Foundations of Computer Science


Behrouz A. Forouzan - 2002
    Divided into five parts computer and data, computer hardware, computer software, data organization and with an introduction to some of the more advanced topics Foundations of Computer Science gives students a bird's eye view of the subject. Each chapter includes key terms, summaries, review questions, multiple-choice questions, and exercises to enhance learning, while introducing tools such as UML, structure chart and pseudocode, which students will need in order to succeed in later courses. The text is also supported by numerous figures, examples, exercises, selected solutions and a test bank, all designed to ease and aid the learning process. Updated to cover the latest technologies and changes to course requirements, this second edition features new and updated coverage of: Artificial Intelligence, Computer Ethics and Crimes, Networking, LINUX, and Security.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.

The Art and Science of Java


Eric S. Roberts - 2007
    By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.

The Tcp/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference


Charles Kozierok - 2005
    It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.

Antibiotics Simplified


Jason C. Gallagher - 2008
    This practical text reviews basic microbiology and how to approach the pharmacotherapy of a patient with a presumed infection. It also contains concise Drug Class Reviews with an explanation of the characteristics of various classes of antibacterial drugs and antifungal drugs. Antibiotics Simplified, Third Edition simplifies learning infectious disease pharmacotherapy and condenses the many facts that are taught about antibiotics into one quick reference guide. This guide will help students learn the characteristics of antibiotics and why an antibiotic is useful for an indication. With an understanding of the characteristics of the antibiotics, students will be able to make a logical choice to treat an infection more easily. With helpful figures and flow charts, Drug Class Reviews, a Spectra of Activity chart, and an index for reference, this is an ideal handbook for students as well as practicing pharmacists, physicians, and other clinicians!

The Art of Assembly Language


Randall Hyde - 2003
    The High Level Assembler (HLA) that accompanies the book is the first assembler that allows you to write portable assembly language programs that run under either Linux or Windows with nothing more than a recompile. The CD-ROM includes the HLA and the HLA Standard Library, all the source code from the book, and over 50,000 lines of additional sample code, all well-documented and tested. The code compiles and runs as-is under Windows and Linux.

Reflect & Relate: An Introduction to Interpersonal Communication


Steven McCornack - 2005
    With an emphasis on critical self-reflection, Reflect & Relate gives students the practical skills to work through life's many challenges using better interpersonal communication. The sound theory, clear explanations, lively writing, practical activities, and vibrant design all work toward a single goal: Teaching students to make better communication choices so they can build happier and healthier interpersonal relationships.

Contemporary Marketing


Louis E. Boone - 2007
    The most successful products in the marketplace are those that know their strengths and have branded and marketed those strengths to form a passionate emotional connection with loyal users and relationships with new users every step of the way. In CONTEMPORARY MARKETING, 13e, students will find a text that includes everything they need to know in order to begin a marketing career, as well as things that will help them understand how to look at their own studies and their own careers as a marketing adventure. All the components of the marketing mix are included along with a lot of other compelling and thought-provoking ideas and concepts. Since its first edition, CONTEMPORARY MARKETING continues to showcase the foundations of marketing principles while featuring the newest trends and research in the discipline.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Psychological Testing: Principles, Applications, and Issues


Robert M. Kaplan - 1982
    Robert Kaplan and Dennis Saccuzzo provide students with a current analysis of the most widely used psychological tests in schools, professional training programs, business, industry, the military, and clinical settings. The authors offer a clear picture of how psychological tests are constructed, how they are used, and how an understanding of them can make a difference in their careers and everyday lives. Comprehensive and accurate, yet interesting and personally relevant, this book gets and keeps students' attention through the use of informal discussions and real-life examples.

Introductory Linear Algebra: An Applied First Course


Bernard Kolman - 1988
    Calculus is not a prerequisite, although examples and exercises using very basic calculus are included (labeled Calculus Required.) The most technology-friendly text on the market, Introductory Linear Algebra is also the most flexible. By omitting certain sections, instructors can cover the essentials of linear algebra (including eigenvalues and eigenvectors), to show how the computer is used, and to introduce applications of linear algebra in a one-semester course.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Google Hacking: An Ethical Hacking Guide To Google


Ankit Fadia - 2007
    Google Hacking teaches people how to get the most out of this revolutionary search engine. Not only will this book teach readers how Google works, but it will also empower them with the necessary skills to make their everyday searches easier, more efficient, and more productive. Google Hacking also demonstrates how Google can be used for negative means. It's immense searching power, means that everyone, including cyber criminals, can feasibly access confidential data, such as company presentations, budgets, blueprints, even credit card numbers, with just the click of a mouse. Using numerous examples, case studies, and screenshots, this book explains the art of ethical Google Hacking -- it not only teaches readers how Google works, but it provides them with the knowledge they need to protect their data and systems from getting Google Hacked. This is the only book you need to maximize (and protect yourself) from Google searches!

Essential Research Methods for Social Work


Allen Rubin - 2006
    Illustrations and examples throughout show you how you can apply research to practice. Studying is made easy with a book-specific website that provides you with tutorial quizzes and links to additional related concepts. Outlines, introductions, boxes, chapter endings with main points, review questions and exercises, and internet exercises provide you with the information and practice you need to succeed in this course.

Ethics in Information Technology


George W. Reynolds - 2002
    This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.