Information Systems: The State of the Field (John Wiley Series in Information Systems) : 9780470017777

The information systems field has contributed greatly to the rise of the information economy and the information society. Yet, after more than a quarter-century since its formation, it still is plagued by doubts about its identity and legitimacy. Information Systems: The State of the Field contains the reflections of leading IS scholars on the nature of the discipline, its core identity and the challenges of creating a strong and legitimate academic enterprise centred on information systems. It includes debates, reflections and commentaries from a group of leading information system scholars, and offers an overview of the state of the field at this time. This book is intended for all who are interested in the nature and direction of the information system field as it enters the 21st century.

"The sociologist Zygmund Bauman has defined a discipline which is constantly debating its credentials as a “flawed” discipline. This critique can certainly be applied to the IS discipline.  The editors of this book must be congratulated on collecting together the principal writings reflecting the nature of the debate to provide a learned and fascinating account of where the field now stands and perhaps where it is going. It is essential reading for any student of IS."
—Frank Land, Emeritus Professor, Department of Information Systems, London School of Economics


"The struggle for identity, according to Alford North Whitehead entails a dialectic of “becoming”.  It evolves from coping with continuous change, a conflict of perspectives and always asking: “Who am I?”, “Who are we?”, “Who are we not?”, “What do we inherit from our past?”. In this imaginatively edited volume, King and Lyytinen recount information systems' restless pursuit for identity. Anyone who is affected by the struggles, but more importantly everyone who wants to join it must read this book."
—Richard O. Mason, Carr P. Collins Distinguished Professor, Management Information Sciences, Edwin L. Cox School of Business, Southern Methodist University

About the Author


John Leslie King is Dean and Professor in the School of Information at the University of Michigan. He previously served on the faculty of the University of California, Irvine. He has published many articles and five books on the relationship between technical and social change, and has served in key editorial positions for many academic journals, including Information Systems Research, Information Infrastructure and Policy, Information Polity, Organization Science, Organizational Computing and Electronic Commerce, Information Systems Frontiers, ACM Computing Surveys, the Journal of Strategic IT, Computer Supported Cooperative Work, and the Journal of Information Systems Management. He is currently a member of the National Science Foundation’s Advisory Committees for the directorates of Computer and Information Science and Engineering and Social, Behavioral and Economic Sciences, and a member of the Board of Directors of the Computing Research Association. He holds a PhD in Administration from the University of California, Irvine.


Kalle Lyytinen is Iris S. Wolstein Professor at Case Western Reserve University. He has published books, articles and conference papers on his research, which includes system design, method engineering, implementation, software risk assessment, computer-supported cooperative work, standardization, ubiquitous computing, IT-induced innovation in architecture and the construction industry, design and use of ubiquitous applications in health care, high level requirements model for large scale systems, and the development and adoption of broadband wireless standards and services. He serves currently on the editorial boards of several leading IS journals including the Journal of AIS (Senior Editor), Information Systems Research, the Journal of Strategic Information Systems, Information and Organization, Requirements Engineering Journal and Information Systems Journal among others. He holds a PhD from the University of Jyväskylä, Finland.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Systems Research: Relevant Theory and Informed Practice (IFIP International Federation for Information Processing) : 9781402080944

International Federation of Information Processing (IFIP) Working Group 8.2
conference entitled “Relevant Theory and Informed Practice: Looking Forward from
a 20 Year Perspective on IS Research.” The conference was held at the University of
Manchester in Manchester, England, on July 15-17, 2004.

It was during the working group business meeting following the IFIP WG 8.2
working conference in 2001 on “Realigning Research and Practice in Information
Systems Development” in Boise, Idaho, that a conference call was approved for a new
conference dealing with the alignment of research practice and IS development. Those
who proposed the conference had been involved with WG 8.2 and other TC 8 working
groups over many years. The initial incentive for developing the theme of the conference
dates back to 1997 at the Philadelphia conference. It was observed that while
some were celebrating the end of the “methods wars” because some types of qualitative
work had become acceptable for publication in mainstream journals, the work by others
who were exploring questions outside the managerial, organizational, or technological
mainstream, or who were employing innovative research approaches, was still being
excluded from the discourse. Thus it was concluded that further attention to the question
of research approaches was required.

In a real sense, however, the seeds of this conference were sown in 1984 at the first
Manchester conference, when in the proceedings introduction Enid Mumford made a
declaration that continues to express a concern of the working group.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Systems Project Management With Infotrac: How To Deliver Function And Value In Information Technology Projects : 9780814472736

It’s common in the IT industry to hear of project disasters: overdue products, blown budget estimates, and dismal results. And the root cause of most of these commonplace disasters is the simple fact that people skilled in the technical aspects of a project are often not prepared to manage them.


Managing projects requires expert skill in managing budgets, people, and processes. It requires someone who is proficient in project management—especially in the highly complex, project-driven IT industry. Information Systems Project Management gives you the powerful tips and tools you need to deliver results.


A definitive resource for IT professionals, the second edition of Information Systems Project Management uses clear language and real-world examples to guide you through each key step of understanding the project, defining it, planning it, and running it—and bringing it to completion. And the book shows you how to steer clear of pitfalls that can quickly derail your project, including scope changes that are not adequately defined, tracked, and managed; poor planning, especially planning that overlooks project activities; and an overabundance of technology tools, which often results in decreased productivity.


Plus, the second edition comes complete with all-new sections on how to:



  • manage projects when you’re also a team participant

  • define the proper objective

  • get your projects off to a good start

  • understand a variety of system-development life cycles

  • plan for a smooth project implementation

  • and complete a project cleanly, from capturing lessons learned to administrative closeout.


The book is also packed with new checklists, worksheets, and action plans for dozens of "what-if" scenarios.


Whether your project entails implementing major packages, upgrading hardware, designing a technology architecture, or developing a systems strategic plan, Information Systems Project Management helps you successfully deliver your projects on time, on budget, and with desired results.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Systems for Sustainable Development : 9781591403425

Information Systems for Sustainable Development provides a survey on approaches to information systems supporting sustainable development in the private or public sector. It also documents and encourages the first steps of environmental information processing towards this more comprehensive goal.

