The Disc Shop





The Disc Shop

Computer Talk - Business Computer - Computer Games - Computer Software

Computer Shop - Computer Mice - New Computer - Antivirus Software






The Computerization Of Work

RRP $247.99

Click on the Google Preview image above to read some pages of this book!

The computerization of the workplace confronts us with a paradox. While almost everyone agrees that the fusion of new information and communication technologies (I/CT) is radically transforming the way society works, some individuals argue that the implementation of any single I/CT is disappointing. Studies report that these individual experiences in computerization often fail to measure up to the expectation. The Computerization of Work offers an explanation for the gap between the expectations and often less-than-satisfactory results. Written by renowned professionals in the field, this volume explores the subject matter through the discussion of theory and field studies as well as insights from other research.

Students and researchers alike will appreciate this rare look into the world of technology and society.


Stochastic Analysis Of Computer Storage

RRP $119.00

Click on the Google Preview image above to read some pages of this book!

Approach your problems from the right end It isn't that they can't see the solution. It is and begin with the answers. Then one day, that they can't see the problem. perhaps you will find the final question. G. K. Chesterton. The Scandal of Fother 'The Hennit Clad in Crane Feathers' in R. Brown 'The point of a Pin'. van GWs The Chinese More Murders. Growing specialization and diversification have brought a host of monographs and textbooks on increasingly specialized topics. However, the "tree" of knowledge of mathematics and related fields does not grow only by putting forth new branches. It also happens, quite often in fact, that branches which were thought to be completely disparate are suddenly seen to be related. Further, the kind and level of sophistication of mathematics applied in various sciences has changed drastically in recent years: measure theory is used (non-trivially) in regional and theoretical economics; algebraic geometry interacts with physics; the Minkowsky lemma, coding theory and the structure of water meet one another in packing and covering theory; quantum fields, crystal defects and mathematical programming profit from homotopy theory; Lie algebras are relevant to filtering; and prediction and electrical engineering can use Stein spaces. And in addition to this there are such new emerging subdisciplines as "experimental mathematics", "CFD", "completely integrable systems", "chaos, synergetics and large-scale order", which are almost impossible to fit into the existing classification schemes. They draw upon widely different sections of mathematics.


Computer Networking

RRP $515.99

Click on the Google Preview image above to read some pages of this book!

ALERT: Before you purchase, check with your instructor or review your course syllabus to ensure that you select the correct ISBN. Several versions of Pearson's MyLab & Mastering products exist for each title, including customized versions for individual schools, and registrations are not transferable. In addition, you may need a CourseID, provided by your instructor, to register for and use Pearson's MyLab & Mastering products.

 

Student can use the URL and phone number below to help answer their questions:

http://247pearsoned.custhelp.com/app/home

800-677-6337

 

Packages

Access codes for Pearson's MyLab & Mastering products may not be included when purchasing or renting from companies other than Pearson; check with the seller before completing your purchase.

 

Used or rental books

If you rent or purchase a used book with an access code, the access code may have been redeemed previously and you may have to purchase a new access code.

 

Access codes

Access codes that are purchased from sellers other than Pearson carry a higher risk of being either the wrong ISBN or a previously redeemed code. Check with the seller prior to purchase.

 

0134522206 / 9780134522203 Computer Networking: A Top Down Approach Plus Modified MasteringEngineering with Pearson eText -- Access Card Package 7/e

 

Package consists of:   

0133594149 / 9780133594140 Computer Networking: A Top-Down Approach

0134311167 / 9780134311166 Modified MasteringEngineering with Pearson eText -- Standalone Access Card -- for Computer Networking: A Top-Down Approach


Dawning Of A New Dark Age

RRP $39.99


Analyzing Computer Security

RRP $261.99

Click on the Google Preview image above to read some pages of this book!

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”

—Charles C. Palmer, IBM Research 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

 

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur.

 

In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.

 

The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.

 

Coverage includes 

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it’s useless “security theater”
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

 



Search

The Disc Shop Articles

Computer Talk Business Computer Computer Games Computer Software
Computer Shop Computer Mice New Computer Antivirus Software
Computer Consulting Home Computer

The Disc Shop Books

Computer Talk Business Computer Computer Games Computer Software
Computer Shop Computer Mice New Computer Antivirus Software
Computer Consulting Home Computer

The Disc Shop