0
Your cart

Your cart is empty

Browse All Departments
Price
  • R250 - R500 (3)
  • R500+ (1,274)
  • -
Status
Format
Author / Contributor
Publisher

Books > Academic & Education > Professional & Technical

A Baker's Dozen - Real Analog Solutions for Digital Designers (Paperback): Bonnie Baker A Baker's Dozen - Real Analog Solutions for Digital Designers (Paperback)
Bonnie Baker
R2,816 Discovery Miles 28 160 Ships in 10 - 15 working days

This book has been written to help digital engineers who need a few basic analog tools in their toolbox. For practicing digital engineers, students, educators and hands-on managers who are looking for the analog foundation they need to handle their daily engineering problems, this will serve as a valuable reference to the nuts-and-bolts of system analog design in a digital world.
This book is a hands-on designer's guide to the most important topics in analog electronics-such as Analog-to-Digital and Digital-to-Analog conversion, operational amplifiers, filters, and integrating analog and digital systems. The presentation is tailored for engineers who are primarily experienced and/or educated in digital circuit design. This book will teach such readers how to "think analog" when it is the best solution to their problem. Special attention is also given to fundamental topics, such as noise and how to use analog test and measurement equipment, that are often ignored in other analog titles aimed at professional engineers.
* Extensive use of case-histories and real design examples.
* Offers digital designers the right analog "tool" for the job at hand.
* Conversational, annecdotal "tone" is very easily accessible by students and practitioners alike.

Network Processor Design, Volume 3 - Issues and Practices (Paperback, New): Mark A. Franklin, Patrick Crowley, Haldun... Network Processor Design, Volume 3 - Issues and Practices (Paperback, New)
Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk
R2,941 Discovery Miles 29 410 Ships in 10 - 15 working days

The past few years have seen significant change in the landscape of high-end network processing. In response to the formidable challenges facing this emerging field, the editors of this series set out to survey the latest research and practices in the design, programming, and use of network processors.
Through chapters on hardware, software, performance and modeling, Volume 3 illustrates the potential for new NP applications, helping to lay a theoretical foundation for the architecture, evaluation, and programming of networking processors.
Like Volume 2 of the series, Volume 3 further shifts the focus from achieving higher levels of packet processing performance to addressing other critical factors such as ease of programming, application developments, power, and performance prediction. In addition, Volume 3 emphasizes forward-looking, leading-edge research in the areas of architecture, tools and techniques, and applications such as high-speed intrusion detection and prevention system design, and the implementation of new interconnect standards.
*Investigates current applications of network processor technology at Intel; Infineon Technologies; and NetModule.
Presents current research in network processor design in three distinct areas:
*Architecture at Washington University, St. Louis; Oregon Health and Science University; University of Georgia; and North Carolina State University.
*Tools and Techniques at University of Texas, Austin; Academy of Sciences, China; University of Paderborn, Germany; and University of Massachusetts, Amherst.
*Applications at University of California, Berkeley; Universidad Complutense de Madrid, Spain; ETH Zurich, Switzerland; Georgia Institute of Technology; Vrije Universiteit, the Netherlands; and Universiteit Leiden, the Netherlands.

Advanced Computer-Aided Fixture Design (Hardcover): Yiming (Kevin) Rong, Samuel Huang Advanced Computer-Aided Fixture Design (Hardcover)
Yiming (Kevin) Rong, Samuel Huang
R3,523 Discovery Miles 35 230 Ships in 9 - 15 working days

Fixtures--the component or assembly that holds a part undergoing machining--must be designed to fit the shape of that part and the type of machining being done. This book discusses the fundamentals of Computer-Aided Fixture Design (CAFD) techniques and covers fixture planning, fixture design (both modular and dedicated fixtures), fixture design verifications, and the overall integration with CAD/CAM. The book shows how CAFD may lead to a significant reduction of product and process development time and production cost, and how CAFD can increase quality assurance through simulation and science-based technical specification and cost estimation in business quoting, especially in current supplier-based manufacturing. It also provides case study examples.
* This book provides a total solution of CAFD, including planning, design, and design verification
* Practical and comprehensive theoretical analysis of fixturing from real industrial application projects
* Introduces the integration of fixture design and analysis with CAD/CAM so that detailed geometric information can be processed and complex fixture designs can be designed and analyzed

Annual Reports in Medicinal Chemistry, Volume 39 (Paperback): Annette M. Doherty Annual Reports in Medicinal Chemistry, Volume 39 (Paperback)
Annette M. Doherty
R5,702 Discovery Miles 57 020 Ships in 10 - 15 working days

Annual Reports in Medicinal Chemistry continues to focus on providing timely and critical reviews of important topics in medicinal chemistry together with an emphasis on emerging topics in the biological sciences, which are expected to provide the basis for entirely new future therapies.
Sections I-IV are disease orientated and generally report on specific medicinal agents.
Sections V and VI continue to emphasize important topics in medicinal chemistry, biology, and drug design.
* Annual comprehensive reviews of the past year literature in many topics of interest to medicinal chemists
* Includes a comprehensive set of indices to easily locate topics in Volumes 1-38 of this series
* Provides critical review on hot topics in medicinal chemistry

Higher-Order Perl - Transforming Programs with Programs (Paperback): Mark Dominus Higher-Order Perl - Transforming Programs with Programs (Paperback)
Mark Dominus
R2,777 Discovery Miles 27 770 Ships in 10 - 15 working days

Most Perl programmers were originally trained as C and Unix programmers, so the Perl programs that they write bear a strong resemblance to C programs. However, Perl incorporates many features that have their roots in other languages such as Lisp. These advanced features are not well understood and are rarely used by most Perl programmers, but they are very powerful. They can automate tasks in everyday programming that are difficult to solve in any other way. One of the most powerful of these techniques is writing functions that manufacture or modify other functions. For example, instead of writing ten similar functions, a programmer can write a general pattern or framework that can then create the functions as needed according to the pattern. For several years Mark Jason Dominus has worked to apply functional programming techniques to Perl. Now Mark brings these flexible programming methods that he has successfully taught in numerous tutorials and training sessions to a wider audience.
* Introduces powerful programming methods--new to most Perl programmers--that were previously the domain of computer scientists
* Gradually builds up confidence by describing techniques of progressive sophistication
* Shows how to improve everyday programs and includes numerous engaging code examples to illustrate the methods

Mergers and Acquisitions Security - Corporate Restructuring and Security Management (Paperback): Edward Halibozek, Gerald L.... Mergers and Acquisitions Security - Corporate Restructuring and Security Management (Paperback)
Edward Halibozek, Gerald L. Kovacich
R2,211 Discovery Miles 22 110 Ships in 10 - 15 working days

In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.
- First book available that focuses on the role of the Security Manager in M&A
- Case studies that highlight the role of the security manager; cases include both best practices as well as illustrations of nightmare examples of what NOT to do
- Lead author is an expert that has participated in/managed security for more than 20 high-profile and large-scale acquisitions
- Model processes, procedures, checklists, charts and sample forms all serve to ease immediate analysis and implementation in a merger or acquisition

IPv6 Network Programming (Paperback): Jun-ichiro Hagino IPv6 Network Programming (Paperback)
Jun-ichiro Hagino
R2,366 Discovery Miles 23 660 Ships in 10 - 15 working days

This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.
* Covers the new protocol just adopted by the Dept of Defense for future systems
* Deals with security concerns, including spam and email, by presenting the best programming standards
* Fully describes IPv6 socket APIs (RFC2553) using real-world examples
* Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

Academia to Biotechnology - Career Changes at any Stage (Paperback): Jeffrey M. Gimble Academia to Biotechnology - Career Changes at any Stage (Paperback)
Jeffrey M. Gimble
R1,899 Discovery Miles 18 990 Ships in 10 - 15 working days

The book deals with both the abstract and practical aspects of moving from a univerisity laboratory to a position in the biotech industry. Each chapter lists common and unique features to evaluate breaking down complex decisions into manageable elements. Several sections provide "how to" guides for the preparation of manuscripts, patents, grants, and internal company documents.
*Written by an experienced academician and successful biotechnology entrepreneur
*Reviews the basic tools taught in a traditional university
*Identifies new ways these these tools will be used in the corporate world
*Details the 'nuts and bolts' necessary to negotiate a successful position in the biotech industry

ASIC and FPGA Verification - A Guide to Component Modeling (Paperback): Richard Munden ASIC and FPGA Verification - A Guide to Component Modeling (Paperback)
Richard Munden
R2,384 Discovery Miles 23 840 Ships in 10 - 15 working days

Richard Munden demonstrates how to create and use simulation models for verifying ASIC and FPGA designs and board-level designs that use off-the-shelf digital components. Based on the VHDL/VITAL standard, these models include timing constraints and propagation delays that are required for accurate verification of today s digital designs.
ASIC and FPGA Verification: A Guide to Component Modeling expertly illustrates how ASICs and FPGAs can be verified in the larger context of a board or a system. It is a valuable resource for any designer who simulates multi-chip digital designs.
*Provides numerous models and a clearly defined methodology for performing board-level simulation.
*Covers the details of modeling for verification of both logic and timing.
*First book to collect and teach techniques for using VHDL to model "off-the-shelf" or "IP" digital components for use in FPGA and board-level design verification.

Profile of the International Valve Industry: Market Prospects to 2009 (Paperback, 3rd edition): Graham Weaver Profile of the International Valve Industry: Market Prospects to 2009 (Paperback, 3rd edition)
Graham Weaver
R54,998 Discovery Miles 549 980 Ships in 10 - 15 working days

This revised and updated 3rd edition outlines the structure of the global industry and future trends, highlights issues facing the industrial valve industry, assesses market and technological trends, offers market figures and forecasts to 2009 and identifies the major players.
The report also provides a detailed overview of merger and acquisition activity in the industrial valve industry since 2000.

Open-Source Robotics and Process Control Cookbook - Designing and Building Robust, Dependable Real-Time Systems (Paperback):... Open-Source Robotics and Process Control Cookbook - Designing and Building Robust, Dependable Real-Time Systems (Paperback)
Lewin Edwards
R2,379 Discovery Miles 23 790 Ships in 10 - 15 working days

In this practical reference, popular author Lewin Edwards shows how to develop robust, dependable real-time systems for robotics and other control applications, using open-source tools. It demonstrates efficient and low-cost embedded hardware and software design techniques, based on Linux as the development platform and operating system and the Atmel AVR as the primary microcontroller. The book provides comprehensive examples of sensor, actuator and control applications and circuits, along with source code for a number of projects. It walks the reader through the process of setting up the Linux-based controller, from creating a custom kernel to customizing the BIOS, to implementing graphical control interfaces.
Including detailed design information on:
-ESBUS PC-host interface
-Host-module communications protocol
-A speed-controlled DC motor with tach feedback and thermal cut-off
-A stepper motor controller
-A two-axis attitude sensor using a MEMS accelerometer
-Infrared remote control in Linux using LIRC
-Machine vision using Video4Linux
The Accompanying CD-ROM contains a wealth of design materials, including:
-Full schematics and source code for the projects described
-Ready-made disk images for the miniature Linux distribution uses as the basis for the PC-side software
-Distribution archives of source code for all GNU software used, along with application-specific patches where appropriate
-A free version of the schematic capture and PCB CAD software used
-Atmel AVR Studio
* The first-ever book on using open source technology for robotics design!
* Immensely valuable source code and design tools provided on the CD-ROM
* Covershot topics such as GPS navigation, 3-D sensing, and machine vision, all using a Linux platform!

