The chapters in this volume were presented at the July–August 2006 NATO
Advanced Study Institute on Imaging for Detection and Identification. The
conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious
Tuscany region of northern Italy. For the eighth time we gathered at this
idyllic spot to explore and...
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...
Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...
Visual Basic for Applications (VBA) is a powerful tool that enables you to automate operations
in the Microsoft Offi ce applications and in other applications that host VBA. By automating
operations using VBA, you can save yourself and your colleagues huge amounts of time and
effort. Getting more work done in less time is usually good...
THIS BOOK GREW OUT OFMY EXPERIENCE OF WORKING WITH DATA FOR VARIOUS COMPANIES IN THE TECH
industry. It is a collection of those concepts and techniques that I have found to be the
most useful, including many topics that I wish I had known earlier—but didn’t.
My degree is in physics, but I also worked as a software...
Grid Computing was a vision of using and sharing computers and data in the early
1990s. The integration, coordination, and sharing of computer resources which are
geographically disperse among different physical domains and organizations
became an every day reality. This emerging infrastructure aims to provide a mechanism
for sharing...
Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled
with countless stories of product successes and failures— fickle consumer adoptions, clever marketing
campaigns that outsmart the best technologies, better packaging winning over better technology,
and products that are simply...
I suspect Martin plied me to write this foreword while out one evening during the 2010 Plone Conference in Bristol. Full from an excellent dinner and even better conversation, beer in hand, who could say no?
I've long envied Martin's ability to write. Text and code flow from his fingers at a rate that I can't even begin...
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections...
Welcome to the C++ computer programming language and C++ How to Program, Eighth
Edition! This book presents leading-edge computing technologies, and is particularly appropriate
for inroductory course sequences based on the curriculum recommendations of
two key professional organizations—the ACM and the IEEE.
Welcome to Internet and web programming and Internet & WorldWide Web How to Program,
Fourth Edition! At Deitel & Associates, we write programming language textbooks
and professional books for Prentice Hall, deliver corporate training worldwide and develop
Web 2.0 Internet businesses. The book has been...
As it turns out Bennis underestimated the impact that bad leadership
can have. A combination of greed, hubris, flawed judgment, and miscalculation
has made the Enron debacle seem almost quaint by comparison
to the global financial crisis that we now face. Although numerous pundits
and scholars have advanced many reasons for the...