Best of
Computer-Science

2003

Linux Kernel Development


Robert Love - 2003
    The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book:An all-new chapter on kernel data structuresDetails on interrupt handlers and bottom halvesExtended coverage of virtual memory and memory allocationTips on debugging the Linux kernelIn-depth coverage of kernel synchronization and lockingUseful insight into submitting kernel patches and working with the Linux kernel community

Domain-Driven Design: Tackling Complexity in the Heart of Software


Eric Evans - 2003
    "His book is very compatible with XP. It is not about drawing pictures of a domain; it is about how you think of it, the language you use to talk about it, and how you organize your software to reflect your improving understanding of it. Eric thinks that learning about your problem domain is as likely to happen at the end of your project as at the beginning, and so refactoring is a big part of his technique. "The book is a fun read. Eric has lots of interesting stories, and he has a way with words. I see this book as essential reading for software developers--it is a future classic." --Ralph Johnson, author of Design Patterns "If you don't think you are getting value from your investment in object-oriented programming, this book will tell you what you've forgotten to do. "Eric Evans convincingly argues for the importance of domain modeling as the central focus of development and provides a solid framework and set of techniques for accomplishing it. This is timeless wisdom, and will hold up long after the methodologies du jour have gone out of fashion." --Dave Collins, author of Designing Object-Oriented User Interfaces "Eric weaves real-world experience modeling--and building--business applications into a practical, useful book. Written from the perspective of a trusted practitioner, Eric's descriptions of ubiquitous language, the benefits of sharing models with users, object life-cycle management, logical and physical application structuring, and the process and results of deep refactoring are major contributions to our field." --Luke Hohmann, author of Beyond Software Architecture "This book belongs on the shelf of every thoughtful software developer." --Kent Beck "What Eric has managed to capture is a part of the design process that experienced object designers have always used, but that we have been singularly unsuccessful as a group in conveying to the rest of the industry. We've given away bits and pieces of this knowledge...but we've never organized and systematized the principles of building domain logic. This book is important." --Kyle Brown, author of Enterprise Java(TM) Programming with IBM(R) WebSphere(R) The software development community widely acknowledges that domain modeling is central to software design. Through domain models, software developers are able to express rich functionality and translate it into a software implementation that truly serves the needs of its users. But despite its obvious importance, there are few practical resources that explain how to incorporate effective domain modeling into the software development process. Domain-Driven Design fills that need. This is not a book about specific technologies. It offers readers a systematic approach to domain-driven design, presenting an extensive set of design best practices, experience-based techniques, and fundamental principles that facilitate the development of software projects facing complex domains. Intertwining design and development practice, this book incorporates numerous examples based on actual projects to illustrate the application of domain-driven design to real-world software development. Readers learn how to use a domain model to make a complex development effort more focused and dynamic. A core of best practices and standard patterns provides a common language for the development team. A shift in emphasis--refactoring not just the code but the model underlying the code--in combination with the frequent iterations of Agile development leads to deeper insight into domains and enhanced communication between domain expert and programmer. Domain-Driven Design then builds on this foundation, and addresses modeling and design for complex systems and larger organizations.Specific topics covered include:Getting all team members to speak the same language Connecting model and implementation more deeply Sharpening key distinctions in a model Managing the lifecycle of a domain object Writing domain code that is safe to combine in elaborate ways Making complex code obvious and predictable Formulating a domain vision statement Distilling the core of a complex domain Digging out implicit concepts needed in the model Applying analysis patterns Relating design patterns to the model Maintaining model integrity in a large system Dealing with coexisting models on the same project Organizing systems with large-scale structures Recognizing and responding to modeling breakthroughs With this book in hand, object-oriented developers, system analysts, and designers will have the guidance they need to organize and focus their work, create rich and useful domain models, and leverage those models into quality, long-lasting software implementations.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

The Art of UNIX Programming


Eric S. Raymond - 2003
    This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of hackers the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions


Gregor Hohpe - 2003
    The authors also include examples covering a variety of different integration technologies, such as JMS, MSMQ, TIBCO ActiveEnterprise, Microsoft BizTalk, SOAP, and XSL. A case study describing a bond trading system illustrates the patterns in practice, and the book offers a look at emerging standards, as well as insights into what the future of enterprise integration might hold. This book provides a consistent vocabulary and visual notation framework to describe large-scale integration solutions across many technologies. It also explores in detail the advantages and limitations of asynchronous messaging architectures. The authors present practical advice on designing code that connects an application to a messaging system, and provide extensive information to help you determine when to send a message, how to route it to the proper destination, and how to monitor the health of a messaging system. If you want to know how to manage, monitor, and maintain a messaging system once it is in use, get this book.

