Skip to main content

Books in Social sciences and humanities

  • Handbooks in Operations Research and Management Science: Simulation

    • 1st Edition
    • Volume 13
    • Shane G. Henderson + 1 more
    • English
    This Handbook is a collection of chapters on key issues in the design and analysis of computer simulation experiments on models of stochastic systems. The chapters are tightly focused and written by experts in each area. For the purpose of this volume “simulation” refers to the analysis of stochastic processes through the generation of sample paths (realization) of the processes. Attention focuses on design and analysis issues and the goal of this volume is to survey the concepts, principles, tools and techniques that underlie the theory and practice of stochastic simulation design and analysis. Emphasis is placed on the ideas and methods that are likely to remain an intrinsic part of the foundation of the field for the foreseeable future. The chapters provide up-to-date references for both the simulation researcher and the advanced simulation user, but they do not constitute an introductory level ‘how to’ guide. Computer scientists, financial analysts, industrial engineers, management scientists, operations researchers and many other professionals use stochastic simulation to design, understand and improve communications, financial, manufacturing, logistics, and service systems. A theme that runs throughout these diverse applications is the need to evaluate system performance in the face of uncertainty, including uncertainty in user load, interest rates, demand for product, availability of goods, cost of transportation and equipment failures.
  • Strategic Business Planning for Accountants

    Methods, Tools and Case Studies
    • 1st Edition
    • Dimitris N. Chorafas
    • English
    This book examines the practice of strategic business planning, including its functions, methods, tools, and the way in which they are employed. It does so in a practical way through case studies, which help in demonstrating how to innovate in order to overcome obstacles and cover new and evolving challenges.The book is divided into six parts : • part 1 focuses on the strategic plan, as master plan of the enterprise • part 2 covers the management functions whose able execution makes the difference between success and failure: forecasting, planning, organizing, staffing, directing, and controlling • part 3 demonstrates that modern accounting rules, promoted by IFRS and US GAAP, not only assist in strategic financial planning but also provide a solid basis for management supervision and control • part 4 brings your attention the fact that costs matter. Strategic business plans that pay little or no attention to cost factors are doomed • part 5 addresses the issues associated with strategic products and markets. These range from research and development to market research, product planning, the able management of marketing functions, and sales effectiveness• part 6 concludes the book with an emphasis on mergers, acquisitions, and consolidations and the risks associated with an M&A policyChief executives, operating officers, treasurers, financial officers, budget directors, accountants, auditors, product planners, marketing directors, and management accounting specialists will find this book of practical examples helpful to their decisions and to their work.
  • Building a VoIP Network with Nortel's Multimedia Communication Server 5100

    • 1st Edition
    • Larry Chaffin
    • English
    The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel’s hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel’s entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.
  • Bedlam Among the Bedpans

    Humor in Nursing
    • 1st Edition
    • Amy Y. Young
    • English
    A must-read for nursing professionals, Bedlam Among the Bedpans: Humor in Nursing, includes over 100 of the funniest and most creative stories about nursing collected from nursing journals, books, and the internet that highlight the humor in the situations nurses face every day. Inspired by the experiences of real nurses, the stories relate situations with insights that only nurses who have "been there" in the field could have.
  • High-Technology Crime Investigator's Handbook

    Establishing and Managing a High-Technology Crime Prevention Program
    • 2nd Edition
    • Gerald L. Kovacich + 1 more
    • English
    The high-technology crime investigator's profession is one of the fastest growing professions in the world today, as information security issues and crimes related to them are growing in number and magnitude at an ever-increasing pace. High-Technology Crime Investigator's Handbook, Second Edition, informs professionals of the potential risks of computer crimes, and serves as a guide to establishing and managing a high-technology crime investigative program. Each chapter is updated with the latest information and guidance, including added coverage of computer forensics and additional metrics to measure organizational performance. In addition, nine new chapters cover emerging trends in the field, and offer invaluable guidance on becoming a successful high-technology crime investigator.
  • How to Cheat at Managing Information Security

    • 1st Edition
    • Mark Osborne
    • English
    This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non – technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: • Design the organization chart of his new security organization • Design and implement policies and strategies • Navigate his way through jargon filled meetings • Understand the design flaws of his E-commerce and DMZ infrastructure
  • How to Cheat at Securing a Wireless Network

    • 1st Edition
    • Chris Hurley + 1 more
    • English
    Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network’s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.
  • Joe Grand's Best of Hardware, Wireless, and Game Console Hacking

    • 1st Edition
    • Joe Grand + 9 more
    • English
    The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking. The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more.The presentation of these 20 projects on DVD media provides users with benefits and options not available on the printed page. All images are hi-res color that can be enlarged or printed, the text is easily searched, and the user can copy the contents to their hard disk and add comments directly into the PDF files. The DVD media also lends itself well to group projects (it includes a 10 user license).The 160-page book includes chapters on hacking tools and electrical engineering basics, along with chapters on the background, design and functionality of each hardware device.
  • Dictionary of Information Security

    • 1st Edition
    • Robert Slade
    • English
    The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security+ will also find this a valuable resource.
  • BigNum Math

    Implementing Cryptographic Multiple Precision Arithmetic
    • 1st Edition
    • Tom St Denis
    • English
    Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms.Bignum math is the backbone of modern computer security algorithms. It is the ability to work with hundred-digit numbers efficiently using techniques that are both elegant and occasionally bizarre. This book introduces the reader to the concept of bignum algorithms and proceeds to build an entire library of functionality from the ground up. Through the use of theory, pseudo-code and actual fielded C source code the book explains each and every algorithm that goes into a modern bignum library. Excellent for the student as a learning tool and practitioner as a reference alike BigNum Math is for anyone with a background in computer science who has taken introductory level mathematic courses. The text is for students learning mathematics and cryptography as well as the practioner who needs a reference for any of the algorithms documented within.