![]() |
How to Manage Cybersecurity Risk
A Security Leader's Roadmap with Open FAIR 11/10/2019 |
Protecting information systems to reduce the risk of security incidents is critical for organizations today. This writing provides instruction for security leaders on the processes and techniques for managing a security program. It contains practical information on the breadth of information security topics, referring to many other writings that provide details on technical security topics. This provides foundation for a security program responsive to technology developments and an evolving threat environment.The security leader may be engaged by an organization that is in crisis, where the priority action is to recover from a serious incident. This work offers foundation knowledge for the security leader to immediately apply to the organization's security program while improving it to the... |
|
![]() |
Fundamental Concepts in Electrical and Computer Engineering with Practical Design Problems
Second Edition 09/15/2007 |
In many cases, the beginning engineering student is thrown into upper-level engineering courses without an adequate introduction to the basic material. This, at best, causes undue stress on the student as they feel unprepared when faced with unfamiliar material, and at worst, results in students dropping out of the program or changing majors when they discover that their chosen field of engineering is not what they thought it was. The purpose of this text is to introduce the student to a general cross-section of the field of electrical and computer engineering. The text is aimed at incoming freshmen, and as such, assumes that the reader has a limited to nonexistent background in electrical engineering and knowledge of no more than pre-calculus in the field of mathematics. By exposing s... |
|
![]() |
BASCOM Programming of Microcontrollers with Ease
An Introduction by Program Examples 06/22/2001 |
BASCOM-8051 and BASCOM-AVR are development environments built around a powerful BASIC compiler. Both are suited for project handling and program development for the 8051 family and its derivatives as well as for the AVR microcontrollers from Atmel. Click here to preview the first 25 pages in Acrobat PDF format. |
|
![]() |
TCP/IP - The Ultimate Protocol Guide
Complete 2 Volume Set 08/01/2010 |
This is the complete 2 volume set, containing both volumes one (ISBN: 9781599424910) and two (ISBN: 9781599425436) packaged together. The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Sectio... |
|
![]() |
TCP/IP - The Ultimate Protocol Guide
Volume 1 - Data Delivery and Routing 04/06/2009 |
The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Section A: Introduction Section B: The Internet Protocol Section C: Reliable and Unreliable Data Delivery Section D: Quality of Service ... |
|
![]() |
Business Database Technology (2nd Edition)
Theories and Design Process of Relational Databases, SQL, Introduction to OLAP, Overview of NoSQL Databases 05/15/2022 |
Business Database Technology provides essential knowledge of database technology for four-year college/university business students who study information technology and data resource management. Students will learn basic data structure techniques in databases, relational database model, design and implementation of relational databases, normalization, SQL, physical relational database design techniques, database administration, relational databases in computer networks, data warehouses, overview of OLAP (online analytical processing), and introduction to NoSQL databases. |
|
![]() |
TCP/IP - The Ultimate Protocol Guide
Volume 2 - Applications, Access and Data Security 04/06/2009 |
The book provides a complete guide to the protocols that comprise the Internet Protocol Suite, more commonly referred to as TCP/IP. The work assumes no prior knowledge of TCP/IP and only a rudimentary understanding of LAN/WAN access methods. The book is split into a number of sections; the manner in which data is transported between systems, routing principles and protocols, applications and services, security, and Wide Area communications. Each section builds on the last in a tutorial manner and describes the protocols in detail so serving as a reference for students and networking professionals of all levels. Volume I - Data Delivery & Routing Section A: Introduction Section B: The Internet Protocol Section C: Reliable and Unreliable Data Delivery Section D: Quality of Service S... |
|
![]() |
Information Systems Analysis and Design (2nd Edition)
Systems Acquisition Approach 08/15/2022 |
Information Systems Analysis and Design presents essential knowledge about management information systems development. It is used for four-year university and college students who study information systems analysis and design. Students will learn the information systems development strategies and the process of information systems development. The book emphasizes the key methods of information systems acquisition development, including business process modeling and systems acquisition design. To maintain a well-rounded approach to the topic, both fundamental knowledge about information systems development and hands-on materials are presented. Succinct tutorials for professional systems development project are also included. |
|
![]() |
06/26/2017 |
The purpose of this thesis is to forecast the amount of network traffic in Transmission Control Protocol/Internet Protocol (TCP/IP) -based networks by using different time lags and various machine learning methods including Support Vector Machines (SVM), Multilayer Perceptron (MLP), Radial Basis Function (RBF) Neural Network, M5P (a decision tree with linear regression functions at the nodes), Random Forest (RF), Random Tree (RT), and Reduced Error Prunning Error (REPTree), and statistical regression methods including Multiple Linear Regression (MLR) and Holt-Winters and compare the performance of statistical and machine learning methods. Two different Internet Service Providers' (ISPs) traffic data have been utilized to build traffic forecasting models. The first 66% of the data sets has ... |
|
![]() |
Cybercrime
How to Avoid Becoming a Victim 07/01/2007 |
Cybercrime: How to Avoid Becoming a Victim is a nuts and bolts, how-to guide for the typical home-computer user. It addresses the various crimes being committed via the Internet and gives instructions on how to avoid becoming a victim of each. The chapters dealing with individual cybercrimes are laid out in a format consisting of a discussion of the basics of the crime, followed by real-life examples of the particular crime, and then things computer users can do to avoid becoming a victim of the crime. Also included in the book is a chapter on the role of organized crime in Internet fraud and another chapter on Internet hoaxes. In addition, an appendix gives information on where to report various cybercrimes and another appendix gives definitions of cybercrime terms. To illustrate specific... |
|
![]() |
Vision-based Robot Navigation
Quest for Intelligent Approaches Using a Sparse Distributed Memory 09/08/2012 |
Starting with a summary of the history of Artificial Intelligence, this book makes the bridge to the modern debate on the definition of Intelligence and the path to building Intelligent Machines. Since the definition of Intelligence is itself subject to open debate, the quest for Intelligent machines is pursuing a moving target. Apparently, intelligent behaviour is, to a great extent, the result of using a sophisticated associative memory, more than the result of heavy processing. The book describes theories on how the brain works, associative memory models and how a particular model - the Sparse Distributed Memory (SDM) - can be used to navigate a robot based on visual memories. Other robot navigation methods are also comprehensively revised and compared to the method proposed. The per... |
|
![]() |
The 8051/8052 Microcontroller
Architecture, Assembly Language, and Hardware Interfacing 09/15/2005 |
This book was written with the novice or intermediate 8052 developer in mind. Assuming no prior knowledge of the 8052, it takes the reader step-by-step through the architecture including discussions and explanations of concepts such as internal RAM, external RAM, Special Function Registers (SFRs), addressing modes, timers, serial I/O, and interrupts. This is followed by an in-depth section on assembly language which explains each instruction in the 8052 instruction set as well as related concepts such as assembly language syntax, expressions, assembly language directives, and how to implement 16-bit mathematical functions. The book continues with a thorough explanation of the 8052 hardware itself, reviewing the function of each pin on the microcontroller and follows this with the design ... |
|
![]() |
11/04/2011 |
The operational aspects of Lambda Calculus are studied as a fundamental basis for high-order functional computation. We consider systems having full reduction semantics, i.e., equivalence-preserving transformations of functions. The historic lineage from Eval-Apply to SECD to RTNF/RTLF culminates in the techniques of normal-order graph Head Order Reduction (HOR). By using a scalar mechanism to artificially bind relatively free variables, HOR makes it relatively effortless to reduce expressions beyond weak normal form and to allow expression-level results while exhibiting a well-behaved linear self-modifying code structure. Several variations of HOR are presented and compared to other efficient reducers, with and without sharing, including a conservative breadth-first one which mechanically... |
|
![]() |