RF Engineering for Wireless Networks - Hardware, Antennas, and Propagation (Paperback): Daniel M. Dobkin RF Engineering for Wireless Networks - Hardware, Antennas, and Propagation (Paperback)
Daniel M. Dobkin
R3,496 Discovery Miles 34 960 Ships in 10 - 15 working days

Finally, here is a single volume containing all of the engineering information needed to successfully design and implement any type of wireless network Author Dan Dobkin covers every aspect of RF engineering necessary for wireless networks. He begins with a review of essential math and electromagnetic theory followed by thorough discussions of multiplexing, modulation types, bandwidth, link budgets, network concepts, radio system architectures, RF amplifiers, mixers and frequency conversion, filters, single-chip radio systems, antenna theory and designs, signal propagation, as well as planning and implementing wireless networks for both indoor and outdoor environments.
The appendices contain such vital data as U.S., European, and Japanese technical and regulatory standards for wireless networks, measurements in wireless networks, reflection and matching of transmission lines, determining power density, and much more. The accompanying companion website includes useful software tools such as a link budget calculator, a Smith Chart calculator and plotter, and radio chain analysis utilities. No matter what type of wireless network you design-Bluetooth, UWB, or even metropolitan area network (MAN)-this book is the one reference you can t do without

. The A-to-Z guide to wireless network engineering covers everything from basic electromagnetic theory to modulation techniques to network planning and implementation
. Engineering and design principles covered are applicable to any type of wireless network, including 802.11, 802.16, 802.20, and Bluetooth.
. Discusses state-of-the-art modulation techniques such as ultra wideband (UWB) and orthogonal frequency-division multiplexing (OFDM)."

Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New): George Varghese Network Algorithmics - An Interdisciplinary Approach to Designing Fast Networked Devices (Hardcover, New)
George Varghese
R2,872 Discovery Miles 28 720 Ships in 10 - 15 working days

In designing a network device, you make dozens of decisions that affect the speed with which it will perform sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.
Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles ranging from the commonly recognized to the groundbreaking that are key to breaking these bottlenecks.
The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.
FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the "Instructor Manual" link on this book's academic web page at textbooks.elsevier.com.
. Addresses the bottlenecks found in all kinds of network devices, (data copying, control transfer, demultiplexing, timers, and more) and offers ways to break them.
. Presents techniques suitable specifically for endnodes, including Web servers.
. Presents techniques suitable specifically for interconnect devices, including routers, bridges, and gateways.
. Written as a practical guide for implementers but full of valuable insights for students, teachers, and researchers.
. Includes end-of-chapter summaries and exercises."

Real Analysis with an Introduction to Wavelets and Applications (Hardcover): Don Hong, Jian zhong Wang, Robert Gardner Real Analysis with an Introduction to Wavelets and Applications (Hardcover)
Don Hong, Jian zhong Wang, Robert Gardner
R4,199 Discovery Miles 41 990 Ships in 10 - 15 working days

An in-depth look at real analysis and its applications, including an introduction to wavelet
analysis, a popular topic in "applied real analysis." This text makes a very natural connection between the classic pure analysis and the applied topics, including measure theory, Lebesgue Integral,
harmonic analysis and wavelet theory with many associated applications.
*The text is relatively elementary at the start, but the level of difficulty steadily increases
*The book contains many clear, detailed examples, case studies and exercises
*Many real world applications relating to measure theory and pure analysis
*Introduction to wavelet analysis

Server Architectures - Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions (Paperback): Rene J. Chevance Server Architectures - Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions (Paperback)
Rene J. Chevance
R3,303 Discovery Miles 33 030 Ships in 10 - 15 working days

The goal of this book is to present and compare various options one for systems architecture from two separate points of view. One, that of the information technology decision-maker who must choose a solution matching company business requirements, and secondly that of the systems architect who finds himself between the rock of changes in hardware and software technologies and the hard place of changing business needs.
Different aspects of server architecture are presented, from databases designed for parallel architectures to high-availability systems, and touching en route on often- neglected performance aspects.
1. The book provides IT managers, decision makers and project leaders who want to acquire knowledge sufficient to understand the choices made in and capabilities of systems offered by various vendors:
2. Provides system design information to balance the characteristic applications against the capabilities and nature of various architectural choices
3. In addition, it offers an integrated view of the concepts in server architecture, accompanied by discussion of effects on the evolution of the data processing industry.

