Computer Science and Information Technology

Page 1

• • • • •

All netBASE ebook Content on One Platform Pay-per-view Chapters Individual eBook Purchases Annual and Perpetual Subscription Options Available Improved Search and Functionality

Free Trials Available for Libraries

Contact us today to begin your Free Trial e-reference@taylorandfrancis.com or 1.888.318.2367

Catalog no. CATITB

US VERSION


The following subject catalogs are available from CRC Press. You can view them online at the URLs listed or contact your local sales representative for copies.

Taylor & Francis Group

Agricultural and Life Sciences Catalog no. CATAGL • ISBN: 978-0-8493-3864-9 http://issuu.com/CRCPress/docs/annualcat_aglife

Biomedical Science and Engineering

Pioneers in Publishing

Catalog no. CATBMS • ISBN: 978-0-8493-3866-3 http://issuu.com/CRCPress/docs/annualcat_biomed

Business, Management, and Public Administration Catalog no. CATBMP • ISBN: 978-0-8493-9175-0 http://issuu.com/CRCPress/docs/annualcat_bus_pub_admin

Chemistry and Chemical Engineering Catalog no. CATSPC • ISBN: 978-0-8493-3867-0

Grounded in a century-long tradition of publishing excellence, CRC Press Taylor & Francis continues to provide our world with the resources needed to promote human progress and meet the challenges that might stand in the way of that progress. Producers of printed handbooks, textbooks, tutorials, and field guides, as well as e-books, online libraries, and interactive databases, CRC Press is a full service print and electronic publisher committed to recording the accomplishments and supporting the work of the world’s leading practitioners and researchers.

http://issuu.com/CRCPress/docs/annualcat_chem

Civil and Mechanical Engineering Catalog no. CATMCE • ISBN: 978-0-8493-3880-9 http://issuu.com/CRCPress/docs/annualcat_civil_mech_eng

Computer Science and Information Technology Catalog no. CATITB • ISBN: 978-0-8493-3878-6 http://issuu.com/CRCPress/docs/annualcat_compsci_it

Electrical Engineering Catalog no. CATEEC • ISBN: 978-0-8493-3869-4 http://issuu.com/CRCPress/docs/annualcat_elec_eng

Environmental Science and Engineering

It’s no coincidence that many of the issues in today’s headlines read like a list of CRC new releases… from five or even ten years ago. Just as it’s never been a coincidence that the fields of inquiry our authors pursue today often bear the greatest fruit tomorrow. Whether its advancing agriculture yield, improving infrastructure, developing clean and green alternatives, retrofitting industry, reorganizing healthcare, securing our homeland, streamlining public administration, or defining just who we are and where we are going, CRC has the resources and references to turn students into professionals and leaders, researchers into innovators and pioneers. In the classroom, in the laboratory, and out in the field, wherever challenges are being met by research, ingenuity, and determination, you will find those who create and rely on the authoritative content that is the power of CRC Press.

Catalog no. CATEVE • ISBN: 978-0-8493-3874-8 http://issuu.com/CRCPress/docs/annualcat_envsci

Food Science and Nutrition Catalog no. CATFSN • ISBN: 978-0-8493-3876-2 http://issuu.com/CRCPress/docs/annualcat_foodsci

Forensic Science, Law Enforcement, and Homeland Security Catalog no. CATFSC • ISBN: 978-0-8493-3877-9

INVITATION TO AUTHORS If you have an idea for a book or a manuscript in progress relevant to any scientific, technical, or business discipline, CRC Press is interested. Please contact:

John Lavender, Senior VP Publishing 561-994-0555 • john.lavender@taylorandfrancis.com

http://issuu.com/CRCPress/docs/annualcat_forensics

Human Factors and Ergonomics / Industrial Engineering and Manufacturing

To order, visit us online at

Catalog no. CATHFI • ISBN: 978-0-8493-3875-5 http://issuu.com/CRCPress/docs/annualcat_erg_indust_eng

Mathematics and Statistics Catalog no. CATMTS • ISBN: 978-0-8493-3879-3 http://issuu.com/CRCPress/docs/annualcat_math_stats

Nanoscience and Technology / CleanTech Catalog no. CATMSN • ISBN: 978-0-8493-3885-4 http://issuu.com/CRCPress/docs/annualcat_nano_clean_tech

Physics / Materials Science Catalog no. CATPHY • ISBN: 978-0-8493-9176-7 http://issuu.com/CRCPress/docs/annualcat_physics_matsci

Or contact us via the following numbers: North & South America: From inside the US: Phone: 1-800-272-7737 Fax: 1-800-374-3401 Outside the US: Phone: 1-561-994-0555 Fax: 1-561-361-6018 Rest of the World Bookpoint Tel: +44 (0)1235 400400 • Fax: +44 (0)1235 400401


Product Listings Computer Science Algorithms & Complexity...................................................................................................................................3 Computation......................................................................................................................................................6 Computational Biology......................................................................................................................................9 Computer Engineering....................................................................................................................................14 Circuits & Chips..........................................................................................................................................14 Embedded Systems...................................................................................................................................17 General Computer Engineering..................................................................................................................17 Computer Graphics, Multimedia & Visualization.............................................................................................21 Cryptography & Coding Theory......................................................................................................................23 Data Mining & Knowledge Discovery..............................................................................................................25 Discrete Systems.............................................................................................................................................30 Human-Computer Interaction..........................................................................................................................33 Image Processing............................................................................................................................................36 Intelligent Systems...........................................................................................................................................39 Internet & Web-based Computing...................................................................................................................43 Machine Learning & Pattern Recognition........................................................................................................44 Programming Languages................................................................................................................................47 Systems & Computer Architecture..................................................................................................................48 Theory..............................................................................................................................................................49 Information Technology Database Design & Management...................................................................................................................50 IT Management................................................................................................................................................52 Operations Management............................................................................................................................55 Project Management...................................................................................................................................57 Networking.......................................................................................................................................................59 Security & Auditing..........................................................................................................................................64 Certification & Accreditation.......................................................................................................................69 Computer Crime Investigation.........................................................................................................................71 Software Engineering & Systems Development..............................................................................................72 Title Index...............................................................................................................................................................78 Author Index...........................................................................................................................................................82 Sales Agents......................................................................................................................................................86,87 Order Form.............................................................................................................................................................88 Ordering Information / Call for Authors........................................................................................ Inside Back Cover

Computer Science and Information Technology - 2010 Catalog

Table of Contents


For more information and a complete list Computer Science and Information Technology - 2010 Catalog

2


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Algorithms and Theory of Computation Handbook Second Edition, Two-Volume Set Edited by

Genetic Algorithms and Genetic Programming Modern Concepts and Practical Applications

Purdue University, West Lafayette, Indiana, USA

Marina Blanton University of Notre Dame, Indiana, USA Series: Chapman & Hall/CRC Applied Algorithms and Data Structures, 1

This new edition of the bestselling handbook continues to provide computer professionals and engineers with an up-to-date compendium of fundamental computer science topics and techniques. Expert contributors define the terminology, present basic results and techniques, offer a number of references to more in-depth literature, and provide a glimpse into current research issues. Along with updating and revising many of the existing chapters, the two-volume set contains more than 20 new chapters.

Praise for the Previous Edition “… excellent survey of the state of the art … highly recommended for anyone interested in algorithms, data structures, and the theory of computation … indispensable book of reference for all computer scientists, researchers, and professional programmers.” —R. Kemp, Zentralblatt MATH, Vol. 926

Order the Set and Save! Catalog no. C8180, ISBN: 978-1-58488-818-5 November 2009, 7 x 10, 2600 pp. Suggested Price: $179.95 / £114.00

Also Available as Individual Volumes

Algorithms and Theory of Computation Handbook, Second Edition General Concepts and Techniques General Concepts and Techniques provides an up-to-date compendium of fundamental computer science topics and techniques. It also illustrates how the topics and techniques come together to deliver efficient solutions to important practical problems. Along with updating and revising many of the existing chapters, this second edition contains four new chapters that cover external memory and parameterized algorithms as well as computational number theory and algorithmic coding theory. Catalog no. C8229, ISBN: 978-1-58488-822-2 November 2009, 7 x 10, 988 pp. Suggested Price: $119.95 / £76.99

Algorithms and Theory of Computation Handbook, Second Edition Special Topics and Techniques Special Topics and Techniques can illustrate how techniques come together to deliver efficient solutions to advanced problems. This second edition adds 15 new chapters to this volume. It now covers self-stabilizing and pricing algorithms, as well as the theories of privacy and anonymity, databases, computational games, and communication networks. It also discusses computational topology, natural language processing, and grid computing and explores applications in intensitymodulated radiation therapy, voting, DNA research, systems biology, and financial derivatives. Catalog no. C820X, ISBN: 978-1-58488-820-8 November 2009, 7 x 10, 950 pp. Suggested Price: $119.95 / £76.99

Michael Affenzeller, Stefan Wagner, Stephan Winkler, & Andreas Beham Series: Numerical Insights, 6

This book describes several generic algorithmic concepts that can be used in any kind of GA or with evolutionary optimization techniques. It provides a better understanding of the basic workflow of GAs and GP, encouraging readers to establish new bionic, problem-independent theoretical concepts. By comparing the results of standard GA and GP implementation with several algorithmic extensions, the authors show how to substantially increase achievable solution quality. They also describe structure identification using HeuristicLab as a platform for algorithm development. Software and dynamical presentations of representative test runs are made available online.

Algorithms and Complexity

Mikhail J. Atallah

Catalog no. C6293, ISBN: 978-1-58488-629-7 April 2009, 6-1/8 x 9-1/4, 379 pp. Suggested Price: $79.95 / £48.99

Handbook of Algorithms for Physical Design Automation Edited by

Charles J. Alpert, Dinesh P. Mehta, & Sachin S. Sapatnekar Handbook of Algorithms for Physical Design Automation provides a detailed overview of VLSI physical design automation, placing particular emphasis on techniques, trends, and improvements that have emerged over the last decade. After a brief introduction to the modern physical design problem, basic algorithmic techniques, and partitioning, the book discusses significant advances in floorplanning representations and describes recent formulations of the floorplanning problem. It also addresses issues of placement, net layout and optimization, routing multiple signal nets, manufacturability, physical synthesis, special nets, and designing for specialized technologies. Catalog no. AU7242, ISBN: 978-0-8493-7242-1 November 2008, 7 x 10, 1024 pp. Suggested Price: $149.95 / £95.00

Handbook of Algorithms for Wireless Networking and Mobile Computing Edited by

Azzedine Boukerche University of Ottawa, Ontario, Canada Series: Chapman & Hall/CRC Computer & Information Science, 8

The Handbook of Algorithms for Wireless Networking and Mobile Computing focuses on several aspects of mobile computing, particularly algorithmic methods and distributed computing with mobile communications capability. It reviews the topics that are crucial for building the foundation for the design and construction of future generations of mobile and wireless networks, including—cellular, wireless ad hoc, sensor, and ubiquitous networks. Following an analysis of fundamental algorithms and protocols, the book offers a basic overview of wireless technologies and networks. Other topics include issues related to mobility, aspects of QoS provisioning in wireless networks, and future applications. Catalog no. C4657, ISBN: 978-1-58488-465-1 November 2005, 7 x 10, 1040 pp. Suggested Price: $134.95 / £86.00

3


For more information and a complete list Handbook of Approximation Algorithms and Metaheuristics Teofilo F. Gonzalez

Handbook of Finite State Techniques

University of California, Santa Barbara, USA Series: Chapman & Hall/CRC Computer & Information Science, 12

Bruce W. Watson Eindhoven University of Technology, The Netherlands Series: Discrete Mathematics and Its Applications

Comprehensively examining approximation algorithms and metaheuristics, this resource presents the methodologies to design and analyze efficient approximation algorithms for a large class of problems, and to establish inapproximability results for another class of problems. It discusses local search, neural networks, and metaheuristics, as well as multiobjective problems, sensitivity analysis, and stability. After laying this foundation, the handbook applies the methodologies to classical problems in combinatorial optimization, computational geometry, and graph problems. It also explores large-scale and emerging applications in networks, bioinformatics, VLSI, game theory, and data analysis.

Considered an esoteric area of computer science until recently, finite state techniques are finding a growing number of applications, from genomics to speech recognition. Yet the field’s body of knowledge remains scattered among various domains, such as computational linguistics, hardware design, and simulation engineering, to name just a few. The Handbook of Finite State Techniques unifies and codifies the body of knowledge. In chapters contributed by top experts in finite automata, regular expressions, transducers, and state machines, it builds a solid background in the theory and algorithmics and explores each of its application domains. Source code is also made available for download.

Catalog no. C5505, ISBN: 978-1-58488-550-4 May 2007, 7 x 10, 1432 pp. Suggested Price: $129.95 / £82.00

Catalog no. C3405, ISBN: 978-1-58488-340-1 September 2010, 7 x 10, 506 pp. Suggested Price: $119.95 / £76.99

Handbook of Bioinspired Algorithms and Applications

Handbook of Parallel Computing

Edited by

Edited by

Stephan Olariu

Sanguthevar Rajasekaran

Edited by

Algorithms and Complexity 4

Models, Algorithms and Applications

Old Dominion University, Norfolk, Virginia, USA

University of Connecticut, Storrs, USA

Albert Y. Zomaya

John Reif

University of Sydney, Australia Series: Chapman & Hall/CRC Computer & Information Science, 7

Duke University, Durham, North Carolina, USA Series: Chapman & Hall/CRC Computer & Information Science, 17

This authoritative handbook reveals the connections between bioinspired techniques and the development of solutions to problems that arise in diverse problem domains. It provides broad coverage and numerous references to the available literature for more in-depth information. The book’s two sections provide balanced coverage of theory and practical applications. The first section explains the fundamentals of techniques, such as evolutionary algorithms, swarm intelligence, cellular automata, and others. Detailed examples and case studies in the second section illustrate how to apply the theory in actually developing solutions to a particular problem based on a bioinspired technique.

This volume assesses the models and algorithms involved in applying parallel computing to a variety of fields. It reviews membrane computing, the Inthreads model, and the recent releases of the LAPACK and ScaLAPACK libraries. The book also highlights a range of parallel computing problems that include latency, message dissemination, data transfer, call admission control, power aware scheduling, scalability, and data replication, and presents numerous approaches to tackle these problems, including pipelines, I/O techniques, analytical modeling, orthogonal recursive bisection, game theory, and parallel matrix multiplication algorithms.

Catalog no. C4754, ISBN: 978-1-58488-475-0 September 2005, 7 x 10, 704 pp. Suggested Price: $144.95 / £92.00

Catalog no. C6234, ISBN: 978-1-58488-623-5 December 2007, 7 x 10, 1224 pp. Suggested Price: $139.95 / £89.00

Handbook of Data Structures and Applications Dinesh P. Mehta

Handbook of Real-Time and Embedded Systems

Colorado School of Mines, Golden, USA

Edited by

Sartaj Sahni

Insup Lee, Joseph Y-T. Leung, & Sang H. Son

Edited by

University of Florida, Gainesville, USA Series: Chapman & Hall/CRC Computer & Information Science, 4

Handbook of Data Structures and Applications responds to the needs of data structure and algorithm researchers by providing a comprehensive survey of data structures of various types. Divided into seven parts, the text begins with a review of introductory material, followed by a discussion of well-known classes of data structures, priority queues, dictionary structures, and multidimensional structures. It next analyzes miscellaneous data structures, which are well-known structures that elude easy classification. The book then addresses mechanisms and tools that were developed to facilitate the use of data structures in real programs. It concludes with an examination of applications of data structures. Catalog no. C4355, ISBN: 978-1-58488-435-4 October 2004, 7 x 10, 1392 pp. Suggested Price: $109.95 / £69.99

Series: Chapman & Hall/CRC Computer & Information Science, 15

Focusing on several major areas of real-time and embedded systems, the Handbook of Real-Time and Embedded Systems examines real-time scheduling and resource management issues and explores the programming languages, paradigms, operating systems, and middleware for these systems. It presents challenges encountered in wireless sensor networks and offers ways to solve these problems. It also addresses key matters associated with real-time data services and reviews the formalisms, methods, and tools used in real-time and embedded systems. In addition, the book considers how these systems are applied in various fields, including adaptive cruise control in the automobile industry. Catalog no. C6781, ISBN: 978-1-58488-678-5 July 2007, 7 x 10, 800 pp. Suggested Price: $139.95 / £89.00


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Algorithms, Models, and Performance Analysis

Textbook

Edited by

Methods in Algorithmic Analysis

Joseph Y-T. Leung

Vladimir A. Dobrushkin

New Jersey Institute of Technology, Newark, USA Series: Chapman & Hall/CRC Computer & Information Science, 1

Brown University, Providence, Rhode Island, USA Series: Chapman & Hall/CRC Computer & Information Science, 22

This handbook covers advanced topics in scheduling, assembling researchers from all relevant disciplines to facilitate new insights. Presented in six parts, these experts provide introductory material, complete with tutorials and algorithms; they then examine classical scheduling problems. Part 3 explores scheduling models that originate in areas such as computer science and operations research. The following section examines scheduling problems that arise in real-time systems. Part 5 discusses stochastic scheduling and queueing networks, and the final section discusses a range of applications in a variety of areas, from airlines to hospitals.

Accompanied by more than 1,000 examples and exercises, this comprehensive, classroom-tested text presents numerous theories, techniques, and methods used for analyzing algorithms. It includes basic material on combinatorics and probability useful for students with weak backgrounds. It presents information on asymptotics not usually found in similar books, including Rice’s method, the Euler and Boole summation formulas, and recurrences. The author also offers tutorials throughout the text on topics as diverse as continued fractions, functions of a complex variable, numerical calculations, and Stieltjes integration. An appendix contains a comprehensive collection of useful formulas.

Catalog no. C3979, ISBN: 978-1-58488-397-5 April 2004, 7 x 10, 1224 pp. Suggested Price: $139.95 / £89.00

Catalog no. C6829, ISBN: 978-1-4200-6829-0 November 2009, 7 x 10, 824 pp. Suggested Price: $89.95 / £49.99

Algorithms and Complexity

Handbook of Scheduling

Textbook

Introduction to Mathematical Logic Fifth Edition Elliott Mendelson Queens College, Department of Mathematics, Flushing, New York, USA Series: Discrete Mathematics and Its Applications, 48

Retaining all the key features of its predecessors, the fifth edition of this longestablished, bestselling text explores the principal topics of mathematical logic. It includes a new section covering basic ideas and results about nonstandard models of number theory, a second appendix that introduces modal propositional logic, an expanded bibliography, and additional exercises and selected answers. This edition continues to cover propositional logic, first-order logic, first-order number theory, axiomatic set theory, and the theory of computability. It also discusses the major results of Gödel, Church, Kleene, Rosser, and Turing. Catalog no. C8768, ISBN: 978-1-58488-876-5 January 2010, 6-1/8 x 9-1/4, 469 pp. Suggested Price: $89.95 / £39.99

Textbook

Parallel Algorithms Henri Casanova, Arnaud Legrand, & Yves Robert Series: Chapman & Hall/CRC Numerical Analytic & Scientific Computation, 3

Focusing on algorithms for distributed-memory parallel architectures, Parallel Algorithms presents a rigorous yet accessible treatment of theoretical models of parallel computation, parallel algorithm design for homogeneous and heterogeneous platforms, complexity and performance analysis, and essential notions of scheduling. It extracts fundamental ideas and algorithmic principles from the mass of parallel algorithm expertise and practical implementations developed over the last few decades. With many examples, case studies, exercises, and solutions in each chapter, the text encompasses both the theoretical foundations of parallel algorithms and practical parallel algorithm design. Catalog no. C9454, ISBN: 978-1-58488-945-8 July 2008, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $79.95 / £39.99

Introduction to Scheduling Edited by

Yves Robert École Normale Supérieure de Lyon, Institut Universitaire de France, and Université de Lyon, France

Petascale Computing Algorithms and Applications Edited by

Frederic Vivien

David A. Bader

INRIA and Université de Lyon, France Series: Chapman & Hall/CRC Computational Science, 6

Georgia Institute of Technology, Atlanta, USA Series: Chapman & Hall/CRC Computational Science, 1

Full of practical examples, Introduction to Scheduling presents the basic concepts, methods, fundamental results, and recent developments of scheduling theory. With contributions from highly respected experts, it provides selfcontained, easy-to-follow, yet rigorous presentations of the material. The text introduces methods for solving various scheduling problems, including resourceconstrained project scheduling, machine scheduling, and job scheduling. It covers both the foundations in scheduling and modern developments, such as online scheduling. Along with a number of examples, theorems, and pedagogical proofs, the book provides in-depth coverage of key application fields.

Featuring contributions from the world’s leading experts in computational science, this volume provides a collection of articles on petascale algorithms and applications for computational science and engineering. It explores the use of petascale computers for solving the most challenging scientific and engineering problems of the current century. The book covers a breadth of topics in petascale computing, including architectures, software, programming methodologies, tools, scalable algorithms, performance evaluation, and application development. It also discusses expected breakthroughs in the field for computational science and engineering.

Catalog no. C7273, ISBN: 978-1-4200-7273-0 January 2010, 6-1/8 x 9-1/4, 333 pp. Suggested Price: $89.95 / £57.99

Catalog no. C9098, ISBN: 978-1-58488-909-0 December 2007, 6-1/8 x 9-1/4, 616 pp. Suggested Price: $93.95 / £59.99

5


For more information and a complete list CD-ROM Included

A Practical Guide to Data Structures and Algorithms using Java

Algorithms and Complexity / Computation

Sally & Ken Goldman Washington University, Saint Louis, Missouri, USA Series: Chapman & Hall/CRC Applied Algorithms and Data Structures, 2

This book presents a systematic, applications-centered study of data structures and algorithms and their practical implementations. With fully documented Java implementations on the accompanying CD-ROM, it provides comprehensive coverage of a wide variety of important data structures. Case studies, examples, decision trees, and comparison charts throughout the text illustrate and support a methodology for the careful selection and application of data structures and algorithms. Appendices summarize major features of the Java programming language, introduce asymptotic notation and complexity analysis, and discuss design patterns applied in the book. Catalog no. C455X, ISBN: 978-1-58488-455-2 August 2007, 7 x 10, 1056 pp. Suggested Price: $104.95 / £66.99

Computational Analysis of Randomness in Structural Mechanics Christian Bucher Center of Mechanics and Structural Dynamics, Vienna University of Technology, Austria Series: Structures and Infrastructures, 3

This volume details the computational aspects of stochastic analysis within the field of structural mechanics. It starts with a few motivating examples that demonstrate the various random effects within the context of simple structural analysis models. It then reviews fundamental concepts from continuum mechanics and puts them in the perspective of modern numerical tools, such as the finite element method. More advanced topics are developed step by step, while gradually increasing the complexity of the structural and probabilistic analyses. The material is suitable for graduate students and for structural analysts wishing to explore the potential benefits of stochastic analysis. Catalog no. K00052, ISBN: 978-0-415-40354-2 April 2009, 6-3/4 x 9-3/4, 248 pp. Suggested Price: $99.95 / £63.99

Computational Statistics Handbook with MATLAB® Second Edition

Bio-inspired Computing and Networking Yang Xiao The University of Alabama, Tuscaloosa, USA

6

In seeking new methods to cope with greater communication demands, researchers are finding inspiration in examples presented by nature. Considering a range of sources from insect to primate communication, leading researches present stateof-the-art approaches and novel technologies for developing bio-inspired models. They cover mathematical models and present experimental studies of bio-inspired computing and communications. They explore bio-inspired topology control and reconfiguration methods, as well as bio-inspired localization, synchronization, and mobility approaches. They also delve into such forward thinking concepts as the evolution and self-healing of network architectures. Catalog no. AU0326, ISBN: 978-1-4200-8032-2 July 2010, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $119.95 / £76.99

Wendy L. Martinez The Department of Defense, Fredericksburg, Virginia, USA

Angel R. Martinez Strayer University, Fredericksburg, Virginia, USA Series: Chapman & Hall/CRC Computer Science & Data Analysis, 1

Just like the bestselling first edition, this second edition covers some of the most commonly used techniques in computational statistics. With a strong, practical focus on implementing the methods, the authors include algorithmic descriptions of the procedures as well as examples that illustrate the use of the algorithms in data analysis. They offer all MATLAB® code, example files, and data sets available for download online. Updated for MATLAB® R2007a and the Statistics Toolbox 6.0, this edition incorporates many additional computational statistics topics, including multivariate distributions, classifiers, clustering, parametric models, and smoothers. Catalog no. C5661, ISBN: 978-1-58488-566-5 December 2007, 6-1/8 x 9-1/4, 792 pp. Suggested Price: $89.95 / £39.99

Textbook

Classical and Modern Numerical Analysis Theory, Methods and Practice Azmy S. Ackleh, Ralph Baker Kearfott, Edward James Allen, & Padmanabhan Seshaiyer Series: Chapman & Hall/CRC Numerical Analytic & Scientific Computation, 10

Conceptual Modeling for Discrete-Event Simulation Stewart Robinson, Roger Brooks, Kathy Kotiadis, & Durk-Jouke Van Der Zee

Helping readers prepare for doctoral examinations in numerical analysis, this graduate-level text provides a sound introduction to the theory and application of computational methods for applied mathematics problems. It also assists readers in understanding the mathematical literature in this area. The authors present the most important advanced aspects of numerical linear algebra, finite element theory, approximation theory, optimization, and integral equations. They also cover interval computation methods in numerical analysis and include fully worked out solutions for selected problems.

Conceptual modeling, which refers to the process of abstracting a simulation model from the real world, is recognized as one of the most important elements in discrete-event simulation. Recent interest has grown in the topic as evidenced by a special issue of the Journal of Simulation, sessions at major simulation conferences (Winter Simulation Conference 2006 & 2008, and UK Simulation Workshop 2006 & 2008), and an international special interest group on the topic. This book provides a comprehensive, coherent view on the current state of the art in simulation conceptual modeling for researchers and practitioners in discrete-event simulation.

Catalog no. C9157, ISBN: 978-1-4200-9157-1 January 2010, 6-1/8 x 9-1/4, 628 pp. Suggested Price: $99.95 / £46.99

Catalog no. K10519, ISBN: 978-1-4398-1037-8 June 2010, 6-1/8 x 9-1/4, 330 pp. Suggested Price: $99.95 / £63.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Theory and Applications Juergen Geiser

Grid Computing Infrastructure, Service, and Applications

Humboldt University of Berlin, Germany Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation, 8

Edited by

Exploring iterative operator-splitting methods, this work describes the analysis of numerical methods for evolution equations based on temporal and spatial decomposition methods. It generalizes the numerical analysis with respect to the consistency and stability to nonlinear, stiff, and spatial decomposed splitting problems. The book focuses on parabolic and hyperbolic equations, including convection-diffusion-reaction, heat, and wave equations, and applies the results to computational science issues, such as flow problems, elastic-wave propagation, heat transfer, and micromagnetic problems. Software tools are listed in an appendix.

The field of grid computing has made rapid progress in the last few years, developing and evolving in almost all key areas. A comprehensive discussion of recent advances in grid computing, this book summarizes the concepts, methods, technologies, and applications. Unlike other recent books on the subject that deal only with parts of grid computing, this one covers the entire field. With chapters based on the research of grid experts, it covers important topics such as philosophy, middleware, architecture, services, and applications. It also includes technical details to demonstrate how grid computing works in the real world and contains a large number of references and technical reports.

Catalog no. K10545, ISBN: 978-1-4398-1096-5 May 2009, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $89.95 / £54.99

Catalog no. 67664, ISBN: 978-1-4200-6766-8 April 2009, 6-1/8 x 9-1/4, 528 pp. Suggested Price: $129.95 / £78.99

Fundamentals of Grid Computing Theory, Algorithms and Technologies Edited by

Lizhe Wang, Wei Jie, & Jinjun Chen

Textbook

Grid Computing

Frederic Magoules

Techniques and Applications

Ecole Centrale Paris, Chatenay Malabry, France Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation, 11

Barry Wilkinson University of North Carolina, Charlotte, USA Series: Chapman & Hall/CRC Computational Science, 4

This volume discusses how the novel technologies of semantic web and workflow have been integrated into the grid and grid services. It focuses on sharing resources, data replication, data management, fault tolerance, scheduling, broadcasting, and load balancing algorithms. The book discusses emerging developments in grid computing, including cloud computing, and explores large-scale computing in high energy physics, weather forecasting, and more. The contributors often use simulations to evaluate the performance of models and algorithms. In the appendices, they present two types of easy-to-use open source software written in Java.

Designed for senior undergraduate and first-year graduate students, this classroom-tested book shows professors how to teach this subject in a practical way. It encompasses the varied and interconnected aspects of Grid computing, including how to design a system infrastructure and Grid portal. The text covers job submission and scheduling, Grid security, Grid computing services and software tools, graphical user interfaces, workflow editors, and Grid-enabling applications. It also contains programming assignments and multiple-choice questions and answers. The author’s website offers various instructional resources, including slides and links to software for the programming assignments.

Catalog no. K10205, ISBN: 978-1-4398-0367-7 January 2010, 6-1/8 x 9-1/4, 333 pp. Suggested Price: $89.95 / £57.99

Catalog no. C6953, ISBN: 978-1-4200-6953-2 January 2010, 6-1/8 x 9-1/4, 387 pp. Suggested Price: $79.95 / £49.99

Global Arrays Scientific Programming for Scalable Parallel Computers Jarek Nieplocha PNNL, Richland, Washington, USA

Ponuswamy Sadayappan

Grid Resource Management Toward Virtual and Services Compliant Grid Computing Frederic Magoules, Thi-Mai-Huong Nguyen, & Lei Yu

Oak Ridge National Lab, Tennessee, USA

Ecole Centrale Paris, Chatenay Malabry, France Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation, 4

An introduction to practical aspects of parallel programming and presents solutions based on Global Arrays (GAs), this book provides a general understanding of a difficult and complex topic, teaching readers to solve practical problems in the field of parallel programming in a general and convenient way. The authors describe the GA programming model and how it fits the abstract model of modern computer architecture. They explore the programming interfaces available in GA, providing practical knowledge on how to develop programs using GA. The book includes application examples and small code kernels to illustrate the basic parallel programming concepts.

Exploring the data and execution management aspects of grid computing, this book chronicles the current trend of grid developments toward a more serviceoriented approach that exposes grid protocols using web services standards. It introduces a new virtual file system for the grid environment and offers a novel framework for deploying scientific applications into a grid environment. The book also covers P2P systems, service-oriented architecture, scheduling algorithms, and semantic technologies. It highlights several grid applications, such as air quality forecasting and P2P media streaming systems, and examines Java WS Core programming and GT4 security.

Catalog no. 79220, ISBN: 978-1-4200-7922-7 June 2010, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $99.95 / £63.99

Catalog no. C7404, ISBN: 978-1-4200-7404-8 September 2008, 6-1/8 x 9-1/4, 306 pp. Suggested Price: $79.95 / £49.99

Ohio State University, Columbus, USA

Robert Harrison

Computation

Decomposition Methods for Differential Equations

7


For more information and a complete list Textbook

Handbook of Computational Group Theory Derek F. Holt, Bettina Eick, & Eamonn A. O’Brien Series: Discrete Mathematics and Its Applications, 24

Computation

This handbook covers the whole subject of computational group theory (CGT) at a level suitable for beginning graduate students who have some knowledge of group theory and computer algorithms. It develops the theory of algorithms in full detail, includes complexity analyses whenever possible, and highlights the connections between the different aspects of CGT and other areas of computer algebra. Several specialist sections provide pointers to the current state of the art in these areas, and all sections include exercises of varying difficulty. For each major collection of algorithms, the book includes a section describing applications both within and outside of group theory. Catalog no. C3723, ISBN: 978-1-58488-372-2 January 2005, 6-1/8 x 9-1/4, 536 pp. Suggested Price: $104.95 / £66.99

Introduction to the Simulation of Dynamics using Simulink Michael A. Gray American University, Washington, D.C., USA Series: Chapman & Hall/CRC Computational Science

Simulation is a powerful tool for understanding and exploring the dynamics of systems. This text provides an introduction to simulation using Simulink examples throughout. Requiring no programming skills, it is ideal as a Simulink reference or as an introductory textbook for a one-semester undergraduate course. Along with attractive graphics and diagrams, the author includes hands-on examples and exercises from science, engineering, technology, and mathematical sciences. He also presents advanced material at the end of the book to prepare students for advanced and more specialized study in simulating systems. Catalog no. K11000, ISBN: 978-1-4398-1897-8 June 2010, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $89.95 / £49.99

CD-ROM Included

Immunological Computation Theory and Applications

Nabih Abdelmalek

Dipankar Dasgupta

National Research Council of Canada

University of Memphis, Tennessee, USA

William A. Malek

Fernando Niño

Nortel Networks, Canada Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation, 2

National University of Columbia, Bogota

8

Numerical Linear Approximation in C

Over the last decade, the field of immunological computation has progressed slowly and steadily as a branch of computational intelligence. Immunological Computation: Theory and Applications presents up-to-date immunity-based computational techniques. After a brief review of fundamental immunology concepts, it examines computational models based on the negative selection process that occurs in the thymus. The text then explores immune networks, including continuous and discrete immune network models, clonal selection, hybrid models, and computational models based on danger theory. It also discusses real-world applications for the models covered in each chapter. Catalog no. AU6545, ISBN: 978-1-4200-6545-9 September 2008, 6-1/8 x 9-1/4, 296 pp. Suggested Price: $119.95 / £76.99

Introduction to Grid Computing Frederic Magoules, Jie Pan, Kiat-An Tan, & Abhinit Kumar

Featuring the C programming language to implement algorithms, this work provides a unique collection of linear approximation techniques that can be used to analyze, model, and compress discrete data in a variety of fields. It focuses on various L1, Chebyshev, and least squares approximations, including onesided, bounded variables, and piecewise. The authors also present the solution of underdetermined systems of consistent linear equations that are subject to different constraints on the elements of the unknown solution vector. They compare numerical results of the algorithms, which are accompanied by solved examples, and include a CD-ROM with source code and test drivers. Catalog no. C9780, ISBN: 978-1-58488-978-6 May 2008, 6-1/8 x 9-1/4, 968 pp. Suggested Price: $109.95 / £69.99

Parallel Computing in Quantum Chemistry

Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation, 6

Curtis L. Janssen & Ida M. B. Nielsen

A thorough overview of the next generation in computing, this concise guide explores state-of-the-art grid projects, core grid technologies, and applications of the grid. It covers virtual organizations, scheduling algorithms, fault tolerance strategies, grid workflow management systems, and security technologies. The authors present several grid middlewares adopted in scientific applications, explain the mechanisms behind well-known grid projects, and apply the Monte Carlo method and PDEs to industrial problems in finance and computational mechanics. They also describe the components and installation of Globus Toolkits 4.0 and gLite.

Through a solid assessment of parallel computing hardware issues, parallel programming practices, and implementation of key methods, this book enables readers to develop and implement efficient quantum chemistry software capable of utilizing large-scale parallel computers. It addresses specific parallel programming challenges facing quantum chemists not covered in other resources, including message-passing, multi-threading, and parallel computer architectures. The book presents in-depth performance analyses of several quantum chemistry procedures, such as the Hartree–Fock method and Møller–Plesset perturbation theory, and contains many program examples written in the C programming language.

Catalog no. C7406, ISBN: 978-1-4200-7406-2 March 2009, 6-1/8 x 9-1/4, 334 pp. Suggested Price: $79.95 / £48.99

Catalog no. 51644, ISBN: 978-1-4200-5164-3 April 2008, 6-1/8 x 9-1/4, 232 pp. Suggested Price: $89.95 / £57.99

Sandia National Laboratories, Livermore, California, USA


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Applications, Architecture, Protocols, and Challenges

Textbook

The Science of Computing

Yu-Kwong Kwok

A Problem-Solving Approach

The University of Hong Kong, China Series: Chapman & Hall/CRC Computational Science

John S. Conery

With a number of emerging applications, peer-to-peer (P2P) computing is a form of distributed processing that continues to increase in use. This book provides a detailed technical survey of existing P2P applications, various enabling technologies and protocols, and evolving research issues, such as network topology control and incentive providing mechanisms. Suitable for both senior-level undergraduate and graduate students as well as industry professionals, the text examines existing P2P applications, including file sharing, file transfer through BlackBerry email service, and wireless gaming capabilities. It also explores “what if ” scenarios of future P2P systems.

Based on a course taught by the author, this new textbook provides an introduction to computer science for non-majors or pre-majors in beginning courses. The book uses an active learning and problem-solving approach to present key topics in computer science, along with real-world examples and practical algorithms. The author explains how to read, rather than write, programs and how to solve problems. To provide a good understanding of computing without covering everything in the field, short focused chapters include tutorial projects and interactive labs that use Ruby, a simple open-source language.

Catalog no. K10464, ISBN: 978-1-4398-0934-1 June 2010 Suggested Price: $79.95 / £49.99

Process Algebra for Parallel and Distributed Processing

University of Oregon, Eugene, USA

Catalog no. K10640, ISBN: 978-1-4398-1262-4 May 2010, 7 x 10, 300 pp. Suggested Price: $79.95 / £49.99

Textbook

Edited by

Algorithms in Bioinformatics

Michael Alexander

A Practical Introduction

KPMG, Vienna, Austria

William Gardner University of Guelph, Ontario, Canada Series: Chapman & Hall/CRC Computational Science

This volume shows how process algebra has become a powerful tool for solving design and implementation challenges of concurrent systems. It develops formal methods for parallelizing algorithms for multicore architectures, models the behavior of distributed systems, and discusses how process algebra can tackle the design constraints of embedded systems. Highlighting recent growth in this burgeoning industry, coverage includes the Cell Broadband Engine processor of Sony, Toshiba, and IBM; a Channel Ambient Machine for mobile applications; and the reuse of concurrent artifacts across different hardware platforms. Catalog no. C6486, ISBN: 978-1-4200-6486-5 December 2008, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $99.95 / £63.99

Quantum Computing From Linear Algebra to Physical Realizations Mikio Nakahara & Tetsuo Ohmi

Wing-Kin Sung National University of Singapore Series: Chapman & Hall/CRC Mathematical & Computational Biology, 29

This classroom-tested text provides an in-depth introduction to the algorithmic techniques applied in bioinformatics. For each topic, the author clearly details the biological motivation, precisely defines the corresponding computational problems, and includes detailed examples to illustrate each algorithm. The text covers basic molecular biology concepts, sequence similarity, the suffix tree, sequence databases, sequence and genome alignment, the phylogenetic tree, genome rearrangement, motif finding, the secondary structure of RNA, peptide sequencing, and population genetics. Supplementary material is provided on the author’s website, and a solutions manual is available upon qualifying course adoption. Catalog no. C7033, ISBN: 978-1-4200-7033-0 January 2010, 6-1/8 x 9-1/4, 407 pp. Suggested Price: $79.95 / £39.99

Bayesian Modeling in Bioinformatics

Kinki University, Osaka, Japan

Dipak K. Dey, Samiran Ghosh, & Bani K. Mallick

With explicit derivations, exercises, and selected solutions, this self-contained, classroom-tested resource examines the theoretical aspects of quantum computing and focuses on several candidates of a working quantum computer, evaluating them according to the DiVincenzo criteria. It covers theoretical tools, such as vectors, matrices, quantum gates, and integral and Fourier transforms. The authors discuss how decoherence is an obstacle to the physical realization of a working quantum computer and how quantum error-correcting codes can sometimes overcome this. They also explore applications, including the ion trap quantum computer and the solid state realization of a quantum computer, at the forefront of the field.

Series: Chapman & Hall/CRC Biostatistics, 34

Catalog no. IP606, ISBN: 978-0-7503-0983-7 March 2008, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $79.95 / £49.99

Computation / Computational Biology

Peer-to-Peer Computing

One of the most comprehensive references on this topic to date, this volume fills the gap in the vast but scattered literature on Bayesian bioinformatics and biostatistics. It presents the perspectives of Bayesian experts on important developments in bioinformatics and biostatistics from two unique standpoints. The book looks at how to conceptualize, perform, and criticize traditional bioinformatics and biostatistics from a Bayesian perspective. Next, it examines how to use modern computational methods to summarize inferences using simulation and also explores emerging research topics. Catalog no. C7017, ISBN: 978-1-4200-7017-0 March 2010, 6-1/8 x 9-1/4, 536 pp. Suggested Price: $89.95 / £57.99

9


For more information and a complete list Textbook

Tel-Aviv University, Israel

Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R

Ron Unger

Gabriel Valiente

Bar-Ilan University, Ramat-Gan, Israel Series: Chapman & Hall/CRC Mathematical & Computational Biology

Technical University of Catalonia, Barcelona, Spain Series: Chapman & Hall/CRC Mathematical & Computational Biology, 22

Created for advanced undergraduates in computer science programs, Biological Computation covers major themes of bio-inspired computing, including cellular automata, molecular computation, genetic algorithms, and neural networks. Providing theoretical and coding exercises, this self-contained text requires no previous knowledge of biology. The book provides valuable insight to researchers and students from biomedical backgrounds looking to gain the computational skills needed to make entry into the fields of systems biology, biological modeling, and simulations.

Emphasizing the search for patterns within and between biological sequences, trees, and graphs, this book shows how combinatorial pattern matching algorithms can solve computational biology problems that arise in the analysis of genomic, transcriptomic, proteomic, metabolomic, and interactomic data. It provides an intuitive presentation of the algorithms, followed by a detailed exposition in pseudo-code. The author offers alternative implementations of the algorithms in Perl and R to enable the testing of algorithms and the building of projects based on the code. He also includes the Perl and R source code for all the algorithms on his website.

Biological Computation Ehud Lamm

Computational Biology

Catalog no. C7959, ISBN: 978-1-4200-8795-6 May 2010, 6-1/8 x 9-1/4, 306 pp. Suggested Price: $79.95 / £49.99

Catalog no. C6973, ISBN: 978-1-4200-6973-0 April 2009, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $89.95 / £54.99

Biological Sequence Analysis Using the SeqAn C++ Library Andreas Gogol-Döring Institut fur Informatik, Berlin, Germany

Knut Reinert

10

Structuring Biological Systems

Freie Universität Berlin, Germany Series: Chapman & Hall/CRC Mathematical & Computational Biology, 30

A Computer Modeling Approach

Written by the founders of the SeqAn project, this book first describes the general library design of SeqAn. It introduces biological sequence analysis problems, discusses the benefit of using software libraries, summarizes the design principles and goals of SeqAn, details the main programming techniques used in SeqAn, and demonstrates the application of these techniques in various examples. Focusing on the components provided by SeqAn, the second part explores basic functionality, sequence data structures, alignments, pattern and motif searching, string indices, and graphs. The last part describes applications of SeqAn to genome alignment, consensus sequence, suffix array construction, and more.

Structuring Biological Systems focuses on the key components of biological systems needed to develop genetic algorithms for modeling purposes. The book considers characteristics of biological systems from an artificial intelligence point of view, examines modeling examples of complex biological systems (such as molecular level modeling and a model of renal hemodynamics) and cognitive aspects of modeling, describes the entropy-based probability distribution for modeling environmental and biological systems, and presents a detailed analysis of modeling cancer phenomena. This volume benefits students and researchers interested in an interdisciplinary approach to complex problems of biological systems,

Catalog no. C7623, ISBN: 978-1-4200-7623-3 January 2010, 6-1/8 x 9-1/4, 329 pp. Suggested Price: $89.95 / £57.99

Cancer Systems Biology Edited by

Edwin Wang

Sitharma Iyengar Louisiana State University, Baton Rouge, USA

Catalog no. 7961, ISBN: 978-0-8493-7961-1 April 1992, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $209.95 / £134.00

Bioinformatics A Practical Approach Edited by

Biotechnology Research Institute, National Research Council Canada, Quebec Series: Chapman & Hall/CRC Mathematical & Computational Biology, 32

Shui Qing Ye

The unprecedented amount of data produced with high-throughput experimentation forces biologists to employ mathematical representation and computation to glean meaningful information in systems-level biology. Applying this approach to the underlying molecular mechanisms of tumorigenesis, cancer research is enjoying a series of new discoveries and biological insights. Unique in its dualistic approach, this book introduces the concepts and theories of systems biology and the applications of systems biology in cancer research. It presents basic cancer biology and cutting-edge topics of cancer research for computational biologists alongside systems biology analysis tools for experimental biologists.

This practical book presents the most state-of-the-art bioinformatics applications. It first focuses on genome analysis, common DNA analysis tools, phylogenetics analysis, and SNP and haplotype analysis. After chapters on microarray, SAGE, regulation of gene expression, miRNA, and siRNA, the book presents widely applied programs and tools in proteome analysis, protein sequences, protein functions, and functional annotation of proteins in murine models. With more than 250 figures to complement the text, the book also introduces the programming languages used in biology, website and database design, and the interchange of data between Microsoft Excel and Access.

Catalog no. K10596, ISBN: 978-1-4398-1185-6 March 2010, 7 x 10, 360 pp. Suggested Price: $89.95 / £57.99

Catalog no. C8105, ISBN: 978-1-58488-810-9 August 2007, 6-1/8 x 9-1/4, 648 pp. Suggested Price: $83.95 / £53.99

University of Missouri, Columbia, USA Series: Chapman & Hall/CRC Mathematical & Computational Biology, 16


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m High Performance Parallel Computer Architectures Edited by

Bertil Schmidt Nanyang Technological University, Singapore Series: Embedded Multi-Core Systems

Written by internationally recognized experts, this book introduces emerging parallel architectures, their corresponding programming paradigms, and their bioinformatics applications. Providing two introductory chapters to supply necessary background on sequential bioinformatics algorithms and parallel architectures such as multi-cores, Cell B.E., GPUs, and FPGAs, it then presents parallelization strategies and performance evaluations for a number of state-ofthe-art bioinformatics algorithms and tools. Topics include pairwise sequence alignment, multiple sequence alignment, BLAST, motif finding, pattern matching, sequence assembly, hidden Markov models, molecular dynamics, and evolutionary tree reconstruction. Catalog no. K10768, ISBN: 978-1-4398-1488-8 June 2010, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $129.95 / £82.00

Textbook CD-ROM Included

Data Analysis Tools for DNA Microarrays, Second Edition Sorin Draghici Wayne State University, Detroit, Michigan, USA Series: Chapman & Hall/CRC Mathematical & Computational Biology, 4

To help meet the challenges of DNA research, Data Analysis Tools for DNA Microarrays builds the foundation in the statistics and data analysis needed by biologists and provides the overview of microarrays needed by computer scientists. It presents the basics of microarray technology and, more importantly, the specific problems the technology poses from the data analysis perspective. It also introduces, in simple language, the fundamentals of statistics and the details of the techniques most useful in microarray data analysis. Richly illustrated in full color, the book includes a CD-ROM with trial software from BioDiscovery and Insightful. Catalog no. K10487, ISBN: 978-1-4398-0975-4 May 2010, 6-1/8 x 9-1/4, 706 pp. Suggested Price: $89.95 / £57.99

Computational Protein-Protein Interactions Edited by

Ruth Nussinov National Cancer Institute, Frederick, Maryland, USA

Gideon Schreiber Weizmann Institute of Science, Rehovot, Israel

A description of fundamental and applied aspects of the usefulness of computations when approaching protein-protein interactions, this book incorporates different views of the same biochemical problem from sequence to structure to energetics. It covers protein-protein interaction prediction and dynamics, design, drug design for inhibition, and uses for predicting function. The text provides an overview of the topic with general chapters understandable by students and junior researchers in this area, while also providing advanced material for more specialized readers. The chapters detail the complexity of protein interaction studies and inform readers of potential caveats that might be involved. Catalog no. 70053, ISBN: 978-1-4200-7005-7 June 2009, 6-1/8 x 9-1/4, 343 pp. Suggested Price: $119.95 / £72.99

Design and Use of Relational Databases in Chemistry T.J. O’Donnell President, gNova Inc., San Diego, California, USA

Through many examples of good database design, this book shows that relational databases are the best way to store, search, and act on chemical information. Introducing the concepts of RDMS and SQL, the author describes how relational data tables and new data types help store and use chemical information, how molecular structures can become a new data type in a database, and how client programs can effectively use relational databases. He also explains how a fully functioning chemical relational database system can be built. A supplementary website offers an implementation of every function from the book, a database of structures and data, and examples used in the book. Catalog no. 64428, ISBN: 978-1-4200-6442-1 December 2008, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $129.95 / £82.00

CD-ROM Included Textbook

DNA Methylation Microarrays

Computational Proteomics

Sun-Chong Wang

Protein Classification and Meta-Organization Golan Yona Cornell University, Ithaca, New York, USA Series: Chapman & Hall/CRC Mathematical & Computational Biology

Computational Biology

Bioinformatics

Experimental Design and Statistical Analysis National Central University, Chungli Taoyuan, Taiwan

Arturas Petronis Centre for Addiction and Mental Health, Toronto, Ontario, Canada Series: Chapman & Hall/CRC Biostatistics, 26

Focusing on protein classification and meta-organization, Computational Proteomics describes detailed methods for detecting self-organization in complex biological systems. It presents the analysis of biological entities and their cellular counterparts and discusses methods for detecting the building blocks of proteins and for prediction and analysis of protein-protein interactions, expression data analysis, and pathway analysis. The book also examines protein space and prediction of protein function. It also includes chapters on the analysis of protein-related data types, such as expression, and on Bayesian networks and their application to the protein space.