12/17/2010 |
The modern FPGAs enable system designers to develop high-performance computing (HPC) applications with a large amount of parallelism. Real-time image processing is such a requirement that demands much more processing power than a conventional processor can deliver. In this research, we implemented software and hardware based architectures on FPGA to achieve real-time image processing. Furthermore, we benchmark and compare our implemented architectures with existing architectures. The operational structures of those systems consist of on-chip processors or custom vision coprocessors implemented in a parallel manner with efficient memory and bus architectures. The performance properties such as the accuracy, throughput and efficiency are measured and presented. According to results, FPGA ... |
|
![]() |
Arduino for the Cloud
Arduino Yun and Dragino Yun Shield 06/02/2015 |
Arduino for the Cloud considers the Arduino Yun and the Dragino Yun Shield as components closing the gap between a typical microcontroller application and connection to the cloud. Arduino Yun combines the classic Arduino with an Atheros AR9331 system-on-a-chip (SoC) for wireless access points and routers platforms, which uses the Linux distribution Linino (OpenWRT) operating system. The Dragino Yun Shield expands any Arduino with network capabilities by the Atheros AR9331.The combination of microcontroller and Linux device supports the whole chain from sensor to software applications in the cloud by hardware and software. This book deals with the Arduino and the Linux device and their interaction, without the need of detailed Linux knowledge. |
|
![]() |
Visualization of Interface Metaphor for Software
An Engineering Approach 01/19/2011 |
This book presents a comprehensive process for visualization of interface metaphor for software. It is helpful in designing interactive user interfaces with magical super-affordances and definitive user experiences. As per the ancient Indian Vedic literature, metaphors are always conceived out of Vastu (entities having existence in our world). The visualization process given in the book shows how metaphorization could help in innovating highly experiential user interfaces, as one can create Avastu (non entities) by combining different objects and imaginative properties together. The main highlights of this process are selection and dissection of interface metaphor, pre-facto analysis, qualitative and quantitative evaluation, mapping between user and application domain lexicons, specialized... |
|
![]() |
09/19/2004 |
This research is dedicated to two main problems in finding shortest paths in the graphs. The first problem is to find shortest paths from an origin to all other vertices in non-negatively weighted graph. The second problem is the same, except it is allowed that some edges are negative. This is a more difficult problem that can be solved by relatively complicated algorithms. We attack the first problem by introducing a new data structure - Relaxed Heaps that implements efficiently two main operations critical for the improvement of Dijkstra's shortest path algorithm. R²heaps with suspended relaxation proposed in this research gives the best known worst-case time bounds of O(1) for a decrease_key operation and O(logn) for a delete_min operation. That results in the best worst-case runnin... |
|
![]() |
Acquisition and Reproduction of Color Images
Colorimetric and Multispectral Approaches 07/17/2001 |
The goal of the work reported in this dissertation is to develop methods for the acquisition and reproduction of high quality digital color images. To reach this goal it is necessary to understand and control the way in which the different devices involved in the entire color imaging chain treat colors. Therefore we addressed the problem of colorimetric characterization of scanners and printers, providing efficient and colorimetrically accurate means of conversion between a device-independent color space such as the CIELAB space, and the device-dependent color spaces of a scanner and a printer. First, we propose a new method for the colorimetric characterization of color scanners. It consists of applying a non-linear correction to the scanner RGB values followed by a 3rd order 3D polynom... |
|
![]() |
The ALISA Shape Module
Adaptive Shape Recognition using a Radial Feature Token 04/21/2002 |
Shape classification is a challenging image processing problem because shapes can occur in any position, at any orientation, and at any scale in an image. Shapes can also be obscured by gaps in their boundaries, occlusions, and noise. General shape classifiers often suffer from low precision, and specialized shape classifiers rely on specific features, like vertices or connected boundaries, making them difficult to generalize. The objective of this research is to design, implement, and test a general, high-precision two-dimensional shape classifier that is invariant to translation, scale, and rotation, as well as robust to gaps in the shape boundary, occlusions, and noise. To achieve this objective, the radial feature token (RFT) is implemented as the ALISA Shape Module, which learns to cl... |
