Skip to main content

Morgan Kaufmann

  • Mobile Technology for Children

    Designing for Interaction and Learning
    • 1st Edition
    • Allison Druin
    • English
    Children are one of the largest new user groups of mobile technology -- from phones to micro-laptops to electronic toys. These products are both lauded and criticized, especially when it comes to their role in education and learning. The need has never been greater to understand how these technologies are being designed and to evaluate their impact worldwide. Mobile Technology for Children brings together contributions from leaders in industry, non-profit organizations, and academia to offer practical solutions for the design and the future of mobile technology for children.
  • TCP/IP Sockets in C

    Practical Guide for Programmers
    • 2nd Edition
    • Michael J. Donahoo + 1 more
    • English
    TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition is a quick and affordable way to gain the knowledge and skills needed to develop sophisticated and powerful web-based applications. The book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to virtually all client-server projects using sockets in C. This edition has been expanded to include new advancements such as support for IPv6 as well as detailed defensive programming strategies. If you program using Java, be sure to check out this book’s companion, TCP/IP Sockets in Java: Practical Guide for Programmers, 2nd Edition.
  • Electronic Design Automation

    Synthesis, Verification, and Test
    • 1st Edition
    • Laung-Terng Wang + 2 more
    • English
    This book provides broad and comprehensive coverage of the entire EDA flow. EDA/VLSI practitioners and researchers in need of fluency in an "adjacent" field will find this an invaluable reference to the basic EDA concepts, principles, data structures, algorithms, and architectures for the design, verification, and test of VLSI circuits. Anyone who needs to learn the concepts, principles, data structures, algorithms, and architectures of the EDA flow will benefit from this book.
  • Geometric Algebra for Computer Science (Revised Edition)

    An Object-Oriented Approach to Geometry
    • 1st Edition
    • Leo Dorst + 2 more
    • English
    Geometric Algebra for Computer Science (Revised Edition) presents a compelling alternative to the limitations of linear algebra. Geometric algebra (GA) is a compact, time-effective, and performance-enhancin... way to represent the geometry of 3D objects in computer programs. This book explains GA as a natural extension of linear algebra and conveys its significance for 3D programming of geometry in graphics, vision, and robotics. It systematically explores the concepts and techniques that are key to representing elementary objects and geometric operators using GA. It covers in detail the conformal model, a convenient way to implement 3D geometry using a 5D representation space. Numerous drills and programming exercises are helpful for both students and practitioners. A companion web site includes links to GAViewer, a program that will allow you to interact with many of the 3D figures in the book; and Gaigen 2, the platform for the instructive programming exercises that conclude each chapter. The book will be of interest to professionals working in fields requiring complex geometric computation such as robotics, computer graphics, and computer games. It is also be ideal for students in graduate or advanced undergraduate programs in computer science.
  • Web Application Design Patterns

    • 1st Edition
    • Pawan Vora
    • English
    Ever notice that—in spite of their pervasiveness—design... web applications is still challenging? While their benefits motivate their creation, there are no well-established guidelines for design. This often results in inconsistent behaviors and appearances, even among web applications created by the same company. Design patterns for web applications, similar in concept to those for web sites and software design, offer an effective solution. In Web Application Design Patterns, Pawan Vora documents design patterns for web applications by not only identifying design solutions for user interaction problems, but also by examining the rationale for their effectiveness, and by presenting how they should be applied.
  • Effective Prototyping with Excel

    A Practical Handbook for Developers and Designers
    • 1st Edition
    • Nevin Berger + 3 more
    • English
    Although recognized as a key to the design process, prototyping often falls victim to budget cuts, deadlines, or lack of access to sophisticated tools. This can lead to sloppy and ineffective prototypes or the abandonment of them altogether. Rather than lose this important step, people are turning to Microsoft Excel® to create effective, simple, and inexpensive prototypes. Conveniently, the software is available to nearly everyone, and most are proficient in its basic functionality. Effective Prototyping with Excel offers how-to guidance on how everyone can use basic Excel skills to create prototypes – ranging from narrative wire frames to hi-fidelity prototypes. A wide array of software design problems and business demands are solved via practical step-by-step examples and illustrations.
  • P2P Networking and Applications

    • 1st Edition
    • John Buford + 2 more
    • English
    Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a viable multimillion dollar business model for the distribution of information, telecommunications, and social networking. Written at an accessible level for any reader familiar with fundamental Internet protocols, the book explains the conceptual operations and architecture underlying basic P2P systems using well-known commercial systems as models and also provides the means to improve upon these models with innovations that will better performance, security, and flexibility. Peer-to-Peer Networking and Applications is thus both a valuable starting point and an important reference to those practitioners employed by any of the 200 companies with approximately $400 million invested in this new and lucrative technology.
  • Business Modeling

    A Practical Guide to Realizing Business Value
    • 1st Edition
    • David M. Bridgeland + 1 more
    • English
    As business modeling becomes mainstream, every year more and more companies and government agencies are creating models of their businesses. But creating good business models is not a simple endeavor. Business modeling requires new skills. Written by two business modeling experts, this book shows you how to make your business modeling efforts successful. It provides in-depth coverage of each of the four distinct business modeling disciplines, helping you master them all and understand how to effectively combine them. It also details best practices for working with subject matter experts. And it shows how to develop models, and then analyze, simulate, and deploy them. This is essential, authoritative information that will put you miles ahead of everyone who continues to approach business modeling haphazardly.
  • Disappearing Cryptography

    Information Hiding: Steganography and Watermarking
    • 3rd Edition
    • Peter Wayner
    • English
    Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
  • The Illustrated Network

    How TCP/IP Works in a Modern Network
    • 1st Edition
    • Walter Goralski
    • English
    In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two:Stevens Gora... Older operating systems (AIX,svr4,etc.) Newe... OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series)Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!)No IPSec IPSecNo multicast Multica... router security discussed Firewall routers detailedNo Web Full Web browser HTML considerationNo IPv6 IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols