The Community for Technology Leaders
Green Image
Issue No. 10 - October (2009 vol. 42)
ISSN: 0018-9162
pp: 92
A nalytic Combinatorics, Philippe Flajolet and Robert Sedgewick. This self-contained treatment of the mathematics underlying the analysis of discrete structures has emerged over the past several decades as an essential tool in the understanding of computer programs' and scientific models' properties, with applications in physics, biology, and chemistry.
Thorough treatment of many classical applications is an essential aspect of this book's presentation. Written by leaders in the field of analytic combinatorics, this text strives to be a definitive reference on the topic. The authors complement the text with exercises, examples, appendices, and notes to aid understanding. This book can be used as an advanced undergraduate or graduate course on the subject, or for self-study.
Cambridge University Press;; 978-0-521-89806-5; 810 pp.
P ractical Database Programming with Visual Basic.NET, Ying Bai. Unlike most other database programming books, which discuss and present database programming techniques through huge blocks of programming code, the author uses a unique writing style to show readers how to develop professional and practical database programs. He accomplishes this with Visual Basic.NET 2005 Design Tools and Wizards related to ADO.NET 2.0, and applies autogenerated codes by using Wizards.
Avoiding overly large blocks of code, the book shows a simple and easy way to create database programs and build professional and practical databases more efficiently. In addition to Design Tools and Wizards, the runtime object method is also discussed and analyzed to help users design and implement more sophisticated data-driven applications with complicated coding techniques.
Three popular database systems—Microsoft Access, SQL Server 2005, and Oracle Database 10g Express Edition (XE)—are explored in detail, with practical examples and sample projects.
Cambridge University Press;; 978-0-521-71235-4; 828 pp.
M anaging and Leading Software Projects, Richard E. Fairly. Organized around basic principles of software project management—planning and estimating, measuring and controlling, leading and communicating, and managing risk—this book introduces a broad range of software development methods. Techniques explored range from the traditional hacking, requirements to code, and waterfall methods to the iterative, such as incremental build and the evolutionary, agile, and spiral techniques.
The author illustrates and emphasizes tailoring the development process to each project, with a foundation in the fundamentals that are true for all development methods. Topics such as the WBS, estimation, schedule networks, organizing the project team, and performance reporting are integrated into the text, rather than being relegated to appendices. Finally, each chapter in the book includes an appendix that covers relevant topics from CMMI-DEV-v1.2, IEEE/ISO Standards 12207, IEEE Standard 1058, and the PMI Body of Knowledge.
Wiley;; 978-0-470-29455-0; 512 pp.
T oo Soon To Tell: Essays for the End of The Computer Revolution, David A. Grier. Based on the author's Computer column "In Our Time," this revised and expanded version presents a collection of skillfully written essays about the computer age, an era that began in February 1946. Set against a backdrop that spans more than half a century, this poignant work gives readers an intimate and meaningful understanding of the relationship between humans and machines and the impact of rapid technological change on society.
These chronological essays explore the revolutionary nature of the computer, the relation between machines and human institutions, and the connections between fathers and sons, providing general readers with a picture of a specific technology that attempted to rebuild human institutions in its own image.
Wiley;; 978-0-470-08035-1; 238 pp.
G oogling Security: How Much Does Google Know About You? Greg Conti.
Google makes a fortune on what it knows about its users. This book reveals how Google's information stockpiles can be used against a person or business–and what can be done to protect against such practices. It covers all of Google's top applications, and explores the privacy implications of Gmail, Google Maps, and other Google applications.
Drawing on his own advanced security research, the author also shows how Google's databases can be used by others with bad intent. Other topics include uncovering the trail of information left behind when using Google search and how Google's map and location tools might disclose the locations of homes, employers, and family and friends.
Addison-Wesley Professional;; 0-321-56433-2; 332 pp.
114 ms
(Ver 3.1 (10032016))