New Arrivals: TK 1 - TK 9999
Showing 1 - 25 of 134 new items.
-
© 2016,Computers and technology have reached a level of invisibility in our lives that is equal to indoor plumbing and electricity. We don't think about the mechanics of how they work, but when any of those systems breaks it is a MASSIVE disruption in our lives. All of us understand the basics of how a fuse box works or how to plunge a toilet, and with this book you will learn those equivalents in the IT world. This book will give a basic understanding of the various disciplines that exist within the IT world, some of the thought processes behind the methodologies IT professionals follow, and touch on some of the realities of living in a truly technological wonderland.
-
© 2016,This concise textbook examines the fundamental aspects of intelligent computing for surveillance systems, from camera calibration and data capturing, to secure data transmission. The text covers digital surveillance from the level of an individual object or biometric feature, to the full lifecycle of an event. This is followed by a detailed discussion on how an intelligent system can independently monitor and learn from an event, and invite human input when necessary. The book concludes with a presentation on how the system can be enhanced through the use of supercomputing technology. Features: contains exercises at the end of every chapter, and a glossary; covers the key issues of computer network infrastructure, security, monitoring and forensics, and the essential aspects of object analysis; reviews algorithms for surveillance data analytics using biometric features; discusses the use of AI for surveillance events; reviews algorithms that trigger an alarm to alert a member of security staff.
-
© 2016,Whether you need a personal site to showcase your work, or a complex webstore with customised features, you can build it yourself without having to code, design or spend a lot of money. Alannah Moore made a name for herself by demystifying website creation and enabling non-technical people to get themselves up and online using the powerful tools available today - the 'Do-It-Yourself' way. She guides you through every decision, breaking down each step along the way, from planning your pages to getting the most out of social media and search engines. Whether it's WordPress, Weebly, Squarespace, Wix, Shopify or something different, this book will help you choose something for you. In Alannah's capable hands, you will find the process of building your site easy, painless and enjoyable.
-
© 2016,The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming each one more pernicious than the last from China, Russia, Iran, North Korea, the Middle East, and points unknown. The continuing attacks raise a deeply disturbing question: Is the issue simply beyond the reach of our government, political leaders, business leaders, and technology visionaries to resolve? In Hacked, veteran cybersecurity journalist Charlie Mitchell reveals the innovative, occasionally brilliant, and too-often hapless government and industry responses to growing cybersecurity threats. He examines the internal power struggles in the federal government, the paralysis on Capitol Hill, and the industry's desperate effort to stay ahead of both the bad guys and the government."
-
© 2016,Online trolling and other deviant behaviors have always affected online communities. As online trolling becomes widely spread, myriad questions are raised, including: -Who is a troll and why do trolls troll? -What are the enabling factors of online trolling? -How do members and administrators of online communities detect, interpret, and react to trolling? How can online trolling be handled effectively? -What is the impact of the socio-cultural and technological environments on online trolling? -What motivates trolling? The book answers these questions and includes the following focuses: -Hard-core trolls and light trolls -Gender, trolling, and anti-social behavior online -Perception of trolling -Collaborative trolling -Ideological trolls -Trolling around the globe
-
© 2016,This book addresses an often-neglected aspect of the creation of VHDL designs. A VHDL description is also source code, and VHDL designers can use the best practices of software development to write high-quality code and to organize it in a design. This book presents this unique set of skills, teaching VHDL designers of all experience levels how to apply the best design principles and coding practices from the software world to the world of hardware. The concepts introduced here will help readers write code that is easier to understand and more likely to be correct, with improved readability, maintainability, and overall quality. After a brief review of VHDL, the book presents fundamental design principles for writing code, discussing such topics as design, quality, architecture, modularity, abstraction, and hierarchy. Building on these concepts, the book then introduces and provides recommendations for each basic element of VHDL code, including statements, design units, types, data objects, and subprograms. The book covers naming data objects and functions, commenting the source code, and visually presenting the code on the screen. All recommendations are supported by detailed rationales. Finally, the book explores two uses of VHDL: synthesis and testbenches. It examines the key characteristics of code intended for synthesis (distinguishing it from code meant for simulation) and then demonstrates the design and implementation of testbenches with a series of examples that verify different kinds of models, including combinational, sequential, and FSM code. Examples from the book are also available on a companion website, enabling the reader to experiment with the complete source code.