Data Structures Through C In Depth


Deepali Srivastava - 2003
    It describes the theory with examples step by step. It contains the description of writing tehse steps in programs in very easy and understanble manner.

Practical Cryptography


Niels Ferguson - 2003
    The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

A Computer Called Leo: Lyons Teashops and the World's First Office Computer


Georgina Ferry - 2003
    The Lyons teashops were one of the great British institutions, providing a cup of tea and a penny bun through the depression, the war, austerity and on into the 1960s and 1970s. Yet Lyons also has a more surprising claim to history. In the 1930s John Simmons, a young graduate in charge of the clerks' offices that totalled all the bills issued by the Nippies and kept track of the costs of all the tea, cakes and other goods distributed to the nation's cafes and shops, became obsessed by the new ideas of scientific management. He had a dream: to build a machine that would automate the millions of tedious transactions and process them in as little time as possible.

Thinking in C++, Vol. 2: Practical Programming


Bruce Eckel - 2003
    Learn practical programming and best practices. Meet the difficult challenges of C++ development. Build reliable and robust programs. Design Patterns chapter shows sophisticated use of objects, composition and polymorphism. Provides a gentle introduction to multithreaded programming, a feature being considered for the next version of Standard C++. Defensive Programming chapter includes a simple unit-testing framework and debugging techniques. In-depth treatment of Standard C++ Library facilities including strings, iostreams, and the "STL" algorithms and containers. Modern usage of templates, including template metaprogramming. Unravels the perplexities of multiple inheritance. Shows practical uses for RTTI. Explores exception handling in depth and clearly explains exception-safe design. Compliant with the official ISO C++ Standard. Presents results of current research being considered for inclusion in the next revision of Standard C++. All code examples freely downloadable, tested on multiple platforms and compilers including the free GNU C++ compiler on Windows/Mac/Linux. On www.BruceEckel.com: Annotated Solutions Guide Seminars and consulting Free Download—Volume I of this book Annotation Thinking in C++ is ideal for anyone already familiar with C who now wants to learn C++. Eckel has synthesized more than five years of C++ teaching and programming experience into a well-structured course that moves step-by-step through each important C++ concept. He highlights poorly-understood C++ features like virtual functions, which can improve productivity. Editorial Reviews The Barnes & Noble Review Bruce Eckel, one of the world's best programming trainers, has thoroughly updated his classic THINKING IN C++—the book that won the Software Development Magazine Jolt Cola award in its first iteration. The new version is better than ever—which is to say, it's

Advanced Global Illumination


Philip Dutre - 2003
    It discusses a broad class of algorithms for realistic image synthesis and introduces a theoretical basis for the algorithms presented. Topics include: physics of light transport, Monte Carlo methods, general strategies for solving the rendering equation, stochastic path-tracing algorithms such as ray tracing and light tracing, stochastic radiosity including photon density estimation and hierarchical Monte Carlo radiosity, hybrid algorithms, metropolis light transport, irradiance caching, photon mapping and instant radiosity, beyond the rendering equation, image display and human perception. If you want to design and implement a global illumination rendering system or need to use and modify an existing system for your specific purpose, this book will give you the tools and the understanding to do so.

Hacking the Xbox: An Introduction to Reverse Engineering


Andrew Huang - 2003
    The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.

FoxTales: Behind the Scenes at Fox Software


Kerry Nietz - 2003
    Recounted are the triumphs and struggles that the development team went through as they learned how to build personal computer database software that eventually became best-of-breed and trounced the competition. Former employee Kerry Nietz describes his interview at Fox, his job offer, his first days as a rookie programmer, and the tumultuous events of the late 1980s and early 1990s, including the lawsuit filed by Ashton-Tate and the merger/acquisition by Microsoft. Recounted are the varied personalities on the team, including the sometimes off-the-wall management team, and how the outside world appeared to a group of developers who spent their lives staring at computer screens, trying to ship another batch of code.

