This book contains a detailed analysis of the International Standard for the C language,-3.1 excluding the
library from a number of perspectives. The organization of the material is unusual in that it is based on
the actual text of the published C Standard. The unit of discussion is the individual sentences from the C
Standard (2022 of...
Change: It’s what we expect from technology, from the PC to
the web, through to HD TV. But nothing has been as disruptive
as the change the iPhone and Android phones have brought.
For the first time the power of a computer will fit in your hand,
you are always connected to the Internet, and these devices are
loaded with...
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...
Joomla is an open source content management system (CMS) that anyone can download for free (see forge.joomla.org/sf/go/projects.joomla/frs). This makes it an ideal choice for small businesses. Don’t let the price tag fool you, though; Joomla is powerful and robust, and more big organizations are choosing to use open source software...
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections...
This book attempts to provide a unified overview of the broad field of data and computer communications.
The organization of the book reflects an attempt to break this massive subject
into comprehensible parts and to build, piece by piece, a survey of the state of the art.The book
emphasizes basic...
Active Directory is a common repository for information about objects that reside on
the network, such as users, groups, computers, printers, applications, and files. The
default Active Directory schema supports numerous attributes for each object class that
can be used to store a variety of information. Access Control Lists (ACLs) are...
The study of the class of computable partial functions (i.e., recursive partial functions)
stands at the intersection of three fields: mathematics, theoretical computer science,
and philosophy.
Mathematically, computability theory originates from the concept of an algorithm.
It leads to a classification of functions according...
Randomization has become a standard approach in algorithm design. Efficiency
and simplicity are the main features of randomized algorithms that
often made randomization a miraculous springboard for solving complex problems
in various applications. Especially in the areas of communication, cryptography,
data management, and discrete...
This book is about guaranteed numerical methods based on interval analysis for approximating sets, and about the application of these methods to vast classes of engineering problems. Guaranteed means here that inner and outer approximations of the sets of interest are obtained, which can be made as precise as desired, at the cost of...
Database macro programming has changed enormously over the last 15 years,
having gone from Access Basic macros to VBA. Another major change occurred
with Office 95, when macros went to VBA modules in a separate environment
accessed via the Visual Basic Editor. It used to be fairly basic: code was entered into a special
design window....
With more than 400 million active users and growing, it’s hard to ignore
the buzz about Facebook. It’s a hot topic these days, and shows no signs of
letting up. If you’re ready to get to the bottom of this Internet sensation
and find out how to use this social networking phenomenon for yourself,...