This hands-on, activity-based manual is an extension of the online computer experiments and is designed to help students deepen their understanding of statistics through challenging, Fathom-based exer
ABOUT THE CD: The CD-ROM contains CAD and rendering software, CAD models, robot fighting videos and printable tables filled with useful information for all robot builders. Rhino3D is a computer aided
This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to f
A thoroughly updated and revised look at system reliability theory Since the first edition of this popular text was published nearly a decade ago, new standards have changed the focus of reliability
It's five o'clock, do you know where your confidential office document is? The truth is that many employees may not. This convenient handbook brings your workplace up to speed with 21st century securi
DESCRIPTIONThe Mike Meyers’ Computer Skills series offers students of varying ability and experience a practical working knowledge of baseline IT skills and technologies. This full-color text is fille
New and Updated Material: * Each part opens with a brand new case study based on real security scenarios * Brand new chapter covers the latest 802.11 Wireless networking security attacks and counter
For engineers, students, and technicians or hobbyists concerned with real-world implementation of complete digital systems whether they involve a desktop computer or a car's engine controller electric
Simulations and the Future of Learning offers trainers and educators the information and perspective they need to understand, design, build, and deploy computer simulations for this generation. Lookin
Over 60,000 entries -- covering business, computer, and scientific terms; colloquial, idiomatic, and current slang expressions; and more. Updated and revised biographical and geographical database -
Bhote updates his system in light of the challenge to business by the twin disasters of September 11 and Enron. He explains how companies using his system can outpace rivals misguided enough to adopt
An in-depth look at the tools, techniques, and tactics used in computer forensicsThe New Forensics introduces readers to the world of business forensics, using interesting vignettes, interviews, and a
The system presented in this book consists of two more-or-less independent parts. The first is the system's parallel network memory scheme; the second part of the knowledge-base system presented here
Published as part of the highly successful Engineering Research Series, A Knowledge-Based System for Powder Metallurgy Technology not only looks at the latest advances in powder metallurgy, but also p
One goal of modern computer science is to engineer computer programs that can act as autonomous, rational agents; software that can independently make good decisions about what actions to perform on o
"Most Indispensable Linux Book" --2001 Linux Journal Readers Choice Awards Authoritative Answers to All Your Linux Questions You can rely on the fully updated second edition of Linux System Administ
Deduction is an efficient and elegant presentation of classical first-order logic. It presents a truth tree system based on the work of Jeffrey, as well as a natural deduction system inspired by that
Energy Investing that gets beyond the hype2001 was perhaps the most tumultuous year in the modern history of the energy industry. As with telecommunications, computer and information technology, and I
In recent years, object-oriented programming has emerged as the dominant computer programming style, and object-oriented languages such as C++ and Java enjoy wide use in academia and industry. This te
For upper level and graduate level Electrical and Computer Engineering courses in Integrated Circuit Design as well as professional circuit designers, engineers and researchers working in portable wir
Along with providing a useful discussion of categorical data analysis techniques, this book shows how to apply these methods with the SAS System. The authors include practical examples from a broad ra
The national business bestseller"Nassar has in mind sophisticated real-time data and computer programs that let ordinary investors see the same stock information pro traders see at the very same momen
The Hazard Analysis and Critical Control Point (HACCP) system is a preventative food safety management system, that can be applied throughout the food supply chain from primary production to the consu
*Language skills for each section of both the computer and paper tests*Practice exercises for each of the language skills that maximize understanding and retention of the language skills*Test-taking s
It’s the most advanced computer role-playing game ever: When you play you’re really there—in a dark dream teeming with evil creatures, danger-filled fortresses, and malevolent sorceries.The game plugs
The Concise American HeritageR Spanish Dictionary, Second Edition has been newly revised to include the most current computer, telecommunications, and Internet vocabulary in both English and Spanish.
Develop and execute winning wireless strategies for your company Offering the prospect of instantaneous, cable-free Internet connectivity and an array of Web services to cell phones, handheld computer
Written in conjunction with RSA Security--the most trusted name in e-security--this book gives a detailed presentation of IPSec components, implementation, and VPN interoperability. Part of the RSA Pr
The interest in Business Continuity has gained significant momentum in the last few years, especially with the Y2K non-event, the increasing corporate dependence on computer systems and the growing le
Implement and manage Microsoft's leading messaging and collaboration system using this instructive guide. You'll quickly learn everything you need to deploy and administer the system effectively, and
Bridges the gap between virtual reality and computer vision in manufacturingWhat will it take to make virtual manufacturing a reality? In this groundbreaking book, leading VR researchers reveal the la
The twelve pockets in Literature Pockets, Nonfiction Grades 4-6+, incorporate literature and the Dewey Decimal System into meaningful activities. The first pocket presents the Dewey decimal system and
This book brings together novel concepts in machine vision, computer graphics, and threedimensional modelling, in solving real practical inspection problems. Automated inspection of three-dimensional
Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name
Contains papers from a September 2000 conference, in sections on business process re-engineering, computer-aided manufacture, concurrent engineering, design for manufacture, industrial case studies, m
As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most securit
You can immediately have the power to perform electromagnetic simulation. If you have a fundamental understanding of electromagnetic theory and the knowledge of at least one high-level computer langu
Most online investors hit the computer screen mentally and emotionally unprepared -- and pay dearly for their education. The Disciplined Online Investor shows online investors how to understand and ov
This amazingly comprehensive volume has been updated to include the latest computer and internet terminology, plus changes recently adopted by Spanish language academies. Arranged in an easy-to-use fo