Assessing Science Understanding - A Human Constructivist View (Paperback): Joel J. Mintzes, James H. Wandersee, Joseph D. Novak Assessing Science Understanding - A Human Constructivist View (Paperback)
Joel J. Mintzes, James H. Wandersee, Joseph D. Novak
bundle available
R2,347 Discovery Miles 23 470 Ships in 10 - 15 working days

Recent government publications like "Benchmarks for Scientific Literacy" and "Science for all Americans" have given teachers a mandate for improving science education in America. What we know about how learners construct meaning--particularly in the natural sciences--has undergone a virtual revolution in the past 25 years. Teachers, as well as researchers, are now grappling with how to better teach science, as well as how to assess whether students are learning. Assessing Science Understanding is a companion volume to Teaching Science for Understanding, and explores how to assess whether learning has taken place. The book discusses a range of promising new and practical tools for assessment including concept maps, vee diagrams, clinical interviews, problem sets, performance-based assessments, computer-based methods, visual and observational testing, portfolios, explanatory models, and national examinations.

Analog and Digital Circuits for Electronic Control System Applications - Using the TI MSP430 Microcontroller (Paperback): Jerry... Analog and Digital Circuits for Electronic Control System Applications - Using the TI MSP430 Microcontroller (Paperback)
Jerry Luecke
R2,639 Discovery Miles 26 390 Ships in 10 - 15 working days

Today s control system designers face an ever-increasing need for speed and accuracy in their system measurements and computations. New design approaches using microcontrollers and DSP are emerging, and designers must understand these new approaches, the tools available, and how best to apply them.
This practical text covers the latest techniques in microcontroller-based control system design, making use of the popular MSP430 microcontroller from Texas Instruments.
The book covers all the circuits of the system, including:
.Sensors and their output signals
.Design and application of signal conditioning circuits
.A-to-D and D-to-A circuit design
.Operation and application of the powerful and popular TI MSP430 microcontroller
.Data transmission circuits
.System power control circuitry
Written by an experienced microcontroller engineer and textbook author, the book is lavishly illustrated and includes numerous specific circuit design examples, including a fully tested and documented hands-on project using the MSP430 that makes use of the principles described. For students, engineers, technicians, and hobbyists, this practical text provides the answers you need to design modern control systems quickly and easily.
* Seasoned Texas Instruments designer provides a ground-up perspective on embedded control systems
* Pedagogical style provides a self-learning approach with examples, quizzes and review features
* Accompanying companion website contains source code and more "

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R2,000 Discovery Miles 20 000 Ships in 10 - 15 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

Working Analysis (Hardcover, New): Jeffery Cooper Working Analysis (Hardcover, New)
Jeffery Cooper
R4,129 Discovery Miles 41 290 Ships in 10 - 15 working days

The text is for a two semester course in advanced calculus. It develops the basic ideas of calculus rigorously but with an eye to showing how mathematics connects with other areas of science and engineering. In particular, effective numerical computation is developed as an important aspect of mathematical analysis.
* Maintains a rigorous presentation of the main ideas of advanced calculus, interspersed with applications that show how to analyze real problems
* Includes a wide range of examples and exercises drawn from mechanics, biology, chemical engineering and economics
* Describes links to numerical analysis and provides opportunities for computation; some MATLAB
codes are available on the author's webpage
* Enhanced by an informal and lively writing style

Real-Time Digital Signal Processing - Based on the TMS320C6000 (Paperback): Nasser Kehtarnavaz Real-Time Digital Signal Processing - Based on the TMS320C6000 (Paperback)
Nasser Kehtarnavaz
R2,347 Discovery Miles 23 470 Ships in 10 - 15 working days

Digital Signal Processing has undergone enormous growth in usage/implementation in the last 20 years and many engineering schools are now offering real-time DSP courses in their undergraduate curricula. Our everyday lives involve the use of DSP systems in things such as cell phones and high-speed modems; Texas Instruments has introduced the TMS320C6000 DSP processor family to meet the high performance demands of today s signal processing applications.
This book provides the know-how for the implementation and optimization of computationally intensive signal processing algorithms on the Texas Instruments family of TMS320C6000 DSP processors. It is organized in such a way that it can be used as the textbook for DSP lab courses offered at many engineering schools or as a self-study/reference for those familiar with DSP but not this family of processors.
This book provides a restructured, modified, and condensed version of the information in more than twenty TI manuals so that one can learn real-time DSP implementations on the C6000 family in a structured course, within one semester. Each chapter is followed by an appropriate lab exercise to provide the hands-on lab material for implementing appropriate signal processing
functions. These labs are included on the accompanying companion website to take the reader through the entire process of C6X code writing.
* Each chapter is followed by an appropriate lab exercise
* Provides the hands-on lab material for implementing appropriate signal processing functions
* Labs are included on accompanying companion website taking the reader through the entire process of C6X code writing"

Principles of Mathematical Modeling (Hardcover, 2nd edition): Clive Dym Principles of Mathematical Modeling (Hardcover, 2nd edition)
Clive Dym
R3,348 Discovery Miles 33 480 Ships in 10 - 15 working days

Science and engineering students depend heavily on concepts of mathematical modeling. In an age where almost everything is done on a computer, author Clive Dym believes that students need to understand and "own" the underlying mathematics that computers are doing on their behalf. His goal for Principles of Mathematical Modeling, Second Edition, is to engage the student reader in developing a foundational understanding of the subject that will serve them well into their careers.
The first half of the book begins with a clearly defined set of modeling principles, and then introduces a set of foundational tools including dimensional analysis, scaling techniques, and approximation and validation techniques. The second half demonstrates the latest applications for these tools to a broad variety of subjects, including exponential growth and decay in fields ranging from biology to economics, traffic flow, free and forced vibration of mechanical and other systems, and optimization problems in biology, structures, and social decision making.
Prospective students should have already completed courses in elementary algebra, trigonometry, and first-year calculus and have some familiarity with differential equations and basic physics.

* Serves as an introductory text on the development and application of mathematical models
* Focuses on techniques of particular interest to engineers, scientists, and others who model continuous systems
* Offers more than 360 problems, providing ample opportunities for practice
* Covers a wide range of interdisciplinary topics--from engineering to economics to the sciences
* Uses straightforward language and explanations that make modeling easy to understand and apply
New to this Edition:
* A more systematic approach to mathematical modeling, outlining ten specific principles
* Expanded and reorganized chapters that flow in an increasing level of complexity
* Several new problems and updated applications
* Expanded figure captions that provide more information
* Improved accessibility and flexibility for teaching

Multi-Tier Application Programming with PHP - Practical Guide for Architects and Programmers (Paperback): David Wall Multi-Tier Application Programming with PHP - Practical Guide for Architects and Programmers (Paperback)
David Wall
R1,618 Discovery Miles 16 180 Ships in 10 - 15 working days

While many architects use PHP for projects, they are often not aware of the power of PHP in creating enterprise-level applications. This book covers the latest version of PHP - version 5 -- and focuses on its capabilities within a multi-tier application framework. It contains numerous coding samples and commentaries on them. A chapter discusses object orientation in PHP as it applies to the multi-tier architecture and other chapters discuss HTTP and SOAP, the two communication protocols most useful in tying together multiple layers. There is also coverage of database design and query construction as well as information about tricks you can use in generating user interfaces.
-Covers PHP as it relates to developing software in a multi-tier environment-a crucial aspect of developing robust software with low cost and ease of use as design goals.
-Makes extensive use of Simple Object Access Protocol (SOAP) and Web Services as implemented in PHP and NuSOAP.
-Shows precisely how to make use of the InnoDB table type newly available in MySQL. InnoDB supports true referential integrity and row-level locking.
-An application example (a multi-currency bookkeeping application) runs throughout the book, showing various PHP capabilities as well as the database interaction.
-An accompanying web site includes the source code for all of the examples and the sample download.

