Computer Organization


V. Carl Hamacher - 1978
    *A comprehensive overview of hardware and software issues make this a "must-have" for electrical and computer engineers*Contains new material on RISC processors, performance analysis, multiprocessors and memory systems*New two-color design and illustrations illuminate the text

Morgan & Mikhail's Clinical Anesthesiology


John F. Butterworth - 2013
    This trusted classic delivers comprehensive coverage of the field's must-know basic science and clinical topics in a clear, easy-to-understand presentation. Indispensable for coursework, exam review, and as a clinical refresher, this trusted text has been extensively updated to reflect the latest research and developments.Here's why Clinical Anesthesiology is the best anesthesiology resource:NEW full-color presentationNEW chapters on the most pertinent topics in anesthesiology, including anesthesia outside of the operating room and a revamped peripheral nerve blocks chapter that details ultrasound-guided regional anesthesiaUp-to-date discussion of all relevant areas within anesthesiology, including equipment, pharmacology, regional anesthesia, pathophysiology, pain management, and critical careCase discussions promote application of the concepts to real-world practiceNumerous tables and figures encapsulate important information and facilitate memorization

Dating and the Single Parent


Ron L. Deal - 2012
    Now they're looking for help. Ron Deal, who has counseled single parents and remarried couples for many years, helps single parents--as well as those who date them--navigate the potential pitfalls involved. He gives perspective on when a relationship may be harmful to the children as well as how it can be a blessing to all. Always at the forefront is the goal of strengthening families. Includes questions for individual or group study.

Digital Design: Principles and Practices Package


John F. Wakerly - 1990
    Blends academic precision and practical experience in an authoritative introduction to basic principles of digital design and practical requirements. With over 30 years of experience in both industrial and university settings, the author covers the most widespread logic design practices while building a solid foundation of theoretical and engineering principles for students to use as they go forward in this fast moving field.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Absolute Java


Walter J. Savitch - 2003
    Praised for providing an engaging balance of thoughtful examples and explanatory discussion, ?best-selling author Walter Savitch explains concepts and techniques in a straightforward style using understandable language and code enhanced by a suite of pedagogical tools.? "Absolute Java "is appropriate for both introductory and intermediate programming courses introducing Java.

Decision Support Systems and Intelligent Systems


Efraim Turban - 1998
    

Exceptional Ruby: Master the Art of Handling Failure in Ruby


Avdi Grimm - 2011
    Writing code that handles unexpected errors and still works is really hard. Most of us learn by trial and error. This short book removes the uncertainty. With over 100 pages of content and dozens of working examples, you’ll learn everything from the mechanics of how exceptions work to how to design a robust failure management architecture for your app or library. Whether you are a Ruby novice or a seasoned veteran, Exceptional Ruby will help you write cleaner, more resilient Ruby code.

Amazon Simple Storage Service (S3) Getting Started Guide


Amazon Web Services - 2012
    This guide introduces the basic concepts of Amazon S3, the bucket and the object. It walks you through the process of using the AWS Management Console, a browser-based graphical user interface, to create a bucket and then upload, view, move, and delete an object.

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Barron's SAT Subject Test Math Level 2


Richard Ku - 2008
    In chapters that follow, detailed topic reviews cover polynomial, trigonometric, exponential, logarithmic, and rational functions; coordinate and three-dimensional geometry; numbers and operations; data analysis, statistics, and probability; and graphing calculators, their operations and applications. Six full-length model tests with answers, explanations, and self-evaluation charts conclude this manual.

Dynamics of Structures: Theory and Applications to Earthquake Engineering


Anil K. Chopra - 2000
    The new edition from Chopra includes many topics encompassing the theory of structural dynamics and the application of this theory regarding earthquake analysis, response, and design of structures. No prior knowledge of structural dynamics is assumed and the manner of presentation is sufficiently detailed and integrated, to make the book suitable for self-study by students and professional engineers.

Longman Preparation Course for the TOEFL Test: Student Book and CD-ROM with Answer Key: The Next Generation


Deborah Phillips - 2005
    This book gives students all the tools they need to succeed on the new TOEFL integrated-skills test.

PIC Microcontroller and Embedded Systems: Using Assembly and C for PIC18


Muhammad Ali Mazidi - 2007
    Offering numerous examples and a step-by-step approach, it covers both the Assembly and C programming languages and devotes separate chapters to interfacing with peripherals such as Timers, LCD, Serial Ports, Interrupts, Motors and more. A unique chapter on hardware design of the PIC system and the PIC trainer round out coverage. Systematic coverage of the PIC18 family of Microcontrollers. Assembly language and C language programming and interfacing techniques. Thorough coverage of Architectures and Assembly language programming of the PIC18. Thorough coverage of C language programming of the PIC18. Separate chapters on programming and interfacing the PIC with peripherals - Includes information on how to interface the PIC with LCD, keyboard, ADC, DAC, Sensors, Serial Ports, Timers, DC and Stepper Motors, Optoisolators, and RTC. Covers how to program each peripheral, first using the Assembly language and then using the C language. Those involved with PIC programming and interfacing using Assembly and C languages."