-
© 2016,This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building designers and maintenance personnel, much of the terminology applies to cyber-physical attacks in general. Buildings today are automated because the systems are complicated so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS can all be hacked. The Cybersecurity Lexicon puts cyber jargon related to building controls all in one place. The book is a handy desk reference for professionals interested in preventing cyber-physical attacks against their facilities in the real world. Discussion of cybers-physical attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. The book provides: Concepts related to cyber-physical attacks and building hacks are listed alphabetically with text easily searchable by key phrase. Definitions of technical terms related to equipment controls common to industry, utilities, and buildings—much of the terminology also applies to cybersecurity in general. What you’ll learn Readers will be able to quickly find cybersecurity-physical attack concepts and get a simple explanation of the meaning. Many of the most common types of cybersecurity-attacks are explained so readers can quickly assess the threat to their facilities in real time. The definition of as facilities, engineering, and cybersecurity acronyms. Who This Book Is For Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.
-
© 2016,This book provides an overview of floating offshore wind farms and focuses on the economic aspects of this renewable-energy technology. It presents economic maps demonstrating the main costs, and explores various important aspects of floating offshore wind farms. It examines topics including offshore wind turbines, floating offshore wind platforms, mooring and anchoring, as well as offshore electrical systems. It is a particularly useful resource in light of the fact that most water masses are deep and therefore not suitable for fixed offshore wind farms. A valuable reference work for students and researchers interested in naval and ocean engineering and economics, this book provides a new perspective on floating offshore wind farms, and makes a useful contribution to the existing literature.
-
© 2016,We are in the center of the most life-changing technological revolution the Earth has ever known. In little more than 65 years, an eye-blink in human history, a single technological invention has launched the proverbial thousand ships, producing the most sweeping and pervasive set of changes ever to wash over humankind; changes that are reshaping the very core of human existence, on a global scale, at a relentlessly accelerating pace. And we are just at the very beginning. Silicon Earth: Introduction to Microelectronics and Nanotechnologyintroduces readers with little or no technical background to the marvels of microelectronics and nanotechnology, using straightforward language, an intuitive approach, minimal math, and lots of pictures. The general scientific and engineering underpinnings of microelectronics and nanotechnology are described, as well as how this new technological revolution is transforming a broad array of interdisciplinary fields, and civilization as a whole. Special "widget deconstruction" chapters address the inner workings of ubiquitous micro/nano-enabled pieces of technology, such as smartphones, flash drives, and digital cameras. Completely updated and upgraded to full color, the Second Edition : Includes new material on the design of electronic systems, the future of electronics, and the societal impact of micro/nanotechnology Provides new widget deconstructions of cutting-edge tech gadgets like the GPS-enabled smartwatch Adds end-of-chapter study questions and hundreds of new color photos Silicon Earth: Introduction to Microelectronics and Nanotechnology, Second Edition is a pick-up-and-read-cover-to-cover book for those curious about the micro/nanoworld, as well as a classroom-tested, student-and-professor-approved text ideal for an undergraduate-level university course. Lecture slides, homework examples, a deconstruction project, and discussion threads are available via an author-maintained website.
-
© 2016,Autonomous vehicles use global navigation satellite systems (GNSS) to provide a position within a few centimeters of truth. Centimeter positioning requires accurate measurement of each satellite's direct path propagation time. Multipath corrupts the propagation time estimate by creating a time-varying bias. A GNSS receiver model is developed and the effects of multipath are investigated. MATLABtm code is provided to enable readers to run simple GNSS receiver simulations. More specifically, GNSS signal models are presented and multipath mitigation techniques are described for various multipath conditions. Appendices are included in the booklet to derive some of the basics on early minus late code synchronization methods. Details on the numerically controlled oscillator and its properties are also given in the appendix.
-
© 2016,Information seeking is a fundamental human activity. In the modern world, it is frequently conducted through interactions with search systems. The retrieval and comprehension of information returned by these systems is a key part of decision making and action in a broad range of settings. Advances in data availability coupled with new interaction paradigms, and mobile and cloud computing capabilities, have created a broad range of new opportunities for information access and use. In this comprehensive book for professionals, researchers, and students involved in search system design and evaluation, search expert Ryen White discusses how search systems can capitalize on new capabilities and how next-generation systems must support higher order search activities such as task completion, learning, and decision making. He outlines the implications of these changes for the evolution of search evaluation, as well as challenges that extend beyond search systems in areas such as privacy and societal benefit.
-
© 2016,A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization The simple, visual, at-a-glance guide to SDN and NFV: Core concepts, business drivers, key technologies, and more! SDN (Software Defined Networks) and NFV (Network Function Virtualization) are today's hottest areas of networking. Many executives, investors, sales professionals, and marketers need a solid working understanding of these technologies, but most books on the subject are written specifically for network engineers and other technical experts. SDN and NFV Simplified fills that gap, offering highly visual, "at-a-glance" explanations of SDN, NFV, and their underlying virtualizations. Built around an illustrated, story-telling approach, this answers the questions: Why does this technology matter? How does it work? Where is it used? What problems does it solve? Through easy, whiteboard-style infographics, you'll learn: how virtualization enables SDN and NFV; how datacenters are virtualized through clouds; how networks can also be virtualized; and how to maximize security, visibility, and Quality of Experience in tomorrow's fully-virtualized environments. Step by step, you'll discover why SDN and NFV technologies are completely redefining both enterprise and carrier networks, and driving the most dramatic technology migration since IP networking. That's not all: You'll learn all you need to help lead this transformation. Learn how virtualization establishes the foundation for SDN and NFV Review the benefits of VMs, the role of hypervisors, and the management of virtual resources Discover how cloud technologies enable datacenter virtualization Understand the roles of networking gear in virtualized datacenters See VMWare VMotion and VXLAN at work in the virtualized datacenter Understand multitenancy and the challenges of "communal living" Learn how core network functions and appliances can be virtualized Ensure performance and scalability in virtualized networks Compare modern approaches to network virtualization, including OpenFlow, VMWare Nicera, Cisco Inseieme, and OpenStack Walk through the business case for SDN, NFV, and the Cloud Discover how the Software Defined Network (SDN) solves problems previously left unaddressed Understand SDN controllers-and who's fighting to control your network Use SDN and NFV to improve integration and say goodbye to "truck rolls" Enforce security, avoid data leakage, and protect assets through encryption Provide for effective monitoring and consistent Quality of Experience (QoE) Learn how SDN and NFV will affect you-and what's next
-
© 2016,As the need for proficient power resources continues to grow, it is becoming increasingly important to implement new strategies and technologies in energy distribution to meet consumption needs. The employment of smart grid networks assists in the efficient allocation of energy resources. Smart Grid as a Solution for Renewable and Efficient Energy features emergent research and trends in energy consumption and management, as well as communication techniques utilized to monitor power transmission and usage. Emphasizing developments and challenges occurring in the field, this book is a critical resource for researchers and students concerned with signal processing, power demand management, energy storage procedures, and control techniques within smart grid networks.
