The Disc Shop
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of applications. The core areas of e-based security - authentication of users; system integrity; confidentiality of communication; availability of business service; and non-repudiation of transactions - are covered in detail. Throughout the book the major trends, challenges and applications of e-security are presented, with emphasis on public key infrastructure (PKI) systems, biometric-based security systems, trust management systems, and the e-service paradigm. Intrusion detection technologies, virtual private networks (VPNs), malware, and risk management are also discussed. Technically oriented with many practical examples, this book is suitable for practitioners in network security, as well as graduate students and researchers in telecommunications and computer science.
Computer programs that simulate complex processes in the real world can provide a quantitative tool for determining how much debt can be added safely to a company's capital structure. The increasing number of bankruptcies and defaults in today's international business arena result from debt overload and point to major shortcomings in the conventional financial evaluation process. In this book, Roy L. Nersesian describes why current methods of risk management fail and how computer simulation can be employed to determine the safe level of debt more accurately. Because the decision to add debt to an organization requires favorable, and essentially independent, decisions from both the borrower and lender, it is necessary to quantify both perspectives. Through actual examples readers will learn how to do this and to translate an actual business situation into a simulation model or program. Current evaluation systems, according to Nersesian, fail to incorporate the cyclical nature of business activity. They result all too often in an overly optimistic projection of cash flow. Simulation techniques are better able to incorporate the transience of good times and put quantitative analysis of risk on par with quantitative analysis of reward. Simulation techniques also reduce the role of speculative, and highly subjective, judgment. For example, decisionmakers who are not familiar personally with a particular business area, assign more risk to that area than those who are. A quantified risk management system enables executives to rank projects by the degree of risk much as they currently rank them by degree of profitability. The book presents the concept of simulation in terms that can be understood by generalists in corporations and financial institutions. At the same time, it provides computer programmers with an understanding of risk management principles. It will provide a valuable resource for: financial executives, planners and strategists in corporate and governmental organizations; bank lending officers; and computer programmers working with these organizations.
Communication networks and computer systems research is entering a new phase in which many of the established models and techniques of the last twenty years are being challenged. The research community is continuing to free itself from past intellectual constraints so that it may fully exploit the convergence of computing and communications. Evaluating the performance of emerging communications and computer systems constitutes a huge challenge. Thus, current research provides a set of heterogeneous tools and techniques embracing the uncertainties of time and space varying environments when the requests for diverse services are made in real time, and with very different quality of service expectations.These novel techniques will lead to fast and economic service deployment and effective dynamic resource management, and hence to new business strategies and infrastructures that will facilitate the emergence of future services and applications.This volume contains contributions and presentations made by leading international researchers at a workshop which was held in April 2004 to honour Professor Erol Gelenbe on the occasion of his inaugural lecture as the Dennis Gabor Chair at Imperial College London.
A Business Partner is a professional who supports and advises strategic and operational decision-making through insights that drive better business performance. Often as a result of external changes, business partners must respond quickly to map out the future strategic development, keep the firm competitive and ensure all objectives and legal requirements are met.
In this book, business partnering expert Steven Swientozielskyj introduces a framework that provides a set of practical tools and techniques via a simple six stage model that, when replicated, will take the practitioner from start to finish through strategic change; from the formation and agreement of the strategy to its delivery and sustainability.
Business Partnering is a one-stop shop for understanding this important phenomenon and as such will be vital reading for practitioners and academics in the business arena.
The primary objective of the book is to provide advanced undergraduate or frrst-year graduate engineering students with a self-contained presentation of the principles fundamental to the analysis, design and implementation of computer controlled systems. The material is also suitable for self-study by practicing engineers and is intended to follow a first course in either linear systems analysis or control systerns. A secondary objective of the book is to provide engineering and/or computer science audiences with the material for a junior/senior-level course in modern systems analysis. Chapters 2, 3, 4, and 5 have been designed with this purposein rnind. The emphasis in such a course is to develop the rnathernatical tools and methods suitable for the analysis and design of real-time systems such as digital filters. Thus, engineers and/or computer scientists who know how to program computers can understand the mathematics relevant to the issue of what it is they are programrning. This is especially important for those who may work in engineering and scientific environments where, for instance, programrning difference equations for real-time applications is becorning increasingly common. A background in linear algebra should be an adequate prerequisite for the systems analysis course. Chapter 1 of the book presents a brief introduction to computer controlled systems. It describes the general issues and terminology relevant to the analysis, design, and implementation of such systems.
The Disc Shop Articles
The Disc Shop Books
The Disc Shop