Skip to main content

Books in Computing milieux general

    • Intelligent Environments

      • 2nd Edition
      • December 5, 2022
      • P. Droege
      • English
      • Paperback
        9 7 8 0 1 2 8 2 0 2 4 7 0
      • eBook
        9 7 8 0 1 2 8 2 0 2 4 8 7
      The promises and realities of digital innovation have come to suffuse everything from city regions to astronomy, government to finance, art to medicine, politics to warfare, and from genetics to reality itself. Digital systems augmenting physical space, buildings, and communities occupy a special place in the evolutionary discourse about advanced technology. The two Intelligent Environments books edited by Peter Droege span a quarter of a century across this genre. The second volume, Intelligent Environments: Advanced Systems for a Healthy Planet, asks: how does civilization approach thinking systems, intelligent spatial models, design methods, and support structures designed for sustainability, in ways that could counteract challenges to terrestrial habitability? This book examines a range of baseline and benchmark practices but also unusual and even sublime endeavors across regions, currencies, infrastructure, architecture, transactive electricity, geodesign, net-positive planning, remote work, integrated transport, and artificial intelligence in understanding the most immediate spatial setting: the human body. The result of this quest is both highly informative and useful, but also critical. It opens windows on what must fast become a central and overarching existential focus in the face of anthropogenic planetary heating and other threats—and raises concomitant questions about direction, scope, and speed of that change.
    • Safety of Computer Control Systems 1986 (Safecomp '86) Trends in Safe Real Time Computer Systems

      • 1st Edition
      • February 24, 2017
      • W. J. Quirk
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 2 7 8
      • eBook
        9 7 8 1 4 8 3 2 9 9 4 7 1
      The proceedings of the fifth workshop in this subject continue the trend set by the previous four and discusses some of the current problems involved in the design and production of safe real-time computer systems. Topics covered include software quality assurance, software fault tolerance, design for safety, and reliability and safety assessment. Every paper details the theoretical and practical problems involved in the development of safe systems and should therefore be of interest to all those involved in systems design.
    • The Basics of Cyber Safety

      • 1st Edition
      • August 20, 2016
      • John Sammons + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 5 0 9
      • eBook
        9 7 8 0 1 2 4 1 6 6 3 9 4
      The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.
    • Building a Practical Information Security Program

      • 1st Edition
      • October 3, 2016
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 0 4 2 5
      • eBook
        9 7 8 0 1 2 8 0 2 0 8 8 3
      Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.
    • Computing Perspectives

      • 1st Edition
      • June 28, 2014
      • Maurice V. Wilkes
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 3 1 7 2
      • eBook
        9 7 8 0 0 8 0 5 0 2 6 8 7
      In this insightful collection of essays, Maurice Wilkes shares his unique perspective on the development of computers and the current state of the art. These enlightening essays discuss the foundational ideas behind modern computing and provide a solid grounding for the appreciation of emerging computer technologies.Wilkes, one of the founders of computing, has provided enormous contributions to the development of computers, including the design and construction of the EDSAC computer and early development of programming for a stored program computer. He was responsible for the concept of microprogramming. Wilkes also wrote the first paper to appear on cache memories and was an early worker in the field of wide bandwidth local area networks. In 1992 he was awarded the prestigious Kyoto Prize for Advanced Technology.These essays will be of interest to everyone involved with computers and how they arrived at their present state. Wilkes presents his perspectives with keen historical sensibility and engineering practicality. Readers are invited to consider these observations and form their own perspectives on the present state of the computer art.
    • History of Computing in the Twentieth Century

      • 1st Edition
      • June 28, 2014
      • Nicholas Metropolis
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 6 0 9 1
      • eBook
        9 7 8 1 4 8 3 2 9 6 6 8 5
      A History of Computing in the Twentieth Century focuses on the advancements in the processes, methodologies, programs, and techniques in computing. The selection first elaborates on computing developments in Cambridge, U.S.A., pioneering work on computers at Bletchley, and the COLOSSUS. Discussions focus on secrecy and priority, the first COLOSSUS, MARK II COLOSSUS, postwar developments in computing, and the HEATH ROBINSON project. The text then ponders on Turing's work at the National Physical Laboratory and the construction of Pilot ACE, DEUCE, and ACE, the Smithsonian Computer History Project, and programming in America. Topics include origins of FORTRAN, optimization techniques in FORTRAN, DEUCE computer, and the Pilot ACE. The book takes a look at the development of programming in the USSR, advancement of programming languages, and reflections on the evolution of algorithmic language. The book also examines the computer development at Manchester University, the sieve process, MANIAC project, and the ENIAC project. The selection is a valuable reference for computer science experts and researchers interested in the development of computing.
    • Safety of Computer Control Systems 1990 (SAFECOMP'90)

      • 1st Edition
      • June 28, 2014
      • B.K. Daniels
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 2 3 0
      • eBook
        9 7 8 1 4 8 3 2 9 8 3 5 1
      The market for safe, secure and reliable computer systems is expanding continuously and these Proceedings provide an opportunity to review the growth during the last decade and identify skills and technologies required for continued development in the area. The papers cover the experiences gained from specifying, creating, operating, and licensing computers in safety, security and reliability related applications. There are reviews of guidelines and industrial applications, with a section covering methods and tools used in designing, documenting, analysing, testing and assessing systems dependent on the SAFECOMP factors.
    • Data Protection and Security for Personal Computers

      • 1st Edition
      • June 28, 2014
      • R. Schifreen
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 1 6 3 2
      • eBook
        9 7 8 1 4 8 3 2 9 4 7 4 2
      Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.Practic... comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.UNIQUE FEATURES INCLUDE:– Totally PC and LAN specific– Practical tips and guidance– Comprehensive coverage of the topic– Unique action sheets for immediate implementation– Step–by– step coverage, easy to read, with limited technical jargonWHO SHOULD READ THIS GUIDE:– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.– Senior managers who wish to ensure that data on their employees PC's is safe at all times.– Managers with little computing or security experience who wish to implement a security policy throughout an organization.Please note this is a Short Discount publication.
    • Computer Risk Manager

      • 1st Edition
      • June 28, 2014
      • K.R. Pursall
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 1 7 2 4
      • eBook
        9 7 8 1 4 8 3 2 9 6 7 8 4
      Please note this is a Short Discount publication.A comprehensive guide to EDP contingency planning and disaster recovery.Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the latest thinking on contingency planning.The new third edition follows the same step–by–step practical guidance as the last edition – presenting an immediate source of reference for anyone wanting to develop their own contingency plan BEFORE a systems disaster. As well as a useful check for those assessing the security of their present systems.Who should read it:★ IT Managers★ Operations Managers★ Computer Security Managers★ MIS Managers★ Technical Support Managers★ Computer Manufacturers and Suppliers★ Computer Auditors★ General Managers
    • Computer Security in Financial Organizations

      • 1st Edition
      • June 28, 2014
      • J. Essinger
      • English
      • Paperback
        9 7 8 0 9 4 6 3 9 5 6 4 4
      • eBook
        9 7 8 1 4 8 3 2 9 4 6 2 9
      This book provides a unique in–depth focus on how financial organizations and suppliers of computer security are currently addressing – in strategic terms – the problem of computer security.Written in an easy to read, non technical style the book is essential reading for all those involved in the management of this sensitive area, from computer security managers, financial directors and managers to analysts and designers in financial software houses.The report analyses the computer security requirements of a wide variety of organizations in the financial services sector, ranging from retail, commercial and investment banks to financial trading and investment management organizations.