 When to stop waiting for more data 345 12.3.6 Aggregation as an optimization problem 347 12.3.7 Broadcasting an aggregated value 347 12.3.8 Information-directed routing and aggregation 350 12.3.9 Some further examples 352 12.3.10 Further reading on data aggregation 355 12.4 Data-centric storage 355 12.5 Conclusions 357 13 Transport layer and quality of service 359 13.1 The transport layer and QoS in wireless sensor networks 359 13.1.1 Quality of service/reliability 360 13.1.2 Transport protocols 361 13.2 Coverage and deployment 362 13.2.1 Sensing models 362 13.2.2 Coverage measures 364 13.2.3 Uniform random deployments: Poisson point processes 365 13.2.4 Coverage of random deployments: Boolean sensing model 366 13.2.5 Coverage of random deployments: general sensing model 368 13.2.6 Coverage determination 369 13.2.7 Coverage of grid deployments 374 13.2.8 Further reading 375 13.3 Reliable data transport 376 13.3.1 Reliability requirements in sensor networks 377 13.4 Single packet delivery 378 13.4.1 Using a single path 379 13.4.2 Using multiple paths 384 13.4.3 Multiple receivers 388 13.4.4 Summary 389 13.5 Block delivery 389 13.5.1 PSFQ: block delivery in the sink-to-sensors case 389 13.5.2 RMST: block delivery in the sensors-to-sink case 395 13.5.3 What about TCP? 397 13.5.4 Further reading 399 13.6 Congestion control and rate control 400 13.6.1 Congestion situations in sensor networks 400 13.6.2 Mechanisms for congestion detection and handling 402 13.6.3 Protocols with rate control 403 13.6.4 The CODA congestion-control framework 408 13.6.5 Further reading 411 14 Advanced application support 413 14.1 Advanced in-network processing 413 14.1.1 Going beyond mere aggregation of data 413 14.1.2 Distributed signal processing 414 14.1.3 Distributed source coding 416 14.1.4 Network coding 420 14.1.5 Further issues 421 14.2 Security 422 14.2.1 Fundamentals 422 14.2.2 Security considerations in wireless sensor networks 423 14.2.3 Denial-of-service attacks 423 14.2.4 Further reading 425 14.3 Application-specific support 425 14.3.1 Target detection and tracking 426 14.3.2 Contour/edge detection 429 14.3.3 Field sampling 432 Bibliography 437 Index 481

    15 in stock

    £53.06

  • An Introduction to MultiAgent Systems

    John Wiley & Sons Inc An Introduction to MultiAgent Systems

    15 in stock

    Book SynopsisThe eagerly anticipated updated resource on one of the most important areas of research and development: multi-agent systems Multi-agent systems allow many intelligent agents to interact with each other, and this field of study has advanced at a rapid pace since the publication of the first edition of this book, which was nearly a decade ago.Trade Review“Nevertheless, despite these minor issues, this book is highly recommended to all socio-economic agent-based modellers, beginners or otherwise. Wooldridge’s scope, rigor, and well-respected experience at the current coalface means there’s plenty in here of interest for old-timers, while beginners can skip some of the maths and more bleeding-edge theory and concentrate easily on the implementation without loosing much.” (Appl. Spatial Analysis, 2011) Table of ContentsPreface xiii Acknowledgements xxi Part I Setting the Scene 1 1 Introduction 3 1.1 The Vision Thing 6 1.2 Some Views of the Field 9 1.2.1 Agents as a paradigm for software engineering 9 1.2.2 Agents as a tool for understanding human societies 12 1.3 Frequently Asked Questions (FAQ) 12 Part II Intelligent Autonomous Agents 19 2 Intelligent Agents 21 2.1 Intelligent Agents 26 2.2 Agents and Objects 28 2.3 Agents and Expert Systems 30 2.4 Agents as Intentional Systems 31 2.5 Abstract Architectures for Intelligent Agents 34 2.6 How to Tell an Agent What to Do 38 3 Deductive Reasoning Agents 49 3.1 Agents as Theorem Provers 50 3.2 Agent-Oriented Programming 55 3.3 Concurrent MetateM 56 4 Practical Reasoning Agents 65 4.1 Practical Reasoning = Deliberation +Means–Ends Reasoning 65 4.2 Means–Ends Reasoning 69 4.3 Implementing a Practical Reasoning Agent 75 4.4 The Procedural Reasoning System 79 5 Reactive and Hybrid Agents 85 5.1 Reactive Agents 85 5.1.1 The subsumption architecture 86 5.1.2 PENGI 90 5.1.3 Situated automata 90 5.1.4 The agent network architecture 91 5.1.5 The limitations of reactive agents 92 5.2 Hybrid Agents 92 5.2.1 Touring Machines 94 5.2.2 InteRRaP 96 5.2.3 3T 98 5.2.4 Stanley 99 Part III Communication and Cooperation 105 6 Understanding Each Other 107 6.1 Ontology Fundamentals 108 6.1.1 Ontology building blocks 108 6.1.2 Anontology of ontologies 110 6.2 Ontology Languages 113 6.2.1 XML–adhoc ontologies 113 6.2.2 OWL–The web ontology language 114 6.2.3 KIF–ontologies in first-order logic 120 6.3 RDF 121 6.4 Constructing an Ontology 124 6.5 Software Tools for Ontologies 127 7 Communicating 131 7.1 Speech Acts 132 7.1.1 Austin 132 7.1.2 Searle 133 7.1.3 The plan-based theory of speech acts 134 7.1.4 Speech acts as rational action 135 7.2 Agent Communication Languages 136 7.2.1 KQML 136 7.2.2 The FIPA agent communication language 140 7.2.3 JADE 146 8 Working Together 151 8.1 Cooperative Distributed Problem Solving 151 8.2 Task Sharing and Result Sharing 153 8.2.1 Task sharing in the Contract Net 156 8.3 Result Sharing 159 8.4 Combining Task and Result Sharing 159 8.5 Handling Inconsistency 161 8.6 Coordination 162 8.6.1 Coordination through partial global planning 163 8.6.2 Coordination through joint intentions 165 8.6.3 Coordination by mutual modelling 170 8.6.4 Coordination by norms and social laws 173 8.7 Multiagent Planning and Synchronization 177 9 Methodologies 183 9.1 When is an Agent-Based Solution Appropriate? 183 9.2 Agent-Oriented Analysis and Design 184 9.2.1 The AAII methodology 184 9.2.2 Gaia 186 9.2.3 Tropos 187 9.2.4 Prometheus 188 9.2.5 Agent UML 188 9.2.6 Agents in Z 189 9.3 Pitfalls of Agent Development 190 9.4 Mobile Agents 193 10 Applications 201 10.1 Agents for Workflow and Business Process Management 201 10.2 Agents for Distributed Sensing 203 10.3 Agents for Information Retrieval and Management 205 10.4 Agents for Electronic Commerce 211 10.5 Agents for Human–Computer Interfaces 213 10.6 Agents for Virtual Environments 214 10.7 Agents for Social Simulation 214 10.8 Agents for X 218 Part IV Multiagent Decision Making 221 11 Multiagent Interactions 223 11.1 Utilities and Preferences 223 11.2 Setting the Scene 226 11.3 Solution Concepts and Solution Properties 229 11.3.1 Dominant strategies 230 11.3.2 Nash equilibria 230 11.3.3 Pareto efficiency 233 11.3.4 Maximizing social welfare 235 11.4 Competitive and Zero-Sum Interactions 235 11.5 The Prisoner’s Dilemma 236 11.5.1 The shadow of the future 240 11.5.2 Program equilibria 243 11.6 Other Symmetric 2 ×2Interactions 245 11.7 Representing Multiagent Scenarios 248 11.8 Dependence Relations in Multiagent Systems 249 12 Making Group Decisions 253 12.1 Social Welfare Functions and Social Choice Functions 253 12.2 Voting Procedures 255 12.2.1 Plurality 255 12.2.2 Sequential majority elections 257 12.2.3 The Borda count 260 12.2.4 The Slater ranking 260 12.3 Desirable Properties for Voting Procedures 261 12.3.1 Arrow’s theorem 263 12.4 Strategic Manipulation 264 13 Forming Coalitions 269 13.1 Cooperative Games 270 13.1.1 The core 272 13.1.2 The Shapley value 274 13.2 Computational and Representational Issues 277 13.3 Modular Representations 278 13.3.1 Induced subgraphs 278 13.3.2 Marginal contribution nets 280 13.4 Representations for Simple Games 281 13.4.1 Weighted voting games 282 13.4.2 Network flow games 285 13.5 Coalitional Games with Goals 287 13.6 Coalition Structure Formation 288 14 Allocating Scarce Resources 293 14.1 Classifying Auctions 294 14.2 Auctions for Single Items 295 14.2.1 English auctions 295 14.2.2 Dutch auctions 296 14.2.3 First-price sealed-bid auctions 296 14.2.4 Vickrey auctions 296 14.2.5 Expected revenue 297 14.2.6 Lies and collusion 298 14.2.7 Counter speculation 299 14.3 Combinatorial Auctions 299 14.3.1 Bidding languages 302 14.3.2 Winner determination 306 14.3.3 The VCG mechanism 308 14.4 Auctions in Practice 310 14.4.1 Online auctions 310 14.4.2 Adwords auctions 311 14.4.3 The trading agent competition 312 15 Bargaining 315 15.1 Negotiation Parameters 315 15.2 Bargaining for Resource Division 317 15.2.1 Patient players 317 15.2.2 Impatient players 320 15.2.3 Negotiation decision functions 321 15.2.4 Applications of alternating offers 323 15.3 Bargaining for Task Allocation 323 15.3.1 Themonotonic concession protocol 326 15.3.2 The Zeuthen strategy 327 15.3.3 Deception 329 15.4 Bargaining for Resource Allocation 330 16 Arguing 337 16.1 Types of Argument 338 16.2 Abstract Argumentation 338 16.2.1 Preferred extensions 339 16.2.2 Credulous and skeptical acceptance 341 16.2.3 Preferences in abstract argument systems 343 16.2.4 Values in abstract argument systems 344 16.3 Deductive Argumentation Systems 345 16.4 Dialogue Systems 348 16.5 Implemented Argumentation Systems 350 17 Logical Foundations 355 17.1 Logics for Knowledge and Belief 355 17.1.1 Possible-worlds semantics for modal logics 357 17.1.2 Normal modal logics 358 17.1.3 Normal modal logics as epistemic logics 361 17.1.4 Logical omniscience 363 17.1.5 Axioms for knowledge and belief 364 17.1.6 Multiagent epistemic logics 365 17.1.7 Common and distributed knowledge 367 17.2 Logics for Mental States 369 17.2.1 Cohen and Levesque’s intention logic 369 17.2.2 Modelling speech acts 371 17.3 Logics for Cooperation 373 17.3.1 Incomplete information 375 17.3.2 Cooperation logics for social choice 376 17.4 Putting Logic to Work 376 17.4.1 Logic in specification 377 17.4.2 Logic in implementation 378 17.4.3 Logic in verification 381 Part V Coda 391 A A History Lesson 393 B Afterword 405 Glossary of Key Terms 407 References 425 Index 453

    15 in stock

    £51.26

  • Discover Signal Processing

    John Wiley & Sons Inc Discover Signal Processing

    10 in stock

    Book SynopsisSignal processing is now a multidisciplinary topic, and one that has applications in many fields including, but not limited to, science, engineering, medicine, finance and the behavioural sciences. Modern software libraries that include dedicated languages and packages designed to simplify the development and application of signal processing techniques are now readily available; however this ease of application means that an understanding of the various techniques is imperative. It is critical that the student or practitioner is able to choose an appropriate processing technique, be aware of potential errors involved and understand how to control them. Discover Signal Processing exploits the rationale of learning by doing; actually attempting and performing a task is the most effective way to remember and understand. It presents the reader with a diverse range of exercises; some intended to recall or practice simple concepts, others more complex & aimed at developing a real Table of ContentsPreface. About the Author. Notation. Part A: The Exercises. 1 Introduction. Overview. The Exercises. Exercise 1.1. Exercise 1.2. Solutions and Summaries. 2 Signals. Overview. The Exercises. Exercise 2.1. Exercise 2.2. Exercise 2.3. Exercise 2.4. Solutions and Summaries. 3 Fourier Methods. Overview. The Exercises. Exercise 3.1. Exercise 3.2. Exercise 3.3. Exercise 3.4. Exercise 3.5. Exercise 3.6. Exercise 3.7. Exercise 3.8. Exercise 3.9. Exercise 3.10. Exercise 3.11. Exercise 3.12. Solutions and Summaries. 4 Linear Systems. Overview. The Exercises. Exercise 4.1. Exercise 4.2. Exercise 4.3. Solutions and Summaries. 5 Filters. Overview. The Exercises. Exercise 5.1. Exercise 5.2. Exercise 5.3. Exercise 5.4. Solutions and Summaries. 6 Time Domain Averaging (TDA). Overview. The Exercises. Exercise 6.1. Exercise 6.2. Exercise 6.3. Exercise 6.4. Solutions and Summaries. 7 Spectral Analysis. Overview. The Exercises. Exercise 7.1(a). Exercise 7.1(b). Exercise 7.2. Exercise 7.3. Exercise 7.4. Exercise 7.5. Exercise 7.6. Exercise 7.7. Exercise 7.8. Exercise 7.9. Solutions and Summaries. 8 Envelope Detection. Overview. The Exercises. Exercise 8.1. Solutions and Summaries. 9 The Spectrogram. Overview. The Exercises. Exercise 9.1. Exercise 9.2. Solutions and Summaries. 10 Sampling. Overview. The Exercises. Exercise 10.1. Exercise 10.2. Exercise 10.3. Exercise 10.4. Solutions and Summaries. 11 Identifi cation – Transfer Functions. Overview. The Exercises. Exercise 11.1. Exercise 11.2. Exercise 11.3. Exercise 11.4. Solutions and Summaries. 12 Model-based Signal Processing. Overview. The Exercises. Exercise 12.1. Exercise 12.2. Exercise 12.3. Solutions and Summaries. 13 Diagnostic Applications for Rotating Machines. Overview. The Exercises. Exercise 13.1. Exercise 13.2. Exercise 13.3. Exercise 13.4. Exercise 13.5. Solutions and Summaries. 14 Systems with Delays. Overview. The Exercises. Exercise 14.1. Exercise 14.2. Exercise 14.3. Solutions and Summaries. Part B. 1 Introduction. 1.1 General Objectives. 1.2 Basic Processing. 1.3 Why the Frequency Domain? 1.4 An Introductory Example. 2 Introduction to Signals. 2.1 Signal Classification. 2.2 Signal Descriptions. 2.3 Correlation Functions. 2.4 Estimation and Errors. 3 Fourier Methods. 3.1 Fourier Series. 3.2 Fourier (Integral) Transform. 3.3 The Uncertainty Principle. 3.4 The Discrete Fourier Transform (DFT). 3.5 The DFT and the Fast Fourier Transform (FFT). 3.6 Discontinuities and Windows. 4 Linear Systems. 4.1 Continuous Systems. 4.2 Discrete Systems. 4.3 A Specifi c Case of a Continuous Linear Systems – Accelerometers. Appendix 4.A The Lightly Damped SDOF System. 5 Filters. 5.1 Preliminaries. 5.2 Analog and Digital Filters. 5.3 Filter Classifi cation and Specifications. 5.4 IIR Filters. 5.5 FIR Filters. 5.6 The Importance of Linear Phase Filters. 5.7 Design Tools. 6 Time Domain Averaging (Synchronous Averaging). 6.1 Principle. 6.2 Rejection of Nonsynchronous Components. 6.3 TDA with Decaying Memory Process. 7 Spectral Analysis. 7.1 Introduction. 7.2 Representation of Signals in the Frequency Domain. 7.3 Errors and their Control. 7.4 Spectral Analysis: Practical Considerations. 8 Envelopes. 8.1 Introduction. 8.2 The Hilbert Transform (HT). 8.3 Analytic Signals. 8.4 Narrow Band (NB) Signals and their Envelope. 9 The Spectrogram. 9.1 Introduction. 9.2 Time Frequency Methods. 9.3 The Short Time Fourier Transform (STFT) and the Spectrogram. 10 Data Acquisition. 10.1 Data Acquisition and Signal Processing Systems. 10.2 Amplitude Quantization. 10.3 Quantization in Time: The Sampling Theorem. 10.4 Antialiasing Filters. 11 Input/Output Identifi cation. 11.1 Objectives and Overview. 11.2 Frequency Domain Identifi cation: The Noiseless Case. 11.3 Identifi cation with Noise Corrupted Signals. 11.4 Error Mechanisms and their Control in the Identifi cation Process. 11.5 Estimation Errors for the Coherence Function. 12 Model-based Signal Processing. 12.1 General. 12.2 Signal Models. 12.3 Modeling of Signals. 12.4 Model-based Spectral Analysis. 12.5 Model or Selection. 12.6 Model-based Diagnostics. Appendix 12.A The Correlation Matrix. 13 Machinery Diagnostics: Bearings and Gears. 13.1 Diagnostics and Rotating Machinery. 13.2 Structural Effects. 13.3 Rotating Imbalance. 13.4 Modeling of Roller Bearing Vibration Signals. 13.5 Bearing Vibrations: Structural Effects and Envelopes. 13.6 Modeling of Gear Vibration Signals. 14 Delays and Echoes. 14.1 System with Pure Delays. 14.2 Correlation Functions. 14.3 Cepstral Analysis. References. Index.

    10 in stock

    £81.65

  • Distributed Systems Security

    John Wiley & Sons Inc Distributed Systems Security

    15 in stock

    Book SynopsisHow to solve security issues and problems arising in distributed systems. Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the Web, grid computing and virtualization form the backbone of today's distributed systems. A lens to security issues in distributed systems is best provided via deeper exploration of security concerns and solutions in these technologies. Distributed Systems Security provides a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of today's distributed systems. This insight is elucidated by modeling of modern day distributed systems using a four-tier logical model host layer, infrastructure layer, application layer, and service layer (bottom to top). The authors provide an in-depth coverTable of ContentsChapter 1: Introduction 1.1 Background 1.2 Distributed Systems. 1.3 Distributed Systems Security. 1.4 About the Book. Chapter 2: Security Engineering. 2.1 Introduction. 2.2 Secure Development Life Cycle Processes – An Overview. 2.3 A Typical Security Engineering Process. 2.4 Important Security Engineering Guidelines and Resources. 2.5 Conclusion. Chapter 3. Common Security Issues and Technologies. 3.1 Security Issues. 3.2 Common Security Techniques. 3.3 Summary. Chapter 4 – Host level Threats and Vulnerabilities. 4.1 Background. 4.2 Malware. 4.3 Eavesdropping. 4.4 Job faults. 4.5 Resource starvation. 4.6 Overflow. 4.7 Privilege escalation. 4.8 Injection attacks. 4.9 Conclusion. Chapter 5 – Infrastructure Level Threats & Vulnerabilities. 5.1 Introduction. 5.2 Network Level Threats and Vulnerabilities. 5.3 Grid Computing Threats and Vulnerabilities. 5.4 Storage Threats and Vulnerabilities. Chapter 6: Application Level Vulnerabilities and Attacks. 6.1 Introduction. 6.2 Application Layer Vulnerabilities. 6.3 Conclusion. Chapter 7 – Service Level Issues, Threats and Vulnerabilities. 7.1 Introduction. 7.2 SOA and Role of Standards. 7.3 Service Level Security Requirements. 7.4 Service Level Threats and Vulnerabilities. 7.5 Service Level Attacks. 7.6 Services Threat Profile. 7.7 Conclusions. Chapter 8: Host level Solutions. 8.1 Background. 8.2 Sandboxing. 8.3 Virtualization. 8.4 Resource Management 8.5 Proof carrying code. 8.6 Memory firewall 8.7 Anti malware. 8.8 Conclusions. Chapter 9 – Infrastructure Level Solutions 9.1 Introduction. 9.2 Network Level Solutions. 9.3 Grid Level Solutions. 9.4 Storage Level Solutions. Chapter 10: Application Level Solutions. 10.1 Introduction. 10.2 Application Level Security Solutions. 10.3 Conclusion. Chapter 11 – Service Level Solutions. 11.1 Introduction. 11.2 Services Security Policy. 11.3 SOA Security standards stack. 11.4 Standards in Depth. 11.5 Deployment Architectures for SOA Security. 11.6 Managing Service Level Threats. 11.7 Service Threat Solution Mapping. 11.8 XML Firewall Configuration-Threat Mapping. 11.9 Conclusions. Chapter 12 - Case Study – Compliance in Financial Services. 12.1 Introduction. 12.2 SOX compliance. 12.3 SOX Security Solutions. 12.4 Multi-level policy driven solution architecture. 12.5 Conclusions. Chapter 13 – Case Study of Grid. 13.1 Background. 13.2 Financial Application. 13.3 Security Requirements Analysis. 13.4 Final Security Architecture. Chapter 14: Future directions and Conclusions. 14.1 Future directions. 14.2 Conclusions.

    15 in stock

    £74.66

  • Executives Guide to Cloud Computing

    John Wiley & Sons Inc Executives Guide to Cloud Computing

    3 in stock

    Book SynopsisYour organization can save and thrive in the cloud with this first non-technical guide to cloud computing for business leaders In less than a decade Google, Amazon, and Salesforce.com went from unknown ideas to powerhouse fixtures in the economic landscape; in even less time offerings such as Linkedin, Youtube, Facebook, Twitter and many others also carved out important roles; in less than five years Apple''s iTunes became the largest music retailer in North America. They all share one key strategic decision each of these organizations chose to harness the power of cloud computing to power their drives to dominance. With roots in supercomputing and many other technical disciplines, cloud computing is ushering in an entirely new economic reality technology-enabled enterprises built on low cost, flexible, and limitless technical infrastructures. The Executive''s Guide to Cloud Computing reveals how you can apply the power of cloud computing throughout yoTrade Review“A very timely and invaluable resource for CIOs, CTOs, and Enterprise Architects ... extremely relevant information that will serve readers well now and far into the future.” —Bob Flores, President & CEO Applicology Inc., Former CTO of the Central Intelligence Agency “The authors have done a great job in explaining the cloud concepts. They give historical and technical background to show that cloud computing is really an evolution of numerous technologies and business strategies. It is the combination of these that enables cloud and these new business strategies to happen. This makes the fuzziness of the concept come into focus. The “technical” chapters show the CIO and Technical Architect a model for building your own strategy within the business and a path from concept to deployment with governance and business models thrown in. Darn, I keep hoping for ‘the answer’. Now my questions can dig into the real value for our enterprise and a strategy for moving forward. Great book!!!” —Dave Ploch, CIO, Novus International “‘Executive’s Guide’ is not a code-phrase for an introductory text, but a comprehensive guide for the CIO, IT decision-maker, or project leader. The authors, two entrepreneurs and pioneers in the field, speak from substantial real-world project experience. They introduce the topic and related technologies, highlight cloud drivers and strategy, address relationships to existing initiatives such as Service-Oriented Architectures, detail project phases in the implementation of and evolution to cloud-based enterprise architectures, and offer many reasoned insights along the way.” —Joe Weinman, Strategy and Business Development, AT&T Business Solutions “Executive’s Guide to Cloud Computing is a crystal ball into the future of business. Not a technical treatise but an insightful explanation of how cloud computing can quickly deliver real business value. This book is an instruction manual on how to win business in this ‘born on the web’ world.” —Kevin L. Jackson, Vice President, Dataline LLC and author of Cloud Musings, http://kevinljackson.blogspot.comTable of ContentsPreface xi CHAPTER 1 THE SOUND OF INEVITABILITY 1 A Persistent Vision 5 A Little History 6 Three Ages of Computing 6 Broad Enablers 15 Big Contributions 20 Limitations 21 I Want One of Those 22 Back to the Future? 22 Notes 23 CHAPTER 2 CONCEPTS, TERMINOLOGY,AND STANDARDS 25 Basic Concepts: The Big Stuff 27 Major Layers 34 Where They Live (Deployment Models) 36 Geographic Location 39 Datacenter Innovation 39 The Quest for Green 40 Standards 41 Much Sound and Fury . . . 42 Parting Thoughts 42 Notes 43 CHAPTER 3 CLOUD COMPUTING AND EVERYTHING ELSE 45 The Neighborhood 45 Parting Thoughts 66 Notes 67 CHAPTER 4 STRATEGIC IMPLICATIONS OF CLOUD COMPUTING 69 A Survey of Cloud Implications 70 Business Benefits of Cloud Computing 78 Cloud-Based Business Models 82 Cloud-Enabled Business Models 83 Strategic Implications of Cloud Computing 86 Evolving from SOA into the Cloud 91 When to Do SOA versus Cloud? 98 Cloud Computing Adoption Obstacles 107 Parting Thoughts: Things to Do Tomorrow 109 Notes 110 CHAPTER 5 CLOUD ADOPTION LIFECYCLE 111 Cloud Adoption Lifecycle and Cloud Modeling Framework: Two Necessary Tools for Cloud Success 112 Cloud Adoption Lifecycle 114 Cloud Adoption Lifecycle Summary 144 Parting Thoughts 145 CHAPTER 6 CLOUD ARCHITECTURE, MODELING, AND DESIGN 147 Cloud Adoption Lifecycle Model: Role of Cloud Modeling and Architecture 147 Cloud Industry Standards 149 Standards Monitoring Framework 154 A Cloud Computing Reference Model 155 Exploring the Cloud Computing Logical Architecture 157 Developing a Holistic Cloud Computing Reference Model 162 Cloud Deployment Model 170 Cloud Governance and Operations Model 174 Cloud Ecosystem Model (Supporting the Cloud Reference Model) 179 Consumption of Cloud-Enabled and Cloud Enablement Resources 184 Cloud Computing Reference Model Summary 187 Cloud Computing Technical Reference Architecture 188 Parting Thoughts 192 Notes 193 CHAPTER 7 WHERE TO BEGIN WITH CLOUD COMPUTING 195 Cloud Adoption Lifecycle 195 Where to Begin with Cloud: Using the Cloud Adoption Lifecycle 199 Where to Begin with Cloud: Deployment Model Scenarios 200 Cloud Business Adoption Patterns 204 Where to Begin with Cloud: Consumers and Internal Cloud Providers 209 Cloud Patterns Mapped to Common Cloud Use Cases 213 Parting Thoughts 224 CHAPTER 8 ALL THINGS DATA 227 The Status Quo 228 Cracks in the Monolith 230 Cloud Scale 232 The Core Issues 234 Lessons Learned 237 Solutions and Technologies: A Few Examples 239 A Look Below: Need for Combined Computation/Storage 242 Parting Thoughts 243 Notes 243 CHAPTER 9 WHY INEVITABILITY IS INEVITABLE 245 Driving Scale 27 Objections and Concerns 248 Overwhelming Rationality 253 A Natural Evolution 257 Parting Thoughts 259 Notes 260 Appendix The Cloud Computing Vendor Landscape 263 Infrastructure as a Service (IaaS) 264 Platforms as a Service (PaaS) 264 Software as a Service (SaaS) 265 Systems Integrators 265 Analysts and Services Providers 266 Parting Thoughts 266 Note 266 About the Authors 267 Index 269

    3 in stock

    £28.49

  • Starting an iPhone Application Business for

    John Wiley & Sons Inc Starting an iPhone Application Business for

    1 in stock

    Book SynopsisHow to create a profitable, sustainable business developing and marketing iPhone apps iPhone apps are hot; the average app is downloaded more than 30,000 times. If you have some great apps in mind, Starting an iPhone Application Business For Dummies will show you how to produce and market them effectively.Table of ContentsIntroduction. Part I: Surveying the Marketplace. Chapter 1: The Wide, Wide World of iPhone App Development. Chapter 2: Understanding the iPhone Platform. Chapter 3: Pricing and Revenue Models. Part II: Pinpointing the Business Offering. Chapter 4: Coming Up with a Winning Idea. Chapter 5: Leveraging Brands, Skills, and Content. Chapter 6: Collaborating Internally and Externally. Chapter 7: Sizing Up the Competition. Part III: Lay the Groundwork. Chapter 8: Registering with Apple. Chapter 9: Understanding the Development Tools. Chapter 10: Staffi ng Your Team. Part IV: Assemble Your iPhone Application. Chapter 11: Building Your Application Specifi cations. Chapter 12: Assembling Your Development Team. Chapter 13: Greenlighting the Budget. Chapter 14: Managing the Development Process. Part V: Market to the Masses. Chapter 15: Capturing Free Publicity. Chapter 16: Building the Buzz. Chapter 17: Promoting Your App with Paid Advertising. Chapter 18: Planning Your Next Project. Part VI: The Part of Tens. Chapter 19: Ten Traits of Highly Successful Applications. Chapter 20: Ten Influential Review Sites. Appendix. Index.

    1 in stock

    £17.59

  • An Introduction to Search Engines and Web

    John Wiley & Sons Inc An Introduction to Search Engines and Web

    1 in stock

    Book SynopsisThis book is a second edition, updated and expanded toexplain the technologies that help us find information on the web. Search engines and web navigation tools have become ubiquitous in our day to day use of the web as an information source, a tool for commercial transactions and a social computing tool. Moreover, through the mobile web we have access to the web''s services when we are on the move. This book demystifies the tools that we use when interacting with the web, and gives the reader a detailed overview of where we are and where we are going in terms of search engine and web navigation technologies.Trade Review"This book is a second edition, updated and expanded to explain the technologies that help us find information on the web . . . this book demystifies the tools that we use when interacting with the web, and gives the reader a detailed overview of where we are and where we are going in terms of search engine and web navigation technologies". (MyCFO, 29 November 2010) "This book is a second edition, updated and expanded to explain the technologies that help us find information on the web". (Business It Business Net, 29 November 2010)Table of ContentsPREFACE. LIST OF FIGURES. CHAPTER 1 INTRODUCTION. 1.1 Brief Summary of Chapters. 1.2 Brief History of Hypertext and the Web. 1.3 Brief History of Search Engines. CHAPTER 2 THE WEB AND THE PROBLEM OF SEARCH. 2.1 Some Statistics. 2.2 Tabular Data Versus Web Data. 2.3 Structure of the Web. 2.4 Information Seeking on the Web. 2.5 Informational, Navigational, and Transactional Queries. 2.6 Comparing Web Search to Traditional Information Retrieval. 2.7 Local Site Search Versus Global Web Search. 2.8 Difference Between Search and Navigation. CHAPTER 3 THE PROBLEM OF WEB NAVIGATION. 3.1 Getting Lost in Hyperspace and the Navigation Problem. 3.2 How Can the Machine Assist in User Search and Navigation. 3.3 Trails Should be First Class Objects. 3.4 Enter Markov Chains and Two Interpretations of Its Probabilities. 3.5 Conflict Between Web Site Owner and Visitor. 3.6 Conflict Between Semantics of Web Site and the Business Model. CHAPTER 4 SEARCHING THE WEB. 4.1 Mechanics of a Typical Search. 4.2 Search Engines as Information Gatekeepers of the Web. 4.3 Search Engine Wars, is the Dust Settling? 4.4 Statistics from Studies of Search Engine Query Logs. 4.5 Architecture of a Search Engine. 4.6 Crawling the Web. 4.7 What Does it Take to Deliver a Global Search Service? CHAPTER 5 HOW DOES A SEARCH ENGINE WORK. 5.1 Content Relevance. 5.2 Link-Based Metrics. 5.3 Popularity-Based Metrics. 5.4 Evaluating Search Engines. CHAPTER 6 DIFFERENT TYPES OF SEARCH ENGINES. 6.1 Directories and Categorization of Web Content. 6.2 Search Engine Advertising. 6.3 Metasearch. 6.4 Personalization. 6.5 Question Answering (Q&A) on the Web. 6.6 Image Search. 6.7 Special Purpose Search Engines. CHAPTER 7 NAVIGATING THE WEB. 7.1 Frustration in Web Browsing and Navigation. 7.2 Navigation Tools. 7.3 Navigational Metrics. 7.4 Web Data Mining. 7.5 The Best Trail Algorithm. 7.6 Visualization that Aids Navigation. 7.7 Navigation in Virtual and Physical Spaces. CHAPTER 8 THE MOBILE WEB. 8.1 The Paradigm of Mobile Computing. 8.2 Mobile Web Services. 8.3 Mobile Device Interfaces. 8.4 The Navigation Problem in Mobile Portals. 8.5 Mobile Search. CHAPTER 9 SOCIAL NETWORKS. 9.1 What is a Social Network? 9.2 Social Network Analysis. 9.3 Peer-to-Peer Networks. 9.4 Collaborative Filtering. 9.5 Weblogs (Blogs). 9.6 Power-Law Distributions in the Web. 9.7 Searching in Social Networks. 9.8 Social Tagging and Bookmarking. 9.9 Opinion Mining. 9.10 Web 2.0 and Collective Intelligence. CHAPTER 10 THE FUTURE OF WEB SEARCH AND NAVIGATION. BIBLIOGRAPHY. INDEX.

    1 in stock

    £75.56

  • Web Analytics 2.0

    John Wiley & Sons Inc Web Analytics 2.0

    2 in stock

    Book Synopsis

    2 in stock

    £26.40

  • Microsoft Exchange Server 2010 Administration

    John Wiley & Sons Inc Microsoft Exchange Server 2010 Administration

    15 in stock

    Book SynopsisQuestions about Exchange Server 2010? Flip open this easy-access guide! Have all your questions about Microsoft's new Exchange Server 2010 answered on the spot with this handy reference guide.Table of ContentsPart I Getting Started. 1 Deploying Exchange Servers. 2 Using the Exchange Management Console and the Exchange Management Shell. 3 Managing the Organization. 4 Administering Recipients. 5 Managing Client Access. 6 Managing Message Routing. Part II Managing Exchange Server Roles. 7 Managing Mailbox Databases. 8 Managing Public Folders. 9 Administering Mailbox Content. 10 Maintaining Reliability and Availability. Part III Mitigating Risk. 11 Monitoring Health and Performance. 12 Securing Exchange Server.

    15 in stock

    £21.84

  • Access 2010 AllinOne For Dummies

    John Wiley & Sons Inc Access 2010 AllinOne For Dummies

    15 in stock

    Book SynopsisThe all-in-one reference to all aspects of Microsoft Access 2010 If you want to learn Microsoft Access inside and out, the nine minibooks in this easy-access reference are exactly what you need. Read the book cover to cover, or jump into any of the minibooks for the instruction and topics you need most. Learn how to connect Access to SQL Server, manipulate your data locally, use nifty new features from Office 2010 such as the enhanced Ribbon, create queries and macros like a champ, and much more. From the basics to advanced functions, it's what you need to make Access more accesssible. Shows you how to store, organize, view, analyze, and share data using Microsoft Access 2010, the database application included with Microsoft Office 2010 Includes nine minibooks that cover such topics as database design, tables, queries, forms, reports, macros, database administration, securing data, programming with Visual Basic for Applications (VBA), and using Access wTable of ContentsIntroduction 1 Book I: Essential Concepts 7 Chapter 1: Introducing Access 2010 9 Chapter 2: Getting Started, Getting Around 17 Chapter 3: Designing Your Database the Relational Way 37 Book II: Tables for Storing Your Data 65 Chapter 1: Creating and Modifying Tables 67 Chapter 2: Refining Your Table in Design View 103 Chapter 3: Sorting, Finding, and Filtering Data in a Datasheet 121 Chapter 4: Importing and Exporting Data 137 Chapter 5: Avoiding “Garbage In, Garbage Out” 161 Chapter 6: Relating Your Tables and Protecting Your Data 179 Book III: Queries (or Getting Information from Your Data) 189 Chapter 1: Creating Select Queries 191 Chapter 2: Letting Queries Do the Math 223 Chapter 3: Doing Neat Things with Action Queries and Query Wizards 257 Chapter 4: Viewing Your Data from All Angles Using Crosstabs and PivotTables 279 Book IV: Forms for Editing Data 303 Chapter 1: Designing and Using Forms (and Reports) 305 Chapter 2: Jazzing Up Your Forms (and Reports) 329 Chapter 3: Creating Smarter Forms 353 Chapter 4: Doing Calculations in Forms and Subforms (and Reports) 377 Book V: Reporting in Words and Pictures 397 Chapter 1: Creating and Spiffing Up Reports 399 Chapter 2: Printing Beautiful Reports 427 Chapter 3: Creating Charts and Graphs from Your Data 445 Book VI: Automation with Macros 471 Chapter 1: Making Macros Do the Work 473 Chapter 2: Making Macros Smarter 491 Book VII: Database Administration 509 Chapter 1: Database Housekeeping 511 Chapter 2: Sharing the Fun: Managing Multiuser Access 521 Chapter 3: Securing Your Access Database 535 Book VIII: Programming in VBA 547 Chapter 1: What the Heck Is VBA? 549 Chapter 2: Writing Code 569 Chapter 3: Writing Smarter Code 593 Chapter 4: Controlling Forms with VBA 617 Chapter 5: Using SQL and Recordsets 641 Chapter 6: Debugging Your Code 653 Book IX: Going Beyond Access 663 Chapter 1: Automation with Other Office Programs 665 Chapter 2: Using Access as a Front-End to SQL Server 681 Chapter 3: Using Access with SharePoint 697 Appendix: Installing Microsoft Access 719 Index 725