About the Author
Dr. Lorenz M. Hilty is head of the Technology and Society Unit at the Swiss Federal Laboratories for Materials Testing and Research (EMPA) and a professor for information systems at the University of Applied Sciences Solothurn Northwestern Switzerland (FHSO). He is currently responsible for the research and development program "Sustainability in the Information Society" of the Council of the Swiss Federal Institutes of Technology (ETH), chair of the Technical Committee for Environmental Informatics of the German Informatics Society, and Swiss delegate to the Technical Committee "Computers and Society" of the International Federation for Information Processing (IFIP-TC9). He earned his master's and PhD in Computer Science at the University of Hamburg, Germany, and has been working on information and simulation systems in environmental research and sustainable development for two decades. He has published several books and more than 70 articles in this field. Dr. Eberhard K. Seifert is a bio-economist and since 1993 he has been a senior fellow in the Wuppertal Institute for climate, environment and energy. Project leader in the Dpt. Environment Material flows and structural change and assoc. member of the working group on New Models of Wealth. Research areas cover both national and corporate green accounting as well as performance measurement, sustainability indicators and reporting. Winner of the Oc van der Grinten award on Environmental Information Systems in 1995/96. Advisor and member of scientific (conference) committees and boards of journals, including Journal of Bioeconomics (Kluwer Acad. Publishers). He is member of national and international networks and working groups, steering committees and institutions, and german VDI committee for drafting guidelines on environmental costs. Dr. René H. Treibert is professor for business informatics at the Hochschule Niederrhein in North Rhine Wetsfalia in Germany. He is especially working on information systems. He is also a lecturer in the specialist area safety engineering of the Bergische University of Wuppertal. After his diploma in mathematics he worked first three years at Battelle-Institut in Frankfurt/Main, then he was about six years active in the department of environmental technology of a large German software house, before he led for about eight years the department of application development of a large enterprise in the industry utilities. Dr. Eberhard K. Seifert is a bio-economist and since 1993 he has been a senior fellow in the Wuppertal Institute for climate, environment and energy. Project leader in the Dpt. Environment Material flows and structural change and assoc. member of the working group on New Models of Wealth. Research areas cover both national and corporate green accounting as well as performance measurement, sustainability indicators and reporting. Winner of the Oc van der Grinten award on Environmental Information Systems in 1995/96. Advisor and member of scientific (conference) committees and boards of journals, including Journal of Bioeconomics (Kluwer Acad. Publishers). He is member of national and international networks and working groups, steering committees and institutions, and german VDI committee for drafting guidelines on environmental costs.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Systems Development: Advances in Theory, Practice, and Education : 9780387250267

This volume is comprised of the proceedings of the 13th International Conference on Information Systems Development held August 26th-28th, 2004, at Vilnius Gediminas Technical University, Vilnius, Lithuania. The aim of this volume is to provide a forum for the research and practices addressing current issues associated with Information Systems Development (ISD). Every day, new technologies, applications, and methods raise the standards for the quality of systems expected by organizations as well as end users. All are becoming dependent on systems reliability, scalability, and performance. Thus, it is crucial to exchange ideas and experiences, and to stimulate exploration of new solutions. This proceedings provides a forum for both technical and organizational issues.

The 13th InternationalConference on Information Systems Development continues the tradition started with the first Polish-Scandinavian Seminar on Current Trends in Information Systems Development Methodologies, held in Gdansk, Poland in 1988. Through the years this seminar has evolved into one of most prestigious conferences in the field. ISD Conference provides an international forum for the exchange of ideas between the research community and practitioners and offers a venue where ISD related educational issues are discussed.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Systems: Achieving Success by Avoiding Failure : 9780470862551

Despite people’s best efforts information systems are particularly prone to failure. Some systems never materialize, others appear late and/or over budget and those that are implemented often fail to deliver the promised levels of performance. The consequences of these failures affect people throughout the organization concerned and beyond, sometimes to the point where they even threaten a company's future survival. They also damage the companies that develop and supply such systems. Worse still, the same types of problems occur again and again; even the most exhaustive methods are not able to ensure success.

This book aims to help all those people involved with information systems to break that repeating pattern of failure. Using real-life examples, it introduces a sophisticated approach based around the notion of system to come to grips with the causes of actual and potential failure. It presents a model of a system capable of action without failure that can be used as a yardstick to judge existing and planned information systems and to suggest measures that need to be taken to achieve success.


The examples used cover the public and the private sector and range in size from a nationwide system run by central government to an organization employing around 220 people.

About the Author
Dr Joyce Fortune is a Senior Lecturer and Head of the Technology Management Department at the Open University. Her teaching and research interests include systems failures, quality management and technology strategy. Her most recent papers have covered a wide range of topics including risk in project management, human rights and ethical policing, emergence and systems approaches to failure. This is her third book on systems failures.


Professor Geoff Peters is Professor of Systems Strategy at the Open University and Chairman of UKERNA Ltd, the company that manages JANET, the UK’s academic and research network. His main research interests are failure in complex human systems and change in higher education systems. He has edited and authored books on system failures, systems behaviour, corporate universities and the works of Sir Geoffrey Vickers.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Security : Principles and Practice : 9780471738480

Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes:



  • Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis

  • Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems

  • Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM

  • Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security


Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems—ranging from basic to challenging—to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint® slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.

About the Author


MARK STAMP, PHD, is Professor of Computer Science, San José State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a cryptanalyst at the U.S. National Security Agency.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Security Policies and Actions in Modern Integrated Systems : 9781591401865

Information Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data, technology and use of smart cards, applications of cryptography, security of distributed applications and adherence to standards, model and security issues associated with the organization of components (architectures) of information systems, such as networked systems (Internet and WWW-based), client/server architectures, and layered architectures. Contributions come both from the academic and the industrial field. 

About the Author
Maria Grazia Fugini is currently an Associate Professor of Computer Engineering at the Politecnico di Milano. She has been a Visiting Professor at the University of Maryland, Technical University of Vienna and University of Stuttgart. Her research interests are in information systems, security and development, software reuse, information retrieval, information systems development and re-engineering. She participated in several EC-funded Esprit research projects, namely TODOS, ITHACA, F3 and WIDE. Professor Fugini leads the Politecnico di Milano Operative Unit in the Project "Security in Public Administration," funded by Italian CINI/CNR in cooperation with Ministry of Justice and AIPA (Authority for Information Systems in Public Administrations), and several projects for private and public concerns on distributed services, information system re-engineering and data security.

Carlo Bellettini is currently an Assistant Professor at the University of Milano. Dr. Bellettini received his Ph.D. in Computer Science from the University of Milano in 1998. 

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Security Management Handbook, Sixth Edition (Isc2 Press) : 9780849374951

A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics. The Handbook has become the standard on which all IT security programs and certifications are based, making it an important volume in Information Security literature.

