Book picks similar to
High Performance Cluster Computing: Architectures and Systems, Vol. 1 by Rajkumar Buyya
career
computers
it-wikipedia
office
Public Relations: Strategies and Tactics
Dennis L. Wilcox - 1986
Now in its Eighth Edition, Public Relations: Strategies & Tactics combines numerous current real-life case studies with fundamental concepts of the field, helping students relate theory to the actual practice of public relations. Grounded in scholarship, the main text and features are all built on references to landmark studies and situations in today's headlines. In this age of corporate and political scandals, terrorism and national health issues, a new chapter, Conflict Management: Dealing with Issues, Risks and Crises, lays the groundwork for understanding and coping with various crises. Written in a disarming and accessible style, this edition also focuses technology in every application, and it leads readers to think about other creative ways to use new media. This edition continues to be the most definitive, comprehensive introductory text in the market, written by two leading public relations educators
The Java Programming Language
Ken Arnold - 1996
As the creators of the Java programming language, the authors help programmers understand why Java is such a powerful language. As a result, the programmers learn how Java is suitable for building a variety of applications. The authors also provide unique "behind-the-scenes" insights into how the language was designed and intended to be used. Thoroughly revised from start to finish, this fourth edition covers all of the features of J2SE 5.0 release. Updates to the fourth edition of this best-seller include concise coverage on generics, metadata, autoboxing, enumerations, enhanced loops, and more.
Mastering the Requirements Process
Suzanne Robertson - 1999
Written by two internationally acclaimed experts on requirements, this text provides software engineers with the insights, techniques and templates to discover exactly what their customers desire for their systems.
C++: How to Program
Harvey Deitel - 2005
It teaches programming by presenting the concepts in the context of full working programs. The fifth edition reflects suggested improvements.
The Next American Metropolis: Ecology, Community, and the American Dream
Peter Calthorpe - 1995
It's under construction, but it should be an interesting resource. Check out the traffic in the land of commuting. And, finally, enjoy Los Angeles: Revisiting the Four Ecologies.
Prioritizing Web Usability
Jakob Nielsen - 2006
Many applauded. A few jeered. But everyone listened. The best-selling usability guru is back and has revisited his classic guide, joined forces with Web usability consultant Hoa Loranger, and created an updated companion book that covers the essential changes to the Web and usability today. "Prioritizing Web Usability" is the guide for anyone who wants to take their Web site(s) to next level and make usability a priority! Through the authors' wisdom, experience, and hundreds of real-world user tests and contemporary Web site critiques, you'll learn about site design, user experience and usability testing, navigation and search capabilities, old guidelines and prioritizing usability issues, page design and layout, content design, and more!
Why Software Sucks...and What You Can Do about It
David S. Platt - 2006
. . . Put this one on your must-have list if you have software, love software, hate programmers, or even ARE a programmer, because Mr. Platt (who teaches programming) has set out to puncture the bloated egos of all those who think that just because they can write a program, they can make it easy to use. . . . This book is funny, but it is also an important wake-up call for software companies that want to reduce the size of their customer support bills. If you were ever stuck for an answer to the question, 'Why do good programmers make such awful software?' this book holds the answer."--John McCormick, Locksmith columnist, TechRepublic.com "I must say first, I don't get many computing manuscripts that make me laugh out loud. Between the laughs, Dave Platt delivers some very interesting insight and perspective, all in a lucid and engaging style. I don't get much of that either!"--Henry Leitner, assistant dean for information technology andsenior lecturer on computer science, Harvard University "A riotous book for all of us downtrodden computer users, written in language that we understand."--Stacy Baratelli, author's barber "David's unique take on the problems that bedevil software creation made me think about the process in new ways. If you care about the quality of the software you create or use, read this book."--Dave Chappell, principal, Chappell & Associates "I began to read it in my office but stopped before I reached the bottom of the first page. I couldn't keep a grin off my face! I'll enjoy it after I go back home and find a safe place to read."--Tsukasa Makino, IT manager "David explains, in terms that my mother-in-law can understand, why the software we use today can be so frustrating, even dangerous at times, and gives us some real ideas on what we can do about it."--Jim Brosseau, Clarrus Consulting Group, Inc. A Book for Anyone Who Uses a Computer Today...and Just Wants to Scream! Today's software sucks. There's no other good way to say it. It's unsafe, allowing criminal programs to creep through the Internet wires into our very bedrooms. It's unreliable, crashing when we need it most, wiping out hours or days of work with no way to get it back. And it's hard to use, requiring large amounts of head-banging to figure out the simplest operations.It's no secret that software sucks. You know that from personal experience, whether you use computers for work or personal tasks. In this book, programming insider David Platt explains why that's the case and, more importantly, why it doesn't have to be that way. And he explains it in plain, jargon-free English that's a joy to read, using real-world examples with which you're already familiar. In the end, he suggests what you, as a typical user, without a technical background, can do about this sad state of our software--how you, as an informed consumer, don't have to take the abuse that bad software dishes out.As you might expect from the book's title, Dave's expose is laced with humor--sometimes outrageous, but always dead on. You'll laugh out loud as you recall incidents with your own software that made you cry. You'll slap your thigh with the same hand that so often pounded your computer desk and wished it was a bad programmer's face. But Dave hasn't written this book just for laughs. He's written it to give long-overdue voice to your own discovery--that software does, indeed, suck, but it shouldn't.
Apple: The Inside Story of Intrigue, Egomania, and Business Blunders
Jim Carlton - 1997
Based on exclusive interviews with over 150 people, among them Microsoft's Bill Gates and the inner circle of Apple's top executives, this book reveals new information in an ongoing saga. photo insert.
Rethinking the Internet of Things: A Scalable Approach to Connecting Everything
Francis Dacosta - 2013
Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - chirps. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things will entail a widely distributed topology incorporating simpler chirp protocols towards at the edges of the network. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored. What you'll learn Teaches the difference between the "normal" Internet and the Internet of Things, Describes a new architecture and its components in the "chirp" context. Explains the shortcomings of IP for IoT. Describes the anatomy of the IoT. Re-frames key ideas such as reliability. Describes how to build the IoT Who this book is forThought leaders, executives, architectural, standards and development leaders in the evolving IoT industry
Engineering Electromagnetics
William H. Hayt Jr. - 1950
This edition retains the scope and emphasis that have made the book very successful while adding over twenty new numerical examples and over 550 new end-of-chapter problems.
Simple Sabotage: A Modern Field Manual for Detecting and Rooting Out Everyday Behaviors That Undermine Your Workplace
Robert M. Galford - 2015
One section focused on eight incredibly subtle—and devastatingly destructive—tactics for sabotaging the decision-making processes of organizations. While the manual was written decades ago, these sabotage tactics thrive undetected in organizations today:Insist on doing everything through channels. Make speeches. Talk as frequently as possible and at great length. Refer all matters to committees. Bring up irrelevant issues as frequently as possible. Haggle over precise wordings of communications. Refer back to matters already decided upon and attempt to question the advisability of that decision. Advocate caution and urge fellow-conferees to avoid haste that might result in embarrassments or difficulties later on. Be worried about the propriety of any decision.Everyone has been faced with someone who has used these tactics, even when they have meant well. Filled with proven strategies and techniques, this brief, clever book outlines the counter-sabotage measures to detect and reduce the impact of these eight classic sabotage tactics to improve productivity, spur creativity, and engender better collegial relationships.
Unholy Covenant: A True Story of Murder in North Carolina
Lynn Chandler Willis - 2000
At last, she was marrying the man she loved, Ted Kimble—a fellow Christian and son of a local preacher. But little did she realize her new husband had a dark side. Shock waves rocked the small, North Carolina town of Pleasant Garden when Patricia’s charred body was discovered inside the Kimble’s burned-out home. Soon family and friends learned an even worse truth—Patricia had died from a bullet wound to the head. Now, in Unholy Covenant, North Carolina journalist Lynn Chandler-Willis uncovers the story behind the crime. Taking readers from the crime scene to the courtroom, she delivers a passionate account of a crime that forever changed the lives of many in the small North Carolina community.
A Guide to Jewish Prayer
Adin Even-Israel Steinsaltz - 2000
One of the world's most famous and respected rabbis has given us the one guide we need to practice Jewish prayer and understand the prayer book.From the origins and meaning of prayer to a step-by-step explanation of the daily services to the reason you're not supposed to chat with your friends during the service, Rabbi Adin Steinsaltz answers many of the questions likely to arise about Jewish prayer. Here are chapters on daily prayer; Sabbath prayer; prayer services for the holidays; the yearly cycle of synagogue Bible readings; the history and make-up of the synagogue; the different prayer rites for Ashkenazim, Sephardim, Yemenites, and other cultural/geographic groupings; the role of the rabbi and the cantor in the synagogue; and the role of music in the service.The book also contains a glossary, a bibliography, and biographical sketches of the rabbis who were instrumental in creating and ordering the prayers through the ages.Rabbi Steinsaltz's guide is an essential volume both for the newcomer to Jewish prayer and for those who have been engaged in prayer for years.From the Hardcover edition.
Stylin' with CSS: A Designer's Guide
Charles Wyke-Smith - 2005
Stylin with CSS teaches you everything you need to know start using CSS in your web development work, from the basics of markup of your content and styling text, through to creating multi-column page layouts without the use of tables. Learn how to create interface components, such as drop-down menus, navigation links, and animated graphical buttons, using only CSS no JavaScript required. Discover how to design code that will work on the latest standard-compliant browsers, while working around the quirks of the older browsers. With a mastery of CSS, your web design capabilities will move to a new level, and everything you need to know to get your started and build your skills is right here in this book. You ll be stylin in no time!"
Stealing the Network: How to Own a Shadow
Johnny Long - 2007
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries