Skip to main content

Books in Computer systems organization

61-70 of 263 results in All results

Planning and Design of Information Systems

  • 1st Edition
  • June 28, 2014
  • André Blokdijk
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 5 7 8 - 7
Planning and Design of Information Systems provides a theoretical base and a practical method of executing the planning of computerized information systems, and the planning and design of individual applications. The book is organized into five parts, covering the non-technical and nonimplementational part of information systems planning, design, and development. Part I gives the theoretical base for the subsequent parts of the book. It discusses modeling, techniques, notations, boundaries, quality issues and aspects, and decomposition techniques and problems. Part II discusses the needs, problems, and possible solutions for user participation. It describes user organizations, in respect of culture; maturity in the use of automation and computers; and gives a synthesis of participation, cultures, maturity, and information systems development techniques. Part III describes how to develop an Information Systems Architecture, an Information Systems Plan, and a Data Architecture. Part IV presents a structured, programmed approach to planning an application in a short period while maintaining high quality, and discusses project management of application development. Part V covers information analysis, data specification and conceptual data base design, and process and dialog design.

Parallel Processing from Applications to Systems

  • 1st Edition
  • June 28, 2014
  • Dan I. Moldovan
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 7 5 1 - 4
This text provides one of the broadest presentations of parallelprocessing available, including the structure of parallelprocessors and parallel algorithms. The emphasis is on mappingalgorithms to highly parallel computers, with extensive coverage ofarray and multiprocessor architectures. Early chapters provideinsightful coverage on the analysis of parallel algorithms andprogram transformations, effectively integrating a variety ofmaterial previously scattered throughout the literature. Theory andpractice are well balanced across diverse topics in this concisepresentation. For exceptional clarity and comprehension, the authorpresents complex material in geometric graphs as well as algebraicnotation. Each chapter includes well-chosen examples, tablessummarizing related key concepts and definitions, and a broad rangeof worked exercises.

Scalable Shared-Memory Multiprocessing

  • 1st Edition
  • June 28, 2014
  • Daniel E. Lenoski + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 6 0 1 - 2
Dr. Lenoski and Dr. Weber have experience with leading-edge research and practical issues involved in implementing large-scale parallel systems. They were key contributors to the architecture and design of the DASH multiprocessor. Currently, they are involved with commercializing scalable shared-memory technology.

Computer System Organization

  • 1st Edition
  • June 25, 2014
  • Elliott I. Organick
  • Robert L. Ashenhurst
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 1 9 0 4 - 2
Computer System Organization: The B5700/B6700 Series focuses on the organization of the B5700/B6700 Series developed by Burroughs Corp. More specifically, it examines how computer systems can (or should) be organized to support, and hence make more efficient, the running of computer programs that evolve with characteristically similar information structures. Comprised of nine chapters, this book begins with a background on the development of the B5700/B6700 operating systems, paying particular attention to their hardware/software architecture. The discussion then turns to the block-structured processes involved in the B6700 job, which consists of a time-invariant algorithm and a time-varying data structure which is the record of execution of that algorithm. Subsequent chapters deal with the basic data structures for B6700 algorithms; task attributes and the creation and coordination of tasks; stack structure and stack ownership; and software interrupts. Storage control strategies as well as the pros and cons of B6700 are also considered, along with some hardware details of procedure entry and return and tasking. This monograph is intended for computer center directors, other computer professionals, and serious students in computer science who have an interest in the subject of computer organization.

Analysis, Design and Evaluation of Man-Machine Systems 1989

  • 1st Edition
  • May 23, 2014
  • B. Hu
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 8 8 7 - 0
The twenty-seven papers cover recent advances in both empirical and theoretical aspects of man-machine interaction with special emphasis on the subjects of man-automation and man-computer interaction. They provide information on a subject which has grown rapidly in importance during recent years.

Data Communication Systems and Their Performance

  • 1st Edition
  • May 23, 2014
  • G. Pujolle + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 8 4 1 - 2
The research papers in this volume describe recent, original developments in techniques, tools and applications in the area of communication system performance. Involved in the project are researchers from the world's leading universities, research institutes and companies.

Theory and Application of Digital Control

  • 1st Edition
  • May 20, 2014
  • A. K. Mahalanabis
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 1 - 5 3 7 7 - 3
Theory and Application of Digital Control contains the proceedings of the IFAC Symposium held at New Delhi, India on January 5-7, 1982. This book particularly presents the texts of the five plenary talks and the 110 papers of the symposium. This book organizes the papers into 109 chapters, with nearly one-third of the papers focus on digital control, particularly, software and hardware of control using microcomputers; computer-aided design; and adaptive control and modeling for digital control. Another set of papers deal with several applications of digital control techniques in solving interesting problems of socio economic systems, electrical power systems, bio systems, and artificial satellites. The reader will benefit hugely from the topics in this book that span several important theoretical and applied areas of the fast-changing topic of digital control.

Modeling Enterprise Architecture with TOGAF

  • 1st Edition
  • May 7, 2014
  • Philippe Desfray + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 9 9 8 4 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 9 9 9 5 - 8
Modeling Enterprise Architecture with TOGAF explains everything you need to know to effectively model enterprise architecture with The Open Group Architecture Framework (TOGAF), the leading EA standard. This solution-focused reference presents key techniques and illustrative examples to help you model enterprise architecture. This book describes the TOGAF standard and its structure, from the architecture transformation method to governance, and presents enterprise architecture modeling practices with plenty of examples of TOGAF deliverables in the context of a case study. Although widespread and growing quickly, enterprise architecture is delicate to manage across all its dimensions. Focusing on the architecture transformation method, TOGAF provides a wide framework, which covers the repository, governance, and a set of recognized best practices. The examples featured in this book were realized using the open source Modelio tool, which includes extensions for TOGAF.

Social Engineering Penetration Testing

  • 1st Edition
  • April 11, 2014
  • Gavin Watson + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 2 0 1 2 4 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 4 2 0 1 8 2 - 8
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.

Collaboration with Cloud Computing

  • 1st Edition
  • April 7, 2014
  • Ric Messier
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 7 0 4 0 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 7 1 2 3 - 7
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network