Computability Theory


S. Barry Cooper - 2003
    This theory includes a wide spectrum of topics, such as the theory of reducibilities and their degree structures, computably enumerable sets and their automorphisms, and subrecursive hierarchy classifications. Recent work in computability theory has focused on Turing definability and promises to have far-reaching mathematical, scientific, and philosophical consequences.Written by a leading researcher, Computability Theory provides a concise, comprehensive, and authoritative introduction to contemporary computability theory, techniques, and results. The basic concepts and techniques of computability theory are placed in their historical, philosophical and logical context. This presentation is characterized by an unusual breadth of coverage and the inclusion of advanced topics not to be found elsewhere in the literature at this level.The book includes both the standard material for a first course in computability and more advanced looks at degree structures, forcing, priority methods, and determinacy. The final chapter explores a variety of computability applications to mathematics and science.Computability Theory is an invaluable text, reference, and guide to the direction of current research in the field. Nowhere else will you find the techniques and results of this beautiful and basic subject brought alive in such an approachable and lively way.

Tricks of the 3D Game Programming Gurus-Advanced 3D Graphics and Rasterization


André LaMothe - 2003
    We now have the technology to create games that look real, but, all this technology isn't easy or trivial to understand. This book will give readers the knowledge to create a full 3D, texture-mapped, lit video game for the PC with a software rasterizer they can write themselves. They could also understand the underlying principles of 3D graphics and be able to better understand and utilize 3D hardware today and in the future.

Foundations of Algorithms Using C++ Pseudocode


Richard Neapolitan - 2003
    Numerous examples are provided to illustrate the theoretical concepts. As it assumes a background in algebra and discrete structures, the book is best sui

Cisco Networking Academy Program IT Essentials II: Network Operating Systems Companion Guide


Cisco Systems Inc. - 2003
    This book and its companion titles from Cisco Press prepare students for the CompTIA Server+ certification exam and, when studied in conjunction with the Fundamentals of UNIX course and its related titles, the CompTIA Linux+ certification exam. It introduces readers to basic networking concepts, NOS management and administration, and network security. It also includes an overview of Windows NT/2000, Windows XP, Linux, and Novell NetWare. This book prepares readers to become server systems specialists who can perform basic installation, operation, administration, and troubleshooting services.Cisco Press is a collaboration between Cisco Systems, Inc., and Pearson Education that is charged with developing high-quality, cutting-edge educational and reference products for the networking industry. The products in the Cisco Networking Academy Program series are designed to prepare students for careers in the exciting networking field. These products have proven to be strong supplements to the web-based curriculum and are the only print companions that have been reviewed and endorsed by Cisco Systems for Cisco Networking Academy Program use.Companion CD-ROM This companion CD-ROM contains comprehensive exam questions, interactive e-Lab activities, high- resolution photographs, and video vignettes covering network operating systems.

The Fun of Programming


Jeremy Gibbons - 2003
    In this textbook, the leading researchers of the field take you on a tour of the current hot topics in functional programming, with applications ranging from financial contracts to circuit design. There are also chapters on new idioms for structuring programs, such as monads and arrows. All new concepts are illustrated with many examples, and exercises appear throughout to further enliven the material. Several of the chapters describe a substantial piece of software, and most of these programs are collected on a website for free downloading.This book was edited in honour of Richard S.Bird, Professor of Computer Science at the University of Oxford, on his 60th birthday.

Security+ Certification All-in-One Exam Guide


Gregory B. White - 2003
    Youâ��ll find exam objectives at the beginning of each chapter, helpful exam tips, end-of-chapter practice questions, and photographs and illustrations. The bonus CD-ROM contains a testing engine with questions found only on the CD. This comprehensive guide not only helps you pass this challenging exam, but will also serve as an invaluable on-the-job reference.

Debugging Applications for Microsoft .NET and Microsoft Windows


John Robbins - 2003
    Learn lethally effective, real-world application debugging techniques for .NET Framework 1.1 and Windows with this fully updated programming guide. Debugging expert John Robbins expands the first edition of his classic debugging book with all-new scenarios and bug-killing tools, tips, and techniques. You’ll see every .NET and Windows debugging scenario here—from XML Web services and Microsoft ASP.NET to Windows services and exceptions. Along with John’s expert guidance, you get more than 6 MB of his battle-tested source code—for the tools and tactics you need to ship better software faster!Topics covered include:Where bugs come from and how to think about solving them Debugging during coding Operating system debugging support and how Win32 debuggers work Advanced debugger usage and .NET debugging with Visual Studio .NET Advanced native code techniques with Visual Studio .NET and WinDBG Extending the Visual Studio .NET integrated development environment Managed exception monitoring Flow tracing and performance Finding source and line information with just a crash address Crash handlers Debugging Windows services and DLLs that load into services Multithreaded deadlocks Automated testing The Debug C run-time library A high-performance tracing tool for server applications Smoothing the working set Appendixes: Reading Dr. Watson log files, plus resources for .NET and Windows developers CD-ROM features:6+ MB of professional-level source code samples written in Microsoft Visual C++®, Visual C#®, and Visual Basic® .NET Debugging Tools for Windows Microsoft .NET Framework 1.1 SDK Windows Application Compatibility Toolkit (ACT) A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Create Your Own Employee Handbook: A Legal & Practical Guide for Employers [With CDROM]


Lisa Guerin - 2003
    Every company, no matter how big or small, needs to provide workers with an employee handbook. "Create Your Own Employee Handbook" gives you all the information and policies managers, HR professionals and business owners need to create their own reader-friendly guide, no matter what state you live in. Each chapter covers a different topic, including: at-will employmenthiringpay and payrollworkdays and hoursperformance evaluationsbenefitsdiscrimination and harassmentcomplaints and investigationsleavehealth and safetysubstance abuseprivacy in the workplacediscipline You'll get the lowdown on the legal and practical considerations that apply to each topic in your state, plus sample policies that you can use as-is, or tailor to meet your needs. The CD-ROM lets you cut-and-paste the language you need to complete your own handbook instantly. The 4th edition is completely updated to include the latest developments in federal and state law, and covers emerging workplace issues such as lactation breaks, instant messaging, and new regulations for dealing with victims of domestic violence.

Beginning J2ee 1.4: From Novice to Professional


James L. Weaver - 2003
    Progression to the Enterprise Edition of the SDK is likely to be a natural choice for many, simply because so much professional java programming effort is deployed in developing network-based applications. However, getting into developing Web Services and Enterprise Applications generally is more of a giant leap than a small step, simply because of the vast range of programming topics, technologies, and standards you have to master. This book is a very good starting point because it provides you with a structured introduction to most of what you need to know. The previous edition of this book provided an excellent introduction to server-side programming using the java 2 Platfarm, Enterprise Edition, j2EE, and this new edition is even better, having been fully updated to cover the latest version, j2EE 1. 4. In a single book package, it covers all of the key capabilities provided by thej2EE 1. 4 that you are most likely to need in a real-worldjava development contex

Making reliable distributed systems in the presence of software errors


Joe Armstrong - 2003
    

Best Damn Firewall Book Period


Robert Shimonski - 2003
    Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth. The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them? The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure. The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book. - This book is all encompassing, covering general Firewall issues and protocols, as well as specific products.- Anyone studying for a security specific certification, such as SANS' GIAC Certified Firewall Analyst (GCFW) will find this book an invaluable resource.- The only book to cover all major firewall products from A to Z: CheckPoint, ISA Server, Symatec, BlackICE, PIX Firewall and Nokia.

Encyclopedia of Computer Science and Technology


Harry Henderson - 2003
    With more than 150 black-and-white photographs and illustrations, this title provides an examination of this fascinating field for students and general readers. It covers major corporations and organizations in the computer field.

Data Structures Using Java


Moshe J. Augenstein - 2003
    Many worked examples and approximately 300 additional examples make this book easily accessible to the reader. Most of the concepts in the book are illustrated by several examples, allowing readers to visualize the processes being taught. Introduces abstract concepts, shows how those concepts are useful in problem solving, and then shows the abstractions can be made concrete by using a programming language. Equal emphasis is placed on both the abstract and the concrete versions of a concept, so that the reader learns about the concept itself, its implementation, and its application. For anyone with an interest in learning more about data structures.

Engineering a Compiler


Keith D. Cooper - 2003
    No longer is execution speed the sole criterion for judging compiled code. Today, code might be judged on how small it is, how much power it consumes, how well it compresses, or how many page faults it generates. In this evolving environment, the task of building a successful compiler relies upon the compiler writer's ability to balance and blend algorithms, engineering insights, and careful planning. Today's compiler writer must choose a path through a design space that is filled with diverse alternatives, each with distinct costs, advantages, and complexities.Engineering a Compiler explores this design space by presenting some of the ways these problems have been solved, and the constraints that made each of those solutions attractive. By understanding the parameters of the problem and their impact on compiler design, the authors hope to convey both the depth of the problems and the breadth of possible solutions. Their goal is to cover a broad enough selection of material to show readers that real tradeoffs exist, and that the impact of those choices can be both subtle and far-reaching.Authors Keith Cooper and Linda Torczon convey both the art and the science of compiler construction and show best practice algorithms for the major passes of a compiler. Their text re-balances the curriculum for an introductory course in compiler construction to reflect the issues that arise in current practice.

