Neuroergonomics can be defined as the study of brain and behavior at work. It combines two disciplines--neuroscience, the study of brain function, and human factors, the study of how to match technology with the capabilities and limitations of people so they can work effectively and safely. The goal of merging these two fields is to use the...
"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...
Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.
"Cybercrime and cyber-terrorism represent a serious challenge to society as a whole." - Hans Christian Krüger, Deputy Secretary General of the Council of Europe
Crime has been with us as long as laws have existed, and modern technology has given us a new type of criminal activity: cybercrime. Computer and...
The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...
Developing with Google App Engine introduces development with Google App Engine, a platform that provides developers and users with infrastructure Google itself uses to develop and deploy massively scalable applications.
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of...
Written primarily by Fellows of the American Neuropsychiatric Association, this handbook offers practical, explicit, evidence-based guidelines for diagnosis and treatment of neuropsychiatric disorders. Concise, clinically oriented chapters cover all psychiatric and behavioral disorders associated with brain dysfunction. Each chapter...
What should every citizen know about computers and computer technology? For better or worse, answers typically depend upon who is asked.
• Students commonly have a practical bent: How can one get the computer to perform specific tasks, why does a machine act the way it does, what is involved in getting computers to interact, and so...
A proven Java(TM)-based approach to standardizing and streamlining legacy migration
This book focuses on the key challenges developers face when using the Java 2 platform Enterprise Edition (J2EE) to encapsulate legacy applications for delivery in a multi-tier Internet environment. Leading Sun architects Torbjoern Dahlen and Thorbioern Fritzon...
Ensure that your WAN can handle the latest technologies with this must-have strategy guide
If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and...
Artificial vision is a rapidly growing discipline, aiming to build computational models of the visual capabilites in humans, as well as the machines that emulate them. Recent research work suggests that vision is a complex functionality, involving active sensing and attentional mechanisms, and is strictly related to cognitive processes like...