The Mac command line offers a faster, easier way to accomplish many tasks. It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It's also packed with information the experienced users need, including little-known shortcuts and several chapt…
This first-ever valuation guide shows how to select and manage network-based services to ensure maximum return on investment Explains how to manage the costs and tradeoffs between distributed and centralized management structures Shows how to avoid risking too much for too little return due to unpredictable overall market conditions Covers network-based services such as Internet access, applicatio…
A how-to guide for Java programmers who want to use design patterns when developing real-world enterprise applications This practical book explores the subject of design patterns, or patterns that occur in the design phase of a project's life cycle. With an emphasis on Java for the enterprise, Mark Grand guides Java programmers on how to apply traditional and new patterns when designing a large en…
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes…
System reliability, availability and robustness are often not well understood by system architects, engineers and developers. They often don't understand what drives customer's availability expectations, how to frame verifiable availability/robustness requirements, how to manage and budget availability/robustness, how to methodically architect and design systems that meet robustness requirements, …
A novel approach to developing and applying databases with Visual C#.NET Practical Database Programming with Visual C#.NET clearly explains the considerations and applications in database programming with Visual C#.NET 2008 and in developing relational databases such as Microsoft Access, SQL Server, and Oracle Database. Sidestepping the traditional approach of using large blocks of code, Ying Bai …
This book assumes familiarity with threads (in a language such as Ada, C#, or Java) and introduces the entity-life modeling (ELM) design approach for certain kinds of multithreaded software. ELM focuses on «reactive systems,» which continuously interact with the problem environment. These «reactive systems» include embedded systems, as well as such interactive systems as cruise controllers and aut…
Data mining is the process of automatically searching large volumes of data for models and patterns using computational techniques from statistics, machine learning and information theory; it is the ideal tool for such an extraction of knowledge. Data mining is usually associated with a business or an organization's need to identify trends and profiles, allowing, for example, retailers to discover…
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this f…
Offering a truly global perspective, this book serves as a road map for service-learning partnerships between information science and nonprofit organizations. It introduces for the first time an essential framework for service learning in CIS, addressing both the challenges and opportunities of this approach for all stakeholders involved: faculty, students, and community nonprofit organizations (N…
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and go…
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators’ activities, as well …
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms base…
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms base…
The Art of Videogames explores how philosophy of the arts theories developed to address traditional art works can also be applied to videogames. Presents a unique philosophical approach to the art of videogaming, situating videogames in the framework of analytic philosophy of the arts Explores how philosophical theories developed to address traditional art works can also be applied to videogames W…