Computational Intelligence: An Introduction


Andries P. Engelbrecht - 2003
    The main focus of this text is centred on the computational modelling of biological and natural intelligent systems, encompassing swarm intelligence, fuzzy systems, artificial neutral networks, artificial immune systems and evolutionary computation. Engelbrecht provides readers with a wide knowledge of Computational Intelligence (CI) paradigms and algorithms; inviting readers to implement and problem solve real-world, complex problems within the CI development framework. This implementation framework will enable readers to tackle new problems without any difficulty through a single Java class as part of the CI library.Key features of this second edition include:A tutorial, hands-on based presentation of the material. State-of-the-art coverage of the most recent developments in computational intelligence with more elaborate discussions on intelligence and artificial intelligence (AI). New discussion of Darwinian evolution versus Lamarckian evolution, also including swarm robotics, hybrid systems and artificial immune systems. A section on how to perform empirical studies; topics including statistical analysis of stochastic algorithms, and an open source library of CI algorithms. Tables, illustrations, graphs, examples, assignments, Java code implementing the algorithms, and a complete CI implementation and experimental framework. Computational Intelligence: An Introduction, Second Edition is essential reading for third and fourth year undergraduate and postgraduate students studying CI. The first edition has been prescribed by a number of overseas universities and is thus a valuable teaching tool. In addition, it will also be a useful resource for researchers in Computational Intelligence and Artificial Intelligence, as well as engineers, statisticians, operational researchers, and bioinformaticians with an interest in applying AI or CI to solve problems in their domains.Check out http: //www.ci.cs.up.ac.za for examples, assignments and Java code implementing the algorithms.

Sketches of an Elephant


Peter T. Johnstone - 2003
    Now available in this two volume set, it contains all the important informationboth volumes provides. Considered to be a complete benefit for all researchers and academics in theoretical computer science, logicians and philosophers who study the foundations of mathematics, and those working in differential geometry and continuum physics.

Standard Codecs: Image Compression to Advanced Video Coding


M. Ghanbari - 2003
    It highlights the need for standardisation in processing static and moving images and their exchange between computer systems. ITU and ISO/IEC standards are now widely accepted in the picture/video coding field. The book gives an authoritative explanation of picture and video coding algorithms, working from basic principles through to the advanced video compression systems now being developed. It discusses the reasons behind the introduction of a standard codec for a specific application and its chosen parameter. This book will enable readers to appreciate the fundamentals needed to design a video codec for any given application and should prove to be a valuable resource for engineers working in this field.

Protocol Engineering


Hartmut König - 2003
    This book covers the fundamentals of communication protocols, describes current methods, presents the protocol lifecycle and the most important development stages, and offers examples using the simple data transfer example protocol XDT (eXample Data Transfer).

Computing Patterns in Strings


Bill Smyth - 2003
    The purpose of this text is to provide a general introduction to algorithms for computing patterns in strings that is useful to experienced researchers in this and other fields, but that is also useful to senior undergraduate and graduate students.

Managing a Network Vulnerability Assessment


Thomas R. Peltier - 2003
    Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and procedures that expose a company to the damage caused by malicious network intruders.Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.By following the procedures outlined in this guide, a company can pinpoint what individual parts of their network need to be hardened, and avoid expensive and unnecessary purchases.

Complete Digital Design: A Comprehensive Guide to Digital Electronics and Computer System Architecture


Mark Balch - 2003
    thousands more electronics technicians and hobbyists. With the addition of so many communication topics into EE programs in the past five years, fundamentals of digital design have bene abandoned for a more brief, overview courses, leaving many newly minted EEs undereducated in what should be one of their core competencies. navigate many componenst, architectures and practices which are painfully inter-dependent. This guide allows the reader faced with a design problem to develop a customized set of requirements for that problem, then research and evaluate available components and technologies to solve it.

Handbook of Fingerprint Recognition [With DVD ROM]


Davide Maltoni - 2003
    Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems. This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.

Phase Change: The Computer Revolution In Science And Mathematics


Douglas S. Robertson - 2003
    Phase Change builds on and deepens his assessment of the role of the computer as a tool driving profound change by examining the role of computers in changing the face of the sciences and mathematics. He shows that paradigm shifts in understanding in science have generally been triggered by the availability of new tools, allowing the investigator a new way of seeing into questions that had not earlier been amenable to scientific probing.

Programming Challenges: The Programming Contest Training Manual


Steven S. Skiena - 2003
    Craftsm- ship has its quiet rewards, the satisfaction that comes from building a useful object and making it work. Excitement arrives with the ?ash of insight that cracks a previously intractable problem. The spiritual quest for elegance can turn the hacker into an artist. Therearepleasuresinparsimony, insqueezingthelastdropofperformanceoutofclever algorithms and tight coding. Thegames, puzzles, andchallengesofproblemsfrominternationalprogrammingc- petitionsareagreatwaytoexperiencethesepleasureswhileimprovingyouralgorithmic and coding skills. This book contains over 100 problems that have appeared in previous programming contests, along with discussions of the theory and ideas necessary to - tack them. Instant online grading for all of these problems is available from two WWW robot judging sites. Combining this book with a judge gives an exciting new way to challenge and improve your programming skills. This book can be used for self-study, for teaching innovative courses in algorithms and programming, and in training for international competition. To the Reader Theproblemsinthisbookhavebeenselectedfromover1,000programmingproblemsat the Universidad de Valladolid online judge, available athttp: //online-judge.uva.es.The judgehasruledonwelloveronemillionsubmissionsfrom27,000registeredusersaround the world to date. We have taken only the best of the best, the most fun, exciting, and interesting problems availa

Graph Algorithms (Algorithms in Java, Part 5)


Robert Sedgewick - 2003
    This important work on computer algorithms has been completely revised, greatly expanded, and completely up-to-date.

An Invitation to 3-D Vision: From Images to Geometric Models


Yi Ma - 2003
    This is the study of the reconstruction of 3-D models of objects from a collection of 2-D images. An essential prerequisite for this book is a course in linear algebra at the advanced undergraduate level. Background knowledge in rigid-body motion, estimation and optimization will certainly improve the reader's appreciation of the material but is not critical since the first few chapters and the appendices provide a review and summary of basic notions and results on these topics. Our motivation Research monographs and books on geometric approaches to computer vision have been published recently in two batches: The first was in the mid 1990s with books on the geometry of two views, see e. g. [Faugeras, 1993, Kanatani, 1993b, Maybank, 1993, Weng et aI., 1993b]. The second was more recent with books fo cusing on the geometry of multiple views, see e. g. [Hartley and Zisserman, 2000] and [Faugeras and Luong, 2001] as well as a more comprehensive book on computer vision [Forsyth and Ponce, 2002]. We felt that the time was ripe for synthesizing the material in a unified framework so as to provide a self-contained exposition of this subject, which can be used both for pedagogical purposes and by practitioners interested in this field."

C++ For Game Programmers (Game Development Series)


Noel Llopis - 2003
    Written to address this issue, C++ for Game Programmers provides practical suggestions for what C++ features to use in game development and why. Many of the misconceptions of C++ are clarified, and programmers learn the most effective methods for using the language to create games. This is primarily a book about ideas and concepts: it is not just a source of C++ code to use in your game project. Instead, C++ for Game Programmers covers how things work from a game-development perspective, and provides practical rules to follow. It points out the most effective C++ practices and steers developers away from the potentially dangerous ones. It describes common C++ techniques to solve specific problems faced by most developers, and focuses on techniques that have been proven in real games. Additionally, specific new technologies such as STL are covered in detail, along with the challenges specific to different platforms such as PCs or game consoles. The techniques presented apply to all aspects of game programming, including graphics, physics, and AI. C++ for Game Programmers is the perfect resource for game programmers looking to perfect their C++ skills, and experienced programmers interested in entering the game industry. Graphics, embedded systems, and real-time systems programmers facing the same challenges as game programmers will also benefit from the ideas and techniques covered.

