Browse Results

Showing 52,901 through 52,925 of 53,517 results

The Information System Consultant's Handbook: Systems Analysis and Design

by William S. Davis David C. Yen

The Information System Consultant's Handbook familiarizes systems analysts, systems designers, and information systems consultants with underlying principles, specific documentation, and methodologies.Corresponding to the primary stages in the systems development life cycle, the book divides into eight sections:PrinciplesInformation Gathering and Problem DefinitionProject Planning and Project ManagementSystems AnalysisIdentifying AlternativesComponent DesignTesting and ImplementationOperation and MaintenanceEighty-two chapters comprise the book, and each chapter covers a single tool, technique, set of principles, or methodology. The clear, concise narrative, supplemented with numerous illustrations and diagrams, makes the material accessible for readers - effectively outlining new and unfamiliar analysis and design topics.

Inside Multi-Media Case Based Instruction

by Roger C. Schank

The fourth in the Inside series, this volume includes four theses completed under the editor's direction at the Institute for the Learning Sciences at Northwestern University. This series bridges the gap between Schank's books introducing (for a popular audience) the theories behind his work in artificial intelligence (AI) and the many articles and books written by Schank and other AI researchers for their colleagues and students. The series will be of interest to graduate students in AI and professionals in other academic fields who seek the retraining necessary to join the AI effort or to understand it at the professional level. This volume elaborates the Case-Based Teaching Architecture. A central tenet of this architecture is the importance of acquiring cases, and being able to retrieve and use those cases to solve new problems. The theses address the problems of building case bases, indexing large amounts of data contained within those case bases, and retrieving information on a need-to-know basis. They also reflect the work of researchers at the Institute to design tools that enable software programs to be built more effectively and efficiently.

Inside the IMF

by Richard Harper

In this book, Richard Harper uses the International Monetary Fund as a case study to show how thinking differently about IT systems can dramatically improve the manageability and accessibility of documents in organisations. The systems he considers uses search and retrieval applications, the use of hypertext documents and shared database applications like Lotus Notes.

Insurance Technology Handbook

by Jessica Keyes

This desk reference for IT professionals in the insurance industry provides information about the latest technologies to improve efficiency and prediction.Topics include:imagingmodelingmanagement systemscustomer systemsInternet commerceIssues affecting all financial service sectors, such as the year 2000 problemThe Insurance Technology Handbook is geared toward all levels of technology management and financial services management responsible for developing and implementing cutting-edge technology.

International Dictionary of Artificial Intelligence

by William Raynor

First Published in 1998. Artificial intelligence is increasingly employed in all areas of human endeavor and industry. Anticipating the needs of professionals, researchers, and students alike, International Dictionary of Artificial Intelligence defines and illustrates over 2,500 terms and provides detailed explanations of major concepts as well as topics in related disciplines. The Dictionary also contains an annotated bibliography and an extensive appendix of World Wide Web sites devoted to the latest trends and developments in the world of artificial intelligence.

Java Distributed Computing (Java Series)

by Jim Farley

Java Distributed Computing offers a general introduction to distributed computing, meaning programs that run on two or more systems. It focuses primarily on how to structure and write distributed applications and discusses issues like designing protocols, security, working with databases, and dealing with low bandwidth situations.

Java Security

by Scott Oaks

Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with or understand Java's security mechanisms. It discusses in detail what security does and doesn't mean, what Java's default security policies are, and how to create and implement your own policies. In doing so, Java Security provides detailed coverage of security managers, class loaders, the access controller, and much of the java.security package. It discusses message digests, certificates, and digital signatures, showing you how to use Java's facilities for signing classes or to implement your own signature facility. It shows you how to write a class loader that recognizes signed classes, verifies the signature, and cooperates with a security manager to grant additional privileges. It also discusses the problem of managing cryptographic keys and shows you how to implement your own key management systems. Java Security is an essential book for everyone using Java in real-world software. If you're deploying software written in Java, you need to know how to grant your classes the privileges they need, without granting privileges to untrusted classes. You need to know how to protect your systems against intrusion and corruption. Java provides the tools; this book shows you how to use them.

Java Servlet Programming

by Jason Hunter

A few years ago, the hype surrounding applets put Java on the map as a programming language for the Web. Today, Java servlets stand poised to take Java to the next level as a Web development language. The main reason is that servlets offer a fast, powerful, portable replacement for CGI scripts. The Java Servlet API, introduced as the first standard extension to Java, provides a generic mechanism to extend the functionality of any kind of server. Servlets are most commonly used, however, to extend Web servers, performing tasks traditionally handled by CGI programs. Web servers that can support servlets include: Apache, Netscape's FastTrack and Enterprise Servers, Microsoft's IIS, O'Reilly's WebSite, and JavaSoft's Java Web Server. The beauty of servlets is that they execute within the Web server's process space and they persist between invocations. This gives servlets tremendous performance benefits over CGI programs. Yet because they're written in Java, servlets are far less likely to crash a Web server than a C-based NSAPI or ISAPI extension. Servlets have full access to the various Java APIs and to third-party component classes, making them ideal for use in communicating with applets, databases, and RMI servers. Plus, servlets are portable between operating systems and between servers -- with servlets you can "write once, serve everywhere." Java Servlet Programming covers everything you need to know to write effective servlets and includes numerous examples that you can use as the basis for your own servlets. The book explains the servlet life cycle, showing how you can use servlets to maintain state information effortlessly. It also describes how to serve dynamic Web content, including both HTML pages and multimedia data. Finally, it explores more advanced topics like integrated session tracking, efficient database connectivity using JDBC, applet-servlet communication, inter-servlet communication, and internationalization.

Job Searching Online for Dummies

by Pam Dixon

Ready for a job that's perfect for you? Before you pound the pavement, surf the Net. More than just a list of Web sites, Job Searching Online for Dummies explains how to scope out potential employers on the Internet, network online, create and send an electronic resume that really stands out, design your own self-promoting Web site, and get that ideal job. Inside, find helpful advice on how to: *Conduct a well-informed job search using online resources *Build an electronic resume that best presents your skills *Post and send your e-resume and cover letter successfully *Network effectively in cyberspace - and make contacts with peers and employers *Create a dynamic Web page that really markets your talents *Tour the top job databases and check out corporate culture online *Keep your job search confidential and your personal information private.

The Joy of Cybersex: A Creative Guide for Lovers

by Deborah Levine

THE JOY OF CYBERSEXA Guide for Creative Lovers--Learn to Flirt like a Pro--Find Steamy Chat Rooms--Get Sex and Relationship Counseling--Fuel Hot Monogamy--Go Beyond the Picket Fence--And more!What is the word searched most often on the Internet?You've got it--SEX.But where do you go? What's safe? What do you do when you get there? In this fun, informative, and thoroughly satisfying book, on-line sexpert Deb Levine guides you to all the right sites so you can --Pack up the "come here often"--lines and learn to flirt like a pro--Meet your soul mate--or at least a decent date--Get answers to all those sex questions you're too embarrassed to ask in person--Learn how to spice up your sex life --Find out the facts (and expose the myths) of safe sex--Fulfill your real-life sexual fantasies in the safe confines of cyberspaceWhether you're an on-line novice or a seasoned pro, The Joy of Cybersex has something for you. Deb Levine will open your eyes to a world of possibility on the Internet--so you can have a healthy, sexy life off-line!From the Trade Paperback edition.

Knowledge Organizations: What Every Manager Should Know

by Jay Liebowitz Thomas J. Beckman

For knowledge management to be successful, the corporate culture needs to be adapted to encourage the creation, sharing, and distribution of knowledge within the organization. Knowledge Organizations: What Every Manager Should Know provides insight into how organizations can best accomplish this goal. Liebowitz and Beckman provide the information companies need for evaluating and planning the steps and processes that will transform their existing organization infrastructure into a "knowledge-based" organization. This easy-to-read guide includes many vignettes, examples, and short cases of organizations involved in knowledge management.

Learning the bash Shell, Second Edition

by Cameron Newham Bill Rosenblatt

This second edition covers all of the features of bash Version 2.0, while still applying to bash Version 1.x. It includes one-dimensional arrays, parameter expansion, more pattern-matching operations, new commands, security improvements, additions to ReadLine, improved configuration and installation, and an additional programming aid, the bash shell debugger.

Learning the vi Editor, Sixth Edition

by Linda Lamb Arnold Robbins

This completely updated guide to editing with vi, the editor available on nearly every Unix system, now covers four popular viclones and includes command summaries for easy reference. It starts with the basics, followed by more advanced editing tools, such as ex commands, global search and replacement, and a new feature, multiscreen editing.

Learning to Read in the Computer Age

by Anne Meyer David H. Rose

The computer and the Internet loom larger each year in the school lives of many children. This book acquaints the parent and teacher with the applicable computer function for a reading task and sample cutting edge software.

Leveraging the New Infrastructure

by Peter Weill Marianne Broadbent

Imagine thinking about your company's information technology in the same way that you think about its investment portfolio: as a bundle of assets that--when managed right--will generate revenues and savings. Here's just such a framework for leveraging IT (technology, networks, data, and software)--one that enables business managers to make the important decisions about the potentially confounding mix of high-technology that influences near- and long-term planning, affects the ability to support customers, and dictates the flow of daily operations. Drawing upon their rigorous research with more than 100 top multinationals, the authors present a rich and varied range of examples of IT investment strategies that have reaped rewards for firms such as Citibank, Honda, Johnson & Johnson, Ralston Purina, the Development Bank of Singapore, and Telstra. This hands-on resource, compete with benchmarks and case studies, creates the common ground where both management and IT can meet, communicate their goals, and agree on the best plan for getting there.

Lingo in a Nutshell

by Bruce A. Epstein

Macromedia Director 6 is the premiere authoring tool for delivering interactive content on both the Internet and the desktop. It is the dominant multimedia package for Windows 95/NT, Windows 3.1, and the Macintosh. A quarter million developers use Director(R) to incorporate animation and audio into dynamic Web pages, and to create engaging interactive corporate presentations, multimedia advertising, entertainment CD-ROMs, Enhanced music CDs, and even DVDs. Lingo is Director's powerful scripting language. This companion book to Director in a Nutshell is an essential tool for both new and experienced Lingo programmers seeking a deeper knowledge of the language. Bruce Epstein is the author of both these books and brings years of hands-on experience with Director and Lingo. The book includes numerous useful Lingo examples. Exhaustively tested, this book corrects many errors found in Macromedia's Lingo documentation and repeated verbatim in most third-party books. Extremely comprehensive, this book details dozens of misdocumented and undocumented Lingo keywords that are omitted from Macromedia's manuals and third-party books. Lingo in a Nutshell caters to the huge pool of Director users attempting to bridge the Lingo gap, yet provides the details for the experienced Linguist that are lacking in other Lingo books. In typical nutshell style (clear, concise, deep and narrow) this book explores the syntax, structure and commands of the Lingo language. The detailed chapters describe messages, events, scripts, handlers, variables, lists, file I/O, Behaviors, child objects, Xtras, and more. This book teaches you to troubleshoot and debug common Lingo errors. Lingo in a Nutshell is the book for which both Director users and power Lingo programmers have been yearning. The book extensively covers topics not found in other Lingo books: Cross-platform Lingo differences Lingo internals for experienced programmers Events, messages, and scripts Timers, tempos, cue points, and synchronization Data types and expressions Math, numerical expressions, geometry, and trigonometry Coordinates, alignment, and registration point Lingo in a Nutshell is the most concise and compete guide available. It is a high-end handbook at a low-end price. An essential desktop reference for every Director user.

Linux Device Drivers

by Alessandro Rubini

This book is for anyone who wants to support computer peripherals under the Linux operating system or who wants to develop new hardware and run it under Linux. Linux is the fastest-growing segment of the UNIX market and is winning over enthusiastic adherents in many application areas. This book reveals information that heretofore has been passed by word-of-mouth or in cryptic source code comments, showing how to write a driver for a wide range of devices. You don't have to be a kernel hacker to understand and enjoy this book; all you need is an understanding of C and some background in UNIX system calls. Drivers for character devices, block devices, and network interfaces are all described in step-by-step form and are illustrated with full-featured examples that show driver design issues, which can be executed without special hardware. For those who are curious about how an operating system does its job, this book provides insights into address spaces, asynchronous events, and I/O. Portability is a major concern in the text. The book is centered on version 2.0, but also covers 1.2.13 and experimental versions up to 2.1.43. You are also told how to maximize portability among hardware platforms. Contents include: Building a driver and loading modules Complete character, block, and network drivers Debugging a driver Timing Memory management and DMA Interrupts Portability issues Peripheral Component Interconnect (PCI) A tour of kernel internals

The Little MLer

by Matthias Felleisen Daniel P. Friedman

Over the past few years, ML has emerged as one of the most important members of the family of programming languages. Many professors in the United States and other countries use ML to teach courses on the principles of programming and on programming languages. In addition, ML has emerged as a natural language for software engineering courses because it provides the most sophisticated and expressive module system currently available. Felleisen and Friedman are well known for gently introducing readers to difficult ideas. The Little MLer is an introduction to thinking about programming and the ML programming language. The authors introduce those new to programming, as well as those experienced in other programming languages, to the principles of types, computation, and program construction. Most important, they help the reader to think recursively with types about programs.

Logic And Declarative Language

by M. Downward

Logic has acquired a reputation for difficulty, perhaps because many of the approaches adopted have been more suitable for mathematicians than computer scientists. This book shows that the subject is not inherently difficult and that the connections between logic and declarative language are straightforward. Many exercises have been included in the hope that these will lead to a much greater confidence in manual proofs, therefore leading to a greater confidence in automated proofs.