Handbook includes chapters that correspond to the 10 domains of the Certified Information System Security Professional (CISSP) examination. Previous edition: c1999. DLC: Computer security--Management--Handbooks, manuals, etc.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Security Management Handbook, Fifth Edition : 9780849319976

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a must have book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference.


This Volume 5 is a blend of some of the most current articles from the previous edition along with new
articles that may not have been covered previously. It also includes articles on tried and true topics such as
policies, firewalls and Internet security, but with a differing focus or distinction based on the various authors’
experiences.

As always, this edition is a comprehensive tome that offers vast amounts of information protection and
security advice, from policy development to cryptographic fundamentals and everything between. Whether
the reader is an experienced and certified professional (CISSP), an IT executive, or a novice firewall administrator,
there is something worthwhile for all.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Security Management Handbook, Fifth Edition, Volume 3 : 9780849395611

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a must-have book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference.

Handbook includes chapters that correspond to the 10 domains of the Certified Information System Security Professional (CISSP) examination. Previous edition: c1999. DLC: Computer security--Management--Handbooks, manuals, etc. 

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Security and Ethics: Social and Organizational Issues : 9781591402862

Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including: web accessibility, the digital divide, youth protection and surveillance, this book provides an invaluable resource for students, scholars and professionals currently working in Information Technology related areas.

Drawing on the earlier writings of Joseph Weizenbaum (1976), Stacey L. Edgar, in the introduction to his excellent book, Morality and Machines, emphasises the need to “examine the dangers of being too mesmerised by the ‘computational theory of mind,’ which can, with its deterministic and materialistic implications, lead to losing sight of what is of moral (and aesthetic) value” (2003, p. 7). Similarly, the renowned communications theorist Raymond Williams reminds us that “a technology is always, in a full sense, social. It is necessarily in complex and variable connection with other social relations and institutions … ” (1981, p. 227). It is in a timely manner, therefore, that Information Security and Ethics: Social and Organizational Issues brings together a collection of recent work by international scholars addressing a number of significant and current social and moral issues associated with the development and use of new information and communication technologies.

The interrelated areas of information security and information ethics are rapidly gaining importance in the wake of the terrorist attacks on the USA on September 11, 2001 and at the same time as academics, computer professionals, government agencies, business organisations and the general public are becoming increasingly aware of the dangers associated with our growing reliance on computer technologies — particularly with regard to the ubiquitous and unregulated nature of the Internet. Today, all members of society are affected by computers - even if they themselves do not own one. The computer has changed our home and workplace environments, how we communicate, how we do business, how we shop and how our children are educated and entertained. As parents, we may be becoming more and more concerned about our inability to protect our children from what we perceive as the harmful effects of technology. As citizens, we may be growing increasingly anxious about the external threats to our national security posed by cyber-terrorists and the internal threat to us as individuals of government control and the related invasion of our rights to privacy and free speech. Business organisations, meanwhile, need to be constantly alert to the increasing dangers to their information security and intellectual property posed by hackers and white-collar criminals. The responsibility lies not just with managers. Kevin Day suggests that had all employees been educated in security then the majority of recent successful security attacks could have been avoided. “Security is not a technology; it is a thought process and a methodology” (Day, 2003, p. 4).

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Quality Management: Theory and Applications : 9781599040240

The current era is associated with widespread and successive waves of technologydriven innovations in information technology (IT). Technologies, such as the Internet, electronic commerce, World Wide Web (WWW), and mobile commerce, bring with them ubiquitous connectivity, real-time access, and overwhelming volumes of data and information. More and more electronically captured information needs to be processed, stored, and distributed through IT-based business systems. Information is shared amongst various decision makers within organisations and between supply chain partners not only to benchmark, amend, or formulate competitive strategies but also to control day-to-day operations and to solve problems on a real-time basis (Al-Hakim, 2003). The world has experienced a transition from an industrial economy to an information economy. Data and information have become as much a strategic necessity for an organisation’s well being and future success as oxygen is to human life (Eckerson, 2002). IT allows organisations to collect great volumes of data. Vast databases holding terabytes of data and information are becoming commonplace (Abbott, 2001).

The literature emphasises that enterprises have far more data than they can possibly use. Yet, at the same time, they do not have the data they actually need (Abbott, 2001; Eckerson, 2002). Furthermore, the stored data and information may be obsolete, ambiguous, inaccurate, or incomplete. In other words, enterprises have achieved “quantity” of data and information but not necessarily the “quality” of either (Pierce, 2005). In 1999, Bill Gates, the founder of Microsoft, stated:

The most meaningful way to differentiate your company from your competitors, the best way to put distance between you and the crowd, is to do an outstanding job with information. How you can gather, manage and use information will determine whether you win or lose.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Processing with Evolutionary Algorithms: From Industrial Applications to Academic Speculations : 9781852338664

The last decade of the twentieth century has witnessed a surge of interest in numerical, computational intensive approaches to information processing. The lines that draw the boundaries between statistics, optimization, artificial intelligence and information processing are disappearing and it is not uncommon to find well founded and sophisticated mathematical approaches in applications traditionally associated with ad-hoc programming. Evolutionary Algorithms are increasingly being applied to information processing applications that require any kind of optimization and they have reached the status of problem-solving tools in the backpack of the engineer. However, there are still exciting new developments taking place in the academic community. The driving idea in the organization of this edited volume is the emphasis in the contrast between already accepted engineering practice and on-going explorations in the academic community. As From industrial applications to academic speculations suggests, the organization of Information Processing with Evolutionary Algorithms follows an axis of nearness to practical applications, travelling from industrial day-to-day problems and practice to the more speculative works.

The last decade of the 20th century has witnessed a surge of interest in numerical, computation-intensive approaches to information processing. The lines that draw the boundaries among statistics, optimization, artifical intelligence and information processing are disappearing, and it is not uncommon to find well-founded and sophisticated mathematical approaches in application domains traditionally associated with ad-hoc programming. Heuristics has become a branch of optimization and statistics. Clustering is applied to analyze soft data and to provide fast indexing in the World Wide Web. Non-trivial matrix algebra is at the heart of the last advances in computer vision.