|
![]() |
Oracle DBA 101
A Beginner’s Guide 02/01/2000 |
There is a dearth of Oracle Database Administrators inspite of having a large number of Oracle Programmers/Analysts. It is not difficult to rationalise the reason for this. Oracle Database Administration (DBA) is relatively harder to grasp and the concepts are subtle. There are a handful of books, all exhaustive treatises, on this topic, in addition to those by Oracle Corporation. There are no elementary books to smoothly introduce this fascinating topic. The present book, "Oracle DBA 101: A Beginner’s Guide" is expected to fill this vital gap. At the beginner’s level, it deals with all important aspects of Oracle DBA in a simplified manner. This is a Teacher’s as well as Student’s tool for an introductory course on the topic. |
|
![]() |
2020 Web Vision
How the Internet will Revolutionize Future Homes, Business and Society 04/30/2001 |
At the dawn of a new millennium, faith in technology soared following the successful eradication of the potentially paralyzing Y2K bug. Young dot-coms with little experience and possessing few assets other than a concept, flourished boasting market values in the millions and even billions of dollars. Then reality settled in as the market crashed and over a hundred dot-coms perished. The highflying NASDAQ dropped over 60% and the longest economic expansion teetered on the brink of recession. Despite the disconcerting scenario, this was not the demise of the Web, but merely the conclusion of its innocent childhood or the first stage of meteoric growth. After all, the Web was only 10 years old. There were still trillions of dollars worth of opportunities, as the more rigorous applicatio... |
|
![]() |
04/30/2001 |
Dreamweaver 4 is the HTML editor and you can create web graphics using Fireworks 4. Both applications can be integrated together. You will enjoy creating your own images, animated graphics, and rollover images in Fireworks 4 to insert into Dreamweaver 4. You can learn to create easy web pages using the same applications as professional web designers. This book is suitable for persons who are new to Dreamweaver 4 and Fireworks 4, HTML novices, and intermediate users. You will learn fast from the illustration in this book. This book consists of three sections:1) Web management: teach how to manage a web site and pages; 2) Dreamweaver 4: teach how to design and create web pages, layouts, layers, tables, and frames. You will learn to operate menu, functions, and tools; 3) Fireworks ... |
|
![]() |
Create Web Content that Sells!
Wow your market with writing strategies, search engine hints, and graphic tips that work 04/07/2002 |
Are you ready to build an effective Web site that sells? One that brings in serious prospects? Then Create Web Content That Sells! is for you. It's a tutorial about writing effectively for Web visitors, creating a useable site structure, getting a marketing mind-set, and choosing practical graphics for your Web site.Whether your site sells wrenches to left-handed mechanics, offers landscaping services, or strives to cultivate loyalty in the hearts of your existing customers, the basic tenet of great Web content is universal: speak to your audience. And Create Web Content That Sells! shows you how to get down and dirty, one-to-one, with your audience, through writing, structure, and graphics.Small business people need every edge they can get, so we designed our marketing section to fit ... |
|
![]() |
Medical Informatics Around The World
An International Perspective Focusing On Training Issues 01/22/2002 |
In the last ten years there has been an explosion in the use of computer technology in many facets of our lives. Many industries such as finance, manufacturing, and retail have embraced modern technological advances through the use of advanced computer and telecommunication technology. Unfortunately, the international health care community has been quite slow to effectively integrate new computer technology into the daily care of patients. Nevertheless, governments across the world are developing strategic plans and allocating financial resources to support the use of technology in healthcare. Medical Informatics Around The World: An International Perspective Focusing On Training Issues provides a global snapshot into such activities in 13 different countries (Australia, China, Hong Ko... |
|
![]() |
02/12/2003 |
