Группа авторов

Список книг автора Группа авторов


    Beyond Technology

    Группа авторов

    Beyond Technology offers a challenging new analysis of learning, young people and digital media. Disputing both utopian fantasies about the transformation of education and exaggerated fears about the corruption of childhood innocence, it offers a level-headed analysis of the impact of these new media on learning, drawing on a wide range of critical research. Buckingham argues that there is now a growing divide between the media-rich world of childrens lives outside school and their experiences of technology in the classroom. Bridging this divide, he suggests, will require more than superficial attempts to import technology into schools, or to combine education with digital entertainment. While debunking such fantasies of technological change, Buckingham also provides a constructive alternative, arguing that young people need to be equipped with a new form of digital literacy that is both critical and creative. Beyond Technology will be essential reading for all students of the media or education, as well as for teachers and other education professionals.

    Managing Safety

    Группа авторов

    What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book adopts the new approach to preventing serious incidents rather than minimal compliance with regulations. It takes you step-by-simple-step to show how accidents can be avoided with little effort and money, allowing you to reap the rewards such an injury-free culture brings: higher worker morale, better product quality, and maximum productivity. Plus the inner satisfaction of reaching a goal that is worth striving for, namely zero accidents.

    Software Paradigms

    Группа авторов

    Software Paradigms provides the first complete compilation of software paradigms commonly used to develop large software applications, with coverage ranging from discrete problems to full-scale applications. The book focuses on providing a structure for understanding a hierarchy of software development approaches, and showing the relationships between the different models. Coverage includes paradigms in design patterns, software components, software architectures, and frameworks. Chapters within each of these sections include design issues related to building and using the paradigm as well as numerous real world applications. A practical overview of the hierarchy of development paradigms, Software Paradigms is an excellent teaching tool for undergraduates and graduates, and a comprehensive and reliable reference for software engineers.

    Being Virtual

    Группа авторов

    Thanks to the Internet, it has never been so easy to become the person of your wildest dreams. Immersive 3D worlds such as Second Life and THERE.com provide an escape route from the ordinary, into a virtual world where you have the power to mould your life in any way you please. Forget about walking, wheelchair users can fly. Pensioners wipe away the pains of age, discovering youthful exuberance and making young friends once more. No wonder it has become harder than ever to honestly answer the question: who am I? In Being Virtual, Davey Winder looks at how an increasing number of us are living part-real, part-virtual lives, and how it affects who we are. He looks at the opportunities and dangers that a virtual identity offers us, how we juggle our real and online lives, and what happens when one spills over into the other… He uses his own personal experiences to bring the issues to life, and backs them up with the real-life stories of others and testimony from the experts. Along the way, he looks at some fascinating questions such as: Are you a virtual liar? What happens when our virtual and real worlds collide? Why will you talk to anyone online, but nobody on the train to work? Why do so many middle-aged men transform into teenage girls online? Is it possible to have any secrets in such a connected world? Being Virtual gives a glimpse into the future of human identity, and is a must-read for anyone who uses the Internet to enhance – or escape from – their 'ordinary' life. About the author Davey Winder has been a freelance journalist for 16 years, and is Contributing Editor of the best-selling IT magazine, PC Pro. He has picked up many awards including Technology Journalist of the Year and IT Security Journalist of the Year. A founder member of the Internet Society of England and author of more than 20 books, his blog can be found at: http://happygeeknewmedia.blogspot.com/

    Security Engineering

    Группа авторов

    The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

    Information Security

    Группа авторов

    Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.

    Internet Security

    Группа авторов

    Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work. Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer «if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard time». This scenario does not reflect the reality of the Internet world as it currently stands. However, with security issues becoming more and more important internationally, engineers of the future will be required to design tougher, safer systems. Internet Security: * Offers an in-depth introduction to the relevant cryptographic principles, algorithms protocols – the nuts and bolts of creating a secure network * Links cryptographic principles to the technologies in use on the Internet, eg. PGP, S/MIME, IPsec, SSL TLS, Firewalls and SET (protecting credit card transactions) * Provides state-of-the-art analysis of the latest IETF standards plus summaries and explanations of RFC documents * Authored by a recognised expert in security Internet Security is the definitive text for graduate students on security and cryptography courses, and researchers in security and cryptography areas. It will prove to be invaluable to professionals engaged in the long-term development of secure systems.

    Innocent Code

    Группа авторов

    This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them Based on real-world situations taken from the author's experiences of tracking coding mistakes at major financial institutions Covers SQL injection attacks, cross-site scripting, data manipulation in order to bypass authorization, and other attacks that work because of missing pieces of code Shows developers how to change their mindset from Web site construction to Web site destruction in order to find dangerous code

    Software Quality

    Группа авторов

    The book presents a comprehensive discussion on software quality issues and software quality assurance (SQA) principles and practices, and lays special emphasis on implementing and managing SQA. Primarily designed to serve three audiences; universities and college students, vocational training participants, and software engineers and software development managers, the book may be applicable to all personnel engaged in a software projects Features: A broad view of SQA. The book delves into SQA issues, going beyond the classic boundaries of custom-made software development to also cover in-house software development, subcontractors, and readymade software. An up-to-date wide-range coverage of SQA and SQA related topics. Providing comprehensive coverage on multifarious SQA subjects, including topics, hardly explored till in SQA texts. A systematic presentation of the SQA function and its tasks: establishing the SQA processes, planning, coordinating, follow-up, review and evaluation of SQA processes. Focus on SQA implementation issues. Specialized chapter sections, examples, implementation tips, and topics for discussion. Pedagogical support: Each chapter includes a real-life mini case study, examples, a summary, selected bibliography, review questions and topics for discussion. The book is also supported by an Instructor’s Guide.

    Domain Architectures

    Группа авторов

    Domain Architectures is a comprehensive catalog of the domain architectures essential to software developers using object-oriented technology and UML to solve real-life problems. Providing a unique top-down view of systems, the book also provides quick access to landmarks and references to domain architectures. The ability to describe applications, in terms of the properties they share, offers software designers a vast new landscape for implementing software reuse. The ideal professional's handbook. Helps readers reduce trial and error and increase productivity by reusing tried and trusted ideas Models are described and documented using UML (incorporating UML 2.0) models and meta models