Skip to main content

Morgan Kaufmann

  • Business Modeling

    A Practical Guide to Realizing Business Value
    • 1st Edition
    • David M. Bridgeland + 1 more
    • English
    As business modeling becomes mainstream, every year more and more companies and government agencies are creating models of their businesses. But creating good business models is not a simple endeavor. Business modeling requires new skills. Written by two business modeling experts, this book shows you how to make your business modeling efforts successful. It provides in-depth coverage of each of the four distinct business modeling disciplines, helping you master them all and understand how to effectively combine them. It also details best practices for working with subject matter experts. And it shows how to develop models, and then analyze, simulate, and deploy them. This is essential, authoritative information that will put you miles ahead of everyone who continues to approach business modeling haphazardly.
  • Disappearing Cryptography

    Information Hiding: Steganography and Watermarking
    • 3rd Edition
    • Peter Wayner
    • English
    Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
  • Computer Organization and Design CD-ROM

    The Hardware/Software Interface
    • 4th Edition
    • David A. Patterson + 1 more
    • English
  • The Illustrated Network

    How TCP/IP Works in a Modern Network
    • 1st Edition
    • Walter Goralski
    • English
    In 1994, W. Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many. This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two:Stevens Gora... Older operating systems (AIX,svr4,etc.) Newe... OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series)Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!)No IPSec IPSecNo multicast Multica... router security discussed Firewall routers detailedNo Web Full Web browser HTML considerationNo IPv6 IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols
  • Computer Organization and Design

    The Hardware/Software Interface
    • 4th Edition
    • David A. Patterson + 1 more
    • English
    Computer Organization and Design, Fourth Edition, provides a new focus on the revolutionary change taking place in industry today: the switch from uniprocessor to multicore microprocessors. This new emphasis on parallelism is supported by updates reflecting the newest technologies with examples highlighting the latest processor designs, benchmarking standards, languages and tools. As with previous editions, a MIPS processor is the core used to present the fundamentals of hardware technologies, assembly language, computer arithmetic, pipelining, memory hierarchies and I/O. Along with its increased coverage of parallelism, this new edition offers new content on Flash memory and virtual machines as well as a new and important appendix written by industry experts covering the emergence and importance of the modern GPU (graphics processing unit), the highly parallel, highly multithreaded multiprocessor optimized for visual computing. This book contains a new exercise paradigm that allows instructors to reconfigure the 600 exercises included in the book to generate new exercises and solutions of their own. The companion CD provides a toolkit of simulators and compilers along with tutorials for using them as well as advanced content for further study and a search utility for finding content on the CD and in the printed text. This text is designed for professional digital system designers, programmers, application developers, and system software developers as well as undergraduate students in Computer Science, Computer Engineering and Electrical Engineering courses in Computer Organization, Computer Design.
  • Database Archiving

    How to Keep Lots of Data for a Very Long Time
    • 1st Edition
    • Jack E. Olson
    • English
    With the amount of data a business accumulates now doubling every 12 to 18 months, IT professionals need to know how to develop a system for archiving important database data, in a way that both satisfies regulatory requirements and is durable and secure. This important and timely new book explains how to solve these challenges without compromising the operation of current systems. It shows how to do all this as part of a standardized archival process that requires modest contributions from team members throughout an organization, rather than the superhuman effort of a dedicated team.
  • Forms that Work

    Designing Web Forms for Usability
    • 1st Edition
    • Caroline Jarrett + 2 more
    • English
    Forms that Work: Designing Web Forms for Usability clearly explains exactly how to design great forms for the web. The book provides proven and practical advice that will help you avoid pitfalls, and produce forms that are aesthetically pleasing, efficient and cost-effective. It features invaluable design methods, tips, and tricks to help ensure accurate data and satisfied customers. It includes dozens of examples - from nitty-gritty details (label alignment, mandatory fields) to visual designs (creating good grids, use of color). This book isn’t just about colons and choosing the right widgets. It’s about the whole process of making good forms, which has a lot more to do with making sure you’re asking the right questions in a way that your users can answer than it does with whether you use a drop-down list or radio buttons. In an easy-to-read format with lots of examples, the authors present their three-layer model - relationship, conversation, appearance. You need all three for a successful form - a form that looks good, flows well, asks the right questions in the right way, and, most important of all, gets people to fill it out. Liberally illustrated with full-color examples, this book guides readers on how to define requirements, how to write questions that users will understand and want to answer, and how to deal with instructions, progress indicators and errors. This book is essential reading for HCI professionals, web designers, software developers, user interface designers, HCI academics and students, market research professionals, and financial professionals.
  • Data Mining: Know It All

    • 1st Edition
    • Soumen Chakrabarti + 14 more
    • English
    This book brings all of the elements of data mining together in a single volume, saving the reader the time and expense of making multiple purchases. It consolidates both introductory and advanced topics, thereby covering the gamut of data mining and machine learning tactics ? from data integration and pre-processing, to fundamental algorithms, to optimization techniques and web mining methodology. The proposed book expertly combines the finest data mining material from the Morgan Kaufmann portfolio. Individual chapters are derived from a select group of MK books authored by the best and brightest in the field. These chapters are combined into one comprehensive volume in a way that allows it to be used as a reference work for those interested in new and developing aspects of data mining. This book represents a quick and efficient way to unite valuable content from leading data mining experts, thereby creating a definitive, one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.
  • Network Quality of Service Know It All

    • 1st Edition
    • Adrian Farrel
    • English
    The term Quality of Service, abbreviated QoS, refers to network resource control mechanisms. Quality of Service is the ability to provide different priority to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. This book brings all of the elements of network quality of service (QoS) together in a single volume, saving the reader the time and expense of making multiple purchases. It introduces network QoS, explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field. It is a quick and efficient way to bring valuable content together from leading experts in the field while creating a one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.
  • Database Design: Know It All

    • 1st Edition
    • Toby J. Teorey + 16 more
    • English
    This book brings all of the elements of database design together in a single volume, saving the reader the time and expense of making multiple purchases. It consolidates both introductory and advanced topics, thereby covering the gamut of database design methodology ? from ER and UML techniques, to conceptual data modeling and table transformation, to storing XML and querying moving objects databases. The proposed book expertly combines the finest database design material from the Morgan Kaufmann portfolio. Individual chapters are derived from a select group of MK books authored by the best and brightest in the field. These chapters are combined into one comprehensive volume in a way that allows it to be used as a reference work for those interested in new and developing aspects of database design. This book represents a quick and efficient way to unite valuable content from leading database design experts, thereby creating a definitive, one-stop-shopping opportunity for customers to receive the information they would otherwise need to round up from separate sources.