Computing Books
John Wiley & Sons Inc IT Success
Book SynopsisFifty years after the birth of corporate computing, IT today is still characterized by 50-70% project failure rates. Which is pretty scary when you come to think of it: either a goblin has cast a spell on a whole profession or that profession is doing something fundamentally wrong. IT Success! challenges the widespread assumption that an IT department is like a building contractor whose project managers, architects and engineers (all construction industry terms) are supposed to deliver systems on schedule, within budget and to spec. Michael Gentle explains why this is not possible, and turns conventional wisdom on its head by showing that: you cannot define an IT project in terms of contractual budgets and schedules anything can change during the life of a project what is eventually delivered can never be what is actually needed He proposes a new model for IT in which the traditional client/vendor relationship, wTrade Review"...a clever synthesis of enlightened IT project management thinking over the last few years." (Financial Times, Wednesday 21st November 2007)Table of ContentsIntroduction ix Acknowledgements xiii Abbreviations xvii Part I Blinded by Specs 1 1 In Search of the Fundamentals 3 The more things change, the more they stay the same 3 A worldwide phenomenon 4 How the traditional IT model started 5 The construction industry trap 6 The free lunch trap 7 Houses of ill repute 8 A business problem rather than an IT problem 10 IT and original sin 12 No sacred cows 12 2 IT 101 – The Basics for Non-Specialists 15 The process breakdown for traditional IT activities 15 The process breakdown for business (i.e non-IT) activities 16 The fundamental difference between IT and non-IT activities 18 'That's not my problem!' – process ownership and behaviour 19 3 The Flaws of the Traditional Model 21 The unintended consequences of the waterfall method 21 In search of a pizza parlour manager 22 Who provides process expertise – client or vendor? 22 When standard client–vendor relationships are possible 24 When standard client–vendor relationships pose problems 25 Is a standard client–vendor relationship possible for IT? 26 The 'Statement of Requirements' (SoR) trap 26 A poor to non-existent pricing model 28 Should IT be run like a business (i.e an ESP)? 30 The limits of outsourcing 31 Current IT organizational trends 32 The ultimate litmus test to determine one's business model 33 What model would be appropriate for IT? 34 Part II Building a New Business Model for It 35 4 Managing Demand 37 Managing demand – traditional model 37 Managing demand – new model 39 Capturing demand and identifying opportunities 41 Prioritizing and approving demand 43 Planning approved demand 49 Linking demand to resource capability 49 Approving demand based on portfolios 50 The missing component in Project Portfolio Management 53 Business cases are in the eye of the beholder 54 Building the IT plan and budget 55 Demand from a customer perspective 56 Shaking off the chains of the construction industry 56 Funding approved demand 58 Roles and responsibilities 59 5 Managing Supply 61 Managing supply - traditional model 61 Managing supply - new model 63 Iterative development in practice 65 Why prototyping has never become mainstream 74 Is prototyping the answer to everything? 78 Project critical success factors 79 Maintenance - letting go of the M-word 79 Delivery and implementation 81 Service and support 81 6 Monitoring Costs and Benefits 83 Monitoring costs and benefits for traditional IT activities 83 Monitoring costs and benefits for business (non-IT) activities 84 Monitoring costs and benefits – new model 85 Ownership and accountability for costs and benefits 86 Cost–benefit analysis during the life of a project 87 It is normal for costs and benefits to change! 88 Portfolio performance monitoring 88 Cost–benefit analysis after project delivery 89 7 Financials 91 The main categories of IT costs 91 Ownership of IT costs for the regulation of supply and demand 92 Who has the final say for IT investments? 92 Allocations vs cross-charging 93 Capturing costs for allocations and cross-charging 94 Benefits as part of the P&L and annual planning 95 Ongoing cost–benefit analysis for applications 96 Reducing application lifetime costs 100 The limits of financial ROI when applied to IT 102 Part III the New Model in Practice 105 8 Players, Roles and Responsibilities 107 Players, roles and responsibilities – the business 107 Players, roles and responsibilities – IT 111 The new business–IT relationship 112 The changing role of the business analyst 113 The changing role of the developer 113 Towards the merging of the developer and analyst roles? 114 The changing role of the project manager 115 The changing role of the operations department 116 What role for PMOs? 117 The role of External Service Providers (ESPs) 119 9 Getting Started 121 The business challenge 121 The IT challenge 122 Where to start 123 How to start – from checklist to action plan 124 From the status quo to first results 128 From first results to asset management 133 The role of best-practice methodologies 136 How consulting companies can help 138 How tools can help 139 The costs of moving to the new model 140 In closing – addressing the three fundamental questions 142 Further reading 143 10 Case Study 145 The company 145 The business problem 146 The project context 146 Building an IT–business partnership 147 Kicking off the project 148 Feasibility study and defining a solution 149 Building the business case 150 Project approach 151 Product evaluation – buy or build decision 151 Building a prototype 152 Results 154 Timescales 155 Three months later 155 One year later 156 Two years later 156 Main lessons learnt (on the plus side) 156 Main lessons learnt (on the minus side) 157 Comments with respect to the new model 157 Reader feedback 158 Index 159
£16.99
John Wiley & Sons Inc Mobile Middleware
Book SynopsisThis book offers a unified treatment of mobile middleware technology Mobile Middleware: Architecture, Patterns and Practiceprovides a comprehensive overview of mobile middleware technology. The focus is on understanding the key design and architectural patterns, middleware layering, data presentation, specific technological solutions, and standardization. The author addresses current state of the art systems including Symbian, Java 2 Micro Edition, W3C technologies and many others, and features a chapter on widely deployed middleware systems. Additionally, the book includes a summary of relevant mobile middleware technologies, giving the reader an insight into middleware architecture design and well-known, useful design patterns. Several case studies are included in order to demonstrate how the presented patterns, solutions, and architectures are applied in practice. The case studies pertain to mobile service platforms, mobile XML processing, thin clients, rich clientTable of ContentsAbout the Authors. List of Contributors. Preface. 1. Introduction. 1.1 Mobile Middleware. 1.2 Mobile Applications and Services. 1.3 Middleware Services. 1.4 Transparencies. 1.5 Mobile Environment. 1.6 Context-Awareness. 1.7 Mobility. 1.8 Example Use Case. 1.9 Requirements for Mobile Computing. 1.10 Mobile Platforms. 1.11 Organization of the Book. Bibliography. 2. Architectures and Platforms. 2.1 Overview. 2.2 Networking. 2.3 Naming and Addressing. 2.4 Middleware and Platforms. 2.5 Overview of Platforms. 2.6 Mobile Platforms. Bibliography. 3. Support Technologies. 3.1 Session Initiation Protocol (SIP). 3.2 IP Multimedia Subsystem (IMS). 3.3 Web Services. 3.4 Other Technologies. 3.5 Service Discovery. 3.6 Mobility Solutions. 3.7 Advanced Topics. 3.8 Fuego: Example Middleware Platform. Bibliography. 4. Principles and Patterns. 4.1 Definitions. 4.2 Principles. 4.3 Cross-layer design. 4.4 Model Driven Architecture. 4.5 Architectural Patterns. 4.6 General Patterns. 4.7 Patterns for Mobile Computing. 4.8 Summary. Bibliography. 5. Interoperability and Standards. 5.1 Interoperability. 5.2 Standardization. 5.3 Wireless Communications Standards. 5.4 W3C Standards. 5.5 IETF Standards. 5.6 Emerging Internet Standards. Bibliography. 6. Mobile Messaging. 6.1 Messaging Fundamentals. 6.2 Messaging Architectures. 6.3 Mobile and Wireless Communication. 6.4 Security. 6.5 Reliability. 6.6 Java Message Service. 6.7 CORBA and CORBA Messaging. 6.8 XMPP. 6.9 Web Services. 6.10 The Web and REST. Bibliography. 7. Publish/Subscribe. 7.1 Overview. 7.2 Router Topologies. 7.3 Interest Propagation. 7.4 Routing Decision. 7.5 Standards. 7.6 Research Systems. 7.7 Advanced Topics. Bibliography. 8. Data Synchronization. 8.1 Synchronization Models. 8.2 File Systems and Version Control. 8.3 Synchronization in Middleware. 8.4 Case Studies. Bibliography. 9. Security. 9.1 Basic Principles. 9.2 Cryptography. 9.3 Public Key Infrastructure. 9.4 Network Security. 9.5 802.11X. 9.6 AAA, RADIUS, Diameter. 9.7 Transport-layer Security. 9.8 Web Services Security. 9.9 Security Tokens. 9.10 SAML. 9.11 XACML. 9.12 Single Sign-On (SSO). 9.13 Generic Bootstrapping Architecture (GBA). 9.14 Trusted Platform Module. 9.15 OpenID, OAuth, MicroID. 9.16 Spam. 9.17 Downloaded Code. Bibliography. 10. Application and Service Case Studies. 10.1 Mobile Services. 10.2 Mobile Server. 10.3 Mobile Advertisement. 10.4 Mobile Push Email. 10.5 Mobile Video. 10.6 Mobile Widgets and WidSets. 10.7 Airline Services. 10.8 Revisiting Mobile Patterns. 10.9 Summary. Bibliography. 11. Conclusions. Index.
£67.46
John Wiley & Sons Inc Computer Security
Book SynopsisA completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security.Table of ContentsPreface xvii CHAPTER 1 – History of Computer Security 1 1.1 The Dawn of Computer Security 2 1.2 1970s – Mainframes 3 1.3 1980s – Personal Computers 4 1.4 1990s – Internet 6 1.5 2000s – The Web 8 1.6 Conclusions – The Benefits of Hindsight 10 1.7 Exercises 11 CHAPTER 2 – Managing Security 13 2.1 Attacks and Attackers 14 2.2 Security Management 15 2.3 Risk and Threat Analysis 21 2.4 Further Reading 29 2.5 Exercises 29 CHAPTER 3 – Foundations of Computer Security 31 3.1 Definitions 32 3.2 The Fundamental Dilemma of Computer Security 40 3.3 Data vs Information 40 3.4 Principles of Computer Security 41 3.5 The Layer Below 45 3.6 The Layer Above 47 3.7 Further Reading 47 3.8 Exercises 48 CHAPTER 4 – Identification and Authentication 49 4.1 Username and Password 50 4.2 Bootstrapping Password Protection 51 4.3 Guessing Passwords 52 4.4 Phishing, Spoofing, and Social Engineering 54 4.5 Protecting the Password File 56 4.6 Single Sign-on 58 4.7 Alternative Approaches 59 4.8 Further Reading 63 4.9 Exercises 63 CHAPTER 5 – Access Control 65 5.1 Background 66 5.2 Authentication and Authorization 66 5.3 Access Operations 68 5.4 Access Control Structures 71 5.5 Ownership 73 5.6 Intermediate Controls 74 5.7 Policy Instantiation 79 5.8 Comparing Security Attributes 79 5.9 Further Reading 84 5.10 Exercises 84 CHAPTER 6 – Reference Monitors 87 6.1 Introduction 88 6.2 Operating System Integrity 90 6.3 Hardware Security Features 91 6.4 Protecting Memory 99 6.5 Further Reading 103 6.6 Exercises 104 CHAPTER 7 – Unix Security 107 7.1 Introduction 108 7.2 Principals 109 7.3 Subjects 111 7.4 Objects 113 7.5 Access Control 116 7.6 Instances of General Security Principles 119 7.7 Management Issues 125 7.8 Further Reading 128 7.9 Exercises 128 CHAPTER 8 – Windows Security 131 8.1 Introduction 132 8.2 Components of Access Control 135 8.3 Access Decisions 142 8.4 Managing Policies 145 8.5 Task-Dependent Access Rights 147 8.6 Administration 150 8.7 Further Reading 153 8.8 Exercises 153 CHAPTER 9 – Database Security 155 9.1 Introduction 156 9.2 Relational Databases 158 9.3 Access Control 162 9.4 Statistical Database Security 167 9.5 Integration with the Operating System 172 9.6 Privacy 173 9.7 Further Reading 175 9.8 Exercises 175 CHAPTER 10 – Software Security 177 10.1 Introduction 178 10.2 Characters and Numbers 179 10.3 Canonical Representations 183 10.4 Memory Management 184 10.5 Data and Code 191 10.6 Race Conditions 193 10.7 Defences 194 10.8 Further Reading 201 10.9 Exercises 202 CHAPTER 11 – Bell–LaPadula Model 205 11.1 State Machine Models 206 11.2 The Bell–LaPadula Model 206 11.3 The Multics Interpretation of BLP 212 11.4 Further Reading 216 11.5 Exercises 216 CHAPTER 12 – Security Models 219 12.1 The Biba Model 220 12.2 Chinese Wall Model 221 12.3 The Clark–Wilson Model 223 12.4 The Harrison–Ruzzo–Ullman Model 225 12.5 Information-Flow Models 228 12.6 Execution Monitors 230 12.7 Further Reading 232 12.8 Exercises 233 CHAPTER 13 – Security Evaluation 235 13.1 Introduction 236 13.2 The Orange Book 239 13.3 The Rainbow Series 241 13.4 Information Technology Security Evaluation Criteria 242 13.5 The Federal Criteria 243 13.6 The Common Criteria 243 13.7 Quality Standards 246 13.8 An Effort Well Spent? 247 13.9 Summary 248 13.10 Further Reading 248 13.11 Exercises 249 CHAPTER 14 – Cryptography 251 14.1 Introduction 252 14.2 Modular Arithmetic 256 14.3 Integrity Check Functions 257 14.4 Digital Signatures 260 14.5 Encryption 264 14.6 Strength of Mechanisms 270 14.7 Performance 271 14.8 Further Reading 272 14.9 Exercises 273 CHAPTER 15 – Key Establishment 275 15.1 Introduction 276 15.2 Key Establishment and Authentication 276 15.3 Key Establishment Protocols 279 15.4 Kerberos 283 15.5 Public-Key Infrastructures 288 15.6 Trusted Computing – Attestation 293 15.7 Further Reading 295 15.8 Exercises 295 CHAPTER 16 – Communications Security 297 16.1 Introduction 298 16.2 Protocol Design Principles 299 16.3 IP Security 301 16.4 IPsec and Network Address Translation 308 16.5 SSL/TLS 310 16.6 Extensible Authentication Protocol 314 16.7 Further Reading 316 16.8 Exercises 316 CHAPTER 17 – Network Security 319 17.1 Introduction 320 17.2 Domain Name System 322 17.3 Firewalls 328 17.4 Intrusion Detection 332 17.5 Further Reading 335 17.6 Exercises 336 CHAPTER 18 – Web Security 339 18.1 Introduction 340 18.2 Authenticated Sessions 342 18.3 Code Origin Policies 346 18.4 Cross-Site Scripting 347 18.5 Cross-Site Request Forgery 350 18.6 JavaScript Hijacking 352 18.7 Web Services Security 354 18.8 Further Reading 360 18.9 Exercises 361 CHAPTER 19 – Mobility 363 19.1 Introduction 364 19.2 GSM 364 19.3 UMTS 369 19.4 Mobile IPv6 Security 372 19.5 WLAN 377 19.6 Bluetooth 381 19.7 Further Reading 383 19.8 Exercises 383 CHAPTER 20 – New Access Control Paradigms 385 20.1 Introduction 386 20.2 SPKI 388 20.3 Trust Management 390 20.4 Code-Based Access Control 391 20.5 Java Security 395 20.6 .NET Security Framework 400 20.7 Digital Rights Management 405 20.8 Further Reading 406 20.9 Exercises 406 Bibliography 409 Index 423
£48.56
John Wiley & Sons Inc Storage Networks Explained Basics and Application
Book SynopsisAll you need to know about Storage Area Networks The amount of data of an average company doubles every year. Thus, companies who own 1TB of data today will own 32TB in five years. Storage networks help to tame such data quantities and to manage this data growth efficiently. Since stored data and information are the biggest asset of any company, anyone who is involved in the planning or the operation of IT systems requires a basic knowledge of the principle and the use of storage networks. Storage Networks Explained covers the fundaments, techniques and functions of storage networks such as disk subsystems, Fibre Channel SAN, Internet SCSI (iSCSI), Fibre Channel over Ethernet (FCoE), Network Attached Storage (NAS), file systems, and storage virtualization. Furthermore the authors describe the use of these techniques and how they are designed to achieve high-availability, flexibility, and scalability of data and applications. Additional attention is given Table of ContentsAbout the Authors. Foreword to the Second Edition by Hermann Strass. Preface by the Authors. List of Figures and Tables. 1 Introduction. 1.1 Server-Centric IT Architecture and its Limitations. 1.2 Storage-Centric IT Architecture and its Advantages. 1.3 Case Study: Replacing a Server with Storage Networks. 1.4 The Structure of the Book. PART I Technologies for Storage Networks. 2 Intelligent Disk Subsystems. 2.1 Architecture of Intelligent Disk Subsystems. 2.2 Hard Disks and Internal I/O Channels. 2.3 JBOD: Just a Bunch of Disks. 2.4 Storage Virtualisation Using RAID. 2.5 Different RAID Levels in Detail. 2.5.1 RAID 0: block-by-block striping. 2.5.2 RAID 1: block-by-block mirroring. 2.5.3 RAID 0+1/RAID 10: striping and mirroring combined. 2.5.4 RAID 4 and RAID 5: parity instead of mirroring. 2.5.5 RAID 6: double parity. 2.5.6 RAID 2 and RAID 3. 2.5.7 A comparison of the RAID levels. 2.6 Caching: Acceleration of Hard Disk Access. 2.6.1 Cache on the hard disk. 2.6.2 Write cache in the disk subsystem controller. 2.6.3 Read cache in the disk subsystem controller. 2.7 Intelligent Disk Subsystems. 2.7.1 Instant copies. 2.7.2 Remote mirroring. 2.7.3 Consistency groups. 2.7.4 LUN masking. 2.8 Availability of Disk Subsystems. 2.9 Summary. 3 I/O Techniques. 3.1 The Physical I/O Path from the CPU to the Storage System. 3.2 SCSI. 3.2.1 SCSI basics. 3.2.2 SCSI and storage networks. 3.3 The Fibre Channel Protocol Stack. 3.3.1 Links, ports and topologies. 3.3.2 FC-0: cables, plugs and signal encoding. 3.3.3 FC-1: 8b/10b encoding, ordered sets and link control protocol. 3.3.4 FC-2: data transfer. 3.3.5 FC-3: common services. 3.3.6 Link services: login and addressing. 3.3.7 Fabric services: name server and co. 3.3.8 FC-4 and ULPs: application protocols. 3.4 Fibre Channel SAN. 3.4.1 Point-to-point topology. 3.4.2 Fabric topology. 3.4.3 Arbitrated loop topology. 3.4.4 Hardware components for Fibre Channel SAN. 3.4.5 InterSANs. 3.4.6 Interoperability of Fibre Channel SAN. 3.5 IP Storage. 3.5.1 IP storage standards: iSCSI, iFCP, mFCP, FCIP and iSNS. 3.5.2 TCP/IP and Ethernet as an I/O technology. 3.5.3 Migration from Fibre Channel to IP storage. 3.6 Infiniband-based Storage Networks. 3.6.1 InfiniBand. 3.6.2 Virtual Interface Architecture (VIA). 3.6.3 SCSI via InfiniBand and RDMA. 3.7 Fibre Channel over Ethernet (FCoE). 3.7.1 I/O Consolidation based on Ethernet. 3.7.2 FCoE Details. 3.7.3 Case studies. 3.7.4 Data Center Bridging (DCB). 3.7.5 Outlook. 3.8 Summary. 4 File Systems and Network Attached Storage (NAS). 4.1 Local File Systems. 4.1.1 File systems and databases. 4.1.2 Journaling. 4.1.3 Snapshots. 4.1.4 Volume manager. 4.2 Network File Systems and File Servers. 4.2.1 Basic principle. 4.2.2 Network Attached Storage (NAS). 4.2.3 Performance bottlenecks in file servers. 4.2.4 Acceleration of network file systems. 4.2.5 Case study: The Direct Access File System (DAFS). 4.3 Shared Disk File Systems. 4.3.1 Case study: The General Parallel File System (GPFS). 4.4 Comparison: Fibre Channel SAN, FCoE SAN, iSCSI SAN and NAS. 4.5 Summary. 5 Storage Virtualisation. 5.1 Once Again: Virtualisation in the I/O Path. 5.2 Limitations and Requirements. 5.2.1 Architecture-related limitations of non-virtualised storage networks. 5.2.2 Implementation-related limitations of storage networks. 5.2.3 Requirements of the data. 5.2.4 Proposed solution: storage virtualisation. 5.3 Definition of Storage Virtualisation. 5.4 Implementation Considerations. 5.4.1 Realisation of the virtualisation entity. 5.4.2 Replacement of storage devices. 5.4.3 Efficient use of resources by dynamic storage allocation. 5.4.4 Efficient use of resources by data migration. 5.4.5 Performance increase. 5.4.6 Availability due to the introduction of redundancy. 5.4.7 Backup and archiving. 5.4.8 Data sharing. 5.4.9 Privacy protection. 5.5 Storage Virtualisation on Block or File Level. 5.6 Storage Virtualisation on Various Levels of the Storage Network. 5.6.1 Storage virtualisation in the server. 5.6.2 Storage virtualisation in storage devices. 5.6.3 Storage virtualisation in the network. 5.7 Symmetric and Asymmetric Storage Virtualisation in the Network. 5.7.1 Symmetric storage virtualisation. 5.7.2 Asymmetric storage virtualisation. 5.8 Summary. PART II Application and Management of Storage Networks. 6 Application of Storage Networks. 6.1 Definition of the Term ‘Storage Network’. 6.1.1 Layering of the transmission techniques and protocols. 6.1.2 Networks in the I/O path. 6.1.3 Data networks, voice networks and storage networks. 6.2 Storage Sharing. 6.2.1 Disk storage pooling. 6.2.2 Dynamic tape library sharing. 6.2.3 Data sharing. 6.3 Availability of Data. 6.3.1 Failure of an I/O bus. 6.3.2 Failure of a server. 6.3.3 Failure of a disk subsystem. 6.3.4 Failure of virtualisation in the storage network. 6.3.5 Failure of a data centre based upon the case study ‘protection of an important database’. 6.4 Adaptability and Scalability of IT Systems. 6.4.1 Clustering for load distribution. 6.4.2 Web architecture. 6.4.3 Web applications based upon the case study ‘travel portal’. 6.5 Summary. 7 Network Backup. 7.1 General Conditions for Backup. 7.2 Network Backup Services. 7.3 Components of Backup Servers. 7.3.1 Job scheduler. 7.3.2 Error handler. 7.3.3 Metadata database. 7.3.4 Media manager. 7.4 Backup Clients. 7.5 Performance Gains as a Result of Network Backup. 7.6 Performance Bottlenecks of Network Backup. 7.6.1 Application-specific performance bottlenecks. 7.6.2 Performance bottlenecks due to server-centric IT architecture. 7.7 Limited Opportunities for Increasing Performance. 7.7.1 Separate LAN for network backup. 7.7.2 Multiple backup servers. 7.7.3 Backup server and application server on the same physical computer. 7.8 Next Generation Backup. 7.8.1 Server-free backup. 7.8.2 LAN-free backup. 7.8.3 LAN-free backup with shared disk file systems. 7.8.4 Backup using instant copies. 7.8.5 Data protection using remote mirroring. 7.8.6 Tape library sharing. 7.9 Backup of File Systems. 7.9.1 Backup of file servers. 7.9.2 Backup of file systems. 7.9.3 Backup of NAS servers. 7.9.4 The Network Data Management Protocol (NDMP). 7.10 Backup of Databases. 7.10.1 Functioning of database systems. 7.10.2 Classical backup of databases. 7.10.3 Next generation backup of databases. 7.11 Organisational Aspects of Backup. 7.12 Summary. 8 Archiving. 8.1 Terminology. 8.1.1 Differentiating between information and data. 8.1.2 Archiving. 8.1.3 Digital archiving. 8.1.4 Reference architecture for digital archive systems. 8.1.5 Differentiating between archiving and backup. 8.1.6 Differentiating between archiving and ILM. 8.2 Motivation, Conditions and Requirements. 8.2.1 Reasons for archiving. 8.2.2 Legal requirements. 8.2.3 Technical progress. 8.2.4 Requirement for stability. 8.2.5 Risks from the environment and from society. 8.2.6 Requirement for adaptability and scalability. 8.2.7 Operational requirements. 8.2.8 Cost-related requirements. 8.2.9 Conclusion: Archive systems as a strategic investment. 8.3 Implementation Considerations. 8.3.1 WORM storage technologies. 8.3.2 Data security. 8.3.3 Data integrity. 8.3.4 Proof of regulatory compliance. 8.3.5 Deletion of data. 8.3.6 Continuous operation. 8.3.7 Loss-free operation. 8.3.8 Data management: storage hierarchy and migration. 8.3.9 Component-neutral archiving. 8.3.10 Selection of components and vendors. 8.4 Interfaces in Archive Systems. 8.4.1 Interface between application and DMS. 8.4.2 Java Content Repository (JCR). 8.4.3 Interface between DMS and archive storage. 8.4.4 eXtensible Access Method (XAM). 8.4.5 Management interfaces. 8.4.6 Interface between DMS systems. 8.4.7 Standardised interfaces for archive systems. 8.5 Archive Solutions. 8.5.1 Archiving of emails. 8.5.2 Archiving of files. 8.5.3 Archiving of ERP systems. 8.5.4 Archiving in hospitals. 8.5.5 Central archives. 8.6 Operational and Organisational Aspects. 8.7 Summary and Outlook. 9 Business Continuity. 9.1 General Conditions. 9.1.1 Terminology. 9.1.2 Target audience. 9.1.3 Classification of risks. 9.1.4 Classification of outages. 9.1.5 IT failures in the context of business processes. 9.1.6 Resumption of business processes. 9.1.7 Business continuity for the web architecture. 9.1.8 Cost optimisation for business continuity. 9.1.9 Risk analysis and risk management. 9.1.10 Creation of a business continuity plan. 9.2 Strategies of Business Continuity. 9.2.1 High availability. 9.2.2 Disaster recovery. 9.2.3 Continuous business operation. 9.3 Parameters of Business Continuity. 9.3.1 Availability. 9.3.2 Characterisation of availability (MTBF, MTTR and MTTF). 9.3.3 Calculation of overall availability. 9.3.4 Characterisation of failures (RTO and RPO). 9.3.5 Network Recovery Objective (NRO). 9.4 Quality of Service for Business Continuity. 9.4.1 Service Level Agreements (SLAs). 9.4.2 High availability versus disaster recovery. 9.4.3 The seven-tier model. 9.4.4 Tier 0: no data backup. 9.4.5 Tier 1: data backup without a backup data centre. 9.4.6 Tier 2: data backup with backup data centre. 9.4.7 Tier 3: electronic vaulting. 9.4.8 Tier 4: instant copies. 9.4.9 Tier 5: software mirroring. 9.4.10 Tier 6: disk subsystem-based mirroring. 9.4.11 Tier 7: fully automated solutions. 9.5 Business Continuity Solutions. 9.5.1 Basic techniques. 9.5.2 Solution segments of the seven-tier model. 9.5.3 Backup and restore. 9.5.4 Rapid data recovery using copies. 9.5.5 Rapid data recovery using mirrors. 9.5.6 Continuous availability. 9.6 Switch of Operational Location. 9.7 Organisational Aspects. 9.8 Summary. 10. Management of Storage Networks. 10.1 Requirements. 10.1.1 User-related requirements. 10.1.2 Component-related requirements. 10.1.3 Architectural requirements. 10.1.4 One central management system. 10.1.5 Five basic services. 10.2 Characterisation of Management Interfaces. 10.2.1 In-band interfaces. 10.2.2 Out-band interfaces. 10.2.3 Standardised interfaces. 10.2.4 Proprietary interfaces. 10.2.5 Conclusion. 10.3 In-band Management. 10.3.1 In-band management in Fibre Channel SAN. 10.4 Out-band Management. 10.4.1 The Simple Network Management Protocol (SNMP). 10.4.2 CIM and WBEM. 10.4.3 Storage Management Initiative Specification (SMI-S). 10.4.4 CMIP and DMI. 10.5 Operational Aspects of the Management of Storage Networks. 10.6 Summary. 11 Removable Media Management. 11.1 The Significance of Removable Media. 11.2 Removable Media. 11.2.1 Tapes. 11.2.2 CD, DVD and magneto-optical media. 11.2.3 Management features of removable media. 11.3 Libraries and Drives. 11.3.1 Libraries. 11.3.2 Drives. 11.3.3 Media changers. 11.4 Problems and Requirements in Respect of Removable Media Management. 11.4.1 Efficient use of the available resources. 11.4.2 Access control. 11.4.3 Access synchronisation. 11.4.4 Access prioritisation and mount request queuing. 11.4.5 Grouping, pooling. 11.4.6 Media tracking and vaulting. 11.4.7 Cartridge life cycle management. 11.4.8 Monitoring. 11.4.9 Reporting. 11.5 The IEEE 1244 Standard for Removable Media Management. 11.5.1 Media management system architecture. 11.5.2 Media manager and MMP. 11.5.3 Library manager and drive manager. 11.6 Summary. 12 The SNIA Shared Storage Model. 12.1 The Model. 12.1.1 The functional approach. 12.1.2 Graphical representations. 12.1.3 An elementary overview. 12.1.4 The components. 12.1.5 The layers. 12.1.6 The file/record layer. 12.1.7 The block layer. 12.1.8 Combination of the block and file/record layers. 12.1.9 Access paths. 12.1.10 Caching. 12.1.11 Access control. 12.1.12 Clustering. 12.1.13 Storage, data and information. 12.1.14 Resource and data sharing. 12.1.15 The service subsystem. 12.2 Examples of Disk-Based Storage Architectures. 12.2.1 Direct attached block storage. 12.2.2 Storage network attached block storage. 12.2.3 Block storage aggregation in a storage device: SAN appliance. 12.2.4 Network attached block storage with metadata server: asymmetric block services. 12.2.5 Multi-site block storage. 12.2.6 File server. 12.2.7 File server controller: NAS heads. 12.2.8 Asymmetric file services: NAS/file server metadata manager. 12.2.9 Object-based storage device (OSD). 12.3 Extension of the SNIA Shared Storage Model to Tape Functions. 12.3.1 Logical and physical structure of tapes. 12.3.2 Differences between disk and tape. 12.3.3 Extension of the model. 12.4 Examples of Tape-Based Backup Techniques and Architectures. 12.4.1 File backup. 12.4.2 File system volume backup. 12.4.3 Volume backup. 12.4.4 File backup to virtual tape. 12.4.5 Direct attached tape. 12.4.6 LAN attached tape. 12.4.7 Shared tape drive. 12.4.8 Partitioned tape library. 12.4.9 Virtual tape controller. 12.4.10 Virtual tape controller with disk cache. 12.4.11 Data mover for tape. 12.4.12 File server with tape drive. 12.4.13 File server with external tape. 12.4.14 File server with data mover. 12.5 Summary. 13 Final Note. Glossary. Annotated Bibliography. Appendix A: Proof of Calculation of the Parity Block of RAID 4 and 5. Appendix B: Checklist for the Management of Storage Networks. B.1 Applications. B.1.1 Monitoring. B.1.2 Availability. B.1.3 Performance. B.1.4 Scalability. B.1.5 Efficient use. B.2 Data. B.2.1 Availability. B.2.2 Performance. B.2.3 Data protection. B.2.4 Archiving. B.2.5 Migration. B.2.6 Data sharing. B.2.7 Security/access control. B.3 Resources. B.3.1 Inventory/asset management and planning. B.3.2 Monitoring. B.3.3 Configuration. B.3.4 Resource use. B.3.5 Capacity. B.3.6 Efficient resource utilisation. B.3.7 Availability. B.3.8 Resource migration. B.3.9 Security. B.4 Network. B.4.1 Topology. B.4.2 Monitoring. B.4.3 Availability. B.4.4 Performance. Index.
£78.26
John Wiley & Sons Inc Cash CDO Modeling in Excel
Book SynopsisThis book is an introduction to the modelling of cash collateralised debt obligations (CDOs). It is intended that the reader have a basic understanding of CDOs and a basic working knowledge of Microsoft Office Excel. There will be written explanations of concepts along with understandable mathematical explanations and examples provided in Excel.Table of ContentsForeword. Acknowledgments. 1 Introduction. 1.1 To Excel or Not to Excel? 1.2 Existing Tools and Software. 2 What is a Cash CDOs? 2.1 Types of CDOs. 2.2 Description of a Cash Flow CDO. 2.3 Life Cycle of a Cash CDO. 2.4 Contribution to the “Credit Crunch”. 3 Introduction to Modelling. 3.1 Goals in Modelling. 3.2 Modelling Philosophies and Trade-Offs. 3.3 Flexibility. 3.4 Organization and Layout of a Model. 3.5 Life-Cycle Issues: Building an Adaptable Model. 4 Prerequisites to Cash Flow Modelling. 4.1 Modelling Dates. 4.2 Interest Rate Curve Modelling. 4.3 Present Value Modelling. 5 Getting Started. 5.1 Create the Input Sheet. 5.2 The Value of Labelling. 6 Modelling Assets. 6.1 Initial Asset Pool: Rep Line Modelling vs. Actual Assets. 6.2 The Collateral Sheet in the Cash Flow Model. 6.3 Modelling Defaults and Recoveries. 6.4 Amortization. 6.5 Modelling Reinvestment. 6.6 Reinvestment Cohorts. 6.7 Accounts. 6.8 Timing Models vs. Actual Timing. 6.9 Simple Warehouse Modelling. 7 Basic Waterfall Modelling. 7.1 Basic Waterfalls. 7.2 Layout and Design. 7.3 Avoiding Negative Values. 7.4 Timing Modelled vs. Actual Timing. 7.5 Liabilities Cash Flows. 7.6 Fees and Expenses Cash Flows. 7.7 Interest Waterfall. 7.8 Interest Waterfall (Available Funds after Payment). 7.9 Interest Waterfall Calculations. 7.10 Principal Waterfall. 7.11 Principle Waterfall (Available Funds after Payment). 7.12 Principal Waterfall Calculations. 7.13 Adding Over-Collaterization Tests. 7.14 Adding Interest Coverage Tests. 7.15 Technical Issues with Coverage Tests. 8 Outputs Sheet. 8.1 Purpose of the Outputs Sheet. 8.2 Collating Waterfall Outputs. 8.3 Present Value. 8.4 Duration. 8.5 Weighted Average Life and Internal Rate of Return. 8.6 Equity Analysis. 8.7 Basic Auditing. 9 Moody’s Rating Agency Methodology. 9.1 Introduction to Agency Methodologies. 9.2 The Bet Approach. 9.3 Evaluating the Collateral. 9.4 Creating the Moody’s Sheet and Related References in the Cash Flow Model. 9.5 Default Profiles. 9.6 Interest Rate Profiles. 9.7 Running the Analysis. 9.8 Variations on the BET. 9.9 2009 Methodology Update. 10 Standard & Poor’s Rating Methodology. 10.1 The S&P Approach. 10.2 Evaluating the Collateral. 10.3 Modelling Recovery Rates. 10.4 CDO Evaluator. 10.5 Default Rates. 10.6 Interest Rate Stresses. 10.7 Amortization. 10.8 Additional S&P Modelling Criteria. 10.9 Building the S7P Sheet and Related References. 10.10 Running the Stress Scenarios. 11 Advanced Waterfall Modelling. 11.1 Hedge Agreements. 11.2 Fixed Notes. 11.3 Variable Funding Notes. 11.4 Liquidity Facilities. 11.5 Interest Reserve Accounts. 11.6 Other Structural Features. 11.7 Combination Notes. 11.8 Collateral Manager Equity Analysis. 12 Maintaining the Cash Flow Model. 12.1 Adapting Your Model for Different Capital Structures. 12.2 Audit Sheet. 12.3 Debugging. 13 Advanced Structuring Issues. 13.1 Projecting Accrued Interest. 13.2 Collating Collateral Cash Flows. 14 Sourcing and Integrating Data From External Systems. 14.1 Data Requirements. 14.2 Trustee Reports. 14.3 Bloomberg. 14.4 Loan Level Information Sources. 15 Regulatory Applications of CDO Technology. 15.1 The Basel Accords. 15.2 Regulatory Capital Requirements for CDO Notes. 15.3 The Standardized Approach for CDOs. 15.4 The Internal Ratings-Based Approach for CDOs. 15.5 The Internal Ratings-Based Approach for CDOs: The Ratings-Based Approach. 15.6 The Internal Ratings-Based Approach for CDOs: The Supervisory Formula Approach. 15.7 The Internal Ratings-Based Approach: Liquidity Facilities, Overlapping Exposures, Credit Risk Mitigation and Early Amortization Features. 15.8 Supervisory Provisions. 15.9 Updates to Basel II. 16 CDO Valuation. 16.1 Introduction. 16.2 Basic Valuation Approaches. 16.3 Traditional Underwriter Analysis. 16.4 Fundamental Cash Flow Analysis. 16.5 Using Rating Agency Models. 16.6 Transition Matrices. 16.7 Conclusion. 17 In Conclusion. Index.
£44.09
John Wiley & Sons Inc Digital Design of Signal Processing Systems
Book SynopsisDigital Design of Signal Processing Systems discusses a spectrum of architectures and methods for effective implementation of algorithms in hardware (HW). Encompassing all facets of the subject this book includes conversion of algorithms from floating-point to fixed-point format, parallel architectures for basic computational blocks, Verilog Hardware Description Language (HDL), SystemVerilog and coding guidelines for synthesis. The book also covers system level design of Multi Processor System on Chip (MPSoC); a consideration of different design methodologies including Network on Chip (NoC) and Kahn Process Network (KPN) based connectivity among processing elements. A special emphasis is placed on implementing streaming applications like a digital communication system in HW. Several novel architectures for implementing commonly used algorithms in signal processing are also revealed. With a comprehensive coverage of topics the book provides an appropriate mix of examples to iTrade Review"It can be used in a course on advanced digital design and VLSI signal processing at the senior undergraduate or graduate level." (Booknews, 1 April 2011)Table of ContentsPreface. Acknowledgement. 1 Overview. 1.1 Introduction. 1.2 Fueling the Innovation: Moore’s Law. 1.3 Digital Systems. 1.4 Examples of Digital Systems. 1.5 Components of the Digital Design Process. 1.6 Competing Objectives in Digital Process. 1.7 Synchronous Digital Hardware Systems. 1.8 Design Strategies. References. 2. Using a Hardware Description Language. 2.1 Overview. 2.2 About Verilog. 2.3 System Design Flow. 2.4 Logic Synthesis. 2.5 Using the Verilog HDL. 2.6 Four Levels of Abstraction. 2.7 Verification in Hardware Design. 2.8 Example of a Verification Setup. 2.9 SystemVerilog. Exercises. References. 3. System Design Flow and Fixed-Point Arithmetic. 3.1 Overview. 3.2 System Design Flow. 3.3 Representations and Numbers. 3.4 Floating-point Format. 3.5 Qn.m Format for Fixed-point Arithmetic. 3.6 Floating-Point to Fixed-Point Conversion. 3.7 Block Floating-Point Format. 3.8 Forms of Digital Filter. Exercises. References. 4. Mapping on Fully Dedicated Architecture. 4.1 Introduction. 4.2 Discrete Real-Time Systems. 4.3 Synchronous Digital Hardware Systems. 4.4 Kahn Process Network. 4.5 Methods of Representing DSP Systems. 4.6 Performance Measures. 4.7 Fully Dedicated Architecture. 4.8 DFG to HW Synthesis. Exercises. References. 5. Design Options for Basic Building Blocks. 5.1 Introduction. 5.2 Embedded Processors and Arithmetic Units in FPGAs. 5.3 Instantiation of Embedded Blocks. 5.4 Basic Building Blocks: Introduction. 5.5 Adders. 5.6 Barrel Shifter. 5.7 Cary Save Adder and Compressors. 5.8 Parallel Multipliers. 5.9 Two’s Complement Signed Multiplier. 5.10 Compression Trees for Multi-operand Addition. 5.11 Algorithm Transformations for CSA. Exercises. References. 6. Multiplier-less Multiplication by Constants. 6.1 Introduction. 6.2 Canonic Sign Digit Representation. 6.3 Minimum Signed Digit Representation. 6.4 Multiplication by Constant in Signal Processing Algorithm. 6.5 Optimized DFG Transformation. 6.6 Fully Dedicated Architecture for Direct-form FIR Filter. 6.7 Complexity Reduction. 6.8 Distributed Arithmetic. 6.9 FFT Architecture using FIR Filter Structure. Exercises. References. 7. Pipelining, Retiming, Look-ahead Transformation and Polyphase Decomposition. 7.1 Introduction. 7.2 Pipelining and Retiming. 7.3 Digital Design of Feedback Systems. 7.4 C-slow Retiming. 7.5 Look-ahead Transformation for IIR filters. 7.6 Look-ahead Transformation for Generalized IIR Filters. 7.7 Polyphase Structure for Decimation and Interpolation Applications. 7.8 IIR Filter for Decimation and Interpolation. Exercises. References. 8. Unfolding and Folding Architectures. 8.1 Introduction. 8.2 Unfolding. 8.3 Sampling Rate Considerations. 8.4 Unfolding Techniques. 8.5 Folding Techniques. 8.6 Mathematical Transformation for Folding. 8.7 Algorithmic Transformation. Exercises. References. 9.Designs based on Finite State Machines. 9.1 Introduction. 9.2 Examples of Time-shared Architecture Design. 9.3 Sequencing and Control. 9.4 Algorithmic State Machine Representation. 9.5 FSM Optimization for Low Power and Area. 9.6 Designing for Testability. 9.7 Methods for Reducing Power Dissipation. Exercises. References. 10. Micro-programmed State Machines. 10.1 Introduction. 10.2 Micro-programmed Controller. 10.3 Counter-based State Machine. 10.4 Subroutine Support. 10.5 Nested Subroutine Support. 10.6 Nested Loop Support. 10.7 Examples. Exercises. References. 11. Micro-programmed Adaptive Filtering Applications. 11.1 Introduction. 11.2 Adaptive Filters Configurations. 11.3 Adaptive Algorithms. 11.4 Channel Equalizer using NLMS. 11.5 Echo Canceller. 11.6 Adaptive Algorithms with Micro-programmed State Machines. Exercises. References. 12 CORDIC-based DDFS Architectures. 12.1 Introduction. 12.2 Direct Digital Frequency Synthesizer. 12.3 Design of a Basic DDFS. 12.4 The CORDIC Algorithm. 12.5 Hardware Mapping of Modified CORDIC Algorithm. Exercises. References. 13. Digital Design of Communication Systems. 13.1 Introduction. 13.2 Top-level Design Options. 13.3 Typical Digital Communication System. Exercises. References. Index.
£89.06
John Wiley & Sons Inc System Design for Telecommunication Gateways
Book SynopsisSystem Design for Telecommunication Gateways provides a thorough introduction to designing telecommunication network equipment based on the latest hardware designs and software methods available on the market.Trade Review"System Design for Telecommunication Gateways provides a thorough review of designing telecommunication network equipment based on the latest hardware designs and software methods available on the market." (Fixed Mobile Convergence, 15 March 2011)Table of ContentsAbbreviations. Abbreviations. 1. Introduction. 2. System View. 2.1 System Architecting. 2.2 Platform-based Approach. 2.3 System Verification. 3. Hardware Technologies and Platforms. 3.1 Different Form Factors. 3.2 Stacking chassis. 3.3 Cluster Computing. 3.4 Inter-blade Interconnect. 3.5 Hardware Solutions for Data, Control and Management Planes Processing. 4 Software Technologies and Platforms. 4.1 Basic Software Platform. 4.2 Expanded Software Platform. 4.3 Single-Threaded and Multi-X Software Designs. 4.4 Partitioning OS and Virtualization. Figures. Tables. References. Index.
£93.05
John Wiley & Sons Inc Data Mining Techniques in CRM Inside Customer
Book SynopsisThis is an applied handbook for the application of data mining techniques in the CRM framework. It combines a technical and a business perspective to cover the needs of business users who are looking for a practical guide on data mining.Trade Review"The book is written in a language that is easily accessible to business users who are not fluent in statistical methods and who have no prior exposure to the data mining or customer segmentation domain . . . This book is poised to become a standard reference, and I unconditionally recommend it to anyone working in this field." (Computing Reviews, 23 June 2011) "This is an excellent book for any data miner or anybody involved in CRM. The text is clear and pictures are well done and funny which is rare enough to be mentioned. From basic to advanced topics, the book is a very pleasant journey inside data mining with a clear focus on customer segmentation. Really advised if you're not a fan of formulas." (Data Mining Research, 18 March 2011)Table of ContentsAcknowledgements. 1. Data Mining in CRM. The CRM Strategy. What Can Data Mining Do? The Data Mining Methodology. Data Mining and Business Domain Expertise. Summary. 2. An Overview of Data Mining Techniques. Supervised Modeling. Unsupervised Modeling Techniques. Machine Learning/Artificial Intelligence vs. Statistical Techniques. Summary. 3. Data Mining Techniques for Segmentation. Segmenting Customers with Data Mining Techniques. Principal Components Analysis. Clustering Techniques. Examining and Evaluating the Cluster Solution. Understanding the Clusters through Profiling. Selecting the Optimal Cluster Solution. Cluster Profiling and Scoring with Supervised Models. An Introduction to Decision Tree Models. Summary. 4. The Mining Data Mart. Designing the Mining Data Mart. The Time Frame Covered by the Mining Data Mart. The Mining Data Mart for Retail Banking. The Mining Data Mart for Mobile Telephony Consumer (Residential) Customers. The Mining Data Mart for Retailers. Summary. 5. Customer Segmentation. An Introduction to Customer Segmentation. Segmentation Types in Consumer Markets. Segmentation in Business Markets. A Guide for Behavioral Segmentation. Segmentation Management Strategy. A Guide for Value-Based Segmentation. Designing Differentiated Strategies for the Value Segments. Summary. 6. Segmentation Applications in Banking. Segmentation for Credit Card Holders. Segmentation in Retail Banking. The Marketing Process. Segmentation in Retail Banking; A Summary. 7. Segmentation Applications in Telecommunications. Mobile Telephony. The Fixed Telephony Case. Summary. 8. Segmentation for Retailers. Segmentation in the Retail Industry. The RFM Analysis. Grouping Customers According to the Products They Buy. Summary. Further Reading. Index.
£61.16
John Wiley & Sons Inc Researching Your Family History Online For
Book SynopsisThis revised edition of the bestselling Genealogy Online For Dummies provides readers with all the expert advice they'll need to create a complete and detailed family tree using the Internet.Trade Review'...brilliant resource for researchers, packed with useful information...a quick-and-easy reference guide.' (Family History Monthly, April 2010).Table of ContentsIntroduction 1 Part I: Starting at the Roots 9 Chapter 1: Laying the Groundwork and Planning Ahead 11 Chapter 2: Fine-Tuning Your Organisational and Preservation Skills 31 Part II: Focusing on Your Ancestors 43 Chapter 3: Tracking Down an Ancestor: What’s in a Name? 45 Chapter 4: Locating Your Ancestors (Geographically Speaking) 69 Part III: Rooting Around in the Past 85 Chapter 5: Basic Genealogical Resources in the UK 87 Chapter 6: Digging Deeper into Your Family’s Past 125 Chapter 7: Looking Offline: Further Research Sources in the UK 143 Part IV: Share and Share Alike 165 Chapter 8: Storing and Organising Information on Your Computer 167 Chapter 9: Coordinating Your Attack: Getting Help from Other Researchers 183 Chapter 10: Sharing Your Wealth Online 195 Chapter 11: Creating a Place to Call Home 207 Part V: The Part of Tens 221 Chapter 12: Ten (Or So) Handy Databases 223 Chapter 13: Ten Things to Remember When Designing Your Genealogical Website 227 Chapter 14: Ten (Or So) Sites That Offer Help 235 Appendix: A Glossary of Terms 239 Index 253
£16.99
John Wiley & Sons Inc Adapting Configuration Management for Agile Teams
Book SynopsisAdapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Written by Mario E.Table of ContentsPublisher’s Acknowledgements xv Preface xvii Acknowledgements xix About the Author xxi Contributor Biography xxiii 1 Introduction: Racing with Confidence 1 1.1 Focus of this Book 4 1.2 Who should Use this Book 4 1.3 Navigation through this Book 5 1.4 Value of this Book 7 2 CM Primer 9 2.1 Brief History of CM 10 2.2 CM Values 11 2.2.1 Identification 12 2.2.2 Control 12 2.2.3 Audit 14 2.2.4 Report 15 2.3 CM Practices 15 2.3.1 CM Planning Practice 16 2.3.2 Version Control Practice 18 2.3.3 Change Control Practice 19 2.3.4 Build Management Practice 20 2.3.5 Release Practice 21 2.3.6 Problem Management Practice 21 2.3.7 Audit Practice 22 2.3.8 Report Practice 23 2.3.9 Other Practices 24 2.4 Benefits of CM 24 2.4.1 Benefits of CM to Management 24 2.4.2 Benefits of CM to Development Staff 24 2.4.3 Benefits of CM for CM and QA/Test Personnel 25 2.5 CM Roles 25 2.6 CM Mindset 29 2.6.1 Thinking Modular 29 2.6.2 Thinking Integrity 29 2.6.3 Thinking ‘‘Get It Done’’ 30 2.6.4 Thinking Improvement 30 2.7 Relationship of CM to Culture, Methods, & Governance 30 2.7.1 Relationship of Culture to CM 31 2.7.2 Relationship of Governance to CM 33 2.7.3 Relationship of Methods to CM 33 2.7.4 Avoiding Mistakes in CM Adoption 34 2.8 CM Resource Guide 35 2.8.1 CM Books 35 2.8.2 CM websites 35 3 Agile Primer 37 3.1 Brief History of Agile 40 3.2 Agile Values (a.k.a., Manifesto) 41 3.3 Agile Methods 42 3.3.1 Scrum 42 3.3.1.1 Scrum Roles 43 3.3.1.2 Scrum Practices and Artifacts 43 3.3.2 Extreme Programming (XP) 45 3.3.2.1 XP Roles 45 3.3.2.2 XP Practices and Rules 45 3.3.3 Other Methods that Support Agile 47 3.3.3.1 DSDM 47 3.3.3.2 Feature-Driven Development (FDD) 48 3.3.3.3 Agile Unified Process 48 3.4 Benefits of Agile 49 3.5 Agile Personality Types 50 3.5.1 Innovator 51 3.5.2 Champion 51 3.5.3 Workhorse 52 3.5.4 Bandwagon 53 3.5.5 Cowboy 53 3.5.6 Deceiver 54 3.5.7 Denier 55 3.5.8 Summarizing the Types 55 3.6 Agile Roles 55 3.6.1 Agile Coach 56 3.6.2 Agile Project Manager/ScrumMaster 56 3.6.3 Agile Project Team 57 3.6.4 Product Owner/Manager 57 3.6.5 Customer 58 3.7 Agile Mindset 58 3.7.1 Thinking Small 59 3.7.2 Thinking Business Value 59 3.7.3 Thinking Continuous 59 3.7.4 Thinking Self-Empowered Team 59 3.7.5 Thinking Collaboration 60 3.8 Moving to an Agile Culture 61 3.8.1 Targeting the Sweet Spot 61 3.8.2 Targeting the Product Level 62 3.8.3 Actions for Agile Change 63 3.8.3.1 Promoting a Dedicated Team 63 3.8.3.2 Ensure Continuous Customer Participation 63 3.8.3.3 Advocating for an Agile Coach 64 3.8.3.4 Promoting Co-Location 64 3.8.3.5 Introducing Agile Terminology 64 3.8.3.6 Promoting Agile Practices 65 3.8.3.7 Minimizing Project Reporting 65 3.8.3.8 Embracing Change 65 3.8.3.9 Praising Cancelled Projects 65 3.8.3.10 Removing Formality and Ceremony 66 3.8.4 Determining Agile Readiness 66 3.8.5 Measuring your Move Toward Agile 67 3.8.6 Avoiding Mistakes in Agile Adoption 68 3.9 Agile Resource Guide 69 3.9.1 Agile Books 69 3.9.2 Agile Websites 70 4 How CM and Agile Values Work Together 71 4.1 Aligning Agile and CM Mindsets 72 4.1.1 Challenges of Aligning the Minds 73 4.2 Supporting Agile and CM Values without Sacrifice 74 4.3 Value of Retrospective to CM 75 4.4 Agile Perspective of CM Practices 76 4.4.1 Value Ranking of CM Practices by CM Professionals 76 4.4.2 Value Rating of CM Practices by Agile Professionals 77 4.4.2.1 Agile Perspective of CM Tools in General 78 4.4.2.2 Agile Perspective of CM Planning 79 4.4.2.3 Agile Perspective for Version Control 81 4.4.2.4 Agile Perspective for Build Management 81 4.4.2.5 Agile Perspective of Change Control 82 4.4.2.6 Agile Perspective of Problem Management 82 4.4.2.7 Agile Perspective of CM Audit 82 4.4.2.8 Agile Perspective of CM Reporting 83 4.4.2.9 Agile Perspective of Release Engineering 83 5 Approaching Infrastructure for Agile 85 5.1 Guiding Principles for Approaching Infrastructure 86 5.2 Considerations for Approaching Infrastructure 87 5.2.1 Iteration 0 87 5.2.2 Agile Team as Customer of Infrastructure 87 5.2.3 Architecture Envisioning 88 5.2.4 To Envision or to Refactor 90 5.3 Infrastructure Envisioning 90 5.3.1 Initiating an Iteration 0 at the Beginning 91 5.3.2 Thinking Iterations 91 5.3.3 Tasks in Product Backlog or Infrastructure Backlog 93 5.3.4 Reflections on Infrastructure Envisioning 94 5.4 Infrastructure Refactoring 94 5.4.1 Iteration Planning or Iteration 0 96 5.4.2 Thinking in Iterations 96 5.4.3 Tasks in Product Backlog or Infrastructure Backlog 97 5.4.4 Reflections on Infrastructure Refactoring 98 5.5 Owning on Premises or Renting in the Clouds 99 5.5.1 Renting in the Clouds 100 5.5.2 Owning Server and Renting Space (a.k.a., Co-location as a Service) 102 5.5.3 Owning on Premises 103 5.5.4 Reflections on Premises or in the Clouds 104 6 Approaching the CM Implementation for Agile 105 6.1 CM Envisioning 105 6.1.1 Strategizing for the Whole with Iteration 0 106 6.1.1.1 Owning CM Infrastructure on Premises 107 6.1.1.2 Renting CM Infrastructure in the Clouds 107 6.1.1.3 Sharing through CM Co-op Environments 108 6.1.2 Implementing Incrementally 109 6.1.3 CM in Product Backlog or CM Backlog 110 6.2 CM Refactoring 110 6.2.1 Iteration Planning or Iteration 0 111 6.2.2 Think in Iterations 112 6.2.3 CM in Product Backlog or CM Backlog 112 6.3 Automate, Automate, Automate for Agile 112 6.3.1 Benefits of CM Automation to Agile 114 6.3.2 Chunks, Iterations, and Increments 116 6.3.2.1 Advantages of Smaller Chunks and Increments 116 6.3.2.2 Disadvantages of Smaller Chunks and Increments 117 6.3.3 Location, Location, Location 118 6.3.3.1 Co-location of Team 118 6.3.3.2 Co-location of Infrastructure 120 6.3.3.3 Co-location of Functionality 121 6.3.3.4 CM Considerations for Co-location and Agile 122 7 Adapting CM Practices for Agile 125 7.1 Adapting to Continuous Integration and Build 126 7.1.1 The ‘‘Continuous’’ Cultural Shift 128 7.1.1.1 How ‘‘Continuous’’ Adds Stress and Load to CM 130 7.1.2 Right-Size Branching for Agile 131 7.1.2.1 ABCs of Branching 131 7.1.2.2 Private Workspace 135 7.1.2.3 Factors for an Agile Branching Strategy 138 7.1.2.4 Understanding Codelines 141 7.1.2.5 Branching Scenarios 142 7.1.2.6 Branching Challenges 145 7.1.2.7 Branching Summary 146 7.1.3 Shifting Responsibilities for Merge and Build Activities 147 7.1.4 Effective Merge for Agile 147 7.1.4.1 Merge Challenges 149 7.1.5 Effective Build for Agile 150 7.1.5.1 Build Levels 150 7.1.5.2 Build Automation for Continuous Integration 152 7.1.6 Continuous Testing with Teeth 153 7.1.6.1 Unit Testing 153 7.1.6.2 Smoke Testing 153 7.1.7 Reflections on Continuous Integration and Build 154 7.2 Adapting CM Planning 155 7.2.1 Balancing Agile Values with Organization Needs 155 7.2.2 Getting Started with Iteration 0 156 7.2.3 Evolutionary CM Plan 157 7.2.4 Reusable CM Plan 158 7.2.5 Inherited CM Plan 159 7.2.6 Types of CM Planning Formats 160 7.2.7 Adapting CM Roles and Responsibilities for Agile 164 7.2.7.1 CM as Holistic Part of the Agile Team 165 7.2.7.2 Adjusting CM Responsibilities 166 7.2.8 Reflections on CM Planning for Agile 168 7.3 Adapting to Support Refactoring 168 7.3.1 Reflections on Refactoring 170 7.4 Adapting to Support Pair Programming 170 7.4.1 Reflections on Pair Programming 173 7.5 Adapting to Support Test Driven Development (TDD) 173 7.5.1 Reflections on Test-Driven Development 175 7.6 Adapting to Support Agile Distributed Teams 175 7.6.1 Distributed Analysis for Distributed Teams 175 7.6.2 Code Access Approaches 176 7.6.3 Reflections on Approaching Agile Distributed Teams 180 7.7 Adapting Change Control, Traceability, and Baselines 180 7.7.1 Tracking Requirements or Stories and their Changes 181 7.7.2 Adjusting the Notion of Baseline 182 7.7.2.1 Baseline Considerations for Agile 183 7.7.2.2 Baselines for Agile 183 7.7.3 Approaching Traceability for Agile 185 7.7.3.1 Traceability for the Right Reasons 185 7.7.3.2 Traceability Considerations for Agile 186 7.7.4 Reflections on Change Control, Traceability, and Baselines for Agile 187 7.8 Adapting CM Audit 187 7.8.1 Agile Considerations for Audit 188 7.8.1.1 Trust or Verification 188 7.8.1.2 What Baselines to Audit Against 188 7.8.1.3 Challenges with BEUF Specifications 189 7.8.1.4 Audit after the Third Iteration 189 7.8.2 Approaching Audit for Agile 189 7.8.2.1 Automating Code to Build Baselines 189 7.8.2.2 Move the Process Audit to the Retrospective 190 7.8.2.3 Move the Baseline Audit to the Review 190 7.8.2.4 Giving Cadence to Industry Standards 190 7.8.3 Reflections on CM Audit for Agile 191 7.9 Adapting Problem Management 192 7.9.1 Establishing Problem Management Upfront 192 7.9.2 From Phase to Iteration 192 7.9.3 Problem Management for Pair Programming 193 7.9.4 Problem Management Automation 193 7.9.5 Reflections on Problem Management for Agile 193 7.10 Adapting CM Report and Review 194 7.10.1 Moving CM Report and Review into the Retrospective 194 7.10.2 Adjusting CM Metrics that Help Deliver Value 195 7.10.3 Constructing a Value-Added Metric 195 7.10.3.1 Metric Building Blocks 196 7.10.3.2 Considering the Benefit of the Metric 196 7.10.3.3 Determining Effort to Collect the Metric 197 7.10.3.4 Assessing the Value of the Metric 198 7.10.3.5 Comparing amongst Potential Metrics 199 7.10.3.6 Monitoring of the Metric 199 7.10.4 Waste and Examples of Value-Added CM Metrics 200 7.10.5 Reflections on Adapting CM Report and Review for Agile 202 8 CM Tool as a Strategic Agile Partner 203 8.1 CM Tool Support for Software Development 204 8.2 The Agile Practices that Impact a CM Tool 208 8.2.1 Whole Team 208 8.2.2 Retrospectives 209 8.2.3 Backlog 209 8.2.4 Short Iterations 209 8.2.5 Iteration Review 210 8.2.6 One Piece Flow 210 8.2.7 Continuous Integration (CI) 210 8.2.8 Refactoring 210 8.2.9 Collective Code Ownership 211 8.2.10 Frequent Releases 211 8.2.11 Traceability vs. Variance 211 8.3 Evaluating Your Situation 212 8.3.1 Homegrown Tools 212 8.3.2 Outdated Tools 212 8.4 CM Tool Features that Facilitate Agile Development 213 8.4.1 High Performance 213 8.4.2 Fast Configuration Creation (a.k.a. Branching and Labeling) 213 8.4.3 Native Internet Support 213 8.4.4 Replication for Distributed Team Continuous Integration 214 8.4.5 All Writeable Files 214 8.4.6 Codelines (a.k.a. Streams, Lines of Development) 214 8.4.7 Change Tracking 215 8.4.7.1 Refactoring: Rename, Merge, and Patch Tracking 216 8.4.7.2 Transactions (a.k.a. Change Lists or Change Sets) 216 8.4.7.3 Change Packages 217 8.4.8 Private Branches 218 8.5 Integration with Your Agile Ecosystem 218 8.5.1 Integration with the Agile Project Management Tool 219 8.5.2 Integration with the Continuous Integration and Build Tool 219 8.5.3 Integration with the Test Automation Tool 219 8.5.4 Configuration vs. Customization 220 8.6 Conclusion 220 9 Evaluating Tools Suited for Agile 221 9.1 Looking for Tools out there and in here 221 9.1.1 Using a Vendor Tool Specific for Agile 222 9.1.2 Using a Freeware Tool Specific for Agile 224 9.1.3 Using a Homegrown Tool for Agile 225 9.1.4 Tool Classification Comparison 226 9.2 Levels of Technology Evaluation 226 9.2.1 Research Evaluation 227 9.2.2 Demonstration Evaluation 227 9.2.3 Pilot/Full Evaluation 228 9.2.4 Considerations on Levels 228 9.3 Perform a Technology Evaluation 229 9.3.1 Investigating a CM Tool for Your Needs 230 9.3.1.1 Version Control 230 9.3.1.2 Build Management 231 9.3.1.3 Change Control/Problem Management 231 9.3.1.4 Release Engineering 232 9.3.1.5 The CM Tool (or Tools) for You 232 9.3.2 Investigating Agile Tools 232 9.3.3 Evaluation Process 233 9.3.3.1 Establishing Evaluation Team 234 9.3.3.2 Determining Evaluation Level 235 9.3.3.3 Conducting a Research Evaluation 235 9.3.3.4 Conducting a Demo Evaluation 236 9.3.3.5 Conducting a Pilot/Full Evaluation 237 9.3.3.6 Considering a Request for Proposal (RfP) 238 9.3.3.7 Acquisition Process – Owning or Renting 240 10 Using CM Standards and Frameworks to Support Agile 241 10.1 Importance of CM 242 10.2 Compliance and IT Governance Requirements 242 10.3 Communicating Your Approach to Senior Management 243 10.4 Which Standards Should Be Considered? 245 10.5 Configuration Management Functions that are most Essential 247 10.5.1 Continuous Integration without the Required Version ID 247 10.6 How do Frameworks such as Cobit, ITIL, CMMI, and RUP support Agile? 249 10.6.1 ISACA Cobit 250 10.6.2 itSMF ITIL Framework 250 10.6.3 CMMI and Agile 251 10.6.4 Rational Unified Process (RUP) and Agile Unified Process (AUP) 251 10.7 Achieving Synergy through Harmonization and Tailoring 252 10.7.1 Change Control on Your Standards Tailoring 252 10.7.2 Overcoming Resistance to Change 253 10.8 Conclusion 253 Bibliography 255 Index 259
£23.99
John Wiley & Sons Inc Unauthorised Access
Book SynopsisA guide to planning and performing a physical penetration test on your computer's security. It guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Table of ContentsPreface xi Acknowledgements xv Foreword xvii 1 The Basics of Physical Penetration Testing 1 What Do Penetration Testers Do? 2 Security Testing in the Real World 2 Legal and Procedural Issues 4 Know the Enemy 8 Engaging a Penetration Testing Team 9 Summary 10 2 Planning Your Physical Penetration Tests 11 Building the Operating Team 12 Project Planning and Workflow 15 Codes, Call Signs and Communication 26 Summary 28 3 Executing Tests 29 Common Paradigms for Conducting Tests 30 Conducting Site Exploration 31 Example Tactical Approaches 34 Mechanisms of Physical Security 36 Summary 50 4 An Introduction to Social Engineering Techniques 51 Introduction to Guerilla Psychology 53 Tactical Approaches to Social Engineering 61 Summary 66 5 Lock Picking 67 Lock Picking as a Hobby 68 Introduction to Lock Picking 72 Advanced Techniques 80 Attacking Other Mechanisms 82 Summary 86 6 Information Gathering 89 Dumpster Diving 90 Shoulder Surfing 99 Collecting Photographic Intelligence 102 Finding Information From Public Sources and the Internet 107 Electronic Surveillance 115 Covert Surveillance 117 Summary 119 7 Hacking Wireless Equipment 121 Wireless Networking Concepts 122 Introduction to Wireless Cryptography 125 Cracking Encryption 131 Attacking a Wireless Client 144 Mounting a Bluetooth Attack 150 Summary 153 8 Gathering the Right Equipment 155 The ‘‘Get of Jail Free’’ Card 155 Photography and Surveillance Equipment 157 Computer Equipment 159 Wireless Equipment 160 Global Positioning Systems 165 Lock Picking Tools 167 Forensics Equipment 169 Communications Equipment 170 Scanners 171 Summary 175 9 Tales from the Front Line 177 SCADA Raiders 177 Night Vision 187 Unauthorized Access 197 Summary 204 10 Introducing Security Policy Concepts 207 Physical Security 208 Protectively Marked or Classified GDI Material 213 Protective Markings in the Corporate World 216 Communications Security 218 Staff Background Checks 221 Data Destruction 223 Data Encryption 224 Outsourcing Risks 225 Incident Response Policies 226 Summary 228 11 Counter Intelligence 229 Understanding the Sources of Information Exposure 230 Social Engineering Attacks 235 Protecting Against Electronic Monitoring 239 Securing Refuse 240 Protecting Against Tailgating and Shoulder Surfing 241 Performing Penetration Testing 242 Baseline Physical Security 245 Summary 247 Appendix A: UK Law 249 Computer Misuse Act 249 Human Rights Act 251 Regulation of Investigatory Powers Act 252 Data Protection Act 253 Appendix B: US Law 255 Computer Fraud and Abuse Act 255 Electronic Communications Privacy Act 256 SOX and HIPAA 257 Appendix C: EU Law 261 European Network and Information Security Agency 261 Data Protection Directive 263 Appendix D: Security Clearances 265 Clearance Procedures in the United Kingdom 266 Levels of Clearance in the United Kingdom 266 Levels of Clearance in the United States 268 Appendix E: Security Accreditations 271 Certified Information Systems Security Professional 271 Communication–Electronics Security Group CHECK 272 Global Information Assurance Certification 274 INFOSEC Assessment and Evaluation 275 Index 277
£24.00
John Wiley & Sons Inc Genetic and Evolutionary Computation
Book SynopsisGenetic and Evolutionary Computation: Medical Applications provides an overview of the range of GEC techniques being applied to medicine and healthcare in a context that is relevant not only for existing GEC practitioners but also those from other disciplines, particularly health professionals. There is rapidly increasing interest in applying evolutionary computation to problems in medicine, but to date no text that introduces evolutionary computation in a medical context. By explaining the basic introductory theory, typical application areas and detailed implementation in one coherent volume, this book will appeal to a wide audience from software developers to medical scientists. Centred around a set of nine case studies on the application of GEC to different areas of medicine, the book offers an overview of applications of GEC to medicine, describes applications in which GEC is used to analyse medical images and data sets, derive advanced models, and suggest diagnoses and Table of ContentsAbout the Editors. List of Contributors. 1 Introduction. 2 Evolutionary Computation: A Brief Overview (Stefano Cagnoni and Leonardo Vanneschi). 2.1 Introduction. 2.2 Evolutionary Computation Paradigms. 2.2.1 Genetic Algorithms. 2.2.2 Evolution Strategies. 2.2.3 Evolutionary Programming. 2.2.4 Genetic Programming. 2.2.5 Other Evolutionary Techniques. 2.2.6 Theory of Evolutionary Algorithms. 2.3 Conclusions. 3 A Review of Medical Applications of Genetic and Evolutionary Computation (Stephen L. Smith). 3.1 Medical Imaging and Signal Processing. 3.1.1 Overview. 3.1.2 Image Segmentation. 3.1.3 Image Registration, Reconstruction and Correction. 3.1.4 Other Applications. 3.2 Data Mining Medical Data and Patient Records. 3.3 Clinical Expert Systems and Knowledge-based Systems. 3.4 Modelling and Simulation of Medical Processes. 3.5 Clinical Diagnosis and Therapy. 4 Applications of GEC in Medical Imaging. 4.1 Evolutionary Deformable Models for Medical Image Segmentation: A Genetic Algorithm Approach to Optimizing Learned, Intuitive, and Localized Medial-based Shape Deformation (Chris McIntosh and Ghassan Hamarneh). 4.1.1 Introduction. 4.1.1.1 Statistically Constrained Localized and Intuitive Deformations. 4.1.1.2 Genetic Algorithms. 4.1.2 Methods. 4.1.2.1 Population Representation. 4.1.2.2 Encoding the Weights for GAs. 4.1.2.3 Mutations and Crossovers. 4.1.2.4 Calculating the Fitness of Members of the GA Population. 4.1.3 Results. 4.1.4 Conclusions. 4.2 Feature Selection for the Classification of Microcalcifications in Digital Mammograms using Genetic Algorithms, Sequential Search and Class Separability (Santiago E. Conant-Pablos, Rolando R. Hernández-Cisneros, and Hugo Terashima-Marín). 4.2.1 Introduction. 4.2.2 Methodology. 4.2.2.1 Pre-processing. 4.2.2.2 Detection of Potential Microcalcifications (Signals). 4.2.2.3 Classification of Signals into Microcalcifications. 4.2.2.4 Detection of Microcalcification Clusters. 4.2.2.5 Classification of Microcalcification Clusters into Benign and Malignant. 4.2.3 Experiments and Results. 4.2.3.1 From Pre-processing to Signal Extraction. 4.2.3.2 Classification of Signals into Microcalcifications. 4.2.3.3 Microcalcification Clusters Detection and Classification. 4.2.4 Conclusions and Future Work. 4.3 Hybrid Detection of Features within the Retinal Fundus using a Genetic Algorithm (Vitoantonio Bevilacqua, Lucia Cariello, Simona Cambo, Domenico Daleno, and Giuseppe Mastronardi). 4.3.1 Introduction. 4.3.2 Acquisition and Processing of Retinal Fundus Images. 4.3.2.1 Retinal Image Acquisition. 4.3.2.2 Image Processing. 4.3.3 Previous Work. 4.3.4 Implementation. 4.3.4.1 Vasculature Extraction. 4.3.4.2 A Genetic Algorithm for Edge Extraction. 4.3.4.3 Skeletonization Process. 4.3.4.4 Experimental Results. 5 New Analysis of Medical Data Sets using GEC. 5.1 Analysis and Classification ofMammography Reports using Maximum Variation Sampling (Robert M. Patton, Barbara G. Beckerman, and Thomas E. Potok). 5.1.1 Introduction. 5.1.2 Background. 5.1.3 Related Works. 5.1.4 Maximum Variation Sampling. 5.1.5 Data. 5.1.6 Tests. 5.1.7 Results & Discussion. 5.1.8 Summary. 5.2 An Interactive Search for Rules in Medical Data using Multiobjective Evolutionary Algorithms (Daniela Zaharie, D. Lungeanu, and Flavia Zamfirache). 5.2.1 Medical Data Mining. 5.2.2 Measures for Evaluating the Rules Quality. 5.2.2.1 Accuracy Measures. 5.2.2.2 Comprehensibility Measures. 5.2.2.3 Interestingness Measures. 5.2.3 Evolutionary Approaches in Rules Mining. 5.2.4 An Interactive Multiobjective Evolutionary Algorithm for Rules Mining. 5.2.4.1 Rules Encoding. 5.2.4.2 Reproduction Operators. 5.2.4.3 Selection and Archiving. 5.2.4.4 User Guided Evolutionary Search. 5.2.5 Experiments in Medical Rules Mining. 5.2.5.1 Impact of User Interaction. 5.2.6 Conclusions. 5.3 Genetic Programming for Exploring Medical Data using Visual Spaces (Julio J. Valdés, Alan J. Barton, and Robert Orchard). 5.3.1 Introduction. 5.3.2 Visual Spaces. 5.3.2.1 Visual Space Realization. 5.3.2.2 Visual Space Taxonomy. 5.3.2.3 Visual Space Geometries. 5.3.2.4 Visual Space Interpretation Taxonomy. 5.3.2.5 Visual Space Characteristics Examination. 5.3.2.6 Visual Space Mapping Taxonomy. 5.3.2.7 Visual Space Mapping Computation. 5.3.3 Experimental Settings. 5.3.3.1 Implicit Classical Algorithm Settings. 5.3.3.2 Explicit GEP Algorithm Settings. 5.3.4 Medical Examples. 5.3.4.1 Data Space Examples. 5.3.4.2 Semantic Space Examples. 5.3.5 Future Directions. 6 Advanced Modelling, Diagnosis and Treatment using GEC. 6.1 Objective Assessment of Visuo-spatial Ability using Implicit Context Representation Cartesian Genetic Programming (Michael A. Lones and Stephen L. Smith). 6.1.1 Introduction. 6.1.2 Evaluation of Visuo-spatial Ability. 6.1.3 Implicit Context Representation CGP. 6.1.4 Methodology. 6.1.4.1 Data Collection. 6.1.4.2 Evaluation. 6.1.4.3 Parameter Settings. 6.1.5 Results. 6.1.6 Conclusions. 6.2 Towards an Alternative to Magnetic Resonance Imaging for Vocal Tract Shape Measurement using the Principles of Evolution (David M. Howard, Andy M. Tyrrell, and Crispin Cooper). 6.2.1 Introduction. 6.2.2 Oral Tract Shape Evolution. 6.2.3 Recording the Target Vowels. 6.2.4 Evolving Oral Tract Shapes. 6.2.5 Results. 6.2.5.1 Oral Tract Areas. 6.2.5.2 Spectral Comparisons. 6.2.6 Conclusions. 6.3 How Genetic Algorithms can Improve Pacemaker Efficiency (Laurent Dumas and Linda El Alaoui). 6.3.1 Introduction. 6.3.2 Modeling of the Electrical Activity of the Heart. 6.3.3 The Optimization Principles. 6.3.3.1 The Cost Function. 6.3.3.2 The Optimization Algorithm. 6.3.3.3 A New Genetic Algorithm with a Surrogate Model. 6.3.3.4 Results of AGA on Test Functions. 6.3.4 A Simplified Test Case for a Pacemaker Optimization. 6.3.4.1 Description of the Test Case. 6.3.4.2 Numerical Results. 6.3.5 Conclusion. 7 The Future for Genetic and Evolutionary Computation in Medicine: Opportunities, Challenges and Rewards. 7.1 Opportunities. 7.2 Challenges. 7.3 Rewards. 7.4 The Future for Genetic and Evolutionary Computation in Medicine. Appendix: Introductory Books and Useful Links. Index.
£100.65
John Wiley & Sons Inc The Handbook of MPEG Applications
Book SynopsisThis book provides comprehensive, up-to-date coverage of the key MPEG standards used in the evolving digital multimedia landscape for the generation, storage, distribution, dissemination, and delivery of multimedia data to various platforms.Trade Review"The book will interest researchers, design engineers, developers, IT consultants, telecom system developers, and computer science and engineering students." (Booknews, 1 April 2011) "This book provides a comprehensive examination of the use of MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A standards, providing a detailed reference to their application." (TMCnet.com, 15 March 2011)Table of ContentsList of Contributors. MPEG Standards in Practice. 1 HD Video Remote Collaboration Application (Beomjoo Seo, Xiaomin Liu, and Roger Zimmermann). 1.1 Introduction. 1.2 Design and Architecture. 1.3 HD Video Acquisition. 1.4 Network and Topology Considerations. 1.5 Real-Time Transcoding. 1.6 HD Video Rendering. 1.7 Other Challenges. 1.8 Other HD Streaming Systems. 1.9 Conclusions and Future Directions. References. 2 MPEG Standards in Media Production, Broadcasting and Content Management (Andreas U. Mauthe and Peter Thoma). 2.1 Introduction. 2.2 Content in the Context of Production and Management. 2.3 MPEG Encoding Standards in CMS and Media Production. 2.4 MPEG-7 and Beyond. 2.5 Conclusions. References. 3 Quality Assessment of MPEG-4 Compressed Videos (Anush K. Moorthy and Alan C. Bovik). 3.1 Introduction. 3.2 Previous Work. 3.3 Quality Assessment of MPEG-4 Compressed Video. 3.4 MPEG-4 Compressed Videos in Wireless Environments. 3.5 Conclusion. References. 4 Exploiting MPEG-4 Capabilities for Personalized Advertising in Digital TV (Martín López-Nores, Yolanda Blanco-Fernández, Alberto Gil-Solla, Manuel Ramos-Cabrer, and José J. Pazos-Arias). 4.1 Introduction. 4.2 Related Work. 4.3 Enabling the New Advertising Model. 4.4 An Example. 4.5 Experimental Evaluation. 4.6 Conclusions. Acknowledgments. References. 5 Using MPEG Tools in Video Summarization (Luis Herranz and José M. Martínez). 5.1 Introduction. 5.2 Related Work. 5.3 A Summarization Framework Using MPEG Standards. 5.4 Generation of Summaries Using MPEG-4 AVC. 5.5 Description of Summaries in MPEG-7. 5.6 Integrated Summarization and Adaptation Framework in MPEG-4 SVC. 5.7 Experimental Evaluation. 5.8 Conclusions. References. 6 Encryption Techniques for H.264 Video (Bai-Ying Lei, Kwok-Tung Lo, and Jian Feng). 6.1 Introduction. 6.2 Demands for Video Security. 6.3 Issues on Digital Video Encryption. 6.4 Previous Work on Video Encryption. 6.5 H.264 Video Encryption Techniques. 6.6 A H.264 Encryption Scheme Based on CABAC and Chaotic Stream Cipher. 6.7 Concluding Remarks and Future Works. Acknowledgments. References. 7 Optimization Methods for H.264/AVC Video Coding (Dan Grois, Evgeny Kaminsky, and Ofer Hadar). 7.1 Introduction to Video Coding Optimization Methods. 7.2 Rate Control Optimization. 7.3 Computational Complexity Control Optimization. 7.4 Joint Computational Complexity and Rate Control Optimization. 7.5 Transform Coding Optimization. 7.6 Summary. References. 8 Spatiotemporal H.264/AVC Video Adaptation with MPEG-21 (Razib Iqbal and Shervin Shirmohammadi). 8.1 Introduction. 8.2 Background. 8.3 Literature Review. 8.4 Compressed-Domain Adaptation of H.264/AVC Video. 8.5 On-line Video Adaptation for P2P Overlays. 8.6 Quality of Experience (QoE). 8.7 Conclusion. References. 9 Image Clustering and Retrieval Using MPEG-7 (Rajeev Agrawal, William I. Grosky, and Farshad Fotouhi). 9.1 Introduction. 9.2 Usage of MPEG-7 in Image Clustering and Retrieval. 9.3 Multimodal Vector Representation of an Image Using MPEG-7 Color Descriptors. 9.4 Dimensionality Reduction of Multimodal Vector Representation Using a Nonlinear Diffusion Kernel. 9.5 Experiments. 9.6 Conclusion. References. 10 MPEG-7 Visual Descriptors and Discriminant Analysis (Jun Zhang, Lei Ye, and Jianhua Ma). 10.1 Introduction. 10.2 Literature Review. 10.3 Discriminant Power of Single Visual Descriptor. 10.4 Discriminant Power of the Aggregated Visual Descriptors. 10.5 Conclusions. References. 11 An MPEG-7 Profile for Collaborative Multimedia Annotation (Damon Daylamani Zad and Harry Agius). 11.1 Introduction. 11.2 MPEG-7 as a Means for Collaborative Multimedia Annotation. 11.3 Experiment Design. 11.4 Research Method. 11.5 Results. 11.6 MPEG-7 Profile. 11.7 Related Research Work. 11.8 Concluding Discussion. Acknowledgment. References. 12 Domain Knowledge Representation in Semantic MPEG-7 Descriptions (Chrisa Tsinaraki and Stavros Christodoulakis). 12.1 Introduction. 12.2 MPEG-7-Based Domain Knowledge Representation. 12.3 Domain Ontology Representation. 12.4 Property Representation. 12.5 Class Representation. 12.6 Representation of Individuals. 12.7 Representation of Axioms. 12.8 Exploitation of the Domain Knowledge Representation in Multimedia Applications and Services. 12.9 Conclusions. References. 13 Survey of MPEG-7 Applications in the Multimedia Lifecycle (Florian Stegmaier, Mario Döller, and Harald Kosch). 13.1 MPEG-7 Annotation Tools. 13.2 MPEG-7 Databases and Retrieval. 13.3 MPEG-7 Query Language. 13.4 MPEG-7 Middleware. 13.5 MPEG-7 Mobile. 13.6 Summarization and Outlook. References. 14 Using MPEG Standards for Content-Based Indexing of Broadcast Television, Web, and Enterprise Content (David Gibbon, Zhu Liu, Andrea Basso, and Behzad Shahraray.). 14.1 Background on Content-Based Indexing and Retrieval. 14.2 MPEG-7 and MPEG-21 in ETSI TV-Anytime. 14.3 MPEG-7 and MPEG-21 in ATIS IPTV Specifications. 14.4 MEPG-21 in the Digital Living Network Alliance (DLNA). 14.5 Content Analysis for MPEG-7 Metadata Generation. 14.6 Representing Content Analysis Results Using MPEG-7. 14.7 Extraction of Audio Features and Representation in MPEG-7. 14.8 Summary. References. 15 MPEG-7/21: Structured Metadata for Handling and Personalizing Multimedia Content (Benjamin Köhncke and Wolf-Tilo Balke). 15.1 Introduction. 15.2 The Digital Item Adaptation Framework for Personalization. 15.3 Use Case Scenario. 15.4 Extensions of MPEG-7/21 Preference Management. 15.5 Example Application. 15.6 Summary. References. 16 A Game Approach to Integrating MPEG-7 in MPEG-21 for Dynamic Bandwidth Dealing (Anastasis A. Sofokleous and Marios C. Angelides). 16.1 Introduction. 16.2 Related Work. 16.3 Dealing Bandwidth Using Game Theory. 16.4 An Application Example. 16.5 Concluding Discussion. References. 17 The Usage of MPEG-21 Digital Items in Research and Practice (Hermann Hellwagner and Christian Timmerer). 17.1 Introduction. 17.2 Overview of the Usage of MPEG-21 Digital Items. 17.3 Universal Plug and Play (UPnP): DIDL-Lite. 17.4 Microsoft's Interactive Media Manager (IMM). 17.5 The DANAE Advanced MPEG-21 Infrastructure. 17.6 MPEG-21 in the European Projects ENTHRONE and AXMEDIS. 17.7 Information Asset Management in a Digital Library. 17.8 Conclusions. References. 18 Distributing Sensitive Information in the MPEG-21 Multimedia Framework (Nicholas Paul Sheppard). 18.1 Introduction. 18.2 Digital Rights Management in MPEG-21. 18.3 MPEG-21 in Copyright Protection. 18.4 MPEG-21 in Enterprise Digital Rights Management. 18.5 MPEG-21 in Privacy Protection. 18.6 Conclusion. Acknowledgments. References. 19 Designing Intelligent Content Delivery Frameworks Using MPEG-21 (Samir Amir, Ioan Marius Bilasco, Thierry Urruty, Jean Martinet and Chabane Djeraba). 19.1 Introduction. 19.2 CAM Metadata Framework Requirements. 19.3 CAM Metadata Model. 19.4 Study of the Existing Multimedia Standards. 19.5 CAM Metadata Encoding Using MPEG-21/7. 19.6 Discussion. 19.7 Conclusion and Perspectives. References. 20 NinSuna: a Platform for Format-Independent Media Resource Adaptation and Delivery (Davy Van Deursen, Wim Van Lancker, Chris Poppe, and Rik Van de Walle). 20.1 Introduction. 20.2 Model-Driven Content Adaptation and Packaging. 20.3 The NinSuna Platform. 20.4 Directions for Future Research. 20.5 Discussion and Conclusions. Acknowledgments. References. 21 MPEG-A and Its Open Access Application Format (Florian Schreiner and Klaus Diepold). 21.1 Introduction. 21.2 The MPEG-A Standards. 21.3 The Open Access Application Format. References. Index.
£88.16
John Wiley & Sons Australia Ltd Information Systems A Business Approach 3e
Book Synopsis
£37.79
John Wiley & Sons Inc Information Systems A Business Approach 3e
Book SynopsisInformation Systems: A Business Approach 3rd edition is a new, expanded edition of this well-regarded Australian text for students studying information systems with an integrated approach. The text focuses on the strategic, tactical and operational uses of information technology in business.Table of ContentsChapter 1: Setting the scene Chapter 2: Business information systems Chapter 3 Business software Chapter 4: Communication and networks Chapter 5: Systems integration information systems at work Chapter 6: Introduction to systems development Chapter 7: Strategic information systems management Chapter 8: Managing the information systems function Chapter 9: E-business Chapter 10: Web commerce development Chapter 11: Information Systems Infrastructure Chapter 12: Personal productivity with information systems
£85.50
John Wiley & Sons Inc Compressed Video Communications
Book SynopsisThe compression schemes applied for the storage and transmission of digital video data leave content sensitive to transmission errors, information loss and quality degradation. Recent developments in error resilience techniques allow improved quality of service of video communication over a range of network platforms. Digital video communications, supported by the Internet, ATM networks and Broadband ISDN, have undergone significant development over the past few years. Emerging applications include videoconferencing, tele-medicine and distance learning. This leading edge text addresses the problems associated with the delivery and design of video communication services. * Presents a comprehensive overview of the principles and techniques employed in the improvement of the performance of video codecs in error prone environments * Provides a performance evaluation and comparison of video coding standards, MPEG-4, H.261 and H.263 * Outlines methods of video communication oTrade Review"...offers an overview of the basic technologies and applications of digital video compression." (SciTech Book News, Vol. 26, No. 2, June 2002)Table of ContentsPreface. Acknowledgements. About the Author. Introduction. Overview of Digital Video Compression Algorithms. Flow Control in Compressed Video Communications. Error Resilience in Compressed Video Communications. Video Communications Over Mobile IP Networks. Video Transcoding for Inter-network Communications. Appendix A: Layering syntax of ITU-T H.263 Video Coding Standard. Appendix B: Description of the Video Clips on the Supplementary CD. Glossary of Terms. Index.
£100.76
John Wiley & Sons Inc Data Acquisition and Signal Processing for Smart
Book SynopsisFrom simple thermistors to intelligent silicon microdevices with powerful capabilities to communicate information across networks, sensors play an important role in such diverse fields as biomedical and chemical engineering to wireless communications.Trade Review"...this book provides a good basis for anyone entering or studying the field of smart sensors...not only...for the inexperienced...but also...very useful to those with some experience." (IEEE Instrumentation & Measurement Magazine, December 2002)Table of ContentsPreface. List of Abbreviations and Symbols. Introduction. Smart Sensors for Electrical and Non-Electrical, Physical and Chemical Variables: Tendencies and Perspectives. Converters for Different Variables to Frequency-Time Parameters of the Electric Signal. Data Acquisition Methods for Multichannel Sensor Systems. Methods of Frequency-to-Code Conversion. Advanced and Self-Adapting Methods of Frequency-to-Code Conversion. Signal Processing in Quasi-Digital Smart Sensors. Digital Output Smart Sensors with Software-Controlled Performances and Functional Capabilities. Multichannel Intelligent and Virtual Sensor Systems. Smart Sensor Design at Software Level. Smart Sensor Buses and Interface Circuits. Future Directions. References. Appendix A: What is on the Sensors Web Portal? Glossary. Index.
£144.85
John Wiley & Sons Inc Server Component Patterns Component
Book SynopsisA detailed exploration of the basic patterns underlying todaya s component infrastructures. The latest addition to this best--selling series opens by providing an "Alexandrian--style" pattern language covering the patterns underlying EJB, COM+ and CCM.Table of ContentsPreface. Foreword by Frank Buschmann. Foreword by Clemens Szyperski. Foundations. Part I: A Server Component Patterns Language. Core Infrastructure Elements. Component Implementation Building Blocks. Container Implementation Basics. A Component and its Environment. Identifying and Managing Instances. Remote Access to Components. More Container Implementation. Component Deployment. Part II: The Patterns Illustrated with EJB. EJB Core Infrastructure Elements. EJB Component Implementation Building Blocks. EJB Container Implementation Basics. A Bean and its Environment. Identifying and Managing Bean Instances. Remote Access to Beans. More EJB Container Implementation. Bean Deployment. Part III: A Story. Literature and Online Resources. Glossary. Index.
£30.40
John Wiley & Sons Inc GSM UMTS The Creation of Global Mobile
Book SynopsisThis text provides a technical history of the development of GSM (Global System for Mobile Communication) standards and the early evolution of UMTS (Univerisal Mobile Telecommunicaitons System). It presents background information and descriptions of the technical features of the GSM standards.Trade Review"a useful source of reference" (World Surface Coatings Abstracts, January 2002) "The author has done GSM industry a great service with this book-without it in twenty years time no one would remember anything about the early days of GSM." (GSM Daily)Table of ContentsGSM's Achievements (Friedhelm Hillebrand). The Agreement on the Concepts and the Basic Parameter of the GSM Standard (Mid-1982 to Mid-1987) (Thomas Haug, Philippe Dupuis and Stephen Temple). The Detailed Specification Work Leading to the GSM Phase 1 Standard used for the Opening of Service (1987-1991) (Thomas Haug). Consolidating GSM Phase 1 and Evolving the Services and System Features to GSM Phase 2 in ETSI SMG (1992-1995) (Philippe Dupuis). Evolving the Services and System features to Generation 2.5 by the GSM Phase 2+ Program (1993-2000) (Phillipe Dupuis, Friedhelm Hillebrand and Ansgar Bergmann). GSM Goes to North America (Don Zelmer). The UMTS Related Work of the European Commsiions, UMTS Taskforce, UMTS Forum and GSM Association (Joao da Silva, Ruprecht Niepold, Bosco Fernandez, Thomas Beijer and Josef Huber). The UMTS Standardisation Work in ETSI (Philippe Dupuis and Friedhelm Hillebrand). The Third Generation Partnership Project (3GPP) (Karl Heinz Rosenbrock and Niels P.S. Andersen). Services and Services' Capabilities (Friedhelm Hillebrand and Alan Cox). System Architecture Evolution (Michel Mouly). Radio Aspects (Didier Verhulst and Michael Färber). The Subscriber Identity Module: Past, Present anf Future (Klaus Vedder). Voice Codes (Kari Järvinen). Security Aspects (Mike Walker and Timothy Wright). Short Message and Data Service (Friedhelm Hillebrand, Kevin Holley, Wolfgang Roth and Jürgen Baumann). Mobile Stations Type Appproval (Remi Thomas and David Barnes). Operations and Maintenance (Gisela Hertel). Professional Technical Support and its Evolution (Bernard Mallinder, Ansgar Bergmann and Adrian Scrase). Working Methods and their Evolution (Ansgar Bergmann). The Contributions of the GSM Association (Renzo Failli, George Schmitt, Arne Foxman, Petter Bliksrud, Armin Toepfer, Michael Giessler and Neil Lilly). GSM and UMTS Acceptance in the World (Friedhelm Hillebrand and Bernd Eylert). GSM Success Factors (Friedhelm Hillebrand). Appendices. Index. List of Authors.
£190.76
John Wiley & Sons Inc healthmonitoringaerospacestructures
Book SynopsisMaintenance and continuous health monitoring of air, land and sea structures is one of the most important concerns in a wide range of industries including transportation and civil engineering. Effective maintenance minimises not only the cost of ownership of structures but also improves safety and the perception of safety.Trade Review"...very relevant and timely...strongly recommend this multidisciplinary book...an integrated volume of real value..." (Measurement and Control, Vol 37(5), June 2004)Table of ContentsList of Contributors. Preface. 1. Introduction (G. Bartelds, J.H. Heida, J. McFeat and C. Boller). 1.1 Health and Usage Monitoring in Aircraft Structures – Why and How? 1.2 Smart Solution in Aircraft Monitoring. 1.3 End-User Requirements. 1.3.1 Damage Detection. 1.3.2 Load History Monitoring. 1.4 Assessment of Monitoring Technologies. 1.5 Background of Technology Qualification Process. 1.6 Technology Qualification. 1.6.1 Philosophy. 1.6.2 Performance and Operating Requirements. 1.6.3 Qualification Evidence – Requirements and Provision. 1.6.4 Risks. 1.7 Flight Vehicle Certification. 1.8 Summary. References. 2. Aircraft Structural Health and Usage Monitoring (C. Boller and W.J. Staszewski). 2.1 Introduction. 2.2 Aircraft Structural Damage. 2.3 Ageing Aircraft Problem. 2.4 LifeCycle Cost of Aerospace Structures. 2.4.1 Background. 2.4.2 Example. 2.5 Aircraft Structural Design. 2.5.1 Background. 2.5.2 Aircraft Design Process. 2.6 Damage Monitoring Systems in Aircraft. 2.6.1 Loads Monitoring. 2.6.2 Fatigue Monitoring. 2.6.3 Load Models. 2.6.4 Disadvantages of Current Loads Monitoring Systems. 2.6.5 Damage Monitoring and Inspections. 2.7 Non-Destructive Testing. 2.7.1 Visual Inspection. 2.7.2 Ultrasonic Inspection. 2.7.3 Eddy Current. 2.7.4 Acoustic Emission. 2.7.5 Radiography, Thermography and Shearography. 2.7.6 Summary. 2.8 Structural Health Monitoring. 2.8.1 Vibration and Modal Analysis. 2.8.2 Impact Damage Detection. 2.9 Emerging Monitoring Techniques and Sensor Technologies. 2.9.1 Smart Structures and Materials. 2.9.2 Damage Detection Techniques. 2.9.3 Sensor Technologies. 2.9.4 Intelligent Signal Processing. 2.10 Conclusions. References. 3. Operational Load Monitoring Using Optical Fibre Sensors (P. Foote, M. Breidne, K. Levin, P. Papadopolous, I. Read, M. Signorazzi, L.K. Nilsson, R. Stubbe and A. Claesson). 3.1 Introduction. 3.2 Fibre Optics. 3.2.1 Optical Fibres. 3.2.2 Optical Fibre Sensors. 3.2.3 Fibre Bragg Grating Sensors. 3.3 Sensor Target Specifications. 3.4 Reliability of Fibre Bragg Grating Sensors. 3.4.1 Fibre Strength Degradation. 3.4.2 Grating Decay. 3.4.3 Summary. 3.5 Fibre Coating Technology. 3.5.1 Polyimide Chemistry and Processing. 3.5.2 Polyimide Adhesion to Silica. 3.5.3 Silane Adhesion Promoters. 3.5.4 Experimental Example. 3.5.5 Summary. 3.6 Example of Surface Mounted Operational Load Monitoring Sensor System. 3.6.1 Sensors. 3.6.2 Optical Signal Processor. 3.6.3 Optical Interconnections. 3.7 Optical Fibre Strain Rosette. 3.8 Example of Embedded Optical Impact Detection System. 3.9 Summary. References. 4. Damage Detection Using Stress and Ultrasonic Waves (W.J. Staszewski, C. Boller, S. Grondel, C. Biemans, E. O’Brien, C. Delebarre and G.R. Tomlinson). 4.1 Introduction. 4.2 Acoustic Emission. 4.2.1 Background. 4.2.2 Transducers. 4.2.3 Signal Processing. 4.2.4 Testing and Calibration. 4.3 Ultrasonics. 4.3.1 Background. 4.3.2 Inspection Modes. 4.3.3 Transducers. 4.3.4 Display Modes. 4.4 Acousto-Ultrasonics. 4.5 Guided Wave Ultrasonics. 4.5.1 Background. 4.5.2 Guided Waves. 4.5.3 Lamb Waves. 4.5.4 Monitoring Strategy. 4.6 Piezoelectric Transducers. 4.6.1 Piezoelectricity and Piezoelectric Materials. 4.6.2 Constitutive Equations. 4.6.3 Properties. 4.7 Passive Damage Detection Examples. 4.7.1 Crack Monitoring Using Acoustic Emission. 4.7.2 Impact Damage Detection in Composite Materials. 4.8 Active Damage Detection Examples. 4.8.1 Crack Monitoring in Metallic Structures Using Broadband Acousto-Ultrasonics. 4.8.2 Impact Damage Detection in Composite Structures Using Lamb Waves. 4.9 Summary. References. 5. Signal Processing for Damage Detection (W.J. Staszewski and K. Worden). 5.1 Introduction. 5.2 Data Pre-Processing. 5.2.1 Signal Smoothing. 5.2.2 Signal Smoothing Filters. 5.3 Signal Features for Damage Identification. 5.3.1 Feature Extraction. 5.3.2 Feature Selection. 5.4 Time–Domain Analysis. 5.5 Spectral Analysis. 5.6 Instantaneous Phase and Frequency. 5.7 Time–Frequency Analysis. 5.8 Wavelet Analysis. 5.8.1 Continuous Wavelet Transform. 5.8.2 Discrete Wavelet Transform. 5.9 Dimensionality Reduction Using Linear and Nonlinear Transformation. 5.9.1 Principal Component Analysis. 5.9.2 Sammon Mapping. 5.10 Data Compression Using Wavelets. 5.11 Wavelet-Based Denoising. 5.12 Pattern Recognition for Damage Identification. 5.13 Artificial Neural Networks. 5.13.1 Parallel Processing Paradigm. 5.13.2 The Artificial Neuron. 5.13.3 Multi-Layer Networks. 5.13.4 Multi-Layer Perceptron Neural Networks and Others. 5.13.5 Applications. 5.14 Impact Detection in Structures Using Pattern Recognition. 5.14.1 Detection of Impact Positions. 5.14.2 Detection of Impact Energy. 5.15 Data Fusion. 5.16 Optimised Sensor Distributions. 5.16.1 Informativeness of Sensors. 5.16.2 Optimal Sensor Location. 5.17 Sensor Validation. 5.18 Conclusions. References. 6. Structural Health Monitoring Evaluation Tests (P.A. Lloyd, R. Pressland, J. McFeat, I. Read, P. Foote, J.P. Dupuis, E. O’Brien, L. Reithler, S. Grondel, C. Delebarre, K. Levin, C. Boller, C. Biemans and W.J. Staszewski). 6.1 Introduction. 6.2 Large-Scale Metallic Evaluator. 6.2.1 Lamb Wave Results from Riveted Metallic Specimens. 6.2.2 Acoustic Emission Results from a Full-Scale Fatigue Test. 6.3 Large-Scale Composite Evaluator. 6.3.1 Test Article. 6.3.2 Sensor and Specimen Integration. 6.3.3 Impact Tests. 6.3.4 Damage Detection Results – Distributed Optical Fibre Sensors. 6.3.5 Damage Detection Results – Bragg Grating Sensors. 6.3.6 Lamb Wave Damage Detection System. 6.4 Flight Tests. 6.4.1 Flying Test-Bed. 6.4.2 Acoustic Emission Optical Damage Detection System. 6.4.3 Bragg Grating Optical Load Measurement System. 6.4.4 Fibre Optic Load Measurement Rosette System. 6.5 Summary. References. Index.
£100.76
John Wiley & Sons Inc Geosimulation Automatabased Modeling of Urban
Book SynopsisGeosimulation is hailed as 'the next big thing' in geographic modelling for urban studies. This book presents readers with an overview of field by introducing the spatial modelling environment and describing the research and development using cellular automata and multi agent systems. It also covers urban geosimulation.Table of ContentsPreface. Acknowledgements. Foreword. 1. Introduction to urban Geosimulation. 1.1 A new wave of urban geographic models is coming. 1.2 Defining urban Geosimulation. 1.3 Automata as a basis of Geosimulation. 1.4 High-resolution GIS as a driving force of Geosimulation. 1.5 The origins of support for Geosimulation. 1.6 Geosimulation of complex adaptive systems. 1.7 Book layout. 2. Formalizing Geosimulation with Geographic Automata Systems (GAS). 2.1 Cellular Automata and Multi-Agent Systems – Unite! 2.2 Geographic Automata Systems (GAS). 2.3 GAS as a tool for modelling Complex Adaptive Systems. 2.4 From Gas to software environment for urban modelling. 2.5 Object Based Environment for Urban Simulation (OBEUS) – a minimal implementation of GAS. 2.6 Universality of GAS. 2.7 Verifying GAS models. 3. System Theory, Geography, and Urban Modelling. 3.1 The basic notions of system theory. 3.2 The 1960s, geography meets system theory. 3.3 ‘Stocks and flows’ urban modelling. 3.4 Critics of comprehensive modelling. 3.5 What next? Geosimulation of collective dynamics! 4. Modelling urban land usage with cellular automata. 4.1 Introduction. 4.2 Cellular Automata as a framework for modelling complex spatial systems. 4.3 Urban Cellular Automata. 4.4 From Markov models to urban Cellular Automata. 4.5 Integration of the CA and Markov approaches at a regional level. 4.6 Conclusions. 5. Modelling Urban Dynamics with Multi-Agent Systems. 5.1 Introduction. 5.2 MAS as a tool for modelling complex human-driven systems. 5.3 Interpreting agency. 5.4 Urban agents, urban agency, and multi-agent cities. 5.5 Agent behaviour in urban environments. 5.6 General models of agents’ collectives in urban interpretation. 5.7 Abstract MAS models of urban phenomena. 5.8 Real-world agent-based simulations of urban phenomena. 5.9 MAS models as planning and assessment tools. 5.10 Conclusions. 6. Finale: Epistemology of Geosimulation. 6.1 Universal questions. 6.2 The future of Geosimulation. Bibliography. Index.
£75.56
Wiley Error Control Coding From Theory to Practice
Book SynopsisThis book demonstrates the role of coding in communication and data storage systems design, illustrating the correct use of codes and the selection of the right code parameters. Relevant decoding techniques and their implementation are discussed in detail, while emphasizing the fundamental concepts of coding theory with minimal mathematical tools.Table of ContentsThe Principles of Coding in Digital Communications. Convolutional Codes. Linear Block Codes. Cyclic Codes. Finite Field Arithmetic. BCH Codes. Reed Solomon Codes. Performance Calculations for Block Codes. Multistage Coding. Iterative Decoding. Index.
£53.96
John Wiley & Sons Inc LDAP Directories Building an Enterprise Directory
Book SynopsisProvides an introduction to the Lightweight Directory Access Protocol (LDAP) technology. This book offers a detailed overview of the real world applications of the technology. It offers an explanation of the technical details of LDAP and a step-by-step demonstration of how to implement an LDAP directory.Table of ContentsIntroduction. What is the Aim of this Book? Structure of the Book. For Whom is this Book Intended? FAQs. Acknowledgements. PART 1: DIRECTORIES AND THEIR APPLICATIONS. 1. Directories Overview. 2. The History of Directories and an Introduction to LDAP. 3. LDAP Directories and Their Applications. PART 2: THE LDAP STANDARD. 4. LDAP Standard and its Client-Server Model. 5. The LDAP Models. 6. LDAP Interfaces and the Future of the Standard. PART 3: THE DESIGN PHASE. 7. Functional Design. 8. Technical Design. 9. LDAP Tools and Applications. 10. Case Studies. 11. The Life Cycle of a Corporate Directory. PART 4: EXAMPLES OF CODE. 12. Examples of Code in C and C++. 13. Examples of ADSI Implementation. Index.
£30.00
John Wiley & Sons Inc ObjectOriented Programming in C
Book SynopsisC++ is established as the leading industry programming language for object-oriented software development. This book provides a step-by-step approach to all language features, explains their practical usage, provides intuitive examples that are not too complex or easy, and provides advice for implementing classes and libraries to develop programs.Trade Review"...technically solid, excellent introduction to C++..." (Cvu, December 2002)Table of ContentsPreface. 1. About this Book. Why Did Write this Book? Prerequisites. Organization of the Book. How Should You Read this Book? Example Code and Additional Informations. Feedback. 2. Introduction: C++ and Object-Oriented Programming. The C++ Language. C++ as an Object-Oriented Programming Language. Other Concepts of C++. Teminology. 3. Basic Concepts of C++ Programs. The First Program. Types, Operators, and Control Constructs. Functions and Modules. Strings. Collections. Exception Handling. Pointers, Arrays, and C-Strings. Memory Management Using new and delete. Communication with the Outside World. 4. Class Programming. The First Class: Fraction. Operators for Classes. Running Time and Code Optimization. References and Constants. Input and Output Using Streams. Friends and Other Types. Exception Handling for Classes. 5. Inheritance and Polymorphism. Virtual Functions. Polymorphism. Multiple Inheritance. Design Pitfalls with Inheritance. 6. Dynamic and Static Members. Dynamic Members. Other Aspects of Dynamic Members. Inheritance of Classes with Dynamic Members. Classes Containing Classes. Static Members and Auxiliary Types. 7. Templates. Why Templates? Function Templates. Class Templates. Non-Type Template Parameters. Additional Aspects of Templates. Templates in Practice. 8. The Standard I/O Library in Detail. The Standard Stream Classes. File Access. Stream Classes for Strings. 9. Other Language Features and Details. Additional Details of the Standard Library. Defining Special Operators. Additional Aspects of new and delete. Function Pointers and Member Pointers. Combining C++ with C Code. Additional Keywords. 10. Summary. Hierarchy of C++ Operators. Class-Specific Properties of Operations. Rules for Automatic Type Conversion. Useful Programming Guidelines and Conventions. Bibliography. Glossary. Index.
£53.06
John Wiley & Sons Inc Mathematical Models for Speech Technology
Book SynopsisPresents the motivations for, intuitions behind, and basic mathematical models of natural spoken language communication. This book offers an overview of various aspects of the problem from the physics of speech production through the hierarchy of linguistic structure and ending with some observations on language and mind.Trade Review"...a succinct presentation of the most important mathematical technology of speech technology and the author's ideas for overcoming the limitations of these techniques…" (Mathematical Reviews, 2005j)Table of ContentsAuthor's preface. 1 Introduction 2 Preliminaries 2.1 The physics of speech production 2.2 The source-filter model 2.3 Information-bearing features of the speech signal 2.4 Time-frequency representations 2.5 Classifications of acoustic patterns in speech 2.6 Temporal invariance and stationarity 2.7 Taxonomy of linguistic structure 3 Mathematical models of linguistic structure 3.1 Probabilistic functions of a discrete Markov process 3.2 Formal grammars and abstract automata 4 Syntactic analysis 4.1 Deterministic parsing algorithms 4.2 Probabilistic parsing algorithms 4.3 Parsing natural language 5 Grammatical inference 5.1 Exact inference and Gold's theorem 5.2 Baum's algorithm for regular grammars 5.3 Event counting in parse trees 5.4 Baker's algorithm for context-free grammars 6 Information-theoretic analysis of speech communication 6.1 The Miller et al. experiments 6.2 Entropy of an information source 6.3 Recognition error rates and entropy 7 Automatic speech recognition and constructive theories of language 7.1 Integrated architectures 7.2 Modular architectures 7.3 Parameter estimation from fluent speech 7.4 System performance 7.5 Other speech technologies 8 Automatic speech understanding and semantics 8.1 Transcription and comprehension 8.2 Limited domain semantics 8.3 The semantics of natural language 8.4 System architectures 8.5 Human and machine performance 9 Theories of mind and language 9.1 The challenge of automatic natural language understanding 9.2 Metaphors for mind 9.3 The artificial intelligence program 10 A speculation on the prospects for a science of the mind 10.1 The parable of the thermos bottle: measurements and symbols 10.2 The four questions of science 10.3 A constructive theory of the mind 10.4 The problem of consciousness 10.5 The role of sensorimotor function, associative memory and reinforcement learning in automatic acquisition of spoken language by an autonomous robot 10.6 Final thoughts: predicting the course of discovery
£104.74
John Wiley & Sons Inc IP Over WDM Electrical Electronics Engr
Book SynopsisFocusing on IP over WDM optical networks, this book summarizes the fundamental mechanisms and the development and deployment of WDM optical networks. It provides information on both the network and the software architectures needed to implement WDM enabled optical networks designed to transport IP traffic.Trade Review"Network engineering and planners...will be interested in this book.... Developers and architects...will also find the book useful." (Journal of Optical Networking, Vol. 2, No. 4, April 2003)Table of ContentsPreface. Acknowledgements. Introduction. Review. Characteristics of the Internet and IP Routing. WDM Optical Networks. IP over WDM. IP/WDM Network Control. IP/WDM Traffic Engineering. Other IP/WDM Specific Issues. Concluding Remarks. Bibliography. Web Site List. Acronym List. Index.
£92.86
John Wiley & Sons Inc Quality of Service in a Cisco Networking
Book SynopsisIn networks, Quality of Service (QoS) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and, to some extent, guaranteed in advance. QoS is of particular concern for the continuous transmission of high--bandwidth video and multimedia information.Table of ContentsPreface. 1. The Meaning of Quality of Service. Why QOS? Defining QOS. Book Preview. 2. Working at Layer 2. The IEEE 802.1p Signalling Technique. Configuring Cisco(r) Equipment. 3. QOS into the WAN. The IP Protocol Stack. Data Delivery. Queuing Addresses. The IPv4 Header. Router Queuing. First-in, First-out Queuing. Priority Queuing. Classifying Traffic Via the Arrival Interface. 4. Diffserv and MPLS. Differentiated Services. Supporting DiffServ in a Cisco Environment. Multi-Protocol Label Switching. Configuring MPLS. 5. The Resource Preservation Protocol. Understanding RSVP. Configuring RSVP. 6. QOS Enhancement Techniques. Enabling Static Routing. Enhancing the Address Resolution Process. Tailor the Access Line. Enabling RTP Header Compression. Enabling Other Compression Methods. Eliminate Directed Broadcasts. Enable Selective Acknowledgements. Enable Link Fragmentaton and Interleaving. 7. Monitoring Your Network. The Show Command. IP-Related Show Commands. Appendix: Testing Tools. Index.
£100.76
Wiley Symbian OS Communications Programming 2 Symbian
Book SynopsisA developera s guide to the Symbian OS (Operating System) Communications Architecture. The Symbian OS Communications Architecture is the cornerstone of Symbian OS -- enabling the combination of voice communications, wireless Internet access and computing functionality.Trade Review"...clear and detailed...the supporting text is lucid and clear..." (www.wirelessdevnet.com, 5 July 2002) "…something useful for everyone…the writing is clear, and the structure makes it easy to learn…" (Forum Nokia, 6 March 12003) "…written in a clear and accessible manner…" (CVu, June 2003)Table of ContentsPreface. Foreword. Section 1: The Basics of Symbian OS Communication. Introduction. Introduction to the Symbian Communication Architecture. Several Introductions to the Architecture Infrastructure. Transport Technologies. Look at Content Technologies. Security and Communication. Section 2: Programming using Symbian OS Communication. Getting Started with Communications Programming. Serial Communications. Communicating via Infrared: Serial Communications. Using Sockets. Communicating via Infrared: Using Sockets. Communicating with TCP/IP. Bluetooth Communications. Telephony. Sending and Receiving Messages. Browsable Content Technologies. Section 3: Miscellaneous Topics. Synchronization: PLP and SyncML. The Communications Database. Looking Ahead. Appendix A Developer Resources and Bibliography. Index.
£27.74
John Wiley & Sons Inc The It Managers Survival Guide
Book SynopsisAccessible, refreshingly candid, but above all helpful, this pragmatic guide addresses a real need by dealing with the problems that face the new IT manager.Trade Review"..a commendable feat.." (Information Age, May 2002) "...extensive resource into the roles and requirement of an IT manger, including tips and techniques on how to get ahead..." (M2 Best Books, 2 September 2002) "...I particularly liked the authors' attention-grabbing anecdotes as they successfully guide the reader's focus towards the boardroom..." (Computer Bulletin, January 2003)Table of ContentsForeword by Sir Ron Brierley. Introduction. Becoming a manager. Knowing your customer. Our greatest asset. Developing staff. Supporting roles. Managing recruiters. The rules of engagement. Establishing sound corporate governance. Establishing service level agreements. Dealing with hot spots. Tips for quick-wins. Living with legacy systems. Managing vendors. Using consultants. Business process re-engineering. Benchmarking. Help desk management. Disaster recovery planning. Managing change. Outsourcing. Give the business intelligence. Planning the future. Understanding architectures. Taking stock of your assets. Structuring the IT organization. Where to next?. Appendix A Yukl's Specific Behaviours for Managing Relations. Appendix B Business initiative proposal. Appendix C Thorpe's 4 Rs. Appendix D1 Jacques' time span. Appendix D2 Jaques' complexity measures. Appendix E1 Software inventory. Appendix E2 Hardware inventory. Appendix F Examples of principles. References. Further reading. Index.
£37.79
John Wiley & Sons Inc Mpeg4 Facial Animation
Book SynopsisThe Moving Pictures Expert Group recently produced the MPEG--4 International Standard. One of the more revolutionary parts of the new standard is the Face and Body Animation, or FBA: the specification for efficient coding of shape and animation of human faces and bodies. This book concentrates on the animation of faces.Table of ContentsList of Contributors. Author Biographies. Foreword. Preface. PART 1: BACKGROUND. The Origins of the MPEG-4 Facial Animation Standard (Igor S. Pandzic and Robert Forchheimer). PART 2: THE STANDARD. Face Animation in MPEG-4 (Jörn Ostermann). MPEG-4 Face Animation Conformance (Eric Petajan). PART 3: IMPLEMENTATIONS. MPEG-4 Facial Animation Framework for the Web and Mobile Applications (Igor S. Pandzic). The Facial Animation Engine (Fabio Lavagetto and Roberto Pockaj). Extracting MPEG-4 FAPS from Video (Jörgen Ahlberg). Real-Time Speech-Driven Face Animation (Pengyu Hong, Zhen Wen and Thomas S. Huang). Visual Text-to-Speech (Catherine Pelachaud). Emotion Recognition and Synthesis Based on MPEG-4 FAPs (Nicolas Tsapatsoulis, Amaryllis Raouzaiou, Stefanos Kollias, Roddy Cowie and Ellen Douglas-Cowie). The InterFace Software Platform for Interactive Virtual Characters (Igor S. Pandzic, Michele Cannella, Franck Davoine, Robert Forchheimer, Fabio Lavagetto, Haibo Li, Andrew Marriott, Sotiris Malassiotis, Montse Pardas, Roberto Pockaj and Gael Sannier). PART 4: APPLICATIONS. Model-based Coding: The Complete System (Haibo Li and Robert Forchheimer). A Facial Animation Case Study for HCI: The VHML-Based Mentor System (Andrew Marriott). PlayMail ? Put Words into Other People?s Mouth (Jörn Ostermann). E-Cogent: An Electronic Convincing aGENT (Jörn Ostermann). alterEGO: Video Analysis for Facial Animation (Eric Petajan). EPTAMEDIA: Virtual Guides and Other Applications (Fabio Lavagetto and Roberto Pockaj). Appendix 1: Evaluating MPEG-4 Facial Animation Players (Jörgen Ahlberg, Igor S. Pandzic and Liwen You). Appendix 2: Web Resources. Index.
£130.45
John Wiley & Sons Inc The Wireless Mobile Internet Architectures
Book SynopsisInternet based applications are the emerging major source of traffic for wireless networks. Soon we will all be able to access the Internet from our mobile phones, PDAs, hand--held devices, etc. This book describes the networking technologies that will enable the seamless transmission of data to us, wherever we are.Trade Review"...excellent text book style...essential reading for those interested in or studying the topic..." (TelecomWorldWire, 25 June 2003) "...an excellent addition to the literature on the wireless mobile Internet...a must-read for seasoned professionals and also for those who are new to the subject...." (Computing Reviews) "...easy-to-read reference text is essential reading for those interested in or studying the topic..." (M2 Best Books, 25 June 2003) "...a survival guide that helps introduce us to issues related to providing Internet networking for wireless mobile terminals..." (IEEE Communications Magazine, Dec 2003)Table of ContentsPreface. Acknowledgements. PART I: THE WIRELESS INTERNET. An Introduction to Wireless Mobile Internet. Wireless Cellular Data Networks. Cellular Mobile Networks. Mobile Networks of the Future. PART II: FUNDAMENTAL TOPICS IN WIRELESS IP. Quality of Service in a Mobile Environment. Traffic Modeling for Wireless IP. Traffic Management for Wireless IP. Mobility in Cellular Networks. Transport Protocols for Wireless IP. Internet Protocol for Wireless IP. PART III: ADVANCED TOPICS IN WIRELESS IP. Internet Perspectives on Wireless IP. Mobile Ad Hoc Networks and Future Challenges. Satellites in Wireless IP. Acronyms. Index. About the Author.
£100.76
John Wiley & Sons Inc Ethernet Networks 4e
Book SynopsisProvides the information needed to know to plan, implement, manage and upgrade Ethernet networks. This book helps to: improve your skills in employing Ethernet hubs, switches, and routers; learn how to set up and operate a wireless Local Area Network; discover how to extend a wired Ethernet via wireless LANs; and, understand cabling standards.Table of ContentsPreface. Acknowledgments. Introduction to Networking Concepts. Networking Standards. Ethernet Networks. Frame Operations. Networking Hardware and Software. Bridging and Switching Methods and Performance Issues. Routers. Wireless Ethernet. Security. Managing the Network. The Future of Ethernet. Index.
£88.16
John Wiley & Sons Inc PatternOriented Software Architecture Patterns
Book SynopsisThe first volume of the POSA pattern series introduced a broad-spectrum of general-purpose patterns in software design and architecture. The second narrowed the focus to fundamental patterns for building sophisticated concurrent and networked software systems and applications.Table of ContentsForeword by Frank Buschmann. Foreword by Steve Vinoski. About This Book. About The Authors. Intended Audience. Structure of the Book. Guide to the Reader. Acknowledgements. About The Authors. 1. Introduction. 1.1 Overview of Resource Management. 1.2 Scope of Resource Management. 1.3 Usage of Patterns. 1.4 Patterns in Resource Management. 1.5 Related Work. 1.6 Pattern Form. 2. Resource Acquisition. Lookup. Lazy Acquisition. Eager Acquisition. Partial Acquisition. 3. Resource Lifecycle. Caching. Pooling. Coordinator. Resource Lifecycle Manager. 4. Resource Release. Leasing. Evictor. 5. Guidelines for Applying Resource Management. 6. Case Study: Ad Hoc Networking. 6.1 Overview. 6.2 Motivation. 6.3 Solution. 7. Case Study: Mobile Network. 7.1 Overview. 7.2 Motivation. 7.3 Solution. 8. The Past, Present, and Future of Patterns. 8.1 The Past Four Years at a Glance. 8.2 Where Patterns are Now. 8.3 Where Will Patterns Go Tomorrow? 8.4 A Brief Note about the Future of Patterns. 9. Concluding Remarks. Referenced Patterns. Notations. References. Acknowledgements. Index of Patterns. Index.
£30.00
John Wiley & Sons Inc Scheduling in Realtime Systems Electrical
Book SynopsisReal--time software is indispensable to all ultrareliable and safety critical applications. Providing an introduction to real--time scheduling within centralised and distributed systems, this work covers issues such as clocks, specification, design and modelling.Table of ContentsIntroduction. 1. Basic Concepts. Real-time applications. Basic notions for real-time task scheduling. 2. Scheduling of Independent Tasks. Basic on-line algorithms for periodic tasks. Hybrid task sets scheduling. 3. Scheduling of Dependent Tasks. Tasks for precedence relationships. Tasks sharing critical resources. 4. Scheduling Schemes for Handling Overload. Scheduling techniques in overload conditions. Handling real-time tasks with varying timing parameters. Handling overload conditions for hybrid task sets. 5. Multiprocessor Scheduling. Introduction. First results and comparison with uniprocessor scheduling. Multiprocessor scheduling anomalies. Schedulability conditions. Scheduling algorithms. 6. Joint Scheduling of Tasks and Messages in Distributed Systems. Overview of distributed real-time systems. Task allocation in real-time distributed systems. Real-time traffic. Message scheduling. Conclusion. 7. Packet Scheduling in Networks. Introduction. Network and traffic models. Service disciplines. Work-conserving service disciplines. Non-work-conserving service disciplines. 8. Software Environment. Real-time operating system and real-time kernel. Real-time languages. Real-time middleware. Summary of scheduling capabilities of standardized components. 9. Case Studies. Real-time acquisition and analysis of rolling mill signals. Embedded real-time application: Mars Pathfinder mission. Distributed automotive application.
£130.45
John Wiley & Sons Inc UML in Practice
Book SynopsisUML is the de facto industry standard modeling language for specifying, visualizing, constructing, and documenting aspects of the design of software systems. UML in Practice offers practical, clear guidance on the real--life usage of UML, mentoring software developers through every aspect of the modeling process.Table of ContentsForeword ix Introduction xi Acknowledgements xv PART 1 FUNCTIONAL VIEW 1 1 Case study: automatic teller machine 3 1.1 Step 1 – Identifying the actors of the ATM 5 1.2 Step 2 – Identifying use cases 8 1.3 Step 3 – Creating use case diagrams 10 1.4 Step 4 – Textual description of use cases 14 1.5 Step 5 – Graphical description of use cases 20 1.6 Step 6 – Organising the use cases 26 2 Complementary exercises 37 2.1 Step 1 – Business modelling 53 2.2 Step 2 – Defining system requirements 57 Appendix A: Glossary & tips 65 PART 2 STATIC VIEW 71 3 Case study: flight booking system 73 3.1 75 3.2 Step 2 – Modelling sentences 6, 7 and 10 77 3.3 Step 3 – Modelling sentences 8 and 9 82 3.4 Step 4 – Modelling sentences 3, 4 and 5 86 3.5 Step 5 – Adding attributes, constraints and qualifiers 89 3.6 Step 6 – Using analysis patterns 94 3.7 Step 7 – Structuring into packages 98 3.8 Step 8 – Generalisation and re-use 105 4 Complementary exercises 113 Appendix B: Glossary & tips 149 Step 1– Modelling sentences 1 and 2 PART 3 DYNAMIC VIEW 157 5 Case study: coin-operated pay phone 159 5.1 Step 1 – Identifying the actors and use cases 161 5.2 Step 2 – Realising the system sequence diagram 164 5.3 Step 3 – Representing the dynamic context 166 5.4 Step 4 – In-depth description using a state diagram 168 6 Complementary exercises 185 Apendix C: Glossary & tips 207 PART 4 DESIGN 213 7 Case study: training request 215 7.1 Step 1 – Defining iterations 217 7.2 Step 2 – Defining the system architecture 219 7.3 Step 3 – Defining system operations (iteration 1) 224 7.4 Step 4 – Operation contracts (iteration 1) 225 7.5 Step 5 – Interaction diagrams (iteration 1) 228 7.6 Step 6 – Design class diagrams (iteration 1) 237 7.7 Step 7 – Defining the system operations (iteration 2) 245 7.8 Step 8 – Operation contracts (iteration 2) 247 7.9 Step 9 – Interaction diagrams (iteration 2) 250 7.10 Step 10 – Design class diagrams (iteration 2) 252 7.11 Step 11 – Back to architecture 253 7.12 Step 12 – Transition to Java code 254 7.13 Step 13 – Putting the application into action 262 8 Complementary exercises 267 Appendix D: Glossary & tips 283 Index 293
£27.20
John Wiley & Sons Inc LargeScale Software Architecture
Book SynopsisThe purpose of large--scale software architecture is to capture and describe practical representations to make development teams more effective. In this book the authors show how to utilise software architecture as a tool to guide the development instead of capturing the architectural details after all the design decisions have been made.Trade Review“…a welcome addition…recommended…” (CVU, June 04)Table of ContentsPreface. Acknowledgements. Introduction. Roles of the Software Architect. Software Architecture and the Development Process. Example System Overview. UML Quick Tour. System Context and Domain Analysis. Component Design and Modeling. Subsystem Design. Transaction and Data Design. Process and Deployment Design. Architecture Techniques. Applying the Viewpoints. Summary of Architectural Viewpoints. Bibliography.
£26.25
John Wiley & Sons Inc Towards the Semantic Web
Book SynopsisWith the current changes driven by the expansion of the World Wide Web, this book uses a different approach from other books on the market: it applies ontologies to electronically available information to improve the quality of knowledge management in large and distributed organizations.Table of ContentsForeword. Biographies. List of Contributors. Acknowledgments. Introduction (J. Davies, et al.). OIL and DAML+OIL: Ontology Languages for the Semantic Web (D. Fensel, et al.). A Methodology for Ontology-based Knowledge Management (Y. Sure and R. Studer). Ontology Management: Storing, Aligning and Maintaining Ontologies (M. Klein, et al.). Sesame: A Generic Architecture for Storing and Querying RDF and RDF Schema (J. Broekstra, et al.). Generating Ontologies for the Semantic Web: OntoBuilder (R. Engels and T. Lech). OntoEdit: Collaborative Engineering of Ontologies (Y. Sure, et al.). QuizRDF: Search Technology for the Semantic Web (J. Davies, et al.). Spectacle (C. Fluit, et al.). OntoShare: Evolving Ontologies in a Knowledge Sharing System (J. Davies, et al.). Ontology Middleware and Reasoning (A. Kiryakov, et al.). Ontology-based Knowledge Management at Work: The Swiss Life Case Studies (U. Reimer, et al.). Field Experimenting with Semantic Web Tools in a Virtual Organization (V. Iosif, et al.). A Future Perspective: Exploiting Peer-to-Peer and the Semantic Web for Knowledge Management (D. Fensel, et al.). Conclusions: Ontology-driven Knowledge Management - Towards the Semantic Web? (J. Davies, et al.). References. Index.
£88.16
John Wiley & Sons Inc Modeling the Internet and the Web Probabilistic
Book SynopsisDespite its haphazard growth, the Web hides powerful underlying regularities -- from the organization of its links to the patterns found in its use by millions of users. Probabilistic modelling allows many of these regularities to be predicted on the basis of theoretical models based on statistical methodology.Trade Review"…I congratulate the authors on a very well-researched and well-written publication." (Technometrics, August 2004, Vol. 46, No. 3) “…fascinating …I highly recommend this book…” (Short Book Reviews, August 2004) “…a very well-researched and well-written publication.” (Technometrics, August 2004) Table of ContentsPreface. 1 Mathematical Background. 1.1 Probability and Learning from a Bayesian Perspective. 1.2 Parameter Estimation from Data. 1.3 Mixture Models and the Expectation Maximization Algorithm. 1.4 Graphical Models. 1.5 Classification. 1.6 Clustering. 1.7 Power-Law Distributions. 1.8 Exercises. 2 Basic WWW Technologies. 2.1 Web Documents. 2.2 Resource Identifiers: URI, URL, and URN. 2.3 Protocols. 2.4 Log Files. 2.5 Search Engines. 2.6 Exercises. 3 Web Graphs. 3.1 Internet and Web Graphs. 3.2 Generative Models for the Web Graph and Other Networks. 3.3 Applications. 3.4 Notes and Additional Technical References. 3.5 Exercises. 4 Text Analysis. 4.1 Indexing. 4.2 Lexical Processing. 4.3 Content-Based Ranking. 4.4 Probabilistic Retrieval. 4.5 Latent Semantic Analysis. 4.6 Text Categorization. 4.7 Exploiting Hyperlinks. 4.8 Document Clustering. 4.9 Information Extraction. 4.10 Exercises. 5 Link Analysis. 5.1 Early Approaches to Link Analysis. 5.2 Nonnegative Matrices and Dominant Eigenvectors. 5.3 Hubs and Authorities: HITS. 5.4 PageRank. 5.5 Stability. 5.6 Probabilistic Link Analysis. 5.7 Limitations of Link Analysis. 6 Advanced Crawling Techniques. 6.1 Selective Crawling. 6.2 Focused Crawling. 6.3 Distributed Crawling. 6.4 Web Dynamics. 7 Modeling and Understanding Human Behavior on the Web. 7.1 Introduction. 7.2 Web Data and Measurement Issues. 7.3 Empirical Client-Side Studies of Browsing Behavior. 7.4 Probabilistic Models of Browsing Behavior. 7.5 Modeling and Understanding Search Engine Querying. 7.6 Exercises. 8 Commerce on the Web: Models and Applications. 8.1 Introduction. 8.2 Customer Data on theWeb. 8.3 Automated Recommender Systems. 8.4 Networks and Recommendations. 8.5 Web Path Analysis for Purchase Prediction. 8.6 Exercises. Appendix A: Mathematical Complements. A.1 Graph Theory. A.2 Distributions. A.3 Singular Value Decomposition. A.4 Markov Chains. A.5 Information Theory. Appendix B: List of Main Symbols and Abbreviations. References. Index.
£77.36
Wiley Distributed Storage Networks Architecture
Book SynopsisAddresses the "terminology gap" between enterprise network planners and telecommunications engineers, who must understand the transport requirements of storage networks in order to implement distributed storage networks. This book includes example network configurations providing solutions to typical user scenarios.Table of ContentsForeword. Preface. Acknowledgements. List of Figures. List of Tables. 1. Introduction to Storage Networking. 1.1 Overview. 1.2 Evolution of Storage Netwroking. 1.3 Terminology. 1.4 Storage Concepts. 1.5 SAN Applications. 1.6 Summary. 2. Applications for Distributed Storage Networking. 2.1 Storage Integration. 2.2 Remote Backup/Restoral. 2.3 Disk Mirroring. 2.4 Data Migration. 2.5 Business Continuity/Disaster Recovery. 2.6 Remote Operation of Peripheral Devices. 2.7 Mainframe/Open Systems Connectivity. 2.8 Network Attached Storage (NAS). 2.9 Summary. 3. Distance Considerations for Storage Networks. 3.1 Physical Layer. 3.2 Protocol Considerations. 3.3 Caching. 3.4 Summary. 4. Architectures for Distributed Storage Networking. 4.1 Storage Networking in the Business Park. 4.2 Storage Networking in the Metro Network. 4.3 Storage Networking in the Wide Area Network. 4.4 Summary. 5. Protocols for Distributed Storage Networking. 5.1 Small Computer Systems Interface (SCSI). 5.2 Enterprise Systems Connection (ESCON). 5.3 Fiber Connection (FICON). 5.4 Fibre Channel (FC). 5.5 Gigabit Ethernet (GigE) and 10 Gigabit Ethernet (10G Ethernet). 5.6 Protocol Summary. 6. InfiniBand. 6.1 Applications. 6.2 Standards. 6.3 Network Topology. 6.4 Addressing. 6.5 Data Framing. 6.6 Physical layer. 6.7 Summary. 7. MAN/WAN Protocols for Distributed Storage Networking. 7.1 Wavelength Division Multiplexing (WDM). 7.2 Time Division Multiplexing and SONET. 7.3 Asynchronous Transfer Mode (ATM). 7.4 Generic Framing Procedure (GFP). 7.5 Summary - WAN/MAN Protocols. 8. Storage Over IP. 8.1 Overview. 8.2 Internet SCSI (iSCSI). 8.3 Fibre Channel and IP Netwroks. 8.4 Summary. 9. Storage Management Requirements. 9.1 Overview. 9.2 Standards. 9.3 The SNIA Shared Storage Model. 9.4 The SNIA Management Model. 9.5 The SNIA Prototype. 9.6 Distance Considerations for Storage management. 9.7 Summary. 10. Security Considerations. 10.1 Overview. 10.2 Physical Security. 10.3 User Login and Administration. 10.4 Management Interfaces. 10.5 Firewalls. 10.6 Encryption and IPSec. 10.7 Public Key Infrastructure and Digital Certificates. 10.8 Virtual Private Networks (VPNs). 10.9 SAN Security. 10.10 NAS Security. 10.11 Analyzing Network Architecture for Security Issues. 10.12 Summary. 11. Planning Distributed Storage Networks. 11.1 Selexting an Architecture. 11.2 Optical Fiber Planning. 11.3 Security Planning. 11.4 Outsourcing Storage. 11.5 Return on Investment (ROI). 11.6 Summary. 12. Glossary of Terms. Bibliography. Index.
£88.16
John Wiley & Sons Inc SpaceTerrestrial Mobile Networks Internet Access
Book SynopsisPresents the design of a Global Mobile Broadband System (GMBS) based on results of the IST Project SUITED. This book could be viewed as a case study, in which many of the concepts in mobility solution, network design techniques and Internet technologies are presented.Table of ContentsPreface. 1. Introduction. 2. Multi-Segment Access Network. 3. GMBS Multi-Mode Terminal. 4. Service Requirements. 5. End-to-End Qquality of Service Support. 6. Mobility Support. 7. Network Protocol Design. 8. Performance Validation. Appendix A: Related Publications. Index.
£137.70
John Wiley & Sons Inc Concept Data Analysis
Book SynopsisOffers a treatment of the full range of algorithms available for conceptual data analysis, spanning creation, maintenance, display and manipulation of concept lattices. The website accompanying this book allows you to gain a better understanding of the principles covered herein through working on the topics discussed.Table of ContentsForeword. Preface. I: THEORY AND ALGORITHMS. 1. Theoretical Foundations. 1.1 Basic Notions of Orders and Lattices. 1.2 Context, Concept, and Concept Lattice. 1.3 Many-valued Contexts. 1.4 Bibliographic Notes. 2. Algorithms. 2.1 Constructing Concept Lattices. 2.2 Incremental Lattice Update. 2.3 Visualization. 2.4 Adding Knowledge to Concept Lattices. 2.5 Bibliographic Notes. II: APPLICATIONS. 3. Information Retrieval. 3.1 Query Modification. 3.2 Document Ranking 4. Text Mining. 4.1 Mining the Content of the ACM Digital Library. 4.2 MiningWeb Retrieval Results with CREDO. 4.3 Bibliographic Notes. 5. Rule Mining. 5.1 Implications. 5.2 Functional Dependencies. 5.3 Association Rules. 5.4 Classification Rules. 5.5 Bibliographic Notes. References. Index.
£95.36
John Wiley & Sons Inc Web Server Programming
Book SynopsisWhen the web transitioned from a publishing to an interactive e--commerce medium, standardised web--browsers entered widespread use and developers were able to rely on a relatively stable client component.Table of ContentsPreface xi 1 Introduction 1 1.1 Servers on the Internet 2 1.2 Serving static hypertext 6 1.3 Serving dynamically generated hypertext 8 1.4 Forms and CGI 11 1.5 A CGI program and examples 18 1.6 Client-side scripting 29 Exercises 32 Practical 32 Short answer questions 32 Explorations 33 2 HTTP 35 2.1 Requests and responses 36 2.1.1 Requests 38 2.1.2 Responses 40 2.2 Authorization 41 2.3 Negotiated content 43 2.4 State in a stateless protocol 44 Exercises 45 Short answer questions 45 Explorations 45 3 Apache 47 3.1 Apache’s processes 48 3.2 Apache’s modules 51 3.3 Access controls 54 3.4 Logs 58 3.5 Generation of dynamic pages 61 3.6 Apache: installation and configuration 64 3.6.1 Basic installation and testing 64 3.6.2 The httpd.conf configuration file 67 Exercises 71 Practical 71 Short answer questions 75 Explorations 76 4 IP and DNS 77 4.1 IP addresses 78 4.2 IP addresses and names 81 4.3 Name resolution 84 4.4 BIND 86 Exercises 89 Practical 89 Short answer questions 90 Explorations 90 5 Perl 91 5.1 Perl’s origins 92 5.2 Running Perl, and the inevitable ‘Hello World’ program 93 5.3 Perl language 94 5.3.1 Scalar variables 95 5.3.2 Control structures 98 5.4 Perl core functions 101 5.5 ’CS1’ revisited: simple Perl programs 103 5.5.1 Burgers 103 5.5.2 ls -l 105 5.6 Beyond CS1: lists and arrays 108 5.6.1 Basics of lists 108 5.6.2 Two simple list examples 112 5.7 Subroutines 118 5.8 Hashes 120 5.9 An example using a hash and a list 122 5.10 Files and formatting 123 5.11 Regular expression matching 126 5.11.1 Basics of regex patterns 128 5.11.2 Finding ‘what matched?’ and other advanced features 131 5.12 Perl and the OS 136 5.12.1 Manipulating files and directories 137 5.12.2 Perl: processes 140 5.12.3 A ‘systems programming’ example 143 5.13 Networking 150 5.14 Modules 153 5.15 Databases 154 5.15.1 Basics 154 5.15.2 Database example 158 5.16 Perl: CGI 163 5.16.1 ’Roll your own’ CGI code 164 5.16.2 Perl: CGI module(s) 171 5.16.3 Security issues and CGI 173 Exercises 174 Practical 174 Short answer questions 180 Explorations 181 6 PHP4 183 6.1 PHP4’s origins 183 6.2 PHP language 187 6.2.1 Simple variables and data types 187 6.2.2 Operators 191 6.2.3 Program structure and flow control 191 6.2.4 Functions 193 6.3 Simple examples 194 6.4 Multi-page forms 198 6.5 File uploads 207 6.6 Databases 216 6.7 GD graphics library 227 6.8 State 238 Exercises 248 Practical 248 Short answer questions 257 Explorations 257 7 Java Servlets 259 7.1 Servlet overview 259 7.2 A first servlet example 261 7.2.1 Form and servlet code 263 7.2.2 Installation, Compilation, Deployment 265 7.2.3 web.xml deployment files 268 7.3 Sun’s servlet-related classes 269 7.4 Web application example: ‘Membership’ 276 7.5 Client state and sessions 290 7.6 Images 304 7.7 Security features 306 Exercises 328 Practical 328 Short answer questions 336 Explorations 336 Contents vii 8 JSP: Java Server Pages 337 8.1 JSP overview 337 8.2 The ‘Guru’ – a JSP example 340 8.2.1 The scriptlet Guru 340 8.2.2 The tagged Guru 343 8.3 Membership example 344 8.4 JSP: page contents 352 8.4.1 JSP directives 354 8.4.2 jsp: tag library 355 8.5 Servlet, bean and JSP examples 356 8.6 Tag libraries 368 8.6.1 Defining a simple customized action tag 369 8.6.2 Using tag libraries 373 Exercises 375 Practical 375 Short answer questions 379 Explorations 380 9 XML 381 9.1 XML overview 381 9.2 XML and friends 384 9.3 XSL, XSLT and XML display 391 9.4 XML and XSL generating WML 403 9.5 Simple API for XML 412 9.6 DOM – the Document Object Model 422 Exercises 428 Practical 428 Short answer questions 432 Explorations 433 10 Enterprise Java 435 10.1 EJB background 437 10.1.1 Smart beans in smarter containers 437 10.1.2 Distributed objects 438 10.2 EJB basics 441 10.2.1 Servers, containers and beans 441 10.2.2 The life of a bean 444 10.2.3 Classes and interfaces 444 10.2.4 EJB clients and EJB deployment 446 10.3 Session bean examples 447 10.3.1 Stateless server 447 10.3.2 Stateful server 453 10.4 An Entity bean 456 10.5 Real-world EJB 470 Exercises 485 Practical 485 Short answer questions 485 Explorations 485 11 Future technologies? 487 11.1 (Lack of) Speed kills 487 11.2 Personal internet presence 489 11.3 Peer-to-peer 490 11.4 ... and on to ‘Web Services’ 492 11.4.1 The existing world of distributed objects 492 11.4.2 Steps towards a future world of distributed objects 495 11.4.3 UDDI, WSDL and SOAP 498 11.4.4 Web service promises 509 Exercises 512 Explorations 512 Appendices A Minimalist guide to HTML and JavaScript 515 B Active Server Pages: ASP (scripting) 549 C .NET 573 Index 601
£39.85
John Wiley & Sons Inc Wireless Personal and Local Area Networks
Book SynopsisWireless Local Area Networks (LANs) represent the revolution occuring in wireless communications. These networks, allow small communities of office workers, industrial workers, hospital employees, technical teams, and others, to communicate via their mobile devices without having to worry about cables. This book covers this area.Table of ContentsPreface xi Structure of the book xii 1 Introduction 1 1.1 Definition and restriction 1 1.2 Overview of advantages and disadvantages 1 1.3 Applications overview 3 1.4 Market events 6 1.5 Organizations and governing bodies 12 2 Basics 17 2.1 History of wireless vs. wired 17 2.2 Technical communication models and classification 20 2.3 Demands on transfer networks 26 2.4 Properties of electromagnetic waves 28 2.5 Digital modulation technology 33 2.6 Channel access 38 2.7 Spread spectrum techniques 39 2.8 Orthogonal frequency division multiplex procedure 43 2.9 Antennae 2.10 Special features of wireless networks 47 2.11 Frequency allocations 48 3 Applications, devices and standards 51 3.1 Application scenarios 51 3.2 Device types 53 3.3 Standards 54 4 IEEE802.11 57 4.1 The standard 57 4.2 Architectures 59 4.3 Channel access 61 4.4 The Physical layer and bit transfer 81 4.5 Other services 86 4.6 Security 86 4.7 Extensions to the standard 88 5 Bluetooth 95 5.1 The standard 95 5.2 Architectures 99 5.3 Channel access 99 5.4 Controlling states 104 5.5 Bit transfer 108 5.6 Security 110 5.7 System implementation 110 6 DECT 113 6.1 The standard 113 6.2 Architectures 113 6.3 Channel access 114 6.4 Bit transfer 115 6.5 Application profiles 115 7 HomeRF 117 7.1 The standard 117 7.2 Architectures 117 7.3 Channel access 119 7.4 Bit transfer 121 8 HiperLAN/2 123 8.1 The standard 123 8.2 Architectures 125 8.3 Channel access 127 8.4 Bit transfer 130 8.5 Other services 132 8.6 The HiperLAN/2 standard versus IEEE802.1 a 132 9 Operating an IEEE802.11b-complaint WLAN 133 9.1 Introduction 133 9.2 Mobile stations 133 9.3 Access points 136 9.4 Extended networks 141 9.5 Network analysis 143 9.6 Examples from real life 148 10 Various aspects of WLAN technology 153 10.1 Security 10.2 Sources of interference 161 10.3 Selecting a spread spectrum technique 163 10.4 Aspects of EMT interference 165 10.5 WLANs and TCP/IP 167 10.6 Deciding factors 167 10.7 Future prospects 169 Appendix 171 A.1 Maxwellian equations 171 A.2 Physical basis of direct sequence spread spectrum process 171 A.3 Directional antennae 174 B Bibliography 179 B.1 English-language publications 179 B.2 German-language publications 182 C Abbreviations 185
£106.35
John Wiley & Sons Inc The Partnering Imperative Making Business
Book SynopsisThere is no shortage of strategic reasons for taking partnering seriously in today''s converging and colliding marketplace. However, there certainly is a lack of credible explanations as to why so many fail. This book provides the ingredients for successful business partnerships. It identifies the value that effective partnerships can generate, the reasons why so many run into difficulties, and the imperatives for leaders who want to make partnering work in a globalized, digital world. A powerful series of insights into one of the major issues of our time: how to create a partnership that generates innovation and other key advantages. Original, perceptive, wise and easy to read. -Dr Charles Hampden-Turner, Cambridge University, Judge Institute of Management Studies Deering and Murphy have written with great clarity and insight on a difficult subject. Partnering will continue to grow in importance as firms shrink in size and look outside their boTrade Review"...a well presented book with an important message..." (Long Range Planning, June 2006)Table of ContentsList of Figures, Tables and Boxes. Acknowledgements Introduction. 1: A New Kind of Enterprise. 2: A New Language for Partnering. 3: Searching for Fit. 4: Living with Difference. 5: Exploring Common Ground. 6: Trading in 'Common' Sense. 7: Someone at the Helm. 8: On Trust and Conflict. Afterword: The Dos and Don'ts of Effective Business Partnerships. Appendix A: To Acquire or Not to Acquire—That is the Question. Appendix B: Partnering Grid Self-Assessment. Appendix C: Partnering Objectives Assessment. Author Biographies. Index.
£40.05
John Wiley & Sons Inc Programming Language Design Concepts
Book SynopsisExplains the concepts underlying programming languages, and demonstrates how these concepts are synthesized in the paradigms: imperative, OO, concurrent, functional, logic and with scripting languages. This book includes numerous examples using C, Java and C++ as exemplar languages.Table of ContentsPreface. PART I: INTRODUCTION. 1. Programming Languages. 1.1 Programming linguistics. 1.1.1 Concepts and paradigms. 1.1.2 Syntax, semantics, and pragmatics. 1.1.3 Language processors. 1.2 Historical development. Summary. Further reading. Exercises. PART II: BASIC CONCEPTS 2. Values and Types. 2.1 Types. 2.2 Primitive types. 2.2.1 Built-in primitive types. 2.2.2 Defined primitive types. 2.2.3 Discrete primitive types. 2.3 Composite types. 2.3.1 Cartesian products, structures, and records. 2.3.2 Mappings, arrays, and functions. 2.3.3 Disjoint unions, discriminated records, and objects. 2.4 Recursive types. 2.4.1 Lists. 2.4.2 Strings. 2.4.3 Recursive types in general. 2.5 Type systems. 2.5.1 Static vs dynamic typing. 2.5.2 Type equivalence. 2.5.3 The Type Completeness Principle. 2.6 Expressions. 2.6.1 Literals. 2. 6.2 Constructions. 2.6.3 Function calls. 2.6.4 Conditional expressions. 2.6.5 Iterative expressions. 2.6.6 Constant and variable accesses. 2.7 Implementation notes. 2.7.1 Representation of primitive types. 2.7.2 Representation of Cartesian products. 2.7.3 Representation of arrays. 2.7.4 Representation of disjoint unions. 2.7.5 Representation of recursive types. Summary. Further reading. Exercises. 3. Variables and Storage. 3.1 Variables and storage. 3.2 Simple variables. 3.3 Composite variables. 3.3.1 Total vs selective update. 3.3.2 Static vs dynamic vs flexible arrays. 3.4 Copy semantics vs reference semantics. 3.5 Lifetime. 3.5.1 Global and local variables. 3.5.2 Heap variables. 3.5.3 Persistent variables. 3.6 Pointers. 3.6.1 Pointers and recursive types. 3.6.2 Dangling pointers. 3.7 Commands. 3.7.1 Skips. 3.7.2 Assignments. 3.7.3 Procedure calls. 3.7.4 Sequential commands. 3.7.5 Collateral commands. 3.7.6 Conditional commands. 3.7.7 Iterative commands. 3.8 Expressions with side effects. 3.8.1 Command expressions. 3.8.2 Expression-oriented languages. 3.9 Implementation notes 3.9.1 Storage for global and local variables. 3.9.2 Storage for heap variables. Summary. Further reading. Exercises. 4. Bindings and Scope. 4.1 Bindings and environments. 4.2 Scope. 4.2.1 Block structure. 4.2.2 Scope and visibility. 4.2.3 Static vs dynamic scoping. 4.3 Declarations. 4.3.1 Type declarations. 4.3.2 Constant declarations. 4.3.3 Variable declarations. 4.3.4 Procedure definitions. 4.3.5 Collateral declarations. 4.3.6 Sequential declarations. 4.3.6 Recursive declarations. 4.3.8 Scopes of declarations. 4.4 Blocks. 4.4.1 Block commands. 4.4.2 Block expressions. 4.4.3 The Qualification Principle. Summary. Further reading. Exercises. 5. Procedural Abstraction. 5.1 Function procedures and proper procedures. 5.1.1 Function procedures. 5.1.2 Proper procedures 5.1.3 The Abstraction Principle. 5.2 Parameters and arguments. 5.2.1 Copy parameter mechanisms. 5.2.2 Reference parameter mechanisms. 5.2.3 The Correspondence Principle. 5.3 Implementation notes 5.3.1 Implementation of procedure calls. 5.3.1 Implementation of parameter passing. Summary. Further reading. Exercises. PART III: ADVANCED CONCEPTS. 6. Data Abstraction. 6.1 Program units, packages, and encapsulation. 6.1.1 Packages. 6.1.2 Encapsulation. 6.2 Abstract types. 6.3 Objects and classes. 6.3.1 Classes. 6.3.2 Subclasses and inheritance. 6.3.3 Abstract classes. 6.3.4. Single vs multiple inheritance. 6.3.5 Interfaces. 6.4 Implementation notes. 6.4.1 Representation of objects 6.4.2 Implementation of method calls. Summary. Further reading Exercises. 7. Generic Abstraction. 7.1 Generic units and instantiation. 7.1.1 Generic packages in ADA. 7.1.2 Generic classes in C++. 7.2 Type and class parameters. 7.2.1 Type parameters in ADA. 7.2.2 Type parameters in C++. 7.2.3 Class parameters in JAVA. 7.3 Implementation notes 7.3.1 Implementation of ADA generic units. 7.3.2 Implementation of C++ generic units. 7.3.3 Implementation of JAVA generic units. Summary. Further reading. Exercises 8. Type Systems. 8.1 Inclusion polymorphism. 8.1.1 Types and subtypes. 8.1.2 Classes and subclasses. 8.2 Parametric polymorphism. 8.2.1 Polymorphic procedures. 8.2.2 Parameterized types. 8.2.3 Type inference. 8.3 Overloading. 8.4 Type conversions. 8.5 Implementation notes 8.5.1 Implementation of polymorphic procedures. Summary. Further reading. Exercises. 9. Control Flow. 9.1 Sequencers. 9.2 Jumps. 9.3 Escapes. 9.4 Exceptions. 9.5 Implementation notes 9.5.1 Implementation of jumps and escapes. 9.5.2 Implementation of exceptions. Summary. Further reading. Exercises. 10. Concurrency (by William Findlay). 10.1 Why concurrency?. 10.2 Programs and processes. 10.3 Problems with concurrency. 10.3.1 Nondeterminism. 10.3.2 Speed dependence. 10.3.3 Deadlock. 10.3.4 Starvation. 10.4 Process interactions. 10.4.1 Independent processes. 10.4.2 Competing processes. 10.4.3 Communicating processes. 10.5 Concurrency primitives. 10.5.1 Process creation and control. 10.5.2 Interrupts. 10.5.3 Spin locks and wait-free algorithms. 10.5.4 Events. 10.5.5 Semaphores. 10.5.6 Messages. 10.5.7 Remote procedure calls. 10.6 Concurrent control abstractions. 10.6.1 Conditional critical regions. 10.6.2 Monitors. 10.6.3 Rendezvous. Summary. Further reading. Exercises. PART IV: PARADIGMS 11. Imperative Programming. 11.1 Key concepts. 11.2 Pragmatics. 11.2.1 A simple spellchecker. 11.3 Case study: C. 11.3.1 Values and types. 11.3.2 Variables, storage, and control. 11.3.3 Bindings and scope. 11.3.4 Procedural abstraction. 11.3.5 Independent compilation. 11.3.6 Preprocessor directives. 11.3.7 Function library. 11.3.8 A simple spellchecker. 11.4 Case study: ADA. 11.4.1 Values and types. 11.4.2 Variables, storage, and control. 11.4.3 Bindings and scope. 11.4.4 Procedural abstraction. 11.4.5 Data abstraction. 11.4.6 Generic abstraction. 11.4.7 Separate compilation. 11.4.8 Package library. 11.4.9 A simple spellchecker. Summary. Further reading. Exercises. 12. Object-Oriented Programming. 12.1 Key Concepts. 12.2 Pragmatics. 12.3 Case study: C++. 12.3.1 Values and types. 12.3.2 Variables, storage, and control. 12.3.3 Bindings and scope. 12.3.4 Procedural abstraction. 12.3.5 Data abstraction. 12.3.6 Generic abstraction. 12.3.7 Independent compilation and preprocessor directives 12.3.8 Class and template library. 12.3.9 A simple spellchecker. 12.4 Case study: JAVA. 12.4.1 Values and types. 12.4.2 Variables, storage, and control. 12.4.3 Bindings and scope. 12.4.4 Procedural abstraction. 12.4.5 Data abstraction. 12.4.6 Generic abstraction. 12.4.7 Separate compilation and dynamic linking. 12.4.8 Class library. 12.4.9 A simple spellchecker. 12.5 Case study: ADA95. 12.5.1 Types. 12.5.2 Data abstraction. Summary. Further reading. Exercises. 13. Concurrent Programming (by William Findlay). 13.1 Key concepts. 13.2 Pragmatics. 13.3 Case study: ADA95. 13.3.1 Process creation and termination. 13.3.2 Mutual exclusion. 13.3.3 Admission control. 13.3.4 Scheduling away deadlock. 13.4 Case study: JAVA. 13.4.1 Process creation and termination. 13.4.2 Mutual exclusion. 13.4.3 Admission control. Summary. Further reading. Exercises. 14. Functional Programming. 14.1 Key concepts. 14.1.1 Eager vs normal-order vs lazy evaluation. 14.2 Pragmatics. 14.3 Case study: HASKELL. 14.3.1 Values and types. 14.3.2 Bindings and scope. 14.3.3 Procedural abstraction. 14.3.4 Lazy evaluation. 14.3.5 Data abstraction. 14.3.6 Generic abstraction. 14.3.7 Modeling state. 14.3.8 A simple spellchecker. Summary. Further reading. Exercises. 15. Logic Programming. 15.1 Key concepts. 15.2 Pragmatics. 15.3 Case study: PROLOG. 15.3.1 Values, variables, and terms. 15.3.2 Assertions and clauses. 15.3.3 Relations. 15.3.4 The closed-world assumption. 15.3.5 Bindings and scope. 15.3.6 Control. 15.3.7 Input/output. 15.3.8 A simple spellchecker. Summary. Further reading. Exercises 16. Scripting. 16.1 Pragmatics. 16.1.1 Regular expressions. 16.2 Case study: PYTHON. 16.2.1 Values and types. 16.2.2 Variables, storage, and control 16.2.3 Bindings and scope. 16.2.4 Procedural abstraction. 16.2.5 Data abstraction. 16.2.6 Separate compilation 16.2.7 Module library. Summary. Further reading. Exercises. PART V: CONCLUSION. 17. Language Selection. 17.1 Criteria. 17.2 Evaluation. Summary. Exercises. 18. Language Design. 18.1 Selection of concepts. 18.2 Regularity. 18.3 Simplicity. 18.4 Efficiency. 18.5 Syntax. 18.6 Language life cycles. 18.7 The future. Summary. Further reading. Exercises. Bibliography. Glossary. Index.
£48.56
John Wiley & Sons Inc Bioinformatics Biocomputing and Perl An
Book SynopsisPresents an introduction to bioinformatics computing skills and practice. This book covers the skills vital to the day-to-day activities of bioinformatician.Trade Review"...such a helpful and relevant book...I am following [an] MSc distance learning course in Bioinformatics...I would have been at a complete loss without your book!" (Susan Tzotzos MSc, PhD, Vienna, Austria)Table of ContentsPreface. 1. Setting the Biological Scene. 2. Setting the Technological Scene. I: WORKING WITH PERL. 3. The Basics. 4. Places to Put Things. 5. Getting Organised. 6. About Files. 7. Patterns, Patterns and More Patterns. 8. Perl Grabbag. II: WORKING WITH DATA. 9. Downloading Datasets. 10. The Protein Databank. 11. Non-redundant Datasets. 12. Databases. 13. Databases and Perl. III: WORKING WITH THE WEB. 14. The Sequence Retrieval System. 15. Web Technologies. 16. Web Automation. IV: WORKING WITH APPLICATIONS. 17. Tools and Datasets. 18. Applications. 19. Data Visualisation. 20. Introducing Bioperl. Appendix: A—F. Index.
£75.56
John Wiley & Sons Inc Global IT Management
Book SynopsisIT functions in many large corporations are either contemplating or actually undergoing a globalization of their IT operations. The two major business drivers behind the move to globalize IT are to reduce the costs by the co-ordination of the operations and, more importantly, to integrate business processes.Trade Review"…Global IT Management will provide a valuable text…"(Information Age, December 2003)Table of ContentsForeword. Table of Exhibits. Table of Figures. Table of Tables. Acknowledgements. 1. Why globalize IT management? 2. Organization. Introduction. Core IT services. Forces shaping IT organizations. Basic organizational variants. Two sides to a coin. A practical approach. Key players and institutions. Moving towards action. 3. Architecture. Introduction. Options and expectations. Managing architecture. Organization. Funding. Map current IT architecture. Adapt architecture to requirements. Tool support. Summary. 4. Strategy. Introduction. Options and expectations. Managing strategy. Organization. Funding. Agree strategy. Align organization. Implementation. Review progress. Tool support. Summary. 5. Standards. Introduction. Options and expectations. Choice of standards. Managing standards. Organization. Funding. Defining new standards. Maintaining standards. Handling exceptions. Tool support. Summary. 6. Control. Introduction. Options and expectations. Managing control. Organization. Funding. Managing IT costs. Project control. Implementing balanced scorecards for IT. Tool support. Summary. 7. Value of Global IT Management—Tested. Appendix: Positioning with established best practices. COBIT®. ITIL®. PRINCE2®. Glossary and acronyms. References. Index.
£59.84
John Wiley & Sons Inc Professional Content Management Systems
Book SynopsisContent and Content Management are core topics in the IT and broadcast industry. However, these terms have not been clearly defined for those learning the field. This book helps to clarify the subject area, define problematic issues and establish a universal understanding of content and its management.Trade Review"For anyone working in this industry, the book is worth having as a long-term reference." (Computing Reviews.com, September 15, 2005) "…the most complete work in this area…I recommend this book to students, engineers, and managers involved or interested in the handling and management of multimedia content." (Computing Reviews.com, September 16, 2005)Table of ContentsPreface. 1. Introduction. 2. Content-Related Workflows. 3. Essence. 4. Content Representation and Metadata. 5. File Formats. 6. Content Management. 7. Content Management System Infrastructure. 8. System and Data Integration in CMS. 9. Applications. 10. Future Trends. References. Acronyms. Index.
£97.16