0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 17 of 17 matches in All Departments

Introduction to Software Engineering (Paperback, 2nd edition): Ronald J. Leach Introduction to Software Engineering (Paperback, 2nd edition)
Ronald J. Leach
R1,465 Discovery Miles 14 650 Ships in 12 - 17 working days

Practical Guidance on the Efficient Development of High-Quality Software Introduction to Software Engineering, Second Edition equips students with the fundamentals to prepare them for satisfying careers as software engineers regardless of future changes in the field, even if the changes are unpredictable or disruptive in nature. Retaining the same organization as its predecessor, this second edition adds considerable material on open source and agile development models. The text helps students understand software development techniques and processes at a reasonably sophisticated level. Students acquire practical experience through team software projects. Throughout much of the book, a relatively large project is used to teach about the requirements, design, and coding of software. In addition, a continuing case study of an agile software development project offers a complete picture of how a successful agile project can work. The book covers each major phase of the software development life cycle, from developing software requirements to software maintenance. It also discusses project management and explains how to read software engineering literature. Three appendices describe software patents, command-line arguments, and flowcharts.

Introduction to Software Engineering (Hardcover, 2nd edition): Ronald J. Leach Introduction to Software Engineering (Hardcover, 2nd edition)
Ronald J. Leach
R2,974 Discovery Miles 29 740 Ships in 12 - 17 working days

Practical Guidance on the Efficient Development of High-Quality Software Introduction to Software Engineering, Second Edition equips students with the fundamentals to prepare them for satisfying careers as software engineers regardless of future changes in the field, even if the changes are unpredictable or disruptive in nature. Retaining the same organization as its predecessor, this second edition adds considerable material on open source and agile development models. The text helps students understand software development techniques and processes at a reasonably sophisticated level. Students acquire practical experience through team software projects. Throughout much of the book, a relatively large project is used to teach about the requirements, design, and coding of software. In addition, a continuing case study of an agile software development project offers a complete picture of how a successful agile project can work. The book covers each major phase of the software development life cycle, from developing software requirements to software maintenance. It also discusses project management and explains how to read software engineering literature. Three appendices describe software patents, command-line arguments, and flowcharts.

Recovering from Identity Theft - Large Print Edition (Paperback): Ronald J. Leach Recovering from Identity Theft - Large Print Edition (Paperback)
Ronald J. Leach
R320 Discovery Miles 3 200 Ships in 10 - 15 working days
Confessions of a Cruise Lecturer - Large Print Edition (Paperback): Ronald J. Leach Confessions of a Cruise Lecturer - Large Print Edition (Paperback)
Ronald J. Leach
R199 Discovery Miles 1 990 Ships in 10 - 15 working days
Data Recovery - Large Print Edition (Paperback): Ronald J. Leach Data Recovery - Large Print Edition (Paperback)
Ronald J. Leach
R455 Discovery Miles 4 550 Ships in 10 - 15 working days
The 101 Most Important Unix and Linux Commands - Large Print Edition (Paperback): Ronald J. Leach The 101 Most Important Unix and Linux Commands - Large Print Edition (Paperback)
Ronald J. Leach
R424 Discovery Miles 4 240 Ships in 10 - 15 working days
Baltimore Blue and Freddie Gray (Paperback): Ronald J. Leach Baltimore Blue and Freddie Gray (Paperback)
Ronald J. Leach
R219 Discovery Miles 2 190 Ships in 10 - 15 working days
Confessions of a Cruise Lecturer (Paperback): Ronald J. Leach Confessions of a Cruise Lecturer (Paperback)
Ronald J. Leach
R189 Discovery Miles 1 890 Ships in 10 - 15 working days
Advanced Topics in Unix, Second Edition (Paperback): Ronald J. Leach Advanced Topics in Unix, Second Edition (Paperback)
Ronald J. Leach
R731 Discovery Miles 7 310 Ships in 10 - 15 working days

The first edition of this book was originally published in 1993 by John Wiley under the same name, Advanced Topics in UNIX. It was named an Alternate Main Selection of the Newbridge Book Club in the same year. That book stayed in print for thirteen years, an eternity in the computing literature. Due to changes in the publishing industry, this edition of the book is only available electronically. I was motivated to revise the book because of the increased popularity of several variants of UNIX and on what I learned from reviews of the previous published version of this book. Linux has become increasingly popular, due in no little part to it being so popular in the open source community and also because it is serving as the basis of the operating system for the Google Android phone. The Mach operating system, originally developed at Carnegie Mellon University, is the basis for the operating systems used to control Apple Macintosh computers. Solaris, originally developed by Sun Microsystems, is now considered by Oracle to be the top enterprise operating system and also claimed to have been especially built for cloud computing. It was clear to me that a revision of the book was necessary. I am currently running versions of both Linux (Ubuntu) and Solaris on my Windows PC. Of course, the operating system on my Macintosh is based on Mach. My experience with multiple versions of UNIX-like operating systems showed me that end users, application programmers, system programmers, and system administrators often had difficulties in making programs and utilities work well across different UNIX variants, due to differences in file system organization, different locations of critical configuration files, and important, yet subtle, differences in how system calls operate. There are also issues with different utilities, many of which are either not available on all UNIX versions, or else require a substantial effort to even get them to install properly. One of the most interesting problems required detailed analysis of several Linux variants in order to get a single public domain application to work - the different Linux variants from Fedora (formerly Red Hat), SUSE, and Ubuntu were examined before the application would install and work properly. Many second editions dump material from older technologies. I have chosen a different approach, guided by my own research and experience in the efficient development of large, high-quality, software systems in both UNIX and non-UNIX environments over much of the last twenty-five years. Much of my research in this area is based on the application of systematic approaches to software reuse as part of the software development process. In fact, I chose to produce a second edition of my book Software Reuse: Methods, Models, Costs before I began revising this book, Advanced Topics in UNIX. What is the relevance of software reuse to a book on UNIX? A huge percentage of current software applications for UNIX and other operating systems are built using existing software components that are either partially or entirely reused. Older software components necessarily have been built using older technology and are likely to use some of the older system calls as well as newly created calls. You need to understand the differences in different generations of system calls and their behavior if you are redeploying existing software components. That is, after all, the reason for learning system calls if you are an applications programmer. The same holds true for systems-level programming, especially kernel-level programming, since operating systems are rarely written from scratch. There are 11 chapters: Introduction to UNIX, The User Interface, Input and Output, UNIX File Systems, Introduction to Processes, Memory and Process Management, Introduction to Interprocess Communication, The System V IPC Package, Signals, Sockets, and RPC, IPC Comparison, and Fault-Tolerant UNIX Software.

The Bible as a Manual for Identity Theft (Paperback): Ronald J. Leach The Bible as a Manual for Identity Theft (Paperback)
Ronald J. Leach
R342 Discovery Miles 3 420 Ships in 10 - 15 working days

The motivation for this book is that while writing two books on identity theft, I was struck by how some of the modern-day scams had counterparts in the Bible. A re-reading of the Bible reinforced this impression. The original intention was to write three, or perhaps four, books, examining cases of identity theft in the Old testament, New Testament, the Apocrypha, and, eventually, the Qu'ran. After finishing the analysis of the King James Bible (the primary biblical text used herein), and seeing how much of the material that was necessary to include in this book required, it was decided to combine the first three books into one and to leave the analysis of the Qu'ran to an author more versed in its content. Several public domain online versions of bibles were used in this work. All can be found at either gutenberg.org or archive.org. The primary versions used were The King James Bible, The Douay Rheims Catholic Bible, and The Deuterocanonical Books of the Bible. The biblical text has not been changed from the versions found, but has been reformatted to meet the requirements of modern eBook readers. In this book we will present the stories in the Bible that, at least in my opinion, can be considered by a modern reader to involve some form of the crime of identity theft. I invite you, the readers, to comment on my selections in their reviews of this book. No allegorical stories have been included in this book.

Recovering From Identity Theft (Paperback): Ronald J. Leach Ph. D. Recovering From Identity Theft (Paperback)
Ronald J. Leach Ph. D.
R310 Discovery Miles 3 100 Ships in 10 - 15 working days

he headline was dreadful from a consumer's perspective. Data from all Target stores had been criminally hacked, and essential information on forty million credit and debit cards was stolen in November and December of 2013. There are reports of angry consumers calling Target's customer service and demanding help. The merchant is the wrong place to call, just as it was pointless to call T. J. Maxx when the data contained on sixty million of their customer's cards were illegally obtained by criminal hackers. This easy-to-understand, 79-page book is the fourth in the Identity Theft series. It is intended for the general, non-specialist reader, provides a set of overall strategies and specific actions you should take if you are the victim of identity theft. There are three appendices. The first appendix contains contact information for the Federal Trade Commission, the three major credit reporting agencies, many US banks, many consumer protection organizations, and a few of the more established companies that specialize in identity theft protection and recovery. The second appendix contains a checklist for protecting yourself from identity theft. Appendix three also contains a checklist; this one is used to aid you in recovering from identity theft if you are a victim. Ron Leach's lectures on identity theft have been attended by more than 3,500 people. Many more have heard him on closed-circuit television. This experience, and his long experience as a professor of computer science make him uniquely qualified to write this book, the fourth in AfterMath's Identity Theft Series.

Software Reuse, Second Edition - Methods, Models, Costs (Paperback): Ronald J. Leach Software Reuse, Second Edition - Methods, Models, Costs (Paperback)
Ronald J. Leach
R794 Discovery Miles 7 940 Ships in 10 - 15 working days

This book is an updated edition of the previous McGraw-Hill edition, which was an essential guide to successful reuse across the entire software life cycle. It explains in depth the fundamentals, economics, and metrics of software reuse. The bottom line is good news for designers of complex systems: Systematic software reuse can succeed, even if the underlying technology is changing rapidly. Software reuse has been called the central technical concept of object-oriented design. This book covers reuse in object-oriented systems, but goes far beyond in its coverage of complex systems - the type that may evolve into "systems of systems." Important new material has been added to this edition on the changed state-of-the-art and state-of-the-practice of software reuse, on product-line architectures, on the economics of reuse, on the maintenance of COTS-based systems. A case study using DoDAF (The Department of Defense Architectural Framework) in system design has been included to show some new thinking about reuse and some attributes of large-scale components of very large systems. After an introduction to basics, the book shows you how to: 1. Access reuse and disadvantages for your systems. 2.Understand and use domain analysis. 3.Estimate total costs, including maintenance, using life-cycle-based models. 4.Organize and manage reuse libraries. 5.Certify software components that have been created at any phase of the software life cycle your organization uses. 6.Implement systematic reuse using COTS (commercial, off-the-shelf) components and other existing software. The book includes several models and reengineering checklists, as well as important case studies. These models and checklists help anyone faced with the problem of whether to build, buy, reuse, or reengineer any software component, system, or subsystem of reasonable complexity. Such components, subsystems, and systems often fit into the new paradigms of service-oriented architectures (SOA) and software-as-a-service (SaAS). Software Reuse: Methods, Models, Costs emphasizes the cost efficient development of high-quality software systems in changing technology environments. Our primary example of domain analysis, which is the analysis of software into potentially reusable artifacts, often at a higher level than simply source code modules, is the assessment of possibilities for reuse in the Linux kernel. There are eight chapters in Software Reuse: Methods, Models, Costs: What is Software Reuse?, Techniques (which included domain analysis), Reuse Libraries, Certification of Reusable Software Components, The Economics of Software Reuse, Reengineering, Case Studies, and Tools For Software Reuse.

Recover Your Data, Protect Your Identity - Two Books (Paperback): Ronald J. Leach Recover Your Data, Protect Your Identity - Two Books (Paperback)
Ronald J. Leach
R819 Discovery Miles 8 190 Ships in 10 - 15 working days