XML in Data Management - Understanding and Applying Them Together (Paperback): Peter Aiken, M. David Allen XML in Data Management - Understanding and Applying Them Together (Paperback)
Peter Aiken, M. David Allen
R2,208 Discovery Miles 22 080 Ships in 10 - 15 working days

XML in Data Management is for IT managers and technical staff involved in the creation, administration, or maintenance of a data management infrastructure that includes XML. For most IT staff, XML is either just a buzzword that is ignored or a silver bullet to be used in every nook and cranny of their organization. The truth is in between the two. This book provides the guidance necessary for data managers to make measured decisions about XML within their organizations. Readers will understand the uses of XML, its component architecture, its strategic implications, and how these apply to data management.
To view a sample chapter and read the Foreword by Thomas C. Redman, visit http: //books.elsevier.com/mk/?isbn=0120455994
* Takes a data-centric view of XML.
* Explains how, when, and why to apply XML to data management systems.
* Covers XML component architecture, data engineering, frameworks, metadata, legacy systems, and more.
* Discusses the various strengths and weaknesses of XML technologies in the context of organizational data management and integration.

Accelerated Testing and Validation (Paperback, New): Alex Porter Accelerated Testing and Validation (Paperback, New)
Alex Porter
R2,726 Discovery Miles 27 260 Ships in 10 - 15 working days

Accelerated Testing and Validation Methods is a cross-disciplinary guide that describes testing and validation tools and techniques throughout the product development process. Alex Porter not only focuses on what information is needed but also on what tools can produce the information in a timely manner. From the information provided, engineers and managers can determine what data is needed from a test and validation program and then how to select the best, most effective methods for obtaining the data.
This book integrates testing and validation methods with a business perspective so readers can understand when, where, and how such methods can be economically justified. Testing and validation is about generating key information at the correct time so that sound business and engineering decisions can be made. Rather than simply describing various testing and validation techniques, the author offers readers guidance on how to select the best tools for a particular need, explains the appropriateness of different techniques to various situations and shows how to deploy them to ensure the desired information is accurately gathered.
* Emphasizes developing a strategy for testing and validation
* Companion website includes example spreadsheets, program source code, case studies, video clips and much more
* Teaches how to design a testing and validation program that deliver information in a timely and cost-effective manner

Java Cryptography Extensions - Practical Guide for Programmers (Paperback): Jason R. Weiss Java Cryptography Extensions - Practical Guide for Programmers (Paperback)
Jason R. Weiss
R1,133 Discovery Miles 11 330 Ships in 10 - 15 working days

For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM
For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it s imperative that developers know what kinds of solutions exist.
One of Java s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
* Written by a seasoned veteran of both cryptography and server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Corporate Finance, Volume 1…
B. Espen Eckbo Hardcover R4,787 Discovery Miles 47 870
Principles of the Magnetic Methods in…
Hardcover R5,123 Discovery Miles 51 230
Developments in Surface Contamination…
Rajiv Kohli, Kashmiri L. Mittal Hardcover R7,086 Discovery Miles 70 860
Handbook of Network and System…
Jan Bergstra, Mark Burgess Hardcover R7,253 Discovery Miles 72 530
Biogeochemistry of Trace Elements in the…
G. R. Gobran, P.M. Huang Hardcover R5,083 Discovery Miles 50 830
Linear Ray and Wave Optics in Phase…
Amalia Torre Paperback R5,287 Discovery Miles 52 870
Hermeticity of Electronic Packages
Hal Greenhouse Hardcover R5,562 Discovery Miles 55 620
Quantum Mechanics of Non-Hamiltonian and…
Vasily Tarasov Hardcover R5,877 Discovery Miles 58 770
A Dictionary of Pharmacology and Allied…
D.R. Laurence, J. R. Carpenter Hardcover R6,646 Discovery Miles 66 460
Security Design Consulting - The…
Brian Gouin Hardcover R1,552 Discovery Miles 15 520

 

Partners