Illustrating results with examples based on real data, this book presents the statistical methods and tools to analyze DNA methylation microarray data. It describes wet-bench technologies that produce the data for analysis, explains how to preprocess the data to remove systematic artifacts resulting from measurement imperfections, and explores differential methylation and genomic tiling arrays. The authors show how cluster and network analyses can link the functions and roles of unannotated DNA elements with known ones. They also survey the open source software, public databases, and other online resources available for microarray research. An accompanying CD-ROM contains files of plots and many color images.

Catalog no. C5556, ISBN: 978-1-58488-555-9 May 2010, 6-1/8 x 9-1/4, 356 pp. Suggested Price: $79.95 / £49.99

Catalog no. C6727, ISBN: 978-1-4200-6727-9 April 2008, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $79.95 / £49.99

11


For more information and a complete list DNA Microarrays and Related Genomics Techniques Design, Analysis, and Interpretation of Experiments Edited by

David B. Allison, Grier P. Page, T. Mark Beasley, & Jode W. Edwards University of Alabama, Birmingham, USA Series: Chapman & Hall/CRC Biostatistics Series, 15

Computational Biology

With contributions from distinguished experts in the field, DNA Microarrays and Related Genomics Techniques parallels the steps in conducting and analyzing a microarray experiment from conception to interpretation. This book explores critical aspects of designing a microarray experiment, including power and sample size. It assesses the validity of statistical methods and describes how to ensure the quality and integrity of data. In addition, the text discusses new methods for interpreting microarray data and examines the various issues associated with analysis. It also addresses the movement to make large highdimensional datasets public for further analysis and the associated methods. Catalog no. DK2187, ISBN: 978-0-8247-5461-7 November 2005, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $93.95 / £59.99

Anatoly Ruvinsky University of New England, Australia

With the revolutionary explosion of genetic information discovery in recent decades, it is important to realize the underlying limitations of scientific prediction in genetics. Avoiding unnecessary technical details, this book helps readers accept and embrace a probabilistic view and understand the role of randomness in critical biological processes. It explores the nature of genetic uncertainty from different points of view and at different levels of biological organization. The book also traces the origin of some ideas of randomness starting from the basics of quantum mechanics and molecular genetics to modern evolutionary genetics and the philosophy of mathematics. Catalog no. 78852, ISBN: 978-1-4200-7885-5 January 2010, 6-1/8 x 9-1/4, 160 pp., Soft Cover Suggested Price: $79.95 / £49.99

Glycome Informatics Electron Transfer Proteins A Computational Perspective Toshiko Ichiye Georgetown University, Washington, DC, USA

A molecular understanding of electron transfer is crucial to understanding the molecular basis of metabolic processes in which electron transfer is essential, diseases involving these processes, and drug design targeting these processes. This book provides a cohesive and comprehensive discussion of computational methods used for electron transfer proteins and what has been learned from such studies for the first time in a book. It provides an overview of results from theory, computation, and experiment about electron transfer proteins and also includes strategies for studying metal sites that have not been examined computationally.

12

Genetics and Randomness

Catalog no. 82299, ISBN: 978-1-4200-8229-6 June 2010, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $119.95 / £76.99

Gene Expression Studies Using Affymetrix Microarrays

Methods and Applications Kiyoko F. Aoki-Kinoshita Soka University, Hachioji, Tokyo, Japan Series: Chapman & Hall/CRC Mathematical & Computational Biology, 28

One of the few up-to-date books available in this important area, Glycome Informatics covers all known informatics methods pertaining to the study of glycans, which provide crucial functional roles in many biological processes. The book supplies all the necessary background information, including glycan classes, motifs, and nomenclature. It offers a complete list of relevant databases and resources on glycobiology and presents a wide range of methods, from computer theory and data mining to glycomics. The author also discusses key points and ideas for potential research projects. Sequence analysis and machine learning methods as well as glycomic technologies are described in the appendices. Catalog no. C8334, ISBN: 978-1-4200-8334-7 January 2010, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $89.95 / £57.99

Handbook of Chemoinformatics Algorithms Jean-Loup Faulon University of Evry, France

Hinrich Gohlmann & Willem Talloen

Andreas Bender

Johnson & Johnson, Beerse, Belgium Series: Chapman & Hall/CRC Mathematical & Computational Biology, 23

Leiden University, The Netherlands Series: Chapman & Hall/CRC Mathematical & Computational Biology, 33

This book tears down the omnipresent language barriers among molecular biology, bioinformatics, and biostatistics researchers by explaining the entire process of a gene expression study from conception to interpretation. It covers important technical and statistical pitfalls and problems, helping not only to explain concepts outside the domain of researchers, but to provide additional guidance in their field of expertise. It also also describes technical and statistical methods conceptually with illustrative examples, enabling those inexperienced with gene expression studies to grasp the basic principles.

Describing the characteristics and limitations of key algorithms, this book covers all aspects of chemoinformatics, including structure representation, molecular descriptors, similarity search, virtual screening, structure-property model generation and validation, and other important topics. Each chapter presents the problems that motivate the algorithm, a brief history of the algorithm, the most commonly used algorithm to solve the problem discussed, the pseudocode and its implementation, an illustration of the algorithm, and the advantages and disadvantages of using the algorithm. This book is essential for researchers and students in chemistry, computer science, and bioinformatics.

Catalog no. C6515, ISBN: 978-1-4200-6515-2 January 2010, 6-1/8 x 9-1/4, 359 pp. Suggested Price: $89.95 / £54.99

Catalog no. C2922, ISBN: 978-1-4200-8292-0 April 2010, 6-1/8 x 9-1/4, 600 pp. Suggested Price: $99.95 / £63.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m CD-ROM Included

Handbook of Computational Molecular Biology

Kinetic Modelling in Systems Biology

Edited by

Oleg Demin

Srinivas Aluru

Moscow State University, Russia

The Handbook of Computational Molecular Biology offers a comprehensive, systematic treatment of computational biology, from the most basic concepts to advanced applications. Algorithmic in nature, the handbook highlights applications to molecular biology through every topic covered. In addition, many of the newer topics in the field are covered in depth, like microarrays, comparative genomics and external memory algorithms, and parallel methods. Written by experts in the field, it covers problems related to understanding genetic diseases, the design of drugs tailored to the individual, deciphering the genomes of specific organisms, and understanding the process of evolution. Catalog no. C061, ISBN: 978-1-58488-406-4 2006, 7 x 10, 1104 pp. Suggested Price: $144.95 / £92.00

Igor Goryanin University of Edinburgh, Scotland, UK Series: Chapman & Hall/CRC Mathematical & Computational Biology, 21

Focusing on one of the main pillars in the future development of systems biology, this book explores the kinetic modeling approach and how to apply it to solve real-life problems. It covers model creation techniques, model verification and validation, and simulations and interpretation of biological results. The authors describe underlying algorithms for selected reference methods and present several examples of applications, ranging from drug safety mechanisms to multiple target identification analysis to optimization of E. coli amino acid biosynthesis. The accompanying CD-ROM contains pathway diagrams, model examples, EPE software, and DBSolve installation. Catalog no. C6676, ISBN: 978-1-58488-667-9 October 2008, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $79.95 / £49.99

Handbook of Hidden Markov Models in Bioinformatics

DVD Included

Martin Gollery

Sebastian Bassi

Senior Bioinformatics Scientist, Active Motif. Series: Chapman & Hall/CRC Mathematical & Computational Biology, 19

Universidad Nacional de Quilmes, Bernal, Argentina Series: Chapman & Hall/CRC Mathematical & Computational Biology, 27

Demonstrating that many useful resources, such as databases, can benefit most bioinformatics projects, this handbook focuses on how to choose and use various methods and programs available for HMMs. It explores HMM implementations important in bioinformatics, including SAM, HMMER, Wise2, PSI-BLAST, and Meta-MEME, and shows how numerous databases and programs, such as Pfam, SMART, SUPERFAMILY, and PANTHER, are used in bioinformatics projects. With the inclusion of problems sets in each chapter and a CD-ROM of related material, the book discusses the use of HMMs for discovering the homology of a protein family, explains how to build custom HMM databases, and offers solutions for overcoming slow searches.

Based on the author’s experience working for an agricultural biotechnology company, this book helps scientists solve biological problems by helping them understand the basics of programming. Requiring no prior knowledge of programming-related concepts, it focuses on the easy-to-use, yet powerful, Python computer language. After introducing Python and the Biopython package, the book covers advanced topics, such as XML. It contains working code that solves real-world biological problems and includes a DVD with a readyto-run virtual machine (VM) based in DNALinux to test the code. Along with other material, the appendices offer installation instructions for the VM, Python, and Biopython.

Catalog no. C6846, ISBN: 978-1-58488-684-6 June 2008, 6-1/8 x 9-1/4, 176 pp. Suggested Price: $59.95 / £38.99

Catalog no. C9292, ISBN: 978-1-58488-929-8 January 2010, 6-1/8 x 9-1/4, 587 pp., Soft Cover Suggested Price: $69.95 / £44.99

Textbook

Introduction to Machine Learning and Bioinformatics Sushmita Mitra, Sujay Datta, Theodore Perkins, & George Michailidis

Computational Biology

Iowa State University, Ames, USA Series: Chapman & Hall/CRC Computer & Information Science Series, 9

Python for Bioinformatics

R Programming for Bioinformatics Robert Gentleman

Series: Chapman & Hall/CRC Computer Science & Data Analysis, 12

Fred Hutchinson Cancer Research Center, Seattle, Washington, USA Series: Chapman & Hall/CRC Computer Science & Data Analysis, 13

Examining the connections between these two increasingly intertwined areas, this text presents a unifying, thorough, and accessible introduction to the basic ideas and latest developments in machine learning and bioinformatics. It describes the major problems in bioinformatics and the concepts and algorithms of machine learning. The authors demonstrate the capabilities of key machine learning techniques, such as hidden Markov models and artificial neural networks, and address bioinformatics problems in structural biology, cancer treatment, and proteomics. They also include exercises at the end of some chapters and offer instructional materials on their website.

Drawing on the author’s experience as an expert in R, this practical guide focuses on the programming skills needed to use R for the solution of bioinformatics and computational biology problems. It covers the fundamentals of the R language, object-oriented programming in R, and data mark-up and web services languages and tools. The author examines different aspects of string handling and manipulations; discusses the interfacing of R with other languages, such as C, FORTRAN, Perl, and Python; and explains how to write software packages and debug and profile R code. The complete source code is also made available online.

Catalog no. C682X, ISBN: 978-1-58488-682-2 June 2008, 6-1/8 x 9-1/4, 384 pp. Suggested Price: $79.95 / £39.99

Catalog no. C6367, ISBN: 978-1-4200-6367-7 July 2008, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $69.95 / £44.99

13


For more information and a complete list Computational Biology / Computer Engineering Circuits & Chips 14

Textbook

Statistics in Human Genetics and Molecular Biology

Textbook

Systems Biology and Bioinformatics

Cavan Reilly

A Computational Approach

University of Minnesota, Minneapolis, USA Series: Chapman & Hall/CRC Texts in Statistical Science, 82

Kayvan Najarian, Christopher N. Eichelberger, Siamak Najarian, & Shahriar Gharibzadeh

Focusing on the roles of different segments of DNA, this book provides a basic understanding of problems arising in the analysis of genetics and genomics. With many worked examples and end-of-chapter exercises, it presents statistical applications in genetic mapping, DNA/protein sequence alignment, and analyses of gene expression data from microarray experiments. The text covers basic molecular biology, likelihood-based statistics, physical mapping, markers, linkage analysis, parametric and nonparametric linkage, sequence alignment, feature recognition, hidden Markov models, and Bayesian approaches. It also discusses differential gene expression detection as well as classification and cluster analysis using gene expression data sets.

Emphasizing computational methods, Systems Biology and Bioinformatics provides an introduction to system biology and its impact on biology and medicine. The book reviews the basic principles of molecular and cell biology using a system-oriented approach, with a brief description of the high-throughput biological experiments that produce databases. The methods presented in the text include techniques to discover genes, perform nucleotide and amino acid sequence matching, and estimate static gene dynamic pathways. The book also explains how to use system-oriented models to predict the behavior of biological systems for important applications such as rational drug design.

Catalog no. C7263, ISBN: 978-1-4200-7263-1 June 2009, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $59.95 / £38.99

Textbook

Stochastic Modelling for Systems Biology Darren J. Wilkinson Newcastle University, UK Series: Chapman & Hall/CRC Mathematical & Computational Biology, 11

Although stochastic kinetic models are increasingly accepted as the best way to represent and simulate genetic and biochemical networks, most researchers in the field have limited knowledge of stochastic process theory. Stochastic Modelling for Systems Biology provides an accessible introduction to this theory using examples that are familiar to systems biology researchers. Focusing on computer simulation, the author examines the use of stochastic processes for modelling biological systems. Along with the latest simulation techniques and research material, such as parameter inference, the text includes many examples and figures as well as software code in R for various applications. Catalog no. C5408, ISBN: 978-1-58488-540-5 April 2006, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $88.95 / £56.99

Textbook

Structural Bioinformatics An Algorithmic Approach Forbes J. Burkowski

Catalog no. 46500, ISBN: 978-1-4200-4650-2 April 2009, 6-1/8 x 9-1/4, 190 pp. Suggested Price: $69.95 / £44.99

The Circuits and Filters Handbook Third Edition (Five-Volume Slipcase Set) Edited by

Wai-Kai Chen Retired, Freemont, California, USA

Now in its third edition, this groundbreaking bestseller surveys current accomplishments in the field while providing researchers and designers with the comprehensive detail they need for continued research and design. All five volumes have been extensively updated to provide up-to-date information on the emerging fields of circuits and filters—both analog and digital. With contributions from over 150 leading international experts, this reference includes the key mathematical formulas, concepts, definitions, and derivatives that those involved with cutting-edge research and design require. It eschews extensively detailed theory to concentrate on professional applications with numerous examples provided throughout. The set includes more than 2500 illustrations and hundreds of references. Available as a comprehensive five-volume set, each of the subject-specific volumes can also be purchased separately.

Order the Set & Save! Catalog no. 55275, ISBN: 978-1-4200-5527-6 June 2009, 7 x 10, 3150 pp. Suggested Price: $199.95 / £121.00 Suggested Price for the Individual Volumes: $99.95 / £60.99

Analog and VLSI Circuits

Catalog no. 58916, ISBN: 978-1-4200-5891-8 April 2009, 7 x 10, 702 pp.

University of Waterloo, Ontario, Canada Series: Chapman & Hall/CRC Mathematical & Computational Biology, 20

Nonlinear and Distributed Circuits

Showcasing the beauty of protein structures, this practical text illustrates how to apply key algorithms to solve problems related to macromolecular structure. It emphasizes a methodology that uses mathematical models to act as links between structural biology and computational algorithms. The author shows that protein structure can produce symmetry and beauty as well as biological function. He also gives many examples of dynamic programming applications, including RNA secondary structure prediction and protein sequence alignment. The text includes problems throughout, exercises at the end of each chapter, and a 12-page color insert.

Fundamentals of Circuits and Filters

Catalog no. C6838, ISBN: 978-1-58488-683-9 October 2008, 6-1/8 x 9-1/4, 429 pp. Suggested Price: $79.95 / £49.99

Catalog no. 58894, ISBN: 978-1-4200-5889-5 June 2009, 7 x 10, 320 pp.

Catalog no. 58819, ISBN: 978-1-4200-5881-9 June 2009, 7 x 10, 320 pp. Catalog no. 58878, ISBN: 978-1-4200-5887-1 June 2009, 7 x 10, 964 pp.

Passive, Active, and Digital Filters

Catalog no. 58851, ISBN: 978-1-4200-5885-7 June 2009, 7 x 10, 700 pp.

Feedback and Lower Power Circuits Computer Aided Design and Design Automation Catalog no. 59181, ISBN: 978-1-4200-5918-2 June 2009, 7 x 10, 422 pp.


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Computer Arithmetic and Verilog HDL Fundamentals Joseph Cavanagh Santa Clara University, California, USA

Comprehensive and self-contained, this text covers the design of various arithmetic circuits using Verilog HDL for fixed-point, decimal, and floating-point number representations. It contains examples using different algorithms for both combinational and clocked sequential arithmetic circuits. The text presents topics in computer arithmetic, such as residue checking, parity prediction, logical and algebraic shifters, and arithmetic and logic units (ALUs). The text also features Verilog HDL projects, which include the design module implemented using built-in primitives, dataflow, behavioral, or structural modeling, the test bench module, the outputs, and the waveforms obtained from the simulator to illustrate complete functional design operation. Catalog no. K10562, ISBN: 978-1-4398-1124-5 November 2009, 7 x 10, 971 pp. Suggested Price: $139.95 / £89.00

CD-ROM Included

Design of Cost-Efficient Interconnect Processing Units Spidergon STNoC Marcello Coppola, Miltos D. Grammatikakis, Riccardo Locatelli, Giuseppe Maruccia, & Lorenzo Pieralisi Series: System-On-Chip Design and Technologies

Written by leading experts in the field, Design of Cost-Efficient Interconnect Processing Units: Spidergon STNoC comprehensively examines multiprocessor system-on-chip (MPSoC), in particular network-on-chip (NoC) design. Incorporating simple methods with easy-to-understand examples, this book considers a wealth of important theoretical and practical topics, such as technological deep sub-micron effects, generic NoC components, topological properties, embeddings of common communication patterns, and system-level design. A complementary CD-ROM features a practical NoC training approach based on the award-winning OCCN environment. Catalog no. 44710, ISBN: 978-1-4200-4471-3 September 2008, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $129.95 / £82.00

Textbook

Digital Integrated Circuits Analysis and Design, Second Edition John E. Ayers University of Connecticut, Storrs, USA

Digital Integrated Circuits, Second Edition, has been completely rewritten to emphasize submicron device physics and the importance of dynamic and low-power logic circuits. Providing a revised instructional text for engineers involved with Very Large Scale Integrated Circuit design and fabrication, this second edition delves into the dramatic advances, including new applications and changes in the physics of operation made possible by relentless miniaturization. Each chapter includes numerous worked examples, case studies and SPICE computer simulations. The book’s website offers supplementary material and more worked problems. Catalog no. 6987X, ISBN: 978-1-4200-6987-7 October 2009, 6-1/8 x 9-1/4, 598 pp. Suggested Price: $99.95 / £39.99

Discrete-Event Modeling and Simulation A Practitioner’s Approach Gabriel A. Wainer Carleton University, Ottawa, Ontario, Canada Series: Computational Analysis, Synthesis, and Design of Dynamic Systems

Through a practical applications approach, this work provides a guide to the creation of discrete-event applications. In addition to providing hundreds of online examples, this book uses the CD++ tool, an open-source framework that enables the simulation of discrete-event models with specialized support for cellular models. It is a complete text that demonstrates how to use CD++ to develop simulation models and define a variety of uses in different areas, such as biology and chemistry, as well as several artificial systems. Catalog no. 53361, ISBN: 978-1-4200-5336-4 April 2009, 7 x 10, 520 pp. Suggested Price: $99.95 / £60.99

Electronic Design Automation for Integrated Circuits Handbook Two-Volume Set Edited by

Louis Scheffer, Luciano Lavagno, & Grant Martin Series: Industrial Information Technology, 3

Textbook

Digital Design and Verilog HDL Fundamentals Joseph Cavanagh Santa Clara University, California, USA

Comprehensive and self-contained, this tutorial covers the design of a plethora of combinational and sequential logic circuits using conventional logic design and Verilog HDL. Number systems and number representations are presented along with various binary codes. Several advanced topics are covered, including functional decomposition and iterative networks. A variety of examples are provided for combinational and sequential logic, computer arithmetic, and advanced topics such as Hamming code error correction. Constructs supported by Verilog are described in detail. All designs are continued to completion. Each chapter includes numerous design issues of varying complexity to be resolved by the reader. Catalog no. 74156, ISBN: 978-1-4200-7415-4 June 2008, 7 x 10, 1168 pp. Suggested Price: $139.95 / £89.00

Computer Engineering Circuits & Chips

Textbook

Presenting a comprehensive overview of the design automation algorithms, tools, and methodologies used to design integrated circuits, the Electronic Design Automation for Integrated Circuits Handbook is available in two volumes. Individually, each volume provides a focused treatment of specialized aspects of design automation. Combined, they provide the most complete reference available in the field.

Order the Set & Save! Catalog no. 3096, ISBN: 978-0-8493-3096-4 April 2006, 7 x 10, 1152 pp. Suggested Price: $164.95 / £105.00

EDA for IC System Design, Verification, and Testing Catalog no. 7923, ISBN: 978-0-8493-7923-9 April 2006, 7 x 10, 544 pp. Suggested Price: $114.95 / £72.99

EDA for IC Implementation, Circuit Design, and Process Technology Catalog no. 7924, ISBN: 978-0-8493-7924-6 April 2006, 7 x 10, 608 pp. Suggested Price: $114.95 / £72.99

15


For more information and a complete list Textbook

Introduction to Logic Design

Microprocessors and Microcomputer-Based System Design

Svetlana N. Yanushkevich & Vlad P. Shmerko

Mohamed Rafiquzzaman

Textbook

Computer Engineering Circuits & Chips 16

University of Calgary, Alberta, Canada

California State Polytechnic University, Pomona, USA

With an abundance of insightful examples, problems, and computer experiments, this introduction provides a balanced, easy-to-read treatment of the fundamental theory of logic functions and applications in the design of digital devices and systems. It presents the most popular contemporary logic network design techniques based on decision diagrams—an element not found in most standard texts. Focusing on the manipulation of various data structures, the book covers both traditional and advanced topics of logic design, including decision trees and diagrams, and highlights recent key trends, such as nanoelectronics, in the theory and practice of logic network design.

Microprocessors and Microcomputer-Based System Design, Second Edition discusses the basics of microprocessors, various 32-bit microprocessors, the 8085 microprocessor, the fundamentals of peripheral interfacing, and Intel and Motorola microprocessors. This edition includes topics such as floatingpoint arithmetic, Program Array Logic, and flash memories. It covers the Intel 80486/80960, Motorola 68040, and the Pentium and PowerPC microprocessors, offering detailed descriptions of the architectures, addressing modes, instruction sets, I/O, and system design concepts. The final chapter presents system design concepts, applying the design principles covered in previous chapters to sample problems.

Catalog no. 60945, ISBN: 978-1-4200-6094-2 2008, 7 x 10, 720 pp. Suggested Price: $129.95 / £49.99

Low-Power NoC for HighPerformance SoC Design Hoi-Jun Yoo, Kangmin Lee, & Jun Kyong Kim

Catalog no. 4475, ISBN: 978-0-8493-4475-6 May 1995, 7 x 10, 800 pp. Suggested Price: $144.95 / £92.00

Textbook

Power Electronics Advanced Conversion Technologies Fang Lin Luo & Hong Ye

Series: System-on-Chip Design and Technologies

Nanyang Technological University, Singapore

This resource provides practical knowledge and real examples of how to use NoC in the design of SoC. It explains how to optimize communication through NoC. Employing the UML throughout, the text presents complicated concepts, such as models of computation and communication–computation partitioning, in a manner accessible to laypeople. The authors provide guidelines on how to simplify complex networking theory to design a working chip. In addition, they explore the novel NoC techniques and implementations of the BONE project. Examples of real-time decisions, circuit-level design, systems, and chips give the material a real-world context.

To meet the need to develop renewable and energy-saving power sources, green energy source systems require large numbers of converters. New converters, such as the Vienna rectifier and z-source inverters, are designed to improve the power factor and increase power efficiency. Exploring more than 150 converters, this book discusses and offers ways to solve and correct problems associated with them. The authors analyze new converter circuits that have not been widely examined. They also offer the correct methods to determine accurate solutions and examples to design converters for industrial applications.

Catalog no. 51725, ISBN: 978-1-4200-5172-8 March 2008, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $129.95 / £82.00

Microcontrollers Fundamentals and Applications with PIC Fernando E. Valdes-Perez

Catalog no. 94297, ISBN: 978-1-4200-9429-9 January 2010, 7 x 10, 760 pp. Suggested Price: $129.95 / £82.00

Textbook

Verilog HDL

Universidad de Oriente, Santiago de Cuba, Cuba

Digital Design and Modeling

Ramon Pallas-Areny

Joseph Cavanagh

EPSC-UPC, Castelldefels, Spain

Santa Clara University, California, USA

While the official documentation provided for the PIC family from Microchip is extensive, it can also be overwhelming. This book gives users the information necessary to understand the architecture and the programming of microcontrollers. Each topic is described using a reader-centered, top-bottom approach. First, the authors describe the concepts that are common to any microcontroller. Each of the topics is then detailed for PIC microcontrollers. Practical applications supplement each topic to provide further clarity. This book does not limit itself to a digital view of microcontrollers. Instead, it includes aspects of analog signals such as the acquisition and processing of external analog signals.

Providing a firm foundation in the design of digital systems using Verilog HDL, this self-contained book presents the complete Verilog language together with a wide variety of examples. It describes the different modeling constructs supported by Verilog with numerous examples designed in each chapter. Where applicable, a detailed review of the theory of the topic is presented together with the logic design principles. All designs are carried through to completion, nothing is left unfinished or partially designed. Each chapter includes numerous problems of varying complexity to be designed by the reader. The Verilog code is available for download online.

Catalog no. 77678, ISBN: 978-1-4200-7767-4 February 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $99.95 / £60.99

Catalog no. 51547, ISBN: 978-1-4200-5154-4 February 2007, 7 x 10, 920 pp. Suggested Price: $124.95 / £79.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Edited by

Nicolas Navet INRIA/RealTime-at-Work, Vandoeuvre Les Nancy, France

Françoise Simonot-Lion

Model-Based Design for Embedded Systems Gabriela Nicolescu Ecole Polytechnique de Montreal, Quebec, Canada

Pieter J. Mosterman

Loria/Nancy-Universite INPL, Vandoeuvre Les Nancy, France Series: Industrial Information Technology

The MathWorks, Inc. Natick, Massachusetts, USA Series: Computational Analysis, Synthesis, and Design of Dynamic Systems, 1

Highlighting requirements, technologies, and business models, this handbook provides a comprehensive overview of existing and future automotive electronic systems. It presents state-of-the-art methodological and technical solutions in the areas of in-vehicle architectures, multipartner development processes, software engineering methods, embedded communications, and safety and dependability assessment. Offering balanced viewpoints from industry and academic experts, car manufacturers, and suppliers, the book outlines the features and functioning schemes of CAN, LIN, FlexRay, and TTCAN protocols. It also addresses the main problems in the design of automotive embedded systems.

Model-based design allows teams to start the design process from a high-level model that is gradually refined through abstraction levels to ultimately yield a prototype. When done well, it encourages enhanced performance and quicker time to market. Elaborating on model-based practices, international experts address the main facets of heterogeneous system design. They focus on multicore methodological issues, real-time analysis, and modeling and validation, taking into account how optical, electronic, and mechanical components often interface. Illustrating applications in several fields, this volume provides designers with readily adaptable solutions for their own practice.

Catalog no. 8026, ISBN: 978-0-8493-8026-6 December 2008, 6-1/8 x 9-1/4, 470 pp. Suggested Price: $149.95 / £95.00

Catalog no. 67842, ISBN: 978-1-4200-6784-2 January 2010, 6-1/8 x 9-1/4, 766 pp. Suggested Price: $139.95 / £89.00

Embedded Multiprocessors Scheduling and Synchronization, Second Edition Texas Instruments, Palo Alto, California, USA

The 3-D Global Spatial Data Model

Shuvra S. Bhattacharyya

Foundation of the Spatial Data Infrastructure

University of Maryland, College Park, USA Series: Signal Processing and Communications, 3

Earl F. Burkholder

Showing how to design multiprocessor computer systems that are streamlined for multimedia applications, this work presents architectures and design methodologies for parallel systems in embedded DSP applications. It describes unique techniques for optimizing communication and synchronization and provides several examples of practical applications that demonstrate the relevance of the techniques presented. This second edition updates the background material on existing embedded multiprocessors, including single-chip multiprocessors. It also summarizes the new research on dataflow models for signal processing that has been carried out since the publication of the first edition.

This book presents a new model for handling digital spatial data, the global spatial data model or GSDM. This groundbreaking spatial model incorporates both a functional model and a stochastic model to connect the physical world to the ECEF rectangular system. Combining horizontal and vertical data into a single, three-dimensional database, this authoritative monograph provides a logical development of theoretical concepts and practical tools that can be used to handle spatial data more efficiently. The book clearly describes procedures that can be used to handle both ECEF and flat-Earth rectangular components in the context of a rigorous global environment.

Catalog no. 48015, ISBN: 978-1-4200-4801-8 February 2009, 6 x 9, 380 pp. Suggested Price: $129.95 / £78.99

Catalog no. 63014, ISBN: 978-1-4200-6301-1 April 2008, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $119.95 / £76.99

Embedded Systems Handbook

Attaining High Performance Communications

Sundararajan Sriram

General Computer Engineering

Automotive Embedded Systems Handbook

New Mexico State University, Las Cruces, USA

Edited by

A Vertical Approach

Richard Zurawski

Edited by

ISA Corporation, San Francisco, California, USA Series: Industrial Information Technology, 6

Ada Gavrilovska

Embedded systems proliferate in everyday applications and are of major importance in industrial settings. Providing comprehensive coverage, this handbook highlights recent trends and technologies and provides a fundamental understanding of recent developments. Contributions from some of the field’s leading authorities cover all aspects of embedded systems from both the hardware and software perspectives. Topics include real-time embedded systems, security, system-on-chip and network-on-chip design, and networked embedded systems. The final section explores implementations in automotive, industrial automation, and intelligent sensor applications.

No single solution applied at one particular layer can help applications solve all performance-related issues with communication services. Instead, this book shows that a coordinated effort is needed among the layers. It covers many different types of technologies and layers across the stack, from the architectural features of the hardware, through the protocols and their implementation in operating system kernels, to the manner in which application services and middleware are using underlying platforms. The book also describes key developments in highend platforms, high performance interconnection fabrics and communication libraries, and multi- and many-core systems.

Catalog no. 2824, ISBN: 978-0-8493-2824-4 August 2005, 7 x 10, 1160 pp. Suggested Price: $164.95 / £105.00

Catalog no. C3088, ISBN: 978-1-4200-9308-7 January 2010, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $79.95 / £49.99

Georgia Tech

17


For more information and a complete list The Compiler Design Handbook Optimizations and Machine Code Generation, Second Edition

Osman Nuri Ucan

Edited by

Istanbul University, Turkey

Y.N. Srikant & Priti Shankar

Onur Osman

General Computer Engineering

Indian Institute of Science, Bangalore, India

Istanbul Commerce University, Turkey

Current computer architectures pose challenges that exceed the capabilities of traditional compilation techniques. Presenting the latest information on optimizations and code generation, The Compiler Design Handbook, Second Edition features 14 new chapters that cover such topics as just-intime compilation, energy aware compiler optimizations, garbage collection, optimizations for memory hierarchy, profiling and applications, static analysis for secure information flow, compilation for embedded systems, worst-case execution time analysis, software protection, and techniques for debugging software. Chapters on register allocation, software pipelining, and type systems also feature new material.

Contemporary Coding Techniques and Applications for Mobile Communications provides a clear, comprehensive, and practical foundation on the basics of contemporary coding techniques and their applications for mobile communications. The first half of the text presents fundamental information on modulation, multiplexing, channel models, and traditional coding methods; the second half explains advanced coding techniques, provides simulation results, and compares them with related methods. It also provides new coding algorithms and new research areas such as image transmission with step-by-step guidelines.

Catalog no. 4382X, ISBN: 978-1-4200-4382-2 December 2007, 7 x 10, 784 pp. Suggested Price: $144.95 / £92.00

The Computer Engineering Handbook, Second Edition, Two-Volume Set Edited by

Vojin G. Oklobdzija University of California, Davis, USA

18

Contemporary Coding Techniques and Applications for Mobile Communications

After nearly six years as the field’s leading reference, the second edition of this award-winning handbook reemerges with completely updated content and a brand new format. The Computer Engineering Handbook, Second Edition is now offered as a set of two carefully focused books that together encompass all aspects of the field. In addition to complete updates throughout the book to reflect the latest issues in low-power design, embedded processors, and new standards, this edition includes a new section on computer memory and storage as well as several new chapters on such topics as semiconductor memory circuits, stream and wireless processors, and nonvolatile memory technologies and applications. Catalog no. 3860, ISBN: 978-0-8493-8600-8 January 2008, 7 x 10, 1648 pp. Suggested Price: $159.95 / £99.00

Catalog no. AU5461, ISBN: 978-1-4200-5461-3 May 2009, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $99.95 / £55.99

The Digital Signal Processing Handbook Second Edition, Three-Volume Set Edited by

Vijay K. Madisetti Georgia Institute of Technology, Atlanta, Georgia, USA Series: Electrical Engineering Handbook, 42

Now available in a three-volume set, this updated and expanded edition of the bestselling The Digital Signal Processing Handbook continues to provide the engineering community with authoritative coverage of the fundamental and specialized aspects of information-bearing signals in digital form. Encompassing essential background material, technical details, standards, and software, the second edition reflects cutting-edge information on signal processing algorithms and protocols related to speech, audio, multimedia, and video processing technology associated with standards ranging from WiMax to MP3 audio, lowpower/high-performance DSPs, color image processing, and chips on video. Drawing on the experience of leading engineers, researchers, and scholars, the three-volume set contains 29 new chapters that address multimedia and internet technologies, tomography, radar systems, architecture, standards, and future applications in speech, acoustics, video, radar, and telecommunications.

Order the Set and Save! Computer Network Time Synchronization The Network Time Protocol David L. Mills University of Delaware, Newark, USA

Computer Network Time Synchronization explores the technological infrastructure of time dissemination, distribution, and synchronization. The author addresses the architecture, protocols, and algorithms of the Network Time Protocol (NTP) and discusses how to identify and resolve problems encountered in practice. He also demonstrates how to design and configure time synchronization networks and includes coverage of the theory and practice of security and reliability. Presented in engaging, accessible prose, this book offers information valuable to professionals developing time-sensitive computer and network applications, electrical and computer engineers, and computer scientists. Catalog no. 5805, ISBN: 978-0-8493-5805-0 March 2006, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $114.95 / £72.99

Catalog no. 45636, ISBN: 978-1-4200-4563-5 January 2010, 7 x 10, 1930 pp. Suggested Price: $279.95 / £178.00 Suggested Price for Individual Volumes: $99.95 / £63.99

Digital Signal Processing Fundamentals Catalog no. 46063, ISBN: 978-1-4200-4606-9 January 2010, 7 x 10, 904 pp.

Video, Speech, and Audio Signal Processing and Associated Standards Catalog no. 4608X, ISBN: 978-1-4200-4608-3 January 2010, 7 x 10, 616 pp.

Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing Catalog no. 46047, ISBN: 978-1-4200-4604-5 January 2010, 7 x 10, 864 pp.


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Interoperability in Large-Scale Decentralized Information Systems Philippe Cudre-Mauroux

Graph Theory and Interconnection Networks Lih-Hsing Hsu Providence University, Taichung, Taiwan, R.O.C.

MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, Massachusetts, USA

Cheng-Kuan Lin

Peer-to-peer systems are evolving with new information-system architectures, leading to the idea that the principles of decentralization and self-organization will offer new approaches in informatics, especially for systems that scale with the number of users or for which central authorities do not prevail. This book describes a new way of building global agreements (semantic interoperability) based only on decentralized, self-organizing interactions.

The advancement of large-scale integrated circuit technology has enabled the construction of complex interconnection networks. Graph theory provides a fundamental tool for designing and analyzing such networks. Graph Theory and Interconnection Networks provides a thorough understanding of these interrelated topics. After a brief introduction to graph terminology, this book presents well-known interconnection networks as examples of graphs, followed by in-depth coverage of Hamiltonian graphs. Various types of problems illustrate the wide range of available methods for solving such problems. The text also explores recent progress on the diagnosability of graphs under various models.

Catalog no. EF9227, ISBN: 978-1-4200-9227-1 October 2008, 6-1/8 x 9-1/4, 240 pp. Suggested Price: $84.95 / £53.99

Geographic Information Services for Ubiquitous Mobile Services Ye Lei GALILEO Industries Ltd., Shangai, Peoples Republic of China

The rapid growth of ubiquitous mobile geographic information science has been enabled by expanding wireless coverage, more accurate positioning technologies, and the widespread adoption of mobile devices. This book presents the new insideout model of GIS to implement WAP and J2ME modes for ubiquitous mobile geographic information services. After a general overview of GIS, the author explains the technical architecture of the ubiquitous geographic information services system. Providing user requirements, system design, and a prototype, the system integration infrastructure is then proposed. The text concludes with a summary of the pervasive computing environment and a discussion of expanding global grids. Catalog no. AU6418, ISBN: 978-1-4200-6418-6 September 2010, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $99.95 / £63.99

National Central University, Chungli, Taiwan

Catalog no. 44818, ISBN: 978-1-4200-4481-2 September 2008, 6-1/8 x 9-1/4, 720 pp. Suggested Price: $149.95 / £95.00

Hybrid Simulation Theory, Implementation and Applications Edited by

Victor Saouma & M.V. Sivaselvan University of Colorado at Boulder, USA

Hybrid Simulation: Theory, Implementation and Applications deals with the rapidly evolving technology that combines computer simulation (typically finite element) and physical laboratory testing of two complementary substructures. It is a multidisciplinary technology which relies heavily on control theory, computer science, and numerical techniques and finds valuable applications in aerospace, civil, and mechanical engineering. Catalog no. SW5680, ISBN: 978-0-415-46568-7 April 2008, 6-3/4 x 9-3/4, 242 pp. Suggested Price: $109.95 / £69.99

Textbook

Textbook

GIS

Models of Network Reliability

A Computing Perspective, Second Edition

Analysis, Combinatorics, and Monte Carlo

Michael Worboys

Ilya B. Gertsbakh

University of Maine, Orono, USA

Ben Gurion University, Beer Sheva, Israel

Matt Duckham

Yoseph Shpungin

University of Melbourne, Victoria, Australia

Shamoon College of Engineering, Beer Sheva, Israel

GIS: A Computing Perspective, Second Edition provides an overview of Geographic Information Science and geographic information systems. Analyzing the subject from a computing perspective, the second edition explores conceptual and formal models to provide an understanding of spatial information and examines the representations and data structures needed to support adequate system performance. It covers the special-purpose interfaces and architectures required to interact with and share spatial information and highlights the importance of uncertainty and time in spatial information.

Unique in its approach, this volume provides a brief introduction to Monte Carlo methods and a concise exposition of Reliability Theory ideas. From there, it investigates a collection of principal network reliability models and provides solutions for most principal network reliability problems as Monte Carlo algorithms, illustrated with numerical examples and tables. Written by reliability experts with significant teaching experience, this reader-friendly text serves the needs of software, industrial, and reliability engineering students, researchers, and engineers. Stressing intuitive explanations and providing detailed proofs of difficult statements, the book offers end-of-chapter exercises with many worked numerical examples and a solutions manual, making it ideal for self-study and practical use.

Catalog no. TF1493, ISBN: 978-0-415-28375-5 2004, 7 x 10, 448 pp. Suggested Price: $89.95 / £57.99

General Computer Engineering

Emergent Semantics

Catalog no. K10902, ISBN: 978-1-4398-1741-4 January 2010, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $79.95 / £49.99

19


For more information and a complete list Textbook

A Multidiciplinary Introduction to ICT Information Security Edited by

Stig F. Mjolsnes Norwegian University of Science & Technology, Trondheim Series: Discrete Mathematics and Its Applications

Real-Time Digital Signal Processing from MATLAB® to C with the TMS320C6x DSK Thad B. Welch, Cameron H.G. Wright, & Michael G. Morrow

General Computer Engineering

The shift in communications from mail and telephone to email, web transactions, and more has created a demand for a variety of new specialists and expertise. This multidisciplinary book focuses on information and communication technology, security, and safety. It presents material on governmental regulations in cryptology and telecommunications as well as on privacy and biometrics. The book also includes thorough introductory coverage of software security and control, cryptography, secure protocols, network security, and digital forensics. Each chapter contains an introduction, main coverage of the topic, a summary of key terms and content, review problems, and suggested readings and websites.

Cell phones, GPS receivers, and CD players are a few of the products that rely on real-time digital signal processing. This book bridges the growing divide between theory and practice using a step-by-step transition approach. It builds a practical framework that reinforces basic DSP theory using demonstrations, exercises, and projects that progress from theory to MATLAB® to real-time DSP hardware. The authors include a CD-ROM with all the source code, example files, test signals, and executable programs needed for the examples, exercises, and projects in the text. They also offer solutions throughout and challenges at the end of each chapter.

Catalog no. C5905, ISBN: 978-1-4200-8590-7 June 2010, 6-1/8 x 9-1/4, 512 pp. Suggested Price: $89.95 / £57.99

Catalog no. 7382, ISBN: 978-0-8493-7382-4 December 2005, 7 x 10, 400 pp. Suggested Price: $83.95 / £53.99

CD Included

Programming ArcObjects with VBA A Task-Oriented Approach, Second Edition Kang-Tsung Chang National Taiwan University, Taipei

20

Textbook CD-ROM Included

Programming ArcObjects with VBA: A Task-Oriented Approach, Second Edition adds macros and explanations for the new Geoprocessing object introduced in ArcGIS 9.x. Instead of treating this new feature in separate chapters, the author incorporates Geoprocessing code into the existing chapters. The code appears conveniently in boxes that let readers easily compare sample macros. The companion CD contains 95 complete ArcObjects macros and 33 Geoprocessing macros, along with datasets to execute the code. Each program begins with a short usage description and a list of key properties and methods, followed by the listing and explanation of the code itself. Catalog no. 9283, ISBN: 978-0-8493-9283-2 August 2007, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $93.95 / £59.99

Reconfigurable System Design and Verification Pao-Ann Hsiung, Marco D. Santambrogio, & Chun-Hsian Huang Focusing on system-level design and verification techniques, this text allows readers to immediately grasp concepts and put them into practice. It starts with an overview of reconfigurable computing architectures and platforms and demonstrates how to develop reconfigurable systems. This sets up the discussion of the hardware, software, and system techniques that form the core of the text. The authors classify design and verification techniques into primary and secondary categories, allowing the appropriate ones to be easily located and compared. The techniques discussed range from system modeling and systemlevel design to co-simulation and formal verification. Case studies illustrate realworld applications. Catalog no. 62662, ISBN: 978-1-4200-6266-3 February 2009, 6-1/8 x 9-1/4, 268 pp. Suggested Price: $99.95 / £60.99

Textbook

Quantum Error Correction and Fault Tolerant Quantum Computing

Textbook

Frank Gaitan

Joseph Cavanagh

Sequential Logic Analysis and Synthesis

Southern Illinois University, Carbondale, USA

Santa Clara University, California, USA

The discovery of quantum error correction nearly ten years ago has led to explosive development and research within the field. Quantum Error Correction and Fault Tolerant Quantum Computing provides a detailed explanation of how quantum error correction is possible and how quantum stabilizer codes are constructed. With examples throughout the text, this book demonstrates how fault-tolerant quantum operations can be implemented on encoded quantum information and presents the accuracy threshold theorem for particular noise models. Featuring extensive references, it also includes homework problems in each chapter.

Emphasizing structured and rigorous design principles that can be applied to practical applications, Sequential Logic offers a thorough exposition of the analysis and synthesis of both synchronous and asynchronous sequential machines. This book reviews the analysis of combinatorial logic, defines sequential machines, and discusses methods for synthesizing synchronous sequential machines. It also covers the analysis and synthesis of asynchronous sequential machines and pulsemode asynchronous sequential machines. The author presents basic and advanced concepts in sequential machine analysis and synthesis for practicing electrical and computer engineers and undergraduate and graduate students.

Catalog no. 7199, ISBN: 978-0-8493-7199-8 February 2008, 6-1/8 x 9-1/4, 312 pp. Suggested Price: $99.95 / £44.99

Catalog no. 7564, ISBN: 978-0-8493-7564-4 June 2006, 7 x 10, 912 pp. Suggested Price: $124.95 / £79.99


Spatial Decision Support Systems Ramanathan Sugumaran

Computational Intelligence in Medical Imaging

University of Northern Iowa, Cedar Falls, USA

Techniques and Applications

Vijayan Sugumaran

Edited by

Oakland University, Rochester, Michigan, USA

Gerald Schaefer, Aboul Ella Hassanien, & Jianmin Jiang

This book integrates Spatial Decision Support Systems (SDSS) research from a variety of disciplines including decision sciences and geosciences. It provides the core knowledge needed to understand how SDSS function, how they can be used in various decision making contexts, and how to design and develop SDSS using enabling technologies and commercial tools. It covers the core principles of SDSS as well as the methods to design SDSS and tailor it for one’s own work environment. The case studies and numerous example applications allow readers to apply and practice core principles.

A compilation of the latest trends in the field, this book explores how intelligent computing can bring enormous benefit to existing technology in medical image processing and also how it can improve medical imaging research. It covers stateof-the-art research toward integrating medical image processing with artificial intelligence and machine learning approaches. The book presents a range of computational algorithms and techniques, such as neural networks, fuzzy sets, evolutionary optimization, and Monte Carlo simulations. It encompasses many important applications, including the identification of melanoma and prostate cancer analysis.

Catalog no. 62093, ISBN: 978-1-4200-6209-0 July 2010, 6 x 9, 400 pp. Suggested Price: $99.95 / £63.99

System Level Design with .Net Technology Edited by

Catalog no. C6059, ISBN: 978-1-4200-6059-1 March 2009, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $99.95 / £60.99

Computational Vision and Medical Image Processing

El Mostapha Aboulhamid

VipIMAGE 2009

Universite de Montreal, Canada

Edited by

Frederic Rousseau

João Manuel R.S. Tavares & R.M. Natal Jorge

TIMA Lab, France

Faculty of Engineering, University of Porto, Portugal

Constituting a software-based approach to design modeling verification and simulation, this is the first book to harness the power of .NET for system design. World-class developers, who have been at the forefront of system design for decades, explain how to tap into the power of this dynamic programming environment for more effective management of metadata—and introspection and interoperability between tools. Using readily available technology, the text details how to capture constraints and requirements at high levels and describes how to percolate them during the refinement process. This cutting-edge reference also includes the open source environment ESys.NET so readers can experiment with new ideas, algorithms, and design methods.

Computational Vision and Medical Image Processing, VIPIMAGE 2009 provides comprehensive coverage of the state-of-the-art in the fields of: Image Processing and Analysis; Tracking and Analyze Objects in Images; Segmentation of Objects in Images; 3D Vision; Signal Processing; Data Interpolation, Registration, Acquisition and Compression; Objects Simulation; Virtual Reality; Software Development for Image Processing and Analysis; Computer Aided Diagnosis, Surgery, Therapy and Treatment; Computational Bioimaging and Visualization; and Telemedicine Systems and their Applications. Related techniques covered include the level set method, finite element method, modal analyses, stochastic methods, principal and independent components analyses and distribution models.