Written by a prominent computer scientist, this volume contains two complete works of critical importance to even the most casual computer user in the modern world. This volume contains two complete works: "Data Recovery" and "Identity Theft in the Cyber Age." Data Recovery: One of the greatest fears of anyone using a computer, smartphone, or tablet is the loss of their data. But there is hope, even in the worst situations. This book, written by a long-time computer science professor, department chair, and author, shows how the very complexity of modern computing devices helps make data recovery possible. Most "lost" data can be recovered easily by the average user. The book contains numerous simple examples that illustrate the step-by-step data recovery process for the most popular computer operating systems and software. We'll also show you how to help recover your lost data from smartphones and tablets, as well as any data you may have stored in "the cloud." In some cases, the problems are more complex than can reasonably be resolved by the typical user. The book also provides information on how to tell if you need expert help to solve your data recovery problems - and you'll have enough technical background information how to judge the capability of that supposedly expert help to make sure that the data is recovered as much as humanly possible. Identity Theft in the Cyber Age: Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases? What about when you are using email, web surfing, texting, or social networking? If you don't, then Identity Theft in the Cyber Age is the book for you. This easy-to-understand book will tell you what to do and what to avoid when preparing your taxes; going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce. You'll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of "Pameiob." You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never shop online. This book is a comprehensive, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world. It is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist. Major topics in this complex subject are illustrated by case studies describing the personal experiences of some of the author's friends and acquaintances, and by experiences of some prominent public figures. You'll learn about the potential profit margins that make cybercrime so appealing to criminals - and why such crime is so hard to prosecute. You will learn just how pervasive the crime of identity theft is, and how you are at risk even if you don't do any online banking or make any online purchases using a credit card. We'll discuss some simple strategies that can help you cope with the side effects of the increase in digital information that is already available to potential identity thieves. There are four main chapters. Chapter 1 is entitled "Identity Theft: How Bad Is It?" and provides an overview of this all too common problem. Chapter two, entitled "Identity Theft: How Vulnerable are You?," provides examples of actual cases of the most common types of identity. The third chapter is entitled "Protect Yourself From Identity Theft" and contains a set of strategies that can be used to greatly reduce the chances of you suffering identity theft. The fourth chapter is entitled "What To Do If You Are An Identity Victim." It provides a set of overall strategies and specific actions you should take if you are the victim of identity theft. There are three appendices.

Fastest Paths to a Job in the Computer Industry (Paperback): Ronald J. Leach Fastest Paths to a Job in the Computer Industry (Paperback)
Ronald J. Leach
R295 Discovery Miles 2 950 Ships in 10 - 15 working days

This book provides essential information about the fastest ways to get jobs in the computer industry, even without a four-year degree or extensive computer programming experience. Jobs described include: Technician Help Desk Cable Installer Assembler Hardware Tester Computer Repair Expert Router Configuration Specialist Free-lance special-purpose service provider Word Processor Data Entry Clerk Certified Expert in a particular technology (Microsoft MCSE, Novell, Cisco, 3Com, etc.) Obsolete Programming Languages Expert Web Designer Computer Artist Desktop publisher Computer Salesperson Computer Trainer ABOUT THE AUTHOR: Ronald J. Leach, Ph.D., was a long-term professor of Computer Science and former department chair before he recently retired from Howard University. During the 2004-2005 academic year, while he was department chair, Howard University sent more students to Microsoft than any other school in the United States.

Twelve and a Half Steps to Avoid Identity Theft (Paperback): Ronald J. Leach Twelve and a Half Steps to Avoid Identity Theft (Paperback)
Ronald J. Leach
R179 Discovery Miles 1 790 Ships in 10 - 15 working days

This experience, and his long experience as a professor of computer science make him uniquely qualified to write this book. Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases? What about when you are using email, web surfing, texting, or social networking? You'll learn about these in Twelve and a Half Steps to Avoid Identity Theft. What do all these companies, organizations, and people have in common? Heartland RBS Worldpay Citizens Financial Group Inc Hannaford Brothers Co TJX Companies Inc Marshalls TJ Maxx CardSystems Solutions The U.S. Internal Revenue Service Ben Bernanke, Chairman of the Federal Reserve Wyndam Worldwide Corporation (Wyndam hotels) Zappos Sony's online accounts for Play Station users Verisign LinkedIn The sad answer is that all of them have suffered well-publicized recent successful attacks from identity thieves. Many of these attacks involved thieves obtaining access to confidential financial information from thousands, and in some cases, millions, of customers. How can you protect yourselves from this crime? In this book we describe 12 1/2 suggestions that can strongly reduce, or even eliminate, the likelihood of you being an identity theft victim. Why 12 1/2 steps? Because twelve of the steps are ones that you can begin to take right away, and the other will require you to do some additional work reading up on this vital topic. Here are the twelve and a half simple steps to help avoid identity theft: 1.Strip to a bare minimum 2.Don't Pameiob 3.Be strong 4.Watch for zombies 5.Watch for vampires 6.Free is too costly 7.Don't give too much credit 8.Surf safely 9.Gullible's travels 10.Don't give it up if you don't have to 11.Just the FAX, please 12.Be shrewd and shred 12 1/2. Get more information This short, easy-to-understand book, intended for the general, non-specialist reader, will tell you what to do and what to avoid when going to a bank, pharmacy, or doctor; shopping in person; traveling; or using any kind of electronic commerce. You'll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain software systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of "Pameiob." You'll learn how you have to protect yourself from the kinds of identity theft that can occur even if YOU never do any online shopping. This book is a brief, easy-to-understand guide that is dedicated to keeping your assets and identity safe while navigating this dangerous world. The book is based on the author's experiences as a long-term identity theft consultant and lecturer and computer scientist. Want more detailed information on identity theft? Then "Identity Theft in the Cyber Age" is the book for yo