Engineering and Scientific Computations Using MATLAB


Sergey Edward Lyshevski - 2003
    Flexible, powerful, and relatively easy to use, the MATLAB environment has become a standard cost-effective tool within the engineering, science, and technology communities. Excellent as a self-teaching guide for professionals as well as a textbook for students, Engineering and Scientific Computations Using MATLAB helps you fully understand the MATLAB environment, build your skills, and apply its features to a wide range of applications. Going beyond traditional MATLAB user manuals and college texts, Engineering and Scientific Computations Using MATLAB guides you through the most important aspects and basics of MATLAB programming and problem-solving from fundamentals to practice. Augmenting its discussion with a wealth of practical worked-out examples and qualitative illustrations, this book demonstrates MATLAB's capabilities and offers step-by-step instructions on how to apply the theory to a practical real-world problem. In particular, the book features: * Coverage of a variety of complex physical and engineering systems described by nonlinear differential equations * Detailed application of MATLAB to electromechanical systems MATLAB files, scripts, and statements, as well as SIMULINK models which can be easily modified for application-specific problems encountered in practice Readable, user-friendly, and comprehensive in scope this is a welcome introduction to MATLAB for those new to the program and an ideal companion for engineers seeking in-depth mastery of the high-performance MATLAB environment.

Interprocess Communications in Linux: The Nooks and Crannies


John Shapley Gray - 2003
    Coverage includes: named/unnamed pipes, message queues, semaphores, shared memory, RPC and the rpcgen compiler, sockets-based communication, the /proc file system, LinuxThreads POSIX support, multithreading, and much more. Includes detailed exercises, plus dozens of downloadable program examples compiled with GNU C/C++ 2.96 & 3.2 and tested with Red Hat Linux 7.3 & 8.0.

The Worldwide History of Telecommunications


Anton A. Huurdeman - 2003
    how we got there and where we are going The exchange of information is essential for both the organization of nature and the social life of mankind. Until recently, communication between people was more or less limited by geographic proximity. Today, thanks to ongoing innovations in telecommunications, we live in an Information Age where distance has ceased to be an obstacle to the sharing of ideas.The Worldwide History of Telecommunications is the first comprehensive history ever written on the subject, covering every aspect of telecommunications from a global perspective. In clear, easy-to-understand language, the author presents telecommunications as a uniquely human achievement, dependent on the contributions of many ingenious inventors, discoverers, physicists, and engineers over a period spanning more than two centuries.From the crude signaling methods employed in antiquity all the way to today's digital era, The Worldwide History of Telecommunications features complete and fascinating coverage of the groundbreaking innovations that have served to make telecommunications the largest industry on earth, including:Optical telegraphy Electrical telegraphy via wires and cables Telephony and telephone switching Radio transmission technologies Cryptography Coaxial and optical fiber networks Telex and telefax Multimedia applications Broad in scope, yet clear and logical in its presentation, this groundbreaking book will serve as an invaluable resource for anyone involved or merely curious about the ever evolving field of telecommunications.AAP-PSP 2003 Award Winner for excellence in the discipline of the History of Science

Computer Algebra and Symbolic Computation: Mathematical Methods


Joel S. Cohen - 2003
    Applying the ideas introduced in Computer Algebra and Symbolic Computation: Elementary Algorithms, this book explores the application of algorithms to such methods as automatic simplification, polynomial decomposition, and polynomial factorization. This book includes complexity analysis of algorithms and other recent developments. It is well-suited for self-study and can be used as the basis for a graduate course. Maintaining the style set by Elementary Algorithms, the author explains mathematical methods as needed while introducing advanced methods to treat complex operations.

Computational Algebraic Geometry


Henry Schenck - 2003
    Suitable for graduate students, this book brings advanced algebra to life with many examples. The first three chapters provide an introduction to commutative algebra and connections to geometry. The remainder of the book focuses on three active areas of contemporary algebra: homological algebra; algebraic combinatorics and algebraic topology; and algebraic geometry.

Term Rewriting Systems


Jan Willem Klop - 2003
    Their many applications range from automatic theorem proving systems to computer algebra. This book begins with several examples, followed by a chapter on basic notions that provides a foundation for the rest of the work. First-order and higher-order theories are presented, with much of the latter material appearing for the first time in book form. Subjects treated include orthogonality, termination, lambda calculus and term graph rewriting. There is also a chapter detailing the required mathematical background.

Data Mining: Multimedia, Soft Computing, and Bioinformatics


Sushmita Mitra - 2003
    First title to ever present soft computing approaches and their application in data mining, along with the traditional hard-computing approaches Addresses the principles of multimedia data compression techniques (for image, video, text) and their role in data mining Discusses principles and classical algorithms on string matching and their role in data mining

HTML: Top 100 Simplified Tips & Tricks


Paul Whitehead - 2003
    Now you' d like to go beyond, with shortcuts, tricks, and tips that let you work smarter and faster. And because you learn more easily when someone shows you how, this is the book for you. Inside, you' ll find clear, illustrated instructions for 100 tasks that reveal cool secrets, teach timesaving tricks, and explain great tips guaranteed to make you more productive with HTML.

Sams Teach Yourself the C# Language in 21 Days


Bradley L. Jones - 2003
    This book is designed to teach C# from the ground up each lesson is built to supplement the chapter before to provide a fully rounded understanding of the C# language. "Sams Teach Yourself the C# Language in 21 Days" is the only book on the market that takes C# out of the Microsoft Visual Studio and teaches it as a platform-independent language letting readers program for Windows, FreeBSD, and Mac OS X. Additional coverage added from the first edition: more and better Windows Forms information, database access, XML, types, runs, appendix for Visual C++ .NET users, plus much more. This book also includes a CD-ROM full of third-party editor software and sample code, making it an easy-to-use, all-in-one package."

Convex Analysis and Optimization


Dimitri P. Bertsekas - 2003
    Book by Dimitri Bertsekas

Possibilities and Paradox: An Introduction to Modal And Many Valued Logic


J.C. Beall - 2003
    The authors cover the basic formal frameworks, enlivening the discussion of these different systems of logic by considering their philosophical motivations and implications. Easily accessible to students with no background in the subject, the text features innovative learning aids in each chapter, including exercises that provide hands-on experience, examples that demonstrate the application of concepts, and guides to further reading.

Protocols for Authentication and Key Establishment


Colin Boyd - 2003
    The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Digital Video Compression (with CD-ROM)


Peter D. Symes - 2003
    That's why if digitizing video imagery is part of your work or hobby, here's an info-packed volume you need handy at all times: McGraw-Hill's "Digital Video Compression." Written by a renowned expert in digital technology, "Digital Video Compression" offers comprehensive coverage on a vast range of digital media technologies and standards. It delivers everything you need to understand the techniques, tricks, and confusing protocols of compression, as well as: fundamentals of compression; MPEG-2 and MPEG-4 compression standards; JVT / H.264 / MPEG-4 Part 10 - learn the details of the just-released compression standard; and much more!Plus, you get an invaluable CD-ROM of compression tools, encoders, and video clips for practice. With "Digital Video Compression", you're sure to stay out in front of this exploding technology! The book covers: What Is Compression? An Introduction to Images; Entropy Coding; Protective Coding; Transforms; Quantization; JPEG; Motion Compensation; MPEG-1; MPEG-2; MPEG-4; JVT / H.264 / MPEG-4 Part 10; MPEG-7 and MPEG-21; Pro-MPEG and MPEG Operating Ranges; DV Compression; Wavelets; JPEG2000; Audio Compression; and Streaming Media.

The New Everyday: Views on Ambient Intelligence


Stefano Marzano - 2003
    What is Ambient Intelligence? Is it embedding technology into objects? How does it incorporate or cater for universal desires, complex social relationships, different value systems? What about individuals' likes and dislikes, or the sustainability of economic and natural ecosystems? This book explores the increasingly relevant phenomenon of Ambient Intelligence in the form of essays by experts with illustrations.

Business Modeling and Data Mining


Dorian Pyle - 2003
    The concepts and techniques presented in this book are the essential building blocks in understanding what models are and how they can be used practically to reveal hidden assumptions and needs, determine problems, discover data, determine costs, and explore the whole domain of the problem.This book articulately explains how to understand both the strategic and tactical aspects of any business problem, identify where the key leverage points are and determine where quantitative techniques of analysis -- such as data mining -- can yield most benefit. It addresses techniques for discovering how to turn colloquial expression and vague descriptions of a business problem first into qualitative models and then into well-defined quantitative models (using data mining) that can then be used to find a solution. The book completes the process by illustrating how these findings from data mining can be turned into strategic or tactical implementations.-Teaches how to discover, construct and refine models that are useful in business situations-Teaches how to design, discover and develop the data necessary for mining -Provides a practical approach to mining data for all business situations-Provides a comprehensive, easy-to-use, fully interactive methodology for building models and mining data-Provides pointers to supplemental online resources, including a downloadable version of the methodology and software tools.