Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER SKILLS AND APPLICATIONS helps studen
About the Asian Edition With the consent of the authors, we have developed this Asian Edition of Computer Organization and Design: The Hardware/Software Interface, to better reflect local teachin
This volume presents the proceedings of ECSCW 2013, the 13th European Conference on Computer Supported Cooperative Work. Each conference offers an occasion to critically review our research field, whi
The leading introduction to computer crime and forensicsis now fully updated to reflect today's newest attacks, laws, and investigatory best practices. Packed with new case studies, examples, and stat
WRIGHTMAN'S PSYCHOLOGY AND THE LEGAL SYSTEM shows you the critical importance of psychology's concepts and methods to the functioning of many aspects of today's legal system. Featuring topics such as
Written by acclaimed national terrorism expert Jonathan R. White, the market-leading TERRORISM AND HOMELAND SECURITY is widely recognized as the most comprehensive, balanced, and objective terrorism b
WRIGHTMAN'S PSYCHOLOGY AND THE LEGAL SYSTEM shows you the critical importance of psychology's concepts and methods to the functioning of many aspects of today's legal system. Featuring topics such as
This study is primarily concerned with computer-generated reconstruction models of architecture. It offers a collection of possible methodologies for dealing with individual problems concerning visual
Safety Health and Security in Wastewater Systems,?Sixth Edition offers comprehensive coverage of critical information necessary for regulatory compliance, reduction of liability, reduction of costs, a
What senior citizens need to know in changing times. How will the economy affect Social Security? How will new legislation affect Medicare? These and many other urgent questions are addressed in th
The "dazzling, exhilarating" (San Francisco Chronicle) debut novel from one of this century's most groundbreaking writers, The Broom of the System is an outlandishly funny and fiercely intelligent exp
Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information
For undergraduate courses in assembly language programming and introductory courses in computer systems and computer architecture.Written specifically for the Intel/Windows/DOS platform, this complete
LEARNING SAS IN THE COMPUTER LAB, 3RD EDITION, gets readers up and running quickly with SAS. Explaining concepts and commands in clear steps, the authors provide SAS basics so students can successfull
CENTURY 21 COMPUTER KEYBOARDING provides everything you need for in a one-semester course covering new-key learning, document formatting, and word processing. This latest edition helps students prepar
The best-selling computer organization book is thoroughly updated to provide a new focus on the revolutionary change taking place in industry today: the switch from uniprocessor to multicore microproc
First published in 1934, Security Analysis is one of the most influential financial books ever written. Selling more than one million copies through five editions, it has provided generations of inves
The Master Key System is one of the books that inspired the bestselling DVD and book The Secret. Originally created in 1912 by Charles F. Haanel as a weekly course, it has sold more than 200,000 copi
To solve one of the great mathematical problems of his day, Alan Turing proposed an imaginary computer. Then, attempting to break a Nazi code during World War II, he successfully designed and built on
學會怎麼利用Visual Studio 2005 Team System來協同合作與有效率地開發軟體系統這是一本Microsoft Visual Studio 2005 Team System導覽的實務書籍,書中提供了讓您掌握軟體開發團隊中能一起團結合作的關鍵成員之角色扮演和實務經驗分享。在軟體開發團隊中的專案經理、架構師、開發和測試成員都能夠利用Team System來整合團隊、發揮協同合作的效
Written for the design professional, this book offers basic concepts for site security design and risk/threat assessment, and their relationship and integration into the overall design/streetscape pro
In this book, Peter Diamond analyzes social security as a particular example of optimal taxation theory. Assuming a world of incomplete markets and asymmetric information, he uses a variety of simple
This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-sellin
Featuring more than 100 step-by-step activities that use common computer programs, such as Microsoft® Word and Paint®, to model concepts in five basic areas, this revolutionary guide shows m
A powerful new approach to learning a classical engineering subject: active learningElectrical Energy Conversion and Transport presents a revolutionary computer-assisted teaching method designed to ac
Barton, a well known specialist who has published widely in the field, has written a complete update to the 1988 Modern Radar System Analysis (also published by Artech House). An accompanying CD-ROM c
Published when Wallace was just twenty-four years old, The Broom of the System stunned critics and marked the emergence of an extraordinary new talent. At the center of this outlandishly funny, fierc
This important reference from the American Institute of Architects provides architects and other design professionals with the guidance they need to plan for security in both new and existing faciliti
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to
Anyone working on next generation PC-related designs or support will be interested in this book. "PCI Express System Architecture" discusses the most likely to succeed of the new technologies being pr
The pacemaking and conduction system (PCS) is vital for generating and synchronizing the heart beat. Dysfunction of this system can be a direct cause of cardiac conduction disturbance, arrhythmias an
This new initiative demonstrates a process and tools for managing the security vulnerability of sites that produce and handle chemicals, petroleum products, pharmaceuticals, and related materials such
Here's the book you need to prepare for Exam 70-214, Implementing and Administering Security in a Microsoft Windows 2000 Network. This Study Guide provides:In-depth coverage of every exam objectivePra
* Prepares readers for the Certified Information Security Manager (CISM) exam, ISACA's new certification that launches in June 2003 * CISM is business-oriented and intended for the individual who
The authors of this volume explore the challenges of establishing democratic accountability and control over the military and other security establishments in countries which have either been the vict
The five chapters of this book collect and illustrate techniques that have beenapplied to the prediction of reliability and availability of the various specific segments of anelectric power system. Th