The breakthrough impulse was, apparently, due to the rise of the interest in artifical neural networks, after its rediscovery in the late 1980s. Disguised as ANN, numerical and statistical methods made an appearance in the information processing scene, and others followed. A key component in many intelligent computational processing is the search for an optimal value of some function. Sometimes, this function is not evident and it must be made explicit in order to formulate the problem as an optimization problem. The search often takes place in high-dimensional spaces that can be either discrete, or continuous or mixed. The shape of the high-dimensional surface that corresponds to the optimized function is usually very complex. Evolutionary algorithms are increasingly being applied to information processing applications that require any kind of optimization. They provide a systematic and intuitive framework to state the optimization problems, and an already well-established body of theory that endorses their good mathematical properties. Evolutionary algorithms have reached the status of problem-solving tools in the backpack of the engineer. However, there are still exciting new developments taking place in the academic community. The driving idea in the organization of this compilation is the emphasis in the contrast between already accepted engineering practice and ongoing explorations in the academic community.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Modelling and Knowledge Bases XVIII: Volume 154 Frontiers in Artificial Intelligence and Applications : 9781586037109

In the last decades information modelling and knowledge bases have become hot topics not only in academic communities related to information systems and computer science but also in business areas where information technology is applied.

The 16th European-Japanese Conference on Information Modelling and Knowledge Bases EJC 2006 continues the series of events that originally started as a co-operation between Japan and Finland as far back as the late 1980’s. Later (1991) the geographical scope of these conferences expanded to cover all of Europe as well as countries outside Europe other than Japan.

The EJC conferences constitute a world-wide research forum for the exchange of scientific results and experiences achieved in computer science and other related disciplines using innovative methods and progressive approaches. In this way a platform has been established drawing together researches as well as practitioners dealing with information modelling and knowledge bases. Thus the main topics of the EJC conferences target the variety of themes in the domain of information modelling, conceptual analysis, design and specification of information systems, ontologies, software engineering, knowledge and process management, data and knowledge bases. We also aim at applying new progressive theories. To this end much attention is being paid also to theoretical disciplines including cognitive science, artificial intelligence, logic, linguistics and analytical philosophy.

In order to achieve the EJC targets, an international programme committee selected 13 full papers, 5 short papers, 2 position papers and 8 poster papers in the course of a rigorous reviewing process including 33 submissions. The selected papers cover many areas of information modelling, namely theory of concepts, database semantics, knowledge representation, software engineering, WWW information management, context-based information retrieval, ontological technology, image databases, temporal and spatial databases, document data management, process management, and many others.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Modelling and Knowledge Bases XVII: Volume 136 Frontiers in Artificial Intelligence and Applications : 9781586035914

Information modelling and knowledge bases are becoming very important topics not only in academic communities related to information systems and computer science but also in the business field of information technology.

Currently, the structural complexity of information resources, the variety of abstraction levels of information, and the size of databases and knowledge bases are continuously growing. We are facing the complex problems of structuring, sharing, managing, searching and mining data and knowledge from a large amount of complex information resources existing in databases and knowledge bases. New methodologies in many areas of information modelling and knowledge bases are expected to provide sophisticated and reliable solutions to these problems.

The aim of this series of Information Modelling and Knowledge Bases is to provide research communities in information modelling and knowledge bases with scientific results and experiences achieved by using innovative methodologies in computer science and other disciplines related to linguistics, philosophy, and psychology.

Those interdisciplinary research results include common interests in understanding and solving problems on information modelling and knowledge bases, as well as applying those research results to the practical application areas.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Modelling and Knowledge Bases XV (Frontiers in Artificial Intelligence and Applications) : 9781586033965

This book provides research communities in Europe and Japan with an overview of scientific results and experiences achieved using innovative methods and approaches in computer science and other disciplines, which have a common interest in understanding and solving problems on information modelling and knowledge bases, as well as applying the results of research to practice. The topics of research covered in this book mainly concentrate on a variety of themes in the domain of theory and practice of information modelling, conceptual modelling, design and specification of information systems, software engineering, databases and knowledge bases. We also aim to recognize and study new areas of modelling and knowledge bases to which more attention should be paid. Therefore philosophy and logic, cognitive science, knowledge management, linguistics and management science are relevant areas, too.

This book includes the papers presented at the 13th European-Japanese Conference on Information Modelling and Knowledge Bases. The conference held in June 2003 in Kitakyushu, Japan, continues the series of events that originally started as a co-operation initiative between Japan and Finland, as early as the second half of the 1980's. By 1991, the geographical scope of these conferences had expanded to cover the whole of Europe and other countries, too.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information, Interaction, and Agency : 9781402036002

Contemporary epistemological and cognitive studies, as well as recent trends in computer science and game theory have revealed an increasingly important and intimate relationship between Information, Interaction, and Agency. Agents perform actions based on the available information and in the presence of other interacting agents. From this perspective Information, Interaction, and Agency neatly ties together classical themes like rationality, decision-making and belief revision with games, strategies and learning in a multi-agent setting. Unified by the central notions Information, Interaction, and Agency, the essays in this volume provide refreshing methodological perspectives on belief revision, dynamic epistemic logic, von Neumann games, and evolutionary game theory; all of which in turn are central approaches to understanding our own rationality and that of other agents. Reprinted from Synthese, 139:2 and 142:2 (2004), Special Section Knowledge, Rationality, and Action.

This book collects the first two issues of KRA. Its index shows that these first two issues indeed address its ‘core business’: all the chaptes refer explicitly to knowledge, for instance, and rationality is represented by the many contributions that address games, or reasoning with or about strategies. Actions are present in many chapters in this book: whether they are epistemic programs, or choices by a coalition of agents, or moves in a game, or votes by the members of a jury. All in all, there is an emphasis on Information and a notion of Agency.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Extraction: Algorithms and Prospects in a Retrieval Context (The Information Retrieval Series) : 9781402049873

Information extraction regards the processes of structuring and combining content that is explicitly stated or implied in one or multiple unstructured information sources. It involves a semantic classification and linking of certain pieces of information and is considered as a light form of content understanding by the machine. Currently, there is a considerable interest in integrating the results of information extraction in retrieval systems, because of the growing demand for search engines that return precise answers to flexible information queries. Advanced retrieval models satisfy that need and they rely on tools that automatically build a probabilistic model of the content of a (multi-media) document.

The book focuses on content recognition in text. It elaborates on the past and current most successful algorithms and their application in a variety of domains (e.g., news filtering, mining of biomedical text, intelligence gathering, competitive intelligence, legal information searching, and processing of informal text). An important part discusses current statistical and machine learning algorithms for information detection and classification and integrates their results in probabilistic retrieval models. The book also reveals a number of ideas towards an advanced understanding and synthesis of textual content.


 


The book is aimed at researchers and software developers interested in information extraction and retrieval, but the many illustrations and real world examples make it also suitable as a handbook for students.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Development: Managing Your Documentation Projects, Portfolio, and People : 9780471777113

A revolutionary new resource that brings documentation product management ideas up to date

The 1994 bestselling classic Managing Your Documentation Projects set the industry standard for technical documentation. However, since then, much has changed in the world of information development. With this new title, JoAnn Hackos looks beyond the structured project of the 1980s and 1990s. Instead, she focuses on the rapidly changing projects of the 21st century and addresses how to introduce agile information development without neglecting the central focus of planning information design and development around the needs of information users.


As an information-development manager, you are expected to reduce costs and project time, do more work with fewer resources and less money, and increase the value of the information you deliver. Recognizing this, Hackos has carefully designed this book to help you do precisely that. She helps you make strategic decisions about information development and directs the discussion of project management toward smarter decision-making.


An update of the original 1994 Information Process Maturity Model (IPMM) presents you with a method by which you can compare the state of your organization to others, evaluate your current status, and then consider what is necessary in order to move to the next level.


Information Development offers a completely new look at best practices for all phases of the document development lifecycle, including:



  • Managing a corporate information portfolio

  • Evaluating process maturity

  • Partnering with customers and developing user scenarios

  • Developing team effectiveness and collaboration

  • Planning and monitoring information projects

  • Managing translation and production

  • Evaluating project performance

  • Managing for quality, efficiency, and cost-effectiveness


The companion Web site includes electronic versions of the templates and checklists featured in the book.


Wiley Technology Publishing Timely. Practical. Reliable.


Visit our Web site at www.wiley.com/compbooks/

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Dashboard Design : The Effective Visual Communication of Data : 9780596100162

Dashboards have become popular in recent years as uniquely powerful tools for communicating important information at a glance. Although dashboards are potentially powerful, this potential is rarely realized. The greatest display technology in the world won't solve this if you fail to use effective visual design. And if a dashboard fails to tell you precisely what you need to know in an instant, you'll never use it, even if it's filled with cute gauges, meters, and traffic lights. Don't let your investment in dashboard technology go to waste.


Stephen Few has over 20 years of experience as an IT innovator, consultant, and educator. As Principal of the consultancy Perceptual Edge, Stephen focuses on data visualization for analyzing and communicating quantitative business information. He provides consulting and training services, speaks frequently at conferences, and teaches in the

MBA program at the University of California in Berkeley. He is also the author of Show Me the Numbers: Designing Tables and Graphs to Enlighten.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Architecture with XML: A Management Strategy : 9780471486794

In the ‘good old days’ before food labelling, sell-by dates and competitive brand promotion,
you placed yourself at the mercy of your local village store manager. After the
painful wait for the previous customer to bid his farewells and finally let attention turn
your way, you placed your trust in the nice old guy who knew his store and his supplies.
You often ended up with more than you bargained for, with a tip thrown in on the best
and freshest deals of the day, a few extra ingredients to spice up that special recipe and a
summary of the latest village gossip.

The intelligence of the ‘system’ – the management of a wide range of foods and ingredients
– was human: a customer’s questions dealt with personally and a cumulative
knowledge of their needs and interests allowing a truly personal service to be offered.

The model doesn’t scale well, however. Customers today want wider choice and availability,
better prices and faster service, so the supermarket revolution was born. The
downside for customers was the need to ‘internalize’ that grocer’s wisdom and assess
their purchases for themselves: the shelf stackers could point you to the flours but would
be hard pushed to tell which one was best for waffles. Even if they did have an opinion
on the matter, they probably wouldn’t have been allowed to express it, for fear of being
seen to promote one brand over another.

Then is there is the question of quality and trust. In many countries, it has taken major
food quality and health scares to prompt public authorities to interpose themselves
between producer and consumer and insist on food labelling, quality control regulations
and inspection. In parallel, the growth of the fast food outlet offered ‘no-questionsasked,
no-answers-given’ solutions to the busy and/or unimaginative: fast and cheap,
benefiting from economies of scale and industrial-style production, as long as you
accept the pre-determined and pre-packaged realization of someone else’s flight of
fancy.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Assurance: Security in the Information Environment (Computer Communications and Networks) : 9781846282669

This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare, it re-examines why organisations need to take information assurance seriously, and discusses the business, legal, and technical knowledge needed to secure these vital government and business assets. Key topics include: The role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; International standards, policies and security acts. "A refreshingly clear & wide-ranging view of Information Assurance...this book not only explains what the problems are, it also gives you clear information on how to address the issues that have been raised." (Dr. Andy Jones, Research Group Leader, BT Group Chief Technology Office UK)

When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand.

Information assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35-year old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the recent past, the term information warfare was coined to describe the measures that need to be taken to defend and attack information. This term, however, has military connotations – after all, warfare is normally their domain. Shortly after the term came into regular use, it was applied to a variety of situations encapsulated by Winn Schwartau as the following three classes of information warfare:

Class 1: Personal information warfare
Class 2: Corporate information warfare
Class 3: Global information warfare

Political sensitivities lead to “warfare” being replaced by the “operations”, a much more “politically correct” word. Unfortunately, “operations” also has an offensive connotation and is still the terminology of the military and governments. A term was needed that described the measures needed to safeguard the most precious asset in this modern, connected world – information. The measures are much more than just security, encompassing the concepts of risk assessment, management and the protection of your information from compromise, theft, modification and lack of availability.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Architecture for the World Wide Web : 9780596527341

The post-Ajaxian Web 2.0 world of wikis, folksonomies, and mashups makes well-planned information architecture even more essential. How do you present large volumes of information to people who need to find what they're looking for quickly? This classic primer shows information architects, designers, and web site developers how to build large-scale and maintainable web sites that are appealing and easy to navigate.


The new edition is thoroughly updated to address emerging technologies -- with recent examples, new scenarios, and information on best practices -- while maintaining its focus on fundamentals. With topics that range from aesthetics to mechanics, Information Architecture for the World Wide Web explains how to create interfaces that users can understand right away. Inside, you'll find:



  • An overview of information architecture for both newcomers and experienced practitioners

  • The fundamental components of an architecture, illustrating the interconnected nature of these systems. Updated, with updates for tagging, folksonomies, social classification, and guided navigation

  • Tools, techniques, and methods that take you from research to strategy and design to implementation. This edition discusses blueprints, wireframes and the role of diagrams in the design phase

  • A series of short essays that provide practical tips and philosophical advice for those who work on information architecture

  • The business context of practicing and promoting information architecture, including recent lessons on how to handle enterprise architecture

  • Case studies on the evolution of two large and very different information architectures, illustrating best practices along the way


How do you document the rich interfaces of web applications? How do you design for multiple platforms and mobile devices? With emphasis on goals and approaches over tactics or technologies, this enormously popular book gives you knowledge about information architecture with a framework that allows you to learn new approaches -- and unlearn outmoded ones.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information and Management Systems for Product Customization : 9780387233475

In this book, the results from a multi-year research project on the
“Modeling, Planning, and Assessment of Business Transformation Processes
in the Area of Mass Customization” are published. Among other topics, we
analyze information and production systems for mass customization and we
also develop steering and controlling concepts for the variety induced
complexity problem. With the developed tools and frameworks, it is
intended to provide basic approaches for coping with the main problems in
mass customization, concerning the optimal product assortment to be offered
to customers and the product variants to be selected for a particular customer
during the interaction process.

“Information and Management Systems for Product Customization” can
be positioned at the intersection of Operations Management, Computer
Science and Industrial Engineering. It is targeted on a broad audience with
both technical and economical backgrounds, especially researchers and
students in the mentioned subject areas, but it is also directed towards
practitioners in mass customizing industries.

We would like to acknowledge the efforts of Kluwer Academic
Publishers, in particular Gary Folven. The research project was funded partly
by grants from the Austrian Central Bank, OeNB, No. 9706, and from the
Kaerntner Wirtschaftsfoerderungsfonds, KWF.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information and Communications Technology for Competitive Intelligence : 9781591401421

Competitive Intelligence can be described as producing and processing information about the environment of an organization for strategic purposes. To formulate a strategy, an organization needs to collect and process information about its environment—about, for instance, competitors, customers, suppliers, governments, technological trends or ecological developments. Collecting and processing environmental information has always been important. However, because of the increasing complexity and dynamics of the environment, the pressure to produce relevant, timely ‘actionable’ intelligence increases as well. To collect and process strategically relevant environmental information in a structured fashion, a large number of organizations are currently implementing a competitive intelligence function.

To structure the process of competitive intelligence, several authors propose a cycle of four stages. This “intelligence cycle” contains the following stages:

1. Direction. In this stage the organization determines its “strategic information requirements.” It determines about what aspects in the environment data should be collected.

2. Collection. In this stage, it is determined what sources can be used for data collection and the data are actually collected.

3. Analysis. In the analysis stage the data collected in the previous stage are analyzed to assess whether they are useful for strategic purposes. Here, the actual “production” of intelligence (data relevant for strategy) takes place.

4. Dissemination. The intelligence (produced in stage 3) is forwarded to the strategic decision-makers and used to formulate their strategic plans.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inferred Functions of Performance and Learning : 9780805845402

The objective of this book is to identify what the intelligent system that produces
responses must do to perform as it does. The analysis starts with the
performance variables that must be in place for the organism that does not
learn, and then overlays the functions required for learning. At one end of
the performance-learning spectrum is the simplest performance machine
and the simplest organism that is incapable of learning. At the other end is
the human with its amazing learning-performance capabilities. The analysis
applies to all organisms and machines within this spectrum. The overriding
rule for the analysis is that the task requirements are the same for any organism
or machine that performs the task. Therefore, any organism or machine
that does not meet all the requirements could not possibly perform
the task. Bipedal walking presents a set of basic requirements for any organism
that performs it or any machine that performs it in the same manner
the organisms do.

The book presents a series of meta-blueprints, which do not specify nuts
and bolts or circuits, but rather articulate the steps, content or specific information,
and logical operations required for the system to perform the
specified tasks. In other words, by designing specific machinery based on
the various meta-blueprints, it would be possible to design machines that
perform in

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Infectious Greed: Restoring Confidence in America's Companies : 9780131406445

In Infectious Greed, two leading financial experts offer a powerful new explanation of why the corporate scandals happened—and propose market-driven reforms that don't just "patch" the system but fix it for generations to come. Discover how the system came to provide massive incentives for malfeasance by CEOs, boards, auditors, analysts, and investment houses—and learn how those "bad" incentives can be replaced by even more powerful incentives for integrity.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Industrial Applications of Semantic Web: Proceedings of the 1st International IFIP/WG12.5 : 9780387285689

The Semantic Web, that adds a conceptual layer of machine-understandable metadata to the existing content, will make the content available for processing by intelligent software allowing automatic resource integration and providing interoperability between heterogeneous systems. The Semantic Web is now the most important influence on the development of the Web. The next generation of intelligent applications will be capable of making use of suchmetadata to perform resource discovery and integration based on its sematics. Sematic Web aims at developing a global environment on top of Web with interoperable heterogeneous applications, agents, web services, data repositories, humans, and so on. On the technology side, Web-oriented languages and technologies are being developed (e.g. RDF, OWL, OWL-S, WSMO, etc.), and the success of the Semantic Web will depend on a wide-spread industrial adoption of these technologies. Trend within worldwide activities related to Semantic Web definitely shows that the technology has emerging growth of interest both academic and industry during a relatively small time interval.

The growing interest to the Semantic Web, as a research and educational domain, from the academy is evident. New scientific results and interesting challenges in the area appear rapidly. International networks cover topics related to intersections of various former scientific domains with Semantic Web technology and discover new challenging opportunities. Basic standards have been announced and the amount of pilot tools and applications around these standards is exponentially increasing. The question is how much the researchers are taking into account the applicability of their results to the industry? The Conference concerns to collect cases from scientists about industrial implementatiuon of their Semantic Web related solutions or to hear arguments in favor of possibilities for such implementation.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inductive Logic Programming: 14th International Conference, ILP 2004, Porto, Portugal, September 6-8, 2004 : 9783540229414

Napoleon once shot at a magazine editor and missed him and killed a publisher. But we remember with charity, that his intentions were good.” Fortunately, we live in more forgiving times, and are openly able to express our pleasure at being the editors of this volume containing the papers selected for presentation at the 14th International Conference on Inductive Logic Programming.

ILP 2004 was held in Porto from the 6th to the 8th of September, under the auspices of the Department of Electrical Engineering and Computing of the Faculty of Engineering of the University of Porto (FEUP), and the Laboratório de Inteligência Artificial e Ciências da Computação (LIACC). This annual meeting of ILP practitioners and curious outsiders is intended to act as the premier forum for presenting the most recent and exciting work in the field. Six invited  talks—three from fields outside ILP, but nevertheless highly relevant to it— and20 full presentations formed the nucleus of the conference. It is the full-length papers of these 20 presentations that comprise the bulk of this volume. As is now common with the ILP conference, presentations made to a “Work-in-Progress” track will, hopefully, be available elsewhere.

We gratefully acknowledge the continued support of Kluwer Academic Publishers for the “Best Student Paper” award on behalf of the Machine Learning journal; and Springer-Verlag for continuing to publish the proceedings of these conferences. The Fundação para a Ciência e a Tecnologia, Fundação Luso- Americana para o Desenvolvimento, Fundação Oriente, Departamento de Engenharia Electrotécnica e de Computadores, and KDNet, the European Knowledge Discovery Network of Excellence have all been extremely generous, and we are thankful. Special mention too must be made of João Correia Lopes, who orchestrated the electronic components of the conference most beautifully.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inductive Dependency Parsing (Text, Speech and Language Technology) : 9781402048883

This book provides an in-depth description of the framework of inductive dependency parsing, a methodology for robust and efficient syntactic analysis of unrestricted natural language text. This methodology is based on two essential components: dependency-based syntactic representations and a data-driven approach to syntactic parsing. More precisely, it is based on a deterministic parsing algorithm in combination with inductive machine learning to predict the next parser action.

The book includes a theoretical analysis of all central models and algorithms, as well as a thorough empirical evaluation of memory-based dependency parsing, using data from Swedish and English. Offering the reader a one-stop reference to dependency-based parsing of natural language, it is intended for researchers and system developers in the language technology field, and is also suited for graduate or advanced undergraduate education.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

InDesign Type : Professional Typography with Adobe InDesign CS2 : 9780321385444

It's no mystery why InDesign has become the premier page layout program: It offers great tools-not least among them its sophisticated typographic controls. Here to show you how to take advantage of them is the first book devoted solely to that topic. Whether you're a graphics pros migrating from InDesign's long-entrenched competitor QuarkXPress or a hobbyists producing fancy invites and book-length projects, you'll appreciate this guide's finely tuned focus on everything typographic. Realizing that to take full advantage of InDesign's typographic tools, you must understand the principles guiding their use, author Nigel French addresses both the whys and the hows of good typography. Using practical examples, and loads of tips, Nigel provides a comprehensive overview of all of InDesign's type features, including the Paragraph Composer, optical kerning, and its support for OpenType fonts. Starting with character formats and then moving through paragraph formats, styles and effects, and layouts, you'll have gained all the skills they need to produce beautiful type by the end of the volume.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

InDesign for QuarkXPress Users : 9780321159489

While QuarkXPress is the most-widely used page-layout program in the world, Adobe InDesign is rapidly gaining ground with better typography and transparency features, speedier performance, and more overall control. Plus, InDesign 2 is Mac OS X native, QuarkXPress 5 isn't. But if you're a QuarkXPress user thinking of making the switch to InDesign, you know you can't afford to lose time and productivity at the office while learning a new program. Thanks to InDesign for QuarkXPress Users, you don't have to.

InDesign for QuarkXPress Users is the only book on the market that shows experienced graphic designers how to use InDesign from a QuarkXPress user's perspective. Using an easy-to-read and easy-to-digest style, this unique title focuses on common tasks, giving you quick solutions rather than bogging you down with lengthy theory. Written by well-known experts in the field, the book is abundantly illustrated and covers topics such as using InDesign's transparency features (possible in QuarkXPress only by unwieldy workarounds), and making the most of master pages and style sheets. It's also loaded with real-world tips on how you can apply your QuarkXPress know-how to this up-and-coming software.

About the Author
David Blatner is an internationally known expert on QuarkXPress and Photoshop and is the author or coauthor of numerous books including Real World Adobe InDesign 2, Real World QuarkXPress 5, and QuarkXPress 4/5 Power Shortcuts. His books have sold more than a half million copies worldwide. Christopher Smith is president of American Graphics Institute. A certified technical trainer and Adobe certified expert for InDesign version 1, 1.5, and 2.0, Smith teaches classes on InDesign and other publishing software at American Graphics Institute's Boston training center and has been involved in teaching electronic publishing and electronic document distribution for more than 10 years. Steve Werner has been a trainer, consultant, and production manager in the graphic arts industry for over 20 years. He has taught QuarkXPress, Adobe InDesign, and a variety of other graphic applications at Seybold Seminars, Rapid Graphics in San Francisco, and other venues since 1988.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

InDesign CS3 For Dummies (Computer/Tech) : 9780470118658

Packed with the latest InDesign tips and techniques

The secrets of InDesign page layout — explained in plain English!


New to InDesign? Making the switch from QuarkXPress®? No worries — this easy-to-follow guide shows you how to master this electronic publishing tool, customize the interface, work with objects and graphics, calibrate color, create PDF files, and more. From pages, panels, and pictures to text, tabs, and tables, you'll design and output like a pro every time!




  • Set up a new publication


  • Create and use master pages




  • Add frames, lines, and colors




  • Manage chapters and books




  • Output your files




  • Import and place pictures




About the Author

Galen Gruman is the principal at The Zango Group, an editorial and marketing consulting firm. Currently a regular contributor to Macworld, Layers Magazine, CIO, and InfoWorld, he has also been editor of Macworld and M-Business, executive editor of Upside, West Coast bureau chief of Computerworld, and vice president of content for ThirdAge.com. He is coauthor of 20 other books on desktop publishing. Gruman led one of the first successful conversions of a national magazine to desktop publishing in 1986 and has covered publishing technology since then for several publications, including the trade weekly InfoWorld, for which he began writing in 1986, Macworld, whose staff he joined in 1991, and, most recently, Layers Magazine.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

InDesign CS2 for Macintosh and Windows : Visual QuickStart Guide : 9780321322012

You already know why it makes sense for you to learn Adobe InDesign: because major magazines, newspapers, book publishers, ad agencies, graphic-design firms, and corporate creative groups worldwide use it to increase productivity and refine creative results. And you need to get up to speed on the very newest version--Adobe InDesign CS2--today! Enter Adobe InDesign CS2 for Macintosh and Windows: Visual QuickStart Guide. Using the task-based, visual approach that has become the hallmark of Peachpit's popular Visual QuickStart Guides, this volume provides a fast, easy, comprehensive introduction to everything InDesign. You'll learn about all aspects of the InDesign interface, including its tools and palettes, as well as how to create documents and master pages, import and style text and objects, automate your work, manage long documents, use the Bezier pen tools,create interactive PDF elements, and work with color.  You'll also learn how to use the new Adobe Bridge file browser to locate, manage, and drag and drop assets easily into your InDesign layouts. You'll find a new chapter on working with InCopy, complete coverage of more advanced topics (like preflighting and advanced text control) and a thorough introduction to all of InDesign's productivity-enhancing features and tools.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

InDesign CS2 at Your Fingertips : 9780782144208

If you're making the switch from QuarkXPress or PageMaker to Adobe InDesign or just starting out with page layout and design, InDesign CS2 at Your Fingertips is your ultimate reference. Its award-winning format gives you easy and instant access to all the tasks you'll want to perform. Author Ted LoCascio is a highly qualified instructor--he's the former senior designer for the National Association of Photoshop Professionals and an InDesign expert. With clear, accessible information and a full color section, this is the best value on the market.

About the Author
Ted LoCascio is a professional graphic designer and an expert in InDesign, Photoshop, Illustrator, and QuarkXPress. He was senior designer at the National Associate of Photoshop Professionals (NAPP) for several years, and has done layout and design work on a number of successful software training books. He has contributed articles to Photoshop User magazine and taught at PhotoshopWorld.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Incident Response: Computer Forensics Toolkit : 9780764526367

Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer arms you with the tools to reveal a security breach, gather evidence to report the crime, and conduct audits to prevent future attacks. He also provides you with a firm understanding of the methodologies for incident response and computer forensics, Federal Computer Crime law information and evidence requirements, legal issues, and how to work with law enforcement.


You’ll learn how to:



  • Recognize the telltale signs of an incident and take specific response measures

  • Search for evidence by preparing operating systems, identifying network devices, and collecting data from memory

  • Analyze and detect when malicious code enters the system and quickly locate hidden files

  • Perform keyword searches, review browser history, and examine Web caches to retrieve and analyze clues

  • Create a forensics toolkit to prop-erly collect and preserve evidence

  • Contain an incident by severing network and Internet connections, and then eradicate any vulnerabilities you uncover

  • Anticipate future attacks and monitor your system accordingly

  • Prevent espionage, insider attacks, and inappropriate use of the network

  • Develop policies and procedures to carefully audit the system


CD-ROM includes:



  • Helpful tools to capture and protect forensic data; search volumes, drives, and servers for evidence; and rebuild systems quickly after evidence has been obtained

  • Valuable checklists developed by the author for all aspects of incident response and handling


About the Author
DOUGLAS SCHWEITZER is an Internet security specialist and authority on malicious code and computer forensics. He is a Cisco Certified Network Associate and Certified Internet Webmaster Associate, and holds A+, Network+, and i-Net+ certifications. Schweitzer is also the author of Internet Security Made Easy and Securing the Network from Malicious Code.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Incident Response and Computer Forensics, Second Edition : 9780072226966

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios


"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine


"This book is an absolute must-read for anyone who plays a role in responding to computer security events." --Marc J. Zwillinger, former trial attorney with the U.S. Dept. of Justice, Computer Crime & Intellectual Property


"An excellent resource for information on how to respond to computer intrusions and conduct forensic investigations." --Network Magazine


"If your job requires you to review the contents of a computer system for evidence of unauthorized or unlawful activities, this is the book for you. The authors, through real-world experiences, demonstrate both technically and procedurally the right way to perform computer forensics and respond to security incidents." --Howard A. Schmidt, Former Special Advisor for Cyber Security, White House, and former Chief Security Officer, Microsoft Corp.


New and Updated Material:



  • New real-world scenarios throughout

  • The latest methods for collecting live data and investigating Windows and UNIX systems

  • Updated information on forensic duplication

  • New chapter on emergency network security monitoring

  • New chapter on corporate evidence handling procedures

  • New chapter on data preparation with details on hard drive interfaces and data storage principles

  • New chapter on data extraction and analysis

  • The latest techniques for analyzing network traffic

  • Up-to-date methods for investigating and assessing hacker tools


Foreword by former FBI Special Agent Scott Larson


About the Author
Kevin Mandia (Alexandria, VA) Director of Computer Forensics at Foundstone is a well-recognized forensics and incident response expert. Kevin leads Foundstone's premiere incident response and forensics services, delivering consulting and training services to Foundstone's clients. Prior to joining Foundstone, Kevin as a Special Agent with AFOSI specializing in computer intrusion cases. Upon leaving the AFOSI, Kevin developed a computer intrusion response course specifically designed at the request of the FBI. Kevin trained over 400 FBI agents as well as personnel from the State Department, the CIA, NASA, the U.S. Postal Service, the Air Force, and other Government Agencies. Kevin is a regular speaker at numerous forums, including the Interpol Computer Crime Conference and various conferences hosted by government agencies and law enforcement organizations. He is on the Editorial Board for the International Journal on Cyber Crime. Chris Prosise (Cupertino, CA) VP of Consulting at Foundstone, is a recognized network security expert with extensive experience in attack and penetration testing and incident response. Chris has led government and commercial security teams of missions worldwide, from sensitive incident response missions on Top Secret government networks to comprehensive security assessments on some of the worlds largest corporations. Chris is a featured speaker at multiple security conferences such as Forum of Incident Response and Security Teams (FIRST). He has written articles for SysAdmin and is the technical editor of Hacking Exposed.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Incident Response: A Strategic Guide to Handling System and Network Security Breaches : 9781578702565

The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can reduce the magnitude of incidents. This book gives you the information you need to develop an effective incident response strategy.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

In Search of Stupidity: Over 20 Years of High-Tech Marketing Disasters : 9781590591048

In 1982 Tom Peters and Robert Waterman kicked off the modern business book era with In Search of Excellence: Lessons from America’s Best-Run Companies. The book was a runway best-seller, and soon authors from all corners of business life were exhorting companies and the people who worked in those companies to get out there and be excellent, control chaos, worship wow, and grasp greatness. Unfortunately, as time went by it became painfully obvious that many of the companies Peters and Waterman had profiled, particularly the high-tech ones, were something less than excellent. Firms such as Atari, Data General, DEC, IBM, Lanier, NCR, Wang, Xerox, and others either crashed and burned or underwent painful and wrenching traumas you would have expected excellent companies to avoid. What went wrong?


Merrill R. (Rick) Chapman thinks he has an answer. He believes that high-tech companies periodically melt down because they fail to learn from the lessons of the past and thus make the same completely avoidable mistakes again and again and again. In Search of Stupidity: Over 20 Years of High-Tech Marketing Disasters chronicles high-tech stupidity from the past to the present so that we can all move on to create new and unique catastrophes of our very own in the future.


Incisive, witty, packed with details and information, yet very funny, In Search of Stupidity: 20 Years of High-Tech Marketing Disasters is an indispensable book for anyone who wishes to understand what companies do to fail, who wants to know what they can do to avoid making yesterday’s mistakes yet again, and who desperately desires to never see their company profiled in a sequel

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google