The 101 Most Important UNIX and Linux Commands (Paperback): Ronald J. Leach The 101 Most Important UNIX and Linux Commands (Paperback)
Ronald J. Leach
R398 Discovery Miles 3 980 Ships in 10 - 15 working days

Overview This book delivers what the title states: It describes the 101 most important UNIX and Linux commands and system calls. The book bridges the gap between on-line tutorials and manual pages on one hand, and books of 1,000 pages or more that explore the nuances of many shell commands in exhaustive detail. While most of these sources provide excellent information, they do not really solve the plight of the novice user, nor do they fully answer the questions that more experienced, and even expert, users often have. Much of the complexity of UNIX and Linux, and much of the difficulty faced by users is caused by the extremely large and rich set of shell commands, many of which have a very large set of allowable options that, while useful in certain circumstances, often provide more frustration than help because of their complexity. Many UNIX and Linux system calls are also complex, and have interactions that can be rather difficult for many programmers.

Identity Theft in the Cyber Age (Paperback): Ronald J. Leach Ph. D. Identity Theft in the Cyber Age (Paperback)
Ronald J. Leach Ph. D.
R411 Discovery Miles 4 110 Ships in 10 - 15 working days

Ronald J. Leach's lectures on identity theft have been attended by more than 1,200 people. Many more have heard him on closed-circuit television. This book is based on his experiences as an identity theft professional and as a long-term professor of computer science. Do you know how to protect your vital identity information when you use computers for your banking, credit card transactions, and everyday purchases? What about email, web surfing, texting, and social networking? This book, intended for the general, non-specialist reader, will tell you what to avoid in using electronic commerce. You'll learn about the most common security weaknesses of modern banking and e-commerce software and when to avoid using certain systems, the tell-tale signs of potentially insecure transmission of your data, and how to avoid the dangerous practice of "Pameiob." This book is a comprehensive, easy-to-understand guide, based on the author's experiences as a long-term identity theft lecturer and computer scientist, and is dedicated to keeping your assets and identity safe while navigating this dangerous world. Major topics in this complex subject are illustrated by case studies describing the personal experiences of some of the author's friends and acquaintances, and by experiences of some prominent public figures. You'll learn about the potential profit margins that make cybercrime so appealing to criminals - and why such crime is so hard to prosecute. In this book you will learn just how pervasive the crime of identity theft is, and how you are at risk even if you don't do any online banking or make any online purchases using a credit card. We'll discuss some simple strategies that can help you cope with the side effects of the increase in digital information that is already available to potential identity thieves. There are four main chapters. Chapter 1 is entitled Identity Theft: How Bad Is It? and provides an overview of this all too common problem. Chapter two, entitled Identity Theft: How Vulnerable are You?, provides examples of actual cases of the most common types of identity theft that occur today. The third chapter is entitled Protect Yourself From Identity Theft and contains a set of strategies that can be used to greatly reduce the chances of you suffering identity theft. The fourth chapter is entitled What To Do If You Are An Identity Victim. It provides a set of overall strategies and specific actions you should take if you are the victim of identity theft. There are three appendices. The first appendix contains contact information for the Federal Trade Commission, the three major credit reporting agencies, many US banks, many consumer protection organizations, and a few of the more established companies that specialize in identity theft protection and recovery. The second appendix contains a checklist for protecting yourself from identity theft. Appendix three also contains a checklist; this one is used to aid you in recovering from identity theft if you are a victim.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260
Alcolin Super Glue 3 X 3G
R60 Discovery Miles 600
Butterfly A4 80gsm Paper Pads - Bright…
R36 Discovery Miles 360
Cadac Burger Press
R263 Discovery Miles 2 630
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Cricut Joy Machine
 (6)
R4,682 Discovery Miles 46 820
Peptine Pro Equine Hydrolysed Collagen…
R699 R589 Discovery Miles 5 890
Amplify Move It series Kids Activity…
R143 Discovery Miles 1 430
Brother JA1400 Basic Multi Purpose…
 (3)
R2,999 R2,299 Discovery Miles 22 990
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners