Browse Results

Showing 53,301 through 53,325 of 53,737 results

Real Computing Made Real: Preventing Errors in Scientific and Engineering Calculations

by Forman S. Acton

Engineers and scientists who want to avoid insidious errors in their computer-assisted calculations will welcome this concise guide to trouble-shooting. Real Computing Made Real offers practical advice on detecting and removing bugs. It also outlines techniques for preserving significant figures, avoiding extraneous solutions, and finding efficient iterative processes for solving nonlinear equations.Those who compute with real numbers (for example, floating-point numbers stored with limited precision) tend to develop techniques that increase the frequency of useful answers. But although there might be ample guidance for those addressing linear problems, little help awaits those negotiating the nonlinear world. This book, geared toward upper-level undergraduates and graduate students, helps rectify that imbalance. Its examples and exercises (with answers) help readers develop problem-formulating skills and assist them in avoiding the common pitfalls that software packages seldom detect. Some experience with standard numerical methods is assumed, but beginners will find this volume a highly practical introduction, particularly in its treatment of often-overlooked topics.

The Road Ahead

by Bill Gates Nathan Myhrvold Peter Rinearson

In this book the software pioneer describes how emerging technologies will transform human existence in unprecedented ways.

The Sciences of the Artificial, third edition

by Herbert A. Simon

Continuing his exploration of the organization of complexity and the science of design, this new edition of Herbert Simon's classic work on artificial intelligence adds a chapter that sorts out the current themes and tools—chaos, adaptive systems, genetic algorithms—for analyzing complexity and complex systems. There are updates throughout the book as well. These take into account important advances in cognitive psychology and the science of design while confirming and extending the book's basic thesis: that a physical symbol system has the necessary and sufficient means for intelligent action. The chapter "Economic Reality" has also been revised to reflect a change in emphasis in Simon's thinking about the respective roles of organizations and markets in economic systems.

The Secret Guide to Computers

by Russ Walter

Setting the PACE in Product Development

by Michael E. McGrath

Setting the PACE in Product Development describes how to effectively manage the key ingredients of successful product development: time, quality, talent and resources. This revised edition of Product Development provides essential insight as to how to efficiently organize people, resources and processes to dramatically improve financial results, strategic positions, internal morale and customer satisfaction. The PACE techniques integrate vital company-wide functions, engaging the entire company and focusing its collective energy on strategically and financially important goals.

Slackware Linux Installation and Getting Started

by Matt Welsh

Linux user's guide.

Statistical Software Engineering

by Panel on Statistical Methods in Software Engineering

This book identifies challenges and opportunities in the development and implementation of software that contain significant statistical content. While emphasizing the relevance of using rigorous statistical and probabilistic techniques in software engineering contexts, it presents opportunities for further research in the statistical sciences and their applications to software engineering.It is intended to motivate and attract new researchers from statistics and the mathematical sciences to attack relevant and pressing problems in the software engineering setting. It describes the "big picture," as this approach provides the context in which statistical methods must be developed. The book's survey nature is directed at the mathematical sciences audience, but software engineers should also find the statistical emphasis refreshing and stimulating. It is hoped that the book will have the effect of seeding the field of statistical software engineering by its indication of opportunities where statistical thinking can help to increase understanding, productivity, and quality of software and software production.

Teach Yourself TCP/IP in 14 Days (2nd edition)

by Tim Parker Dean Miller

The transmission control protocol/internet protocol is the backbone of the internet. The protocol is explained in detail in these 14 lessons.

Technologies of the Gendered Body: Reading Cyborg Women

by Anne Balsamo

This book takes the process of "reading the body" into the fields at the forefront of culture--the vast spaces mapped by science and technology--to show that the body in high-tech is as gendered as ever. From female body building to virtual reality, from cosmetic surgery to cyberpunk, from reproductive medicine to public health policies to TV science programs, Anne Balsamo articulates the key issues concerning the status of the body for feminist cultural studies in a postmodern world. Technologies of the Gendered Body combines close readings of popular texts--such as Margaret Atwood's novel The Handmaid's Tale, the movie Pumping Iron II: The Women, cyberpunk magazines, and mass media--with analyses of medical literature, public policy documents, and specific technological practices. Balsamo describes the ways in which certain biotechnologies are ideologically shaped by gender considerations and other beliefs about race, physical abilities, and economic and legal status. She presents a view of the conceptual system that structures individuals access to and participation in these technologies, as well as an overview of individuals rights and responsibilities in this sometimes baffling area. Examining the ways in which the body is gendered in its interactions with new technologies of corporeality, Technologies of the Gendered Body counters the claim that in our scientific culture the material body has become obsolete. With ample evidence that the techno-body is always gendered and marked by race, this book sets the stage for a renewed feminist engagement with contemporary technological narratives.

