The Tales from Shakespeare by Charles and Mary Lamb were written to be an 'introduction to the study of Shakespeare', but are much more entertaining than that. All of Shakespeare's best-loved tales, comic and tragic, are retold in a clear and robust style, and their literary quality has made them popular and sought-after ever since their first publication in 1807. This edition contains the deli…
Table of contents PART I SECURING THE INFRASTRUCTURE Chapter 1 Infrastructure Security in the Real World Chapter 2 Understanding Access-Control and Monitoring Systems Chapter 3 Understanding Video Surveillance Systems Chapter 4 Understanding Intrusion-Detection and Reporting Systems Chapter 5 Infrastructure Security: Review Questions and Hands-On Exercises PART II SECURING LOCA…
Contents: Chapter 1 Digital systems and information Chapter 2 Combinational logic circuits Chapter 3 Combinational logic design Chapter 4 Arithmetic functions and HDLs Chapter 5 Sequential circuits Chapter 6 Selected design topics Chapter 7 Registers and register transfers Chapter 8 Memory basics Chapter 9 Computer design basics Chapter 10 Instruction set architecture Chap…
Contents: Chapter 1. Is There a Security Problem in Computing? 1.1. What Does Secure Mean? 1.2. Attacks 1.3. The Meaning of Computer Security 1.4. Computer Criminals 1.5. Methods of Defense 1.6. What's Next 1.7. Summary 1.8. Terms and Concepts 1.9. Where the Field is Headed 1.10. To Learn More 1.11. Exercise Chapter 2. Elementary Cryptography 2.1. Termonilogy and Bac…
Contents: Part 1. The Basics of Cummunications 1. Basics of Communications Technology 2. Media and their Applications 3. Architecture, Models, and Standards Part 2. Network Basics 4. Building a Network: Topology and Protocols 5. Network Form and Function Part 3. Wide Area Networks: The Internet 6. From LANs to WANs: Broadband Technology 7. The Internet, Intranets, and Extranets …
Contents: Module Introduction Chapter 1 An introduction to computers Module Hardware Chapter 2 Inside the computer: processing and memory Chapter 3 Storage media and devices Chapter 4 Input dan output devices Module software Chapter 5 Operating systems and utility programs Chapter 6 Software Module network and the internet Chapter 7 Networks Chapter 8 The world wide web Ch…
Contents: Chapter 1 Research overview and conceptual understanding of internet protocol security (IPSec) Chapter 2 Internet communication protocols Chapter 3 Internet protocol versions 4 (IPv4) and 6 (IPv6) Chapter 4 Implementations and limitations of the IPSec Chapter 5 Synchronising internet protocol security (IPSec) model Chapter 6 Discussion Chapter 7 Conclusion
Table of Contents: 1. The Moral Status of Information and Information Technologies 2. Online Communities, Democratic Ideals, and the Digital Divide 3. The Mediating Effect of Material Cultures as Human Hybridization 4. Culture and Technology: A Mutual-Shaping Approach 5. Mobile Phone and Autonomy 6. Invisability and the Ethics of Digitalization: Designing so as not to Hurt Others 7. P…
Note: Each chapter concludes with a Summary, Important Words and Symbols, Chapter Review Problems, Data Highlights: Group Projects, Linking Concepts: Writing Projects, and Using Technology. Table of Prerequisite Material. 1. GETTING STARTED. Focus Problem: Where Have All the Fireflies Gone? What Is Statistics. Random Samples. Introduction to Experimental Design. 2. ORGANIZING DATA. Focus P…