The Disc Shop
Listen to Coronavirus Patient Zero
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.
Computer programs that simulate complex processes in the real world can provide a quantitative tool for determining how much debt can be added safely to a company's capital structure. The increasing number of bankruptcies and defaults in today's international business arena result from debt overload and point to major shortcomings in the conventional financial evaluation process. In this book, Roy L. Nersesian describes why current methods of risk management fail and how computer simulation can be employed to determine the safe level of debt more accurately. Because the decision to add debt to an organization requires favorable, and essentially independent, decisions from both the borrower and lender, it is necessary to quantify both perspectives. Through actual examples readers will learn how to do this and to translate an actual business situation into a simulation model or program. Current evaluation systems, according to Nersesian, fail to incorporate the cyclical nature of business activity. They result all too often in an overly optimistic projection of cash flow. Simulation techniques are better able to incorporate the transience of good times and put quantitative analysis of risk on par with quantitative analysis of reward. Simulation techniques also reduce the role of speculative, and highly subjective, judgment. For example, decisionmakers who are not familiar personally with a particular business area, assign more risk to that area than those who are. A quantified risk management system enables executives to rank projects by the degree of risk much as they currently rank them by degree of profitability. The book presents the concept of simulation in terms that can be understood by generalists in corporations and financial institutions. At the same time, it provides computer programmers with an understanding of risk management principles. It will provide a valuable resource for: financial executives, planners and strategists in corporate and governmental organizations; bank lending officers; and computer programmers working with these organizations.
Since the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies like Cisco Systems and Dow Chemical have installed IP-based phones in their offices worldwide, saving millions of dollars in service fees.
From buying and selling PC hardware to product development and selling services, "Start Your Own Computer Business: The Unembellished Guide" offers a realistic picture of making it on your own. Bestselling author, Morris Rosenthal, has 15 years of experience in the computer business, building and repairing thousands of PCs and helping hundreds of customers. The book mixes practical advice and cautions with real-world anecdotes of successes and failures. Dollars and cents play a prominent role in the book, as Rosenthal stresses that the real challenge of succeeding in the computer business is the business part of the equation. Managing employees, inventory and scarce financial resources are covered, along with how to remain sane and when to quit. The book is illustrated with a series of original cartoons on the computer business subject.
What is computer art? Do the concepts we usually employ to talk about art, such as a meaninga (TM), a forma (TM) or a expressiona (TM) apply to computer art?
A Philosophy of Computer Art is the first book to explore these questions. Dominic Lopes argues that computer art challenges some of the basic tenets of traditional ways of thinking about and making art and that to understand computer art we need to place particular emphasis on terms such as a interactivitya (TM) and a usera (TM).
Drawing on a wealth of examples he also explains how the roles of the computer artist and computer art user distinguishes them from makers and spectators of traditional art forms and argues that computer art allows us to understand better the role of technology as an art medium.
The Disc Shop Articles
The Disc Shop Books
The Disc Shop