CENTURY 21 COMPUTER KEYBOARDING provides everything you need for in a one-semester course covering new-key learning, document formatting, and word processing. This latest edition helps students prepar
The best-selling computer organization book is thoroughly updated to provide a new focus on the revolutionary change taking place in industry today: the switch from uniprocessor to multicore microproc
First published in 1934, Security Analysis is one of the most influential financial books ever written. Selling more than one million copies through five editions, it has provided generations of inves
To solve one of the great mathematical problems of his day, Alan Turing proposed an imaginary computer. Then, attempting to break a Nazi code during World War II, he successfully designed and built on
Written for the design professional, this book offers basic concepts for site security design and risk/threat assessment, and their relationship and integration into the overall design/streetscape pro
In this book, Peter Diamond analyzes social security as a particular example of optimal taxation theory. Assuming a world of incomplete markets and asymmetric information, he uses a variety of simple
This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-sellin
Featuring more than 100 step-by-step activities that use common computer programs, such as Microsoft® Word and Paint®, to model concepts in five basic areas, this revolutionary guide shows m
A powerful new approach to learning a classical engineering subject: active learningElectrical Energy Conversion and Transport presents a revolutionary computer-assisted teaching method designed to ac
This important reference from the American Institute of Architects provides architects and other design professionals with the guidance they need to plan for security in both new and existing faciliti
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to
This new initiative demonstrates a process and tools for managing the security vulnerability of sites that produce and handle chemicals, petroleum products, pharmaceuticals, and related materials such
Here's the book you need to prepare for Exam 70-214, Implementing and Administering Security in a Microsoft Windows 2000 Network. This Study Guide provides:In-depth coverage of every exam objectivePra
* Prepares readers for the Certified Information Security Manager (CISM) exam, ISACA's new certification that launches in June 2003 * CISM is business-oriented and intended for the individual who
It is vital that today’s engineers work with computer-based tools and techniques. However, programming courses do not provide engineering students with the skills that are necessary to succeed i
The authors of this volume explore the challenges of establishing democratic accountability and control over the military and other security establishments in countries which have either been the vict
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and costIncludes wo
A groundbreaking book based on a landmark quality initiativeIn today's information-driven enterprises, accuracy is essential in computer-integrated measurement and control systems, where academia, gov
Schweitzer offers this nontechnical, step-by-step guide to help computer users of all levels to better understand how the Internet works, and how to enjoy the benefits of the Internet while still main
Written by the experts at RSA Security, this book will show you how to secure transactions and develop customer trust in e-commerce through the use of PKI technology. Part of the RSA Press Series.
This new dictionary contains 30,000 computer-related entries divided equally between the English and Russian languages. The authors have compiled a modern dictionary with concise and comprehensive lex
This series is for people—adults and teenagers—who are interested in computer programming because it's fun. The three volumes use the Logo programming language as the vehicle for an exploration of com
This series is for people—adults and teenagers—who are interested in computer programming because it's fun. The three volumes use the Logo programming language as the vehicle for an explo
This absorbing book provides a unique perspective on how the three major elements of the computer triangle--hardware, software, and people--work together for the advancement and sometimes debasement
In Computer-Integrated Surgery leading researchers and clinical practitioners describe the exciting new partnership that is being forged between surgeons and machines such as computers and robots, ena
A visionary book when it was first published in the late 1970s, The Network Nationhas become the defining document and standard reference for the field of computer mediatedcommunication (CMC). This re
These essays from the journal International Security examine the effects of the nuclear revolution on the international system and the role nuclear threats have played in international crises. The aut
Conquer the ACT with the experts from McGraw-Hill! "McGraw-Hill's ACT" is revised and improved for the 2011 edition, giving you more of an edge for when you tackle the exam. It provides sample exams d
From the official Oracle Press comes a comprehensive guide to implementing a sound security plan in your Oracle environment. This expert resource explains how to secure the operating system, the datab
From graphic novel superstar (and former computer programming teacher) and New York Times bestselling author Gene Luen Yang, Secret Coders: Modules & Monsters is the sixth and final volume in a wildly
From graphic novel superstar (and former computer programming teacher) and New York Timesbestselling author Gene Luen Yang, Secret Coders: Potions & Parameters is the fifth volume in a wildly entertai
Between 1959 and 1989, Soviet scientists and officials made numerous attempts to network their nation -- to construct a nationwide computer network. None of these attempts succeeded, and the enterpris
The fascinating life and times of one of the foremost intellects of the twentieth century: Claude Shannon—the neglected architect of the information age whose insights stand behind every computer buil
Severe land degradation, including soil erosion caused by water run-off, inappropriate agronomic practices and overgrazing, is a major contributor to declining food security in Lesotho.