-
© 2016,Welcome to the uncertain world of "Radio 2.0"--where podcasts, mobile streaming, and huge music databases are the new reality, as are tweeting deejays and Apple's Siri serving as music announcer--and understand the exciting status this medium has, and will continue to have, in our digitally inclined society. * Presents great stories about digital radio innovators and fascinating moments in the history of AM/FM that will explain to today's "Radio 2.0 generation" what radio once was--and what it could be again * Documents the transformative impact of technologies such as the iPod and Pandora music streaming that enabled a highly individualized music-listening experience and changed the meaning of "community" from those literally surrounding a person locally to invisible users on worldwide systems like Spotify and SoundCloud * Engages readers with interesting descriptions of new technologies and their possible applications plus stories about outrageous media figures in the digital age
-
© 2015,This module introduces electrical hazards in the workplace and describes how to avoid electrical hazards and how to analyze and document shock and arc flash hazards; and how to plan and conduct work around them. Includes examples of how to complete an energized electrical work permit, and how to select the specialized personal protective equipment required for electrical work. Instructor Supplements Instructors: Product supplements may be ordered directly through OASIS at http://oasis.pearson.com . For more information contact your Pearson NCCER/Contren Sales Specialist at http://nccer.pearsonconstructionbooks.com/store/sales.aspx . · Annotated Instructor's Guide (AIG) Paperback (Includes access code for Instructor Resource Center) 978-0-13-294917-0 · PowerPoint® Presentation Slides 978-0-13-294909-5
-
© 2010,It's been known for years that usability testing can dramatically improve products. But with a typical price tag of $5,000 to $10,000 for a usability consultant to conduct each round of tests, it rarely happens. In this how-to companion to Don't Make Me Think: A Common Sense Approach to Web Usability , Steve Krug spells out a streamlined approach to usability testing that anyone can easily apply to their own Web site, application, or other product. (As he said in Don't Make Me Think , "It's not rocket surgery".) Using practical advice, plenty of illustrations, and his trademark humor, Steve explains how to: Test any design, from a sketch on a napkin to a fully-functioning Web site or application Keep your focus on finding the most important problems (because no one has the time or resources to fix them all) Fix the problems that you find, using his "The least you can do" approach By paring the process of testing and fixing products down to its essentials ("A morning a month, that's all we ask"), Rocket Surgery makes it realistic for teams to test early and often, catching problems while it's still easy to fix them. Rocket Surgery Made Easy adds demonstration videos to the proven mix of clear writing, before-and-after examples, witty illustrations, and practical advice that made Don't Make Me Think so popular.
-
© 2015,Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things. While we all use remote controls, we understand little about their history or their impact on our daily lives. Caetlin Benson-Allot looks back on the remote control's material and cultural history to explain how such an innocuous media accessory has changed the way we occupy our houses, interact with our families, and experience the world. From the first wired radio remotes of the 1920s to infrared universal remotes, from the homemade TV controllers to the Apple Remote, remote controls shape our media devices and how we live with them. Object Lessons is published in partnership with an essay series in the The Atlantic.
-
© 2015,Object Lessons is a series of short, beautifully designed books about the hidden lives of ordinary things. While we all use remote controls, we understand little about their history or their impact on our daily lives. Caetlin Benson-Allot looks back on the remote control's material and cultural history to explain how such an innocuous media accessory has changed the way we occupy our houses, interact with our families, and experience the world. From the first wired radio remotes of the 1920s to infrared universal remotes, from the homemade TV controllers to the Apple Remote, remote controls shape our media devices and how we live with them. Object Lessons is published in partnership with an essay series in the The Atlantic.
-
© 2015,Despite the nuclear accident at the Fukushima Daiichi plant in Japan, a growing number of countries are interested in expanding or introducing nuclear energy. However, nuclear energy production and nuclear waste disposal give rise to pressing ethical questions that society needs to face. This book takes up this challenge with essays by an international team of scholars focusing on the key issues of risk, justice, and democracy. The essays consider a range of ethical issues, including radiological protection, the influence of gender in the acceptability of nuclear risk, and environmental, international, and intergenerational justice in the context of nuclear energy. They also address the question of when, and under which conditions, nuclear energy should play a role in the world's future supply of electricity, looking at both developing and industrialized countries. The book will interest readers in ethics and political philosophy, social and political sciences, nuclear engineering, and policy studies.
-
© 2013,Each title in the highly acclaimed Opposing Viewpoints series explores a specific issue by placing expert opinions in a unique pro/con format; the viewpoints are selected from a wide range of highly respected and often hard-to-find publications.; This title addresses online etiquette (known as "netiquette") and ethics, addressing the relationship between the Internet and civility; whether cyberbullying is a serious problem; the etiquette and ethics of online relationships (including online dating,; "Each volume in the Opposing Viewpoints Series could serve as a model...not only providing access to a wide diversity of opinions, but also stimulating readers to do further research for group discussion and individual interest. Both shrill and moderate, th
-
© 2000,Unlike more technical texts stuffed with formulae and theories, this book explains in plain English how power is created and replaces formulae with everyday examples and easy-to-understand illustrations. It opens with an explanation of how electricity is generated, then covers the planning and development of electric power stations, emphasizing modern considerations of merchant power plants, repowering, and the growth of gas turbine generation. The "facts" of generation are covered in part two--boilers, turbines, generators, hydro and pumped storage, and "alternative" generations sources, suchs geothermal, tidal, solar, and wind. Maintenance and operations are covered in basic overview format. Finally, environmental considerations--again, an increasing concern in light of deregulation and environmental law--are reviewed. In addition, the authors cover specific features and fuel-types in nontechnical terms. Industry newcomers will appreciate this clear explanation of how power is created.
