Guiding pet owners through their grief following the loss of a beloved pet is one of the toughest parts of your staff's job. Handled sensitively and compassionately, the situation can strengthen the bond with the client for years to come. The new, second edition of this valuable resource offers specific strategies for dealing with a...
Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...
Experience learning made easy—and quickly teach yourself how to use the word processing power in Word 2003. With Step by Step, you can take just the lessons you need, or work from cover to cover. Either way, you drive the instruction—building and practicing the skills you need, just when you need them!
SDH/SONET Explained in Functional Models represents a fresh approach to the modeling of transport network technologies. This practical guide and reference text uncovers the description of SDH (Synchronous Digital Hierarchy), SONET (Synchronous Optical Network) and OTN (Optical Transport Network) transport networks and equipment using...
The Psychology of Entertainment Media provides a cutting-edge look at how entertainment media affects its viewers, both in intended and unintended ways, and the psychological processes that underlie these effects. The collection represents an international, multidisciplinary investigation of an age-old process--persuasion--in a relatively...
Special Edition Using Storage Area Networks opens with an overview of the need for data storage in an enterprise environment, the different types of data storage devices, and existing data storage techniques. The authors build on that foundation with an exploration of the evolution of SAN, the various networking models and data-centric...
Until fairly recently most scientific data-gathering systems and industrial control procedures were based on electromechanical devices such as chart recorders and analogue gauges. The capability to process and analyse data was rather limited (and in some cases error prone) unless one had access to a minicomputer or mainframe. Today, that situation...
"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...
This book sets out to explain the development of modern electronic systems and devices from the viewpoint of the semiconductor materials (germanium, silicon, gallium arsenide and many others) which made them possible. It covers the scientific understanding of these materials and its intimate relationship with their technology and many applications....
This book provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It deals with digital design as an activity in a larger systems design context. Instead of focusing on gate-level design and aspects of digital design that have diminishing relevance in a real-world...
Someone who wants to get to know the customs of a country frequently receives the advice to learn the language of that country. Why? Because the differences that distinguish the people of one country from those of another are reflected in the language. For example, the people of the islands of the Pacific do not have a term for...
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,...