ALERT: Before you purchase, check with your instructor or review your course syllabus to ensure that you select the correct ISBN. Several versions of Pearson's MyLab & Mastering products exist for each title, including customized versions for individual schools, and registrations are not transferable. In addition, you may need a CourseID, provided by your instructor, to register for and use Pearson's MyLab & Mastering products.
Student can use the URL and phone number below to help answer their questions:
Access codes for Pearson's MyLab & Mastering products may not be included when purchasing or renting from companies other than Pearson; check with the seller before completing your purchase.
Used or rental books
If you rent or purchase a used book with an access code, the access code may have been redeemed previously and you may have to purchase a new access code.
Access codes that are purchased from sellers other than Pearson carry a higher risk of being either the wrong ISBN or a previously redeemed code. Check with the seller prior to purchase.
0134522206 / 9780134522203 Computer Networking: A Top Down Approach Plus Modified MasteringEngineering with Pearson eText -- Access Card Package 7/e
Package consists of:
0133594149 / 9780133594140 Computer Networking: A Top-Down Approach
0134311167 / 9780134311166 Modified MasteringEngineering with Pearson eText -- Standalone Access Card -- for Computer Networking: A Top-Down Approach
A comprehensive guide to computer assisted exercises <p> Readers can turn to this indispensable reference guide for comprehensive and lucid coverage of the operational, technical, and organizational knowledge needed to harness successful and constructive computer assisted exercises (CAX) and war games. It is geared also toward large civilian organizations that are looking to teach and test their strategies and procedures without the added cost of manpower. Divided into two clear parts, the book covers: <ul> <li> <p> Fundamentals and Theory—conflict and warfare; probability and statistics; simulation; distributed simulation; and experimentation and analysis <li> <p> Combat Modeling, Computer Assisted Exercises, and Practice—CAX architectures; CAX process; combat modeling; CAX support tools; communications/information system issues, technical risks, and risk miti-gation; and exercise centers and facilities </ul> <p> Computer Assisted Exercises and Training: A Reference Guide is indispensable reading for research engineers, computer scientists, software engineers working with modeling and simulation, homeland security specialists, staff in simulation training centers, military strategists and commanders, and many others. It also serves as a valuable textbook for modeling and simulation courses at the upper-undergraduate and graduate levels. <p>
From bright colours and big hair to synthesized songs and day glow wardrobes. The 1980s were certainly loud, often garish and utterly fabulous - no matter how embarrassing the outfits were. There are so many elements, which made the 80s a truly great decade, but one of the greatest contributions, if not the greatest, is the mass introduction of affordable 8-bit home micro computers. These curious machines of geekdom changed the way we regarded computers and technology. No longer were they the sole perverse of tweed jacket clad scientists sporting unruly beards, micro computers were now forming a staple inventory in millions of homes. Much of the technology that we enjoy today, such as desktop computers, notebooks, tablets, gaming consoles and smart phones, all of which are often taken for granted, can be traced back to this innovative decade. If you were a child of the 80s and remember the joy of receiving your very first home computer or maybe a young adult who fondly remembers the excitement, then you will appreciate this unabashed reminiscence of a simpler time whose adolescent technological was on the cusp of great advancements. This book is intended as celebration and reflection of all the computer technology that made the 80s such a wonderful, pioneering period and follows the journey of a self confessed, teenaged computer geek who experienced and enjoyed every ground breaking moment, including publishing his own software. 10 Print "The 80s are fab!" 20 Goto 10 Run Author's Comments: The current edition is dated 31st January 2016 and has been edited based on customer feedback.
Look at the home words and bright pictures to help develop essential first vocabulary and early reading skills.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.
The Disc Shop Articles
The Disc Shop Books
The Disc Shop