Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...
The intention of this book is to provide a thorough reference for those considering a migration
into the virtualized world. The majority of our target readers will likely be seasoned system
administrators and engineers who grew up in and still manage primarily a hardware-based
server environment containing a large assortment of both...
The scaling of silicon technology has been ongoing for over forty years. We
are on our way to commercializing devices having a minimum feature size of
one-tenlh of a micron. The push for miniaturization comes from the demand
for higher functionality and higher performance at a lower cost. As a result,
successively higher levels of...
Numerous textbooks address software testing in a structured development environment.
By “structured” is meant a well-defined development cycle in which discretely
defined steps provide measurable outputs at each step. It is assumed that
software testing activities are based on clearly defined requirements and software...
If you have an abundance of data, but no idea what to do with it, this book was written for you! Packed with examples from an array of industries, Introduction to Data Mining Using SAS Enterprise Miner provides you with excellent starting points and practical guidelines to begin data mining today. Author Patricia Cerrito encourages you to...
When local area networks (LANs) first appeared in the business world, their
primary functions were to share files and printers. These are still critical applications
for most business networks, but networks are able to provide many other
functions as well. Virtually all business owners want to provide their users with access
to the...
This book is about solving partial differential equations (PDEs) . Such equations
are used to model a wide range of phenomena in virtually all fields of science
and technology. In the last decade, the general availability of extremely
powerful computers has shifted the focus in computational mathematics from
simplified model problems...
Where. Whether it refers to where you have been, where you are, or where you are
going, the concept of where is important. Where links data to the physical world. A
shopping list can be a very useful collection of data on its own, but that data can be
even more useful with more context. If you map the location of the stores needed for...
The field of machine perception concerns the building of machines
that sense and interpret their environments. This book is about visual
perception. Potential applications for such systems include tasks such as
automation of industrial processes of inspection and assembly,
automated medical x-ray diagnosis, vehicle guidance and...
With all the fantastic Cisco documentation available online, why does the world of
UCCE need this book? UCCE is such a big topic that it would be easy to think that it is
possible to try and cover absolutely everything. Unfortunately, this would turn this book
into nothing more than a product reference manual that could potentially be...
Since the World Wide Web became widely available in the
mid 1990s, Web-based applications have developed rapidly.
The Web has come to be used by a range of people for many
different purposes, including online banking, e-commerce,
distance education, social networking, data sharing, collaborating
on team projects, and...
We have long felt that the traditional approach to teaching about Operating Systems
(OSs) was not the best approach. The purpose of this book is to support a different
approach to this task. When studying any complex domain of knowledge, the order
in which one learns the hierarchy of principles, laws, ideas, and concepts can make
the...