Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla William J Buchanan

Mastering Global Information Systems

Mastering Global Information Systems

William J Buchanan

Red Globe Press
1997
nidottu
This book provides an excellent foundation in modern information systems and data communications. It has five basic themes:* Digital Information Sources and Multimedia* The Internet, the World Wide Web and Java* Local area Networking* Wide area Networking* Video ConferencingThe information sources material covers the main standards in digital information on modern computer systems. It includes the conversion of sound and images into a digital format.The networking material introduces the main local area network technologies:* Ethernet* Token Ring* FDDIModern Wide Area Network technologies like ATM are considered, also the usage of ISDN and Modems for interconnection.
Mastering the Internet

Mastering the Internet

William J Buchanan

Red Globe Press
1997
nidottu
The Internet and the World Wide Web (WWW) is growing each day. More and more people require either to access information, send and receive electronic information or just to log into remote computers. This book provides an up-to-date account of all the component parts of the Internet and the WWW, from architecture through to networking. It discusses key specifications relating to electronic mail, such as MiMe encoding and SMTP, and shows how they are used to send mail around the world.Full backup for the book is provided with electronic mail and the author has set up a WWW page which contains links to other useful sources of information.
Mastering Pascal and Delphi Programming

Mastering Pascal and Delphi Programming

William J Buchanan

Red Globe Press
1998
nidottu
The book provides an introduction to programming with Pascal and extends this to show how Borland Delphi is used to development Microsoft Windows programs. It is packed full of real-life application and splits into three main sections:* Pascal programming* Pascal applications* Delphi programmingPractical applications include: software interrupts, hardware interrupts, graphics, date and time, system commands, RS-232 and parallel ports.
Mastering Java

Mastering Java

William J Buchanan

Red Globe Press
1998
nidottu
This book provides an introduction to the Java programming language and also covers other related areas such as HTML, JavaScript, CGIscript and VRML. Most of the Java programs relate to practical examples, including:* Menus and forms* Graphics* Event-driven software, such as mouse and keyboard events* Networking* Interacting with other programs* AnimationIt also covers fundamental areas such as TCP/IP and the HTTP protocol.The Java compiler, source code, background information and source code is available from the author over the Internet.
Mastering Microsoft Windows, Novell NetWare and UNIX
Many computer networks are now a hybrid of different types, typically a mixture of two or more different operating systems. These systems must successfully integrate for the complete system to operate properly, whether it is in terms of its compatibility, its security or its ease-of-use. The main aim of this book is to cover the configuration, architecture and networking of the three of the most popular networking operating systems - Microsoft Windows, Novell NetWare and UNIX.
Mastering Computing

Mastering Computing

William J Buchanan

Red Globe Press
2002
nidottu
Computing is an area which continues to grow each year. This book covers themain areas of computing, including programming, computer hardware, operating systems, the Internet, data communications and networking. It uses practical examples to show basic concepts, is packed full of diagrams showing important principles, and contains multiple-choice questions to test knowledge and understanding. The book uses a readable style, and is aimed at students studying for Advanced GNVQ, A-level, HND and BSc courses.
Introduction to Security and Network Forensics

Introduction to Security and Network Forensics

William J. Buchanan

Auerbach Publishers Inc.
2011
sidottu
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea. Providing such a foundation, Introduction to Security and Network Forensics covers the basic principles of intrusion detection systems, encryption, and authentication, as well as the key academic principles related to digital forensics.Starting with an overview of general security concepts, it addresses hashing, digital certificates, enhanced software security, and network security. The text introduces the concepts of risk, threat analysis, and network forensics, and includes online access to an abundance of ancillary materials, including labs, Cisco challenges, test questions, and web-based videos. The author provides readers with access to a complete set of simulators for routers, switches, wireless access points (Cisco Aironet 1200), PIX/ASA firewalls (Version 6.x, 7.x and 8.x), Wireless LAN Controllers (WLC), Wireless ADUs, ASDMs, SDMs, Juniper, and much more, including:More than 3,700 unique Cisco challenges and 48,000 Cisco Configuration Challenge Elements60,000 test questions, including for Certified Ethical Hacking and CISSP® 350 router labs, 180 switch labs, 160 PIX/ASA labs, and 80 Wireless labsRounding out coverage with a look into more advanced topics, including data hiding, obfuscation, web infrastructures, and cloud and grid computing, this book provides the fundamental understanding in computer security and digital forensics required to develop and implement effective safeguards against ever-evolving cyber security threats. Along with this, the text includes a range of online lectures and related material, available at: http://asecuritybook.com.
GDPR and Cyber Security for Business Information Systems

GDPR and Cyber Security for Business Information Systems

Antoni Gobeo; Connor Fowler; William J. Buchanan

River Publishers
2024
nidottu
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the privacy and security of all our personal data. This requirement for protection extends globally, to all organisations, public and private, wherever personal data is held, processed, or transmitted concerning any EU citizen. Cyber Security is at the core of data protection and there is a heavy emphasis on the application of encryption and state of the art technology within the articles of the GDPR. This is considered to be a primary method in achieving compliance with the law. Understanding the overall use and scope of Cyber Security principles and tools allows for greater efficiency and more cost effective management of Information systems.GDPR and Cyber Security for Business Information Systems is designed to present specific and practical information on the key areas of compliance to the GDPR relevant to Business Information Systems in a global context.
GDPR and Cyber Security for Business Information Systems

GDPR and Cyber Security for Business Information Systems

Antoni Gobeo; Connor Fowler; William J. Buchanan

River Publishers
2018
sidottu
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals included under its terms; ultimately the privacy and security of all our personal data. This requirement for protection extends globally, to all organisations, public and private, wherever personal data is held, processed, or transmitted concerning any EU citizen. Cyber Security is at the core of data protection and there is a heavy emphasis on the application of encryption and state of the art technology within the articles of the GDPR. This is considered to be a primary method in achieving compliance with the law. Understanding the overall use and scope of Cyber Security principles and tools allows for greater efficiency and more cost effective management of Information systems.GDPR and Cyber Security for Business Information Systems is designed to present specific and practical information on the key areas of compliance to the GDPR relevant to Business Information Systems in a global context.
William J. Forsyth

William J. Forsyth

Rachel Berenson Perry

Indiana University Press
2014
sidottu
Closely associated with artists such as T. C. Steele and J. Ottis Adams, William J. Forsyth studied at the Royal Academy in Munich then returned home to paint what he knew best—the Indiana landscape. It proved a rewarding subject. His paintings were exhibited nationally and received major awards. With full-color reproductions of Forsyth's most important paintings and previously unpublished photographs of the artist and his work, this book showcases Forsyth's fearless experiments with artistic styles and subjects. Drawing on his personal letters and other sources, Rachel Berenson Perry discusses Forsyth and his art and offers fascinating insights into his personality, his relationships with his students, and his lifelong devotion to teaching and educating the public about the importance of art.
William J. Fellner

William J. Fellner

James Marshall

Greenwood Press
1992
sidottu
The volume is made up of three main chapters. The first provides a biography of Fellner. The second is an annotated bibliography of Fellner's published works and includes sections on books he wrote, his articles and essays, books he edited, and his public remarks. The third chapter is an annotated bibliography of works about Fellner and his ideas. This volume also includes name and subject indexes.In a volume that will be both useful to the professional economist and accessible to the nonspecialist, this bio-bibliography provides a guide to the work of William J. Fellner, a respected economist, policy adviser, and highly regarded member of the public policy research establishment. His work contains the full sweep of contemporary economic thought. The volume includes a biography, an annotated bibliography of Fellner's published works, and an annotated bibliography of works about Fellner and his ideas. It also includes name and subject indexes.
William J. Seymour and the Origins of Global Pentecostalism
In 1906, William J. Seymour (1870–1922) preached Pentecostal revival at the Azusa Street mission in Los Angeles. From these and other humble origins the movement has blossomed to 631 million people around the world. Gastón Espinosa provides new insight into the life and ministry of Seymour, the Azusa Street revival, and Seymour's influence on global Pentecostal origins. After defining key terms and concepts, he surveys the changing interpretations of Seymour over the past 100 years, critically engages them in a biography, and then provides an unparalleled collection of primary sources, all in a single volume. He pays particular attention to race relations, Seymour's paradigmatic global influence from 1906 to 1912, and the break between Seymour and Charles Parham, another founder of Pentecostalism. Espinosa's fragmentation thesis argues that the Pentecostal propensity to invoke direct unmediated experiences with the Holy Spirit empowers ordinary people to break the bottle of denominationalism and to rapidly indigenize and spread their message.The 104 primary sources include all of Seymour's extant writings in full and without alteration and some of Parham's theological, social, and racial writings, which help explain why the two parted company. To capture the revival's diversity and global influence, this book includes Black, Latino, Swedish, and Irish testimonies, along with those of missionaries and leaders who spread Seymour's vision of Pentecostalism globally.
William J. Seymour and the Origins of Global Pentecostalism
In 1906, William J. Seymour (1870–1922) preached Pentecostal revival at the Azusa Street mission in Los Angeles. From these and other humble origins the movement has blossomed to 631 million people around the world. Gastón Espinosa provides new insight into the life and ministry of Seymour, the Azusa Street revival, and Seymour's influence on global Pentecostal origins. After defining key terms and concepts, he surveys the changing interpretations of Seymour over the past 100 years, critically engages them in a biography, and then provides an unparalleled collection of primary sources, all in a single volume. He pays particular attention to race relations, Seymour's paradigmatic global influence from 1906 to 1912, and the break between Seymour and Charles Parham, another founder of Pentecostalism. Espinosa's fragmentation thesis argues that the Pentecostal propensity to invoke direct unmediated experiences with the Holy Spirit empowers ordinary people to break the bottle of denominationalism and to rapidly indigenize and spread their message.The 104 primary sources include all of Seymour's extant writings in full and without alteration and some of Parham's theological, social, and racial writings, which help explain why the two parted company. To capture the revival's diversity and global influence, this book includes Black, Latino, Swedish, and Irish testimonies, along with those of missionaries and leaders who spread Seymour's vision of Pentecostalism globally.
William J. Gedney's Comparative Tai Source Book

William J. Gedney's Comparative Tai Source Book

Thomas John Hudak

University of Hawai'i Press
2007
nidottu
This volume provides accurate and reliable data from 1,159 common cognates found in 19 dialects from the Tai language family. Originally collected by noted Tai linguist the late William J. Gedney, the data are organized into the three branches of the Tai language family, the Southwestern, the Central, and the Northern, to facilitate comparisons among the various sound systems within the individual branches and within the Tai language family as a whole. Supplementing the cognates are phonological descriptions of each of the dialects.Included among the nineteen dialects are Siamese, White Tai, Black Tai, Shan, Lue, Yay, Saek, and dialects found at Leiping, Lungming, Pingsiang, and Ningming in China. The meticulous attention paid to consonants, vowels, and tones found in each cognate will allow for further dialect studies, for the investigation of questions concerning the tripartite division of the Tai language family, and for the continuing investigation into the reconstruction of the Proto-Tai language family and its wider genetic relationships.