Skip to main content

Books in Social sciences and humanities

    • Text Entry Systems

      Mobility, Accessibility, Universality
      • 1st Edition
      • I. Scott MacKenzie + 1 more
      • English
      Text Entry Systems covers different aspects of text entry systems and offers prospective researchers and developers global guidelines for conducting research on text entry, in terms of design strategy, evaluation methodology, and requirements; a discussion of the history and current state of the art of entry systems; and specific guidelines for designing entry systems for a specific target, depending on devices, modalities, language, and different physical conditions of users. Text entry has never been so important as it is today. This is in large part due to the phenomenal, relatively recent success of mobile computing, text messaging on mobile phones, and the proliferation of small devices like the Blackberry and Palm Pilot. Compared with the recent past, when text entry was primarily through the standard "qwerty" keyboard, people today use a diverse array of devices with the number and variety of such devices ever increasing. The variety is not just in the devices, but also in the technologies used: entry modalities have become more varied and include speech recognition and synthesis, handwriting recognition, and even eye-tracking using image processing on web-cams. Statistical language modeling has advanced greatly in the past ten years and so therein is potential to facilitate and improve text entry — increasingly, the way people communicate.
    • Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators

      • 1st Edition
      • Johnny Long + 7 more
      • English
      “This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrow’s headlines, whereas others have been around for decades without being properly addressed. I hope you enjoy this book as much as we have enjoyed working with the various authors and friends during its development.” —Donald Withers, CEO and Cofounder of TheTrainingCo.• Jack Wiles, on Social Engineering offers up a potpourri of tips, tricks, vulnerabilities, and lessons learned from 30-plus years of experience in the worlds of both physical and technical security.• Russ Rogers on the Basics of Penetration Testing illustrates the standard methodology for penetration testing: information gathering, network enumeration, vulnerability identification, vulnerability exploitation, privilege escalation, expansion of reach, future access, and information compromise. • Johnny Long on No Tech Hacking shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving.• Phil Drake on Personal, Workforce, and Family Preparedness covers the basics of creating a plan for you and your family, identifying and obtaining the supplies you will need in an emergency.• Kevin O’Shea on Seizure of Digital Information discusses collecting hardware and information from the scene.• Amber Schroader on Cell Phone Forensics writes on new methods and guidelines for digital forensics.• Dennis O’Brien on RFID: An Introduction, Security Issues, and Concerns discusses how this well-intended technology has been eroded and used for fringe implementations.• Ro... Green on Open Source Intelligence details how a good Open Source Intelligence program can help you create leverage in negotiations, enable smart decisions regarding the selection of goods and services, and help avoid pitfalls and hazards. • Raymond Blackwood on Wireless Awareness: Increasing the Sophistication of Wireless Users maintains it is the technologist’s responsibility to educate, communicate, and support users despite their lack of interest in understanding how it works.• Greg Kipper on What is Steganography? provides a solid understanding of the basics of steganography, what it can and can’t do, and arms you with the information you need to set your career path.• Eric Cole on Insider Threat discusses why the insider threat is worse than the external threat and the effects of insider threats on a company.
    • Building Automated Trading Systems

      With an Introduction to Visual C++.NET 2005
      • 1st Edition
      • Benjamin Van Vliet
      • English
      Over the next few years, the proprietary trading and hedge fund industries will migrate largely to automated trade selection and execution systems. Indeed, this is already happening. While several finance books provide C++ code for pricing derivatives and performing numerical calculations, none approaches the topic from a system design perspective. This book will be divided into two sections: programming techniques and automated trading system ( ATS ) technology and teach financial system design and development from the absolute ground up using Microsoft Visual C++.NET 2005. MS Visual C++.NET 2005 has been chosen as the implementation language primarily because most trading firms and large banks have developed and continue to develop their proprietary algorithms in ISO C++ and Visual C++.NET provides the greatest flexibility for incorporating these legacy algorithms into working systems. Furthermore, the .NET Framework and development environment provide the best libraries and tools for rapid development of trading systems. The first section of the book explains Visual C++.NET 2005 in detail and focuses on the required programming knowledge for automated trading system development, including object oriented design, delegates and events, enumerations, random number generation, timing and timer objects, and data management with STL.NET and .NET collections. Furthermore, since most legacy code and modeling code in the financial markets is done in ISO C++, this book looks in depth at several advanced topics relating to managed/unmanaged/CO... memory management and interoperability. Further, this book provides dozens of examples illustrating the use of database connectivity with ADO.NET and an extensive treatment of SQL and FIX and XML/FIXML. Advanced programming topics such as threading, sockets, as well as using C++.NET to connect to Excel are also discussed at length and supported by examples. The second section of the book explains technological concerns and design concepts for automated trading systems. Specifically, chapters are devoted to handling real-time data feeds, managing orders in the exchange order book, position selection, and risk management. A .dll is included in the book that will emulate connection to a widely used industry API ( Trading Technologies, Inc.’s XTAPI ) and provide ways to test position and order management algorithms. Design patterns are presented for market taking systems based upon technical analysis as well as for market making systems using intermarket spreads. As all of the chapters revolve around computer programming for financial engineering and trading system development, this book will educate traders, financial engineers, quantitative analysts, students of quantitative finance and even experienced programmers on technological issues that revolve around development of financial applications in a Microsoft environment and the construction and implementation of real-time trading systems and tools.
    • Microsoft Vista for IT Security Professionals

      • 1st Edition
      • Anthony Piltzecker
      • English
      Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing wired and wireless network infrastructure and safely deploy with their existing applications and databases. The book begins with a discussion of Microsoft's Trustworthy Computing Initiative and Vista's development cycle, which was like none other in Microsoft's history. Expert authors will separate the hype from the reality of Vista’s preparedness to withstand the 24 x 7 attacks it will face from malicious attackers as the world’s #1 desktop operating system.
    • How to Cheat at Configuring Exchange Server 2007

      Including Outlook Web, Mobile, and Voice Access
      • 1st Edition
      • Henrik Walther
      • English
      The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat will help you get Exchange Server 2007 up and running as quickly and safely as possible.• Understand Exchange 2007 PrerequisitesReview hardware and software requirements, Active Directory requirements, and more.• Manage Recipient FilteringCreate a custom MMC that contains the Exchange 2007 Recipients work center, which can be used, for example, by the helpdesk staff in your organization.• Manage Outlook AnywhereOutlook Anywhere makes it possible for your end users to remotely access their mailboxes from the Internet using their full Outlook clients.• Manage Outlook Web Access 2007See how Outlook Web Access 2007 was completely rewritten in managed code to make it scale even better.• Use the Exchange 2007 Queue ViewerYou can now view information about queues and examine the messages held within them.• Master Powerful Out-of-the-Box Spam ProtectionThe Edge Transport server supports SMTP, provides several antispam filtering agents, and supports antivirus extensibility.• Manage a Single-Copy Cluster-Based SetupSCC-based cluster provides service failover and still has a single point of failure when it comes to the databases.• Recover Mailbox DatabasesUse the improved database portability feature to port and recover a Mailbox database to any server in the Exchange 2007 organization.
    • Information Architecture for Information Professionals

      • 1st Edition
      • Susan Batley
      • English
      This book covers the key aspects of information architecture: core elements of information management, indexing, cataloguing and classification - organising and recording information in the digital environment. Information Architecture for Information Professionals also focuses on design, specifically user-centred design: designing information systems that support the needs of users, by providing attractive, intuitive interfaces that support a range of information tasks and accommodate a range of individual resources.
    • Globalisation and Work in Asia

      • 1st Edition
      • John Burgess + 1 more
      • English
      This book reviews employment conditions in Asian countries. This is the hub of the strongest growth area in the world economy and while attention has focussed on job growth and industrial transformation, there has been very little attention on employment characteristics and employment conditions. In particular, the book addresses the issue of whether globalisation, taken to mean the growing international integration of economies, is a factor that leads to a convergence of employment conditions, and more importantly, an improvement in employment conditions. The book brings together contributions on many Asian economies where these core questions are considered at both the macro level and for specified industries.
    • Acquisitions Go Global

      An Introduction to Library Collection Management in the 21st Century
      • 1st Edition
      • Jim Agee
      • English
      This book is a guide that leads the reader through many aspects of a library’s collection including the user, current holdings, selection, and acquisition of new materials. The reader is also led to consider budgets, and how books are made available in 21st century markets. Methods for assessing library vendors are described. Practical details are frequently included; concepts and theory are alluded to but are not a major emphasis of the text. A global scope creates an inclusive mood for readers in developed or developing nations. The final chapter speculates upon acquisitions librarianship in the 21st century, on influences of biotechnology, nanotechnology, and increased computerization. This is a fundamental book for the student or practicing librarian, a book that shares much about acquisitions but admits an uncertainty about the evolution of the profession.
    • China and India

      Opportunities and Threats for the Global Software Industry
      • 1st Edition
      • John T McManus + 2 more
      • English
      In the last 30 years, the world’s software industry has been developing rapidly and the landscape has also been changing dramatically. It is no longer predominately controlled by the developed countries such as the United States and the United Kingdom. This book examines the competitive and strategic issues faced by China and India through a political, economic, social, technological, environmental and legal analysis. The book reviews their competitive strengths and weaknesses and the potential risks for organisations looking to expand or invest resources in these two countries. The book also looks at the market strategies of both countries in a global context and identifies the critical success factors that have enabled China and India to gain competitive advantage in their respective markets. Importantly, the book examines the threats that these two countries pose to other countries looking to expand their presence in the global software markets. This book helps practitioners and business managers who are responsible for a firm’s strategy or investment resources to grasp and understand the complexities and challenges faced by those organisations looking to expand their operations in these countries.
    • Strategic Change Management in Public Sector Organisations

      • 1st Edition
      • David Baker
      • English
      This book covers all the major aspects of change management for those working in public sector and not-for-profit organisations. It summarises key theories and approaches to change management and includes detailed, worked descriptions of key techniques used in change management processes and programmes, with extensive reference to case studies drawn from a range of public sector, not-for-profit organisations and other environments.