Management Information Systems: New Approaches to Organization and Technology

by Kenneth C. Laudon Jane P. Laudon

Describing the interconnections between technology, the organization, and IS management, this book provides a coverage of the Internet and focuses on how it is transforming the way firms conduct business. A chapter introduces business processes with a discussion of how they can impact the redesign of an organization to be more competitive.

The Mathematical Tourist: New and Updated Snapshots of Modern Mathematics

by Ivars Peterson

To most outsiders, modern mathematics represents unknown territory. Few realize that the world of modern mathematics is rich with vivid images, provocative ideas, and useful notions. The revised, updated book also includes new material about the structure of crystals and about discoveries illuminating the relationship between four-dimensional geometry and physical theories of the nature of time, space, and matter. It adds the application of cellular automata models to social questions and to the peregrinations of virtual ants. It extends the discussion of applications of fractals and introduces the notion of controlling chaos. A greatly expanded concluding chapter on the nature of mathematical proof includes accounts of Turing machines, transparent proofs, and how a computer program managed to prove a long-standing mathematical conjecture. It ends with the dramatic unveiling of a proof by Andrew Wiles of Fermat's last theorem.

Mega-Bit Memory Technology - From Mega-Bit to Giga-Bit: From Mega-Bit to Giga-Bit (Japanese Technology Reviews Ser. #Vol. 32.)

by Hiroyuki Tango

This book describes LSI process technology, and focuses on the rapid progress of state-of-the-art dynamic random access memory (DRAM) process technologies—the longstanding technology driver of Si ULSI—as they advance from the 1 Kbit to the Gbit DRAM era.

Modern Compiler Implementation in C

by Andrew W. Appel

This new, expanded textbook describes all phases of a modern compiler: lexical analysis, parsing, abstract syntax, semantic actions, intermediate representations, instruction selection via tree matching, dataflow analysis, graph-coloring register allocation, and runtime systems. It includes good coverage of current techniques in code generation and register allocation, as well as functional and object-oriented languages, that are missing from most books. In addition, more advanced chapters are now included so that it can be used as the basis for a two-semester or graduate course. The most accepted and successful techniques are described in a concise way, rather than as an exhaustive catalog of every possible variant. Detailed descriptions of the interfaces between modules of a compiler are illustrated with actual C header files. The first part of the book, Fundamentals of Compilation, is suitable for a one-semester first course in compiler design. The second part, Advanced Topics, which includes the advanced chapters, covers the compilation of object-oriented and functional languages, garbage collection, loop optimizations, SSA form, loop scheduling, and optimization for cache-memory hierarchies.

MPI: The Complete Reference (Volume 2, The MPI-2 Extensions)

by Marc Snir William Gropp Steven Huss-Lederman Bill Nitzberg William Saphir Andrew Lumsdaine Ewing Lusk

Since its release in summer 1994, the Message Passing Interface (MPI) specification has become a standard for message-passing libraries for parallel computations. There exist more than a dozen implementations on a variety of computing platforms, from the IBM SP-2 supercomputer to PCs running Windows NT.

net.wars

by Wendy Grossman

Full text online version at www.nyupress.org/netwars. Who will rule cyberspace? And why should people care? Recently stories have appeared in a variety of news media, from the sensational to the staid, that portray the Internet as full of pornography, pedophilia, recipes for making bombs, lewd and lawless behavior, and copyright violators. And, for politicians eager for votes, or to people who have never strolled the electronic byways, regulating the Net seems as logical and sensible as making your kids wear seat belts. Forget freedom of speech: children can read this stuff. From the point of view of those on the Net, mass-media's representation of pornography on the Internet grossly overestimates the amount that is actually available, and these stories are based on studies that are at best flawed and at worst fraudulent. To netizens, the panic over the electronic availability of bomb-making recipes and other potentially dangerous material is groundless: the same material is readily available in public libraries. Out on the Net, it seems outrageous that people who have never really experienced it are in a position to regulate it. How then, should the lines be drawn in the grey area between cyberspace and the physical world? In net.wars, Wendy Grossman, a journalist who has covered the Net since 1992 for major publications such as Wired, The Guardian, and The Telegraph, assesses the battles that will define the future of this new venue. From the Church of Scientology's raids on Net users to netizens attempts to overthrow both the Communications Decency Act and the restrictions on the export of strong encryption, net.wars explains the issues and the background behind the headlines. Among the issues covered are net scams, class divisions on the net, privacy issues, the Communications Decency Act, women online, pornography, hackers and the computer underground, net criminals and sociopaths, and more.

Refine Search

Showing 52,901 through 52,925 of 53,517 results