Download PDF Information Security Fundamentals Second Edition by Peltier Thomas R

Download PDF Information Security Fundamentals Second Edition by Peltier Thomas R

Sinopsis

The purpose of information security is to protect an organization’s valuable resources, such as information, computer hardware, and software. Through the selection and application of appropriate safeguards, security helps an organization’s mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets. To many, security is sometimes viewed as thwarting the business objectives of an organization by imposing poorly selected, bothersome rules and procedures on users, managers, and systems. Well-chosen security rules and procedures do not exist for their own sake—they are put in place to protect important assets and thereby support the overall business objectives.

Developing an information security program that adheres to the principle of security as a business enabler is the first step in an enterprise’s effort to build an effective security program. Organizations must continually (1) explore and assess information security risks to business operations; (2) determine what policies, standards, and controls are worth implementing to reduce these risks; (3) promote awareness and understanding among the staff; and (4) assess compliance and control effectiveness. As with other types of internal controls, this is a cycle of activity, not an exercise with a defined beginning and end.

This book has been designed to give the information security professional a solid understanding of the fundamentals of security and the entire range of issues the practitioner must address. We hope that you will be able to take the key elements that comprise a successful information security program and implement the concepts into your own successful program. Each chapter has been written by a different author

Content

  1. Developing Policies
  2. Organization of Information
  3. Cryptology
  4. Risk Management: The Facilitated Risk Analysis and Assessment Process
  5. Building and Maintaining an Effective Security Awareness Program
  6. Physical Security
  7. Disaster Recovery and Business Continuity Planning
  8. Continuity of Operations Planning
  9. Access Controls
  10. Information System Development, Acquisition, and Maintenance
  11. Information Security Incident Management
  12. Asset Classification
  13. Threats to Information Security.
  14. Information Security Policies: A Practitioner’s View









Download PDF Intelligent Robots and Systems by Volker Graefe

Download PDF Intelligent Robots and Systems by Volker Graefe


Sinopsis

A new type of actively sensing multisonar system has been developed for obstacle detection, localization and map updating in indoor environments. It comprises 24 individual intelligent transmitter and receiver elements arranged in a horizontal plane around a high-speed motion platform. The physical sensors are electronically configured to form various types of virtual sensor arrays for specific tasks and situations. A method for high-frequency firing compensates for the low speed of sound in air. Various schemes for intelligent evaluation of the array outputs provide highly accurate localization estimates. Experiments with the developed multisonar system in structured and cluttered environments demonstrate improved perception capabilities compared to state-of-the-art approaches

Content

  1. SENSING AND PERCEPTION
  2. A new High-performance Multisonar System for Fast Mobile Robot Applications
  3. Proper Selection of Sonar and Visual Sensors in Vehicle Detection and Avoidance
  4. Selective Refinement of 3-D Scene Description by Attentive Observation for Mobile Robot
  5. Active Vision Inspired by Mammalian Fixation Mechanism
  6. Realtime Range Imaging Using An Adjustment-free Photo VLSI
  7. A Pedestrian Discrimination Method Based on Rhythm
  8. Visual Recognition of Obstacles on Roads
  9. Visual Collision Avoidance by Segmentation
  10. LEARNING AND PLANNING
  11. Using Perceptions to Plan Incremental Adaptions
  12. Robot Task Programming by Human Demonstration: Mapping Human Grasps to Manipulator Grasps
  13. Robot Learning By Nonparametric Regression
  14. Behavioral Control in Mobile-Robot Navigation Using a Fuzzy Decision Making Approach
  15. Learning Emergent Tasks for an Autonomous Mobile Robot
  16. Efficient Reinforcement Learning of Navigation Strategies in an Autonomous Robot
  17. A Lifelong Learning Perspective for Mobile Robot Control
  18. A Multilevel Learning Approach to Mobile Robot Path Planning
  19. A Self-Organizing Representation of Sensor Space for Mobile Robot Navigation
  20. Path Planning and Guidance Techniques for an Autonomous Mobile Cleaning Robot
  21. MANIPULATION
  22. Grasp Strategies for a Dextrous Robotic Hand
  23. Motion Scheme for Dextrous Manipulation in the Intelligent Cooperative Manipulation System - ICMS
  24. Designing a Behavior of a Mobile Robot Equipped with a Manipulator to Open and Pass through a Door
  25. The Development of Re-usable Software Systems for Intelligent Autonomous Robots in Industrial and Space Applications
  26. TELEROBOTICS AND SPACE ROBOTICS
  27. Toward Integrated Operator Interface for Advanced Teleoperation under Time-Delay
  28. Active Understanding of Human Intention by a Robot through Monitoring of Human Behavior
  29. Human/machine Sharing Control for Telerobotic Systems
  30. Task-Directed Programming of Sensor-Based Robots
  31. Telerobotics with Large Time Delays - the ROTEX Experience
  32. Feature-Based Visual Servoing and its Application to Telerobo
  33. Practical Coordination Control Between Satellite Attitude and Manipulator Reaction Dynamics Based on Computed Momentum Concept
  34. A 5-Axis Mini Direct Drive Robot for Teleoperation and Biotechnology
  35. A Laboratory Test Bed for Space Robotics: The VES II
  36. MULTIPLE ROBOTS
  37. Hierarchical Prediction Model for Intelligent Communication in Multiple Robotic Systems
  38. Proposal for Cooperative Robot "Gunryu" Composed of Autonomous Segments
  39. Unified Control for Dynamic Cooperative Manipulation
  40. MOBILE ROBOT SYSTEMS
  41. Comparative Study of Adaptive Controllers for a Pneumatic Driven Leg
  42. An Efficient Forward Gait Control for a Quadruped Walking Robot
  43. The Six-Legged TUM Walking Robot
  44. Vision-Based Adaptive and Interactive Behaviors in Mechanical Animals Using the Remote-Brained Approach
  45. ROBOTICS IN MEDICINE
  46. Planning, Calibration and Collision-Avoidance for Image-Guided Radiosurgery







Download PDF Introduction to the Theory of Computation Second Edition by Michael Sipser

Download PDF Introduction to the Theory of Computation Second Edition by Michael Sipser

Sinopsis

Judging from the email communications that I've received from so many of you, the biggest deficiency of the first edition is that it provides no sample solutions to any of the problems. So here they are. Every chapter now contains a new Selected Solutions section that gives answers to a representative cross-section of that chapter's exercises and problems. To make up for the loss of the solved problems as interesting homework challenges, I've also added a variety of new problems. Instructors may request an Instructor's Manual that contains additional solutions by contacting the sales representative for their region designated at www. course. comn.

A number of readers would have liked more coverage of certain "standard" topics, particularly the Myhill-Nerode Theorem and Rice's Theorem. I've partially accommodated these readers by developing these topics in the solved problems. I did not include the Myhill-Nerode Theorem in the main body of the text because I believe that this course should provide only an introduction to finite automata and not a deep investigation.


Content

  1. Introduction
  2. Automata and Languages
  3. Regular Languages
  4. Context-Free Languages
  5. Computability Theory
  6. The Church-Turing Thesis
  7. Decidability
  8. Reducibility
  9. Advanced Topics in Computability Theory
  10. Complexity Theory
  11. Time Complexity
  12. Space Complexity
  13. Intractability
  14. Advanced topics in complexity theory











Download PDF Learning Three.js: The JavaScript 3D Library for WebGL Create and animate stunning 3D graphics using the open source Three.js JavaScript library by Jos Dirksen

Download PDF Learning Three.js: The JavaScript 3D Library for WebGL Create and animate stunning 3D graphics using the open source Three.js JavaScript library by Jos Dirksen

Sinopsis

Modern browsers are slowly getting more powerful features that can be accessed directly from JavaScript. You can easily add video and audio with the new HTML5 tags and create interactive components through the use of the HTML5 canvas. A rather new addition to this feature set is the support of WebGL. With WebGL you can directly make use of the processing resources of your graphics card and create high-performance 2D and 3D computer graphics. Programming WebGL directly from JavaScript to create and animate 3D scenes is a very complex and error-prone process. Three.js is a library that makes this a lot easier. The following list shows some of the things that Three.js makes easy:

  • Creating simple and complex 3D geometries
  • Animating and moving objects through a 3D scene
  • Applying textures and materials to your objects
  • Loading objects from 3D modeling software
  • Creating 2D sprite-based graphics


Content


  1. Creating Your First 3D Scene with Three.js
  2. Working with the Basic Components That Make Up a Three.js Scene
  3. Working with the Different Light Sources Available in Three.js
  4. Working with the Three.js Materials
  5. Learning to Work with Geometries
  6. Using Advanced Geometries and Binary Operations
  7. Particles and the Particle System
  8. Creating and Loading Advanced Meshes and Geometries
  9. Animations and Moving the Camera
  10. Loading and Working with Textures
  11. Custom Shaders and Render Post Processing
  12. Adding Physics to Your Scene with Physijs






Download PDF 3ds Max® 2012 Bible by Kelly L. Murdock

Download PDF 3ds Max® 2012 Bible by Kelly L. Murdock


Sinopsis

When you first got your hands on 3ds Max, you were probably focused on one goal—creating cool 3D images and animations. I know that many of you bought Max to make money, claim a tax write-off, earn a way to Hollywood, or impress your girlfriend or boyfriend, but I’ll just ignore those reasons for now. The goal is to create something cool.

If you’ve perused this book’s Table of Contents or thumbed through its many pages, you’ve seen sections on modeling, materials, dynamics, and other topics. But if you’re like me, you don’t want to wade through tons of material before you have something to show off to Mom. (Actually, if you’re like me, you opened straight to the special effects section, in which case you won’t be reading this.)

The purpose of this Quick Start is to give you a taste of what Max can do. This soaring view of the software from 20,000 feet is intended to show you the big picture before you delve into the details. It exposes you to some of the most common features and, I hope, whets your appetite for the more in-depth chapters to follow.

This part of the book is intended for those new to the software. If you’re an experienced user, then your mom no doubt is already impressed with your work, so you can happily advance to whichever chapter appeals to you. (Forgive me for catering to the newbie, but we were all beginners once.)



Content

  1. Getting Started with 3ds Max
  2. Working with Objects
  3. Modeling Basics
  4. Materials, Cameras, and Lighting Basics
  5. Animation and Rendering Basics
  6. Advanced Modeling
  7. Advanced Materials
  8. Advanced Animation Techniques
  9. Working with Characters
  10. Dynamic Animation
  11. Advanced Lighting and Rendering






Download PDF AutoCAD® 2004 Bible by Ellen Finkelstein



Sinopsis

AutoCAD, created by Autodesk, is the most widely used technical drawing program anywhere, with more than 3 million registered users. According to Autodesk, CAD stands for computer-aided design, but can also stand for computeraided drafting or drawing.

The first version of AutoCAD, running under DOS, came out in 1982. AutoCAD was the first significant CAD program to run on a desktop computer. At the time, most other technical drawing programs ran on high-end workstations or even mainframes. AutoCAD’s success has been attributed to its famous open architecture—many source code files in plain text (ASCII) files that you can easily customize and programming languages (such as AutoLISP and Visual Basic for Applications) designed especially so that the end user can program AutoCAD. As a result, AutoCAD is the most flexible drafting program available, applicable to all fields. AutoCAD’s support for languages other than English, including those using other alphabets, is unparalleled, making AutoCAD without serious competition abroad. As a result, AutoCAD is used in all disciplines and in more than 150 countries.


Content

  1. AutoCAD Basics
  2. Drawing in Two Dimensions
  3. Working with Data
  4. Drawing in Three Dimensions
  5. Organizing and Managing Drawings
  6. Customizing AutoCAD
  7. Programming AutoCAD



Download PDF Excel Best Practices For Business by Loren Abdulezer


Sinopsis


Often, what people are taught about spreadsheets is the lowest common denominator, just enough to squeak by. These skills can be readily acquired through corporate and continuing education courses. Most people who regularly work with spreadsheets tend to adopt, learn and share common practices—which are not always synonymous with best practices. My goal in writing this book is to get you to elevate the bar, to go beyond the common denominator so that your ability to manipulate spreadsheets is on par with your natural abilities. Spreadsheets are intimidating, so many of us are afraid to go beyond what others have taught us. I
would like to reconnect your good business instincts with your ability to handle spreadsheets, and I have no doubt that you’ll be able to achieve and exceed your expectations.
This chapter introduces you to the various ways you can put to use in your formulas absolute, relative and hybrid expressions. You will also be shown the practical benefits of using one approach over another.
Also, you will find out that the built-in Excel functions are not only about performing arithmetic and mathematical calculations. You will see that Excel introduces specific functions of a spatial nature. Other Excel functions have a temporal nature to them. As I go through this list, it should not surprise you that some Excel functions perform computations specifying precision and fuzziness (and this has nothing to do with “Fuzzy Math”). Did you think I was going to end there? Would it interest you to know that there are Excel functions that can edit text? I’m not talking about functionality, as in features of the Excel product; I am specifically talking about Excel functions that utilize these features in their computations.


Content

  1. A Foundation for Developing Best Practices
  2. Mastering Spreadsheet Construction Techniques
  3. Your Handy Reference for Manipulating Data
  4. Compiling, Managing, and Viewing Your Data
  5. Scaling the Peaks of Mt. Data
  6. Let the Data Speak for Itself: Viewing and Presenting Data
  7. Creating and Using Smart Data
  8. Analyzing Data
  9. How Not to Get Stuck in the MUD (Messed-Up Data)
  10. Special Topics: Getting the Numbers Right
  11. Going for the Facelift: Spreadsheet Makeovers
  12. Spreadsheet Auditing: Challenging the Numbers of Others
  13. Spreadsheet Portals, XML, and Web Services
  14. Assistive Technologies and Assistive Portals

Download PDF Excel Add-in Development in C/C++ Applications in Finance by Steve Dalton


Sinopsis

This book is intended to provide the reader with a guide to the issues involved with creating powerful and reliable add-ins for Excel. With years of use, many people build up the experience and understanding needed to create custom functions for Excel in C and C++. However, given the very limited books and resources available, this can be a largely trial-and-error process. The motivation in writing this book is to create something I wish I had had through the years: a coherent explanation of the relevant technology, what steps to follow, what pitfalls to avoid, and a good reference guide. With these things at your side, writing C/C++ DLL and XLL resources can be almost as easy as writing them in Visual Basic, but yields the enormous performance benefit of compiled C/C++ and the Excel C API.
In setting goals for this book, I was particularly inspired by two excellent books that I have grown to admire more and more over the years, as they have repeatedly proven their worth; The C Programming Language (Kernighan and Ritchie) and Numerical Recipes in C (Press, Teukolsky, Vetterling and Flannery), albeit that the style of C-coding of the latter can be somewhat dense. If this book achieves a fraction of the usefulness of either of these then you will, I hope, be happy to own it and I will be happy to have written it. 

This book is intended for anyone with at least solid C and/or C++ foundation skills, a good working knowledge of Excel, a little experience with VBA (though not necessary) and the need to make Excel do things it doesn’t really want to do, or do them faster, more cleanly, more flexibly. A reasonable grasp of basic software development concepts and techniques is assumed. (Section 1.1 Typographical and code conventions used in this book, on page 1, provides more detail of the coding style of the examples given.)
The example add-in project included on the CD ROM is intended to demonstrate some of the most important or difficult concepts described in the book, as well as the possibilities that are opened up when you can really play with Excel. These reflect my professional background in the financial markets, although if you are not of that world, you should still find that the techniques described are very widely applicable.
There is an enormous amount of material that could have been included in a book on this subject that has either been pared down to the briefest of coverage or omitted completely. I fully accept that there will be those who, perhaps rightly, feel that certain things should have been covered in a book that boasts such a title, and I can only apologise. Any future editions will, I hope, provide an opportunity to rectify the most heinous and unpopular of these shortcomings.




Content

  1. Excel Functionality
  2. UsingVBA
  3. Creating a 32-bit Windows (Win32) DLL Using Visual C++ 6.0 or Visual Studio .NET
  4. Turning DLLs into XLLs: The Add-in Manager Interface
  5. Passing Data between Excel and the DLL
  6. Memory Management
  7. Accessing Excel Functionality Using the C API
  8. Miscellaneous Topics
  9. Example Add-ins and Financial Applications



Download PDF MySQL and Java Developer’s Guide by Mark Matthews, Jim Cole and Joseph D. Gradecki



Sinopsis

Have you ever been assigned a project and realized that you had no idea how you were going to accomplish it? Many developers have experienced this feeling when asked to interface their code with a database.
 
With a few exceptions, most developers were busy learning Lisp, linked lists, and big-O notation during their formal education instead of learning the fundamentals of relationship database management systems. When the time comes to interface their code with a database, they turn to a book like the one you are holding.
 
Your challenge might be to write a Web-based system using servlets and Enterprise JavaBeans (EJBs) to transfer shipping records from the home office in Bend, Oregon, to a satellite shipper in New Jersey. Or perhaps your father just opened his new medical office and you volunteered to create a scheduling system over the weekend.
 
Whatever the situation, interfacing an application to a database is one of the most fundamental tasks a developer is required to perform. This book is designed for developers who either have a pressing task ahead of them or who are curious about how to read database information into their application. By combining MySQL, the number-one open source database available, with Java, the most portable language ever developed, you can create an undisputable champion. So, sit back in your desk chair with a hot chocolate and get ready to supercharge your coding.



Content


  1. An Overview of MySQL
  2. JDBC and Connector/J
  3. Working with MySQL SQL
  4. Installing MySQL, Java, and Connector/J
  5. Using JDBC with Java Applications and Applets
  6. Achieving Advanced Connector/J Functionality with Servlets
  7. MySQL Type Mapping
  8. Transactions and Table Locking with Connector/J
  9. Using Metadata
  10. Connection Pooling with Connector/J
  11. EJBs with MySQL
  12. Building a General Interface for MySQL
  13. Database Administration
  14. Performance and Tuning







Download PDF MySQL®/PHP Database Applications, Second Edition by Brad Bulger, Jay Greenspan, and David Wall


Sinopsis


Soon we will head off on a fabulous journey, a journey on which we will explore the ins and outs of MySQL and PHP database applications in great detail. It’s goingto be a fun trip; we just know it.
 
Okay, maybe we’re being a bit optimistic. If you’re anything like us, points of this particular journey will be a lot more tedious than they are exciting. Let’s face facts: Application development isn’t always the most exciting thing in the world. And as with any other venture that involves programming, some very frustrating times are sure to be ahead, whether because of a syntax error you can’t find or a piece of code that won’t do what you think it ought to do. But despite all that, here you are, and we think there is a very good reason for that.
 
Web applications are the present and the future. No matter your background, whether you have a history with Visual Basic or COBOL, or maybe just some HTML and JavaScript, your rĂ©sumĂ© is only going to improve with some Web application development experience. We don’t think there’s a better combination of tools to have under your belt than PHP and MySQL. The numbers bear us out. PHP and MySQL are becoming increasingly popular, and the demand for people who can use these tools will only increase.
 
A bit later in this introduction we go into a more detailed explanation of why you should use PHP and MySQL. However, before we can get to that, we want take a bit of time to go over the architecture of Web applications. Once we’ve done this, we can explain in detail why PHP and MySQL should be the centerpieces of your application-development environment. Once we’ve sold you on these tools, we present
a very quick and grossly under-coded application. As you look over this application, you can see the basic syntax and principles behind PHP and MySQL.




Content

  1. Working with MySQL
  2. Database Design with MySQL
  3. The Structured Query Language for Creating and Altering Tables
  4. The Structured Query Language for Inserting, Editing, and Selecting Data
  5. Working with PHP
  6. Getting Started with PHP Variables
  7. Control Structures
  8. PHP’s Built-in Functions
  9. Writing Organized and Readable Code
  10. Simple Applications
  11. Guestbook 2003, the (Semi-)Bulletproof Guestbook
  12. Survey
  13. Not So Simple Applications
  14. Threaded Discussion
  15. Content-Management System
  16. Catalog
  17. Problem-Tracking System
  18. Shopping Cart
  19. XML Parsing
  20. SOAP
  21. Project Management





 

Download PDF MySQL Enterprise Solutions by Alexander “Sasha” Pachev


Sinopsis


MySQL has penetrated the enterprise in a way that perhaps would be odd for a typical proprietary application, but is very common for an open-source package. Developers brought it in through the back door, and sometimes by the time management found out, developers had a working solution based on MySQL with zero database licensing costs. This often won acceptance for MySQL at both the management and development levels.
 
Some prominent users of MySQL have publicly released the fact that they are using MySQL and somewhat elaborated on their use, which allows us to talk about them in this book. Others are using it in production frequently under heavy load but treat this information as a trade secret. The organizations I mention in this section have made their use of MySQL public, so we can discuss a few details about their implementations. The companies listed here are the tip of the iceberg.
 
MySQL AB collects user stories and publishes them at www.mysql.com/ press/user_stories/, so you might want to check there for more information.



Content

  1.  Bringing MySQL into Your Enterprise
  2. Overview of MySQL
  3. Selecting a Platform for MySQL Server
  4. Installing MySQL
  5. Testing Your MySQL Installation
  6. Access Control and Security
  7. Developing MySQL Applications
  8. Choosing the Client Language and Client-Server Network Architecture
  9. MySQL Client in a Web Environment
  10. C/C++ Client Basics
  11. PHP Client Basics
  12. Perl API Basics
  13. Java Client Basics
  14. Writing the Client for Optimal Performance
  15. Maintaining and Optimization
  16. Table Design
  17. Configuring the Server for Optimal Performance
  18. Analyzing and Improving Server Performance
  19. Replication
  20. Backup and Table Maintenance
  21. Exploring MySQL Server Internals







Download PDF MySQL™ Bible by Steve Suehring


Sinopsis


The telephone company that owns my area stores basic information about me—first and last name, address, city, state, ZIP code, and telephone number—information that’s not only basic but also common across almost all customer databases. Beyond the basic information, the local telephone company also requires my social security number (which helps them find me should I attempt to forego payment and leave the area).
 
Within the telephone company database is a system to keep notes and correspondence. For example, each time I call to talk with a customer service representative, a note goes into my file—indicating what I was calling about, the outcome (if any), as well as the date, time, and representative’s name—all of which is recorded automatically when the note is entered.
 
Beyond the personal information and correspondence notes, the telephone company database also serves as a billing system that generates my phone bill automatically on the fourth day of every month. The database tracks what services I have (such as Call Waiting, Caller ID, and so forth), associates each service with a price, and tallies my bill for the month.
 
Having customer, billing, and rate information in a database allows the telephone company to produce reports that can pinpoint how many customers have a certain rate group, how many live in a certain area, how many have delinquent payments, and so on.
 
Beyond customer reports, the telephone company has become much more sophisticated in its use of the data. Previously when I would call for customer service, I would get to talk to a live person after a bit of a wait. They then improved their customer service by allowing me to punch in my 10-digit telephone number and look up my records. From there, I might eventually get to talk to a live person (if I didn’t select any of the common tasks on the voice-mail menu). The latest improvement is the use of caller identification to ask me whether I’m calling in regard to the number that I’m calling from. After more menus and prompts, I may be able to reach a live operator.
 
Behind the scenes during this process is a database that can look up my information when it is fed my 10-digit number. The telephone company database can then give me choices based on the current status of my account. I once had the misfortune of fraudulent charges on my telephone bill—about $650 worth. I immediately put that amount into dispute and was told to pay my normal $45 bill—but I still
ended up receiving a disconnection notice. When I called back to inquire into the
notice, I was forwarded automatically to the collections department (who, after
some discussion, handed me off to the regular customer service department). Moral: Databases can speed up only those aspects of a transaction that don’t require the use of common sense.


Content

  1. Getting Started
  2. Relational Database Management
  3. Preparing for Installation
  4. Linux Installation
  5. Windows Installation
  6. Macintosh Installation
  7. Starting MySQL
  8. Database Concepts and Design
  9. SQL Essentials
  10. Command Line Interface (CLI)
  11. SQL According to MySQL
  12. Database and Data
  13.  Administration
  14.  Server Configurations
  15. Security
  16. Debugging and Repairing Databases
  17. Performance Tuning
  18. Development
  19. Perl Development
  20. PHP Development
  21. ODBC/JDBC
  22.  Advanced Performance
  23.  Replication
  24. Integration of Internet Services
  25. NuSphere Enhanced MySQL




 

Download PDF Concurrent and Distributed Computing in Java by Vijay K. Garg


Sinopsis

Parallel and distributed computing systems are now widely availabli . A parullel system consists of multiple processors that communicate with each otl er using shared memory. As the number of transistors on a chip increases, miiltipro essor chips will become fairly common. With enough parallelism available in applicE :ions, such systerns will easily beat sequential systems in performance. Figure 1.1 5 lows a parallel system with multiple processors. These processors communicate P ith each other using the shared memory. Each processor may also have local mem Iry that is not shared with other processors.
 
We define distributed systems as those computer syst.ems that co kain mult.iple processors connected by a communication network. In these syste 11s processors communicate with each other using messages that are sent over the I 2twork. Such systems are increasingly available because of decrease in prices of coa iuter processors and the high-bandwidth links t o connect them. Figure 1.2 shows t distributed system. The communication network in the figure could be a local ,rea network such as an Ethernet, or a wide area network such as the Internet.
 
Programming parallel and distributed systems requires a different set of tools and techniques than that required by the traditional sequential software. The focus of this book is on these techniques,.



Content


  1. Introduction
  2. Mutual Exclusion Problem
  3. Synchronization Primitives
  4. Consistency Conditions
  5. Wait-Free Synchronization
  6. Distributed Programming
  7. Models and Clocks
  8. Resource Allocation
  9. Global Snapshot
  10. Global Properties
  11. Detecting Termination and Deadlocks
  12. Message Ordering
  13. Leader Election
  14. Synchronizers
  15. Agreement
  16. Transactions
  17. Recovery
  18. Self-stabilization


Download PDF E-learning Tools and Technologies A consumer’s guide for trainers, teachers, educators, and instructional designers by William Horton and Katherine Horton



Sinopsis

Technology doesn’t make e-learning. People do. The right starting point for any exploration of technology is the people for whom the technology is needed. In this chapter, we introduce the cast of characters, help you find your role, and consider what each role requires. We then help you tailor your designs and strategies to the technologies learners already have. And when you’re feeling completely overwhelmed, we point out groups of people who can help you.


Content

  1.  TOOLS AND TECHNOLOGIES FOR E-LEARNING
  2. HARDWARE AND NETWORKS
  3. TOOLS FOR ACCESSING E-LEARNING
  4. TOOLS FOR OFFERING E-LEARNING
  5. TOOLS FOR CREATING E-LEARNING CONTENT
  6. PICKING TOOLS AND TECHNOLOGIES
  7. EVOLUTION, TRENDS, AND BIG IDEAS

Download PDF THE DEFINITIVE GUIDE TO HOW COMPUTERS DO MATH Featuring The Virtual DIY Calculator by Clive “MAX” Maxfield and Alvin Brown


Sinopsis


Why Do We Need to Know this Stuff?
 
The number system with which we are most familiar is the decimal system, which is based on ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. As we shall soon discover, however, it’s easier for electronic systems to work with data that is represented using the binary number system, which comprises only two digits: 0 and 1.
 
Unfortunately, it’s difficult for humans to visualize large values presented as strings of 0s and 1s. Thus, as an alternative, we often use the hexadecimal number system, which is based on sixteen digits that we represent
by using the numbers 0 through 9 and the letters A through F. 

Familiarity with the binary and hexadecimal number systems is necessary in order to truly understand how computers and calculators perform their magic. In this chapter, we will discover just enough to make us dangerous, and then we’ll return to consider number systems and representations in more detail in Chapters 4, 5, and 6.
 
Counting on Fingers and Toes
 
The first tools used as aids to calculation were almost certainly man’s own fingers. It is no coincidence, therefore, that the word “digit” is used to refer to a finger (or toe) as well as a numerical quantity. As the need grew to represent greater quantities, small stones or pebbles could be used to represent larger numbers than could fingers and toes. These had the added advantage of being able to store intermediate results for later use. Thus, it is also no coincidence that the word “calculate” is derived from the Latin word for pebble.
 
Throughout history, humans have experimented with a variety of different number systems. For example, you might use one of your thumbs to count the finger joints on the same hand (1, 2, 3 on the index finger; 4, 5, 6 on the next finger; up to 10, 11, 12 on the little finger). Based on this technique, some of our ancestors experimented with base- 12 systems. This explains why we have special words like dozen, meaning “twelve,” and gross, meaning “one hundred and forty-four” (12 × 12 = 144). The fact that we have 24 hours in a day (2 × 12) is also related to these base-12 systems.
 
Similarly, some groups used their fingers and toes for counting, so they ended up with base-20 systems. This is why we still have special



Content

  1.  Why This Book Is So Cool
  2. Introducing Binary and Hexadecimal Numbers
  3. Computers and Calculators
  4. Subroutines and Other Stuff
  5. Integer Arithmetic
  6. Creating an Integer Calculator
  7. More Functions and Experiments
  8. Interactive Laboratories
  9. Installing Your DIY Calculator
  10. Addressing Modes
  11. Instruction Set Summary


Download PDF PC Upgrade and Repair Bible: Desktop Edition by Barry Press and Marcia Press


Sinopsis

Computers are indispensable for much of the work and play people do. After years of stagnation during which people focused on office automation and business applications and asked where the value was in the ever faster parade of new systems, PCs have crossed a price and performance threshold. Systems you can buy today for hundreds of dollars, not thousands, have the power to make home movies, store and play your
music, serve as your home darkroom, and enhance a home theater.
They still do office automation, too. As recently as when we wrote the third edition of this book, a computer with that kind of power cost thousands of dollars, and most people used a single PC. Four years later, a PC costing less than $500 can handle almost everything you might do, and a surprisingly large number of homes have three or more computers on a local area network. People’s priorities have shifted to put stability and capability on par with minimum cost and maximum value.



Content


  1. Getting Ready
  2. Why Isn’t the Same Computer Right for Everyone?
  3. PC Overview
  4. Processors and Motherboards
  5. Processors, Cache, and Memory
  6. Buses, Chipsets, and Motherboards
  7. Video
  8. Monitors and Flat Panels
  9. Hard Disks and Disk Arrays
  10. CD and DVD
  11. Removable Storage
  12. Networks and Communications
  13. Modems
  14. Wired and Wireless Networking
  15. Hubs, Switches, Routers, and Firewalls
  16. Configuring a Windows Network
  17. Internet Services, Antivirus, and Anti-Spam
  18. Multimedia and Peripherals
  19. Sound Cards, Speakers, Microphones, and MP3 Players
  20. Digital Cameras, Video Capture, and DVDs
  21. Keyboards and Game Controllers
  22. Mice, Trackballs, and Tablets
  23. Printers, Scanners, and All-in-One Units
  24. Integration
  25. Cases, Cooling, and Power
  26. Laptops and Handheld Computers
  27. You’re Going to Put That Where?
  28. Diagnosis and Repair
  29. Building an Extreme Machine



Download PDF Wi-Fi Toys 15 Cool Wireless Projects for Home, Office, and Entertainment by Mike Outmesguine


Sinopsis


Internet without wires. Think about that for a minute. All of the entertainment, utility, and performance of the Internet yours, without being tied to a desk.Without even being tied to the home or office. Internet without wires...anywhere! Wireless is a growing revolution changing the way people communicate and share ideas. From cell phones to PDAs to mobile computers, wireless access puts you instantly in touch with millions of other people around the planet.Wi-Fi, in particular, is changing how people access the Internet from laptops and PDAs. It’s emerging as an alternative for cellular service, and it may even replace regular telephone lines as voice conversations begin to be re-routed over Wi-Fi networks in larger numbers.
 
Wi-Fi is that subset of wireless communications designed for high-speed Internet access. Sometimes simply referred to as “wireless,” or known by its many-lettered specification IEEE 802.11b, a, g, and so on,Wi-Fi allows compatible devices to connect without cables or physical connections. With speeds far in excess of most cable modem, DSL, and even T1 service,Wi-Fi is rapidly becoming the standard for Internet access. The store shelves are flooded with Wi-Fi access points, clients, music players, network hubs, and printers, and myriad other consumer devices sport Wi-Fi access.Take the Xbox, Playstation 2, and TiVo—these all have Wi-Fi ability now.
 
Remember when people were saying how everything in the house will eventually be wired? How anything from a toaster or refrigerator to a stereo system or television would have Internet access? Well, it’s been some time coming, but with wireless in the home, these are now possibilities. Refrigerators are being sold with Wi-Fi connections, and several products will now connect your digital media from your computer to your television over Wi-Fi. I wonder when my toaster will send me a wireless e-mail when the toast pops?
 
Wireless is awesome, but it is also somewhat limited. The hardware you can buy in the store is mass-marketed and mass-produced. So it doesn’t have that extra edge that power users are looking for. Extra edges like longer range, sharing with friends, saying no to power lines, and finding every access point on your street can be yours with the projects in this book.
 
Wi-Fi Toys was written to help you take wireless to the next level. Go beyond the user manual and build your own projects using this book as your guide.
 
Few things are more liberating than a Wi-Fi connection.



Content

  1. Building Antennas
  2. Building Your Own Wi-Fi Antenna Cable
  3. Building a Classic Paperclip Antenna
  4. Building a Directional Tin Can Antenna
  5. Modifying Your Access Point with a High-Gain Antenna
  6. War Driving—Wireless Network Discovery and Visualization
  7. Gearing Up for War Driving
  8. War Driving with NetStumbler
  9. Mapping Your War Driving Results
  10. Playing with Access Points
  11. Build Your Own Outdoor Access Point
  12. Building a Solar-Powered Wireless Repeater
  13. Creating a Free Wireless Hotspot
  14. Playing Access Point Games
  15. Just for Fun
  16. Wi-Fi Your TiVo
  17. Create a Long-Distance Wi-Fi Link
  18. Deploy a Car-to-Car Wireless Video Link
  19. Making a Dynamic Wireless Digital Picture Frame

Download PDF WAP, Bluetooth, and 3G Programming Cracking the Code by Dreamtech Software Team


Sinopsis


For people on the move, voice communication has been the killer application for many years. The demand for data services by mobile users has increased in recent years, and as a result, new protocols have emerged for providing wireless Internet access. The demand for multimedia services is now paving the way for high-speed, wireless networks that can support innovative applications combining data, graphics, voice, and video. In this chapter, we review the evolution of wireless networks and the applications supported by these networks. We also look at the new languages and tools used to develop content for various applications. Because of industry efforts to support multimedia services, mobile devices are evolving into powerful gadgets. This chapter also contains a brief overview of these developments.

The cellular networks developed in the 1960s and 1970s were mostly analog systems that supported voice communication. Subsequently, digital mobile communication networks, which are known as the second generation (2G) wireless networks, came into vogue. The 2G networks aren’t based on international standards, but on regional standards developed in North America and Europe. North American standards include IS 136 and IS 95A (IS stands for Interim Standard), and the European systems are based on GSM (Global System for Mobile Communications). Asian and African countries adapted the North American and European standards. These 2G networks support data rates up to a maximum of 14.4 Kbps. Hence, applications supported on these networks are capable of handling only text and low-resolution graphics.

The 2G networks are now evolving into 2.5G networks, which can support data rates in the range of 64 to 144 Kbps. Examples of 2.5G networks are the IS 95B standard-based networks that evolved from IS95A networks and the GPRS (General Packet Radio Service) networks built over the GSM networks. These networks can support high-speed data services such as high-resolution graphics and animation, audio, and low bit rate video services.
 
The 2.5G networks will, in turn, evolve into third generation (3G) networks, which will support data rates in the range of 384 to 2048 Kbps. The standardization efforts of many international bodies resulted in a few proposals for 3G networks; however, a single standard has not evolved, mainly because the 3G networks have to evolve from the existing networks. Two standards that are likely to find wide acceptance are W-CDMA (Wideband Code Division Multiple Access) systems, which evolve from GSM systems; and cdma2000 systems, which evolve from IS 95B systems. As these networks support higher data rates, they will be able to support full-fledged multimedia applications with streaming audio and video.


Content


  1. WAP, Bluetooth, and 3G: A Brief Introduction
  2. WML and WML Script Programming: A Case Study
  3. WAP Using Cold Fusion: A Project
  4. WTA: An Advanced Interaction Technique for Mobile Phones
  5. Integrating Java with WAP
  6. Push Technology in WAP
  7. Bluetooth: A Basic Introduction
  8. Using WAP with Bluetooth
  9. Bluetooth Programming
  10. An Overview of 3G
  11. Advanced 3G Programming
  12. 3G Programming Using BREW
  13. Voice and Video Communication over IP and Mobile IP Networks
  14. The Future of Wireless Networks


Download PDF Windows® XP for Power Users: Power Pack by Curt Simmons



Sinopsis


AT FIRST GLANCE, THE Windows XP interface is radically different than the typical Windows interface used in the past. In fact, the first boot of Windows XP often leaves new users a bit shocked when they see a virtually empty desktop. The good news is the sleek Windows XP interface is easy to use, and it provides you with plenty of configuration options so that you can make Windows XP look just the way you want. This first chapter takes a look at the Windows XP interface. It shows you how to configure all of the interface items and features so that Windows XP meets your needs.

The Windows XP Start menu is a bit different than the Start menu found in previous versions of Windows. The Start menu still provides you with access to different programs and portions of Windows XP, and its goal has not changed. The purpose of the Start menu is to . . . well . . . start something. It provides you with access to documents and programs, but also operating system features and easy access to the things you use most of the time.
 
The Start menu in Windows XP provides you with a two-column design, shown in Figure 1-1. At the top of the Start menu, you see your username and photo icon configured for use with your username. In the left column, you see access to several programs, and the right column gives you access to files and other portions of the operating system.


Content

  1. Configuring the Windows XP Interface
  2. Managing Users
  3. Working with Applications
  4. Using Digital Media on Windows XP
  5. Startup, Shutdown, and Power Management
  6. Managing Hardware on Windows XP
  7. Managing the Hard Disk
  8. Working with Folders and Files
  9. Working with the Registry
  10. Working with the Microsoft Management Console
  11. Networking on a Workgroup
  12. Networking in Windows Networks
  13. Remote Networking
  14. Internet Access, ICS, and ICF
  15. Sharing and Security
  16. Auditing and Disk Quotas
  17. Backing Up and Restoring Data
  18. Monitoring and Managing System Performance
  19. System Failure and Recovery
  20. Customizing with Windows XP PowerToys
  21. Scripting with Windows XP


Download PDF Windows Vista The L Line™, The Express Line to Learning by Michael Meskers


Sinopsis

Windows Vista might well be the personal computer’s first gigabyte application. Unlike other consumer-based applications that still arrive on a CD distribution (capacity about 650 megabytes [MB]), Vista arrives on a DVD (capacity about 4.7 gigabytes [GB], which is approximately seven times that of a CD). The reason Vista now arrives on a DVD instead of a CD is twofold. First, Vista’s installation DVD includes all five versions of Microsoft’s new operating system. The second, more significant, reason is that Vista’s new visually enhanced applications require much more space to run and install than previous editions of Windows. In other words, Vista’s new graphics features and computing capabilities take up more memory space, or RAM, to run properly.
 
The downside to this increase in system requirements is that older computers might not have enough free space on their hard drives to run Vista. If they do happen to contain enough memory to run Microsoft’s new operating system, they might not have enough space left to run other third-party applications, or they might experience slower processing times when running Vista and additional third-party applications.
 
Vista might also require that the drivers for some peripherals  including Web cameras and Internet network adapters that worked with earlier versions of Windows be updated, or they might no longer be compatible with this version of Windows, in which case you must acquire (or download) new versions of these tools. Vista requires an order of magnitude more of everything to run properly  RAM, CPU speed, graphics adapter, even network adapter. However, later I discuss the Vista Upgrade Advisor, which will tell you immediately whether your existing system can run Vista and if so at what level.
 
However, Microsoft is banking that the overall user experience of Windows Vista provides you with enough positive benefits to either purchase a new computer with Vista preinstalled or upgrade your current computer to include Vista. The new layout and functionality of Windows Vista is designed to let you find, organize, and view computer files in an easier, more intuitive, manner. This additional functionality is meant to streamline your overall computing experience. Vista’s improved security, digital entertainment features, and productivity tools are all incentives meant to persuade you to invest your time (and money) into using Vista.
 
Windows Vista is by far the most complex and the most multifunctional version of Windows that Microsoft has ever produced. It needs lots of breathing room as well as a whole lot more sheer graphical and computing power in terms of CPU speed, main memory, and graphics adapter memory. However, after you are exposed to the bright and flashy colors of Vista, previous versions of Windows pale in comparison.


Content

  1. Installing Windows Vista
  2. Using the Windows Vista Desktop
  3. Welcome to Internet Explorer 7
  4. Security, Privacy, and Parental Controls in Windows Vista
  5. Working More Efficiently with Applications, Files, and Folders
  6. Working with Vista’s Free Tools
  7. Connecting to the Outside World
  8. Adding (And Removing) Additional Programs and Devices with Vista
  9. Working with Digital Media
  10. Maximizing Your Windows Power and Performance
  11. Keeping Up, Backing Up, Disaster and Recovery
  12. Getting Help and Support