In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections...
his book is a new type of intermediate macroeconomics textbook- Until now, the choice was between books that use calculus to present formal theory dryly and with few, if any, applications to the real world and books that include applications but present theory using only graphs and algebra. This book uses calcu- lus, algebra, and graphs to...
The definitive high-speed design resource for every PCB designer
In this book, renowned engineer,author, and seminar leader Douglas Brooks teaches PCB designers how tosuccessfully design boards for any high-speed application. Brooks begins withan easy-to-understand electronics primer for every PCB designer, then...
Interest in digital image processing methods stems from two principal application areas: improvement of pictorial information for human interpretation; and processing of image data for storage, transmission, and representation for autonomous machine perception.This chapter has several objectives: (1) to define the scope of the...
Welcome to the Java programming language and Java How to Program, Late Objects Version,
Eighth Edition! This book is appropriate for introductory-level programming courses
(commonly known as CS1 and CS2). It also provides substantial depth for those who already
know how to program and want to learn Java.
This book provides computer exercises for an undergraduate course on signals and linear
systems. Such a course or sequence of courses forms an important part of most engineering
curricula. This book was primarily designed as a companion to the second edition of Signals
and Systems by Oppenheim and Willsky with Nawab. While the...
The Java(TM) 2 Enterprise Edition (J2EE) platform connector architecture is the key component in Java’s support for enterprise application integration (EAI) and for linking enterprise information systems (EISs) with Web services. Because many services are now provided through the Web, it is essential that business enterprises have an...
This text describes and explains the ORCA (Object-oriented Requirements Capture Analysis) method. It is aimed at those interested in the description and analysis of complex systems. In particular, it is aimed at those responsible for producing strategies for the use of information technology and requirements for software development. Producing and...
A Proven, Step-by-Step Method for Consistently Creating Revolutionary Products, Services, and Processes
When it comes to entering, creating, or dominating markets, disruptive innovation is the most powerful tool you have. Unfortunately, most companies find...
This book is generally about software intellectual property and specifically
about the field of software forensics. While you may never testify in a courtroom,
attempt to deduce the true owner of a valuable program, or measure the
intellectual property (IP) value of software source code, if you are at all involved
with software you...