Catalog no. K10610, ISBN: 978-1-4398-1211-2 September 2009, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $99.95 / £63.99

Understanding Dynamics of Geographic Domains Edited by

Kathleen Stewart Hornsby University of Iowa, Iowa City, USA

May Yuan University of Oklahoma, Norman, USA

A collection of peer-reviewed articles, this multidisciplinary book combines coverage of topics from the perspective of GIS, computer science, image processing, and information and data processing. It brings together specialists to present the latest research on visualization and computation of dynamics in geographic domains. Coverage incorporates theoretical, cognitive, methodological, and applied articles, making it a top-notch reference and an excellent textbook for a course in this field. Containing an 8-page color insert, the book is divided into three sections: Cognitive Aspects, Representation, and Data Models; Analysis, Computation, and Modeling; and Visualization and Simulation. Catalog no. 60341, ISBN: 978-1-4200-6034-8 April 2008, 6-1/8 x 9-1/4, 240 pp. Suggested Price: $99.95 / £63.99

Catalog no. K11337, ISBN: 978-0-415-57041-1 October 2009, 6-3/4 x 9-3/4, 464 pp. Suggested Price: $199.00 / £129.00

Textbook

Graphics and GUIs with MATLAB® Third Edition O. Thomas Holland Naval Surface Warfare Center, Dahlgren, Virginia, USA

Patrick Marchand Nvidia, Durham, North Carolina, USA

The third edition of this popular guide accommodates MATLAB® version 6.x, including its integrated development desktop, enhanced computational engine, and interfaces to external languages. Two added chapters address data visualization and GUI design, and together they provide a solid understanding of when to use GUIs and what works well graphically in various situations. Other added material includes deeper coverage of programming techniques, end-of-chapter problem sets, and updated color illustrations. This edition retains a tutorial nature and its appeal to a broad audience, from novice MATLAB® users to seasoned MATLAB® programmers. Catalog no. C3200, ISBN: 978-1-58488-320-3 November 2002, 7 x 10, 536 pp., Soft Cover Suggested Price: $59.95 / £38.99

Computer Engineering / Computer Graphics, Multimedia, & Visualiztion

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

21


For more information and a complete list Textbook

Computer Graphics, Multimedia, & Visualiztion 22

An Integrated Introduction to Computer Graphics and Geometric Modeling Ronald Goldman

Textbook

Real-Time Graphics for Game Development JungHyun Han Korea University, Seoul, South Korea

Jubok Kim

Rice University, Houston, Texas, USA

Nexon Corporation, Seoul, South Korea

Taking a novel approach, this book presents an easy-to-read introduction to computer graphics and geometric modeling. Emphasizing high-level algorithms, it focuses on standard graphics, modeling, and mathematical methods, including ray tracing, polygon shading, radiosity, fractals, freeform curves and surfaces, vector methods, and transformation techniques. The author begins with fractals, rather than typical line-drawing algorithms and also brings the turtle back from obscurity to introduce several major concepts in computer graphics. The text includes many exercises and programming projects and offers a website with PowerPoint® slides.

This full-color text on real-time graphics in video game development balances theory and application. The presentation of topics allows readers to quickly understand the key aspects of real-time graphics. The authors, who are leaders in this field, cover such concepts as rendering, texturing, post-processing, and animation. To maintain the emphasis on practicality, each chapter includes boxed Math Notes that enable readers to access mathematical or theoretical content without interrupting the flow of the main text. The book contains over 300 clear and detailed figures along with homework problems. A solutions manual is also available upon qualified course adoption.

Catalog no. K10188, ISBN: 978-1-4398-0334-9 July 2009, 7 x 10, 574 pp. Suggested Price: $89.95 / £48.99

Catalog no. K11350, ISBN: 978-1-4398-2737-6 November 2010, 6-1/8 x 9-1/4, 500 pp. Suggested Price: $79.95 / £49.99

Textbook

Principles of Speech Coding Tokunbo Ogunfunmi

Ubiquitous Multimedia Computing Edited by

Qing Li City University of Hong Kong, China

Santa Clara University, California, USA

Timothy K. Shih

Madihally Narasimha

Asia University, Taichung County, Taiwan Series: Chapman & Hall/CRC Studies in Informatics Series, 5

Ample Communications Inc., Saratoga, California, USA

Understanding the basics of speech coding is necessary for the design of various modern devices that rely on speech interfaces such as cell phones and PDAs. Offering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the underlying signal processing techniques that are used in speech coding. The authors present different speech coding standards from various organizations, including the ITU. With a focus on applications such as Voice-over-IP telephony, this comprehensive text demonstrates the practical implementation of a popular standardized speech coder on a DSP processor and covers the most recent research findings. Catalog no. 7428, ISBN: 978-0-8493-7428-9 March 2010, 6-1/8 x 9-1/4, 571 pp. Suggested Price: $99.95 / £39.99

R Graphics

With contributions from leading experts, this volume delves into ubi-media computing on three levels: infrastructures, where fundamental technologies are being developed; middleware, where the integration of technologies and software systems continues to be defined; and applications, where its concepts are evolving into real-world products and processes. It discusses how seamless technologies are changing the way we communicate, learn, and live. It covers new architectures for delivering content, advanced HCI devices that allow simple body gestures to govern complex tasks, and a host of other emerging technologies. Catalog no. C9338, ISBN: 978-1-4200-9338-4 November 2009, 6-1/8 x 9-1/4, 404 pp. Suggested Price: $89.95 / £57.99

Wavelet Subdivision Methods GEMS for Rendering Curves and Surfaces

Paul Murrell

Charles Chui

The University of Auckland, New Zealand Series: Chapman & Hall/CRC Computer Science & Data Analysis, 7

Stanford University, Stanford, California, USA

Johan DeVilliers

Powerful, flexible, and free, R is the program of choice for tens of thousands of statisticians. This bestselling reference provides a complete and authoritative exposition of the R graphical system. Considered the leading expert on the use of R graphics, Paul Murrell provides statisticians with an in-depth resource that takes nothing for granted and helps both neophyte and seasoned users master the intricacies of R graphics. Well ahead of the curve, particularly regarding the grid system, R Graphics presents a wealth of original information that cannot be found anywhere else.

Focusing on subdivision curves and surfaces, this book details wavelet methods for geometric design, editing, and algorithm development. It presents a unified study of the theory, methods, and construction algorithms for the ideal wavelet families associated with existing subdivision schemes. Requiring no advanced mathematics knowledge, including Fourier analysis and time-frequency analysis, the text provides all of the necessary background on wavelet mathematics and curve and surface subdivisions. After forming this foundation, the authors introduce new wavelets that they have developed. They also include examples, exercises, and graphs to illustrate concepts.

Catalog no. C486X, ISBN: 978-1-58488-486-6 July 2005, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $83.95 / £53.99

University of Stellenbosch, Matieland, South Africa

Catalog no. K10613, ISBN: 978-1-4398-1215-0 May 2010, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $69.95 / £44.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Antoine Joux

The Guide to Secrecy From Ancient to Modern Times

Universite de Versailles Sain-Quentin-en-Yvelines, France Series: Chapman & Hall/CRC Cryptography and Network Security, 2

Richard A. Mollin University of Calgary, Alberta, Canada Series: Discrete Mathematics and Its Applications, 27

Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox, Hadamard–Fourier–Walsh transforms, lattice reduction, and Gröbner bases. The author also presents advanced applications, such as LFSR-based stream ciphers, lattice methods for cryptanalysis, elliptic curves, and index calculus methods. He also includes online access to hints and solutions to the exercises as well as C code.

This book explores the depth and breadth of the field of cryptology. It begins by tracing the development of cryptology from inception to modern-day practice. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. It is designed such that the non-professional reader may learn all aspects of secrecy, yet it is still suitable as a textbook for a course on a variety of secrecy-related topics.

Catalog no. C7002, ISBN: 978-1-4200-7002-6 June 2009, 6-1/8 x 9-1/4, 519 pp. Suggested Price: $89.95 / £54.99

Catalog no. C4703, ISBN: 978-1-58488-470-5 May 2005, 6-1/8 x 9-1/4, 704 pp. Suggested Price: $84.95 / £53.99

Textbook CD-ROM Included

Textbook

Applied Algebra Codes, Ciphers and Discrete Algorithms, Second Edition Darel W. Hardy, Fred Richman, & Carol L. Walker

Coding Theory and Cryptography The Essentials, Second Edition D.R. Hankerson, D.G. Hoffman, D.A. Leonard, C.C. Lindner, K.T. Phelps, C.A. Rodger, & J.R. Wall

Series: Discrete Mathematics and Its Applications, 47

Series: Pure and Applied Mathematics, 234

Using mathematical tools from number theory and finite fields, this text presents practical methods for solving problems in data security and data integrity. It covers many algorithms that arise in cryptography and error-control codes. Along with doubling the number of exercises, this edition includes a new appendix that reviews prerequisite topics in algebra and number theory. The accompanying CDROM contains an interactive version of the book that is powered by Scientific Notebook®, a mathematical word processor and easy-to-use computer algebra system. A solutions manual is available for qualifying instructors.

Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an “easy-to-use” manner appropriate for students with only a basic background in mathematics offering revised and updated material on the Berlekamp-Massey decoding algorithm and convolutional codes. Introducing the mathematics as it is needed and providing exercises with solutions, this edition includes an extensive section on cryptography, designed for an introductory course on the subject.

Catalog no. C7142, ISBN: 978-1-4200-7142-9 February 2009, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $99.95 / £44.99

Textbook

Applied Combinatorics Second Edition Fred Roberts

Cryptography & Coding Theory

Algorithmic Cryptanalysis

Codes

Catalog no. DK1722, ISBN: 978-0-8247-0465-0 August 2000, 6 x 9, 368 pp. Suggested Price: $93.95 / £59.99

Textbook

Cryptanalysis of Number Theoretic Ciphers

Rutgers University, Piscataway, New Jersey, USA

Samuel S. Wagstaff, Jr.

Barry Tesman Dickinson College, Carlisle, Pennsylvania, USA

Purdue University, West Lafayette, Indiana, USA Series: Computational Mathematics, 5

Now with solutions to selected problems, this bestselling textbook presents the tools of combinatorics from an applied point of view. It focuses on three basic problems of combinatorics: counting, existence, and optimization problems. The text contains many examples from the biological, computer, and social sciences, including disease screening, genome mapping, satellite communication, search engines, telecommunications traffic, web data, sound systems, oil drilling, dynamic labor markets, data mining, and distributed computing. It also offers numerous references to the literature of combinatorics and its applications that enable readers to delve more deeply into the topics.

At the heart of modern cryptographic algorithms lies computational number theory. Written by a number theorist and practicing cryptographer, this book takes readers from basic number theory through the inner workings of ciphers and protocols to their strengths and weaknesses. Part One provides the mathematical background for cryptography. Part Two describes a selection of cryptographic algorithms, most of which use number theory. Finally, the book presents methods of attack on the cryptographic algorithms and assesses their effectiveness. This book has a broad and eager audience, from those in the military to Internet administration and from E-commerce practitioners to hackers.

Catalog no. K10016, ISBN: 978-1-4200-9982-9 June 2009, 7 x 10, 848 pp. Suggested Price: $99.95 / £60.99

Catalog no. C1534, ISBN: 978-1-58488-153-7 December 2002, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $93.95 / £59.99

23


For more information and a complete list Cryptanalysis of RSA and Its Variants M. Jason Hinek

Handbook of Applied Cryptography

Cryptography & Coding Theory

iCORE Information Security Lab, Calgary, Canada Series: Chapman & Hall/CRC Cryptography and Network Security, 3

Alfred J. Menezes, Paul C. van Oorschot, & Scott A. Vanstone

Focusing on mathematical attacks that exploit the structure of RSA and specific parameter choices, this book provides an up-to-date collection of the most wellknown attacks on RSA and its main variants, including CRT-RSA, multi-prime RSA, and multi-power RSA. It treats the cryptanalysis of the main variants of RSA as a major topic—one of the first books to do so. With detailed proofs and justifications of the attacks, the book includes the most recent results for lattice techniques based on Coppersmith’s methods and differentiates between provable attacks and those based on assumptions.

The Handbook of Applied Cryptography serves as a valuable reference for novices as well as for experts. It provides a multifunctional treatment that introduces the more practical aspects of both conventional and public-key cryptography and offers a valuable source of techniques and algorithms for serious practitioners. The book contains enough abstraction for theoreticians and provides enough detail to actually allow implementation of the algorithms discussed. With outstanding organization that allows easy access to all information, it includes more than 200 algorithms and protocols, extensive cross-referencing, and more than 1,250 references that include brief comments on each entry.

Catalog no. C7518, ISBN: 978-1-4200-7518-2 July 2009, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $79.95 / £49.99

Textbook

Cryptography Theory and Practice, Third Edition Douglas R. Stinson University of Waterloo, Ontario, Canada Series: Discrete Mathematics and Its Applications, 30

24

Textbook

Series: Discrete Mathematics and Its Applications, 4

Catalog no. 8523, ISBN: 978-0-8493-8523-0 October 1997, 7 x 10, 816 pp. Suggested Price: $89.95 / £42.99

Handbook of Elliptic and Hyperelliptic Curve Cryptography Edited by

Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange, Kim Nguyen, & Frederik Vercauteren Series: Discrete Mathematics and Its Applications, 28

The third edition of this best-selling text provides unparalleled coverage of the use of cryptographic protocols that establish the steps that must be taken before any type of secret transmission can be completed. The author shows readers how the various parties to the transaction establish their cryptographic identities or keys, covers many of the cryptographic tools used in network security, and discusses topics that include copyright protection techniques and public key infrastructure. Cryptography: Theory and Practice, Third Edition is an outstanding text for senior undergraduate and graduate courses but also a useful reference for professionals interested in network security and cryptographic protocols.

The Handbook of Elliptic and Hyperelliptic Curve Cryptography provides an exhaustive study of virtually all of the mathematical aspects of curve-based public key cryptography. This carefully constructed volume explores both theory and applications. It provides a wealth of ready-to-use algorithms enabling fast implementation along with recommendations for selecting appropriate algorithms. The book also considers side-channel attacks and implementation aspects of smart cards. Broad, comprehensive coverage makes this a complete resource for elliptic and hyperelliptic curve cryptography and an invaluable reference to anyone interested in this exciting field.

Catalog no. C5084, ISBN: 978-1-58488-508-5 November 2005, 6-1/8 x 9-1/4, 616 pp. Suggested Price: $69.95 / £44.99

Catalog no. C5181, ISBN: 978-1-58488-518-4 July 2005, 7 x 10, 848 pp. Suggested Price: $104.95 / £66.99

Textbook Number Theory and Cryptography, Second Edition

Introduction to Cryptography with Mathematical Foundations and Computer Implementations

Lawrence C. Washington

Alexander Stanoyevitch

University of Maryland, College Park, USA Series: Discrete Mathematics and Its Applications, 43

California State University, Carson, USA Series: Discrete Mathematics and Its Applications, 58

Like its bestselling predecessor, this second edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications. It now includes new chapters on isogenies and hyperelliptic curves, a more complete treatment of the Tate–Lichtenbaum pairing, alternative coordinate systems and related computational issues, and Doud’s analytic method for computing torsion on elliptic curves over Q. This edition also discusses how to perform computations with elliptic curves in several popular computer algebra systems. Basic exercises appear at the end of each chapter.

Intended for sophomore-level introductory courses in mathematics and computer science, this text focuses on the central topics of cryptography and provides background material where necessary, including coverage of number theory. It is designed to accommodate various degrees of computer implementation, ranging from no computer usage, to using platform-independent applets, to writing programs. The text presents numerous worked-out examples, extensive end-ofchapter exercise sets, and additional exercises throughout. Appendices contain solutions and answers to most odd-numbered exercises. The book’s website offers downloadable applets as well as programs that are replete with explanatory comments.

Elliptic Curves

Catalog no. C7146, ISBN: 978-1-4200-7146-7 April 2008, 6-1/8 x 9-1/4, 536 pp. Suggested Price: $89.95 / £57.99

Catalog no. K10916, ISBN: 978-1-4398-1763-6 May 2010, 7 x 10, 536 pp. Suggested Price: $89.95 / £44.99


Textbook

Introduction to Modern Cryptography University of Maryland, College Park, USA

Theory and Applications of Higher-Dimensional Hadamard Matrices

Yehuda Lindell

Yi Xian Yang, Xin Xin Niu, & Cheng Qing Xu

Principles and Protocols Jonathan Katz Bar-Ilan University, Ramat Gan, Israel Series: Chapman & Hall/CRC Cryptography and Network Security

This text provides a rigorous yet accessible treatment of modern cryptography, focusing on formal definitions, assumptions, and rigorous proofs of security. The first half of the book gives an extensive treatment of private-key cryptography, including encryption, message authentication, and design principles for block ciphers such as the DES and the AES. The second half focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed for the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.

Beijing University of Posts and Telecommunication, China

Of interest to mathematicians as well as engineers and technicians in computer science and telecommunications, this book deals with the theory of Hadamard matrices and its applications to various fields, in particular, coding theory, cryptography, and telecommunications. The first two parts of the book deal with the second and lower dimensional cases of these matrices. The third part covers higher dimensional cases, and the last part of the book is devoted to applications—specifically those used in coding theory and cryptography—along with more basic applications in telecommunications. Catalog no. K10942, ISBN: 978-1-4398-1807-7 February 2010, 7 x 10, 437 pp. Suggested Price: $99.95 / £63.99

Catalog no. C5513, ISBN: 978-1-58488-551-1 August 2007, 6-1/8 x 9-1/4, 552 pp. Suggested Price: $79.95 / £39.99

Textbook

Introduction to Network Security Douglas Jacobson Iowa State University, Ames, USA Series: Chapman & Hall/CRC Computer & Information Science, 19

Introduction to Network Security maintains its focus on the network and its vulnerabilities, protocols, and security solutions. This book discusses network architecture, the functions of layers in a typical network, and network-based attacks including header, protocol, and authentication attacks. Using a bottomup approach, it provides understanding of the vulnerabilities and mechanisms of each layer of network security. A define-attack-defend methodology is used throughout the text to introduce relevant protocols. It also presents homework problems, laboratory experiments, and appendices that demonstrate how to develop a low-cost lab environment and that offer an overview of cryptology. Catalog no. C5432, ISBN: 978-1-58488-543-6 November 2008, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $79.95 / £39.99

Textbook CD Included

Understanding and Applying Cryptography and Data Security Adam J. Elbirt The Charles Stark Draper Laboratory, Cambridge, Massachusetts, USA

Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. It focuses on cryptographic algorithms, such as symmetric- and publickey, before dealing with construction of cryptographic protocols. The author examines tradeoffs between code size, hardware logic requirements, memory usage, speed, power consumption, and more. He includes examples and problems to evaluate implementation results of several software and hardware languages. He also provides C and VHDL frameworks and testing environments on CD. Catalog no. AU6160, ISBN: 978-1-4200-6160-4 April 2009, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $79.95 / £44.99

Biological Data Mining Edited by

Textbook

Jake Y. Chen

Introduction to Number Theory

Indiana University-Purdue University, Indianapolis, USA

Martin Erickson & Anthony Vazzana

Stefano Lonardi University of California, Riverside, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery, 11

Truman State University, Kirksville, Missouri, USA Series: Discrete Mathematics and Its Applications, 41

Highlighting both fundamental and advanced topics, this introduction provides all of the tools to achieve a solid foundation in number theory. It connects number theory to other branches of mathematics and to real-world problems, such as the ISBN system, RSA codes, and the construction of tournaments. Coverage of special topics includes elliptic curves and Hilbert’s tenth problem. The text uses Mathematica® and Maple™ calculations to elucidate and expand on the theory covered, features numerous worked examples and exercises, and provides a supplemental web page with Mathematica® notebooks, Maple worksheets, and links to Internet resources. Catalog no. C9373, ISBN: 978-1-58488-937-3 October 2007, 6-1/8 x 9-1/4, 536 pp. Suggested Price: $89.95 / £39.99

This volume presents comprehensive data mining concepts, theories, and applications in current biological and medical research. The first section of the book discusses challenges and opportunities in analyzing and mining biological sequences and structures to gain insight into molecular functions. The second section addresses emerging computational challenges in interpreting highthroughput Omics data. The book then describes the relationships between data mining and related areas of computing, including knowledge representation, information retrieval, and data integration for structured and unstructured biological data. The last part explores data mining opportunities for biomedical applications. Catalog no. C6847, ISBN: 978-1-4200-8684-3 September 2009, 6-1/8 x 9-1/4, 733 pp. Suggested Price: $99.95 / £63.99

Cryptography & Coding Theory / Data Mining & Knowledge Disvovery

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

25


For more information and a complete list Data Mining for Design and Marketing Chemical Information Mining

Edited by

Facilitating Literature-Based Discovery

University of Tokyo, Japan

Edited by

Katsutoshi Yada

Debra L. Banville

Kansai University, Osaka, Japan Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery, 6

AstraZeneca Pharmaceuticals, Wilmington, Delaware, USA

Data Mining & Knowledge Disvovery 26

Yukio Ohsawa

This book focuses on information extraction issues, highlights available solutions, and underscores the value of these solutions to academic and commercial scientists. After introducing the drivers behind chemical text mining, the book discusses chemical semantics. The contributors describe the tools that identify and convert chemical names and images to structure-searchable information. They also explain natural language processing, name entity recognition concepts, and semantic web technologies. Following a section on current trends in the field, the text looks at where information mining approaches fit into research needs within the life sciences. Catalog no. 76493, ISBN: 978-1-4200-7649-3 December 2008, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $99.95 / £63.99

Through the techniques of data mining, this book demonstrates how to effectively design business processes and develop competitive products and services. It discusses how data mining can identify valuable consumer patterns, which aid marketers and designers in detecting consumers’ needs. The book also explores visualization tools based on the computational methods of data mining. Discourse analysis, chance discovery, knowledge discovery, formal concept analysis, and an adjacency matrix are just some of the novel approaches covered. The book explains how these methods can be applied to website design, personalized e-commerce support tools, and more. Catalog no. C7019, ISBN: 978-1-4200-7019-4 January 2009, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $89.95 / £54.99

Computational Methods of Feature Selection Edited by

Arizona State University, Tempe, USA

Data Mining for Global Trends in Mountain Biodiversity

Hiroshi Motoda

Edited by

AFOSR/AOARD, Tokyo, Japan Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

Eva M. Spehn & Christian Körner

Huan Liu

Highlighting current research issues, this clear, concise, and coherent volume introduces the basic concepts and principles, state-of-the-art algorithms, and inventive applications of feature selection. With excellent surveys, practical guidance, and comprehensive tutorials from leading experts, it chronicles the novel developments of feature selection that have emerged in recent years, including causal feature selection and Relief. The book also presents the latest methodologies and algorithms, such as the Las Vegas, Monte Carlo, and Bayes risk-weighted vector quantization algorithms, and contains real-world case studies from a variety of areas, including text classification, web mining, and bioinformatics. Catalog no. C8784, ISBN: 978-1-58488-878-9 October 2007, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $93.95 / £59.99

Constrained Clustering Advances in Algorithms, Theory, and Applications Edited by

Sugato Basu, Ian Davidson, & Kiri Wagstaff Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

This volume encompasses many types of constraints and clustering methods as well as delivers thorough coverage of the capabilities and limitations of constrained clustering. With contributions from industrial researchers and leading academic experts who pioneered the field, it provides a well-balanced combination of theoretical advances, key algorithmic development, and novel applications. The book presents various types of constraints for clustering and describes useful variations of the standard problem of clustering under constraints. It also demonstrates the application of clustering with constraints to relational, bibliographic, and video data. Catalog no. C9969, ISBN: 978-1-58488-996-0 August 2008, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $79.95 / £49.99

University of Basel, Switzerland

Thanks to advances in electronic archiving of biodiversity data and the digitization of climate and other geophysical data, a new era in biogeography, functional ecology, and evolutionary ecology has begun. In this book Christian Körner, Eva M. Spehn, and a team of experts from the Global Mountain Biodiversity Assessment of DIVERSITAS explore two of the hottest subjects in science and technology: biodiversity and data mining. They demonstrate how to harness the scientific power of biological databases for furthering ecological and evolutionary theory. The text provides different methodological approaches and examples of successful mining of geo-referenced data in mountain regions on various scales. Catalog no. 83694, ISBN: 978-1-4200-8369-9 September 2009, 7 1/2 x 10, 200 pp. Suggested Price: $109.95 / £69.99

Data Mining for Intelligence, Fraud & Criminal Detection Advanced Analytics & Information Sharing Technologies Christopher Westphal CEO, Visual Analytics, Frederick, Maryland, USA

Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the types of patterns exposed in one domain can often be translated into another. This book reviews the commonality, framework, and infrastructures necessary to implement complex analytical systems. It addresses analytical approaches, technologies, and methodologies, as well as information sharing and how current fusion-centers are being architected. Catalog no. AU6723, ISBN: 978-1-4200-6723-1 December 2008, 7 x 10, 440 pp. Suggested Price: $69.95 / £44.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Geographic Data Mining and Knowledge Discovery

Data Mining Methods and Applications

Second Edition

Edited by

University of Utah, Salt Lake City, USA

Kenneth D. Lawrence, Stephan Kudyba, & Ronald K. Klimberg Addressing a variety of organizational issues, Data Mining Methods and Applications presents a compilation of recent research works on data mining and forecasting techniques, including multivariate, evolutionary, and neural net methods. This book focuses in particular on data mining techniques used for conducting marketing research. Written by a wide range of contributors from academia and industry, this text provides detailed descriptions of applications in numerous areas, such as finance, engineering, healthcare, economics, science, and management. Real-world case studies that are supported by theoretical chapters offer guidance on how to actually perform data mining methods. Catalog no. AU8522, ISBN: 978-0-8493-8522-3 December 2007, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $99.95 / £63.99

Edited by

Harvey J. Miller Jiawei Han University of Illinois at Urbana-Champaign, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery, 8

This second edition reflects the current state of the art in the field. It includes updated material on geographic knowledge discovery, geographic data warehouse research, map cubes, spatial dependency, spatial clustering methods, clustering techniques for trajectory data, INGENS 2.0, and geovisualization techniques. Recognizing the growth in mobile technologies and trajectory data, this edition provides five new chapters on knowledge discovery from spatiotemporal and mobile objects databases. It also contains new chapters on data quality issues, medoid computation, geographically weighted regression, and an integrated approach to multivariate analysis and geovisualization. Catalog no. C3974, ISBN: 978-1-4200-7397-3 May 2009, 6-1/8 x 9-1/4, 486 pp. Suggested Price: $89.95 / £54.99

Learning by Case Studies

Information Discovery on Electronic Health Records

Luis Torgo

Edited by

University of Porto, Portugal Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

Vagelis Hristidis

Data Mining with R

This book provides a self-contained, introduction to the use of R for exploratory data mining and machine learning. Employing a practical, learn-by-doing approach, the author presents a series of representative case studies from the fields of ecology, financial prediction, fraud detection, and bioinformatics, including all of the necessary steps, code, and data. These examples demonstrate how to address important data mining issues, such as handling datasets with too many variables, and illustrate key concepts including outlier detection and semisupervised learning. A supporting web page provides additional code and data for further study. Catalog no. K10510, ISBN: 978-1-4398-1018-7 June 2010, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $79.95 / £49.99

Exploratory Data Analysis with MATLAB® Wendy L. Martinez The Department of Defense, Fredericksburg, Virginia, USA

Angel R. Martinez Series: Chapman & Hall/CRC Computer Science & Data Analysis, 4

The first book to use MATLAB to illustrate computational aspects of EDA, Exploratory Data Analysis with MATLAB® presents the methods of EDA from a computational perspective. The authors extensively use MATLAB® code and algorithm descriptions to provide state-of-the-art techniques for finding patterns and structure in data. Addressing theory, they also incorporate many annotated references to direct readers to the more theoretical aspects of the methods. The book presents an approach using only the basic functions from MATLAB® and the MATLAB® Statistics Toolbox in order to be more accessible and enduring. It also contains pseudo-code to enable users of other software packages to implement the algorithms. ®

Catalog no. C3669, ISBN: 978-1-58488-366-1 November 2004, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $83.95 / £53.99

Data Mining & Knowledge Disvovery

Textbook

Florida International University, Miami, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery, 12

With contributions from a multi-disciplinary team of experts, this book presents a comprehensive overview of current research methods and future directions in information discovery using Electronic Health Records (EHRs). To provide a deeper understanding of the process of information discovery with regard to EHRs, the book discusses essential issues involved in preparing and extracting medical data to build a record. Privacy concerns with regard to accessing EHRs are presented by domain experts from legal and computer science perspectives. The book also explores emerging techniques for searching and mining useful knowledge from EHRs and includes a detailed overview of mining medical images. Catalog no. C9038, ISBN: 978-1-4200-9038-3 December 2009, 6-1/8 x 9-1/4, 242 pp. Suggested Price: $89.95 / £57.99

Textbook

Interactive Graphics for Data Analysis Principles and Examples Martin Theus & Simon Urbanek Series: Chapman & Hall/CRC Computer Science & Data Analysis, 14

This full-color text discusses EDA and how interactive graphical methods can help gain insights as well as generate new questions and hypotheses from datasets. It presents the fundamental principles of graphical data analysis and includes detailed case studies that explain how the principles can be applied to the analysis of real-world datasets. The authors employ Mondrian software throughout to generate plots and use R code to quantify results precisely, test statistical hypotheses, and rearrange data in a nontrivial way. They provide exercises at the end of each chapter and offer course suggestions, slides, and extra code on the book’s website. Catalog no. C5947, ISBN: 978-1-58488-594-8 October 2008, 6-1/8 x 9-1/4, 290 pp. Suggested Price: $79.95 / £39.99

27


For more information and a complete list

Introduction to Data Technologies Paul Murrell

Edited by

Data Mining & Knowledge Disvovery

The University of Auckland, New Zealand Series: Chapman & Hall/CRC Computer Science & Data Analysis, 15

Auroop R. Ganguly, João Gama, Olufemi A. Omitaomu, Mohamed Gaber & Ranga Raju Vatsavai

Written by a member of the R Development Core Team, this resource provides important information on how to work with research data. It contains a collection of diverse, computer-related topics, connecting them through numerous, realworld case studies. The author describes open source technologies and open standards and devotes separate chapters to each computer language, including HTML, XML, SQL, and R. Explanatory diagrams aid in understanding important concepts, helping readers perform research tasks with ease. In addition, the author’s website includes a suite of exercises as well as the code and data sets used in the case studies.

Addressing the issues challenging the sensor community, this book presents innovative solutions in offline data mining and real-time analysis of sensor or geographically distributed data. Illustrated with case studies, it discusses the challenges and requirements for sensor data-based knowledge discovery solutions in high-priority application. The book then explores the fusion between heterogeneous data streams from multiple sensor types and applications in science, engineering, and security. Bringing together researchers from academia, government, and the private sector, this book delineates the application of knowledge modeling in data intensive operations.

Catalog no. C6517, ISBN: 978-1-4200-6517-6 February 2009, 6-1/8 x 9-1/4, 418 pp. Suggested Price: $69.95 / £42.99

Catalog no. 82329, ISBN: 978-1-4200-8232-6 December 2008, 6-1/8 x 9-1/4, 215 pp. Suggested Price: $89.95 / £57.99

Knowledge Discovery for Counterterrorism and Law Enforcement

Meta-Analysis in Stata

David Skillicorn Queen’s University, Kingston, Ontario, Canada Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

28

Knowledge Discovery from Sensor Data

Series: Industrial Innovation

An Updated Collection from the Stata Journal Edited by

Jonathan A. C. Sterne

Based on cutting-edge research, Knowledge Discovery for Counterterrorism and Law Enforcement presents a new approach to knowledge discovery in adversarial settings. Focusing on the four main applications areas (prediction, clustering, relationship discovery, and textual analysis), it discusses opportunities for concealment and recommends tactics that can aid in detecting them. Designed for professionals working in law enforcement and intelligence, social policymakers, and researchers in knowledge discovery, the book reviews technologies that are currently available and describes their effectiveness in dealing with these issues.

This collection provides detailed descriptions of both standard and advanced meta-analytic methods and their implementation in Stata. Readers will gain access to the statistical methods behind the rapid increase in the number of metaanalyses reported in the social science and medical literature. The book shows how to conduct and interpret meta-analyses as well as produce highly flexible graphical displays. Using meta-regression, it examines reasons for between-study variability in effect estimates. The book also employs advanced methods for the meta-analysis of diagnostic test accuracy studies, dose-response meta-analysis, meta-analysis with missing data, and multivariate meta-analysis.

Catalog no. C7399, ISBN: 978-1-4200-7399-7 November 2008, 6-1/8 x 9-1/4, 332 pp. Suggested Price: $79.95 / £49.99

Catalog no. N10105, ISBN: 978-1-59718-049-8 March 2009, 263 pp. Suggested Price: $49.95 / £31.99

Multimedia Data Mining Knowledge Discovery from Data Streams JOAO GAMA

A Systematic Introduction to Concepts and Theory Zhongfei Zhang State University of New York, Binghamton, USA

Ruofei Zhang

LIAAD-University of Porto, Portugal Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

Yahoo Inc., Sunnyvale, California, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery, 5

In many modem applications, data are best modeled not as persistent tables but as transient data streams. Traditional methods of knowledge discovery do not work well in dynamic environments, where data continuously flow at high speeds. Presenting current research on knowledge discovery methods for data streams, this book provides a comprehensive introduction to this cutting-edge area of research in data mining and machine learning. Focusing on a variety of data stream mining algorithms, it covers basic streaming methods, exploratory models from data streams, and predictive models.

This novel, self-contained book introduces state-of-the-art multimedia data mining concepts and theory. It reviews the theoretical foundations of the subject, including feature extraction and representations, knowledge representations, statistical learning theory, and soft computing theory. Clarifying perplexing topics scattered throughout research papers in the field, the book explores the relationship of multimedia data mining to other related areas, such as artificial intelligence. It also highlights various applications that illustrate how multimedia data mining can solve many real-world problems, such as image annotation, video search, and audio classification.

Catalog no. K11254, ISBN: 978-1-4398-2611-9 May 2010, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $79.95 / £49.99

Catalog no. C9667, ISBN: 978-1-58488-966-3 December 2008, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $89.95 / £57.99


Next Generation of Data Mining Edited by

Relational Data Clustering

Hillol Kargupta, Jiawei Han, Philip S. Yu, Rajeev Motwani, & Vipin Kumar

Models, Algorithms, and Applications Bo Long, Zhongfei Zhang, & Philip S. Yu

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

Focusing on the future of data mining, this volume addresses a variety of emerging data mining challenges and potential solutions. It shows how innovative data mining tools and techniques can be applied in a range of areas, including e-science, engineering, social science, ecology, finance, and medicine. With contributions from many well-respected researchers and practitioners in the community, the book examines the algorithms, middleware, infrastructure, and privacy policies associated with ubiquitous, distributed, and high performance data mining. It also discusses the impact of new technologies on data mining and provides recommendations for privacy-preserving mechanisms.

This is the first book to present a comprehensive overview of relational data clustering in data mining research. The book reflects the recent emergence of relational data clustering as an important field of data clustering, with applications in text mining, social network analysis, collaborative filtering, and bioinformatics. It presents an in-depth, systematic discussion of the models, algorithms, and applications for relational data clustering. It also covers recently emerging models in relational data clustering, including graph-based models, matrix factorizationbased models, and probabilistic models.

Catalog no. C5867, ISBN: 978-1-4200-8586-0 December 2008, 6-1/8 x 9-1/4, 601 pp. Suggested Price: $89.95 / £57.99

Pattern Recognition Algorithms for Data Mining Sankar K. Pal Indian Statistical Institute, Calcutta, India

Pabitra Mitra Indian Institute of Technology, Kanpur, India Series: Chapman & Hall/CRC Computer Science & Data Analysis, 3

This valuable text addresses different pattern recognition (PR) tasks in a unified framework with both theoretical and experimental results. Tasks covered include data condensation, feature selection, case generation, clustering/classification, and rule generation and evaluation. Organized into eight chapters, the book begins by introducing PR, data mining, and knowledge discovery concepts. The authors proceed to analyze the tasks of multi-scale data condensation and dimensionality reduction. Then they explore the problem of learning with support vector machine (SVM), and conclude by highlighting the significance of granular computing for different mining tasks in a soft paradigm. Catalog no. C4576, ISBN: 978-1-58488-457-6 May 2004, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $97.95 / £61.99

Privacy-Aware Knowledge Discovery

Catalog no. C7261, ISBN: 978-1-4200-7261-7 May 2010, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $79.95 / £49.99

Social Computing A Data Mining Perspective Huan Liu, Jianping Zhang, & Arunabha Sen Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

This book begins with a brief introduction to social computing and a review of classic graph theory and game theory. It then examines the data used to construct social networks, focusing on emerging Web 2.0 technologies and social networking websites, such as Facebook and MySpace. The book also explores data mining for social network extraction and analysis, presenting link and graph mining algorithms, such as subgraph discovery and clustering. In the last section, the authors provide case studies to illustrate concepts and principles as well as to demonstrate how to integrate components in order to solve real-world problems. Catalog no. C8330, ISBN: 978-1-4200-8330-9 May 2010, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $69.95 / £44.99

Novel Applications and New Techniques

Data Mining Using SAS Applications

Edited by

Second Edition

Francesco Bonchi

George Fernandez

Yahoo! Research, Barcelona, Spain

Elena Ferrari University of Insubria, Italy Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

Data Mining & Knowledge Disvovery

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

University of Nevada, Reno, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

Privacy protection in data mining is a critical issue that has been a research focus in recent years. This book covers privacy and anonymity for data mining applications. In particular, it presents novel application domains, such as data mining of biomedical and healthcare data. The book addresses spatial, temporal, and spatio-temporal data as well graphs, links, and social networks. It also discusses new anonymization and privacy-preserving techniques, open problems, and future challenges. The final section details privacy-aware data publishing and mining of data streams, sensor networks data, and mobile networks data.

Most books on data mining focus on principles and furnish few instructions on how to carry out a project. Statistical Data Mining Using SAS Applications not only introduces concepts but also enables readers to understand and apply data mining methods using downloadable SAS macro-call files. These techniques stress the use of visualization for studying the structure of data and the validity of statistical models. With the SAS macro-call files, readers explore: techniques for creating training and validation samples; exploratory graphical techniques; frequency analysis for categorical data; unsupervised and supervised learning methods; model validation techniques; and how to convert PC databases to SAS data.

Catalog no. K10204, ISBN: 978-1-4398-0365-3 June 2010, 6-1/8 x 9-1/4, 450 pp. Suggested Price: $89.95 / £57.99

Catalog no. K10535, ISBN: 978-1-4398-1075-0 May 2010, 6-1/8 x 9-1/4, 450 pp. Suggested Price: $89.95 / £57.99

29


For more information and a complete list

Data Mining & Knowledge Disvovery / Discrete Systems 30

Temporal Data Mining

Understanding Complex Datasets Data Mining with Matrix Decompositions

Theophano Mitsa

David Skillicorn

Software Consultant Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery, 12

Queen’s University, Kingston, Ontario, Canada Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery

In contrast to traditional data mining methods, temporal data mining discovers dynamic knowledge related to activity, behavior, and evolution. This book presents the fundamentals of temporal data mining and its wide range of applications in medicine, finance, geographical information systems, and other areas. It covers essential data mining topics from the perspective of temporal data mining, addressing temporal databases and data models, temporal data representation and similarity computation, and temporal pattern detection. The author employs illustrative examples to explain key concepts and algorithms.

Focusing on data mining mechanics and applications, this book explores the most common matrix decompositions, including singular value, semidiscrete, independent component analysis, non-negative matrix factorization, and tensors. It shows how these matrix decompositions can be used to analyze large datasets in a broad range of application areas, such as information retrieval, topic detection, geochemistry, astrophysics, microarray analysis, process control, counterterrorism, and social network analysis. The book also discusses several important theoretical and algorithmic problems of matrix decompositions and provides MATLAB® scripts to generate examples of matrix decompositions.

Catalog no. C9765, ISBN: 978-1-4200-8976-9 March 2010, 6-1/8 x 9-1/4, 376 pp. Suggested Price: $79.95 / £49.99

Catalog no. C8326, ISBN: 978-1-58488-832-1 May 2007, 6-1/8 x 9-1/4, 260 pp. Suggested Price: $73.95 / £46.99

Text Mining Classification, Clustering, and Applications Edited by

Ashok Srivastava

Scientific Data Management

Ames Research Center, Moffett Field, California, USA

Challenges, Technology, and Deployment

Mehran Sahami

Edited by

Stanford University, California, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery, 10

Arie Shoshani & Doron Rotem

Giving a broad perspective of the field from numerous vantage points, Text Mining focuses on statistical methods for text mining and analysis. It examines methods to automatically cluster and classify text documents and applies these methods in a variety of areas, including adaptive information filtering, information distillation, and text search. The book begins with the classification of documents into predefined categories and then describes novel methods for clustering documents into groups that are not predefined. It concludes with various text mining applications that have significant implications for future research and industrial use.

This work describes cutting-edge technologies and solutions for managing and analyzing vast amounts of scientific data. It begins with coverage of efficient storage systems, discussing how to write and read large volumes of data without slowing the simulation, analysis, or visualization processes. The book then focuses on the efficient data movement and management of storage spaces and explores emerging database systems for scientific data. It also addresses how to best organize data for analysis purposes, how to effectively conduct searches over large datasets, how to successfully automate multistep scientific process workflows, and how to automatically collect metadata and lineage information.

Catalog no. C5940, ISBN: 978-1-4200-5940-3 June 2009, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $79.95 / £48.99

Catalog no. C6980, ISBN: 978-1-4200-6980-8 December 2009, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $89.95 / £57.99

The Top Ten Algorithms in Data Mining

Textbook

Edited by

Lawrence Berkeley National Lab, Berkeley, California, USA Series: Chapman & Hall/CRC Computational Science, 3

University of Vermont, Burlington, USA

Advanced Number Theory with Applications

Vipin Kumar

Richard A. Mollin

University of Minnesota, Minneapolis, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery, 9

University of Calgary, Alberta, Canada Series: Discrete Mathematics and Its Applications

Xindong Wu

Identifying some of the most influential algorithms that are widely used in the data mining community, this volume provides a description of each algorithm, discusses the impact of the algorithms, and reviews current and future research on the algorithms. Thoroughly evaluated by independent reviewers, each chapter focuses on a particular algorithm and is written by either the original authors of the algorithm or world-class researchers who have extensively studied the respective algorithm. The book concentrates on the following important algorithms: C4.5, k-Means, SVM, Apriori, EM, PageRank, AdaBoost, kNN, Naive Bayes, and CART. Catalog no. C9641, ISBN: 978-1-4200-8964-6 April 2009, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $79.95 / £48.99

By covering a wide range of algebraic, analytic, combinatorial, cryptographic, and geometric aspects of number theory, this text provides the most up-to-date and comprehensive material for a second course in this field. With numerous examples and exercises, it begins with coverage of algebraic number theory, binary quadratic forms, Diophantine approximation, arithmetic functions, p-adic analysis, Dirichlet characters, density, and primes. The author then applies these tools to Diophantine equations, before developing elliptic curves and modular forms. He also presents Fermat’s Last Theorem, the ABC conjecture, and sieve methods. A solutions manual is available for qualifying instructors. Catalog no. C8328, ISBN: 978-1-4200-8328-6 August 2009, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $89.95 / £57.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Textbook

Gary Chartrand & Ping Zhang Western Michigan University, Kalamazoo, USA

Design Theory Second Edition C.C. Lindner & C.A. Rodger

Series: Discrete Mathematics and Its Applications, 45

Auburn University, Alabama, USA Series: Discrete Mathematics and Its Applications, 46

Beginning with the origin of the four color problem in 1852, the field of graph colorings has developed into one of the most popular areas of graph theory. Introducing graph theory with a coloring theme, this book explores connections between major topics in graph theory and graph colorings, including Ramsey numbers and domination, as well as emerging topics, such as list colorings, rainbow colorings, distance colorings related to the channel assignment problem, and vertex/edge distinguishing colorings. The authors include historical, applied, and algorithmic discussions. They also provide many exercises and suggestions for study projects.

Through formal descriptions and numerous illustrations, this text presents some of the most important techniques used for constructing combinatorial designs. This edition contains extensive new material on embeddings, directed designs, universal algebraic representations of designs, and intersection properties of designs. It focuses on construction methods to provide readers with the expertise to produce nonstandard experimental designs when needed. The text also includes important results in combinatorial designs, such as the existence of orthogonal Latin squares, balanced incomplete and pairwise balanced designs, affine and projective planes, and quadruple systems.

Catalog no. C8008, ISBN: 978-1-58488-800-0 September 2008, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $99.95 / £63.99

Catalog no. C2965, ISBN: 978-1-4200-8296-8 October 2008, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $89.95 / £57.99

A Combinatorial Approach to Matrix Theory and Its Applications

Textbook

Richard A. Brualdi University of Wisconsin, Madison, USA

Dragos Cvetkovic Mathematical Institute SANU, Belgrade, Serbia Series: Discrete Mathematics and Its Applications, 44

Placing combinatorial and graph-theoretical tools at the forefront of the development of matrix theory, this book uses graphs to explain basic matrix construction, formulas, computations, ideas, and results. It presents material rarely found in other books at this level, including Gersgorin’s theorem and its extensions, the Kronecker product of matrices, sign-nonsingular matrices, and the evaluation of the permanent matrix. The authors provide a combinatorial argument for the classical Cayley–Hamilton theorem and a combinatorial proof of the Jordan canonical form of a matrix. They also describe several applications of matrices in electrical engineering, physics, and chemistry. Catalog no. C8223, ISBN: 978-1-4200-8223-4 August 2008, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $89.95 / £57.99

Combinatorics of Compositions and Words Silvia Heubach

Discrete Mathematics Proofs, Structures and Applications, Third Edition R. Garnier & J. Taylor This third edition continues to provide a rigorous yet accessible exposition of discrete mathematics, including the core mathematical foundation of computer science. In the expanded first chapter, the text includes a new section on the formal proof of the validity of arguments in propositional logic before moving on to predicate logic. This edition also contains a new chapter on elementary number theory and congruences. This chapter explores groups that arise in modular arithmetic and RSA encryption, a widely used public key encryption scheme that enables practical and secure means of encrypting data. Catalog no. K10650, ISBN: 978-1-4398-1280-8 November 2009, 6-1/8 x 9-1/4, 843 pp. Suggested Price: $89.95 / £39.99

Textbook

Fundamental Number Theory with Applications

California State University, Los Angeles, USA

Second Edition

Toufik Mansour

Richard A. Mollin

University of Haifa, Israel Series: Discrete Mathematics and Its Applications, 56

University of Calgary, Alberta, Canada Series: Discrete Mathematics and Its Applications, 42

Highlighting both established and new results, this book provides an introduction to the methods used in the combinatorics of pattern avoidance and pattern enumeration in compositions and words. It describes the strengths and weaknesses of a wide variety of solution techniques and approaches, presents a historical overview of the field, and illustrates new methods and definitions with worked examples. The text also incorporates the use of Maple™, Mathematica®, and C++ to perform computations. It includes a comprehensive bibliography, exercises at the end of each chapter, and directions for future research. A solutions manual is available for qualifying instructors.

This updated edition presents a mathematically rigorous yet easy-to-follow treatment of the fundamentals and applications of the subject. The second edition removes all advanced material to be even more accessible in scope; adds new fundamental material, including partition theory, generating functions, and combinatorial number theory; and expands coverage of random number generation, Diophantine analysis, and additive number theory. It also includes more applications to cryptography, primality testing, and factoring as well as nearly 70 biographies of major contributors to the field. Appendices of background material and almost 400 exercises supplement the coverage. A solutions manual is available for qualifying instructors.

Catalog no. C7267, ISBN: 978-1-4200-7267-9 July 2009, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $89.95 / £57.99

Discrete Systems

Chromatic Graph Theory

Catalog no. C6659, ISBN: 978-1-4200-6659-3 February 2008, 6-1/8 x 9-1/4, 384 pp. Suggested Price: $94.95 / £59.99

31


For more information and a complete list Textbook

Graph Theory and Its Applications

Handbook of Discrete and Computational Geometry

Second Edition

Second Edition

Jonathan L. Gross

Edited by

Columbia University, New York, USA

Jacob E. Goodman

Jay Yellen Rollins College, Winter Park, Florida, USA Series: Discrete Mathematics and Its Applications, 29

Discrete Systems

Already the most widely used textbook on graph theory, Gross and Yellen’s Graph Theory and Its Applications enhances its appeal with this expanded second edition. The superior explanations, original applications, and abundance of study problems that positioned it as the preferred selection of classroom professors worldwide are still to be found. Nearly 200 pages have been added to the second edition including two new chapters, hundreds of new exercises, mostly nonroutine; and illustrated solutions and hints to selected exercises. The authors also extensively revised and reorganized more than half of the previously existing chapters. Catalog no. C505X, ISBN: 978-1-58488-505-4 September 2005, 7 x 10, 800 pp. Suggested Price: $89.95 / £45.99

City College, New York, New York, USA

Joseph O’Rourke Smith College, Northampton, Massachusetts, USA Series: Discrete Mathematics and Its Applications, 20

Editors Jacob E. Goodman and Joseph O’Rourke reassembled their stellar panel of contributors, added many more, and together thoroughly revised their work to make the most important results and methods, both classic and cutting-edge, accessible in one convenient volume. Now over more than 1500 pages, the Handbook of Discrete and Computational Geometry, Second Edition continues to provide unparalled, authoritative coverage of theory, methods, and applications. Highlights of the second edition include thirteen new chapters, thorough revisions of all remaining chapters, extended coverage of computational geometry software, author and subject indices, and greatly expanded bibliographies. Catalog no. C3014, ISBN: 978-1-58488-301-2 April 2004, 7 x 10, 1560 pp. Suggested Price: $139.95 / £89.00

Handbook of Graph Theory Textbook

Edited by

Graphs & Digraphs

Jonathan L. Gross

Fourth Edition

Jay Yellen

G. Chartrand and L. Lesniak

32

Columbia University, New York, USA Rollins College, Winter Park, Florida, USA Series: Discrete Mathematics and Its Applications, 18

An updated version of the popular book on graph theory, Graphs & Digraphs, Fourth Edition maintains its predecessor’s reputation for being thorough, accurate, and complete. Over the years, the book has evolved from a completely mathematical treatment to one that also considers the mathematical needs of computer scientists. The problems posed are designed to teach readers how to construct various proofs and in doing so, learn the meanings of definitions and concepts. The fourth edition features major changes to the sections on domination, colorings, distance, and Ramsey theory. The authors also added more problems, removed outdated material, and offer a solutions manual with qualified course adoptions.

The Handbook of Graph Theory is the most comprehensive single-source guide to graph theory. Best-selling authors Gross and Yellen assembled an outstanding team of experts to contribute overviews of more than 50 of the most significant topics in graph theory. They then carefully edited the compilation to produce a unified, authoritative work ideal for ready reference. Designed and edited with non-experts in mind, this handbook makes information easy to find and easy to understand. Each chapter includes lists of definitions and facts accompanied by examples, tables, remarks, a glossary and a bibliography, and, in some areas, conjectures and open problems.

Catalog no. C3901, ISBN: 978-1-58488-390-6 October 2004, 6-1/8 x 9-1/4, 386 pp. Suggested Price: $104.95 / £66.99

Catalog no. 8522, ISBN: 978-1-58488-090-5 December 2003, 7 x 10, 1192 pp. Suggested Price: $129.95 / £82.00

Handbook of Discrete and Combinatorial Mathematics

Handbook of Mathematical Induction

Second Edition Kenneth H. Rosen Monmouth University, Middletown, New Jersey, USA Series: Discrete Mathematics and Its Applications, 8

Theory and Applications David S. Gunderson University of Manitoba, Winnipeg, Canada Series: Discrete Mathematics and Its Applications, 58

The importance of discrete and combinatorial mathematics continues to increase as the range of applications to computer science, electrical engineering, and the biological sciences grows dramatically. Providing a ready reference for practitioners in the field, the Handbook of Discrete and Combinatorial Mathematics, Second Edition presents additional material on Google’s matrix, random graphs, geometric graphs, computational topology, and other key topics. New chapters highlight essential background information on bioinformatics and computational geometry. Each chapter includes a glossary, definitions, facts, examples, algorithms, major applications, and references.

This comprehensive handbook enables readers to prove hundreds of mathematical results. It presents the formal development of natural numbers from axioms, which leads into set theory and transfinite induction. The book covers Peano’s axioms, weak and strong induction, double induction, infinite descent downward induction, and variants of these inductions. It also contains numerous exercises highlighting the various levels of difficulty of an inductive proof, the variety of inductive techniques available, and the scope of results provable by mathematical induction. The final section includes solutions to all exercises in long form so that no steps are omitted.

Catalog no. C780X, ISBN: 978-1-58488-780-5 June 2010, 7 x 10, 1408 pp. Suggested Price: $139.95 / £89.00

Catalog no. C3649, ISBN: 978-1-4200-9364-3 April 2010, 7 x 10, 840 pp. Suggested Price: $99.95 / £63.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Textbook An Introduction to Combinatorics, Second Edition

Pearls of Discrete Mathematics

Alan Slomson & Regnaud B.J.T. Allenby

Martin Erickson

University of Leeds, UK Series: Discrete Mathematics and Its Applications

Truman State University, Kirksville, Missouri, USA Series: Discrete Mathematics and Its Applications, 57

Suitable for self-study or a first course in combinatorics at the undergraduate level, How to Count: An Introduction to Combinatorics, Second Edition follows a similar approach to its predecessor. This new edition continues to focus on counting problems and emphasize a problem solving approach. It includes a new chapter on graph theory and many more exercises, some with full solutions or hints. The authors provide proofs of all significant results and illustrate applications from other areas of mathematics, such as elementary ideas from analysis in proving Stirling’s formula. A solutions manual is available for qualifying instructors.

An absorbing treatment of the basic principles of discrete mathematics, this book presents methods for solving counting problems and other types of problems that involve discrete structures. Through intriguing examples, problems, theorems, and proofs, the author illustrates the relationship of these structures to algebra, geometry, number theory, and combinatorics. He addresses topics not found in similar books, such as information and game theories, and covers advanced material in the areas of recurrence relations and generating functions. Each chapter includes hundreds of worked examples and exercises while an appendix provides hints and solutions.

Catalog no. C8260, ISBN: 978-1-4200-8260-9 May 2010, 7 x 10, 356 pp. Suggested Price: $79.95 / £34.99

Catalog no. K10831, ISBN: 978-1-4398-1616-5 September 2009, 6-1/8 x 9-1/4, 280 pp., Soft Cover Suggested Price: $59.95 / £38.99

Textbook

Applications of Cognitive Work Analysis

Introduction to Combinatorics W.D. Wallis Southern Illinois University, Carbondale, USA

John George Eastern New Mexico University, Portales, USA Series: Discrete Mathematics and Its Applications

Edited by

Ann M. Bisantz University at Buffalo, New York, USA

Catherine M. Burns University of Waterloo, Ontario, Canada

This concise text covers the fundamentals of pure mathematical combinatorics, including combinations, permutations, and more sophisticated counting techniques; generating functions; difference equations; generalizations; and special functions. It also presents graph-theoretic terminology and elementary graph theory as it arises in combinatorics. The authors provide brief introductions to more advanced ideas, such as Latin squares, block designs, matrices, and Polya’s theory of counting. They also include exercises at both the elementary and advanced levels as well as additional exercises and solutions on a supplementary website.

Despite continued interest in Cognitive Work Analysis (CWA) there are few upto-date books in the area and none which comprehensively document the use of these methods in real-world applications. This is a critical shortcoming as more cognitive engineers and human factors professionals seek to use CWA methods in their own work. This book demonstrates how these often complicated methods can be applied in complex, real-world design contexts, subject to constraints of cost, time, and information. It shows how, when, and where CWA techniques can be integrated into the systems engineering design process and provides concrete evidence for the value that the CWA approach provides.

Catalog no. K10310, ISBN: 978-1-4398-0622-7 June 2010, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $79.95 / £49.99

Catalog no. ER151X, ISBN: 978-0-8058-6151-8 October 2008, 6-1/8 x 9-1/4, 370 pp. Suggested Price: $89.95 / £57.99

Textbook

Mathematics in Games, Sports, and Gambling The Games People Play Ronald J. Gould Emory University, Atlanta, Georgia, USA

Content Preparation Guidelines for the Web and Information Appliances Cross-Cultural Comparisons Huafei Liao, Yinni Guo, April Savoy, & Gavriel Salvendy Series: Human Factors and Ergonomics, 29

With an emphasis on mathematical thinking and problem solving, this text shows how discrete probability, statistics, and elementary discrete mathematics are used in games, sports, and gambling situations. It draws on numerous examples, questions, and problems to explain the application of mathematical theory to various real-life games. The text covers permutations in the two-deck matching game, introduces graphs to find matches when looking at extensions of the fivecard trick, and studies lexicographic orderings and ideas of encoding for card tricks. It also explores linear equations and weighted equations in the section on the NFL passer rating formula.

Unlike previous publications in usability, which have predominantly concentrated on how to present information, this book focuses on what information should be presented and on information appliances for different cultures. It provides operational tools to effectively prepare the content in a manner that allows users to make good decisions regarding the purchase of goods and services and to obtain information on items of interest. A cross-cultural comparison and fundamental review of the theory, the book not only answers the question of what information needs to be presented for effective decision making, but also addresses the impact of culture on content usability.

Catalog no. K10099, ISBN: 978-1-4398-0163-5 July 2009, 6-1/8 x 9-1/4, 374 pp. Suggested Price: $59.95 / £38.99

Catalog no. 6777X, ISBN: 978-1-4200-6777-4 November 2009, 6-1/8 x 9-1/4, 192 pp. Suggested Price: $79.95 / £49.99

Discrete Systems / Human-Computer Interaction

How to Count

33


For more information and a complete list

Human-Computer Interaction

Context-Aware Computing and Self-Managing Systems

Handbook of Standards and Guidelines in Ergonomics and Human Factors

Edited by

Edited by

Waltenegus Dargie

Waldemar Karwowski

Technische Universitat, Dresden, Germany Series: Chapman & Hall/CRC Studies in Informatics, 3

University of Central Florida, Orlando, USA Series: Human Factors and Ergonomics

Through various examples, this book shows how context-aware computing can be used in many self-managing systems, including devices, applications, middleware, and networks. It enables researchers of context-aware computing to identify potential applications in the area of autonomous computing. The text also supports researchers of autonomous computing in defining, modeling, and capturing dynamic aspects of self-managing systems. The expert contributors identify context-aware aspects in autonomous systems, describe the essentials of self-managing systems, and present a higher-level vision of future large-scale networks.

A comprehensive review of international and national standards and guidelines, this handbook consists of 32 chapters divided into nine sections that cover standardization efforts, anthropometry and working postures, designing manual material, human-computer interaction, occupational health and safety, legal protection, military human factor standards, and sources for human factors and ergonomics standards. The book delineates the role standards and guidelines play in facilitating the design and optimal working conditions in regards to occupational safety and health as well as system performance in the context of technological advances and opportunities for economic development worldwide.

Catalog no. C7771, ISBN: 978-1-4200-7771-1 March 2009, 6-1/8 x 9-1/4, 405 pp. Suggested Price: $99.95 / £60.99

Catalog no. ER8424, ISBN: 978-0-8058-4129-9 December 2005, 7 x 10, 648 pp. Suggested Price: $199.95 / £127.00

Handbook of Aviation Human Factors Edited by

34

Human Factors in Simulation and Training Edited by

John A. Wise & V. David Hopkin

Dennis A. Vincenzi, John A. Wise, Mustapha Mouloua, & Peter A. Hancock

A comprehensive source covering applications of human factors to aviation systems and operations, this handbook covers topics such as cabin staff and security, technical and navigational innovations, advances in communication, cost and time pressures on procurement, and new applications of automation. It covers human-machine relationships, cultural differences in practices and procedures, cognitive processes underlying human task performance, as well as maintenance, certification, verification and validation in the quest for even better system reliability. The handbook discusses major developments in aviation and in human factors, and foresees some of the further developments in this field.

A complete examination of issues and concepts relating to human factors in simulation, this book covers theory and application in space, ships, submarines, naval aviation, and commercial aviation. The authors develop and expand on concepts in simulator usage, particularly specific characteristics and issues of simulation and their effect on the validity and functionality of simulators as a training device. The chapters contain in-depth discussions of these particular characteristics and issues. They also incorporate theories pertaining to the motivational aspects of training, simulation of social events, and PC-based simulation.

Catalog no. ER4996, ISBN: 978-0-8058-1680-8 December 1998, 7 x 10, 712 pp. Suggested Price: $179.95 / £114.00

Catalog no. 72838, ISBN: 978-1-4200-7283-9 December 2008, 7 x 10, 453 pp. Suggested Price: $99.95 / £63.99

Handbook of Digital Human Modeling

Human-Computer Etiquette

Research for Applied Ergonomics and Human Factors Engineering

Caroline C. Hayes University of Minnesota, Minneapolis, USA

Edited by

Christopher A. Miller

Vincent G. Duffy

Smart Information Flow Technologies, Minneapolis, Minnesota, USA Series: Supply Chain Integration Modeling, Optimization and Application

Purdue University, Indiana, USA Series: Human Factors and Ergonomics

With an editorial panel that spans the globe, this book provides a wealth of international knowledge and guidelines. Highlighting theory, tools and method, it covers applications in advanced manufacturing, aerospace, automotive, data visualization and simulation, defense and military systems, design for impaired mobility, healthcare and medicine, information systems, and product design. The text elucidates tools to help evaluate product and work design while reducing the need for physical prototyping. Additional materials available on the CRC Press web site include downloadable software and a 220-page step-by-step UGS-Jack help manual developed at Purdue. Catalog no. ER564X, ISBN: 978-0-8058-5646-0 November 2008, 7 x 10, 1006 pp. Suggested Price: $149.95 / £95.00

Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interfaces. Providing a complete introduction to the design of social responses to computers, the text emphasizes the value of social norms in the development of usable and enjoyable technology. It also describes the role of socially correct behavior in technology adoption and how to design human-computer interfaces for a competitive global market. Catalog no. AU6945, ISBN: 978-1-4200-6945-7 July 2010, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $79.95 / £49.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Fundamentals, Evolving Technologies and Emerging Applications, Second Edition

Innovative Solutions

Edited by

What Designers Need to Know for Today’s Emerging Markets

Andrew Sears

Edited by

UMBC, Baltimore Department of Information, USA

Apala Lahiri Chavan

Julie A. Jacko

Human Factors International, India

The Institute for Health Informatics, University of Minnesota, Minneapolis, USA Series: Human Factors and Ergonomics

Based on research and practice, this book comprehensively examines the elements of what is needed to be knowledgeable and creative when designing for emerging markets. It provides an in-depth look at research methods in emerging markets and underserved communities. The authors demonstrate how ecosystems mapping could become an essential tool to define the elements impacting design decisions. They discuss methods to develop solution spaces based on the output from users research studies. The book includes case studies and design examples that provide insights on how to avoid pitfalls in designing outside of the comfort zone and for emerging markets.

Exploring the evolution in how people use and work with technology, this second edition captures the most important scientific and technical know-how in the field. With contributions from over 130 researchers and professionals, over 5,500 references, 400 figures, and 100 tables, the book provides a wealth of data and a fresh perspective. New topics and authors ensure the revision contains new information and insights. It features recent advances in the scientific knowledge base and visionary perspectives and developments that will fundamentally transform the way in which researchers and practitioners view the discipline. Catalog no. ER9314, ISBN: 978-0-8058-5870-9 September 2007, 8-1/2 x 11, 1384 pp. Suggested Price: $149.95 / £95.00

Catalog no. K10523, ISBN: 978-1-4398-1049-1 June 2010, 6-1/8 x 9-1/4, 248 pp. Suggested Price: $89.95 / £57.99

Also Available in Soft Cover

Looking for more specific information? Consider these four tightly focused volumes, based on the handbook. Human-Computer Interaction Design Issues, Solutions, and Applications Catalog no. 88858, ISBN: 978-1-4200-8885-4 March 2009, 8-1/2 x 11, 382 pp. Suggested Price: $89.95 / £54.99

Human-Computer Interaction Designing for Diverse Users and Domains Catalog no. 88874, ISBN: 978-1-4200-8887-8 2009, 8-1/2 x 11, 284 pp. Suggested Price: $89.95 / £54.99

Human-Computer Interaction

Quantum Matrix Robert Croker ANE Books India, Darya Ganj, India

YouTube, Wikipedia, Second Life, and MySpace are only the beginning. The present and the future is Quantum Matrix. Filled with detailed descriptions of cutting-edge technologies in relation to machine evolution and human emotions, this book includes concrete examples of how technology is changing industry. It includes organizational strategies to enhance physical and mental wellbeing by aiding human evolution. The book also provides insights on how advanced business strategy relates to quantum mechanics, a prerequisite for corporate survival. It covers open source platforms seen as “particles” capable of rewriting the business game rules of an entire industry, e.g. Napster’s impact on the music industry.

Development Process

Catalog no. AB8982, ISBN: 978-1-4200-8982-0 November 2008, 6-1/8 x 9-1/4, 162 pp. Suggested Price: $129.95 / £82.00

Human-Computer Interaction

Smart Clothing

Catalog no. 88904, ISBN: 978-1-4200-8890-8 2009, 8-1/2 x 11, 356 pp. Suggested Price: $89.95 / £54.99

Fundamentals

Catalog no. 88815, ISBN: 978-1-4200-8881-6 March 2009, 8-1/2 x 11, 350 pp. Suggested Price: $89.95 / £54.99

Human-Computer Interaction

The Human-Computer Interaction Handbook

Technology and Applications Edited by

Gilsoo Cho Yonsei University, Seoul, South Korea Series: Human Factors and Ergonomics, 30

Based on contributions from experts in this unique field, this book covers the state of the art in smart clothing technology and applications such as textile-based keypads, transmission lines, sensors, and actuators. The chapters address usability and human aspects relevant to the manufacture and sale of such products, and they detail the evolving and increasingly wide-ranging applications related to fields such as information, healthcare, and entertainment. Smart clothing technology topics addressed in the book include interface, communication, energy supply, data management, processors, and actuators. It also discusses packaging and interconnection, shape memory alloy, and design and modeling of electronic textile applications. Catalog no. 88521, ISBN: 978-1-4200-8852-6 December 2009, 6-1/8 x 9-1/4, 296 pp. Suggested Price: $89.95 / £57.99

35


For more information and a complete list

Human-Computer Interaction / Image Processing 36

Ubiquitous Computing Fundamentals Edited by

John Krumm

Adaptive Image Processing A Computational Intelligence Perspective, Second Edition Kim-Hui Yap, Ling Guan, Stuart William Perry, & Hau San Wong

Microsoft Corporation, Redmond, Washington, USA

Series: Image Processing, 11

Having moved from the age of the mainframe to that of personal computing, we are now entering what some refer to as the third wave, ubiquitous computing, the era when computing moves from front-and-center to become more subtly integrated into our lives. However, much of the information on this third wave is not clear at all. Written by top experts from industry and academia, this book provides a comprehensive and well-organized overview of ubiquitous systems design and deployment. It covers everything from the application of quantitative methods to ubiquitous systems software.

Adaptive image processing is one of the most important techniques in visual information processing, especially in early vision such as image restoration, filtering, enhancement, and segmentation. While existing books present some aspects of this important issue, there is not a single book that treats this problem from a purely computational intelligence (CI) viewpoint. With three new chapters and numerous updates throughout, this second edition includes substantial new material that focuses on applications of advanced CI techniques in image processing applications. It emphasizes developments in state-of-the-art CI techniques, such as CBIR.

Catalog no. 93606, ISBN: 978-1-4200-9360-5 September 2009, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $79.95 / £49.99

The Universal Access Handbook Edited by

Constantine Stephanidis

Catalog no. 84356, ISBN: 978-1-4200-8435-1 December 2009, 6-1/8 x 9-1/4, 370 pp. Suggested Price: $149.95 / £95.00

Blind Image Deconvolution Theory and Applications Edited by

Foundation for Research & Technology – Hellas, Institute of Computer Science, Crete, Greece & The University of Crete, Department of Computer Science, Greece Series: Human Factors and Ergonomics, 28

Patrizio Campisi

Written by leading international authorities from academic, research, and industrial organizations and non-market institutions, The Universal Access Handbook provides a comprehensive and multidisciplinary overview of the field. The book discusses how to systematically apply universal design principles to information technologies. It presents the historical roots of universal access through the progressive discussion of complementary approaches to the accessibility of interactive applications and services. Reviewing current perspectives and trends, the text also includes examples, case studies, and best practices in new and emerging applications.

The always increasing demand for enhanced quality of images—for consumer applications, medical or biological imaging, in remote sensing, and for astronomy, to cite only a few—has fueled a resurgence of research into blind deconvolution techniques. Blind Image Deconvolution: Theory and Applications surveys the current state of research and practice as presented by the most recognized experts in the field. This comprehensive treatise discusses Bayesian methods, singleand multi-channel techniques, adaptive and multi-frame methods, and a host of applications to multimedia processing, astronomy, remote sensing imagery, and medical and biological imaging at the whole-body, small-part, and cellular levels.

Catalog no. ER628X, ISBN: 978-0-8058-6280-5 June 2009, 8-1/2 x 11, 1034 pp. Suggested Price: $149.95 / £89.00

Universita degli Studi “Roma TRE,” Italy

Karen Egiazarian Tampere University of Technology, Finland

Catalog no. 7367, ISBN: 978-0-8493-7367-1 May 2007, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $154.95 / £98.00

Web Wisdom

Textbook

How To Evaluate and Create Information Quality on the Web, Second Edition

Computer Imaging Digital Image Analysis and Processing

Marsha Ann Tate

Scott E. Umbaugh

The Pennsylvania State University, University Park, USA

Southern Illinois University, Edwardsville, USA

Keeping up with the advances required to navigate today’s web for research, this new edition offers a host of cutting-edge critical evaluation techniques and tools. Designed for quick and easy reference, every chapter of this popular research tool is updated and augmented to reflect the Internet’s growing sophistication. Equally valuable to web researchers and web page authors, the book uses page captures to explain how to optimize searches and searching. It offers an expanded discussion around rights and intellectual property pertaining to the web, examines the growing use of multi-media, and looks at the challenges brought on by usergenerated material.

Taking an engineering approach, Computer Imaging: Digital Image Analysis and Processing integrates theory with a conceptual and application-oriented style, allowing readers to understand how topics fit into the structure of application development. It introduces the concepts necessary to understand computer imaging, describes image analysis, provides the tools, concepts, and models required to analyze digital images and develop computer vision applications, discusses application areas for the processing of images, and delivers the information required to use the CVIPTools environment in algorithm development for practical applications and research.

Catalog no. 73206, ISBN: 978-1-4200-7320-1 November 2009, 6-1/8 x 9-1/4, 168 pp., Soft Cover Suggested Price: $34.95 / £22.99

Catalog no. 2919, ISBN: 978-0-8493-2919-7 January 2005, 7 x 10, 688 pp. Suggested Price: $104.95 / £66.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Textbook CD-ROM Included

Textbook

A Concise Introduction to Image Processing using C++

An Algorithmic Approach with MATLAB® Uvais Qidwai Qatar University, Doha

College of Mathematics and Computer Science, Fujian, China

C.H. Chen

Choi-Hong Lai

University of Massachusetts, North Dartmouth, USA Series: Chapman & Hall/CRC Textbooks in Computing, 2

University of Greenwich, London, UK Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation, 5

Written by experts in fractal-based image and video compression, this book strengthens readers’ knowledge of fundamentals principles in image acquisition, conservation, processing, and manipulation, improving their ability to apply these techniques in real-world problems. The book begins with coverage of representation, moves on to communications and processing, and concludes with discussions of processing techniques based on image representations and transformations developed in earlier chapters. Suitable as a text for any course on image processing, the book can also be used for self-study by researchers. The accompanying CD-ROM contains code for all algorithms. Catalog no. C8970, ISBN: 978-1-58488-897-0 November 2008, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $79.95 / £39.99

This text equips students with an essential understanding of digital image processing. It contains easy explanations of theoretical concepts, avoiding heavy mathematics wherever possible. The authors provide MATLAB® codes that allow students to generate the same images found in the book and present the algorithms as simple flowcharts that can be coded in any programming environment. They include algorithmic accounts of the techniques, describe practical examples and potential applications, and cover both standard and advanced topics, such as face recognition and soft computing. Lecture slides, MATLAB® codes, and other resources are available on the author’s website. Catalog no. C7950, ISBN: 978-1-4200-7950-0 October 2009, 6-1/8 x 9-1/4, 314 pp. Suggested Price: $89.95 / £57.99

Image Processing

Meiqing Wang

Digital Image Processing

Control of Color Imaging Systems Analysis and Design Lalit K. Mestha Principal Scientist and Project Leader, Xerox Research Center, Webster, New York, USA

Fuzzy Image Processing and Applications with MATLAB® Tamalika Chaira & Ajoy Kumar Ray

Sohail A. Dianat

Indian Institute of Technology, India

Rochester Institute of Technology, New York, USA

This book provides a detailed analysis of fuzzy set images in image processing and examines the fundamentals of the fuzzy set theory for carrying out associated calculations. Describing all components of fuzzy image processing, the book details preprocessing, threshold detection, and fuzzy match-based segmentation—all of which include new fuzzy approaches proposed by the distinguished authors. The text thoroughly explains fuzzy edge detection, fuzzy color-based image retrieval, and fuzzy clustering in pattern recognition. It concludes with a thorough description of MATLAB® and the implementation of fuzzy image processing methods in MATLAB®.

While digital color is now the technology of choice for printers, the knowledge required to address the quality and productivity issues of these devices is scattered across several technologies, as is its supporting literature. Bringing together information from diverse fields, this is the first book to provide comprehensive coverage of the numerous disciplines associated with digital color printing in a single resource. Based on the authors’ three decades of hands-on technical and teaching experience, the text provides engineers and technicians with the end-toend understanding of the color printing process that will help practitioners build a foundation drawn from the diverse disciplines needed to manage and control digital production printers. Catalog no. DK6031, ISBN: 978-0-8493-3746-8 May 2009, 6-1/8 x 9-1/4, 680 pp. Suggested Price: $139.95 / £85.00

Catalog no. K10359, ISBN: 978-1-4398-0708-8 November 2009, 6-1/8 x 9-1/4, 237 pp. Suggested Price: $99.95 / £63.99

Textbook

Digital Color Imaging Handbook

Image Analysis, Classification, and Change Detection in Remote Sensing

Edited by

With Algorithms for ENVI/IDL, Second Edition

Gaurav Sharma

Morton J. Canty

University of Rochester, New York, USA Series: Electrical Engineering & Applied Signal Processing, 11

This handbook presents the elements of color science, systems, processing algorithms, and device characteristics relevant to digital color imaging. The first three chapters cover the basics of color vision, perception, and physics that underpin the subject. The remainder of the text presents the technology of color imaging with chapters on color management, device color characterization, image compression, color quantization, gamut mapping, computationally efficient transform algorithms, and color image processing for digital cameras. Each chapter is written by world-class experts and largely self-contained. Supplemental materials are also made available for download on the CRC website. Catalog no. 0900, ISBN: 978-0-8493-0900-7 December 2002, 6-1/8 x 9-1/4, 816 pp. Suggested Price: $175.95 / £111.00

Juelich Research Center, Germany

This popular introduction to the processing of remote sensing imagery has been updated to include coverage of the latest versions of the ENVI software environment. This new edition covers support vector machines and other kernelbased methods. Illustrating many programming examples in the array-oriented language ID, the text includes coverage of basic Fourier, wavelet, principal components and minimum noise fraction transformations; convolution filters, topographic modeling, image-to-image registration and ortho-rectification; image fusion; supervised and unsupervised land cover classification with neural networks; hyperspectral analysis; and multivariate change detection. Catalog no. 87134, ISBN: 978-1-4200-8713-0 December 2009, 6-1/8 x 9-1/4, 468 pp. Suggested Price: $119.95 / £49.99

37


For more information and a complete list Textbook

Image and Video Compression for Multimedia Engineering Fundamentals, Algorithms, and Standards, Second Edition Yun Q. Shi New Jersey Institute of Technology, Newark, USA

Huifang Sun Mitsubishi Electric Research Lab, Cambridge, Massachusetts, USA Series: Image Processing

Image Processing

Advanced technologies have increased demands for visual information and higher quality video frames, creating a gap between the visual data required and limited hardware capabilities. Image and Video Compression for Multimedia Engineering bridges this gap with authoritative information on video and image coding that builds a foundation for future research. This second edition features complete chapters devoted to JPEG 2000 and MPEG-4. This text also provides coverage of the H.264 standard. For instructors, the book also offers a solutions manual as well as downloadable PDFs of all images in the text. Catalog no. 7364, ISBN: 978-0-8493-7364-0 March 2008, 7 x 10, 576 pp. Suggested Price: $109.95 / £44.99

Methodology and Applications Stuart R. Stock Northwestern University, Evanston, Illinois, USA

Due to the availability of commercial laboratory systems and the emergence of user facilities at synchrotron radiation sources, studies of microcomputed tomography (or microtomography) have increased exponentially. MicroComputed Tomography provides a complete introduction to microCT, describing how to use this technique effectively and how to understand its results. The first part of the book focuses on methodology, covering experimental methods, data analysis, and visualization approaches, while the second part of the book addresses various microCT applications, including porous solids, microstructural evolution, soft tissue studies, multimode studies, and indirect analyses. Catalog no. 58762, ISBN: 978-1-4200-5876-5 December 2008, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $129.95 / £82.00

CD-ROM Included Textbook

Modern Digital Halftoning

Image Processing with MATLAB®

Daniel L. Lau

Applications in Medicine and Biology Omer Demirkaya, Musa Hakan Asyali, & Prasanna K. Sahoo

38

MicroComputed Tomography

Second Edition University of Kentucky, Lexington, USA

Gonzalo R. Arce

University of Louisville, Kentucky, USA

University of Delaware, Newark, USA Series: Signal Processing and Communications, 8

This text explains complex, theory-laden topics in image processing through examples and MATLAB® algorithms. It provides these algorithms to help scientists and researchers quickly identify the most effective solution method for a particular problem at hand. The authors emphasize three-dimensional processing and analysis as well as statistical and stochastic modeling. They cover the new areas of nonlinear diffusion filtering and PDE-based image filtering, address relatively advanced topics, such as Markov random field-based image segmentation, and highlight applications with images from medicine and biology. They also include real-world examples and exercises in every chapter.

Documenting the development of digital printing since the first edition, Modern Digital Halftoning, Second Edition offers an integrated and up-todate treatment of stochastic halftoning and digital printing. Using full-color photographs to enhance the text, this edition incorporates updated models, algorithms, and methods, providing all the necessary tools for continuing research in the field. It features new chapters on dither array construction, human visual models, direct binary search, stochastic moiré, lenticular printing, and digital multitoning. An accompanying CD-ROM contains MATLAB® files that employ numerous halftoning and statistical characterization algorithms from the book.

Catalog no. 9246, ISBN: 978-0-8493-9246-7 December 2008, 6-1/8 x 9-1/4, 451 pp. Suggested Price: $99.95 / £42.99

Catalog no. 47531, ISBN: 978-1-4200-4753-0 April 2008, 7 x 10, 664 pp. Suggested Price: $159.95 / £99.00

Textbook

Introduction to Image Processing and Analysis John C. Russ

Textbook

North Carolina State University, Raleigh, USA

The Science of Imaging, Second Edition

J. Christian Russ President/Technical Director, Reindeer Graphics, North Carolina, USA

Graham Saxby University of Wolverhampton (Retired), UK

A unique textbook, Introduction to Image Processing and Analysis establishes the programming involved in image processing and analysis by utilizing skills in C compiler and both Windows and MacOS programming environments. The provided mathematical background illustrates the workings of algorithms and emphasizes the practical reasons for using certain methods, their effects on images, and their appropriate applications. The chapters work together to combine image processing with image analysis. The text concentrates on image processing and measurement and details the implementation of many of the most widely used and most important image processing and analysis algorithms.

A fundamental introduction to the subject, this volume takes readers on a grand tour of imaging. Starting with the fundamentals of light and basic cameras, the authors journey through television and holography to advanced scientific and medical imaging. Topics such as digital recording of images, the photographic process, and film development are dealt with in an informative and entertaining manner. The book keeps mathematics to a minimum and is copiously littered with examples. According to the RPS Journal, this is “…a truly valuable book, magnificently bringing together such diverse technologies.”

Catalog no. 7073, ISBN: 978-0-8493-7073-1 October 2007, 7 x 10, 376 pp. Suggested Price: $114.95 / £72.99

Catalog no. K10653, ISBN: 978-1-4398-1286-0 April 2010, 8-1/2 x 11, 290 pp. Suggested Price: $69.95 / £36.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Shape Classification and Analysis Luciano da Fona Costa Cybernetic Vision Research

Roberto Marcond Cesar, Jr.

Bayesian Artificial Intelligence Kevin B. Korb & Ann E. Nicholson

University of Sao Paulo, Brazil Series: Image Processing, 10

Monash University, Victoria, Australia Series: Chapman & Hall/CRC Computer Science & Data Analysis, 2

Shape analysis offers great potential for applications in diverse areas, from materials science to biology and neuroscience. Including numerical tools for characterization, this new edition presents advanced imaging techniques for the analysis of general biological shapes, such as cells, tissues, organs, and organisms. Various chapters review the main approaches for shape classification. Although focused on two-dimensional shapes, which are more effectively handled by current technology, the text also covers basic concepts and techniques for threedimensional shapes. The authors’ also provide readers with online access to their own cutting-edge open-source software projects, useful software, databases, and videos.

As the power of Bayesian techniques has become more fully realized, the field of artificial intelligence has embraced Bayesian methodology and integrated it to the point where an introduction to Bayesian techniques is now a core course in many computer science programs. Unlike other books on the subject, Bayesian Artificial Intelligence keeps mathematical detail to a minimum and covers a broad range of topics. The authors integrate all of Bayesian net technology and learning Bayesian net technology and apply them both to knowledge engineering. They emphasize understanding and intuition but also provide the algorithms and technical background needed for applications. Software, exercises, and solutions are also made available on the authors’ website.

Catalog no. 7929, ISBN: 978-0-8493-7929-1 April 2009, 6-1/8 x 9-1/4, 685 pp. Suggested Price: $129.95 / £78.99

Catalog no. C3871, ISBN: 978-1-58488-387-6 September 2003, 242 x164, 392 pp. Suggested Price: $93.95 / £59.99

Analysis and Synthesis of Fuzzy Control Systems

Bio-inspired Flying Robots

A Model Based Approach Gang Feng University of Hong Kong, Kowloon, Hong Kong Series: Automation and Control Engineering, 37

Modeling fuzzy control has been a very active research and application area in control engineering. However, there are few books available that cover the area in any depth. Written by a well-known expert who has published more than 100 papers in top international journals, this book gives insight into the latest approaches for the analysis and synthesis of fuzzy systems. It systematically presents design techniques applied to the Takagi–Sugeno class of fuzzy controllers widely used in successful practical applications. The book covers issues of robustness, stability, and conformity along with other state-of-the-art control techniques, such as model predictive control. Catalog no. 92642, ISBN: 978-1-4200-9264-6 March 2010, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $129.95 / £82.00

Autonomous Mobile Robots Sensing, Control, Decision Making and Applications Edited by

Shuzhi Sam Ge

Experimental Synthesis of Autonomous Indoor Flyers

Image Processing / Intelligent Systems

Theory and Practice, Second Edition

Jean-Christophe Zufferey Laboratory of Intelligent Systems, Swiss Federal Institute of Technology, Switzerland

Bio-inspired Flying Robots: Experimental Synthesis of Autonomous Indoor Flyers demonstrates how bio-inspiration can lead to fully autonomous flying robots. From sensor suite to control strategies, the literature on flying insects is reviewed from an engineering perspective in order to extract useful principles that are then applied to the synthesis of artificial indoor flyers. Artificial evolution is also utilized to search for alternative control systems and behaviors that match the constraints of small flying robots. Specifically, the basic sensory modalities of insects, vision, gyroscopes and airflow sense, are applied to develop navigation controllers for indoor flying robots. Catalog no. EF6684, ISBN: 978-1-4200-6684-5 April 2008, 6-1/8 x 9-1/4, 250 pp. Suggested Price: $79.95 / £49.99

Deterministic Learning Theory for Identification, Recognition, and Control

National University of Singapore

Cong Wang

Frank L. Lewis

National Natural Science Foundation of China, Beijing

University of Texas Automation and Robotics Research Institute, Arlington, USA Series: Automation and Control Engineering, 22

David J. Hill Australian National University, Canberra Series: Automation and Control Engineering, 32

Serving as the first comprehensive reference on this interdisciplinary technology, Autonomous Mobile Robots authoritatively addresses the theoretical, technical, and practical aspects of the field. The book examines in detail the key components that form an autonomous mobile robot, including sensors, sensor fusion, modeling, control, map building, path planning, decision making, autonomy, as well as the final integration of these components for diversified applications. Expert contributors share time-tested insight into the practical implementation and integration issues involved in developing autonomous and open robotic systems and include examples, illustrations, and applications.

Offering a new perspective, this book provides systematic design approaches for the identification, control, and recognition of nonlinear systems in uncertain environments. It introduces the concepts of deterministic learning theory and then discusses the persistent excitation property of RBF networks. The author describes the theory of deterministic learning processes and address dynamical pattern recognition and pattern-based control processes. He presents a new model of dynamical parallel distributed processing applicable to the detection and isolation of oscillation faults, ECG/EEG pattern recognition, robot learning and control, and security analysis and control of power systems.

Catalog no. DK6033, ISBN: 978-0-8493-3748-2 May 2006, 6 x 9, 736 pp. Suggested Price: $185.95 / £121.00

Catalog no. 7553, ISBN: 978-0-8493-7553-8 July 2009, 6-1/8 x 9-1/4, 207 pp. Suggested Price: $139.95 / £85.00

39


For more information and a complete list The Electronic Chart Display and Information System (ECDIS) An Operational Handbook Adam Weintrit

Edited by

Olivier C. L. Haas & Keith J. Burnham

Intelligent Systems

Faculty of Navigation, Gdynia Maritime University, Gdynia, Poland

Coventry University, UK Series: Medical Physics and Biomedical Engineering

Electronic navigation, although still relatively new, is becoming increasingly more common, particularly onboard commercial vessels. This handbook offers a tremendous amount of technical information about how the different charting systems operate and provides answers to the most commonly asked questions regarding electronic charts (ENC, RNC, DNC) and electronic chart systems (ECDIS, RCDS, ECS). The book will be of specific interest to those who need to know about selection, implementation, operational use, benefits, and management of ECDIS and ECS systems, but do not need to know all the technical details of how a ECDIS/GIS actually ‘works’, technically.

This book clearly and concisely explains a range of adaptive and intelligent systems, highlighting their benefits and limitations with realistic medical examples. It illustrates how these systems can be used in all stages of medical treatment. Each chapter presents a family of an intelligent and adaptive system, explains the techniques and algorithms behind these systems, and explores how to solve medical and biomedical problems using intelligent and adaptive systems. The book focuses on the tools of fuzzy logic, artificial neural networks, neurofuzzy modeling, adaptive and predictive control, systems and statistical modeling, and image processing.

Catalog no. K008703, ISBN: 978-0-415-48246-2 August 2009, 6-3/4 x 9-3/4, 1136 pp. Suggested Price: $309.95 / £172.00

Catalog no. IP385, ISBN: 978-0-7503-0994-3 March 2008, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $149.95 / £95.00

Textbook

A First Course in Fuzzy Logic Third Edition Hung T. Nguyen & Elbert A. Walker

40

Intelligent and Adaptive Systems in Medicine

Intelligent Control Systems with an Introduction to System of Systems Engineering

New Mexico State University, Las Cruces, USA

Thrishantha Nanayakkara, Ferat Sahin, & Mo Jamshidi

The best-selling A First Course in Fuzzy Logic provides an introduction to the theory of fuzzy sets and to its various areas of application in engineering and decision making. This third edition has been completely revised and expanded with new information on copulas and t-norms and features a new section on type-2 fuzzy sets. It also includes expanded information on generalized modus ponens, the compositional rule of inference, possibility theory, partial knowledge, and fuzzy integrals. With exercises at the end of each chapter, this book remains an essential text for students from such fields as artificial intelligence, computer science, engineering, cognitive science, and probability and statistics.

This unique book integrates the fundamentals of artificial intelligence and systems control in a framework that can be applied in simple dynamic systems, as well as in a large-scale system of systems for aviation, defense, and distributed manufacturing systems. Wherever possible, MATLAB® code is used to simulate discussed results. Projects are included that will enable readers to obtain firsthand experience with the concepts. By learning, testing, and simulating important theories used in modern systems engineering, readers will discover emerging opportunities in a field that will revolutionize the way large organizations, factories, and manmade systems are managed.

Catalog no. C5262, ISBN: 978-1-58488-526-9 October 2005, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $104.95 / £66.99

Catalog no. 79247, ISBN: 978-1-4200-7924-1 November 2009, 6-1/8 x 9-1/4, 441 pp. Suggested Price: $99.95 / £63.99

Governing Lethal Behavior in Autonomous Robots

Intelligent Freight Transportation Edited by

Petros A. Ioannou

Georgia Institute of Technology, Atlanta, USA

University of Southern California, Los Angeles, USA Series: Automation and Control Engineering, 29

Drawing from the author’s own state-of-the-art research, this book examines the philosophical basis, motivation, theory, and design recommendations for the implementation of an ethical control and reasoning system in autonomous robot systems, taking into account the Laws of War and Rules of Engagement. It discusses how robots can ultimately be more humane than humans in the battlefield. The author addresses the issue of autonomous robots having the potential to make life-or-death decisions and provides examples that illustrate autonomous systems’ ethical use of force. He also includes the opinions of the public, researchers, policymakers, and military personnel on the use of lethality by autonomous systems.

With contributions from experts, this book presents techniques and technologies to boost capacity, reduce cost, and improve efficiency transportation systems. It discusses ports and container terminals, how they interact with surface transportation, and related security issues. It covers fully automated containers, explains cost and performance analysis, and examines new strategies for empty container reuse, truck routing, and dispatching to meet time constraints for service. Additional topics include container terminals of the future, advanced processing technologies, and the gate appointment system. It examines labor union issues and environment issues associated with ports, ships, and the logistics chain.

Catalog no. C5948, ISBN: 978-1-4200-8594-5 May 2009, 6-1/8 x 9-1/4, 256 pp., Soft Cover Suggested Price: $59.95 / £36.99

Catalog no. 0770, ISBN: 978-0-8493-0770-6 March 2008, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $139.95 / £89.00

Ronald C. Arkin


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Intelligent Infrastructure Intelligent Systems

Hojjat Adeli

Technology and Applications, Six-Volume Set

The Ohio State University, Columbus, USA

Edited by

Xiaomo Jiang

Cornelius T. Leondes

GE-Energy, Greenville, South Carolina, USA

Emeritus Professor, University of California, USA

Recent estimates hypothesize that the US will need $1.6 trillion dollars for rehabilitation, replacement, and maintenance of existing infrastructure systems within the next 20 years. Presenting a new vision and way of designing and managing the civil infrastructure of the nation, this text introduces novel technologies, methods, and detailed computational algorithms for the creation of smart structures and intelligent freeways. Cutting across the disciplines of structural and transportation engineering, it provides a unique treatise for attacking and solving some of the most complex and intractable problems encountered in the emerging fields of smart structures and intelligent transportation systems.

Intelligent systems are playing an increasing role in areas ranging from medicine to the major manufacturing industries to financial markets. The consequences of flawed artificial intelligence systems are equally wide ranging and can be seen, for example, in the programmed trading-driven stock market crash of October 19, 1987. This six-volume set connects theory with proven practical applications to provide broad, multidisciplinary coverage in a single resource. International experts present case-study examples of successful practical techniques and solutions for diverse applications, ranging from robotic systems to speech and signal processing, database management, and manufacturing.

Catalog no. 85360, ISBN: 978-1-4200-8536-5 October 2008, 7 x 10, 440 pp. Suggested Price: $159.95 / £99.00

Catalog no. 1121, ISBN: 978-0-8493-1121-5 August 2002, 7 x 10, 2400 pp. Suggested Price: $2100.00 / £1338.00

Intelligent Systems

Neural Networks, Wavelets, and Chaos Theory for Intelligent Transportation Systems and Smart Structures

CD Included

Intelligent Network Video Understanding Modern Video Surveillance Systems

Intelligent Transportation Systems

Fredrik Nilsson & Axis Communications Inc.

Asad J. Khattak

Planning, Operations, and Evaluation

Chelmsford, Massachusetts, USA

University of North Carolina, Chapel Hill, USA

This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also discusses frame rate control, indoor/ outdoor installations, and specifications on MPEG-4 and other digital video formats. The book is accompanied by a CD containing tools for deploying and optimizing an installation. It is an essential resource for security system designers, consultants, and installers, as well as business and security managers.

Combining communications and transportation technologies to improve the flow of goods and people, Intelligent Transportation Systems: Planning, Operations, and Evaluation provides comprehensive coverage of the fundamental principles, methods, tools, and technology applications in the field of intelligent transportation systems. This book addresses the impact of information and communications technology on transportation. It also analyzes research literature, discussing issues of measurement, research design, data reliability, and validity. Presented in a research-oriented style, this text is a one-stop reference for civil engineers, traffic engineers, and automotive engineers.

Catalog no. AU6156, ISBN: 978-1-4200-6156-7 September 2008, 7 x 10, 416 pp. Suggested Price: $79.95 / £49.99

Catalog no. 3120, ISBN: 978-0-8493-3120-6 June 2010, 6-1/8 x 9-1/4, 330 pp. Suggested Price: $99.95 / £63.99

Intelligent Systems

Intelligent Video Surveillance

Modeling, Optimization, and Control

Systems and Technology

Yung C. Shin

Edited by

Purdue University, West Lafayette, Indiana, USA

Yunqian Ma

Chengying Xu

Honeywell International, Inc., Minnesota, USA

University of Central Florida, Orlando, USA Series: Automation and Control Engineering, 30

Gang Qian

Providing a thorough introduction to the field of soft computing techniques, Intelligent Systems: Modeling, Optimization, and Control covers every major technique in artificial intelligence in a clear and practical style. This book highlights recent research and applications, addresses issues encountered in the development of applied systems, and describes a wide range of intelligent systems techniques—including neural networks, fuzzy logic, evolutionary strategy, and genetic algorithms. The book demonstrates concepts through simulation examples and practical experimental results. Case studies are also presented from each field to facilitate understanding.

From streets in London to subway stations in New York City, hundreds of thousands of surveillance cameras are constantly collecting videos. The latest implementation of surveillance cameras calls for advanced video systems that can autonomously recognize people, detect movements, and identify targeted activities in real-time. In response to such demand, this book examines the fundamental principles of current intelligent video surveillance systems. The text provides a comprehensive look at the algorithmic design and system implementation for intelligent video surveillance. The authors cover computational principles, system implementation issues, and practical applications of present and future systems.

Catalog no. 51768, ISBN: 978-1-4200-5176-6 December 2008, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $129.95 / £82.00

Catalog no. K10681, ISBN: 978-1-4398-1328-7 December 2008, 7 x 10, 552 pp. Suggested Price: $119.95 / £72.99

Arizona State University, Tempe, USA

41


For more information and a complete list Textbook

An Introduction to Neural Networks Kevin Gurney

A Probablistic Approach Sylvain Calinon

Intelligent Systems

University of Sheffield, UK

Learning Algorithms and Systems Laboratory, Switzerland

Although mathematical ideas underpin the study of neural networks, this book presents the fundamentals without the full mathematical apparatus. The author tackles virtually all aspects of the field, including artificial neurons as models of their real counterparts; the geometry of network action in pattern space; gradient descent methods; associative memory and Hopfield nets; and self-organization and feature maps. The book provides a concrete focus through several real-world examples. This feature broadens the book’s audience to include students and professionals in cognitive science, psychology, and computer science as well as those involved in the design, construction, and management of networks.

Robot Programming by Demonstration (RbD) explores user-friendly means of teaching new skills to robots. Recent advances in RbD have identified a number of key issues for ensuring a generic approach to the transfer of skills across various agents and contexts. This book focuses on the two generic questions of what to imitate and how to imitate, which are concerned, respectively, with the problem of the extraction of the essential features of a task and the determining of a way to reproduce these essential features in different situations. The book proposes active teaching methods that places the teacher “in the loop” of the robots’ learning.

Catalog no. TF2590, ISBN: 978-1-85728-503-1 August 1997, 6-1/8 x 9-1/4, 234 pp., Soft Cover Suggested Price: $59.95 / £38.99

Microsoft Robotics Developer Studio Handbook Intelligent Robot Simulation and Programming Shih-Chung Kang, Kai-Yuan Gu, Hung-Lin Chi, & Wei-Tze Chang

42

Robot Programming by Demonstration

Catalog no. N10077, ISBN: 978-1-4398-0867-2 August 2009, 320 pp. Suggested Price: $89.00 / £54.99

Strategic Intelligence Business Intelligence, Competitive Intelligence, and Knowledge Management Jay Liebowitz

National Taiwan University, Taipei, Taiwan

Johns Hopkins University, Rockville, Maryland, USA

The Microsoft® Robotics Developer Studio (MSRDS) provides a flexible platform for creating robotic systems, making it accessible for those who are new to robotics. Designed for readers with only basic programming skills, this book provides an introductory reference on robot development and programming using MSRDS. After a brief introduction to the MSRDS system, the authors demonstrate how to use MSRDS to develop software for operating robots and verify programs without connecting to physical equipment. They also discuss the hardware modules contained in the LEGO Mindstorms Educational Toolkit and provide examples for implementing an intelligent robot.

The usefulness of strategic intelligence goes beyond military settings, as it applies toward improving the strategic decision making process of any organization. This volume demonstrates how executives can best use internal and external information toward making better decisions. Divided into two major parts, the book first discusses the convergence of knowledge management (KM), business intelligence (BI), and competitive intelligence (CI) into what the author defines as strategic intelligence. The second part of the book describes case studies written by recognized experts in the fields of KM, BI, and CI. The case studies cover strategic scenarios at Motorola, AARP, Northrop Grumman, and more.

Catalog no. K11150, ISBN: 978-1-4398-2165-7 June 2010, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $69.95 / £44.99

Catalog no. AU9868, ISBN: 978-0-8493-9868-1 March 2006, 6-1/8 x 9-1/4, 248 pp. Suggested Price: $93.95 / £59.99

Real Life Applications of Soft Computing Anupam Shukla, Ritu Tiwarim, & Rahul Kala

Using Artificial Intelligence in Chemistry and Biology A Practical Guide

Indian Institute of Information Technology Management, Gwalior, India

Hugh Cartwright

The application of soft computing techniques in industrial control, security, data mining, software and robotics can be easily seen. This book uncovers all such applications, clearly explaining the underlying technology and its implementation. While such systems initially seem complex, the author demonstrates how they can be modeled, designed, and implemented. Using a practical approach, the text provides multidimensional coverage of topics like character recognition, bioinformatics, clinical decision support, fuzzy logic, and neural networks. Each problem is discussed in detail, followed by an in-depth look at possible solutions.

In a lucid, straightforward manner, this book explains how Artificial Intelligence (AI) methods are used by scientists and what can be accomplished with them. Designed for those with no prior programming knowledge, this book efficiently and quickly teaches meaningful scientific applications. Using a practical and direct approach, it addresses the needs of scientists across a range of disciplines. Topics include an introduction to artificial intelligence, artificial neural networks, self-organizing maps, growing cell structures, evolutionary algorithms, cellular automata, expert systems, fuzzy logic, learning classifier systems, and evolvable developmental systems.

Catalog no. K11169, ISBN: 978-1-4398-2287-6 April 2010, 7 x 10, 952 pp. Suggested Price: $129.95 / £82.00

Catalog no. 8412, ISBN: 978-0-8493-8412-7 May 2008, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $129.95 / £82.00

Oxford University, UK


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Volume 2 Edited by

Marios C. Angelides, Phivos Mylonas, & Manolis Wallace Now that text-based search engines have begun to give way to content- and context-aware engines, advanced network infrastructures are starting to emerge. These infrastructures are capable of end-to-end ubiquitous transmission of multimedia content to any device, fixed or mobile, on any network, wired or wireless, at any time. This book is a collection of expanded papers presented at the 2nd International Workshop on Semantic Media Adaptation and Personalization. It explores recent and new developments in the field of semantic media adaptation and personalization. Topics discussed include the challenges of collaborative content modeling, video adaptation, information retrieval techniques for semantic media adaptation, and podcasting. Catalog no. AU7664, ISBN: 978-1-4200-7664-6 March 2009, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $129.95 / £78.99

Basic GIS Coordinates

Creating Spatial Information Infrastructures Towards the Spatial Semantic Web Edited by

Peter van Oosterom & Sisi Zlatanova Delft University of Technology, The Netherlands

Agreement on the syntax and formats of spatial data and developing systems to handle these is the first step towards the spatial information infrastructure (SII). Although a set of standards has already been established, a wealth of other technical and non-technical aspects must still be addressed. Creating Spatial Information Infrastructures covers these issues in depth. This book reflects recent major initiatives to create an SII, including the European INSPIRE initiative and the US DHS Geospatial Data Model. International research contributors present upto-date information on current research and standardization efforts for SII. This text also discusses semantic web technologies. Catalog no. 70681, ISBN: 978-1-4200-7068-2 April 2008, 6-1/8 x 9-1/4, 216 pp. Suggested Price: $129.95 / £82.00

Enabling Context-Aware Web Services

Second Edition

Methods, Architectures, and Technologies

Jan Van Sickle

Edited by

Van Sickle LLC, Denver, Colorado, USA

Quan Z. Sheng, Jian Yu, & Schahram Dustdar

Clearly outlining the basic principles of coordinate systems, this second edition of a bestseller covers ellipsoids, datums, and plane coordinates as they are used in GIS and GPS. It also covers the geoid and the concepts of elevation. The author explains complex topics in a logical progression and in a manner which is neither too complicated not oversimplified, avoiding getting bogged down in the mathematics. The new edition expands the material with updates that have occurred in the field during the past five years, especially in the World Geodetic System and International Terrestrial Reference Frame, and includes the upcoming GNSS constellations and coordinate implications.

A groundbreaking work, this collection provides both practical and pioneering information on the latest advances in Context-Aware Web Services, i.e. mobile Internet applications that can read geographical locations and adjust output accordingly. Beginning with an historical overview, this unique guide offers a comprehensive and systematic treatment of methodologies, along with various ways to model services to specifications. It discusses architectures including infrastructures, frameworks and standards, and technologies such as semantic Web, database usage, and artificial intelligence. It provides useful case studies and includes relevant datasets and replicable evaluation testbeds.

Catalog no. 92316, ISBN: 978-1-4200-9231-8 April 2010, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $89.95 / £57.99

Catalog no. K10493, ISBN: 978-1-4398-0985-3 December 2009, 6-1/8 x 9-1/4, 526 pp. Suggested Price: $109.95 / £66.99

Textbook

Cloud Computing

Foundations of Semantic Web Technologies

Edited by

Pascal Hitzler, Markus Kroetzsch, & Sebastian Rudolph

San Murugesan Multimedia University, Selangor, Malaysia

University of Karlsruhe, Karlsruhe, Germany Series: Chapman & Hall/CRC Textbooks in Computing

Cloud computing offers on-demand, utility-like availability of computing resources at a low cost. A critical understanding of cloud computing is essential to leverage the opportunities and benefits that this new computing paradigm offers. This book provides a comprehensive overview of cloud computing concepts, technologies, businesses models, strategies, and applications. It also examines potential risks and challenges of cloud computing. Written by international experts, the text addresses different aspects of cloud computing, including resource issues, security, and cost-effective scalable applications.

Thoroughly covering basic introductions and intuitions, technical details, and formal foundations, this text focuses on the established foundations in this area that have become relatively stable over time. It presents the latest developments in Semantic Web standards, including RDF, RDF Schema, OWL 2, RIF, and SPARQL. It also explores formal semantics, OWL querying, the relationship between rules and OWL, and ontology engineering and applications. The authors include many exercises with solutions in the back of the book and offer online access to updates, errata, slides for teaching, and links to additional resources.

Catalog no. K11054, ISBN: 978-1-4398-1998-2 June 2010, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $79.95 / £49.99

Catalog no. C9050, ISBN: 978-1-4200-9050-5 August 2009, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $79.95 / £49.99

Internet & Web-Based Computing

Advances in Semantic Media Adaptation and Personalization

43


For more information and a complete list Handbook of Mobile Broadcasting DVB-H, DMB, ISDB-T, AND MEDIAFLO Edited by

Borko Furht

Machine Learning & Pattern Recognition

Florida Atlantic University, Boca Raton, USA

Multimedia Content Encryption

Syed Ahson

Techniques and Applications

Microsoft Corporation, Bellevue, Washington, USA Series: Internet and Communications

Shiguo Lian

Operators are introducing mobile television and digital video content services globally. This handbook addresses all aspects of these services, providing a comprehensive reference on DVB-H, DMB, ISDB-T, and MediaFLO. Featuring contributions from experts in the field, the text presents technical standards and distribution protocols, offering detailed coverage of video coding, including design methodology and error resilience techniques; state-of-the-art technologies such as signaling, optimization, implementation, and simulation; and applications of mobile broadcasting, including emerging areas and new interactive services.

This book presents the latest research on multimedia content encryption. It begins with a brief history and then proceeds to examine performance requirements and fundamental encrypting techniques. It discusses the most common techniques of complete, partial, and compression-combined encryption as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, it reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption as well as the principles for designing secure algorithms and various applications. Finally, open issues, up-and-coming topics, and areas for further research are explored.

Catalog no. AU5386, ISBN: 978-1-4200-5386-9 April 2008, 7 x 10, 744 pp. Suggested Price: $149.95 / £95.00

Handbook of Public Information Systems

Catalog no. AU6527, ISBN: 978-1-4200-6527-5 September 2008, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $99.95 / £63.99

Third Edition

Social Computing and Virtual Communities

Edited by

Edited by

Christopher M. Shea

Panayiotis Zaphiris

University of North Carolina, Chapel Hill, USA

Cyprus University of Technology, Lemesos, Cyprus

G. David Garson

Chee Siang Ang

North Carolina State University, Raleigh, USA Series: Public Administration and Public Policy, 155

44

France Telecom R&D, Beijing, China

The handbook points the way to successful execution of IT projects by offering 39 contributed articles by experts in the field. Content includes introductory material that addresses 21st century public information systems, modern IT needs, and the development of e-government. It follows with an examination of the growth and use of information technology within and among government agencies and organizations. The book addresses current policy issues, offers case studies, and demonstrates successful public sector applications. Each section leads to a holistic approach that emphasizes communication, understanding, and participation from top management, technology teams, and end users. Catalog no. K10387, ISBN: 978-1-4398-0756-9 February 2010, 7 x 10, 408 pp. Suggested Price: $89.95 / £57.99

Managing Web Projects Edward B. Farkas Jackson Heights, New York, USA Series: ESI International Project Management, 7

A practical, step-by-step guide to managing web-based projects, this hands-on approach demystifies even the most daunting tasks. Using common sense tips and proven tools, international consultant Edward B. Farkas outlines a typical project lifecycle including project integration, scope and scope change, and work breakdown structures. He addresses concepts such as risk, time, human resources, communications, and quality management. Dozens of templates, schedules, checklists, and flow charts prepare you to become a project management professional, fully versed in and aligned with the nine knowledge areas and five processes codified by the internationally accepted standards of the Project Management Body of Knowledge (PMBOK®). Catalog no. K10273, ISBN: 978-1-4398-0495-7 October 2009, 6-1/8 x 9-1/4, 401 pp. Suggested Price: $59.95 / £38.99

University of Kent, Canterbury, UK

Due to the advancement of the Internet, online communities are gaining increasing importance in the research community. Presented from a user’s perspective, this book explores the diverse application areas of social computing and online communities. A significant portion of the text focuses on real-world case studies in which user behaviors, social mechanisms, and technological issues are investigated. Drawing from computer science, information systems, and social science, the book takes a multidisciplinary approach to evaluate virtual communities. It is useful for those who construct, moderate, and maintain online communities. Catalog no. C9042, ISBN: 978-1-4200-9042-0 December 2009, 6-1/8 x 9-1/4, 298 pp. Suggested Price: $79.95 / £49.99

Applied Genetic Programming and Machine Learning Hitoshi Iba & Yoshihiko Hasegawa University of Tokyo, Japan

Topon Kumar Paul Toshiba Corporation, Japan

Reflecting rapidly developing concepts and newly emerging paradigms in intelligent machines, this text is the first to integrate genetic programming and machine learning techniques to solve diverse real-world tasks. These tasks include financial data prediction, day-trading rule development and bio-marker selection. Written by a leading authority, this text will teach readers how to use machine learning techniques, make learning operators that efficiently sample a search space, navigate the search process through the design of objective fitness functions, and examine the search performance of the evolutionary system. All source codes and GUIs are available for download from the author’s website. Catalog no. K10206, ISBN: 978-1-4398-0369-1 August 2009, 6-1/8 x 9-1/4, 349 pp. Suggested Price: $79.95 / £48.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Theory & Applications using MATLAB®

Textbook

PSG College of Technology, Coimbatore, India

Essentials of Control Techniques and Theory

Surekha P.

John Billingsley

S. Sumathi Adhiyamaan College of Engineering, India

University of Southern Queensland, Toowoomba, Australia

Offering a wide range of programming examples implemented in MATLAB®, this book presents theoretical concepts and a general framework for CI approaches. It covers numerous intelligent computing methodologies and algorithms used in CI research. The text provides worked examples of neural networks, fuzzy systems, hybrid neuro-fuzzy systems, evolutionary computation, genetic algorithms and programming, and swarm intelligence, along with the associated MATLAB toolboxes. It also contains research projects, a survey of emerging commercial software packages, and numerous review questions.

From frequency domain analysis to time-domain state-space representation, this book covers many aspects of classical and modern control theory. It presents the nuts and bolts for designing a successful controller. The book shows how to model a real system by deriving equations, turning them into computer code, and interacting with the simulations in real time. The author explores the shortcomings of simple linear control of systems with limited input range and includes plenty of practical examples of everyday devices. Software simulation examples and other material are available on the book’s website www.esscont. com.

Catalog no. K10445, ISBN: 978-1-4398-0902-0 November 2009, 7 x 10, 823 pp. Suggested Price: $129.95 / £78.99

Computer Vision From Surface to Objects

Catalog no. 91239, ISBN: 978-1-4200-9123-6 November 2009, 6-1/8 x 9-1/4, 339 pp. Suggested Price: $89.95 / £49.99

Handbook of Natural Language Processing Second Edition Edited by

Edited by

Nitin Indurkhya

Christopher W. Tyler

University of New South Wales, Sydney, Australia

Smith-Kettlewell Eye Research Institute, San Francisco, California, USA

Fred J. Damerau

Taking an integrated approach to the mathematical, computational, and neuroscientific strategies to analyze 3D structures in a visual scene, this groundbreaking work presents the long-awaited breakthrough to the third dimension of conceptualization. The book covers the advanced object representation requirement of surface structure interpolation across a sparse array of cues to the available depth or distance data. It addresses issues in surface representation and layout, such as surface invariants, shape constancy, and Bayesian shape priors, as well as partial object overlap and background occlusion, which is considered a crucial component for neural representation in the human brain.

This handbook provides a comprehensive, modern reference of practical tools and techniques for implementing natural language processing in computer systems. It covers classical methods, empirical and statistical techniques, and various applications. Taking a global, multilingual approach, the book describes how the techniques can be applied to European and Asian languages as well as English. With more than 75 percent new and expanded material, this edition is fully updated to include emerging areas, such as sentiment analysis. Along with web links, the companion Wiki (http://handbookofnlp.cse.unsw.edu.au) provides updates to chapters to reflect ongoing developments in this evolving field.

Catalog no. K10887, ISBN: 978-1-4398-1712-4 April 2010, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $89.95 / £57.99

Goshen, Connecticut, USA

Catalog no. C5921, ISBN: 978-1-4200-8592-1 January 2010, 7 x 10, 568 pp. Suggested Price: $99.95 / £63.99

Conceptual Structures in Practice Edited by

Pascal Hitzler Kno.e.sis Center at Wright State University, Dayton, Ohio, USA

Henrik Schärfe

Machine Learning & Pattern Recognition

Computational Intelligence Paradigms

Handbook of Relational Learning Ashwin Srinivasan IBM India Research Lab, New Delhi, India

Aalborg University, Denmark Series: Chapman & Hall/CRC Studies in Informatics, 2

Ganesh Ramakrishnan

Presenting perspectives from both the conceptual graph and FCA communities, this volume takes you through the basic yet nontrivial task of establishing conceptual relations as the foundation for research in knowledge representation and knowledge mining. After providing the formal background in FCA and conceptual graphs, it describes various software tools for analysis and computation, including the ToscanaJ suite. Written by the original visionaries of the field, the next section discusses the history and future directions of conceptual structures. The final chapters explore prominent application areas in computer science, including text analysis, web semantics, and intelligent systems.

With increased interest in relational learning and the growing importance of machine learning, artificial intelligence, and data mining, inductive logic programming (ILP)—at the boundary between machine learning and logic programming—is on the rise. Authored by a leading researcher in the field, this timely book provides the first comprehensive introduction to be published in over ten years. It uses an accessible approach to present key concepts in ILP and provide an overview of possible applications. The book covers important topics in the field, including probability and statistics, statistical relational learning, experimental design, and combinatorial algorithms.

Catalog no. C6062, ISBN: 978-1-4200-6062-1 November 2009, 6-1/8 x 9-1/4, 425 pp. Suggested Price: $99.95 / £60.99

Catalog no. K10657, ISBN: 978-1-4398-1294-5 June 2010, 6-1/8 x 9-1/4, 500 pp. Suggested Price: $79.95 / £49.99

Khadki, India

45


For more information and a complete list Multi-Agent Systems Lyapunov-Based Control of Robotic Systems Aman Behal, Warren Dixon, Darren M. Dawson, & Bin Xian

Machine Learning & Pattern Recognition

Tianjin University, Nankai District, China Series: Automation and Control Engineering, 36

Lyapunov-Based Control of Robotic Systems provides applications of advanced nonlinear Lyapunov-type design and stability analysis arguments for robotic control; vision-based control, estimation, and path planning; and human-machine interaction. Through a unified theoretical framework, this book illustrates how recent techniques can be used to solve a variety of current problems associated with sensor-based feedback control and path planning of robotic, automation, and human-machine systems. With numerous examples and references, this text also contains experimental results that demonstrate real-time implementation of control and path planning algorithms on experimental test beds. Catalog no. 7025, ISBN: 978-0-8493-7025-0 December 2009, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $139.95 / £89.00

Machine Learning Algorithms for Spatial Data Analysis and Modelling Mikhail Kanevski, Vadim Timonin, & Alexi Pozdnukhov This book discusses machine learning algorithms, such as artificial neural networks of different architectures, statistical learning theory, and Support Vector Machines used for the classification and mapping of spatially distributed data. It presents basic geostatistical algorithms as well. The authors describe new trends in machine learning and their application to spatial data. The text also includes case studies based on environmental and pollution data. It includes a CD-ROM with software that will allow both students and researchers to put the concepts to practice.

46

Catalog no. EF8237, ISBN: 978-0-8493-8237-6 June 2009, 6 x 9, 400 pp. Suggested Price: $109.95 / £66.99

Textbook

Machine Learning An Algorithmic Perspective

Simulation and Applications Edited by

Adelinde M. Uhrmacher University of Rostock, Germany

Danny Weyns Katholieke Universiteit Leuven, Belgium Series: Computational Analysis, Synthesis, and Design of Dynamic Systems

This comprehensive reference provides an overdue review of the wide-ranging facets of MAS simulation, including methodological and application-oriented guidelines. It reviews two decades of research in the intersection of MAS, simulation, and different application domains to provide scientists and developers with disciplined engineering approaches to modeling and developing MAS-based simulations. After providing an overview of the field’s history and basic principles it catalogs the various simulation engines for MAS. Complete with over 200 figures and formulas, the text devotes three sections to current and emerging approaches and applications. Catalog no. 70231, ISBN: 978-1-4200-7023-1 April 2009, 7 x 10, 566 pp. Suggested Price: $139.95 / £85.00

Reinforcement Learning and Dynamic Programming Using Function Approximators Lucian Busoniu, Robert Babuska, Bart De Schutter & Damien Ernst Reinforcement learning and dynamic programming are key research areas in machine learning and artificial intelligence. This monograph describes algorithms from each of the three major classes of these techniques: value iteration, policy iteration, and direct policy search. Using illustrative examples, the text discusses the performance of these algorithms in a variety of applications, starting with simple examples such as servo-system control and then continuing on to more challenging problems such as robotic manipulator stabilization and bicycle balancing. The book concludes with the highly challenging problem of optimizing human immunodeficiency virus treatment. Catalog no. K11117, ISBN: 978-1-4398-2108-4 June 2010, 6-1/8 x 9-1/4, 250 pp. Suggested Price: $89.95 / £57.99

Semisupervised Learning for Computational Linguistics Steven Abney

Massey University, Palmerston North, New Zealand

University of Michigan, Ann Arbor, USA Series: Chapman & Hall/CRC Computer Science & Data Analysis, 9

Written in an easily accessible style, this book provides the ideal blend of theory and practical, applicable knowledge. It covers neural networks, graphical models, reinforcement learning, evolutionary algorithms, dimensionality reduction methods, and the important area of optimization. It treads the fine line between adequate academic rigor and overwhelming students with equations and mathematical concepts. The author includes examples based on widely available datasets and practical and theoretical problems to test understanding and application of the material. The book describes algorithms with code examples backed up by a website that provides working implementations in Python.

This book provides a broad, accessible treatment of the theory and linguistic applications of semisupervised methods. It presents a brief history of the field before moving on to discuss well-known natural language processing methods, such as self-training and co-training. It then centers on machine learning techniques, including the boundary-oriented methods of perceptrons, boosting, SVMs, and the null-category noise model. In addition, the book covers clustering, the EM algorithm, related generative methods, and agreement methods. It concludes with the graph-based method of label propagation as well as a detailed discussion of spectral methods.

Catalog no. C6718, ISBN: 978-1-4200-6718-7 April 2009, 6-1/8 x 9-1/4, 406 pp. Suggested Price: $69.95 / £42.99

Catalog no. C5599, ISBN: 978-1-58488-559-7 September 2007, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $83.95 / £53.99

Stephen Marsland


Statistical Inference The Minimum Distance Approach

Textbook

Classical FORTRAN

Ayanendranath Basu, Wen-Tao Huang, Hiroyuki Shioya, & Chanseok Park

Programming for Engineering and Scientific Applications, Second Edition

Series: Chapman & Hall/CRC Monographs on Statistics & Applied Probability

Michael Kupferschmid

This book gives a comprehensive account of density-based minimum distance methods and their use in statistical inference. It covers statistical distances, density-based minimum distance methods, discrete and continuous models, asymptotic distributions, robustness, computational issues, residual adjustment functions, graphical descriptions of robustness, penalized and combined distances, multisample methods, weighted likelihood, and multinomial goodnessof-fit tests. The book also introduces the minimum distance methodology in interdisciplinary areas, such as neural networks and image processing, as well as specialized models and problems, including regression, mixture models, survival and Bayesian analysis, and more.

This text teaches how to write computer programs in the classical dialect of the FORTRAN language. Along with numerous updates and revisions throughout, this second edition includes an additional case study on file I/O, new sections that cover CPU timing on Pentium processors, and more information about the g77 compiler and Linux. It continues to use case studies and examples to introduce the language elements and design skills needed to write graceful, correct, and efficient programs for real engineering and scientific applications. A solutions manual is available for qualifying instructors.

Catalog no. K10008, ISBN: 978-1-4200-9965-2 July 2010, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $89.95 / £57.99

Rensselaer Polytechnic Institute, Troy, New York, USA

Catalog no. 59076, ISBN: 978-1-4200-5907-6 January 2009, 7 x 10, 576 pp. Suggested Price: $89.95 / £54.99

Textbook

Subspace Learning of Neural Networks Jian Cheng, Zhang Yi, & Jiliu Zhou Series: Automation and Control Engineering

Using real-life examples to illustrate the performance of learning algorithms and instructing readers how to apply them to practical applications, this unique work offers a comprehensive treatment of subspace learning algorithms for neural networks. The authors summarize a decade of high-quality research offering a host of practical applications. They demonstrate ways to extend the use of algorithms to fields such as encryption communication, data mining, computer vision, and signal and image processing to name just a few. The brilliance of the work lies with how it coherently builds a theoretical understanding of the convergence behavior of subspace learning algorithms through a summary of chaotic behaviors. Catalog no. K10786, ISBN: 978-1-4398-1535-9 May 2010, 6-1/8 x 9-1/4, 250 pp. Suggested Price: $99.95 / £63.99

Computational Statistics An Introduction to R Günther Sawitzki StatLab, Heidelberg, Germany

Using a range of examples, this introduction illustrates how R can be employed to tackle statistical problems. It covers one-sample analysis and distribution diagnostics, regression, two-sample problems and comparison of distributions, and multivariate analysis. In addition, the handy appendix includes a collection of R language elements and functions, serving as a quick reference and starting point to access the rich information that comes bundled with R. Helping readers become familiar with R, the author offers the full R source code for all examples, selected solutions, and other ancillary material on the book’s website. Catalog no. C6782, ISBN: 978-1-4200-8678-2 January 2009, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $79.95 / £48.99

CD-ROM Included CD-ROM Included

C++ for Mathematicians An Introduction for Students and Professionals

A Guide to MATLAB® Object-Oriented Programming Andy H. Register

Edward Scheinerman

Georgia Tech Research, Smyrna, USA

Johns Hopkins University, Baltimore, Maryland, USA

Written specifically for a mathematical audience, C++ for Mathematicians omits the language’s more obscure features in favor of the aspects of greatest utility for mathematical work. Emphasizing the essential role of practice as part of the learning process, the book is ideally designed for undergraduate coursework as well as self-study. Each chapter provides many problems and solutions which complement the text and enable you to apply concepts right away. An accompanying CD-ROM provides all numbered programs so that readers can easily use or adapt the code as needed.

The first book to deliver broad coverage of the documented and undocumented object-oriented features of MATLAB®, this guide aids readers in creating effective software. Eight basic functions are discussed: constructor, subsref, subsasgn, display, struct, fieldnames, get, and set. Also explored are inheritance topics and the Class Wizard, a powerful MATLAB® class generation tool. The final section delves into advanced strategies, including vectorized classes, containers, static variables, and function fronts, protected visibility, and pass-by-reference visibility. Included is a CD-ROM with source code, enabling readers to experiment with modifications and apply new concepts.

Catalog no. C584X, ISBN: 978-1-58488-584-9 June 2006, 6-1/8 x 9-1/4, 520 pp., Soft Cover Suggested Price: $67.95 / £42.99

Catalog no. C911X, ISBN: 978-1-58488-911-3 May 2007, 7 x 10, 384 pp., Soft Cover Suggested Price: $83.95 / £53.99

Machine Learning & Pattern Recognition / Programming Languages

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

47


For more information and a complete list Textbook

Programming Languages / Systems & Computer Architecture 48

Introduction to Concurrency in Programming Languages Edited by

Matthew Sottile

Mathematical Objects in C++ Computational Tools in a Unified Object-Oriented Approach

University of Oregon, Eugene, USA

Yair Shapira

Craig E. Rasmussen

Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation, 9

Los Alamos National Laboratory, New Mexico, USA Series: Chapman & Hall/CRC Computational Science, 5

Illustrating the effect of concurrency on programs written in familiar languages, this text focuses on novel language abstractions that truly bring concurrency into the language and aid analysis and compilation tools in generating efficient, correct programs. It also explains the complexity involved in taking advantage of concurrency with regard to program correctness and performance. The book describes the historical development of current programming languages and the common threads that exist among them. It also contains several chapters on design patterns for parallel programming and includes quick reference guides to OpenMP, Erlang, and Cilk. Ancillary materials are available on the book’s website.

Emphasizing the connection between mathematical objects and their practical C++ implementation, this book provides a comprehensive introduction to both the theory behind the objects and the C and C++ programming. Objectoriented implementation of three-dimensional meshes facilitates understanding of their mathematical nature. Requiring no prerequisites, the text covers discrete mathematics, data structures, and computational physics, including high-order discretization of nonlinear equations. Exercises and solutions make the book suitable for classroom use and a supporting website supplies downloadable code. Catalog no. K10574, ISBN: 978-1-4398-1147-4 June 2009, 6-1/8 x 9-1/4, 609 pp. Suggested Price: $99.95 / £63.99

Catalog no. C7213, ISBN: 978-1-4200-7213-6 September 2009, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $79.95 / £49.99

Textbook

Introduction to Scientific Programming and Simulation Using R Owen Jones, Robert Maillardet, & Andrew Robinson University of Melbourne, Parkville, Australia

An introductory text, this book surveys a range of useful mathematical tools that either require or are illuminated by scientific computation. The focus is on the use of R, an open-source programming environment. Input and output, functions, data structures, and flow programming are covered, as are numerical techniques, probability, simulation, and stochastic modeling. Where appropriate, formal derivations are provided. The text is supplemented with simple yet relevant examples that allow students to see how the tools can be applied to contemporary problems. Catalog no. C6872, ISBN: 978-1-4200-6872-6 March 2009, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $79.95 / £48.99

Textbook CD Included

The Art of Systems Architecting Third Edition Mark W. Maier & Eberhardt Rechtin Series: Systems Engineering

Extensively rewritten to reflect the latest developments, the third edition explains how to create a system from scratch, presenting invention/design rules together with clear explanations of how to use them. The author supplies practical guidelines for avoiding common systematic failures while implementing new mandates. He uses a heuristics-based approach that provides an organized attack on very ill-structured engineering problems. Examining architecture as more than a set of diagrams and documents, but as a set of decisions that either drive a system to success or doom it to failure, the book provide methods for integrating business strategy with technical architectural decision making. Catalog no. 79131, ISBN: 978-1-4200-7913-5 January 2009, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $99.95 / £60.99

Java Programming Fundamentals

Textbook

Problem Solving Through Object Oriented Analysis and Design

Design of Enterprise Systems Theory, Architecture, and Methods

Premchand S. Nair

Ronald E. Giachetti

Creighton University, Omaha, Nebraska, USA

Florida International University, Miami, Florida, USA

While Java texts are plentiful, it’s difficult to find one that takes a real-world approach, one that encourages students to build on their Java skills through practical exercise. Written by an expert with 18 years of Java teaching experience, this book presents object-oriented programming employing examples taken from everyday life. It uses Java 6 and includes detailed explanations of key concepts, solved examples, and a number of supplements for students and instructors found on an accompanying CD and a dedicated website. The book also includes a detailed chapter on Graphical User Interface, which allows students to begin to produce programs that they can interact with in more familiar ways.

Specifically written for graduate and undergraduate courses, this book provides the knowledge and skills necessary to lead enterprise engineering projects. The book describes a systematic methodology to design an enterprise system and presents an enterprise architecture that has three views of process, information, and organization. The text includes methods to analyze and design each view and then demonstrates how to integrate them to arrive at the overall enterprise design. The author also includes enterprise project template in MS Word and MS Excel, a business process analyzer in MS Excel, PowerPoint slides for each chapter, as well as solutions for the 200 problems that are presented in the book.

Catalog no. C6547, ISBN: 978-1-4200-6547-3 November 2008, 7 x 10, 729 pp., Soft Cover Suggested Price: $89.95 / £57.99

Catalog no. K10955, ISBN: 978-1-4398-1823-7 February 2010, 7 x 10, 368 pp. Suggested Price: $99.95 / £63.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Yoonjin Kim & Rabi N. Mahapatra Texas A&M University, College Station, USA

Presenting new approaches to reconfigurable architectures for embedded systems, this book discusses the design and implementation of coarse-grained reconfigurable architectures (CGRAs). It provides novel techniques for designing CGRA-based systems. Focusing on low-power reconfiguration techniques, the text highlights the tradeoffs between performance and power in CGRAs and details integrated low-power design approaches. The authors outline the history and emerging research of CGRAs. They also cover dynamic context management and compression for low-power CGRAs as well as hierarchical reconfigurable computing arrays. Catalog no. K11194, ISBN: 978-1-4398-2510-5 June 2010, 6-1/8 x 9-1/4, 250 pp. Suggested Price: $99.95 / £63.99

Energy Efficient HardwareSoftware Co-Synthesis Using Reconfigurable Hardware Jingzhao Ou Xilinix, San Jose, CA, USA

Viktor K. Prasanna University of Southern California, Los Angeles, USA Series: Chapman & Hall/CRC Computer & Information Science, 21

Energy dissipation and efficiency have prevented the widespread use of FPGA devices in embedded systems. Helping overcome these challenges, this book offers solutions for the development of energy efficient applications using FPGAs. It provides a framework for high-level hardware-software application development, describes energy performance modeling for reconfigurable systemon-chip devices, and explores energy efficient designs for various applications. The authors present a two-step rapid energy estimation technique that enables high-level design space exploration and offer a hardware-software design for energy efficient implementations of operating systems. Catalog no. C7419, ISBN: 978-1-58488-741-6 October 2009, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $99.95 / £60.99

Naiqi Wu Guangdong University of Technology, Peoples Republic of China

MengChu Zhou New Jersey Institute of Technology, Newark, USA Series: Automation and Control Engineering, 35

This cutting-edge volume introduces a new resource-oriented Petri net (ROPN) model developed by the authors. Not only does it successfully reduce model size, but also offers improvements that facilitate effective modeling, analysis, and control of automated and reconfigurable manufacturing systems. Presenting the latest research in this novel approach, the text provides proven theories and methodologies for implementing cost- and time-saving improvements to contemporary manufacturing systems. It provides effective tools for deadlock avoidance—deadlock-free routing and deadlock-free scheduling. The authors supply simple and complex industrial manufacturing system examples to illustrate time-tested concepts, theories, and approaches for solving real-life application problems. Catalog no. K10436, ISBN: 978-1-4398-0884-9 October 2009, 6-1/8 x 9-1/4, 312 pp. Suggested Price: $99.95 / £63.99

Computer Science Handbook Second Edition Edited by

Allen B. Tucker Bowdoin College, Brunswick, Maine, USA

The second edition of this elemental handbook reviews the state of theory and practice in the field while emphasizing a more practical/applied approach to IT topics such as information management, net-centric computing, and human/computer interaction. With a complete revision of its sections on software engineering, architecture, and operating systems, this manual includes information on web-based software, speech recognition, data mining, cryptography, and distributed-objects computing as well as references and sources for further information. Catalog no. C360X, ISBN: 978-1-58488-360-9 June 2004, 7 x 10, 2752 pp. Suggested Price: $154.95 / £98.00

Textbook Textbook

Modeling and Simulation of Systems Using MATLAB® and Simulink®

Fundamentals of Natural Computing Basic Concepts, Algorithms, and Applications Leandro Nunes de Castro

Dayalbagh Educational Institute, India

Catholic University of Santos, Brazil Series: Chapman & Hall/CRC Computer & Information Science, 11

Systems engineering encompasses a variety of components that embrace physical and conceptual phenomena. This book addresses all aspects of systems modeling and simulation. The first part of the text presents a step-by-step procedure for modeling different types of systems using techniques like a graph theoretic approach, interpretive structural modeling, and system dynamics modeling. It also covers physical systems framework and identification, systems analysis, and optimization aspects and numerical analysis. The second part presents real-life examples of simulation that illustrate state-of-the-art simulation. The text also develops MATLAB® and Simulink programs for system simulation.

A wide-ranging survey of novel techniques and important applications, this book contains theoretical and philosophical discussions, pseudocodes for algorithms, and computing paradigms that illustrate how computational techniques can solve complex problems, simulate nature, explain natural phenomena, and allow the development of new computing technologies. The author uses a consistent and approachable format that includes figures, tables, examples, and exercises that encourage readers to apply the computational tools. Topics include evolutionary computing, neurocomputing, swarm intelligence, immunocomputing, fractal geometry, artificial life, quantum computing, and DNA computing.

Catalog no. K10335, ISBN: 978-1-4398-0672-2 December 2009, 7 x 10, 740 pp. Suggested Price: $129.95 / £44.90

Catalog no. C6439, ISBN: 978-1-58488-643-3 June 2006, 6-1/8 x 9-1/4, 696 pp. Suggested Price: $89.95 / £45.99

Devendra K. Chaturvedi

Systems & Computer Architecture / Theory

Design of Low-Power Coarse-Grained Reconfigurable Architectures

System Modeling and Control with Resource-Oriented Petri Nets

49


For more information and a complete list Game Theory for Wireless Communications and Networking Edited by

Yan Zhang Simula Research Laboratory, Norway

Mohsen Guizani

Theory / Database Design & Management 50

Performance Analysis of Queuing and Computer Networks G.R. Dattatreya

Western Michigan University, Kalamazoo, USA Series: Wireless Networks and Mobile Communications

MITRE, Colorado Springs, Colorado, USA Series: Chapman & Hall/CRC Computer & Information Science, 18

Originally invented to explain complicated economic behaviors, game theory is poised to become a fundamental technique in the field of wireless communications and networks. This book explains how game theory can be used to address a wide range of issues in wireless communications and examines how it can be employed in infrastructure-based wireless networks and multihop networks to reduce power consumption, improve system capacity, decrease packet loss, and enhance network resilience. The authors demonstrate how to effectively apply the game theoretic model to handle issues of resource allocation, congestion control, attack, routing, energy management, packet forwarding, and MAC.

With examples and exercises, this text develops simple models and analytical methods from first principles to evaluate performance metrics of various configurations of computer systems and networks. It includes simple, analytically tractable models, such as optimization of saturated CSMA/CD and CSMA/CA LANs; presents models for complex systems as analyzable modifications and/ or interconnections of simple models; and contains a wide variety of queuing models, including bursty, MMPP, approximate self-similar traffic, and fluid flow. The author also discusses timing and synchronization in the analysis of discrete time (slotted) networks.

Catalog no. K10439, ISBN: 978-1-4398-0889-4 August 2010, 6-1/8 x 9-1/4, 450 pp. Suggested Price: $99.95 / £63.99

Catalog no. C9861, ISBN: 978-1-58488-986-1 June 2008, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $89.95 / £57.99

Textbook

Introducing Game Theory and its Applications

Perspectives in Concurrency

Elliott Mendelson

Edited by

Queens College, Dept. of Mathematics, Flushing, New York USA Series: Discrete Mathematics and Its Applications, 21

Kamal Lodaya & Madhavan Mukund

The mathematical study of games is an intriguing endeavor with applications that reach beyond chess and poker to economics, business, and even biology. This book presents an easy-to-read introduction to the basic ideas and techniques of game theory. It begins by discussing combinatorial games—a topic often neglected in other texts—then moves to two-person zero-sum games. The final chapter explores the concepts and tools of non-zero-sum games and games with more than two players. Suitable as a textbook, for self-study, and as a reference, this introduction prepares readers for more advanced study of game theory’s applications in economics, business, and the physical, biological, and social sciences.

Concurrency theory is an important research area within theoretical computer science, with applications in parallel and distributed computing. This book provides an overview of current research in concurrency through state-of-the-art contributions from worldwide experts. Covering contemporary topics, including petri nets, temporal logics, program verification with concurrent threads, computational trust, and more, this book presents emerging research in this important field.

Catalog no. C3006, ISBN: 978-1-58488-300-5 July 2004, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $79.95 / £34.99

Introduction to Mathematics of Satisfiability Victor W. Marek University of Kentucky, Lexington, USA Series: Chapman & Hall/CRC Studies in Informatics, 4

Institute of Mathematical Science, Chennai, India

Catalog no. N10090, ISBN: 978-1-4398-0943-3 April 2009, 6-1/8 x 9-1/4, 484 pp. Suggested Price: $89.95 / £54.99

Building and Maintaining a Data Warehouse Fon Silvers Data Warehouse Analyst and Developer, Tampa, Florida, USA

This book focuses on the satisfiability of theories consisting of propositional logic formulas. It first deals with logic fundamentals, including the syntax of propositional logic, complete sets of functors, normal forms, the Craig lemma, and compactness. The book then examines clauses, their proof theory and semantics, and basic complexity issues of propositional logic. The final chapters on knowledge representation cover finite runs of Turing machines and encodings into SAT. The author also shows how constraint satisfaction systems can be worked out by satisfiability solvers and how answer set programming can be used for knowledge representation.

Based on a foundation of industry-accepted principles, Building and Maintaining A Data Warehouse provides an easy-to-follow approach that is cohesive and holistic. By offering the perspective of a successful data warehouse, as well as that of a failed one, the author details those factors that must be accomplished and those that are best avoided. He looks at areas of a data warehouse individually and in sequence, showing how each piece becomes a working part of the whole. He examines the concepts and principles common to every successful data warehouse and also explains how to recognize and attend to problematic gaps in an established data warehouse.

Catalog no. K10101, ISBN: 978-1-4398-0167-3 September 2009, 6-1/8 x 9-1/4, 364 pp. Suggested Price: $89.95 / £54.99

Catalog no. AU6462, ISBN: 978-1-4200-6462-9 March 2008, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $79.95 / £49.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Sikha Bagui & Richard Earp University of West Florida, Pensacola, Florida, USA Series: Foundations of Database Design, 2

HOWTO Secure and Audit Oracle 10g and 11g Ron Ben Natan CTO, Guardium Inc., Waltham, Massachusetts, USA

Database Design Using Entity-Relationship Diagrams clarifies ER diagram design by defining it in terms of requirements (end-user requests) and specifications (designer feedback to that request). The book emphasizes how communication between designers and users during design is crucial for the elicitation of targeted data, and for the creation of an understandable ER diagram. The authors describe how to develop an ER diagram, how to map it to a database, and how the resulting database can be tested. This definitive guide is a beneficial component of any database course and is a strong supplement for any database professional unfamiliar with ER design.

This guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the handson guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that should be taken to enable, configure, or administer security-related features. It includes best practices in securing Oracle and on Oracle security options and products. By providing specific instructions and examples, this book bridges the gap between the individuals who install and configure a security feature and those who secure and audit it.

Catalog no. AU1548, ISBN: 978-0-8493-1548-0 June 2003, 7 x 10, 242 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU4127, ISBN: 978-1-4200-8412-2 March 2009, 7 x 10, 472 pp. Suggested Price: $69.95 / £42.99

The Decision Model Edited by

Implementing Electronic Document and Record Management Systems

Barbara von Halle & Larry Goldberg

Azad Adam

A Business Logic Framework Linking Business and Technology Knowledge Partners International, Mendham, New Jersey, USA

Independent Consultant, London, UK

With so much growth in SOA, BPM, and EDM technology, corporations are in need of a way to organize their business logic—business rules—in a way that will allow the greatest agility for the business while leveraging current IT assets. Written by two pioneering consultants and bestselling authors with track records of international success, this volume explains how to implement the Decision Model, a stable, rigorous model of core business logic that informs current and emerging technology. It offers a strong theoretical foundation, while succinctly defining the path needed to incorporate agile and iterative techniques to develop a model that can become a cornerstone for continual growth.

Despite the global shift toward delivering services online, there is little information available on how to electronically deliver documents and records. Implementing Electronic Document and Record Management Systems addresses this need, as well as the host of issues related to paperless enterprises. From starting up the project to systems administration, this book provides complete coverage of every aspect of implementation and management processes. The text also explains managing cultural changes and business process re-engineering that organizations undergo as they switch from paper-based records to electronic documents. Case studies offer a practical look at successful real-world implementations.

Catalog no. AU2817, ISBN: 978-1-4200-8281-4 October 2009, 6-1/8 x 9-1/4, 553 pp. Suggested Price: $59.95 / £36.99

Catalog no. AU8059, ISBN: 978-0-8493-8059-4 August 2008, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $93.95 / £59.99

Design and Implementation of Data Mining Tools M. Awad, Latifur Khan, Bhavani Thuraisingham, & Lei Wang

ITIL Service Management Implementation and Operation Ahmad K. Shuja Shuja Consulting, Somerset, New Jersey, USA

Based on the authors’ own research work, this book explains how to create and employ systems and tools for intrusion detection, web page surfing prediction, and image classification. Focusing on three applications of data mining, the book takes a practical approach to the subject. A hands-on guide, it discusses the performance results, limitations, and unique contributions of data mining systems. It provides essential information for technologists to decide on the tools to select for a particular application, for developers to focus on alternative designs if an approach is unsuitable, and for managers to choose whether to proceed with a data mining project.

Filled with first-hand practitioner insights in implementing ITIL in a number of large organizations across industries, this book discusses the key challenges organizations experience as they try to leverage ITIL V3 to achieve desired transformations and approaches that they adopted to address those challenges. The author explains key components necessary to successfully implement, operate, and optimize ITIL service management. He presents implementation patterns and detailed plans for each of the patterns and includes templates and checklists he developed to facilitate implementation of such transformational efforts.

Catalog no. AU4590, ISBN: 978-1-4200-4590-1 June 2009, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $89.95 / £54.99

Catalog no. AU8939, ISBN: 978-1-4200-8939-4 March 2010, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $69.95 / £44.99

Database Design & Management

Database Design Using Entity-Relationship Diagrams

51


For more information and a complete list

Database Design & Management / IT Management 52

Oracle Embedded Programming and Application Development Lakshman Bulusu

The Business Value of IT Managing Risks, Optimizing Performance and Measuring Results

Software Professional, New Jersey, USA

Michael D. S. Harris, David Herron, & Stasia Iwanicki

Geared towards IT professionals developing Oracle-based Web-enabled applications in PLlSQL, Java, C, C++, .NET, Perl, and PHP, this book focuses on best practices in Oracle embedded programming and emphasizes their use in application development, design, and coding. It explains application development frameworks for embedding code segments across .NET, Java, and open source environments using SQL, PLlSQL, and Oracle RDBMS through version 11g. Concentrating on techniques and practices that facilitate efficient integration and interaction with the Oracle database through version 11g, this book shows how to improve code compilation and execution.

The Business Value of IT: Managing Risks, Optimizing Performance, and Measuring Results examines how to measure IT performance, how to put a dollar value on IT, and how to justify the value of an entire IT program. It places sharp technical focus on the techniques, methods, and processes used to identify and to assess risks. Based on the authors’ extensive experience, this comprehensive text discusses IT from the perspective of its contribution to business, the necessity of governance, the importance of measuring performance, and changes that must be made in order to effectively measure IT.

Catalog no. K10845, ISBN: 978-1-4398-1644-8 May 2010, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU6474, ISBN: 978-1-4200-6474-2 March 2008, 6-1/8 x 9-1/4, 296 pp. Suggested Price: $69.95 / £44.99

The Effective CIO Strategic Data Warehousing Achieving Alignment with Business Neera Bhansali

How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance Eric J. Brown NCI Building Systems, The Woodlands, Texas, USA

William A. Yarberry, Jr.

iMEMS Corp.

President, ICCM Consulting, Houston, Texas, USA

Organization of data warehouses are vital but often ignored aspects of growing enterprises. This work merges technological know-how with managerial practices to show both the business manager and the IT professional how better alignment between data warehouse plans and business strategies can lead to a successful data warehouse adoption that will support the entire infrastructure. More complete than any other text in the field, this resource also addresses the managerial and strategic aspects of data warehouses, offering doable solutions that will allow for the strategic alignment of these warehouses while building them and ensuring that this alignment is sustained.

Unlike many books, that merely discuss the strategies important to the chief information officer, this volume discusses how the guidelines it recommends can actually be executed. The author provides a survey of existing strategies and detailed problem-solving ideas, such as how to structure optimal IT and telecom contracts with suppliers, the implications of SOP-98, and accounting for software costs. This book brings together the perspectives of a working CIO who must cope with the day-to-day pressure for results, and that of an IT auditor with a special focus on governance and internal control. Examples, charts, templates, and anecdotes supplement the material.

Catalog no. AU3945, ISBN: 978-1-4200-8394-1 July 2009, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $69.95 / £44.99

Catalog no. AU6460, ISBN: 978-1-4200-6460-5 December 2008, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $79.95 / £49.99

Enterprise Business Architecture Best Practices in Business Technology Management

The Formal Link between Strategy and Results

Stephen J. Andriole

Conrad B. Myrick

Ralph Whittle Strategic Business/IT Consultant, Plano, Texas, USA

Villanova University, Pennsylvania, USA

Consultant, Richardson, Texas, USA

Discussing specific best practices, this book offers qualitative and quantitative methods, tools, and techniques for deploying and supporting all types of information technology. It identifies the range of technology decisions that managers make and the best practices that define good acquisition, deployment, and support decisions—in an easy to absorb tone. The book covers the interrelated business technology alignment areas of business strategy as well as technology applications, architecture, infrastructure, support, acquisition, and organization. Each section ends with a summary of actionable best practices.

Introducing Enterprise Business Architecture (EBA) concepts and terms, this book emphasizes the importance of architectures in reaching business goals. It challenges readers to research and analyze the architectural needs of their business, enabling them to understand both their chosen architecture and the behaviors and discipline needed to maximize its potential. The author illustrates a high-level approach for building the EBA and provides a richly illustrated case study and guidance for relating the value of this approach to your enterprise. He provides suggestions derived from successful engagements that implemented the formal EBA approach with integrated enterprise architectures.

Catalog no. AU6333, ISBN: 978-1-4200-6333-2 September 2008, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $69.95 / £44.99

Catalog no. AU2788, ISBN: 978-0-8493-2788-9 August 2004, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $78.95 / £49.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m CD-ROM Included

ERP

Carol A. Ptak

ITIL

Consultant, Long Branch, Washington, USA

Assessment, Planning, and Management

Eli Schragenheim Elyakin Management Systems Ltd., Ra’anana, Israel Series: Resource Management

The second edition of this bestselling reference illustrates enterprise resource planning (ERP) from the perspective of the business manager. It furnishes a clear, detailed roadmap with real-life examples for successful selection, implementation, and utilization of ERP for improved competitiveness. The book covers concepts like supplier relationship management, customer relationship management, and technology support. The text includes the Management Interactive Case Study Simulator on CD-ROM that simulates a real-time ERP information system and allows users to practice managing a small company. Catalog no. SL3585, ISBN: 978-1-57444-358-5 2004, 6-1/8 x 9-1/4, 464 pp. Suggested Price: $83.95 / £53.99

Donna M. Manley University of Pennsylvania, Philadelphia, USA

This book details the preliminary due diligence, planning, and execution required to effectively institute ITIL as a way of business life. It presents the benefits of using this framework and details how to prepare an organization for the opportunities and challenges that this commitment brings. Including sample timelines, the author discusses how to successfully identify processes currently in place, understand the role each process plays in the organization, and determine if a process is really necessary. The text concludes with methods to sustain progress through organizational and personal performance activities. Catalog no. K11345, ISBN: 978-1-4398-2724-6 June 2010, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $79.95 / £41.99

CD-ROM Included

Implementing Program Management Templates and Forms Aligned with the Standard for Program Management Second Edition (2008) Ginger Levin & Allen R. Green Written by two successful PgMPs, this work presents a step-by-step methodology for managing a program from initiation to closure. Mirroring PMI’s Standard for Program Management: Second Edition (2008), the book goes beyond listing the best practices in the PMI’s Standard to provide detailed guidance for these practices, enabling program managers to successfully coordinate any program. The templates described can be customized as required through a CD-ROM that is included with this book. This unique package of ready-to-use documents, tools, forms, templates, and reports empowers program managers to bring their programs to a successful finish and deliver its intended benefits to stakeholders. Catalog no. K10824, ISBN: 978-1-4398-1605-9 October 2009, 6-1/8 x 9-1/4, 312 pp. Suggested Price: $79.95 / £49.99

Knowledge Management in Public Health Edited by

Jay Liebowitz, Richard A. Schieber, & Joanne D. Andreadis A general introduction to KM and social networking in the public health arena, this book begins by delineating basic principles, components, and methodologies as well as trends and key issues in public health. It includes ten case studies illustrating applications of KM and social networking in public health. The editors and chapter authors explore the many elements of KM, delineating how and why to start such an initiative. They provide specific examples of the development and value-added benefits of KM in a variety of public health environments. Catalog no. K10300, ISBN: 978-1-4398-0600-5 July 2009, 6-1/8 x 9-1/4, 230 pp. Suggested Price: $89.95 / £57.99

Implementing the IT Balanced Scorecard

Knowledge Retention

Aligning IT with Corporate Strategy

Strategies and Solutions

Jessica Keyes

Jay Liebowitz

New Art Technologies, Edgewater, New Jersey, USA

Johns Hopkins University, Rockville, Maryland, USA

Thoroughly explaining the concept of the scorecard framework from the corporate and IT perspectives, Implementing the IT Balanced Scorecard: Aligning IT with Corporate Strategy lays the groundwork for implementation of the scorecard approach. It provides examples, case studies and histories that offer insight into performance measurement and management, continuous process improvement, benchmarking, metrics selection, and people management. This volume discusses how to integrate these concepts into the four perspectives of the balanced scorecard. The book presents a one-stop, “how-to” approach for organizational success.

Devised to help those organizations who are dependent on the accumulated knowledge of stakeholders, this book details a proactive approach to knowledge retention. Written by Jay Liebowitz, one of the most sought-after knowledge management experts, this text explains how to identify at risk knowledge areas, and then demonstrates how to keep those areas from becoming knowledge vacuums. To reinforce his points, the book contains case studies from The Aerospace Corporation, Chevron, and Knowledge Harvesting Inc., who have become models for the implementation of knowledge retention strategies.

Catalog no. AU2621, ISBN: 978-0-8493-2621-9 February 2005, 6-1/8 x 9-1/4, 528 pp. Suggested Price: $83.95 / £53.99

IT Management

Tools, Techniques, and Applications for Integrating the Supply Chain, Second Edition

Catalog no. AU6465, ISBN: 978-1-4200-6465-0 August 2008, 6-1/8 x 9-1/4, 144 pp. Suggested Price: $69.95 / £44.99

53


For more information and a complete list

Leading IT Projects The IT Manager’s Guide Jessica Keyes New Art Technologies, Edgewater, New Jersey, USA

IT Management

Leading IT Projects: The IT Manager’s Guide provides a detailed roadmap for project success. It reviews the technical aspects of project management focusing on the human side of project management—including leadership skills, team building, and promoting creativity. Overall, it facilitates an extensive understanding of the planning, monitoring, and control of the people, process, and events that occur as a computer system evolves from preliminary concept to operational implementation. Catalog no. AU7082, ISBN: 978-1-4200-7082-8 August 2008, 7 x 10, 336 pp. Suggested Price: $79.95 / £49.99

Lean Six Sigma Secrets for the CIO William Bentley Peter Davis & Associates, GA, USA

Peter T. Davis

Bhuvan Unhelkar Consultant, Wahroonga, Australia Series: Advanced & Emerging Communications Technologies

Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization. The mobile enterprise transition (MET) process presented considers input from the four significant dimensions of an organization—economic, technical, process, and social— making it a well-rounded and complete process. Based on extensive research, literature review, and practical experimentation, this comprehensive text presents emerging best practices, exhaustive case studies, and examples of successful transitions. Catalog no. AU8275, ISBN: 978-1-4200-7827-5 June 2009, 6-1/8 x 9-1/4, 420 pp. Suggested Price: $79.95 / £48.99

Oracle Identity Management Governance, Risk, and Compliance Architecture, Third Edition Marlin B. Pohlman Oracle Corporation, Redwood Shores, California, USA

Lean Six Sigma Secrets for the CIO supplies proven tips and valuable case studies to illustrate how to combine Six Sigma’s rigorous quality principles with Lean methods to discover and eliminate waste in IT processes. Using these methods, the text explains how to take an approach that is all about improving IT performance and security as much as it is about cutting costs. Savvy IT veterans describe how to use Lean Six Sigma with IT governance frameworks such as COBIT and ITIL and explain why these frameworks need to be considered starting points rather than destinations.

Identity management specialist Marlin B. Pohlman brings over 14 years of professional experience to offer a definitive guide for corporate stewards struggling with the challenge of meeting regulatory compliance pressures while embarking on the path of process and system remediation. He examines multinational regulations, delves into the nature of governance, risk, and compliance (GRC), and outlines a common taxonomy for the GRC space. He also cites standards that are used, illustrating compliance frameworks such as BSI, ITIL, and COBIT. This resource focuses on specific software components of the Oracle Identity Management solution and includes elements of the Oracle compliance architecture.

Catalog no. K10211, ISBN: 978-1-4398-0379-0 September 2009, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $49.95 / £31.99

Catalog no. AU7247, ISBN: 978-1-4200-7247-1 April 2008, 7 x 10, 552 pp., Soft Cover Suggested Price: $69.95 / £44.99

Peter Davis & Associates, Toronto, Ontario, Canada

54

Mobile Enterprise Transition and Management

CD-ROM Included

Marketing IT Products and Services

A Practical Guide to Information Systems Strategic Planning Second Edition Anita Cassidy Strategic Computing Directions, Prior Lake, Minnesota, USA

Helping IT managers and marketing managers get up to speed, quickly and easily, on what’s needed to develop effective marketing campaigns, Marketing IT Products and Services focuses on the unique issues involved in the marketing of IT products and services. This one-stop resource provides everything needed to understand the roles, responsibilities, and management techniques essential for the development of successful strategies. A CD-ROM with time-saving templates and other supplemental material is also included.

Taking a look at the role of IS governance in strategic planning, this second edition reflects advances in technology and provides an improved and thorough planning methodology. The authors details a quick and easy approach with concepts, techniques, and templates for analyzing, organizing, communicating, and implementing an IS strategy. This approach unites an organization in a collaborative effort resulting in a solid direction that has the support of the entire organization. Establishing this direction cultivates the support of management, enabling necessary strategic IS investments. The book guides readers through the development of an effective IS plan formulated from their company’s business plan.

Catalog no. K10177, ISBN: 978-1-4398-0319-6 September 2009, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $69.95 / £44.99

Catalog no. AU5073, ISBN: 978-0-8493-5073-3 October 2006, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $62.95 / £39.99

Jessica Keyes New Art Technologies, Edgewater, New Jersey, USA


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Cloud Computing Implementation, Management, and Security John W. Rittinghouse

Edited by

Hypersecurity LLC, Houston, Texas, USA

Leon A. Kappelman

James F. Ransome

University of North Texas, Denton, USA

Cisco Systems, Santa Clara, California, USA

Presenting insights from leading authorities, this book provides a solid understanding of the key concepts in enterprise architecture. It explains how to conduct more effective oversight of enterprise architecture activities for more efficient management of resources. Beginning with a look at current theory and frameworks, the book discusses the practical application of enterprise architecture and best practices. It provides a wealth of resources and references, including the SIM’s survey of IT organizations’ enterprise architecture activities—complete with important metrics for evaluating progress and success.

This book provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages. It discusses how new technologies, such as virtualization, played a huge role in the growth and acceptance of cloud computing. It also describes different types of cloud services, illustrates how to build a cloud network, and presents common standards for application development, messaging, and security. The authors cover the legal and philosophical issues that must be addressed to properly protect user data and mitigate corporate liability and examine the successes of several cloud computing vendors.

Catalog no. K10555, ISBN: 978-1-4398-1113-9 October 2009, 6-1/8 x 9-1/4, 330 pp. Suggested Price: $59.95 / £38.99

Catalog no. K10347, ISBN: 978-1-4398-0680-7 August 2009, 6-1/8 x 9-1/4, 340 pp. Suggested Price: $79.95 / £49.99

Cloud Computing A Tale of Two Systems Lean and Agile Software Development for Business Leaders Michael K. Levine

Technologies and Strategies of the Ubiquitous Data Center Curtis Franklin Jr. The CF2 Group, Gainesville, Florida, USA

Brian Chee

Wells Fargo Home Mortgage, Minneapolis, Minnesota, USA

University of Hawaii, Honolulu, USA

A Tale of Two Systems: Lean and Agile Software Development for Business Leaders reviews two fictional systems development projects. One project proves to be an abject and expensive failure, while the other succeeds in creating a major new revenue stream and solving important customer needs. Contrasting the methods employed in a traditional, process-centric ‘waterfall’ approach, with a lean and agile-inspired approach, this book provides business leaders with a tangible understanding of why Lean thinking is so well-suited to contemporary environments requiring flexibility, speed, and the input of specialized knowledge.

Providing a comprehensive overview of cloud computing for business, this book presents the critical strategies that IT professionals need in order to take advantage of this new technology. The authors, who are leaders in the field, explain how cloud computing differs from the grid and from virtualization before demonstrating how to develop tactics that best utilize the unique capabilities of the cloud. The text includes a comprehensive list of cloud computing providers and detailed tools for integrating cloud capabilities into a business IT structure. With a separate section covering how to secure the cloud perimeter, it also addresses various IT issues as well as compliance regulations.

Catalog no. K10217, ISBN: 978-1-4398-0389-9 June 2009, 6 x 9, 344 pp. Suggested Price: $49.95 / £31.99

Catalog no. K10303, ISBN: 978-1-4398-0612-8 May 2010, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $69.95 / £44.99

Advanced Server Virtualization VMware® and Microsoft® Platforms in the Virtual Data Center David Marshall, Wade A. Reynolds, & Dave McCrory

Enterprise Architecture A thru Z Frameworks, Business Process Modeling, SOA, and Infrastructure Technology Daniel Minoli SES Americom, Princeton, New Jersey, USA

Presenting practical guidelines and examples, Advanced Server Virtualization emphasizes design, implementation, and management from both a technical and consultative point of view. It features step-by-step guidelines for planning, deployment, installing, configuring, and creating virtual servers. Covering Microsoft® Virtual Server and VMware®, it addresses platform-specific virtualization features such as virtual machines, hard drives, networking, and resource management. It offers best practices that allow users to avoid common pitfalls and achieve success faster during server virtualization implementations. It also discusses software licensing issues and the cost-benefits of deploying virtual servers.

Enterprise Architecture A to Z examines cost-saving trends in architecture planning, administration, and management. The text begins by evaluating the role of Enterprise Architecture planning and Service-Oriented Architecture (SOA) modeling. It provides an extensive review of the most widely-deployed architecture framework models, including The Open Group Architecture and Zachman Architectural Frameworks, as well as formal architecture standards. The first part of the text focuses on the upper layers of the architecture framework, while the second part focuses on the technology architecture. Additional coverage discusses Ethernet, WAN, Internet communication technologies, broadband, and chargeback models.

Catalog no. AU3931, ISBN: 978-0-8493-3931-8 May 2006, 6-1/8 x 9-1/4, 760 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU8517, ISBN: 978-0-8493-8517-9 June 2008, 7 x 10, 504 pp. Suggested Price: $79.95 / £49.99

IT Management / Operations Management

The SIM Guide to Enterprise Architecture

55


For more information and a complete list Enterprise Systems Backup and Recovery A Corporate Insurance Policy

IT Management / Operations Management 56

Preston de Guise

An IT Executive’s Guide to ITIL Running IT as a Customer-Centric Business

IDATA Pty Ltd., Sydney, Australia

Boris Pevzner

This volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of what operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance.

IT organizations within large companies have historically been viewed as a support function, but this has changed as executives recognize the strategic value that IT provides. In turn, this has led to increased pressure on IT executives to manage their organizations as a business. Exploring how to run IT like a business in the context of emerging IT management frameworks, particularly ITIL®, this text addresses how to put together a service catalog that takes full advantage of industry best practices. It describes how to build a cost model that uses servicebased costing and details how to use the suggested methodologies to improve the performance of your IT organization.

Catalog no. AU6396, ISBN: 978-1-4200-7639-4 October 2008, 7 x 10, 308 pp., Soft Cover Suggested Price: $69.95 / £44.99

The Green and Virtual Data Center Greg Schulz

Catalog no. K11338, ISBN: 978-1-4398-2714-7 June 2010, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $59.95 / £36.99

ITIL Release Management A Hands-on Guide

StorageIO Group, Stillwater, Minnesota, USA

Dave Howard

This book provides strategies and blueprints for enabling and deploying environmentally friendly next-generation data centers. It looks at design and implementation tradeoffs using various best practices and technologies to sustain application and business growth while maximizing resources, such as power, cooling, floor space, storage, server performance, and network capacity. The book shows how to make server and storage virtualization energy efficient and still be able to support a diversity of high-performance applications. It also explores performance and capacity planning in a virtual environment that supports resource-demanding applications, such as OLTP and streaming media.

Based on the theory of ITIL, this book deals with release management from a practical perspective. It builds a foundation on the lifecycle approach and examines what the implementation of a release process looks like in the real world. Templates, diagrams, and charts illustrate how to implement a release management practice in an organization. The text discusses how to sell the benefits of release management to all levels of the organization and how to develop ways to measure the effectiveness of the process. It also examines the differences between release management and project management and why there is confusion between the two complementary processes.

Catalog no. AU6669, ISBN: 978-1-4200-8666-9 January 2009, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $79.95 / £48.99

Catalog no. K10800, ISBN: 978-1-4398-1558-8 April 2010, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $69.95 / £44.99

Green IT Rex Maus

Sustainable Enterprise Architecture Edited by

Kirk Hausman

Exmar Offshore Company, Texas, USA

Functioning as a complete guide to green strategies, this book includes all of the facts that managers and CIOs need to know in order to create a Green IT strategy. Provided are the tools and strategies necessary for making cost-effective decisions that minimize the impact on the environment for new and existing facilities. It showcases 13 initiatives and provides a checklist for managers looking to transition to greener IT management. These adaptive strategies are explored focusing on the reasons to implement, business impact, and cost and benefit to the enterprise. Finally, the book proposes future strategies that IT managers will be expected to follow in coming years.

Providing guidance that can be applied to an enterprise of any scale, this book supplies IT practitioners with the tools needed to present enterprise architecture concepts to non-technical stakeholders. Rather than focusing on a single governance framework, the text explains how to develop successful and sustainable enterprise deployments in any setting. Coverage includes general security practices, common threats, storage mechanisms, and the impact of virtualization. The author presents functional considerations for developing and maintaining extended enterprise networks using practices tested in large scale enterprise settings.

Catalog no. K10191, ISBN: 978-1-4398-0342-4 February 2010, 6-1/8 x 9-1/4, 270 pp. Suggested Price: $69.95 / £44.99

Catalog no. K11142, ISBN: 978-1-4398-2154-1 June 2010, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $79.95 / £49.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Building a Project Work Breakdown Structure Dennis P. Miller

Merle Ilgenfritz & John Ilgenfritz

PMP, Pinehurst, North Carolina, USA Series: ESI International Project Management

Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate study guide to the VCP exam. Tightly organized and highly practical, it boosts classroom training so administrators can successfully prepare for the exam. On the job, it lets administrators maximize their ability to support VMware. This guide covers the body of knowledge required of a VMware certified professional, provides the tools needed to keep that knowledge current, and helps develop the wherewithal to apply that knowledge to real solutions.

This practical resource not only shows readers what they can do, but shows them how to do it. An organizing, visual communication, team-building, commitmentgaining, and project planning tool, the work breakdown structure (WBS) helps project managers communicate with their teams, clients, and management. This book provides an eight-step process that facilitates the development of the WBS. The process defines the project through its deliverables and validates the initial target date by critical path analysis. The result is a clear visualization of the project’s objectives, deliverables, activities, and schedule.

Catalog no. AU6599, ISBN: 978-1-4200-6599-2 October 2008, 7 x 10, 880 pp. Suggested Price: $69.95 / £44.99

Catalog no. AU6969, ISBN: 978-1-4200-6969-3 August 2008, 6-1/8 x 9-1/4, 264 pp., Soft Cover Suggested Price: $49.95 / £31.99

VMware ESX Essentials in the Virtual Data Center David Marshall, Stephen S. Beaver, & Jason W. McCarty Based on actual experiences implementing and managing large-scale projects and environments, this book emphasizes the design, implementation, and management of a VMware ESX server, offering technical and consultative points of view. Providing practical guides and examples, the chapter organization focuses first on introducing a concept and background for that concept, before providing a real-world scenario on which the planning and implementation example is based. For more technical readers, the book includes advanced topics and additional resources. It covers the popular releases of 2.5, 3.0, and 3.1. Catalog no. AU7027, ISBN: 978-1-4200-7027-9 August 2008, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $59.95 / £38.99

The Complete Project Management Methodology and Toolkit Gerard M. Hill Principal, Hill Consulting Group, Woodbridge, Virginia, USA

Written by one of the nation’s most highly regarded project management mentors, The Complete Project Management Methodology and Toolkit provides a business-relevant project management solution that can be readily applied in any industry by both novice and experienced project managers. Aligned with common business practices, Gerard Hill’s method shows how to develop project plans, keep on schedule, manage budgets, maintain areas of responsibility, and evaluate a project’s progress from concept to completion. The text also offers insight for customizing the methodology to meet the unique needs of individual organizations. Catalog no. K10095, ISBN: 978-1-4398-0154-3 October 2009, 8-1/2 x 11, 420 pp. Suggested Price: $89.95 / £54.99

The Complete Project Management Office Handbook Web-Based Outsourcing Edited by

Vivek Sharma, K.S. Rajasekaran, & Varum Sharma Project execution is often outsourced to external organizations possessing specialized expertise in planning, allocating resources, and completing projects in an integrated manner faster than the project owner. Written by a team of authors from the world’s largest software outsourcer, this book explains how to buy and sell outsourcing services, find the right outsourcing partner, effectively execute projects, and benefit from past project experience. It discusses how to leverage the web to manage and deploy geographically dispersed people, resources, and competencies. It includes two web-based business models and covers outsourced project management. Catalog no. K10526, ISBN: 978-1-4398-1055-2 May 2010, 6-1/8 x 9-1/4, 260 pp. Suggested Price: $59.95 / £38.99

IT Management / Project Management

VMware Certified Professional Test Prep

Visualizing Objectives, Deliverables, Activities, and Schedules

Second Edition Gerard M. Hill Principal, Hill Consulting Group, Woodbridge, Virginia, USA Series: ESI International Project Management

The second edition of The Complete Project Management Office Handbook extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support. Recognizing the need for a centralized organizational entity—the project management office (PMO)—to perform in this capacity, this book considers five stages of PMO along a competency continuum, establishing the depth of its functional responsibility. This revised edition also presents twenty functional models that can be used to guide deliberation and development of PMO operational capability. The text provides a starting point for readers to resolve their specific project management needs. Catalog no. AU4680, ISBN: 978-1-4200-4680-9 August 2007, 6-1/8 x 9-1/4, 752 pp. Suggested Price: $89.95 / £57.99

57


For more information and a complete list

Determining Project Requirements

IT Management / Project Management

Practice Test and Study Guide, Seventh Edition

JTC Unlimited, Shelby Twp., Michigan, USA Series: ESI International Project Management

Leroy Ward

Determining Project Requirements provides a generalized set of repeatable processes designed to ensure communication between customers and developers. It covers the role of the business analyst, the evolution of business analysis, and standard setting forces in the industry. It uses a fictional example to demonstrate the range of general, rather than specific, techniques and gives a broad overview of a multitude of business analysis issues to facilitate selection of the best approach for various projects. There are built-in exercises, best practices, tools and templates, general and customizable solutions, as well as two examples of the Business Requirements Document.

This rigorous study guide provides 40 multiple-choice practice questions in each of nine knowledge areas and the professional and social responsibilities domain and a composite 200-question practice test intended to simulate the PMP® exam. It includes a fully referenced answers keyed to the five project management process groups, a complete bibliography, and a study matrix to help readers key in on specific areas that require further study. Using the self-examination and study tools in this spiral-bound book, readers can increase their chances of passing the PMP® certification exam.

Catalog no. AU4502, ISBN: 978-1-4200-4502-4 October 2007, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $62.95 / £39.99

Effective Communications for Project Management Ralph L. Kliem

58

PMP Exam

Hans Jonasson

ESI International, Arlington, Virginia, USA

Catalog no. ES7443, ISBN: 978-1-890367-44-2 February 2007, 8-1/2 x 11, 408 pp., Soft Cover Suggested Price: $41.95 / £26.99

Project Management Recipes for Success Guy L. De Furia

Senior Project Manager, Fortune 500 Firm

Series: ESI International Project Management

This book examines elements of the communications process and describes the role that the Project Management Information System (PMIS) has in helping project managers become better communicators. In addition to describing how personality effects communications, the book details the seven elements of effective communications: applying active and effective listening; preparing the communications and establishing an issues management process; drafting and publishing documentation; conducting meetings; giving effective presentations; developing and deploying a project website; and building a project war room. Each chapter contains examples and checklists.

This book explains the procedures for running a successful project and highlights the finer points of managing and controlling the project. It is written specifically for those responsible for the hands-on managing of projects, but is also useful to program managers and senior executives. It provides program managers with a clear perspective of the myriad of activities their project managers must perform to achieve a well-disciplined project. Senior managers will gain a perspective of the approach necessary at the beginning of a project to reduce the number of illadvised projects and the effort required to achieve successful projects.

Catalog no. AU6246, ISBN: 978-1-4200-6246-5 November 2007, 6-1/8 x 9-1/4, 240 pp. Suggested Price: $73.95 / £46.99

Catalog no. AU8240, ISBN: 978-1-4200-7824-4 2009, 6-1/8 x 9-1/4, 264 pp., Soft Cover Suggested Price: $49.95 / £31.99

Textbook

Global Engineering Project Management

Project Management Theory and Practice

M. Kemal Atesmen

Gary L. Richardson

Independent Consultant, Santa Barbara, California, USA

University of Houston, Texas, USA

Engineering projects that cover multiple countries, politics, cultures, and different standards add additional challenges to the tasks of a project manager. This book aligns real-world experiences in international project management with practical project management principals. The book discusses all phases of an international project with real case examples. Written as a hands-on reference, it shows how to anticipate and prepare for upcoming challenges, covering everything from startup planning and post-project evaluation to concerns over supply management, cost containment, and intellectual property. Every chapter contains a checklist to remind managers of issues they must prepare for.

Structured on the Project Management Institute’s Project Management Body of Knowledge (PMBOK®) standard, this book covers the theory of project management and explains how its concepts are carried out in real-world projects. It translates the abstract model vocabulary and processes from the PMBOK® into an understandable discussion that includes contemporary views. It also reviews issues not included in the PMBOK®, such as organizational maturity, portfolio management, project management offices, virtual and outsourced organizations, building high productivity teams, and operational governance. The text includes scheduling and budgeting problems, scoping projects, and questions at the end of each chapter.

Catalog no. AU7393, ISBN: 978-1-4200-7393-5 April 2008, 6-1/8 x 9-1/4, 168 pp. Suggested Price: $79.95 / £49.99

Catalog no. K10496, ISBN: 978-1-4398-0993-8 January 2010, 7 x 10, 566 pp. Suggested Price: $89.95 / £57.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Adaptation in Wireless Communications The Project Manager’s Communication Toolkit

Edited by

Mohamed Ibnkahla

Shankar Jha

Queen’s University, Kingston, Ontario, Canada Series: Electrical Engineering & Applied Signal Processing

Describing the challenges and opportunities of communication in a project environment, this detailed guide highlights the range of tools available to the project manager and instructs on their effective use and application. Written from a practical standpoint, this book provides the tools and best practices needed for successful communication management. It deals primarily with written communication, including plans, reports, guidelines, procedures, messages, and presentations. Using easy-to-understand language, this book highlights the various project communication tools available for use including email and PowerPoint®.

The widespread use of adaptation techniques has helped to meet the increased demand for new applications. From adaptive signal processing to cross-layer design, Adaptation in Wireless Communications covers all aspects of adaptation in wireless communications in a two-volume set. Each volume provides a unified framework for understanding adaptation and relates various specializations through common terminologies. In addition to simplified state-of-the-art crosslayer design approaches, they also describe advanced techniques, such as adaptive resource management, 4G communications, and energy and mobility aware MAC protocols.

Catalog no. K10497, ISBN: 978-1-4398-0995-2 February 2010, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $59.95 / £38.99

Order the Set and Save! Catalog no. 45997, ISBN: 978-1-4200-4599-4 October 2008, 6-1/8 x 9-1/4, 1048 pp. Suggested Price: $159.95 / £99.00 Suggested Price for Individual Volumes: $99.95 / £63.99

CD-ROM Included

A Standard for Enterprise Project Management Michael S. Zambruski TBA&P, LLC, Cheshire, Connecticut, USA Series: ESI International Project Management

From enterprise vision and mission to business requirements to project initiation and management to operations, this practical guide explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. It includes a decision tree for determining the most appropriate level of project documentation, describes an integrated risk management and escalation policy, and contains more than two dozen templates and completed samples of key project management tools, such as a comprehensive statement of work template. The author offers a color version of the book with bonus items on the included CD-ROM. Catalog no. AU7245, ISBN: 978-1-4200-7245-7 July 2008, 8-1/2 x 11, 128 pp., Soft Cover Suggested Price: $79.95 / £49.99

Advances in Network Management Jianguo Ding University of Luxembourg

Network management is facing new challenges that stem from the growth in size, heterogeneity, pervasiveness, and complexity of network services and applications. To bring complex network systems under control, it is necessary for the IT industry to improve at developing self-managing, self-healing, and self-configuring systems. From basic concepts to research-level material, this book documents the evolution of management solutions in network management including protocols and techniques. Investigating novel management strategies for emerging networks, the text addresses inferences and dependencies between network management and application-level service management. Catalog no. AU6452, ISBN: 978-1-4200-6452-0 December 2009, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $69.95 / £44.99

Adaptive Signal Processing in Wireless Communications This resource is devoted to adaptation in the physical layer. It surveys adaptive signal processing techniques used in current and future wireless communication systems. Featuring the work of international experts, it covers adaptive channel modeling, identification and equalization, adaptive modulation and coding, adaptive multiple-input-multipleoutput (MIMO) systems, and cooperative diversity. It also addresses hardware implementation, reconfigurable processing, and cognitive radio.

IT Management / Project Management / Networking

Two-Volume Set

Catalog no. 46012, ISBN: 978-1-4200-4601-4 October 2008, 6-1/8 x 9-1/4, 520 pp.

Adaptation and Cross Layer Design in Wireless Networks Adaptation and Cross Layer Design in Wireless Networks is devoted to adaptation in the data link, network, and application layers. It presents the latest adaptation techniques and methodologies, including cross-layer adaptation, joint signal processing, coding and networking, selfishness in mobile ad hoc networks, cooperative and opportunistic protocols, adaptation techniques for multimedia support, self–organizing routing, and tunable security services. It presents new theoretical paradigms and analytical findings supported with various simulation and experimental results. Catalog no. 46039, ISBN: 978-1-4200-4603-8 October 2008, 6-1/8 x 9-1/4, 528 pp.

59


For more information and a complete list Broadband Mobile Multimedia Techniques and Applications Edited by

Yan Zhang, Shiwen Mao, Laurence T. Yang, & Thomas M. Chen

Navrati Saxena Sungkyunkwan University, South Korea

Abhishek Roy

Networking

Series: Wireless Networks and Mobile Communications

Conexant Systems, Noida, India

This useful guide presents introductory concepts, fundamental techniques, the latest advances, and open issues in broadband wireless multimedia. It first introduces various broadband wireless multimedia systems. Using video as an application example, the book then focuses on the routing and cross-layer design issue of multimedia communication over multihop wireless ad hoc and sensor networks. The next section discusses issues related to multimedia communications over WLANs. The book concludes with recent developments in QoS provisioning mechanisms and other enabling technologies, including middleware, mobility management, scheduling, and power control.

Recent advances in web and wireless technologies have resulted in a need for more efficient scheduling and data transmission strategies. While both push and pull strategies have value, it is becoming clear that any optimal solution requires a hybrid approach. This work takes a comparative and practical approach that incorporates much of the authors’ original research. They discuss basic push and pull strategies and examine the challenges posed by customer requests and behavior, before defining ideal hybrid strategies. Exceptionally thorough, this original work also demonstrates the value of separating clients by class and looks at a new solution for multi-channel broadcast problems.

Catalog no. AU5184, ISBN: 978-1-4200-5184-1 June 2008, 6-1/8 x 9-1/4, 584 pp. Suggested Price: $99.95 / £63.99

Catalog no. AU4655, ISBN: 978-1-4200-4655-7 March 2008, 6-1/8 x 9-1/4, 160 pp. Suggested Price: $99.95 / £63.99

Carrier Ethernet

60

Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments

Providing the Need for Speed

Fundamentals of DSL Technology

Gilbert Held

Edited by

4-Degree Consulting, Macon, Georgia, USA

Philip Golden, Hervé Dedieu, & Krista S. Jacobsen

Fast and functional, carrier Ethernet technology is the foundation for nextgeneration networks around the world. The book introduces this networking technology, which can accelerate the delivery of industry standard products and services to the end user. It presents the capabilities of this technology and shows how it improves network performance compared to other technologies. Ensuring seamless migration to carrier Ethernet from existing technologies, the text describes various services that can be enabled over an Ethernet infrastructure, including integration with emerging technologies such as resilient packet ring (RPR) and SONET/SDH.

Fundamentals of DSL Technology begins with an introductory three-chapter examination of DSL copper transmission channels, reviewing the basic telephone environment, the physical-layer twisted pair, and the noise environment in the twisted pair channel. The book then explores line codes—laying the foundation for later chapters about other aspects of DSL design—and discusses the basic objectives of DSL service, comparing DSL to other broadband delivery methods. The book concludes with a description of other basic aspects of DSL transmission, covering topics such as trellis codes, Reed-Solomon codes and interleaving, turbo and LDPC codes, basic equalization theory, synchronization, and more.

Catalog no. AU6039, ISBN: 978-1-4200-6039-3 March 2008, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU1913, ISBN: 978-0-8493-1913-6 September 2005, 7 x 10, 472 pp. Suggested Price: $104.95 / £66.99

HSDPA/HSUPA Handbook Converging NGN Wireline and Mobile 3G Networks with IMS Converging NGN and 3G Mobile Rebecca Copeland Strategic IMS Solution Consultant, Warwickshire, UK

Delivering deep insight into the role of IMS in fixed line and mobile networks, this guide fosters a clear understanding of the next generation of converged communication. It discusses the sources of standards and their particular areas of activities. Most of the text centers on important aspects of IMS that go beyond session control and multimedia handling to include ID management, service profiles, event triggering, flow- and event-based charging mechanisms, and service-based quality of service. The author also examines network admission, security, border control, and legacy services, enabling a thorough appreciation of new network requirements. Catalog no. AU9250, ISBN: 978-0-8493-9250-4 December 2008, 7 x 10, 518 pp. Suggested Price: $89.95 / £57.99

Edited by

Borko Furht Florida Atlantic University, Boca Raton, USA

Syed A. Ahson Microsoft Corporation, Bellevue, Washington, USA Series: Internet and Communications

High–Speed Downlink Packet Access (HSDPA) is a 3G mobile telephony communications protocol in the High-Speed Packet Access (HSPA) family that allows networks based on Universal Mobile Telecommunications System (UMTS) to achieve higher data transfer speeds and capacities. This handbook provides technical information about all aspects of HSDPA/HSUPA. The topics covered range from basic concepts to research-grade material including future directions. This book will serve as a valuable resource for those working on, or interested in, emerging wireless communications networks. Catalog no. AU7863, ISBN: 978-1-4200-7863-3 June 2010, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $99.95 / £63.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

A New Model for Blending Applications Edited by

Mark Wuthnow, Matthew Stafford, & Jerry Shih

Edited by

Syed A. Ahson Microsoft Corporation, Bellevue, Washington, USA

Mohammad Ilyas

Series: Informa Telecoms & Media, 9

Florida Atlantic University, Boca Raton, USA

This book addresses how IMS-based services could be deployed in an operator’s network. The authors delineate the application layer and the types of applications that can be implemented with an IMS network. They begin with an overview the components that make up IMS; they then provide a brief tutorial on several of the key signaling standards that have been defined for implementation of an endto-end service making use of the IMS. The book covers enabling technologies and how one can take the enables defined by OMA, place them in an IMS network defined by 3GPP, add creativity and offer new services to the consumer or enterprise customer.

IMS promises to be a cost-effective evolution path to future wireless and wireline convergences that meet next-generation service demands and requirements. Organized into three main parts, the IP Multimedia Subsystem (IMS) Handbook is a one-stop guide that focuses on the concepts, technologies, and services of IMS. Featuring articles authored by leading experts in the field, this comprehensive volume provides technical information on all aspects of this exciting technology. The book also explores future research directions and contains extensive bibliographies in each chapter to assist readers who wish to engage in further study.

Catalog no. AU9285, ISBN: 978-1-4200-9285-1 July 2009, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $69.95 / £44.99

Catalog no. 64592, ISBN: 978-1-4200-6459-9 November 2008, 6-1/8 x 9-1/4, 560 pp. Suggested Price: $139.95 / £89.00

Internet Networks Wired, Wireless, and Optical Technologies Edited by

Krzysztof Iniewski

Location Based Services Handbook Applications, Technologies, and Security Syed A. Ahson Microsoft Corporation, Bellevue, Washington, USA

Mohammad Ilyas

Series: Devices, Circuits, and Systems, 1

Florida Atlantic University, Boca Raton, USA

In five to ten years, Internet access will be dominated by wireless. Wireless edge using optical core next generation networks will become as ubiquitous as traditional telephone networks. Engineering students must be prepared to meet the challenges of this technology’s development and deployment. A brief yet comprehensive introduction, this book provides illustrations, industry examples, and detailed instructions on the application of wireless and optical networks. Topics covered include wireless networks such as WLAN, WPAN, wireless access, 3G/4G cellular, and RF transmission and optical networks involving long-haul and metropolitan networks, optical fiber, photonic devices, and VLSI chips.

Meeting the demands of the rapid growth of wireless Internet subscribers and the development of the world Location-Based Services (LBS) market, this volume introduces and comprehensively discusses various location-based applications such as buddy finder and proximity and security services. The material is organized in three major sections: applications, technologies, and security. Written by experts from across the globe, the articles in each of the sections range from basic concepts to research grade material and include discussions of future directions. An extensive bibliography is included with each chapter.

Catalog no. K10424, ISBN: 978-1-4398-0856-6 December 2009, 6-1/8 x 9-1/4, 326 pp. Suggested Price: $99.95 / £63.99

Networking

IMS

IP Multimedia Subsystem (IMS) Handbook

Catalog no. 71963, ISBN: 978-1-4200-7196-2 June 2010, 6-1/8 x 9-1/4, 600 pp. Suggested Price: $99.95 / £63.99

The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems

Mobile Opportunistic Networks

Edited by

Architectures, Protocols and Applications

Lu Yan, Yan Zhang, Laurence T. Yang, & Huansheng Ning

Mieso K. Denko

Series: Wireless Networks and Mobile Communications

The realization of the “Internet of Things”—a world in which billions of objects will report their location, identity, and history over wireless connections—will require dramatic changes in systems, architectures, and communications. Although RFID has already laid the foundation for this, further research and development is needed to enable such a pervasive networking world, which should be flexible, adaptive, and secure. Reflecting current trends and future directions in the industry, The Internet of Things provides a comprehensive technical and practical guide to recent advances in pervasive networked systems through detailed discussions, real-world case studies, and experience reports.

Mobile opportunistic networks are one of the evolutions of Mobile Ad Hoc Networks (MANETS), the other being Wireless Mesh Networks (WMNs), with potential emerging applications in the commercial and public domain. While many books exist on both MANETS and WMNs, none exist in the area of mobile opportunistic networks—until now. Mobile Opportunistic Networks: Architectures, Protocols, and Applications serves as the first comprehensive resource on mobile opportunistic networks that compiles research on communication architectures, network algorithms and protocols, emerging applications, and open research issues to facilitate future research and development efforts.

Catalog no. AU5281, ISBN: 978-1-4200-5281-7 March 2008, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $99.95 / £63.99

Catalog no. AU8122, ISBN: 978-1-4200-8812-0 May 2010, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $119.95 / £76.99

University of Guelph, Ontario, Canada

61


For more information and a complete list Mobile Telemedicine A Computing and Networking Perspective Edited by

Yang Xiao The University of Alabama, Tuscaloosa, USA

Hui Chen

Orthogonal Frequency Division Multiple Access Fundamentals and Applications Edited by

Tao Jiang, Lingyang Song, & Yan Zhang

Networking

Virginia State University, Petersburg, USA

Series: Wireless Networks and Mobile Communications, 16

Advances in the area of wireless and mobile telemedicine to diagnose and treat patients have drawn growing attention from healthcare providers and recipients, industry, researchers, and governments. This volume examines computing and network dilemmas which arise from wireless and mobile telemedicine. Comprised of the contributions of many prominent international researchers, the book gives an overview of patient care and monitoring, discusses the use of telemedicine in cardiology and diabetes, analyzes security and privacy considerations, examines issues relating to networking support, and concludes with a section on the opportunities and challenges that are faced by those involved in this exciting technology.

Orthogonal Frequency Division Multiple Access (OFDMA) is a multi-user version of the popular OFDM digital modulation scheme. This volume explains the foundations and applications in OFDMA, while also serving as a reference for those working with other multiuser communications systems. It provides an accessible introduction to all the key techniques and their applications in OFDMA system, presenting basics as well as exploring critical design issues. The authors provide insight that will help readers understand OFDMA in a macro manner, while providing a systematic manual for those whose work is related directly to practical OFDMA projects.

Catalog no. AU6046, ISBN: 978-1-4200-6046-1 June 2008, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU8824, ISBN: 978-1-4200-8824-3 April 2010, 7 x 10, 608 pp. Suggested Price: $89.95 / £57.99

RFID and Sensor Networks Network Design for IP Convergence Yezid Donoso

62

Architectures, Protocols, Security, and Integrations Edited by

Yan Zhang, Laurence T. Yang, & Jiming Chen

Universidad de los Andes, Bogota, Colombia

Series: Wireless Networks and Mobile Communications, 15

Emerging Internet Quality of Service mechanisms are leading to widespread use of real-time multimedia services; however, this requires drastically improved technology and standards. To assist designers and operators, this work provides a comprehensive guide to the state of the field and emerging advances. It includes an introduction to LAN/MAN/WAN network design detailing the latest network architecture and equipment. It describes routing baseline architecture for inter-networking protocols. It also covers IP protocols and interconnections between different level 1 technologies and between different level 2 technologies with IP routing. Finally, it details service connections, providing designs and configurations.

RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the authoritative reference on RFID and WSNs. Covering a broad range of topics that includes everything from the basics to insights into future directions, this cutting-edge book reviews architectures, protocols, standards, security, and applications. With sections devoted to each individual element, the text starts by covering the tags, readers, and middleware associated with RFID. Next, it provides insight into the routing, medium access control, and cross-layer optimization of WSNs. The third section focuses on the integration of RFID and WSN, addresses contemporary challenges, and illustrates concepts and applications with practical examples.

Catalog no. AU6750, ISBN: 978-1-4200-6750-7 February 2009, 6-1/8 x 9-1/4, 306 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU7777, ISBN: 978-1-4200-7777-3 November 2009, 6-1/8 x 9-1/4, 646 pp. Suggested Price: $99.95 / £60.99

Textbook

Security in an IPv6 Environment

Networking Systems Design and Development

Daniel Minoli

Lee Chao Grounded in real-world applications, this volume mixes conceptual instruction with lab work to arm students and IT professionals with the knowledge and hands-on skills needed to develop and maintain a fully functioning Linux network system with open source materials. The material employs the latest version of Linux and also covers some of latest Linux-based mobile devices. Many hands-on activities with step-by-step instructions are included; these are designed to promote problem solving with regard to actual business scenarios. Fully selfcontained, the text can be used for either classroom instruction or self-study. Catalog no. AU9159, ISBN: 978-1-4200-9159-5 December 2009, 7 x 10, 472 pp. Suggested Price: $89.95 / £57.99

SES Engineering, Princeton, New Jersey, USA

Jake Kouns Markel Corporation, Glen Allen, Virginia, USA

As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The text discusses general security mechanisms and approaches as well as IPv6 security features. In addition to firewall use, the authors also examine the fundamental topic of IPSec and its use in IPv6 environments. A final chapter addresses security considerations for migration environments that may consist of mixed IPv4 and IPv6 networks. Catalog no. AU2294, ISBN: 978-1-4200-9229-5 December 2008, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $79.95 / £49.99


SIP Handbook

VoIP Handbook

Services, Technologies, and Security of Session Initiation Protocol

Applications, Technologies, Reliability, and Security

Edited by

Edited by

Syed A. Ahson

Syed A. Ahson

Microsoft Corporation, Bellevue, Washington, USA

Microsoft Corporation, Bellevue, Washington, USA

Mohammad Ilyas

Mohammad Ilyas

Florida Atlantic University, Boca Raton, USA

Florida Atlantic University, Boca Raton, USA

This volume provides a powerful hands-on reference for designers and planners of Session Initiation Protocol (SIP) networks. It reviews various services associated with SIPs, examines different technologies involved in their utilization, and explores the myriad of security issues that their use engenders. Supplemented with a wealth of figures and equations, the book draws on the experience of many worldwide contributors. Because of the editors’ pivotal influence and their proximity to both the current market and the latest science, this work is certain to become the definitive text on this emerging technology.

From basic concepts to future research directions, the VoIP Handbook provides technical information about all aspects of VoIP. Voice over Internet protocol (VoIP) can facilitate tasks that may be more difficult to achieve using traditional networks, such as the ability to route calls to VoIP phones. This essential book explores the wide range of applications that VoIP offers, including smartphones and access to emergency services. Leading expert contributors in the field offer their perspectives on numerous related topics, including reliability models. As a single reference source, this comprehensive text also presents the latest technologies and addresses various security issues.

Catalog no. 6603X, ISBN: 978-1-4200-6603-6 December 2008, 6-1/8 x 9-1/4, 614 pp. Suggested Price: $149.95 / £95.00

Unlicensed Mobile Access Technology Protocols, Architectures, Security, Standards and Applications Edited by

Yan Zhang, Laurence T. Yang, & Jianhua Ma Series: Wireless Networks and Mobile Communications

Catalog no. 70207, ISBN: 978-1-4200-7020-0 December 2008, 7 x 10, 440 pp. Suggested Price: $99.95 / £63.99

Wireless Quality of Service Techniques, Standards, and Applications Edited by

Maode Ma, Mieso K. Denko, & Yan Zhang Series: Wireless Networks and Mobile Communications

Unlicensed mobile access (UMA) technology offers seamless access to GSM and GPRS mobile services networks over unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. This book provides a complete cross-reference source for UMA technology and UMA-relevant technologies. Presenting a fundamental introduction with definitions of concepts, explanations of protocols and emerging standards, as well as detailed discussions of applications, it covers important topics such as system/network architecture, capacity, mobility management, vertical handoff, routing, medium access control, scheduling, congestion control, adaptive channel assignment, and security.

This volume systematically addresses the QoS issues found in many types of popular wireless networks, including LANs, PANs, MANs, 3G, mobile ad hoc, sensor, and heterogeneous. It introduces the fundamental concepts of QoS provisioning and presents various techniques, such as a Markov chain model and a distributed admission control mechanism, to combat QoS problems that include performance impairments in WLAN hotspots, video streaming applications, and broadband wireless access. The book covers the standards of different wireless networks and the QoS service frameworks specified in the standards, along with recent research progress on improving the performance of QoS services in wireless networks.

Catalog no. AU5537, ISBN: 978-1-4200-5537-5 August 2008, 7 x 10, 424 pp. Suggested Price: $99.95 / £63.99

Catalog no. AU5130, ISBN: 978-1-4200-5130-8 September 2008, 6-1/8 x 9-1/4, 376 pp. Suggested Price: $89.95 / £57.99

Vehicular Networks From Theory to Practice

Networking

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Textbook

Wireless Sensor Networks Principles and Practice

Edited by

Fei Hu

Stephan Olariu & Michele C. Weigle

University of Alabama, Tuscaloosa, USA

Old Dominion University, Norfolk, Virginia, USA Series: Chapman & Hall/CRC Computer & Information Science, 20

Xiaojun Cao Georgia State University, Atlanta, USA

Cohesively integrating the state of the art in this emerging field, this guide presents many issues involved in vehicular networking, including traffic engineering, human factors studies, and novel computer science research. It covers traffic monitoring and traffic flow modeling, innovative applications enabled by vehicular networks, routing and localization, and simulation. The book also introduces governmental and industrial efforts in the United States and Europe to set standards and perform field tests on the feasibility of vehicular networks. The final part explores the extent and impact of driver distraction with in-vehicle displays.

The low-power, low-cost sensor network provides a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications in the world of the wireless. This book provides a comprehensive examination of all the major technology, standards, and application topics relevant to the field. It contains almost everything product developers and technicians need to know to enter this burgeoning field, including current applications and emerging research. It covers communication and networking protocols, middleware architecture for wireless sensor networks, and security and management. Detailed case studies set forth all the steps of design and implementation needed to solve real-world problems.

Catalog no. C5883, ISBN: 978-1-4200-8588-4 March 2009, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $99.95 / £60.99

Catalog no. AU9215, ISBN: 978-1-4200-9215-8 May 2010, 6-1/8 x 9-1/4, 592 pp. Suggested Price: $99.95 / £63.99

63


For more information and a complete list Assessing and Managing Security Risk in IT Systems

Complete Guide to Security and Privacy Metrics

A Structured Methodology

Measuring Regulatory Compliance, Operational Resilience, and ROI

John McCumber

Debra S. Herrmann

Security & Auditing

Symantec Corporation, Reston, Virginia, USA

U.S. Nuclear Regulatory Commission, Washington, D.C., USA

This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

This book defines more than 900 metrics measuring compliance with current legislation, resiliency of security controls, and return on investment. It explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The metrics are scaled by information sensitivity, asset criticality, and risk; aligned to correspond with different lateral and hierarchical functions; designed with flexible measurement boundaries; and can be implemented individually or in combination. The text includes numerous examples and sample reports and stresses a complete assessment by evaluating physical, personnel, IT, and operational security controls.

Catalog no. AU2232, ISBN: 978-0-8493-2232-7 August 2004, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $62.95 / £39.99

Catalog no. AU5402, ISBN: 978-0-8493-5402-1 January 2007, 7 x 10, 848 pp. Suggested Price: $124.95 / £79.99

Critical Infrastructure

64

Building an Effective Information Security Policy Architecture

Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies

Sandy Bacik

Tyson Macaulay

Consultant, Fuquay Varina, North Carolina, USA

CISSIP, CISA, ISSPCS, Ottawa, Ontario, Canada

Information security teams are charged with developing a protocol to protect the assets of an enterprise from constant threats and risks. Through the use of questionnaires, interviews, and assessments, this volume demonstrates how to evaluate an organization’s culture and its ability to meet various security standards and requirements. It provides practical guidance for building, writing, and implementing policy architecture that is designed to specifically fit within that culture. Recognizing that the effectiveness of a policy is dependent on cooperation and compliance, the author also demonstrates how to communicate that policy and provides advice on how to gain support. Samples of effective policy architecture are included.

Critical Infrastructure (CI) is a little understood topic, which seems to generate more fear than rational discussion. CIs are considered fundamental to the functioning of modern economies. Moving beyond definitions, this volume looks at the iron triangle within CI: power, telecom, and finance. It introduces the concept of CIs as industrial and enterprise risk conductors, highlighting the fact that a CI failure can propagate an impact throughout an enterprise. This text rethinks the concept of a CI according to contemporary factors, providing guidance for mitigating risk within the framework of national economies.

Catalog no. AU5905, ISBN: 978-1-4200-5905-2 May 2008, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $79.95 / £49.99

CISO Soft Skills Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives Ron Collette, Michael Gentile, & Skye Gentile

Catalog no. AU6835, ISBN: 978-1-4200-6835-1 August 2008, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $79.95 / £49.99

Data Protection Governance, Risk Management, and Compliance David G. Hill Mesabi Group LLC, Westwood, Massachusetts, USA

A companion volume to the highly touted CISO Handbook, this book presents tools that empower organizations to identify those intangible negative influences on security that plague most organizations, and provides further techniques for security professionals to identify, minimize, and overcome these pitfalls within their own customized situations. The book also discusses some proactive techniques that CISOs can utilize in order to effectively secure challenging work environments. Reflecting the experience and solutions of those that are in the trenches of modern organizations, this volume provides practical ideas that can make a difference in the daily lives of security practitioners.

This guide explains how to gain a handle on the vital aspects of data protection, offering a solid understanding of how data protection fits into various organizations. It places data protection in a governance, risk management, and compliance (GRC) framework; discusses existing and emerging data protection technologies and how they relate to each other; and explores the impact of novel trends, such as cloud computing, storage tiering, server virtualization, and green computing. The book also shows how to improve the data protection process through the high-level PRO-Tech model. Other topics covered include data retention, data security, and eDiscovery.

Catalog no. AU9102, ISBN: 978-1-4200-8910-3 November 2008, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $69.95 / £44.99

Catalog no. K10353, ISBN: 978-1-4398-0692-0 August 2009, 6-1/8 x 9-1/4, 330 pp. Suggested Price: $69.95 / £44.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Information Security Management Handbook Available in print or on CD-ROM

John J. Trinckes, Jr.

Edited by

Harold F. Tipton HFT Associates, Villa Park, California, USA

Micki Krause Nozaki

Hampton, Florida, USA

Pacific Life Insurance Company, Newport Beach, California, USA

Supplying a complete overview of the concepts executives need to know, this book provides the tools needed to ensure your organization has an effective information security management program in place. This one-stop resource includes a ready-to use security framework for developing workable programs— in any organization—and supplies proven tips for avoiding common pitfalls. Each self-contained section builds on the previous in a logical manner, allowing for quick and easy reference. Presenting difficult concepts in a straightforward manner, this concise guide allows busy executives to get up to speed, quickly and easily, on what it takes to develop an effective and efficient information security management program.

Considered the gold-standard reference of information security, the full contents of the sixth edition of the Information Security Management Handbook is available in print or on CD-ROM. Organized under the CISSP® Common Body of Knowledge (CBK) domains, this handbook has become the standard on which all IT security programs and certifications are based. It provides a compilation of the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.

Catalog no. K10501, ISBN: 978-1-4398-1007-1 October 2009, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $69.95 / £44.99

Information Assurance Architecture Keith D. Willett CTN Technologies, Millersville, Maryland, USA

Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow. By studying this book, readers will acquire the skills necessary to develop a security architecture that serves specific needs. They will come to understand distinctions amongst engineering architecture, solutions architecture, and systems engineering. The book also shows how the Zachman and the Federal Enterprise Architecture models can be used together to achieve the goals of a business or government agency. Catalog no. AU8067, ISBN: 978-0-8493-8067-9 June 2008, 6-1/8 x 9-1/4, 624 pp. Suggested Price: $79.95 / £49.99

Information Security Management Handbook Sixth Edition Now in its sixth edition, the 3200 page print version continues to be updated yearly. Volumes 2 and 3, as well as this year’s Volume 4 offer stand-alone references that reflect the latest changes to the CBK in response to new technologies and new laws in different countries and regions. Catalog no. AU7495, ISBN: 978-0-8493-7495-1 2007, 7 x 10, 3280 pp. Suggested Price: $159.95 / £99.00

Volume 4

Catalog no. K11003, ISBN: 978-1-4398-1902-9 March 2010, 7 x 10, 600 pp. Suggested Price: $99.95 / £63.99

Volume 3

Catalog no. AU0925, ISBN: 978-1-4200-9092-5 2009, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $99.95 / £60.99

Volume 2

Catalog no. AU6708, ISBN: 978-1-4200-6708-8 2008, 7 x 10, 456 pp. Suggested Price: $99.95 / £63.99

Information Security Architecture An Integrated Approach to Security in the Organization, Second Edition Jan Killmeyer

Get all four volumes and more on a single CD-ROM

Tudor Engineering Management, Butler, Pennsylvania, USA

Information Security Management Handbook,

Exploring the evolution of information security (IS), this book looks at the development of the field from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear, organized methods and by guiding you to the most effective resources available. Building on the foundation of the first edition, this volume discusses three additional components: monitoring and detection, computer incident and emergency response, and disaster recovery and business continuity planning. Each chapter provides an understanding of the component and details how it relates to the rest of the IS architecture.

Containing the complete contents of the original 3200 page handbook plus the updates of Volumes 2, 3, and 4, this portable, reference is linked, searchable by keyword, and organized under the CISSP® Common Body of Knowledge (CBK) domains. The CD-ROM contains an extra volume’s worth of information— including chapters from security and networking books that you simply won’t find anywhere else. Exportable text and hard copies are available at the click of a mouse.

Catalog no. AU1549, ISBN: 978-0-8493-1549-7 January 2006, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $83.95 / £53.99

Security & Auditing

The Executive MBA in Information Security

2010 CD-ROM Edition

Catalog no. K10967, ISBN: 978-1-4398-1841-1 May 2010, CD-ROM Suggested Price: $199.95 / £127.00

65


For more information and a complete list Information Security Management Metrics

Information Security Policies, Procedures, and Standards

A Definitive Guide to Effective Security Monitoring and Measurement

Guidelines for Effective Information Security Management

W. Krag Brotby, CISM

Thomas R. Peltier

Security & Auditing

Enterprise Security Architect, Thousand Oaks, California, USA

Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA

Information Security Management Metrics offers a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management. With case studies and tools for monitoring specific items, this book offers practical guidance for implementing metrics across an entire organization, thereby improving budget and resource allocation, and reducing the possibility that unanticipated events will have catastrophic impacts. The book presents metrics that complement those used by IT managers, and demonstrates how to make adjustments to metrics without interrupting business processes.

Providing the mechanics for policy, procedure, and standards development, this book shows readers exactly what to look for when developing an enterprise’s procedures. It examines the recommended industry standards and shows how to customize them to fit specific needs. Three major sections cover: writing policies, writing procedures, and writing standards. Each section can be used separately when needed, or as a whole to develop a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of the relevant BS 7799 and ISO 17799 standards.

Catalog no. AU5285, ISBN: 978-1-4200-5285-5 March 2009, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $79.95 / £48.99

Catalog no. AU1137, ISBN: 978-0-8493-1137-6 December 2001, 7 x 10, 312 pp., Soft Cover Suggested Price: $83.95 / £53.99

Textbook

66

Information Security Management

Information Security Risk Analysis

Concepts and Practice

Second Edition

Bel G. Raggad

Thomas R. Peltier

Pace University, Pleasantville, New York, USA

Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA

Corporate information security is crucial for generating continuous business value in the modern world. Information security audits remain a critical component of achieving corporate security. This book presents a security audit methodology that conforms to the new security standard ISO 27001. Detailed sections illustrate how to conduct a nominal security audit that conforms with the ISO 17799 standard and a technical security audit for certification against the ISO 27001. Along with case studies that demonstrate implementation, the text provides a detailed methodology that explains how to devise a risk-driven security program as well as an effective information security management system.

Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the assessment process. The text offers a thorough discussion of FRAAP and the need to develop a pre-screening method for risk assessment and business impact analysis.

Catalog no. AU7854, ISBN: 978-1-4200-7854-1 January 2010, 6-1/8 x 9-1/4, 568 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU3346, ISBN: 978-0-8493-3346-0 April 2005, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $83.95 / £53.99

Textbook

Information Security Policies and Procedures

Information Technology Control and Audit

A Practitioner’s Reference, Second Edition

Third Edition

Thomas R. Peltier

Sandra Senft & Frederick Gallegos

Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA

California State Polytechnic University, Pomona, USA

This book illustrates how policies and procedures support the efficient running of an organization. It points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. The authors detail how security policies support management directions, and they emphasize how information security must be integrated into all business processes. The book examines Tier 1, Tier 2, and Tier 3 policies.

Now in its third edition, this book is an excellent introductory reference to IT governance, controls, and auditing. It reviews pertinent legislation; discusses the future of auditing in the 21st century; and examines governance, strategy and standards, and acquisition and implementation. In a section on delivery and support, it explores service management, service continuity, systems management, and operations management. Finally, the authors review advanced topics such as virtual environment, virtual security, e-commerce, and enterprise resource planning. This new edition includes guidelines for preparing for the CISA Exam, and includes numerous illustrations to help readers visualize concepts.

Catalog no. AU1958, ISBN: 978-0-8493-1958-7 June 2004, 6-1/8 x 9-1/4, 408 pp. Suggested Price: $93.95 / £59.99

Catalog no. AU6550, ISBN: 978-1-4200-6550-3 November 2008, 7 x 10, 774 pp. Suggested Price: $89.95 / £57.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Eugene F. Ferraro

Fundamentals of Identity Management Dobromir Todorov

Business Controls, Inc., Golden, Colorado, USA

Consultant, Buckinghamshire, UK

Confronted with the opposing demands of loss prevention, asset protection, and ever-expanding employee rights issues, it is essential for security professionals, lawyers, and human resource directors to understand the process of investigation and know how to properly conduct internal investigations. This book targets both the private security professional and the consumer of corporate investigative services. The text provides the tools necessary to serve the reader who is contemplating an internal investigation for the first time, or one who conducts them regularly. The book’s modern case studies, statistics, checklists, and references make it an authoritative reference on the subject.

Effective and fool-proof user identification and authentication are essential to modern security. Providing a hacker perspective, this text introduces the philosophy behind user authentication and access control and presents key concepts for practical applications. It outlines the process of controlled access to resources through authentication, authorization, and accounting and provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is presented with a specific authentication scenario.

Catalog no. AU1648, ISBN: 978-0-8493-1648-7 July 2005, 6-1/8 x 9-1/4, 600 pp. Suggested Price: $83.95 / £53.99

Catalog no. AU5219, ISBN: 978-1-4200-5219-0 June 2007, 6-1/8 x 9-1/4, 760 pp. Suggested Price: $83.95 / £53.99

IT Auditing and Sarbanes-Oxley Compliance Key Strategies for Business Improvement Dimitris N. Chorafas

The Practical Guide to HIPAA Privacy and Security Compliance Kevin Beaver Principle Logic, Acworth, GA, USA

Rebecca Herold

Consultant, France & Switzerland

Rebecca Herold, LLC, Van Meter, Iowa, USA

Written as a contribution to the accounting and auditing professions, this book links two key strategies for business improvement: information technology auditing and Sarbanes-Oxley compliance. Both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. All of the concepts are reviewed in detail and reinforced with case studies that demonstrate the proper steps needed for complete analysis. Those companies that make good use of the procedures in this book will avoid the lure of easy money that moved Enron and Worldcom from world class organizations to colossal disasters.

This book is a one-stop resource for HIPAA privacy and security advice that can immediately be applied to any organization’s unique situation. It defines what HIPAA is, what it requires, and what can be done to achieve and maintain compliance. It describes the HIPAA Privacy and Security Rules and compliance tasks in easy-to-understand language, focusing not on technical jargon, but on what organizations need to do to meet requirements. Anyone preparing an organization for HIPAA laws will receive expert guidance on requirements and other commonly-discussed topics. The book enables organizations to determine how HIPAA will impact them, regardless of whether they are a HIPAA Covered Entity.

Catalog no. AU6170, ISBN: 978-1-4200-8617-1 October 2008, 6-1/8 x 9-1/4, 305 pp. Suggested Price: $89.95 / £57.99

Security & Auditing

Investigations in the Workplace

Mechanics of User Identification and Authentication

Catalog no. AU1953, ISBN: 978-0-8493-1953-2 November 2003, 6-1/8 x 9-1/4, 496 pp. Suggested Price: $104.95 / £66.99

Managing an Information Security and Privacy Awareness and Training Program

A Practical Guide to Security Assessments

Rebecca Herold

Sudhanshu Kairab

Rebecca Herold, LLC, Van Meter, Iowa, USA

Amper, Politziner, & Mattia, P.C., New Jersey, USA

This volume provides a starting point and an all-in-one resource for Infosec and privacy education practitioners who are building programs for their organizations. The author applies knowledge obtained through her work in education, creating a comprehensive resource of nearly everything involved with managing an infosec and privacy training course. This book includes examples and tools from a wide range of businesses, enabling readers to select effective components that will be beneficial to their enterprises. The text progresses from the inception of an education program through development, implementation, delivery, and evaluation.

Taking a process-focused approach, A Practical Guide to Security Assessments presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. The book includes an appendix that contains questionnaires that can be modified and used to conduct security assessments.

Catalog no. K10793, ISBN: 978-1-4398-1545-8 May 2010, 6-1/8 x 9-1/4, 600 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU1706, ISBN: 978-0-8493-1706-4 September 2004, 6-1/8 x 9-1/4, 520 pp. Suggested Price: $83.95 / £53.99

67


For more information and a complete list Security in RFID and Sensor Networks Protecting Intellectual Property

Edited by

Why Competitors Take Your Intellectual Property—Because You Let Them!

Simula Research Laboratory, Lysaker, Norway

Paris Kitsos

Cisco Systems, Woodinville, Washington, USA

Hellenic Open University, Patras, Greece Series: Wireless Networks and Mobile Communications, 13

Day-to-day business practices are fraught with shortcomings that could place a corporations’ intellectual property at risk. Sensitive information on press release policies, tradeshow/conference decorum, internal processes (or lack thereof ) could all be used to a competitor’s advantage if that information should fall into the wrong hands. Using real-world case studies to illustrate what and what not to do, this book presents best business practice solutions for effectively safeguarding corporate intellectual property. The text discusses global intellectual property protection law, issues with social media networks, and how to distinguish between ethical and unethical behavior.

Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on the fundamentals, security challenges, and solutions in RFID, WSNs, and integrated RFID & WSNs. Complete with several detailed case studies, this essential reference includes practical examples for intuitive understanding and necessary information to assist professionals, engineers, and researchers involved in the security of RFID and WSNs.

Catalog no. K11346, ISBN: 978-1-4398-2729-1 October 2010, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $69.95 / £44.99

Catalog no. AU6839, ISBN: 978-1-4200-6839-9 April 2009, 7 x 10, 560 pp. Suggested Price: $99.95 / £60.99

Christopher Burgess

Security & Auditing

Securing System Information Flows

68

Yan Zhang

Security in Wireless Mesh Networks Edited by

Yan Zhang, Jun Zheng, & Honglin Hu

Sean Price

Series: Wireless Networks and Mobile Communications

Many books covering information assurance architectures and system testing propose high-level methods, but often leave readers to fend for themselves when it comes time for implementation. Going beyond regurgitating the processes specified by standards bodies, Securing System Information Flows identifies the nuts and bolts of engineering secure systems and provides readers with an effective framework for specifying and evaluating information flows in organizations of any size. The text covers complex aspects of information flow including the concepts of least privilege and separation of duties. Flow charts and checklists are also included to facilitate use of the security framework.

Wireless Mesh Networks (WMN) is a promising technology that will play an increasingly important role in the next generation wireless mobile networks. This volume provides an introduction to security issues, recent advances, and future directions. The book examines the emerging standards of security, addressing such topics as authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and protection, secure routing, security standards, security policy, and more. This text also presents numerous case studies as well as various applications.

Catalog no. 90887, ISBN: 978-1-4200-9088-8 December 2010, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $69.95 / £44.99

Catalog no. AU8250, ISBN: 978-0-8493-8250-5 August 2008, 6-1/8 x 9-1/4, 552 pp. Suggested Price: $89.95 / £57.99

Security for Service Oriented Architectures

Security of Mobile Communications

Bhavani Thuraisingham

Noureddine Boudriga

The University of Texas at Dallas, USA

University of the 7th of November at Carthage, Tunisia

An exploration of security issues for the SOA and web services, this book reviews the developments in web services and web service-oriented architectures and describes ways of effectively securing these technologies. It focuses on confidentiality, privacy, trust, and integrity management. The author demonstrates the breadth and depth of the applications of these technologies in multiple domains. He lays the groundwork with discussions of concepts in trustworthy information systems and security for SOA, then covers secure web services and applications. The book discusses these technologies in secure interoperability, defense, and medical applications.

This innovative text provides comprehensive coverage of the complex security issues that face the mobile communications industry. Discussions include hacking and infecting with viruses; techniques used to provide access control, authentication, and authorization; the security of SIM-like cards; standards implemented by the GSM, third generation, WLAN, and ad-hoc networks; the security of wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems; and the applications using IP mobility. Mobile communications scientists, students, engineers, and telecom service providers will find this to be an invaluable resource.

Catalog no. AU7331, ISBN: 978-1-4200-7331-7 June 2010, 6-1/8 x 9-1/4, 250 pp. Suggested Price: $89.95 / £57.99

Catalog no. AU7941, ISBN: 978-0-8493-7941-3 July 2009, 6-1/8 x 9-1/4, 630 pp. Suggested Price: $99.95 / £60.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

A Complete Guide for Performing Security Risk Assessments Douglas J. Landoll En Pointe Technologies, Austin, Texas, USA

This comprehensive manual provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations. The book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. Catalog no. AU2998, ISBN: 978-0-8493-2998-2 December 2005, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $83.95 / £53.99

OFFICIAL (ISC)2® GUIDE to the CAP® CBK® Patrick D. Howard Nuclear Regulatory Commission, USA Series: (ISC)2 Press

An officially sanctioned guide, this volume demonstrates the effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in public and private organizations. It provides security professionals with an overview of C&A components, showing them how to document the status of IT security controls and secure systems via standard, repeatable processes. The book begins with a description of what it takes to build a C&A program, followed by an analysis of various C&A processes. The text then provides a case study of the successful C&A implementation in a major U.S. government department. It offers a collection of samples in the appendices. Catalog no. AU2062, ISBN: 978-0-8493-2062-0 December 2005, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $93.95 / £59.99

CISO Leadership Essential Principles for Success Edited by

Vein Pattern Recognition

Todd Fitzgerald

A Privacy-Enhancing Biometric

Micki Krause

Chuck Wilson Hitachi America, Ltd.

Pacific Life Insurance Company, Newport Beach, California, USA Series: (ISC)2 Press

Biometric technologies vary in capability, performance, and reliability. One of the most promising emerging technologies, vein pattern recognition (VPR) is more accurate than many other biometric methods, offers greater resistance to spoofing, and focuses on people. Exploring privacy issues and the general concept of personal identity, this book delves into real-world biometrics applications and discusses the emergence of this reliable but underutilized technology. The author introduces the myriad applications of VPA technology and its current implementations, which include, among others, its widespread use in Japan in banking (in lieu of cards and PIN numbers) for accessing bank accounts.

Written by experienced computer security professionals and including interviews with successful CISOs, this book describes the management skills needed by aspiring senior security executives. It provides tools for identifying one’s strengths and weaknesses and honing one’s leadership style, delineates what companies look for when hiring a security professional, and covers practical steps for evaluating an organization’s culture in order to successfully implement a security program that will fit the culture. A unique reference for IT professionals, CISOs, CIOs, and CSOs, the book includes real-world examples of how to treat the security program as a business.

Catalog no. K11132, ISBN: 978-1-4398-2137-4 March 2010, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $79.95 / £49.99

Catalog no. AU7943, ISBN: 978-0-8493-7943-7 December 2007, 6-1/8 x 9-1/4, 312 pp. Suggested Price: $73.95 / £46.99

Milwaukee, Wisconsin, USA

Get Certified A Guide to Wireless Communication Engineering Technologies Edited by

Vulnerability Management Park Foreman

Syed A. Ahson Microsoft Corporation, Bellevue, Washington, USA

Mohammad Ilyas

GroupM, New York, USA

Florida Atlantic University, Boca Raton, USA

Vulnerability management proactively prevents the exploitation of IT security gaps and weaknesses that exist particularly within a larger organization. This book demonstrates how prevention can reduce the potential for exploitation and shows that it takes considerably less time and resources to manage potential weaknesses than to clean up after a violation. Written by a leading expert in IT security, this volume provides guidance for creating a vulnerability management program in a large, globally distributed company. It covers areas often neglected or falsely appearing secure. The text includes checklists and details the activities that constitute successful management.

An indispensible preparation tool for the IEEE WCET exam, this guide details all seven areas of expertise covered in the test and required in the field. It begins with RF engineering, propagation, and antennas and considers evaluations of performance and reliability, interference prediction, and optimization procedures. The material addresses general and specific technologies including standards, features, and evolution. It discusses network and service architecture, management, and security, and details facility infrastructure requirements such as power supply, cable, antennas, and compliance. It concludes with a look at agreements, standards, and regulations, the book, and a review of fundamentals.

Catalog no. K10093, ISBN: 978-1-4398-0150-5 August 2009, 6-1/8 x 9-1/4, 347 pp. Suggested Price: $79.95 / £48.99

Catalog no. K10618, ISBN: 978-1-4398-1226-6 December 2009, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $79.95 / £49.99

Security & Auditing / Certification & Accreditation

The Security Risk Assessment Handbook

Building and Implementing a Security Certification and Accreditation Program

69


For more information and a complete list CD-ROM Included

Official (ISC) Guide to the CISSP® CBK® 2®

Second Edition

Security & Auditing / Certification & Accreditation 70

Edited by

Harold F. Tipton HFT Associates, Villa Park, California, USA Series: (ISC)2 Press

Official (ISC)2® Guide to the CISSP®-ISSAP® CBK Edited by

Harold F. Tipton HFT Associates, Villa Park, California, USA

Kevin Henry (ISC)2 Institute, North Gower, Ontario, Canada Series: (ISC)2 Press

This officially sanctioned resource is the best and most up-to-date study guide available for those seeking CISSP certification. Offering a compendium of information security topics, the book is detailed enough to also serve as an authoritative resource for those executives or organizational managers seeking to maintain or improve security measures. The book is packaged with a CD-ROM, which includes sample exams that simulate the actual exam, providing the same number and types of questions with the same allotment of time. It even grades the exam, provides correct answers, and identifies areas where more study is needed.

The Official (ISC)² Guide to the CISSP-ISSAP CBK assures competence of the six major domains of the Information Systems Security Architecture Professional (ISSAP) Concentration. This concentration is fundamentally the consultative and analytical process of information security. Using this guide, CISSP-ISSAP candidates will understand the key concepts and requirements within the CISSPISSAP CBK. They gain knowledge of access control systems and methodologies, telecommunications and network security, cryptography, requirements analysis, business continuity and disaster recovery planning, and physical security integration.

Catalog no. K10480, ISBN: 978-1-4398-0959-4 December 2009, 6-1/8 x 9-1/4, 958 pp. Suggested Price: $69.95 / £44.99

Catalog no. K10073, ISBN: 978-1-4398-0093-5 May 2010, 6-1/8 x 9-1/4, 500 pp. Suggested Price: $79.95 / £49.99

Official (ISC)2® Guide to the CSSLP® CBK®

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK

Mano Paul

Second Edition

Express Certifications, Pflugerville, Texas, USA Series: (ISC)2 Press

Edited by

Susan Hansche

The Official (ISC)2® Guide to the CSSLP CBK® provides an inclusive analysis of all of the topics covered on the newly created Secure Software Lifecycle Professional (CSSLP) Common Body of Knowledge. The first fully comprehensive guide to the CSSLP CBK based on the official (ISC)2 course, this book prepares candidates for certification and promotes understanding of the seven ISSMP domains: Secure Software Concepts, Secure Software Requirements, Secure Software Design, Secure Software Implementation/Coding, Secure Software Testing, and Software Acceptance, and Software Deployment, Operations, and Maintenance and Disposal.

The Official (ISC)2® Guide to the CISSP-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created ISSEP Exam. The first fully comprehensive guide to the test, this book promotes understanding of the four ISSEP domains. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process. It also details key points of more than 50 U.S. government policies and procedures, which need to be understood in order to gain ISSEP certification.

Catalog no. K11251, ISBN: 978-1-4398-2605-8 May 2010, 6-1/8 x 9-1/4, 608 pp. Suggested Price: $79.95 / £41.99

Catalog no. K11170, ISBN: 978-1-4398-2327-9 July 2010, 6-1/8 x 9-1/4, 500 pp. Suggested Price: $69.95 / £33.99

Series: (ISC)2 Press

Official (ISC)2® Guide to the SSCP® CBK® Second Edition Edited by

Harold F. Tipton HFT Associates, Villa Park, California, USA

Kevin Henry (ISC)2 Institute, North Gower, Ontario, Canada Series: (ISC)2 Press

The Complete Guide for CPP® Examination Preparation James P. Muuss, CPP Reliant Protective Services Inc., Phoenix, Arizona, USA

David Rabern, CPP Int’l Counterintelligence Services, Scottsdale, Arizona, USA

SSCP Certification is the key to unlocking the upper ranks of security implementation at the world’s most prestigious organizations. For anyone who is serious about becoming a leading tactician at the front lines, the (ISC)²® Systems Security Certified Practitioner (SSCP®) Certification is an absolute necessity-demanded by cutting-edge companies worldwide, today more than ever before. Nowhere else are the seven domains of the CBK embodied more adeptly than in the first edition of the Official (ISC)²® Guide to the SSCP® CBK®. In a milestone effort by (ISC)², five of the of the world’s leading tacticians with hands-on experience in IT security acknowledge the importance of the security implementation process.

For those preparing for the Certified Protection Professional® program and designation, this text provides a thorough foundation of security concepts and practices in a single volume. This volume does more than impart the information required to pass the CPP® exam, it also delivers insight into what taking the exam is like, and provides an appreciation for the work and knowledge needed to gain CPP® certification. The book addresses security management, investigations, protection of sensitive information, substance abuse, physical security, personnel security, emergency planning, management of a guard force, legal aspects of security, and the role of a security professional as a liaison with both management and law enforcement.

Catalog no. K10267, ISBN: 978-1-4398-0483-4 May 2010, 6-1/8 x 9-1/4, 700 pp. Suggested Price: $69.95 / £44.99

Catalog no. 2896, ISBN: 978-0-8493-2896-1 June 2006, 6-1/8 x 9-1/4, 592 pp. Suggested Price: $83.95 / £53.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Computer Forensics

Forensic Computer Crime Investigation Edited by

Evidence Collection and Management

Thomas A. Johnson

Robert C. Newman

University of New Haven, Connecticut, USA Series: International Forensic Science and Investigation, 13

Georgia Southern University, Statesboro, USA

Presenting background information in computer and information systems and their use in the cyber environment, this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether it is from a network, an individual computer, a telephone system, or personal electronic device. More importantly, it covers the proper techniques and procedures for collecting and preserving computer evidence that will stand up in a court of law. The book includes checklists on how evidence should be handled and recommends policies for organizations to adopt to protect themselves from malfeasance. Catalog no. AU0561, ISBN: 978-0-8493-0561-0 March 2007, 6-1/8 x 9-1/4, 432 pp. Suggested Price: $83.95 / £53.99

From describing the fundamentals of computer crimes and the scenes left in their wake to detailing how to build an effective forensic investigative force, this book is an essential guide on how to beat cyber criminals at their own game. It takes you into the minds of computer criminals, noting universal characteristics and behaviors; it discusses strategies and techniques common to successful investigations; and it reveals how to overcome challenges that may arise when securing digital forensic evidence. The book also contains a chapter devoted to investigating Internet crimes against children. Additional chapters include information on strategies unique to international forensics and cyber terrorism. Catalog no. DK2950, ISBN: 978-0-8247-2435-1 September 2005, 6 x 9, 336 pp. Suggested Price: $124.95 / £79.99

Cyber Forensics A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition Albert Marcella, Jr. CISA Business Automation Consultants, LLC

Doug Menendez CISA, Saint Louis, Missouri, USA

Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details the scope of cyber forensics to reveal and track legal and illegal activity. The authors provide step-by-step instructions through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. The book covers rules of evidence, chain of custody, standard operating procedures, the manipulation of technology to conceal illegal activities, and how cyber forensics can uncover them. Extensive appendices include pertinent websites, organizations, and legislation. Catalog no. AU8328, ISBN: 978-0-8493-8328-1 December 2007, 7 x 10, 528 pp. Suggested Price: $73.95 / £46.99

Cyber Fraud

Malicious Bots An Inside Look into the Cyber-Criminal Underground of the Internet Ken Dunham & Jim Melnick iSIGHT Partners Inc., Dallas, Texas, USA

Originally designed to sabotage or annihilate websites, computerized “bots” are increasingly being used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, this volume provides a much needed resource for understanding the scope, sophistication, and criminal uses of bots and how to more proactively protect against them. Accessibly written, but with sufficient technical detail, the book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks over the last four years to reveal the who, how, and why behind them. Catalog no. AU6903, ISBN: 978-1-4200-6903-7 August 2008, 6-1/8 x 9-1/4, 168 pp. Suggested Price: $59.95 / £38.99

CD-ROM Included

Edited by

Practical Hacking Techniques and Countermeasures

Rick Howard

Mark D. Spivey, CISSP

Tactics, Techniques and Procedures Verisign iDefense Security Intelligence Services, Dulles, Virginia, USA

Consultant, Tomball, Texas, USA

Arguably one of the most important challenges of the 21st century, with millions lost each year, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/pharming, trojans/toolkits, direct threats, and pump-anddump scams. By examining the operations of the cyber criminal, the book provides perspective into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems.

This insider’s guide examines computer security from the hacker’s perspective, demonstrating how a security system can be designed and structured to repel an attack. It shows how an attack is conceptualized, formulated, and performed. With the VMware® Workstation software package available on the accompanying CD-ROM, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It offers examples of attacks on Windows and Linux. The book also covers such topics as footprinting, scanning, sniffing, passwords, and other attack tools. Filled with information not readily available elsewhere, this text provides valuable armor for constructing a defensible system.

Catalog no. AU9127, ISBN: 978-1-4200-9127-4 April 2009, 7 x 10, 520 pp. Suggested Price: $79.95 / £48.99

Catalog no. AU7057, ISBN: 978-0-8493-7057-1 November 2006, 7 x 10, 752 pp. Suggested Price: $83.95 / £53.99

Security & Auditing / Computer Crime Investigation

Textbook

71


For more information and a complete list Profiling Hackers

Software Engineering & Systems Development 72

The Science of Criminal Profiling as Applied to the World of Hacking Raoul Chiesa, Stefania Ducci, & Silvio Ciappi

Architecting Secure Software Systems

University of Pisa, Italy

Asoke K. Talukder & Manish Chaitanya

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory and focusing on the relationship between technology and crime, this volume offers insight into the hacking realm by telling attention-grabbing tales about the bizarre characters who practice hacking as an art. Applying the behavioral science of criminal profiling to the world of Internet predators, the text addresses key issues such as the motivation behind hacking and whether it is possible to determine a hacker’s profile on the basis of his behavior or types of intrusion.

Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and web environments, and they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach which allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation.

Catalog no. AU8693, ISBN: 978-1-4200-8693-5 December 2008, 6-1/8 x 9-1/4, 279 pp., Soft Cover Suggested Price: $49.95 / £31.99

Wireless Crime and Forensic Investigation Gregory Kipper

Catalog no. AU7843, ISBN: 978-1-4200-8784-0 December 2008, 7 x 10, 446 pp. Suggested Price: $59.95 / £38.99

Architecting Software Intensive Systems A Practitioners Guide Anthony J. Lattanze

Computer Security Innovations, Herndon, Virginia, USA

Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

From short text messaging to investigating war, this book explores all aspects of wireless technology, including how it is used in daily life and how it might be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and the forensic investigation techniques that are used for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques, and wireless crime techniques, and shows how to conduct forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, is self-contained for quick comprehension.

Focusing on the architecture centric design method (ACDM), this book provides deep insight into designing software architectures for systems and how to effectively use architectural design artifacts once created. The text describes how to integrate ACDM with existing organizational structures and processes. The author demonstrates how to tailor defined software process frameworks and methodologies to ACDM in order to design the architecture for a software intensive system. The chapters offer practical guidelines for the general iterative model, the general waterfall model, the rational unified process, the team software process, Scrum, as well as extreme programming.

Catalog no. AU3188, ISBN: 978-0-8493-3188-6 February 2007, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $83.95 / £53.99

Catalog no. AU4569, ISBN: 978-1-4200-4569-7 November 2008, 7 x 10, 416 pp. Suggested Price: $79.95 / £49.99

Applied Software Product Line Engineering

Architectural Design Patterns in C#

Edited by

Kyo C. Kang, Vijayan Sugumaran, & Sooyong Park Greater competition is pressuring industries to improve efficiency through the use of Software Product Line (SPL), which in recent years has drastically increased the productivity of IT-related industries, with many more improvements possible. This handbook details various aspects of SPL implementation in different domains, while documenting best practices with regard to system development. Expert contributors from academia and industry come together to focus on core asset development, product development, and management, addressing the process, technical, and organizational issues needed to meet the demand for information in what is becoming a global paradigm shift. Catalog no. AU6841, ISBN: 978-1-4200-6841-2 December 2009, 6-1/8 x 9-1/4, 558 pp. Suggested Price: $89.95 / £57.99

Joydip Kanjilal Kolkata, India

With a focus on designing applications, this book presents a step-by-step architectural approach to learning and mastering design patterns using C#. The author provides guidance for the architecture and design of reusable, scalable, and robust enterprise applications. The text discusses a number of common architectural models and patterns and shows how to choose the ones that suit a particular scenario. Real-life code examples and UML diagrams illustrate the patterns and how they work. The text also provides sound knowledge of objectoriented principles and the best practices to use in architecture applications. Catalog no. K10851, ISBN: 978-1-4398-1656-1 August 2010, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $69.95 / £44.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Edited by

Delivering Successful Projects with TSPSM and Six Sigma

University of Pittsburgh, Pennsylvania, USA

A Practical Guide to Implementing Team Software ProcessSM

Burcu Akinci

Mukesh Jain

Hassan A. Karimi Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

Microsoft, Bellevue, Washington, USA

Problem solving through CAD and GIS requires a proper integration of these systems for efficient and effective processing of data and operations. Currently, there is no single book that covers the breadth and depth of CAD/GIS integration issues and solutions. This book provides in-depth descriptions of existing and emerging methodologies, techniques, and technologies for integrating CAD and GIS and includes example applications requiring efficient and effective solutions through proper CAD/GIS integration. The text delineates the technical aspects of integrating CAD/GIS, helping readers learn concepts and techniques to analyze, design, and implement projects ranging from the simple to the complex.

Mukesh Jain of Microsoft details how TSPSM techniques can be followed to plan the right project, take the right steps, and get the right results, every time. The author shares real-world experience through his implementation of TSP at Microsoft India and documents how the TSP teams delivered high quality software on schedule and within budget. Through this case study, he examines how teams improved the software development process by combining TSP with Six Sigma. This combination delivered significant benefits in predictability and dramatically increased the number of zero-defect projects. The book also explores common pitfalls to avoid while implementing TSP and the coaching of TSP teams.

Catalog no. AU6805, ISBN: 978-1-4200-6805-4 December 2009, 6-1/8 x 9-1/4, 236 pp. Suggested Price: $89.95 / £57.99

Certified Function Point Specialist Examination Guide David Garmus, Royce Edwards, & Janet Russac

Catalog no. AU6143, ISBN: 978-1-4200-6143-7 2009, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $79.95 / £49.99

Design and Safety Assessment of Critical Systems Marco Bozzano & Adolfo Villafiorita Bruno Kessler Foundation, Italy

Industry recognition of the Certified Function Point Specialist (CFPS) exam is so widespread that many companies around the world now commonly include function point analysis in their contracts. This comprehensive guide prepares individuals for the certification exam by reviewing every key section of the International Function Point Users Group (IFPUG) Counting Practices Manual. Every chapter includes a series of questions to reinforce key concepts and techniques. The text explains how to use the manual while taking the examination to ensure that correct information is found quickly. The book concludes with a sample examination to fully complete the preparation process.

With safety-critical systems becoming more complex, this book highlights how to improve these systems to reduce the risk of harmful effects to people and the environment. Design and Safety Assessment of Critical Systems provides an introduction to the area of design and verification of safety critical systems, with a focus on safety assessment. Issues related to design, development, and safety assessment of critical systems follow a detailed introduction of fundamental concepts. The core of the book covers some of the most well-known notations, techniques, and procedures, and also includes many in-depth examples that offer perspective from a variety of industrial sectors.

Catalog no. AU7637, ISBN: 978-1-4200-7637-0 April 2010, 6-1/8 x 9-1/4, 128 pp., Soft Cover Suggested Price: $44.95 / £28.99

Catalog no. K10186, ISBN: 978-1-4398-0331-8 June 2010, 6-1/8 x 9-1/4, 250 pp. Suggested Price: $89.95 / £57.99

Data Flow Analysis Theory and Practice Uday Khedker, Amitabha Sanyal, & Bageshri Karkare

Embedded Linux System Design and Development

IIT Bombay, Mumbai, India

P. Raghavan, Amol Lad, & Sriram Neelakandan

This work provides an in-depth treatment of data flow analysis technique. Apart from including interprocedural data flow analysis, this book is the first to extend detailed coverage of analysis beyond bit vectors. Supplemented by numerous examples, it equips readers with a combination of mutually supportive theory and practice, presenting mathematical foundations and including study of data flow analysis implementation through use of the GNU Compiler Collection (GCC). Readers can experiment with the analyses described in the book by accessing the author’s web page, where they will find the source code of gdfa (generic data flow analyzer).

Embedded Linux System Design and Development contains a full development roadmap for embedded Linux systems. It facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: MTD model for flash based embedded storage; real-time programming using POSIX.1b real-time extensions; various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem.

Catalog no. 2880, ISBN: 978-0-8493-2880-0 March 2009, 6-1/8 x 9-1/4, 395 pp. Suggested Price: $99.95 / £60.99

Catalog no. AU0586, ISBN: 978-0-8493-4058-1 2006, 7 x 10, 432 pp. Suggested Price: $73.95 / £46.99

Software Engineering & Systems Development

CAD and GIS Integration

73


For more information and a complete list

Software Engineering & Systems Development 74

Enterprise-Scale Agile Software Development

Handbook of Enterprise Integration

James Schiel

Edited by

Danube Technologies, Pennsylvania, USA Series: Applied Software Engineering, 6

Mostafa Hashem Sherif

Written for organizations attempting to convert their transitional development practices to agile, this book is organized into chapters sequenced to match the typical progression. Drawing on his experience in transitioning a 1400 person organization to agile development, the author provides the information and tools that will allow you to consider potential outcomes so that you can make the best choices for your unique situation. The content is based on the use of Scrum as an organizational framework and on XP practices used to define how software is written and tested. The book also includes information regarding quality development practices based on ISO 9001.

Bringing together the latest research and application results, this book provides a clear and comprehensive understanding of systems integration technologies, architectures, applications, and project management techniques involved in enterprise system integration. The text includes coverage of mobile communications, standards for integrated manufacturing and e-commerce, RFID, web-based systems, and complete service-oriented enterprise modeling and analysis. Practitioners will benefit from insights on managing virtual teams and management techniques for introducing complex technology into businesses. Covering best practices in enterprise systems integration, the text highlights applications across various business enterprises, includes case studies, and presents the state of the art in the context of user requirements and integration.

Catalog no. K10179, ISBN: 978-1-4398-0321-9 November 2009, 6-1/8 x 9-1/4, 382 pp. Suggested Price: $89.95 / £57.99

Essential Software Testing A Use-Case Approach Greg Fournier Enlighten Solutions, Colorado Springs, USA

AT&T, Tinton Falls, New Jersey, USA

Catalog no. AU8216, ISBN: 978-1-4200-7821-3 November 2009, 6-1/8 x 9-1/4, 728 pp. Suggested Price: $99.95 / £63.99

Interpreting the CMMI® A Process Improvement Approach, Second Edition Margaret K. Kulpa & Kent A. Johnson Agiledigm, Inc., Ormond Beach, Florida, USA

Utilizing case-driven techniques that are appropriate for any software development project, this manual communicates a realistic approach to software testing that gets the job done in an efficient manner. Covering basic testing concepts and employing a hands-on approach, the book shows how to determine what to test, how to select proper tests, and how to perform the actual tests. It also discusses techniques for building and tracing tests, and demonstrates how to conduct and record results. The methods presented in this handbook are equally accessible to testers, software managers, and developers.

Taking a broad approach that speaks to experienced and inexperienced process improvement practitioners, CMMI® experts and CMMI novices, this second edition thoroughly examines the latest version of the CMMI. Divided into six sections, the text first clarifies the concept of process improvement, makes the case for how and why to employ CMMI, and outlines its structure. It then provides an overview of the process areas, supported by real-world display tables, templates, and charts designed to aid organizations in their improvement efforts. Subsequent sections address measurement issues including basic metrics, statistical process control, and high maturity concerns, as well as SCAMPISM appraisal types.

Catalog no. AU9811, ISBN: 978-1-4200-8981-3 October 2008, 7 x 10, 280 pp., Soft Cover Suggested Price: $59.95 / £38.99

Catalog no. AU6052, ISBN: 978-1-4200-6052-2 March 2008, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $69.95 / £44.99

Textbook

Flexible, Reliable Software Henrik B. Christensen University of Aarhus, Denmark Series: Chapman & Hall/CRC Textbooks in Computing, 3

Manage Software Testing Peter Farrell-Vinay

Flexible, Reliable Software brings together a special selection of topics that are crucial in the development of quality software. It provides a carefully designed pedagogy that leads the reader through an experience of active learning. Covering the topics that every software engineer should know, the emphasis in the content is on practical goals—how to construct reliable and flexible software systems. Complete with hands-on projects and guidance on the process, this book not only discusses what the end product should be like, but how to get there.

Showing test managers what to focus on strategically, tactically, and operationally, this book provides a comprehensive guide to all aspects of test management for those inheriting or starting a test team. It covers unit, system, and non-functional tests with examples on how to estimate the number of bugs expected to be found, the time required for testing, and the date when a release is ready. Using a risk-based approach, the author addresses a range of questions about a software product under development. This text shows test managers how to develop a basis to assess software team processes and achievements, as well as guides them through the business and organizational issues that they confront.

Catalog no. C3622, ISBN: 978-1-4200-9362-9 May 2010, 7 x 10, 528 pp. Suggested Price: $69.95 / £44.99

Catalog no. AU9383, ISBN: 978-0-8493-9383-9 March 2008, 7 x 10, 600 pp. Suggested Price: $99.95 / £63.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Donald G. Firesmith

Ron S. Kenett KPA, Ltd., Raanana, Israel

Emanuel Baker

SEI, Pittsburgh, Pennsylvania, USA

Process Strategies, Inc., Los Angeles, California, USA

Offering a practical way to generate effective and efficient project-specific system architecture engineering methods, this volume addresses the entire range of systems architecture including hardware, software, subsystems, and systems of systems. It defines a set of architectural roles and teams and provides a repository of reusable architectural engineering process components to develop high-quality system architectures. It examines a cohesive set of tailorable tasks and components steps for producing associated architectural work products and establishes a recommended set of industry best practices for engineering the architecture of software-intensive systems. The book provides numerous tables and figures to give readers speedy access to highly useful information.

Process Improvement and CMMI for Systems and Software provides readers with a workable approach for achieving cost-effective process improvements for systems and software. It details a methodology for assessing the status of a development or maintenance process and also lays out an effective plan for achieving process improvements. This practical resource supplies examples of measures and metrics that can be useful for establishing baselines and for monitoring process improvement projects. The text concludes with a realistic case study that illustrates how the methods, tools, and techniques discussed fit together.

Catalog no. AU8575, ISBN: 978-1-4200-8575-4 November 2008, 7 x 10, 512 pp. Suggested Price: $79.95 / £49.99

Textbook

Modeling Software Behavior A Craftsman’s Approach Paul C. Jorgensen

Catalog no. AU6050, ISBN: 978-1-4200-6050-8 March 2010, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $69.95 / £44.99

Process Improvement with CMMI® v1.2 and ISO Standards Boris Mutafelija Fairfax, Virginia, USA

Harvey Stromberg

Grand Valley State University, Allendale, Michigan, USA

Rockville, Maryland, USA

Based on a graduate course taught by the author, this book provides an in-depth understanding of the expressive power of various models of system behavior. The text details two fundamental types of requirements specification models: those that describe structure and those that describe behavior. Chapters emphasizing structure focus on entity/relation models, dataflow diagrams, hierarchy charts, class diagrams, and object diagrams as well as the interfaces among them. Sections highlighting behavior address decision tables, finite state machines, StateCharts, and Petri Nets. The capabilities and limitations of each model are also discussed. Practical examples and exercises complete the coverage.

In this age of globalization, it is important for process improvement practitioners to be able to comprehend and work with the different standards and frameworks used around the world. This volume assists users in becoming more versatile using multiple process standards when creating their organizational and project processes. The book examines the structure and content of Capability Maturity Model IntegrationSM, version 1.2. It then provides summaries of several ISO standards, and discusses the detailed relationships between four specific ISO standards and CMMI®. It also introduces process mapping and illustrates how mappings can be used to advantage when comparing different frameworks.

Catalog no. AU8075, ISBN: 978-1-4200-8075-9 July 2009, 6-1/8 x 9-1/4, 215 pp. Suggested Price: $89.95 / £57.99

Catalog no. AU5283, ISBN: 978-1-4200-5283-1 October 2008, 6-1/8 x 9-1/4, 406 pp. Suggested Price: $69.95 / £44.99

Modeling Software with Finite State Machines A Practical Approach

Process-Centric Architecture for IT Systems

Ferdinand Wagner, Ruedi Schmuki, Thomas Wagner, & Peter Wolstenholme

Parameswaran Seshan

Modeling Software with Finite State Machines: A Practical Approach explains how to apply finite state machines to software development. It provides a critical analysis of using finite state machines as a foundation for executable specifications to reduce software development effort and improve quality. It discusses the design of a state machine and of a system of state machines. It also presents a detailed analysis of development issues relating to behavior modeling with design examples and design rules for using finite state machines. This text demonstrates the implementation of these concepts using StateWORKS software and introduces the basic components of this software.

Reflecting an emerging area, this book presents an IT system architecture approach that centers on business processes: process-centric architecture. It provides a stepby-step presentation of process-centric architecture that includes its principles of analysis and design. This text covers the evolution of IT systems in enterprises, the importance of a business process focus, the role of workflows, business process modeling languages such as BPML and WS-BPEL, enterprise application integration, and more. The author then demonstrates how to architect and design an enterprise application based on process-centric architecture using case studies as well as illustrative examples.

Catalog no. AU8086, ISBN: 978-0-8493-8086-0 May 2006, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $97.95 / £61.99

Catalog no. K10837, ISBN: 978-1-4398-1628-8 April 2010, 6-1/8 x 9-1/4, 210 pp. Suggested Price: $89.95 / £57.99

Infosys, Bangelore, India

Software Engineering & Systems Development

The Method Framework for Engineering System Architectures

Process Improvement and CMMI for Systems and Software

75


For more information and a complete list

Software Engineering & Systems Development 76

Quality Assurance of Agent-Based and Self-Managed Systems

Secure and Resilient Software Development

Reiner Dumke, Steffen Mencke, & Cornelius Wille

Mark S. Merkow & Lakshmikanth Raghavan

Based on the authors’ more than fifteen years of experience in software agent technology, this book first presents the essential basics, aspects, and structures of the agent technology. It then covers the main quality aspects in software system development and gives current examples of agent measurement and evaluation. Focusing on software agent systems and multi-agent systems (MAS), the authors discuss the determination of quality properties. They also explain different techniques and approaches to evaluate the development of MAS. The final chapter summarizes quality assurance approaches for agent-based systems and discusses some open problems and future directions.

Many of the software books available clearly highlight the problems with current software development but don’t provide comprehensive, easily actionable, groundlevel solutions. Covering the entire secure software development life cycle that ties all development together, this book presents quality software development strategies and practices stressing resilience requirements with precise, actionable, and ground-level inputs that connect directly with their creators. The text helps developers understand fundamental problems and provides them with best practices, principles, design methodology, programming guidance, and testing practices.

Catalog no. K10644, ISBN: 978-1-4398-1266-2 August 2009, 6-1/8 x 9-1/4, 176 pp. Suggested Price: $99.95 / £63.99

Catalog no. K11327, ISBN: 978-1-4398-2696-6 February 2010, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $79.95 / £49.99

Textbook

Requirements Engineering for Software and Systems Phillip A. Laplante

Secure Java

The Pennsylvania State University, Malvern, USA Series: Applied Software Engineering, 5

For Web Application Development

With an intentional focus on software-intensive systems, this volume provides a probing and comprehensive review of the state of technology and developments in intelligent systems, soft computing techniques, and their diverse applications in manufacturing. To illustrate key ideas associated with requirements engineering, the text presents three common example systems: an airline baggage handling system, a point-of-sale system for one location of a large pet store chain, and a system for a “smart home” in which one or more PCs control various aspects of the home’s functions. The selected systems encompass a wide range of applications— from embedded to organic, covering industrial and consumer uses.

As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security implementation techniques using Java technologies, and web application security testing.

Catalog no. AU6467, ISBN: 978-1-4200-6467-4 March 2009, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $89.95 / £54.99

Catalog no. K11172, ISBN: 978-1-4398-2351-4 June 2010, 7 x 10, 350 pp., Soft Cover Suggested Price: $69.95 / £44.99

Scrum Software Development Jagdish Bhandarkar & J. Srinivas

Abhay Bhargav & B.V. Kumar

Security Software Development Assessing and Managing Security Risks Douglas A. Ashbaugh, CISSP

Infosys Technologies Ltd., Bangalore, India

Software Engineering Services, West Des Moines, Iowa, USA

Scrum is an agile development methodology that is quickly gaining pace as a mainstream method in the software industry. This book highlights its practice and interweaves project experience with mandatory Scrum methods. Each chapter illustrates a particular aspect of Scrum and its application. Using a case study throughout, the authors detail how to implement agile practices in a corporation. They also discuss the need for a different kind of contract mechanism, which needs to be put in place with different metrics and estimation techniques. The book concludes with guidelines on how to convert a mainstream methodology to Agile.

Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development life cycle using a test case based on the author’s personal experience in software development. The book covers methods used to assess risk, discussing the pros and cons of each method. Readers are then guided through each step of the process. The book concludes with discussions of how to sustain a risk assessment and risk management process within an organization.

Catalog no. K11330, ISBN: 978-1-4398-2699-7 June 2010, 6-1/8 x 9-1/4, 275 pp., Soft Cover Suggested Price: $49.95 / £31.99

Catalog no. AU6380, ISBN: 978-1-4200-6380-6 December 2008, 6-1/8 x 9-1/4, 321 pp. Suggested Price: $79.95 / £49.99


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Software Testing and Continuous Quality Improvement William E. Lewis President and CEO, Smartware Technologies Inc., Plano, Texas, USA

This third edition of a bestseller provides a comprehensive look at software testing as part of the project management process, emphasizing testing and quality goals early on in development. Building on the success of previous editions, the text explains how compliance testing helps an IT organization meet Sarbanes-Oxley and Basel II requirements. The sections on test effort estimation are fully updated, providing greater emphasis on testing metrics. New chapters address process, application, and organizational metrics. The book also examines all aspects of functional testing and looks at the relation between changing business strategies and changes to applications in development. Catalog no. AU0733, ISBN: 978-1-4200-8073-5 December 2008, 6-1/8 x 9-1/4, 688 pp. Suggested Price: $79.95 / £49.99

Software Testing as a Service Ashfaque Ahmed SCM Consulting, Chattisgarh, India

Software Testing as a Service explains, in simple language, how to use software testing to improve productivity, reduce time to market, and reduce costly errors. It explains how the normal functions of manufacturing can be applied to commoditize the software testing service to achieve consistent quality across all software projects. This up-to-date reference reviews different software testing tools, techniques, and practices and provides succinct guidance on how to estimate costs, allocate resources, and make competitive bids. Replete with examples and case histories, this resource illustrates how proper planning can lead to the creation of software that’s head and shoulders above the competition. Catalog no. K10002, ISBN: 978-1-4200-9956-0 September 2009, 6-1/8 x 9-1/4, 228 pp. Suggested Price: $79.95 / £49.99

Textbook

Software Testing A Craftsman’s Approach, Third Edition Paul C. Jorgensen Grand Valley State University, Allendale, Michigan, USA

A bestseller in its first two editions, Software Testing: A Craftsman’s Approach, Third Edition has been thoroughly revised and updated to highlight issues such as how Agile and XP development environments have radically changed the role of software testers by making testing integral to every phase of the development process. Coverage also includes model-based and test-driven development, reexamination of all-pairs testing, and explanation of the four contexts of software testing. The author provides new downloadable programs that demonstrate white-box, black-box and other fundamental types testing. Catalog no. AU7475, ISBN: 978-0-8493-7475-3 February 2008, 7 x 10, 440 pp. Suggested Price: $99.95 / £63.99

Software Engineering & Systems Development

Third Edition

77


For more information and a complete list A

Title Index 78

Adaptation and Cross Layer Design in Wireless Networks.... 59 Adaptation in Wireless Communications, 2 Volume Set...59 Adaptive Image Processing: A Computational Intelligence Perspective, Second Edition............................36 Adaptive Signal Processing in Wireless Communications.. 59 Advanced Number Theory with Applications...................30 Advanced Server Virtualization: VMware and Microsoft Platforms in the Virtual Data Center................55 Advances in Network Management...................................59 Advances in Semantic Media Adaptation and Personalization, Volume 2.................................................43 Algorithmic Cryptanalysis.................................................23 Algorithms and Theory of Computation Handbook, Second Edition - 2 Volume Set...........................................3 Algorithms and Theory of Computation Handbook, Second Edition, Volume 1: General Concepts and Techniques...................................................................3 Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques...3 Algorithms in Bioinformatics: A Practical Introduction......9 An Integrated Introduction to Computer Graphics and Geometric Modeling..................................................22 An Introduction to Neural Networks................................42 An IT Executive’s Guide to ITIL: Running IT as a Customer-Centric Business...............................................56 Analog and VLSI Circuits.................................................14 Analysis and Synthesis of Fuzzy Control Systems: A Model Based Approach..................................................39 Applications of Cognitive Work Analysis..........................33 Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition..................................................................23 Applied Combinatorics, Second Edition...........................23 Applied Genetic Programming and Machine Learning.....44 Applied Software Product-Line Engineering.....................72 Architecting Secure Software Systems................................72 Architecting Software Intensive Systems: A Practitioners Guide........................................................72 Architectural Design Patterns in C#..................................72 Art of Systems Architecting, Third Edition.......................48 Assessing and Managing Security Risk in IT Systems: A Structured Methodology................................................64 Attaining High Performance Communications: A Vertical Approach..........................................................17 Automotive Embedded Systems Handbook......................17 Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications..................................................39

B

Basic GIS Coordinates, Second Edition............................43 Bayesian Artificial Intelligence...........................................39 Bayesian Modeling in Bioinformatics..................................9 Best Practices in Business Technology Management..........52 Bioinformatics: A Practical Approach................................10 Bioinformatics: High Performance Parallel Computer Architectures.....................................................................11 Bio-inspired Computing and Networking...........................6 Bio-inspired Flying Robots: Experimental Synthesis of Autonomous Indoor Flyers................................................39 Biological Computation....................................................10 Biological Data Mining.....................................................25 Biological Sequence Analysis Using the SeqAn C++ Library...........................................................10 Blind Image Deconvolution: Theory and Applications......36

Broadband Mobile Multimedia: Techniques and Applications...............................................................60 Building a Project Work Breakdown Structure: Visualizing Objectives, Deliverables, Activities, and Schedules...................................................................57 Building an Effective Information Security Policy Architecture......................................................................64 Building and Implementing a Security Certification and Accreditation Program: OFFICIAL (ISC)2® GUIDE to the CAPcm CBK®........................................................69 Building and Maintaining a Data Warehouse....................50 Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results..................................52

C

C++ for Mathematicians: An Introduction for Students and Professionals.................................................47 CAD and GIS Integration.................................................73 Cancer Systems Biology....................................................10 Carrier Ethernet: Providing the Need for Speed................60 Certified Function Point Specialist Examination Guide....73 Chemical Information Mining: Facilitating Literature-Based Discovery................................................26 Chromatic Graph Theory.................................................31 Circuits and Filters Handbook, Third Edition (Five Volume Slipcase Set).................................................14 CISO Leadership: Essential Principles for Success.............69 CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives......64 Classical and Modern Numerical Analysis: Theory, Methods and Practice.............................................6 Classical Fortran: Programming for Engineering and Scientific Applications, Second Edition.............................47 Cloud Computing............................................................43 Cloud Computing: Implementation, Management, and Security......................................................................55 Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center..........................................55 Codes: The Guide to Secrecy From Ancient to Modern Times..................................................................23 Coding Theory and Cryptography: The Essentials, Second Edition..................................................................23 Combinatorial Approach to Matrix Theory and Its Applications......................................................................31 Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R.........................10 Combinatorics of Compositions and Words.....................31 Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition......................18 Complete Guide for CPP® Examination Preparation.......70 Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI............................................................................64 Complete Project Management Methodology and Toolkit........................................................................57 Complete Project Management Office Handbook, Second Edition..................................................................57 Computational Analysis of Randomness in Structural Mechanics: Structures and Infrastructures Book Series, Vol. 3,.............................................................6 Computational Intelligence in Medical Imaging: Techniques and Applications.............................................21 Computational Intelligence Paradigms: Theory & Applications using MATLAB®..........................................45

Computational Methods of Feature Selection...................26 Computational Protein-Protein Interactions.....................11 Computational Proteomics: Protein Classification and Meta-Organization.....................................................11 Computational Statistics Handbook with MATLAB®, Second Edition....................................................................6 Computational Statistics: An Introduction to R................47 Computational Vision and Medical Image Processing: VipIMAGE 2009..............................................................21 Computer Aided Design and Design Automation.............14 Computer Arithmetic and Verilog HDL Fundamentals....15 Computer Engineering Handbook, Second Edition 2 Volume Set.....................................................................18 Computer Forensics: Evidence Collection and Management..............................................................71 Computer Imaging: Digital Image Analysis and Processing...................................................................36 Computer Network Time Synchronization: The Network Time Protocol.............................................18 Computer Science Handbook, Second Edition.................49 Computer Vision: From Surface to Objects......................45 Conceptual Modeling for Discrete-Event Simulation..........6 Conceptual Structures in Practice......................................45 Concise Introduction to Image Processing using C++.......37 Constrained Clustering: Advances in Algorithms, Theory, and Applications..................................................26 Contemporary Coding Techniques and Applications for Mobile Communications.............................................18 Content Preparation Guidelines for the Web and Information Appliances: Cross-Cultural Comparisons......33 Context-Aware Computing and Self-Managing Systems...34 Control of Color Imaging Systems: Analysis and Design...37 Converging NGN Wireline and Mobile 3G Networks with IMS: Converging NGN and 3G Mobile...................60 Creating Spatial Information Infrastructures: Towards the Spatial Semantic Web....................................43 Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies.............................................................64 Cryptanalysis of Number Theoretic Ciphers.....................23 Cryptanalysis of RSA and Its Variants...............................24 Cryptography: Theory and Practice, Third Edition...........24 Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition....................................................71 Cyber Fraud: Tactics, Techniques and Procedures..............71

D

Data Analysis Tools for DNA Microarrays Using R, Second Edition..................................................................11 Data Flow Analysis: Theory and Practice..........................73 Data Mining for Design and Marketing............................26 Data Mining for Global Trends in Mountain Biodiversity......................................................26 Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies.....................................................................26 Data Mining Methods and Applications...........................27 Data Mining with R: Learning by Case Studies.................27 Data Protection: Governance, Risk Management, and Compliance.......................................................................64 Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments................60


Database Design Using Entity-Relationship Diagrams......51 Decision Model: A Business Logic Framework Linking Business and Technology......................................51 Decomposition Methods for Differential Equations: Theory and Applications.....................................................7 Delivering Successful Projects with TSP(SM) and Six Sigma: A Practical Guide to Implementing Team Software Process(SM)........................................................73 Design and Implementation of Data Mining Tools...........51 Design and Safety Assessment of Critical Systems.............73 Design and Use of Relational Databases in Chemistry......11 Design of Cost-Efficient Interconnect Processing Units: Spidergon STNoC..................................................15 Design of Enterprise Systems: Theory, Architecture, and Methods.....................................................................48 Design of Low-Power Coarse-Grained Reconfigurable Architectures.............................................49 Design Theory, Second Edition.........................................31 Determining Project Requirements...................................58 Deterministic Learning Theory for Identification, Recognition, and Control.................................................39 Digital Color Imaging Handbook.....................................37 Digital Design and Verilog HDL Fundamentals...............15 Digital Image Processing: An Algorithmic Approach with MATLAB®. ..............................................................37 Digital Integrated Circuits: Analysis and Design, Second Edition..................................................................15 Digital Signal Processing Fundamentals............................18 Digital Signal Processing Handbook, Second Edition 3 Volume Set.....................................................................18 Discrete Mathematics: Proofs, Structures and Applications, Third Edition..............................................31 Discrete-Event Modeling and Simulation: A Practitioner’s Approach..................................................15 DNA Methylation Microarrays: Experimental Design and Statistical Analysis......................................................11 DNA Microarrays and Related Genomics Techniques: Design, Analysis, and Interpretation of Experiments.........12

E

EDA for IC Implementation, Circuit Design, and Process Technology............................................................15 EDA for IC System Design, Verification, and Testing.......15 Effective CIO: How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance...........................................................52 Effective Communications for Project Management.........58 Electron Transfer Proteins: A Computational Perspective...12 Electronic Chart Display and Information System (ECDIS): An Operational Handbook...............................40 Electronic Design Automation for Integrated Circuits Handbook - 2 Volume Set.................................................16 Elliptic Curves: Number Theory and Cryptography, Second Edition..................................................................24 Embedded Linux System Design and Development..........73 Embedded Multiprocessors: Scheduling and Synchronization, Second Edition......................................17 Embedded Systems Handbook..........................................17 Emergent Semantics..........................................................19 Enabling Context-Aware Web Services: Methods, Architectures, and Technologies........................................43 Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware..................................................49 Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology....55

Enterprise Business Architecture: The Formal Link between Strategy and Results.............................................52 Enterprise Systems Backup and Recovery: A Corporate Insurance Policy............................................56 Enterprise-Scale Agile Software Development...................74 ERP: Tools, Techniques, and Applications for Integrating the Supply Chain, Second Edition..................53 Essential Software Testing: A Use-Case Approach..............74 Essentials of Control Techniques and Theory....................45 Executive MBA in Information Security...........................65 Exploratory Data Analysis with MATLAB®......................27

F

Feedback, Nonlinear, and Distributed Circuits.................14 First Course in Fuzzy Logic, Third Edition.......................40 Flexible, Reliable Software.................................................74 Forensic Computer Crime Investigation...........................71 Foundations of Semantic Web Technologies......................43 Fundamental Number Theory with Applications, Second Edition..................................................................31 Fundamentals of Circuits and Filters.................................14 Fundamentals of DSL Technology....................................60 Fundamentals of Grid Computing: Theory, Algorithms and Technologies.................................7 Fundamentals of Natural Computing: Basic Concepts, Algorithms, and Applications............................................49 Fuzzy Image Processing and Applications with MATLAB®. ......................................................................37

G

Game Theory for Wireless Communications and Networking.......................................................................50 Gene Expression Studies Using Affymetrix Microarrays....12 Genetic Algorithms and Genetic Programming: Modern Concepts and Practical Applications......................3 Genetics and Randomness................................................12 Geographic Data Mining and Knowledge Discovery, Second Edition..................................................................27 Geographic Information Services for Ubiquitous Mobile Services.................................................................19 Get Certified: A Guide to Wireless Communication Engineering Technologies..................................................69 GIS: A Computing Perspective, Second Edition...............19 Global Arrays: Scientific Programming for Scalable Parallel Computers................................................7 Global Engineering Project Management..........................58 Glycome Informatics: Methods and Applications..............12 Governing Lethal Behavior in Autonomous Robots..........40 Graph Theory and Interconnection Networks...................19 Graph Theory and Its Applications, Second Edition.........32 Graphics and GUIs with MATLAB®, Third Edition.........21 Graphs & Digraphs, Fourth Edition.................................32 Green and Virtual Data Center.........................................56 Green IT...........................................................................56 Grid Computing: Infrastructure, Service, and Applications...7 Grid Computing: Techniques and Applications..................7 Grid Resource Management: Toward Virtual and Services Compliant Grid Computing..................................7 Guide to MATLAB® Object-Oriented Programming........47

H

Handbook of Algorithms for Physical Design Automation...3 Handbook of Algorithms for Wireless Networking and Mobile Computing......................................................3 Handbook of Applied Cryptography.................................24

Handbook of Approximation Algorithms and Metaheuristics..............................................................4 Handbook of Aviation Human Factors.............................34 Handbook of Bioinspired Algorithms and Applications......4 Handbook of Chemoinformatics Algorithms....................12 Handbook of Computational Group Theory......................8 Handbook of Computational Molecular Biology..............13 Handbook of Data Structures and Applications..................4 Handbook of Digital Human Modeling: Research for Applied Ergonomics and Human Factors Engineering......34 Handbook of Discrete and Combinatorial Mathematics, Second Edition...........................................32 Handbook of Discrete and Computational Geometry, Second Edition..................................................................32 Handbook of Elliptic and Hyperelliptic Curve Cryptography.........................................................24 Handbook of Enterprise Integration.................................74 Handbook of Finite State Techniques..................................4 Handbook of Graph Theory.............................................32 Handbook of Hidden Markov Models in Bioinformatics.. 13 Handbook of Mathematical Induction: Theory and Applications......................................................................32 Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO.............................................44 Handbook of Natural Language Processing, Second Edition..................................................................45 Handbook of Parallel Computing: Models, Algorithms and Applications...............................................4 Handbook of Public Information Systems, Third Edition...44 Handbook of Real-Time and Embedded Systems...............4 Handbook of Relational Learning.....................................45 Handbook of Scheduling: Algorithms, Models, and Performance Analysis..........................................................5 Handbook of Standards and Guidelines in Ergonomics and Human Factors.......................................34 How to Count: An Introduction to Combinatorics, Second Edition..................................................................33 HOWTO Secure and Audit Oracle 10g and 11g..............51 HSDPA/HSUPA Handbook.............................................60 Human Factors in Simulation and Training......................34 Human-Computer Etiquette.............................................34 Human-Computer Interaction Fundamentals...................35 Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications, Second Edition............................................35 Human-Computer Interaction: Design Issues, Solutions, and Applications...............................................35 Human-Computer Interaction: Designing for Diverse Users and Domains..............................................35 Human-Computer Interaction: Development Process.......35 Hybrid Simulation: Theory, Implementation and Applications...............................................................19

I

Image Analysis, Classification, and Change Detection in Remote Sensing: With Algorithms for ENVI/IDL, Second Edition..................................................................37 Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards, Second Edition..................................................................38 Image Processing with MATLAB®: Applications in Medicine and Biology.......................................................38 Immunological Computation: Theory and Applications.....8 Implementing Electronic Document and Record Management Systems........................................................51

Title Index

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

79


For more information and a complete list

Title Index 80

Implementing Program Management: Templates and Forms Aligned with the Standard for Program Management - Second Edition (2008)..............................53 Implementing the IT Balanced Scorecard: Aligning IT with Corporate Strategy.................................53 IMS: A New Model for Blending Applications..................61 Information Assurance Architecture..................................65 Information Discovery on Electronic Health Records.......27 Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition..................................................................65 Information Security Management Handbook, 2010 CD-ROM Edition...................................................65 Information Security Management Handbook, Sixth Edition.....................................................................65 Information Security Management Handbook, Sixth Edition, Volume 2....................................................65 Information Security Management Handbook, Sixth Edition, Volume 3....................................................65 Information Security Management Handbook, Sixth Edition, Volume 4....................................................65 Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement..............................................................66 Information Security Management: Concepts and Practice.......................................................66 Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition........................66 Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management.......................................................66 Information Security Risk Analysis, Second Edition..........66 Information Technology Control and Audit, Third Edition....................................................................66 Innovative Solutions: What Designers Need to Know for Today’s Emerging Markets...........................................35 Intelligent and Adaptive Systems in Medicine...................40 Intelligent Control Systems with an Introduction to System of Systems Engineering.....................................40 Intelligent Freight Transportation......................................40 Intelligent Infrastructure: Neural Networks, Wavelets, and Chaos Theory for Intelligent Transportation Systems and Smart Structures............................................41 Intelligent Network Video: Understanding Modern Video Surveillance Systems..................................41 Intelligent Systems: Modeling, Optimization, and Control......................................................................41 Intelligent Systems: Technology and Applications, Six Volume Set..................................................................41 Intelligent Transportation Systems: Planning, Operations, and Evaluation..................................................................41 Intelligent Video Surveillance: Systems and Technology....41 Interactive Graphics for Data Analysis: Principles and Examples...........................................................................27 Internet Networks: Wired, Wireless, and Optical Technologies.....................................................................61 Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems............................................61 Interpreting the CMMI (R): A Process Improvement Approach, Second Edition................................................74 Introducing Game Theory and its Applications.................50 Introduction to Combinatorics.........................................33 Introduction to Concurrency in Programming Languages...................................................48 Introduction to Cryptography with Mathematical Foundations and Computer Implementations...................24 Introduction to Data Technologies....................................28

Introduction to Grid Computing........................................8 Introduction to Image Processing and Analysis.................38 Introduction to Logic Design............................................16 Introduction to Machine Learning and Bioinformatics.....13 Introduction to Mathematical Logic, Fifth Edition.............5 Introduction to Mathematics of Satisfiability....................50 Introduction to Modern Cryptography: Principles and Protocols....................................................................25 Introduction to Network Security.....................................25 Introduction to Number Theory.......................................25 Introduction to Scheduling.................................................5 Introduction to Scientific Programming and Simulation Using R...........................................................48 Introduction to the Simulation of Dynamics using Simulink...................................................................8 Investigations in the Workplace.........................................67 IP Multimedia Subsystem (IMS) Handbook.....................61 IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement..........................67 ITIL Release Management: A Hands-on Guide................56 ITIL: Assessment, Planning, and Management.................53 ITIL: Service Management Implementation and Operation.........................................................................51

J/K

Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design................48 Kinetic Modelling in Systems Biology...............................13 Knowledge Discovery for Counterterrorism and Law Enforcement..............................................................28 Knowledge Discovery from Data Streams.........................28 Knowledge Discovery from Sensor Data...........................28 Knowledge Management in Public Health........................53 Knowledge Retention: Strategies and Solutions.................53

L/M

Leading IT Projects: The IT Manager’s Guide...................54 Lean Six Sigma Secrets for the CIO..................................54 Location Based Services Handbook: Applications, Technologies, and Security................................................61 Low-Power NoC for High-Performance SoC Design........16 Lyapunov-Based Control of Robotic Systems....................46 Machine Learning Algorithms for Spatial Data Analysis and Modelling.....................................................46 Machine Learning: An Algorithmic Perspective.................46 Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet...................71 Manage Software Testing...................................................74 Managing an Information Security and Privacy Awareness and Training Program, Second Edition.............67 Managing Web Projects.....................................................44 Marketing IT Products and Services..................................54 Mathematical Objects in C++: Computational Tools in A Unified Object-Oriented Approach..................48 Mathematics in Games, Sports, and Gambling: The Games People Play.....................................................33 Mechanics of User Identification and Authentication: Fundamentals of Identity Management.............................67 Meta-Analysis in Stata: An Updated Collection from the Stata Journal.......................................................28 Method Framework for Engineering System Architectures.........................................................75 Methods in Algorithmic Analysis........................................5 MicroComputed Tomography: Methodology and Applications...............................................................38

Microcontrollers: Fundamentals and Applications with PIC...........................................................................16 Microprocessors and Microcomputer-Based System Design...................................................................16 Microsoft Robotics Developer Studio Handbook: Intelligent Robot Simulation and Programming................42 Mobile Enterprise Transition and Management.................54 Mobile Opportunistic Networks: Architectures, Protocols and Applications................................................61 Mobile Telemedicine: A Computing and Networking Perspective.....................................................62 Model-Based Design for Embedded Systems.....................17 Modeling and Simulation of Systems Using MATLAB® and Simulink..................................................49 Modeling Software Behavior: A Craftsman’s Approach......75 Modeling Software with Finite State Machines: A Practical Approach.........................................................75 Models of Network Reliability: Analysis, Combinatorics, and Monte Carlo.....................................19 Modern Digital Halftoning, Second Edition.....................38 Multi-Agent Systems: Simulation and Applications...........46 Multidiciplinary Introduction to ICT Information Security.............................................................................20 Multimedia Content Encryption: Techniques and Applications......................................................................44 Multimedia Data Mining: A Systematic Introduction to Concepts and Theory....................................................28

N/O

Network Design for IP Convergence.................................62 Networking Systems Design and Development.................62 Next Generation of Data Mining......................................29 Numerical Linear Approximation in C................................8 Official (ISC)2® Guide to the CISSP® CBK®, Second Edition..................................................................70 Official (ISC)2® Guide to the CSSLP®..............................70 Official (ISC)2® Guide to the SSCP® CBK®, Second Edition..................................................................70 Official (ISC)2® Guide to the CISSP®-ISSAP® CBK®.......70 Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®, Second Edition..................................................................70 Oracle Embedded Programming and Application Development....................................................................52 Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition...........................54 Orthogonal Frequency Division Multiple Access Fundamentals and Applications........................................62

P

Parallel Algorithms..............................................................5 Parallel Computing in Quantum Chemistry.......................8 Passive, Active, and Digital Filters.....................................14 Pattern Recognition Algorithms for Data Mining.............29 Pearls of Discrete Mathematics..........................................33 Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges...................................................9 Performance Analysis of Queuing and Computer Networks.........................................................50 Perspectives in Concurrency..............................................50 Petascale Computing: Algorithms and Applications............5 PMP Exam: Practice Test and Study Guide, Seventh Edition.................................................................58 Power Electronics: Advanced Conversion Technologies.....16


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Q/R

Quality Assurance of Agent-Based and Self-Managed Systems.......................................................76 Quantum Computing: From Linear Algebra to Physical Realizations...........................................................9 Quantum Error Correction and Fault Tolerant Quantum Computing.......................................................20 Quantum Matrix..............................................................35 R Graphics........................................................................22 R Programming for Bioinformatics...................................13 Real Life Applications of Soft Computing.........................42 Real-Time Digital Signal Processing from MATLAB® to C with the TMS320C6x DSK...................20 Real-Time Graphics for Game Development....................22 Reconfigurable System Design and Verification.................20 Reinforcement Learning and Dynamic Programming Using Function Approximators.........................................46 Relational Data Clustering: Models, Algorithms, and Applications...............................................................29 Requirements Engineering for Software and Systems........76 RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations..................................................62 Robot Programming by Demonstration............................42

S

Science of Computing: A Problem-Solving Approach.........9 Science of Imaging, Second Edition..................................38 Scientific Data Management: Challenges, Technology, and Deployment...............................................................30 Scrum Software Development...........................................76 Secure and Resilient Software Development......................76 Secure Java: For Web Application Development................76 Securing System Information Flows..................................68 Security for Service Oriented Architectures.......................68 Security in an IPv6 Environment......................................62 Security in RFID and Sensor Networks.............................68 Security in Wireless Mesh Networks.................................68

Security of Mobile Communications.................................68 Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments...............69 Security Software Development: Assessing and Managing Security Risks...................................................76 Semisupervised Learning for Computational Linguistics...46 Sequential Logic: Analysis and Synthesis...........................20 Shape Classification and Analysis: Theory and Practice, Second Edition..................................................................39 SIM Guide to Enterprise Architecture...............................55 SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol.................................................63 Smart Clothing: Technology and Applications..................35 Social Computing and Virtual Communities....................44 Social Computing: A Data Mining Perspective.................29 Software Testing and Continuous Quality Improvement, Third Edition.............................................77 Software Testing as a Service..............................................77 Software Testing: A Craftsman’s Approach, Third Edition....................................................................77 Spatial Decision Support Systems......................................21 Standard for Enterprise Project Management....................59 Statistical Data Mining Using SAS Applications, Second Edition..................................................................29 Statistical Inference: The Minimum Distance Approach....47 Statistics in Human Genetics and Molecular Biology........14 Stochastic Modelling for Systems Biology.........................14 Strategic Data Warehousing: Achieving Alignment with Business....................................................................52 Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management........................42 Structural Bioinformatics: An Algorithmic Approach........14 Structuring Biological Systems: A Computer Modeling Approach..........................................................10 Subspace Learning of Neural Networks.............................47 Sustainable Enterprise Architecture...................................56 System Level Design with .Net Technology.......................21 System Modeling and Control with Resource-Oriented Petri Nets............................................49 Systems Biology and Bioinformatics: A Computational Approach..............................................14 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure..........................................17

T/U

Tale of Two Systems: Lean and Agile Software Development for Business Leaders......................55 Temporal Data Mining.....................................................30 Text Mining: Classification, Clustering, and Applications...............................................................30 Theory and Applications of Higher-Dimensional Hadamard Matrices...........................................................25 Top Ten Algorithms in Data Mining.................................30 Ubiquitous Computing Fundamentals..............................36 Ubiquitous Multimedia Computing.................................22 Understanding and Applying Cryptography and Data Security....................................................................25 Understanding Complex Datasets: Data Mining with Matrix Decompositions.....................................................30 Understanding Dynamics of Geographic Domains...........21 Universal Access Handbook..............................................36 Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications...........63

Using Artificial Intelligence in Chemistry and Biology: A Practical Guide................................................42

V/W

Vehicular Networks: From Theory to Practice...................63 Vein Pattern Recognition: A Privacy-Enhancing Biometric..........................................................................69 Verilog HDL: Digital Design and Modeling.....................16 Video, Speech, and Audio Signal Processing and Associated Standards..................................................18 VMware Certified Professional Test Prep...........................57 VMware ESX Essentials in the Virtual Data Center..........57 VoIP Handbook: Applications, Technologies, Reliability, and Security.....................................................63 Vulnerability Management................................................69 Wavelet Subdivision Methods: GEMS for Rendering Curves and Surfaces.........................................22 Web Wisdom: How to Evaluate and Create Information Quality on the Web, Second Edition.............36 Web-Based Outsourcing...................................................57 Wireless Crime and Forensic Investigation........................72 Wireless Quality of Service: Techniques, Standards, and Applications...............................................................63 Wireless Sensor Networks: Principles and Practice............63 Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing.......................................18

Title Index

Practical Guide to Data Structures and Algorithms using Java..........................................................6 Practical Guide to HIPAA Privacy and Security Compliance.........................................................67 Practical Guide to Information Systems Strategic Planning, Second Edition...................................54 Practical Guide to Security Assessments............................67 Practical Hacking Techniques and Countermeasures.........71 Principles of Speech Coding..............................................22 Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques..........................29 Process Algebra for Parallel and Distributed Processing.......9 Process Improvement and CMMI® for Systems and Software............................................................................75 Process Improvement with CMMI® v1.2 and ISO Standards...................................................................75 Process-Centric Architecture for IT Systems......................75 Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking....................72 Programming ArcObjects with VBA: A Task-Oriented Approach, Second Edition......................20 Project Management Recipes for Success...........................58 Project Management Theory and Practice.........................58 Project Manager’s Communication Toolkit.......................59 Protecting Intellectual Property: Why Competitors Take Your Intellectual Property-Because You Let Them!....68 Python for Bioinformatics.................................................13

81


For more information and a complete list A

Author Index

Abdelmalek; Nabih.............................................................8 Abney; Steven...................................................................46 Aboulhamid; El Mostapha................................................21 Ackleh; Azmy S...................................................................6 Adam; Azad......................................................................51 Adeli; Hojjat.....................................................................41 Affenzeller; Michael............................................................3 Ahmed; Ashfaque..............................................................77 Ahson; Syed A...........................................44, 60, 61, 63, 69 Akinci; Burcu....................................................................73 Alexander; Michael.............................................................9 Allen; Edward James...........................................................6 Allenby; Regnaud B.J.T.....................................................33 Allison; David B................................................................12 Alpert; Charles J..................................................................3 Aluru; Srinivas..................................................................13 Andreadis; Joanne.............................................................53 Andriole; Stephen J...........................................................52 Ang; Chee Siang................................................................44 Angelides; Marios C..........................................................43 Aoki-Kinoshita; Kiyoko F..................................................12 Arce; Gonzalo R................................................................38 Arkin; Ronald...................................................................40 Ashbaugh, CISSP; Douglas A...........................................76 Asyali; Musa H..................................................................38 Atallah; Mikhail J................................................................3 Atesmen; M. Kemal..........................................................58 Avanzi; Roberto.................................................................24 Awad; Mamoun................................................................51 Axis; Communications......................................................41 Ayers; John E....................................................................15

B

82

Babuska; Robert................................................................46 Bacik; Sandy.....................................................................64 Bader; David A...................................................................5 Bagui; Sikha......................................................................51 Baker; Emanuel.................................................................75 Banville; Debra L..............................................................26 Bassi; Sebastian.................................................................13 Basu; Ayanendranath........................................................47 Basu; Sugato......................................................................26 Beasley; T. Mark................................................................12 Beaver; Kevin....................................................................67 Beaver; Stephen S..............................................................57 Behal; Aman.....................................................................46 Beham; Andreas..................................................................3 Bender; Andreas . .............................................................12 Ben-Natan; Ron................................................................51 Bentley; William ..............................................................54 Bhandarkar; Jagdish..........................................................76 Bhansali; Neera.................................................................52 Bhargav; Abhay.................................................................76 Bhattacharyya; Shuvra S....................................................17 Billingsley; John................................................................45 Bisantz; Ann M.................................................................33 Blanton; Marina . ...............................................................3 Bonchi; Francesco.............................................................29 Boudriga; Noureddine......................................................68 Boukerche; Azzedine...........................................................3 Bozzano; Marco................................................................73

Brooks; Roger.....................................................................6 Brotby, CISM; W. Krag.....................................................66 Brown; Eric J....................................................................52 Brualdi; Richard A............................................................31 Bucher; Christian................................................................6 Bulusu; Lakshman.............................................................52 Burgess; Christopher.........................................................68 Burkholder; Earl F.............................................................17 Burkowski; Forbes J..........................................................14 Burnham; Keith J..............................................................40 Burns; Catherine M..........................................................33 Busoniu; Lucian................................................................46

C

Calinon; Sylvain................................................................42 Campisi; Patrizio...............................................................36 Canty; Morton J...............................................................37 Cao; Xiaojun.....................................................................63 Capell; Peter......................................................................75 Cartwright; Hugh.............................................................42 Casanova; Henri..................................................................5 Cassidy; Anita...................................................................54 Cavanagh; Joseph..................................................15, 16, 20 Cesar, Jr.; Roberto Marcond..............................................39 Chaira; Tamalika...............................................................37 Chaitanya; Manish............................................................72 Chang; Kang-Tsung..........................................................20 Chang; Wei-Tze................................................................42 Chao; Lee..........................................................................62 Chartrand; Gary..........................................................31, 32 Chaturvedi; Devendra K...................................................49 Chavan; Apala Lahiri........................................................35 Chee; Brian.......................................................................55 Chen; C.H........................................................................37 Chen; Hui.........................................................................62 Chen; Jake Y......................................................................25 Chen; Jiming....................................................................62 Chen; Jinjun.......................................................................7 Chen; Thomas M..............................................................60 Chen; Wai-Kai..................................................................14 Cheng; Jian.......................................................................47 Chi; Hung-Lin..................................................................42 Chiesa; Raoul....................................................................72 Cho; Gilsoo......................................................................35 Chorafas; Dimitris N........................................................67 Christensen; Henrik B......................................................74 Chui; Charles....................................................................22 Ciappi; Silvio....................................................................72 Cohen; Henri....................................................................24 Collette; Ron.....................................................................64 Conery; John S...................................................................9 Copeland; Rebecca............................................................60 Coppola; Marcello............................................................15 Costa; Luciano da Fona.....................................................39 Croker; Robert..................................................................35 Cudre-Mauroux; Philippe.................................................19 Cvetkovic; Dragos.............................................................31

D

Damerau; Fred J................................................................45 Dargie; Waltenegus...........................................................34 Dasgupta; Dipankar............................................................8

Datta; Sujay......................................................................13 Dattatreya; G.R.................................................................50 Davidson; Ian....................................................................26 Davis; Peter T....................................................................54 Dawson; Darren M...........................................................46 de Castro; Leandro Nunes.................................................49 De Furia; Guy L................................................................58 de Guise; Preston..............................................................56 De Schutter; Bart..............................................................46 Dedieu; HervĂŠ...................................................................60 Demin; Oleg.....................................................................13 Demirkaya; Omer.............................................................38 Denko; Mieso K..........................................................61, 63 deVilliers; Johan................................................................22 Dey; Dipak K......................................................................9 Dianat; Sohail A................................................................37 Ding; Jianguo....................................................................60 Dixon; Warren..................................................................46 Dobrushkin; Vladimir A. ...................................................5 Doche; Christophe............................................................24 Donoso; Yezid...................................................................62 Draghici; Sorin..................................................................11 Ducci; Stefania..................................................................72 Duckham; Matt................................................................19 Duffy; Vincent G..............................................................34 Dumke; Reiner.................................................................76 Dunham; Ken...................................................................71 Dustdar; Schahram...........................................................43

E/F

Earp; Richard....................................................................51 Edwards; Jode W...............................................................12 Edwards; Royce . ..............................................................73 Egiazarian; Karen..............................................................36 Eichelberger; Christopher N.............................................14 Eick; Bettina.......................................................................8 Elbirt; Adam J...................................................................25 Erickson; Martin...............................................................25 Erickson; Martin...............................................................33 Ernst; Damien...................................................................46 Falkenthal; Dietrich..........................................................75 Farkas; Edward B..............................................................44 Farrell-Vinay; Peter...........................................................74 Faulon; Jean-Loup.............................................................12 Feng; Gang.......................................................................39 Fernandez; George............................................................29 Ferrari; Elena.....................................................................29 Ferraro; Eugene F..............................................................67 Firesmith; Donald G.........................................................75 Fitzgerald; Todd................................................................69 Foreman; Park...................................................................69 Fournier; Greg..................................................................74 Franklin Jr.; Curtis............................................................55 Frey; Gerhard....................................................................24 Furht; Borko...............................................................44, 60 G Gaber; Mohamed..............................................................28 Gaitan; Frank....................................................................20 Gallegos; Frederick............................................................66 GAMA; JOAO..................................................................28 Gama; Joao.......................................................................28 Ganguly; Auroop R...........................................................28


Gardner; William................................................................9 Garland; Daniel J..............................................................34 Garmus; David.................................................................73 Garnier; Rowan.................................................................31 Garson; G. David..............................................................44 Gavrilovska; Ada...............................................................17 Ge; Shuzhi Sam.................................................................39 Geiser; Juergen....................................................................7 Gentile; Michael...............................................................64 Gentile; Skye.....................................................................64 Gentleman; Robert...........................................................13 George; John . ..................................................................33 Gertsbakh; Ilya B..............................................................19 Gharibzadeh; Shahriar .....................................................14 Ghosh; Samiran..................................................................9 Giachetti; Ronald E..........................................................48 Gogol-Dรถring; Andreas.....................................................10 Gohlmann; Hinrich..........................................................12 Goldberg; Larry................................................................51 Golden; Philip..................................................................60 Goldman; Kenneth J...........................................................6 Goldman; Ronald.............................................................22 Goldman; Sally A................................................................6 Gollery; Martin.................................................................13 Gonzalez; Teofilo F..............................................................4 Goodman; Jacob E............................................................32 Goryanin; Igor..................................................................13 Gould; Ronald J................................................................33 Grammatikakis; Miltos D.................................................15 Gray; Michael A..................................................................8 Green; Allen R..................................................................53 Gross; Jonathan L..............................................................32 Gu; Kai-Yuan....................................................................42 Guan; Ling........................................................................36 Guizani; Mohsen...............................................................50 Gunderson; David S.........................................................32 Guo; Yinni........................................................................33 Gurney; Kevin...................................................................42

H

Haas; Olivier C. L.............................................................40 Hammons; Charles B........................................................75 Han; Jiawei.................................................................27, 29 Han; Jiawei.......................................................................29 Han; JungHyun................................................................22 Hancock; Peter A..............................................................34 Hankerson; D.C...............................................................23 Hansche; Susan.................................................................70 Hardy; Darel W.................................................................23 Harris; Michael D. S.........................................................52 Harrison; Robert.................................................................7 Hasegawa; Yoshihiko.........................................................44 Hassanien; A.....................................................................21 Hausman; Kirk.................................................................56 Hayes; Caroline C.............................................................34 Held; Gilbert.....................................................................60 Henry; Kevin....................................................................70 Herold; Rebecca................................................................67 Herrmann; Debra S..........................................................64 Herron; David..................................................................52 Heubach; Silvia.................................................................31 Hill; David G....................................................................65 Hill; David J. ...................................................................39

Hill; Gerard M..................................................................57 Hinek; M. Jason................................................................24 Hitzler; Pascal ............................................................43, 45 Hoffman; Gary.................................................................23 Holland; O. Thomas.........................................................21 Holt; Derek F......................................................................8 Hopkin; V. David..............................................................34 Hornsby; Kathleen S.........................................................21 Howard; Dave...................................................................56 Howard; Patrick D............................................................69 Howard; Rick....................................................................71 Hristidis; Vagelis...............................................................27 Hsiung; Pao-Ann..............................................................20 Hsu; Lih-Hsing.................................................................19 Hu; Fei..............................................................................63 Hu; Honglin.....................................................................68 Huang; Chun-Hsian.........................................................20 Huang; Wen-Tao..............................................................47

I/J

Iba; Hitoshi.......................................................................44 Ibnkahla; Mohamed..........................................................59 Ichiye; Toshiko..................................................................12 Ilgenfritz; John..................................................................57 Ilgenfritz; Merle................................................................57 Ilyas; Mohammad.................................................61, 63, 69 Indurkhya; Nitin...............................................................45 Iniewski; Krzysztof............................................................61 Ioannou; Petros A..............................................................40 Iwanicki; Stasia..................................................................52 Iyenga; Sitharma...............................................................10 Jacko; Julie A.....................................................................35 Jacobsen; Krista S..............................................................60 Jacobson; Douglas.............................................................25 Jain; Mukesh.....................................................................73 Jamshidi; Mo....................................................................40 Janssen; Curtis L.................................................................8 Jha; Shankar......................................................................59 Jiang; J..............................................................................21 Jiang; Tao..........................................................................62 Jiang; Xiaomo...................................................................41 Jie; Wei...............................................................................7 Johnson; Kent A................................................................74 Johnson; Thomas A...........................................................71 Jonasson; Hans..................................................................58 Jones; Owen......................................................................48 Jorge; R.M. Natal . ...........................................................21 Jorgensen; Paul C........................................................75, 77 Joux; Antoine....................................................................23

K

Kairab; Sudhanshu............................................................67 Kala; Rahul.......................................................................42 Kanevski; Mikhail.............................................................46 Kang; Kyo C.....................................................................72 Kang; Shih-Chung............................................................42 Kanjilal; Joydip.................................................................72 Kappelman; Leon..............................................................55 Kargupta; Hillol................................................................29 Karimi; Hassan A..............................................................73 Karkare; Bageshri..............................................................73 Karwowski; Waldemar......................................................34 Katz; Jonathan..................................................................25

Kearfott; R. Baker...............................................................6 Kenett; Ron S...................................................................75 Keyes; Jessica...............................................................53, 54 Khan; Latifur....................................................................51 Khattak; Asad J.................................................................41 Khedker; Uday..................................................................73 Killmeyer; Jan...................................................................65 Kim; Jubok.......................................................................22 Kim; Jun Kyong................................................................16 Kim; Yoonjin.....................................................................49 Kipper; Gregory................................................................72 Kitsos; Paris.......................................................................68 Kliem, PMP; Ralph L.......................................................58 Klimberg; Ronald K..........................................................27 Korb; Kevin B...................................................................39 Korner; Christian..............................................................26 Kotiadis; Kathy...................................................................6 Kouns; Jake.......................................................................62 Krause Nozaki; Micki........................................................65 Krause; Micki....................................................................69 Kroetzsch; Markus............................................................43 Krumm; John....................................................................36 Kudyba; Stephan...............................................................27 Kulpa; Margaret K............................................................74 Kumar; Abhinit...................................................................8 Kumar; B. V......................................................................76 Kumar; Vipin..............................................................29, 30 Kupferschmid; Michael.....................................................47 Kwok; Yu-Kwong................................................................9

Author Index

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

L

Lad; Amol.........................................................................73 Lai; Choi-Hong................................................................37 Lamm; Ehud.....................................................................10 Landoll; Douglas J............................................................69 Lange; Tanja......................................................................24 Laplante; Phillip A............................................................76 Latimer IV; DeWitt T.......................................................75 Lattanze; Anthony J..........................................................72 Lau; Daniel L....................................................................38 Lavagno; Luciano..............................................................15 Lawrence; Kenneth D.......................................................27 Lee; Insup...........................................................................4 Lee; Kangmin....................................................................16 Legrand; Arnaud.................................................................5 Lei; Ye...............................................................................19 Leonard; D.A....................................................................23 Leondes; Cornelius T.........................................................41 Lesniak; L.........................................................................32 Leung; Joseph Y-T...............................................................4 Leung; Joseph Y-T...............................................................5 Levin; Ginger....................................................................53 Levine; Michael K.............................................................55 Lewis; William E...............................................................77 Li; Qing............................................................................22 Lian; Shiguo......................................................................44 Liao; Huafei......................................................................33 Liebowitz; Jay..............................................................42, 53 Lin; Cheng-Kuan..............................................................19 Lindell; Yehuda.................................................................25 Lindner; Charles C......................................................23, 31 Liu; Huan...................................................................26, 29 Locatelli; Riccardo.............................................................15

83


For more information and a complete list Lodaya; Kamal..................................................................50 Lonardi; Stefano................................................................25 Long; Bo...........................................................................29 Luo; Fang Lin...................................................................16

M

Author Index 84

Ma; Jianhua......................................................................63 Ma; Maode.......................................................................63 Ma; Yunqian.....................................................................41 Macaulay; Tyson...............................................................64 Madisetti; Vijay K.............................................................18 Magoules; Frederic..........................................................7, 8 Mahapatra; Rabi N...........................................................49 Maier; Mark W.................................................................48 Maillardet; Robert.............................................................48 Malek; William A................................................................8 Mallick; Bani K...................................................................9 Manley; Donna M............................................................53 Mansour; Toufik...............................................................31 Mao; Shiwen.....................................................................60 Marcella, Jr.; Albert...........................................................71 Marchand; Patrick.............................................................21 Marek; Victor W...............................................................50 Marshall; David................................................................55 Marshall; David................................................................57 Marsland; Stephen............................................................46 Martin; Grant...................................................................15 Martin; Grant...................................................................15 Martin; Grant...................................................................15 Martinez; Angel................................................................27 Martinez; Angel R...............................................................6 Martinez; Wendy L.......................................................6, 27 Martinez; Wendy L...........................................................27 Maruccia; Giuseppe..........................................................15 Mattson; Timothy G.........................................................48 Maus; Rex.........................................................................56 McCarty; Jason W.............................................................57 McCrory; Dave.................................................................55 McCumber; John..............................................................64 Mehta; Dinesh P..............................................................3, 4 Melnick; Jim.....................................................................71 Mencke; Steffen................................................................76 Mendelson; Elliott........................................................5, 50 Menendez; Doug..............................................................71 Menezes; