The Basics of Computer Arithmetic Made Enjoyable and Accessible—with a Special Program Included for Hands-on Learning
"The combination of this book and its associated virtual computer is fantastic! Experience over the last fifty years has shown me that there's only one way to truly understand how computers work; and that is to learn...
This book is a crystallization of the authors' work over the last twenty-five years. The book covers the latest advances in grey information and systems research, providing a state-of-the-art overview of this important field. Covering the theoretical foundation, fundamental methods and main topics in grey information and systems research, this book...
The first text and reference on this sea change in the computer industry
This book is the first comprehensive presentation of the principles and tools available for programming multiprocessor machines. It is of immediate use to programmers working with the new architectures. For example, the next generation of computer game...
In this IBM® Redbooks® publication, we provide an introduction to the Cell Broadband Engine™ (Cell/B.E.™ ) platform. We show detailed samples from real-world application development projects and provide tips and best practices for programming Cell/B.E. applications.
Every day organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, the job descriptions of SQL DBAs and developers are expanding to include encryption. Expert SQL...
OVER THE PAST SEVERAL YEARS JAVASCRIPT has undergone a remarkable transformation. Where
once it was a “toy” language relegated to secondary status it’s now one of the most important
programming languages in the world. With the ongoing importance of Ajax-based development and
the rise of full-featured JavaScript...
Business analysis is the set of tasks and techniques used to work as a liaison among stakeholders in order to understand the structure, policies, and operations of an organization, and to recommend solutions that enable the organization to achieve its goals. Business analysis involves understanding how organizations function to accomplish...
The First Best-Practice Guide to Executing Any Type of Social Computing Project
Organizations today aren’t just participating in social networking, collaborative computing, and online communities--they are depending on those communities to...
Everything your students need to know about caring for patients is in this one portable reference! Now in its third edition, Diseases and Disorders: A Nursing Therapeutics Manual, containing complete information on hundreds of disorders, is still a "must have" reference for every nurse. In a concise format, this handbook allows...
This book introduces Meaningful Purposive Interaction Analysis (MPIA) theory, which combines social network analysis (SNA) with latent semantic analysis (LSA) to help create and analyse a meaningful learning landscape from the digital traces left by a learning community in the co-construction of knowledge.
This second edition of the fully revised and updated From Photon to Pixel presents essential elements in modern digital photographic devices. Our universal infatuation with photography profoundly affects its usage and development.
While some sides of photographic “culture” remain wholly unchanged – art photography,...
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...