We believe that learning in computer science and engineering should reflect the
current state of the field, as well as introduce the principles that are shaping computing.
We also feel that readers in every specialty of computing need to appreciate
the organizational paradigms that determine the capabilities, performance,
and,...
Although the basic purposes of finance, and the nature of the core instruments used in
attaining them, are relatively constant, recent years have seen an explosion in complexity of
both products and techniques.
A number of forces are driving this explosion. The first is internationalization encompassing
a dramatic growth in...
Books which examine the folklore of Europe's traditional "witch" plants are not uncommon, and some give some coverage to describing the psychotropic and hallucinogenic effects of these plants on the human body. However this book is rather more unusual than that in that the author is first and foremost a biochemist with an...
It’s been five years since the first edition of Introducing Character Animation with Blender came out, and a lot has changed in the world of Blender. Interest in Blender has exploded. When the first edition of this book came out, it was the only English-language book on Blender in print. Now, as this second edition of the book arrives,...
concerned with the study of the development and use of advanced information
technologies and systems for national, international, and societal security-related
applications. In the past few years,we have witnessed that ISI experienced tremendous
growth and attracted significant interest involving academic researchers in
related fields...
Boring, boring, boring. Isn’t this what immediately comes to mind when one
sees books on foundational concepts of information security? Monotonous
coverage of theory, dry details of history, brief yet inadequate coverage of every
topic known to man, even though you know that you’ll never be hired by the
NSA as a...
Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...
Real time 3D games have been around for well over ten years now. We’ve played them, created assets in
the style of our favorites, and maybe even “mod”ed a few of them. But until recently, the cost of licensing
one of the premier game engines has ranged from several hundred thousand to several million dollars
per title...
On behalf of the Program Committee, it is our pleasure to present to you the
proceedings of the 8th Conference on Detection of Intrusions and Malware &
Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international
experts from academia, industry and government to present and discuss
novel security research....
The 16th International Conference on Applications of Natural Language to Information
Systems (NLDB 2011) was held during June 28–30, 2011, at the University
of Alicante, Spain. Since the first NLDB conference in 1995, the main
goal has been to provide a forum for the discussion and dissemination of research
on the integration of...
This book covers every aspect of mobile app development, starting with major application components and screen layout and design, before moving on to how to manage sensors such as internal gyroscopes and near field communications. Towards the end, it delves into smartphone multimedia capabilities as well as graphics and animation, web access,...
Probability theory and fuzzy logic are the principal components of an array of methodologies
for dealing with problems in which uncertainty and imprecision play important roles.
In relation to probability theory, fuzzy logic is a new kid on the block. As such, it has been
and continues to be, though to a lesser degree, an object of...