-
© 2017,Alexander and Sadiku's sixth edition of Fundamentals of Electric Circuits continues in the spirit of its successful previous editions, with the objective of presenting circuit analysis in a manner that is clearer, more interesting, and easier to understand than other, more traditional texts. Students are introduced to the sound, six-step problem solving methodology in chapter one, and are consistently made to apply and practice these steps in practice problems and homework problems throughout the text. A balance of theory, worked & extended examples, practice problems, and real-world applications, combined with over 468 new or changed homework problems complete the sixth edition. Robust media offerings, renders this text to be the most comprehensive and student-friendly approach to linear circuit analysis out there. This book retains the "Design a Problem" feature which helps students develop their design skills by having the student develop the question, as well as the solution. There are over 100 "Design a Problem" exercises integrated into problem sets in the book. Also available with the sixth edition is Connect - available January of 2016. Connect is the only integrated learning system that empowers students by continuously adapting to deliver precisely what they need, when they need it, how they need it, so that class time is more engaging and effective.
-
© 2015,This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication devices, highlighting the need to develop improved algorithms, protocols, and best practices to enhance the security of public, private and enterprise systems alike. Features: introduces the fundamentals of traditional computer networks and the security threats they face; discusses the security challenges introduced by virtualization software, cloud computing and mobile systems; examines the security quagmire presented by the home computing environment; raises important legislative, legal, social, technical and ethical security issues, including the tension between the needs of individual privacy and collective security; provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to lab exercises; supplies additional support material for instructors at an associated website.
-
© 2015,We may imagine the digital cloud as placeless, mute, ethereal, and unmediated. Yet the reality of the cloud is embodied in thousands of massive data centers, any one of which can use as much electricity as a midsized town. Even all these data centers are only one small part of the cloud. Behind that cloud-shaped icon on our screens is a whole universe of technologies and cultural norms, all working to keep us from noticing their existence. In this book, Tung-Hui Hu examines the gap between the real and the virtual in our understanding of the cloud. Hu shows that the cloud grew out of such older networks as railroad tracks, sewer lines, and television circuits. He describes key moments in the prehistory of the cloud, from the game "Spacewar" as exemplar of time-sharing computers to Cold War bunkers that were later reused as data centers. Countering the popular perception of a new "cloudlike" political power that is dispersed and immaterial, Hu argues that the cloud grafts digital technologies onto older ways of exerting power over a population. But because we invest the cloud with cultural fantasies about security and participation, we fail to recognize its militarized origins and ideology. Moving between the materiality of the technology itself and its cultural rhetoric, Hu's account offers a set of new tools for rethinking the contemporary digital environment.
-
© 2015,The only authorized Lab Manual for the Cisco Networking Academy CCNP Version 7 TSHOOT course A CCNP certification equips students with the knowledge and skills needed to plan, implement, secure, maintain, and troubleshoot converged enterprise networks. The CCNP certification requires candidates to pass three 120-minute exams-ROUTE 300-101, SWITCH 300-115, TSHOOT 300-135-that validate the key competencies of network engineers. The Cisco Networking Academy curriculum consists of three experience-oriented courses that employ industry-relevant instructional approaches to prepare students for professional-level jobs: CCNP ROUTE: Implementing IP Routing, CCNP SWITCH: Implementing IP Switching, and CCNP TSHOOT: Troubleshooting and Maintaining IP Networks. CCNP TSHOOT: Troubleshooting and Maintaining Cisco IP Networks This course teaches students how to monitor and maintain complex, enterprise routed and switched IP networks. Skills learned include the planning and execution of regular network maintenance, as well as support and troubleshooting using technology-based processes and best practices, based on systematic and industry-recognized approaches. Extensive labs emphasize hands-on learning and practice to reinforce troubleshooting techniques. CCNP ROUTE and CCNP SWITCH are both prerequisites for this course. The 12 comprehensive labs in this manual emphasize hands-on learning and practice to reinforce configuration skills.