Skip to main content

Books in Applications general

21-30 of 48 results in All results

Databases for Production Management

  • 1st Edition
  • December 2, 2012
  • R. Companys + 2 more
  • English
  • eBook
    9 7 8 - 0 - 4 4 4 - 5 9 8 7 8 - 3
Dealing with many aspects of the design, implementation and operation of databases for production management systems, this book presents research that is important to all those presently concerned with the computerisation of production management.

Programming Lego Mindstorms NXT

  • 1st Edition
  • April 18, 2011
  • Owen Bishop
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 9 9 6 - 3
Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques using NXT-G and Microsoft VPL. For hobbyists, and students working on robot projects, Bishop provides the background and tools to program your robot for tasks that go beyond the simple routines provided with the robot kit. The programs range in complexity from simple contact avoidance and path following, to programs generating some degree of artificial intelligence

Computability Theory

  • 1st Edition
  • December 2, 2010
  • Herbert B. Enderton
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 8 4 9 5 8 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 3 8 4 9 5 9 - 5
Computability Theory: An Introduction to Recursion Theory provides a concise, comprehensive, and authoritative introduction to contemporary computability theory, techniques, and results. The basic concepts and techniques of computability theory are placed in their historical, philosophical and logical context. This presentation is characterized by an unusual breadth of coverage and the inclusion of advanced topics not to be found elsewhere in the literature at this level. The text includes both the standard material for a first course in computability and more advanced looks at degree structures, forcing, priority methods, and determinacy. The final chapter explores a variety of computability applications to mathematics and science. Computability Theory is an invaluable text, reference, and guide to the direction of current research in the field. Nowhere else will you find the techniques and results of this beautiful and basic subject brought alive in such an approachable way.

Designing with the Mind in Mind

  • 1st Edition
  • May 20, 2010
  • Jeff Johnson
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 6 3 0 2 - 0
Early user interface (UI) practitioners were trained in cognitive psychology, from which UI design rules were based. But as the field evolves, designers enter the field from many disciplines. Practitioners today have enough experience in UI design that they have been exposed to design rules, but it is essential that they understand the psychology behind the rules in order to effectively apply them. In Designing with the Mind in Mind, Jeff Johnson, author of the best selling GUI Bloopers, provides designers with just enough background in perceptual and cognitive psychology that UI design guidelines make intuitive sense rather than being just a list of rules to follow.

Geometric Algebra for Computer Science (Revised Edition)

  • 1st Edition
  • February 24, 2009
  • Leo Dorst + 2 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 7 4 9 4 2 - 0
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 5 8 7 9 - 8
Geometric Algebra for Computer Science (Revised Edition) presents a compelling alternative to the limitations of linear algebra. Geometric algebra (GA) is a compact, time-effective, and performance-enhancing way to represent the geometry of 3D objects in computer programs. This book explains GA as a natural extension of linear algebra and conveys its significance for 3D programming of geometry in graphics, vision, and robotics. It systematically explores the concepts and techniques that are key to representing elementary objects and geometric operators using GA. It covers in detail the conformal model, a convenient way to implement 3D geometry using a 5D representation space. Numerous drills and programming exercises are helpful for both students and practitioners. A companion web site includes links to GAViewer, a program that will allow you to interact with many of the 3D figures in the book; and Gaigen 2, the platform for the instructive programming exercises that conclude each chapter. The book will be of interest to professionals working in fields requiring complex geometric computation such as robotics, computer graphics, and computer games. It is also be ideal for students in graduate or advanced undergraduate programs in computer science.

A Guide to Microsoft Excel 2007 for Scientists and Engineers

  • 1st Edition
  • November 20, 2008
  • Bernard Liengme
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 3 7 4 6 2 3 - 8
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 2 3 5 1 - 2
Completely updated guide for scientists, engineers and students who want to use Microsoft Excel 2007 to its full potential.Electronic spreadsheet analysis has become part of the everyday work of researchers in all areas of engineering and science. Microsoft Excel, as the industry standard spreadsheet, has a range of scientific functions that can be utilized for the modeling, analysis and presentation of quantitative data. This text provides a straightforward guide to using these functions of Microsoft Excel, guiding the reader from basic principles through to more complicated areas such as formulae, charts, curve-fitting, equation solving, integration, macros, statistical functions, and presenting quantitative data.

Nokia Firewall, VPN, and IPSO Configuration Guide

  • 1st Edition
  • November 14, 2008
  • Andrew Hay + 2 more
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 8 6 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 4 9 1 6 - 1
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."--Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.

GFI Network Security and PCI Compliance Power Tools

  • 1st Edition
  • September 22, 2008
  • Brien Posey
  • English
  • Paperback
    9 7 8 - 1 - 5 9 7 4 9 - 2 8 5 - 0
  • eBook
    9 7 8 - 0 - 0 8 - 0 9 4 9 1 5 - 4
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.

Designing Storage for Exchange 2007 SP1

  • 1st Edition
  • August 15, 2008
  • Pierre Bijaoui + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 6 0 0 3 - 8
Designing Storage for Exchange 2007 SP1 will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange Server from a 32-bit application to the 64-bit world reduced the I/O footprint on the storage subsystem. This allows users to consider shared storage deployments or go the opposite way and focus on direct attached storage. Supporting large mailboxes is now possible, but how do you back up and recover the increased amount of data? Exchange Server 2007 Continuous Replication and new features in Windows Server 2008 Failover Clustering provides interesting possibilities for geographically dispersed deployments. This book explains these new built-in features of Exchange Server 2007 and compares them with application independent data replication solutions provided by high-end storage subsystems. It is critical to understand these key technologies to make the right decision which storage solution best fits your business needs. The authors share their experience from large scale deployments and depict configurations used during their projects.