Upgrading and Repairing Networks

by Craig Zacker Paul Doyle

A well-rounded source for all network needs, whether upgrades, troubleshooting, expansion, or repair. General "buyer's guide" information helps the reader make decisions while the abundance of how-to and troubleshooting tips helps with the day-to-day maintenance and operation tasks.

Urban Operating Systems: Producing the Computational City (Infrastructures)

by Andres Luque-Ayala Simon Marvin

An exploration of the modest potentials and serious contradictions of reconfiguring urban life through computational operating systems.A new wave of enthusiasm for smart cities, urban data, and the Internet of Things has created the impression that computation can solve almost any urban problem. Subjecting this claim to critical scrutiny, in this book, Andrés Luque-Ayala and Simon Marvin examine the cultural, historical, and contemporary contexts in which urban computational logics have emerged. They consider the rationalities and techniques that constitute emerging computational forms of urbanization, including work on digital urbanism, smart cities, and, more recently, platform urbanism. They explore the modest potentials and serious contradictions of reconfiguring urban life, city services, and urban-networked infrastructure through computational operating systems.

Where Wizards Stay Up Late: The Origins Of The Internet

by Katie Hafner Matthew Lyon

Twenty five years ago, it didn't exist. Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.

Where Wizards Stay Up Late: The Origins of the Internet

by Katie Hafner Matthew Lyon

"A little more than twenty-five years ago, computer networks did not exist anywhere - except in the minds of a handful of computer scientists. In the late 1960s, the Defense Department's Advanced Research Projects Agency funded a project to create computer communication among its university-based researchers. The experiment was inspired by J. C. R. Licklider, a brilliant scientist from MIT. At a time when computers were generally regarded as nothing more than giant calculators, Licklider saw their potential as communications devices." "Where Wizards Stay Up Late is the story of the small group of researchers and engineers whose invention, daring in its day, became the foundation for the Internet. With ARPA's backing, Licklider and others began the quest for a way to connect computers across the country." "In 1969, ARPA awarded the contract to build the most integral piece of this network - a computerized switch called the Interface Message Processor, or IMP - to Bolt Beranek and Newman (BBN), a small Cambridge, Massachusetts, company. A half-dozen engineers at BBN, who called themselves the IMP Guys, knew it was possible to do what larger companies - including AT&T and IBM - had dismissed as impossible. But making computer networking possible required inventing new technologies. Working around the clock, the IMP Guys met a tight deadline, and the first IMP was installed at UCLA nine months after the contract award." "A nationwide network called the ARPANET grew from four initial sites. Protocols were developed, and along the way a series of accidental discoveries were made, not the least of which was e-mail. Almost immediately, e-mail became the most popular feature of the Net and the "@" sign became lodged in the iconography of our times. The ARPANET continued to grow, then merged with other computer networks to become today's Internet. In 1990, the ARPANET itself was shut down, fully merged by then with the Internet it had spawned.

Applied Cryptography: Protocols, Algorithms and Source Code in C

by Bruce Schneier

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure. ". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine ". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal ". . .easily ranks as one of the most authoritative in its field." -PC Magazine The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

Being Digital

by Nicholas Negroponte

A Professor of MIT and former director of its Media lab expounds on his philosophy and opinions of the digital world.

Being Digital

by Nicholas Negroponte

In lively, mordantly witty prose, Negroponte decodes the mysteries--and debunks the hype--surrounding bandwidth, multimedia, virtual reality, and the Internet, and explains why such touted innovations as the fax and the CD-ROM are likely to go the way of the BetaMax. "Succinct and readable. . . . If you suffer from digital anxiety . . . here is a book that lays it all out for you."--Newsday.

The Changing Nature of Telecommunications/Information Infrastructure

by Steering Committee on the Changing Nature of Telecommunications/Information Infrastructure

Advancement of telecommunications and information infrastructure occurs largely through private investment. The government affects the rate and direction of this progress through regulation and public investment. This book presents a range of positions and perspectives on those two classes of policy mechanism, providing a succinct analysis followed by papers prepared by experts in telecommunications policy and applications.

China's Media, Media's China

by Chin-Chuan Lee

This book explores the rapidly evolving conditions of political communication in China. It examines how ideology and professional roles affect both scholarly and journalistic understanding of China. The book offers insights into Chinese journalism and Sino-American relations. .

Computer System and Network Security (Computer Science & Engineering #7)

by Gregory B. White Eric A. Fisch Udo W. Pooch

Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers all aspects related to the growing field of computer security. Such complete coverage in a single text has previously been unavailable, and college professors and students, as well as professionals responsible for system security, will find this unique book a valuable source of information, either as a textbook or as a general reference. Computer System and Network Security discusses existing and potential threats to computer systems and networks and outlines the basic actions that are generally taken to protect them. The first two chapters of the text introduce the reader to the field of computer security, covering fundamental issues and objectives. The next several chapters describe security models, authentication issues, access control, intrusion detection, and damage control. Later chapters address network and database security and systems/networks connected to wide-area networks and internetworks. Other topics include firewalls, cryptography, malicious software, and security standards. The book includes case studies with information about incidents involving computer security, illustrating the problems and potential damage that can be caused when security fails.This unique reference/textbook covers all aspects of computer and network security, filling an obvious gap in the existing literature.

The Computer User’s Survival Guide

by Joan Stigliani

<p>The bad news: You <i>can</i> be hurt by working at a computer. The good news: Many of the factors that pose a risk are within your control. This book looks squarely at all the factors that affect your health on the job, including positioning, equipment, work habits, lighting, stress, radiation, and general health.</p>

The Cyborg Handbook

by Chris Hables Gray Steven Mentor Heidi J. Figueroa-Sarriera

This handbook brings together key documents from the history of cyborgs as well as the best writing about cyborgs, including recent cyborg cutural theory. They cover the space technology, war, medicine and the imagination in the production of cyborgs.

Design Patterns: Elements of Reusable Object-Oriented Software

by Erich Gamma Richard Helm Ralph Johnson John Vlissides

This book assumes you are reasonably proficient in at least one object-oriented programming language, and you should have some experience in object-oriented design as well. It's a book of design patterns that describes simple and elegant solutions to specific problems in object-oriented software design. Design patterns capture solutions that have developed and evolved over time. Hence they aren't the designs people tend to generate initially. They reflect untold redesign and recoding as developers have struggled for greater reuse and flexibility in their software. Design patterns capture these solutions in a succinct and easily applied form.

EFF's Guide to the Internet, v. 3.15

by Adam Gaffin

Welcome to the Internet! You're about to start a journey through a unique land without frontiers, a place that is everywhere at once -- even though it exists physically only as a series of electrical impulses. You'll be joining a growing community of millions of people around the world who use this global resource on a daily basis.<P> With this book, you will be able to use the Internet to:<P> * Stay in touch with friends, relatives and colleagues around the world, at a fraction of the cost of phone calls or even air mail.<P> * Discuss everything from archaeology to zoology with people in several different languages.<P> * Tap into thousands of information databases and libraries worldwide.<P> * Retrieve any of thousands of documents, journals, books and computer programs.<P> * Stay up to date with wire-service news and sports and with official weather reports.<P> * Play live, "real time" games with dozens of other people at once.

The Emperor's Virtual Clothes: The Naked Truth About Internet Culture

by Dinty W. Moore

A skeptic by nature, a writer and teacher more at home with ballpoint pens than computer programs, Dinty W. Moore wanted to find out for himself if the much-touted Internet and the electronic culture it has spawned is really going to be the Next Big Thing, or whether it's the emperor's new clothes. This is not a how-to guide, a giddy net-head's online magical mystery tour, or a binaries-in-the-sky futurist treatise. Instead, this book tells it like it is about the Internet. Anyone who's asked, Who's there? What am I missing? and What is it all about? will find Moore's good-natured skepticism a welcome break from the explosion of wide-eyed techno-hype raging all around us. "Moore is far and away the best pure writer of the 'Wired School.' He's like the Stage Manager poking his head in around the set of 'Our Town.' Funny that it took the arrival of this commonsensical outsider to finally put a real human face on the digital world."--San Jose Mercury-News.

Exploring American Citizenship

by Globe Fearon

The Student Texts and Student Workbooks provide helpful charts, tables, and maps that allow students to look closely at all critical aspects of U.S. government, including citizenship, the justice system, foreign policy, and much more. The book helps students understand the development of the government and the rights and laws of local, state, and federal governments.

Refine Search

Showing 53,301 through 53,325 of 53,737 results