Network Security Essentials: Applications and Standards


William Stallings - 1999
    Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography-covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.

Diagnostic and Statistical Manual of Mental Disorders DSM-IV-TR


American Psychiatric Association - 1952
    Updated information is included about the associated features, culture, age & gender features, prevalence, course & familial pattern of mental disorders. The DSM-IV-TR(R) brings this essential diagnostic tool to-date, to promote effective diagnosis, treatment & quality of care. One can get all the essential diagnostic information from the DSM-IV(R) along with important updates not in the '94 edition. Benefit from new research into Schizophrenia, Asperger's Disorder & other conditions. Utilize additional information about the epidemiology & other facets of DSM conditions. Update ICD-9-CM codes implemented since 1994 including Conduct Disorder, Dementia, Somatoform Disorders.Use of the manual DSM-IV-TR classification Multiaxial assessment Disorders usually 1st diagnosed in infancy, childhood or adolescenceDelirium, dementia & amnestic & other cognitive disordersMental disorders due to a general medical condition Substance-related disorders Schizophrenia & other psychotic disordersMood disorders Anxiety disordersSomatoform disordersFactitious disordersDissociative disordersSexual & gender identity disordersEating disorders Sleep disorders Impulse-control disorders not elsewhere classifiedAdjustment disordersPersonality disordersOther conditions that may be a focus of clinical attentionAdditional codes Appendix A: Decision trees for differential diagnosis Appendix B: Criteria sets & axes provided for further study Appendix C: Glossary of technical terms Appendix D: Highlights of changes in DSM-IV text revisionAppendix E: Alphabetical listing of DSM-IV-TR diagnoses & codesAppendix F: Numerical listing of DSM-IV-TR diagnoses & codesAppendix G: ICD-9-CM codes for selected general medical conditions & medication-induced disordersAppendix H: DSM-IV classification with ICD-10 codesAppendix I: Outline for cultural formulation & glossary of culture-bound syndromesAppendix J: DSM-IV contributorsAppendix K: DSM-IV text revision advisers

Machinery's Handbook


Erik Oberg - 1914
    The speeds and feeds section has been revised, updated and expanded to include new materials, more cutting tools, and tool life estimates. The welding section has been rewritten to incorporate recent developments, the numerical control section has been expanded and rearranged to facilitate use, and logarithm and trigonometry tables have been reinstated. New to this edition are sections on bolt tightening torques, motion control sections, ISO 9000, lasers, dividing heads, bandsaws (including speeds and feeds), electrical discharge machining, retaining rings, machinability of wood, and collets. In addition, all the practical information and data has been reviewed and updated where necessary.

Electric Machinery Fundamentals


Stephen J. Chapman - 1991
    MATLAB has been incorporated throughtout, both in examples and problems.

Head First C#


Andrew Stellman - 2007
    Built for your brain, this book covers C# 3.0 and Visual Studio 2008, and teaches everything from language fundamentals to advanced topics including garbage collection, extension methods, and double-buffered animation. You'll also master C#'s hottest and newest syntax, LINQ, for querying SQL databases, .NET collections, and XML documents. By the time you're through, you'll be a proficient C# programmer, designing and coding large-scale applications. Every few chapters you will come across a lab that lets you apply what you've learned up to that point. Each lab is designed to simulate a professional programming task, increasing in complexity until-at last-you build a working Invaders game, complete with shooting ships, aliens descending while firing, and an animated death sequence for unlucky starfighters. This remarkably engaging book will have you going from zero to 60 with C# in no time flat.

Physics, Volume 2


David Halliday - 1991
    The Fourth Edition of volumes 1 and 2 is concerned with mechanics and E&M/Optics. New features include: expanded coverage of classic physics topics, substantial increases in the number of in-text examples which reinforce text exposition, the latest pedagogical and technical advances in the field, numerical analysis, computer-generated graphics, computer projects and much more.

Learn Windows PowerShell 3 in a Month of Lunches


Don Jones - 2011
    Just set aside one hour a day—lunchtime would be perfect—for a month, and you'll be automating Windows tasks faster than you ever thought possible. You'll start with the basics—what is PowerShell and what can you do with it. Then, you'll move systematically through the techniques and features you'll use to make your job easier and your day shorter. This totally revised second edition covers new PowerShell 3 features designed for Windows 8 and Windows Server 2012.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideLearn PowerShell from the beginning—no experience required! Covers PowerShell 3, Windows 8, and Windows Server 2012 Each lesson should take you one hour or lessAbout the TechnologyPowerShell is both a language and an administrative shell with which you can control and automate nearly every aspect of Windows. It accepts and executes commands immediately, and you can write scripts to manage most Windows servers like Exchange, IIS, and SharePoint.Experience with Windows administration is helpful. No programming experience is assumed.Table of ContentsBefore you begin Meet PowerShell Using the help system Running commands Working with providers The pipeline: connecting commands Adding commands Objects: data by another name The pipeline, deeper Formatting—and why it's done on the right Filtering and comparisons A practical interlude Remote control: one to one, and one to many Using Windows Management Instrumentation Multitasking with background jobs Working with many objects, one at a time Security alert! Variables: a place to store your stuff Input and output Sessions: remote control with less work You call this scripting? Improving your parameterized script Advanced remoting configuration Using regular expressions to parse text files Additional random tips, tricks, and techniques Using someone else's script Never the end PowerShell cheat sheet

Introduction to Algorithms


Thomas H. Cormen - 1989
    Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.

Applied Cryptography: Protocols, Algorithms, and Source Code in C


Bruce Schneier - 1993
    … The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations

How Computers Work


Ron White - 1992
    The full-color, detailed illustrations will take you deep inside your PC and show you just how intricate it is. This latest edition has been updated with information on all of the latest technologies, including: PCI Express Bus Serial ATA Connections Digital Photography Software TiVos, Gas Plasma Screens, iPods, and Other Home Entertainment Equipment Google and eBay 3D Game Development, Two-Slot Video Cards, and Overclocking How Computers Work has sold over two million copies world wide. But don't take our word for it � get your copy today!

Sociology


John J. Macionis - 1987
    A widely acclaimed writing style, vivid illustration program, and extensive highlight features--applied chapter-opening vignettes, full-color Global and National Maps, thought-provoking theme boxes, applications and exercises--capture reader's imaginations and help them see clearly how sociological concepts and issues affect not only life in general, but their individual lives as well. An accompanying CD-ROM features a library of video selections illustration major concepts and theories, animated Global and National Maps, author's tips, chapter slide shows, etc. A companion Website is also available.The Sociological Perspective. Sociological Investigation. Culture. Society. Socialization. Social Interaction in Everyday Life. Groups and Organizations. Deviance. Sexuality. Social Stratification. Social Class in the United States. Global Stratification. Gender Stratification. Race and Ethnicity. Aging and the Elderly. The Economy and Work. Politics and Government. Family. Religion. Education. Health and Medicine. Population, Urbanization, and Environment. Collective Behavior and Social Movements. Social Change: Traditional, Modern, and Postmodern Societies.For anyone interested in a cutting-edge introduction to sociology and social diversity from a global perspective.

Neuroscience


George J. Augustine - 1996
    Created primarily for medical and premedical students, 'Neuroscience' emphasizes the structure of the nervous system, the correlation of structure and function, and the structure/function relationships particularly pertinent to the practice of medicine.

Thinking in C++


Bruce Eckel - 1995
    It shows readers how to step back from coding to consider design strategies and attempt to get into the head of the designer.

HTML5 for Web Designers


Jeremy Keith - 2010
    It is also the most powerful, and in some ways, the most confusing. What do accessible, content-focused standards-based web designers and front-end developers need to know? And how can we harness the power of HTML5 in today’s browsers?In this brilliant and entertaining user’s guide, Jeremy Keith cuts to the chase, with crisp, clear, practical examples, and his patented twinkle and charm.

Advanced Concepts in Operating Systems


Mukesh Singhal - 1994
    Numerous examples are provided to reinforce the concepts and relevant case studies illustrate the concepts and mechanisms described.