Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...
The evolution of the microelectronics is controlled by the idea of scaling. However, the scaling of the device size below 10 nm is expected to be impossible because of physical, technological and economic reasons. Fundamental considerations (based on Heisenberg's principle, Schrödinger equation, decoherence of quantum states, and Landauer...
This book is a comprehensive collection of advanced concepts divided into two main parts: resource allocation and adaptive transceivers for link optimization. These two research areas are at the core of the recent advances in wireless communication systems. Each chapter covers a relevant, timely, topic and is developed with two focuses. First...
In Rational and Irrational Beliefs: Research, Theory, and Clinical Practice, leading scholars, researchers, and practitioners of rational emotive behavior therapy (REBT) and other cognitive-behavioral therapies (CBTs) share their perspectives and empirical findings on the nature of rational and irrational beliefs, the role of beliefs as...
Web search has become one of the prominent information behaviors of the new millennium (Fallows, D., 2008). Web search refers not only to the process of entering keywords into a search engine site, but it also includes a related ecology of online information-seeking activities, such as browsing to specific URLs, making sense of found content,...
Not only have educators and trainers alike begun to harness the power of instructional technology and human performance techniques, but now businesses and industries have incorporated these technologies for training development and performance improvement. The Handbook of Research on Human Performance and Instructional Technology...
Terrorism and torture are twin evils that have dominated news headlines - particularly since the horrifying events of 9/11. In this thought-provoking volume, scholars from a diverse range of disciplines examine the complex motivational and situational factors contributing to terrorist acts and state-sponsored torture, and the potential linkage...
I was born in the city of Ahmedabad. I have two elder brothers, and two sisters, one ofwhom is younger than me. My elder sister chose my name, "Preety". It means "attachment" or "affection".
I like to believe that I gotmy idealism from my father,and a sense of aes thetics from my mother. Unfortunately, I...
If you've got your hands on this year's hottest new smartphone, you'll want the book that covers it inside and out: Palm Pre: The Missing Manual. This beautiful, full-color book from USA Today personal-technology columnist Ed Baig will help you go from newcomer to expert in no time.
Welcome to the only guidebook series that takes a visual approach to professional-level computer topics. Open the book and you'll discover step-by-step screen shots that demonstrate over 140 key search engine optimization techniques, including:
Corrosion is a major issue for the increase of service life and reliability of metallic materials. A detailed understanding of the mechanisms of corrosion helps us to solve existing corrosion problems and to prevent future problems.
The aim of this book is to review recent advances in the understanding of corrosion and protection...
InDesign just keeps getting better—and so does this book!
Whether you come from PageMaker®, QuarkXPress®, or InDesign CS3, if you want to make the switch to InDesign CS4, you've come to the right place. This in-depth guide shows you step by step how to get the most out of this innovative software, from better text...