The purpose of this study was to examine two instructional methods for delivering a radar operators training class for members of a municipal police department. The first method examined was the traditional classroom-based training with a certified radar instructor. The second method was a computer-based training (CBT) course based on the instructional material from the classroom-based course. The CBT course was administered on CD-ROM using the police department s Windows© based computers. This study compared the two methods of delivery to determine if the CBT course was as effective as the traditional classroom-based course.Effectiveness was measured by the completion times of the two courses, examination scores, and overall participant satisfaction levels. These measures were conducted ... |
|
![]() |
Gesture Generation by Imitation
From Human Behavior to Computer Character Animation 01/25/2005 |
In an effort to extend traditional human-computer interfaces research has introduced embodied agents to utilize the modalities of everyday human-human communication, like facial expression, gestures and body postures. However, giving computer agents a human-like body introduces new challenges. Since human users are very sensitive and critical concerning bodily behavior the agents must act naturally and individually in order to be believable. This dissertation focuses on conversational gestures. It shows how to generate conversational gestures for an animated embodied agent based on annotated text input. The central idea is to imitate the gestural behavior of a human individual. Using TV show recordings as empirical data, gestural key parameters are extracte... |
|
![]() |
08/16/2000 |
Little is known about student success in online learning environments, especially how the predisposing characteristics that the learner brings to the learning environment may differentially affect student outcomes. This study explored the question of whether a student's "readiness" to be a self-directed learner is a predictor of student success in an online community college curriculum. The specific goal of this investigation was to determine whether there was a significant relationship between self-directed learning readiness-as measured by Guglielmino's (1977) Self-Directed Learning Readiness Scale (SDLRS)- and student success-as measured by course completion, grade point average (GPA) and student satisfaction, the latter assessed by student responses to an opinion poll. The subject... |
|
![]() |
08/01/2000 |
This study was designed to determine if sixth-grade students' problem solving skills were improved by means of their experience with a computer-based logical puzzle game designed to increase reasoning skills, and, in turn, problem solving ability. Students worked on this game either in cooperative learning pairs or alone. Baseline and post-experimental problem-solving ability was measured through the administration of a Problem Solving Test; Form A was utilized as a pretest for this purpose, Form B was used as a post-test. Comparisons of problem-solving ability based upon post-test scores (Form B) were made among four groups of students (N = 106): Group 1: Students (n = 26) who worked on the computer-based puzzle game in cooperative learning pairs Group 2: Students (n = 27) ... |
|
![]() |
10/13/2002 |
This dissertation introduces new hardware architectures for more realistic surface rendering of three dimensional objects and the rendering of volumetric datasets. Surface rendering is dealt with in the first part of the dissertation where the architectures for displacement map rendering in hardware are proposed. This work represents the first to appear in scientific literature on displacement map hardware rendering. Where possible these architectures propose components that integrate into currently available pipelines and make use of existing units in those pipelines. Displacement map rendering in hardware is a desired feature currently under development by most graphics hardware vendors. The first architecture is scan-line based and works just before rasterization and the second adaptiv... |
|
![]() |
01/31/1999 |
Comprehensive global garbage detection (GGD) in object-oriented distributed systems, i.e., GGD intrinsically able to detect distributed cycles of garbage, has mostly been addressed via graph tracing algorithms. Graph tracing algorithms must account for every live object in the system before any resource can actually be reclaimed which compromises both their scalability and robustness in a distributed environment. Alternative non-comprehensive approaches trade-off comprehensiveness for scalability and robustness under the assumptions that distributed cycles of garbage are rare and that all comprehensive algorithms are necessarily unscalable. This thesis contends instead that distributed cycles of garbage are as likely to occur as local cycles and that a comprehensive alternative to g... |