If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...
This book is the revised and extended second edition of Statistics for Linguistics with R. The comprehensive revision includes new small sections on programming topics that facilitate statistical analysis, the addition of a variety of statistical functions readers can apply to their own data, and a revision of overview sections on statistical...
"Despite spending more than $600 billion on information technology over the past decade, the Federal Government has achieved little of the productivity improvements that private industry has realized from IT" according to the 25 Point Implementation Plan to Reform Federal Information Technology Management published by the...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest...
This book gives a systematic treatment of singularly perturbed systems that naturally arise in control and optimization, queueing networks, manufacturing systems, and financial engineering. It presents results on asymptotic expansions of solutions of Komogorov forward and backward equations, properties of functional occupation measures,...
This classic Tutorial Text provides a basic understanding of many fundamental optical principles. The second edition has been updated to reflect the development of electronic sensors, as well as the advent of mainstream consumer optical products. Chapters also emphasize the application of state-of-the-art computer software to generate...
From bargaining for a lower price to asking for vacation time, negotiating is a skill essential for improved business performance and better business relationships. In this new edition, David Oliver looks at the vital principles of good negotiation.
The text explores the aspects of negotiating, including: tactics and...
It is the purpose of this book to provide the meteorological knowledge and tools to improve the risk management of energy industry decisions, ranging from the long term finance and engineering planning assessments to the short term operational measures for scheduling and maintenance. Most of the chapters in this book are based on...
This book collects a wealth of information about spatial audio coding into one comprehensible volume. It is a thorough reference to the 3GPP and MPEG Parametric Stereo standards and the MPEG Surround multi-channel audio coding standard. It describes key developments in coding techniques, which is an important factor in the optimization of...
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web...
A country's vision for developing renewable and sustainable energy resources is typically propelled by three important drivers – security, cost, and environmental impact. The U.S. currently accounts for a quarter of the world’s total oil consumption, with domestic demands necessitating – at an ever growing cost – a...
There is growing concern about the state of the world's oceans. The rapid growth of human populations in coastal regions has led to increasing dependence on marine resources. Beneficial features related to food supply and life style need to be balanced against the hazards presented by microbial pathogens, chemical pollutants, and toxic algal...