    15 in stock

    £23.79

  • Computational Statistics

    John Wiley & Sons Inc Computational Statistics

    15 in stock

    Book SynopsisThis new edition continues to serve as a comprehensive guide to modern and classical methods of statistical computing. The book is comprised of four main parts spanning the field: Optimization Integration and Simulation Bootstrapping Density Estimation and Smoothing Within these sections,each chapter includes a comprehensive introduction and step-by-step implementation summaries to accompany the explanations of key methods. The new edition includes updated coverage and existing topics as well as new topics such as adaptive MCMC and bootstrapping for correlated data. The book website now includes comprehensive R code for the entire book. There are extensive exercises, real examples, and helpful insights about how to use the methods in practice.Table of ContentsPREFACE xv ACKNOWLEDGMENTS xvii 1 REVIEW 1 1.1 Mathematical Notation 1 1.2 Taylor’s Theorem and Mathematical Limit Theory 2 1.3 Statistical Notation and Probability Distributions 4 1.4 Likelihood Inference 9 1.5 Bayesian Inference 11 1.6 Statistical Limit Theory 13 1.7 Markov Chains 14 1.8 Computing 17 PART I OPTIMIZATION 2 OPTIMIZATION AND SOLVING NONLINEAR EQUATIONS 21 2.1 Univariate Problems 22 2.2 Multivariate Problems 34 Problems 54 3 COMBINATORIAL OPTIMIZATION 59 3.1 Hard Problems and NP-Completeness 59 3.2 Local Search 65 3.3 Simulated Annealing 68 3.4 Genetic Algorithms 75 3.5 Tabu Algorithms 85 Problems 92 4 EM OPTIMIZATION METHODS 97 4.1 Missing Data, Marginalization, and Notation 97 4.2 The EM Algorithm 98 4.3 EM Variants 111 Problems 121 PART II INTEGRATION AND SIMULATION 5 NUMERICAL INTEGRATION 129 5.1 Newton–Côtes Quadrature 129 5.2 Romberg Integration 139 5.3 Gaussian Quadrature 142 5.4 Frequently Encountered Problems 146 Problems 148 6 SIMULATION AND MONTE CARLO INTEGRATION 151 6.1 Introduction to the Monte Carlo Method 151 6.2 Exact Simulation 152 6.3 Approximate Simulation 163 6.4 Variance Reduction Techniques 180 Problems 195 7 MARKOV CHAIN MONTE CARLO 201 7.1 Metropolis–Hastings Algorithm 202 7.2 Gibbs Sampling 209 7.3 Implementation 218 Problems 230 8 ADVANCED TOPICS IN MCMC 237 8.1 Adaptive MCMC 237 8.2 Reversible Jump MCMC 250 8.3 Auxiliary Variable Methods 256 8.4 Other Metropolis–Hastings Algorithms 260 8.5 Perfect Sampling 264 8.6 Markov Chain Maximum Likelihood 268 8.7 Example: MCMC for Markov Random Fields 269 Problems 279 PART III BOOTSTRAPPING 9 BOOTSTRAPPING 287 9.1 The Bootstrap Principle 287 9.2 Basic Methods 288 9.3 Bootstrap Inference 292 9.4 Reducing Monte Carlo Error 302 9.5 Bootstrapping Dependent Data 303 9.6 Bootstrap Performance 315 9.7 Other Uses of the Bootstrap 316 9.8 Permutation Tests 317 Problems 319 PART IV DENSITY ESTIMATION AND SMOOTHING 10 NONPARAMETRIC DENSITY ESTIMATION 325 10.1 Measures of Performance 326 10.2 Kernel Density Estimation 327 10.3 Nonkernel Methods 341 10.4 Multivariate Methods 345 Problems 359 11 BIVARIATE SMOOTHING 363 11.1 Predictor–Response Data 363 11.2 Linear Smoothers 365 11.3 Comparison of Linear Smoothers 377 11.4 Nonlinear Smoothers 379 11.5 Confidence Bands 384 11.6 General Bivariate Data 388 Problems 389 12 MULTIVARIATE SMOOTHING 393 12.1 Predictor–Response Data 393 12.2 General Multivariate Data 413 Problems 416 DATA ACKNOWLEDGMENTS 421 REFERENCES 423 INDEX 457

    15 in stock

    £99.86

  • How Societies Embrace Information Technology

    John Wiley & Sons Inc How Societies Embrace Information Technology

    15 in stock

    Book SynopsisThis book discusses how computers are shaping contemporary society, with a tight focus on the role of corporations and governments. It is aimed at government policymakers interested in economic development and at private-sector managers who routinely make decisions to acquire and use information technology, now a worldwide expenditure of over $2 trillion annually. The book will also interest a wide range of academics concerned with the sociology, history, economics, and the effects of IT on contemporary society, ands to the general trade market.Trade Review"The book also presents ideas for educators. For instance, to encourage IT people to be naturally proactive, courses should leverage the creation and production of IT projects with solving society's problems. With some effort, this can be done in computers and society courses, at both the general and professional education level. At the professional level, IT workers with such experience and training will more likely choose to work on problem areas. At the general level, people with such experience will act politically, to vocalize the expectation that the IT industry will create products that help society." (Computing Reviews, September 2010) Table of ContentsPreface ix 1 Introducing the Big Picture 1 The presence of information technology 2 Megatrends at work 7 How societies use technology to shape their world 19 Notes and references 24 2 How Computers Spread Around the World So Fast 27 Definitions and issues 29 Government-supported/private-sector-driven model 33 National champion model 37 Asian private-sector-driven model 39 Planned economy: public policy model 42 Industry-driven model 48 Corporate diffusion model 51 Application diffusion model 57 Technology-standards diffusion model 59 Patterns, practices, and implications 61 Notes and references 65 3 How Governments Leverage Information Technologies to Improve Their National Economies 71 A brief historical reminder 72 Economic development in a connected world: the big picture 75 How governments use it to encourage economic development 77 What motivates governments to encourage their citizens and economies to use it? 91 Emerging strategies for the most advanced nations compared to rapidly advancing nations 96 The special role of labor 100 Global recession, twenty-first century style 102 Implications for public officials 106 Implications for business leaders 112 The way forward with policies and practices 116 Notes and references 122 4 How Managers and Officials Decide What Technology to Use 129 The kinds of decisions made by managers 131 Types of justification 135 Managerial practices 138 Some possible less effective practices 143 Special role of industries 149 Path forward 151 Notes and references 157 5 Adding Up the Results So Far: Do We Now Live in the Information Age? 163 Why naming an age is a useful exercise and so hard to do 165 What historians can teach us about the process 167 The case against the information age 173 Can we coexist on the frontiers of a new age? 175 Lessons for management and a strategy for change 179 Concluding thoughts 185 Notes and references 186 6 An Expanding Role for Scientists and Engineers 191 The rise of the computer scientist 192 Their role in modern society 197 When scientists and tech folk take things into their own hands 201 When technologists go green 204 Their future world 212 An old role made new 218 Notes and references 220 7 Looking Down the Road into the Twenty-First Century 223 How to see the future of an industry 225 Knowing how information technology is evolving 233 A strategy for managers and public officials 240 Special role of the computer science community 247 The ultimate trend 252 Notes and references 254 8 Keeping Up: Bibliographic Essay 257 The big picture 257 How computers spread around the world 259 Governments leveraging it for economic development 260 Deciding what technology to use 261 Living in the information age 263 Role of technologists 264 Into the twenty-first century 265 Index 267

    15 in stock

    £30.56

  • Making Sense of Data III

    John Wiley & Sons Inc Making Sense of Data III

    15 in stock

    Book SynopsisAs third in the series, this book focuses on a style of data analysis that makes graphics central to exploration. Making Sense of Data III explains how to implement decision support systems and provides an interactive approach to data analysis that allows users to see, manipulate, explore, mine data, and share results with colleagues.Trade Review“It is an essential book for understanding the principal role that graphics play in data visualization.” (Zentralblatt MATH, 1 April 2015) Table of ContentsPreface. 1. Introduction. 1.1 Overview. 1.2 Visual Perception. 1.3 Visualization. 1.4 Designing for High-throughput Data Exploration. 1.5 Summary. 1.6 Further reading. 2. The Cognitive and Visual Systems. 2.1 External Representation. 2.2 The Cognitive System. 2.3 Visual Perception. 2.4 Influencing Visual Perception. 2.5 Summary. 2.6 Further reading. 3. Graphic Representations. 3.1 Jacques Bertin: Semiology of Graphics. 3.2 Wilkinson: Grammar of Graphics. 3.3 Wickham: ggplot2. 3.4 Bostock and Heer: Protovis. 3.5 Summary. 3.6 Further reading. 4. Designing Visual Interactions. 4.1 Designing for Complexity. 4.2 The Process of Design. 4.3 Visual Interaction Design. 5. Hands-on: Creating Interactive Visualizations with Protovis. 5.1 Using Protovis. 5.2 Creating Code using the Protovis Graphical Framework. 5.3 Basic Protovis Marks. 5.4 Creating Customized Plots. 5.5 Creating Basic Plots. 5.6 Data Analysis Graphs. 5.7 Composite Plots. 5.8 Interactive Plots. 5.9 Protovis Summary. 5.10 Further Reading. Appendix. A Exercise Code Examples. Bibliography. Index.

    15 in stock

    £81.86

  • SAS For Dummies

    John Wiley & Sons Inc SAS For Dummies

    10 in stock

    Book SynopsisThe fun and easy way to learn to use this leading business intelligence tool Written by an author team who is directly involved with SAS, this easy-to-follow guide is fully updated for the latest release of SAS and covers just what you need to put this popular software to work in your business. SAS allows any business or enterprise to improve data delivery, analysis, reporting, movement across a company, data mining, forecasting, statistical analysis, and more. SAS For Dummies, 2nd Edition gives you the necessary background on what SAS can do for you and explains how to use the Enterprise Guide. SAS provides statistical and data analysis tools to help you deal with all kinds of data: operational, financial, performance, and more Places special emphasis on Enterprise Guide and other analytical tools, covering all commonly used features Covers all commonly used features and shows you the practical applications you can put to worTable of ContentsIntroduction. Part I: Welcome to SAS! Chapter 1:Touring the Wonderful World of SAS. Chapter 2: Your Connection to SAS: Using SAS Enterprise Guide. Chapter 3: Six-Minute Abs: Getting Miraculous Results with SAS. Part II: Gathering Data and Presenting Information. Chapter 4: Accessing Data: Oh, the Choices! Chapter 5: Managing Data: I Can Do That? Chapter 6: Show Me a Report in Less Than a Minute. Chapter 7: Graphs: More Value with SAS. Part III: Impressing Your Boss with Your SAS Business Intelligence. Chapter 8: A Painless Introduction to Analytics. Chapter 9: More Analytics to Enlighten and Entertain. Chapter 10: Data Mining: Making the Leap from Guesses to Smart Choices. Part IV: Enhancing and Sharing Your SAS Masterpieces. Chapter 11: Leveraging Work from SAS to Those Less Fortunate. Chapter 12: Use OLAP and Impress Your Coworkers. Chapter 13: Supercharge Microsoft Offi ce with SAS. Chapter 14: Web Reporting Fever: SAS Has That Covered. Part V: Getting SAS Ready to Rock and Roll. Chapter 15: Setting Up SAS. Chapter 16: SAS Programming for the Faint of Heart. Chapter 17: The New World Meets the Old: Programmers and SAS Enterprise Guide. Part VI: The Part of Tens. Chapter 18: Ten SAS Enterprise Guide Productivity Tips. Chapter 19: Ten Tips for Administrators. Chapter 20: Ten (or More) Web Resources for Extra Information. Index.

    10 in stock

    £20.79

  • Professional XMPP Programming with JavaScript and

    John Wiley & Sons Inc Professional XMPP Programming with JavaScript and

    15 in stock

    Book SynopsisCreate real-time, highly interactive apps quickly with the powerful XMPP protocol XMPP is a robust protocol used for a wide range of applications, including instant messaging, multi-user chat, voice and video conferencing, collaborative spaces, real-time gaming, data synchronization, and search.Table of ContentsIntroduction. Part I: XMPP Protocol and Architecture. Chapter 1: Getting to Know XMPP. Chapter 2: Designing XMPP Applications. Part II: The Applications. Chapter 3: Saying Hello: The First Application. Chapter 4: Exploring the XMPP Protocol: A Debugging Console. Chapter 5: Microblogging in Real Time: An Identica Client. Chapter 6: Talking with Friends: One‑on‑One Chat. Chapter 7: Exploring Services: Service Discovery and Browsing. Chapter 8: Group Chatting: A Multi‑User Chat Client. Chapter 9: Publishing and Subscribing: A Shared Sketch Pad Introduction. Chapter 10: Writing with Friends: A Collaborative Text Editor. Chapter 11: Playing Games: Head to Head Tic-Tac-Toe. Part III: Advanced Topics. Chapter 12: Getting Attached: Bootstrapping BOSH. Chapter 13: Deploying XMPP Applications. Chapter 14: Writing Strophe Plug-ins. Appendix A: Getting Started with jQuery. Appendix B: Setting Up a BOSH Connection Manager. Index.

    15 in stock

    £38.25

  • Home Networking DoItYourself for Dummies

    John Wiley & Sons Inc Home Networking DoItYourself for Dummies

    Out of stock

    Book SynopsisStep by step guide to connecting all your electronic devices into one network A home network allows you to share Internet connections, photos, video, music, game consoles, printers, and other electronic gadgets. This do-it-yourself guide shows you step by step how to create a wired or wireless network in your home.Table of ContentsIntroduction. Part I: Doing Your Homework. Chapter 1: Why Do You Need A Home Network? Chapter 2: Understanding Networking Basics. Part II: Installing Your Home Network. Chapter 3: Getting Wired. Chapter 4: Going Wireless. Part III: Setting Up Your Windows 7 Network. Chapter 5: Understanding User Accounts. Chapter 6: Setting Up a HomeGroup. Chapter 7: Sharing With Others. Chapter 8: Connecting to the Internet. Chapter 9: Connecting Remotely. Chapter 10: Having Fun with Your Home Network. Part IV: Keeping Your Network Safe and Healthy. Chapter 11: Inside the Action Center. Chapter 12: Windows Firewall and Windows Defender. Chapter 13: Windows Update. Chapter 14: Backup and Restore. Chapter 15: Building a SOHO Network. Part V: The Part of Tens. Chapter 16: Ten Great Windows 7 Resources. Chapter 17: Ten Reasons You Might Not Be Able to Join a HomeGroup. Chapter 18: Ten Network Troubleshooting Tools. Index.

    Out of stock

    £15.29

  • Twitter Marketing

    John Wiley & Sons Inc Twitter Marketing

    1 in stock

    Book SynopsisThe complete guide to a successful Twitter marketing campaign Twitter is a microblogging service that''s changing the way we communicate. Marketers recognize its value, and Twitter Marketing: An Hour a Day offers marketers, advertisers, brand managers, PR professionals, and business owners an in-depth guide to designing, implementing, and measuring the impact of a complete Twitter strategy. Expert author Hollis Thomases acquaints you with the Twitterverse, its conventions, and its fascinating demographics and statistics. She then teaches you step by step how to effectively craft successful branding and direct response strategies that can be scaled to any organization and its objectives. Twitter Marketing: An Hour a Day uses interesting case studies, success stories, anecdotes, and examples to demonstrate how to use Twitter metrics in order to inform strategic direction. You''ll discover how top companies-large and small-have leveraged this exciting communTable of ContentsForeword xix Introduction xxi Part I Get to Know Twitter 1 Chapter 1 Understand Twitter 3 Twitter History and Definitions 4 Twitter’s Technology 10 Twitter’s Rapid Ascent 14 Twitter’s Financial Future 16 What Makes Tweeps Tick? 17 Twitter’s Culture 33 The Main Points 37 Chapter 2 Who’s Using Twitter for What? 39 Demographics 40 Individual Users 43 Bots, Games, and Memes 56 Small and Home-Based Businesses 60 Not-for-Profits: Charities, Causes, the Arts, Houses of Worship, and Associations 62 Academia and Higher Education 63 Government 64 Marketing, Advertising, Public Relations, and Communications Professionals 65 Media Outlets 67 Sports and Entertainment 70 Corporations and Brands 72 The Main Points 85 Chapter 3 Twitter, the Multipurpose Platform 87 What Twitter Can Accomplish 88 Key Questions to Consider for Branding 119 The Main Points 125 Part II Month 1: Master Twitter Fundamentals 127 Chapter 4 Week 1: Get on Twitter 129 Monday: Create an Account 130 Tuesday: Find People to Follow 147 Wednesday: Learn Twitter Lingo 153 Thursday: Access Twitter 161 Friday: From Lurking to Leaping 163 The Main Points 167 Chapter 5 Week 2: Find and Attract Followers 169 Followers and Following 170 Monday: Use Basic Search to Find Followers 173 Tuesday: Add New Friends 179 Wednesday: Attract Followers 185 Thursday: Syndicate Your Tweet Content 195 Friday: Tools to Help Build and Manage Followers 197 The Main Points 203 Chapter 6 Week 3: Use Twitter Search and Other Tools to Improve Your Experience 205 Search and Other Tools for Twitter 206 Monday: Master Twitter Search 206 Tuesday: Use Tools to Enrich Your Tweets 215 Wednesday: Analyze Your Twitter Activity 227 Thursday: Experiment with Other Useful Twitter Tools 236 Friday: Fun with Twitter Tools 241 The Main Points 246 Chapter 7 Week 4: Track and Monitor What Twitter Generates for You 247 Twitter Metrics 248 Monday: Understand What to Track and How to Review It 248 Tuesday: Alerts—Simple Tracking Tools 255 Wednesday: Advanced Tracking Tools 260 Thursday: Compile Tracking Data 267 Friday: Review, Analyze, and Respond to Tracking Data 270 The Main Points 275 Part III Month 2: Develop and Launch Your Strategic Plan 277 Chapter 8 Week 5: Develop a Successful Twitter Strategy 279 Monday: Study Brands Succeeding with Twitter 280 Tuesday: Different Approaches to Develop Your Strategy 292 Wednesday: Study Strategies for Market Verticals 296 Thursday: Twitter’s Role in Your Overall Marketing Strategy 302 Friday: Avoid Pitfalls 303 The Main Points 307 Chapter 9 Week 6: Establish Goals and Get Corporate Buy-In 309 Monday: Establish Objectives 310 Tuesday: Measure and Report Upon Your Objectives 314 Wednesday: Determine Tweet Topics 317 Thursday: Assign Resources 322 Friday: Get Company Buy-In 325 The Main Points 328 Chapter 10 Week 7: Get Your Brand Started on Twitter 329 Monday: Claim Your Brand’s Twitter Name 330 Tuesday: Set Up Your Brand’s Profile 335 Wednesday: Your First Brand Tweets 342 Thursday: Engage Your Brand’s Followers 347 Friday: Summarize Best Practices 352 The Main Points 355 Chapter 11 Week 8: Monitor, Measure, and Valuate 357 Monday: Review Your Twitter Stats 358 Tuesday: Analyze Your Website Traffic 362 Wednesday: Analyze Actions 366 Thursday: Valuate 370 Friday: Review Case Studies 372 The Main Points 378 Part IV Month 3: Maintain Your Twitter Presence 379 Chapter 12 Week 9: Institutionalize Maintenance 381 Monday: Hold Weekly Meetings 382 Tuesday: Implement Weekly Action Plan 386 Wednesday: Oversee Production Requirements 388 Thursday: Prepare Documentation 390 Friday: Deliver Results to Management 391 The Main Points 393 Chapter 13 Week 10: Prepare for Crisis Management 395 The Reality of Twitter Crises 396 Monday: List Potential Crises 401 Tuesday: Create a Fire Drill 403 Wednesday: Write a Twitter Crisis Management Action Plan 406 Thursday: Know How to Really Say “I’m Sorry” 408 Friday: Distribute Your Crisis Action Plan 410 The Main Points 412 Chapter 14 Week 11: Develop a Direct Response Promotion for Twitter 413 Monday: Define the Need 414 Tuesday: Define Campaign Components 421 Wednesday: Move to Production 425 Thursday: Work Your Announcement Strategy 426 Friday: Launch Your Campaign 427 The Main Points 429 Appendix A Twitter-Related Glossary 431 Appendix B Twitter-Related Tools and Resources 439 Appendix C Tips from Tweeps 447 Appendix D Social Media Guidelines 453 Index 457

    1 in stock

    £21.84

  • C 2010 AllinOne For Dummies

    John Wiley & Sons Inc C 2010 AllinOne For Dummies

    15 in stock

    Book SynopsisA logical, straightforward approach to learning the C# language C# is a complicated programming language for building .NET-connected software for Microsoft Windows, the Web, and a wide range of devices. The friendly All-in-One For Dummies format is a perfect way to present it. Each minibook is a self-contained package of necessary information, making it easy to find what you''re looking for. Upgrades in C# 2010 include the ability to build Windows 7 applications and compatibility with Python and Ruby. C# is a somewhat complex programming language for building .NET-connected software for Microsoft Windows, the Web, and other devices Beginning C# programmers will appreciate how the All-in-One format breaks the topic into minibooks, each one addressing a key body of information Minibooks include creating your first C# program, Windows 7 programming, basic C# programming, object-based programming, object-oriented programming, Windows Table of ContentsIntroduction. Book I: Basics of C# Programming. Chapter 1: Creating Your First C# Console Application. Chapter 2: Living with Variability — Declaring Value-Type Variables. Chapter 3: Pulling Strings. Chapter 4: Smooth Operators. Chapter 5: Getting Into the Program Flow. Chapter 6: Lining Up Your Ducks with Collections. Chapter 7: Stepping through Collections. Chapter 8: Buying Generic. Chapter 9: Some Exceptional Exceptions. Book II: Object-Oriented C# Programming. Chapter 1: Object-Oriented Programming: What’s It All About? Chapter 2: Showing Some Class. Chapter 3: We Have Our Methods. Chapter 4: Let Me Say This about this. Chapter 5: Holding a Class Responsible. Chapter 6: Inheritance: Is That All I Get? Chapter 7: Poly-what-ism? Chapter 8: Interfacing with the Interface. Chapter 9: Delegating Those Important Events. Chapter 10: Can I Use Your Namespace in the Library? Book III: Designing for C#. Chapter 1: Writing Secure Code. Chapter 2: Accessing Data. Chapter 3: Fishing the FileStream. Chapter 4: Accessing the Internet. Chapter 5: Creating Images. Book IV: A Tour of Visual Studio. Chapter 1: Getting Started with Visual Studio. Chapter 2: Using the Interface. Chapter 3: Customizing Visual Studio. Chapter 4: Transforming Text Templates. Book V: Windows Development with WPF. Chapter 1: Introducing WPF. Chapter 2: Understanding the Basics of WP. Chapter 3: Data Binding in WPF. Chapter 4: Practical WPF. Book VI: Web Development with ASP.NET. Chapter 1: Looking at How ASP.NET Works with C#. Chapter 2: Building Web Applications. Chapter 3: Controlling Your Development Experience. Chapter 4: Leveraging the .NET Framework. Chapter 5: Digging into Web Construction. Book VII: Service-Oriented Development. Chapter 1: Getting Acquainted with Web Services. Chapter 2: Building Web Services with ASMX. Chapter 3: Building Web Services with WCF. Chapter 4: Building Web Services with ReST. Book VIII: New Features in C# 4.0. Chapter 1: Programming Dynamically! Chapter 2: Improving Productivity with Named and Optional Parameters. Chapter 3: Helping Out with Interop. Chapter 4: Revising Generics. Index.

    15 in stock

    £23.79

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account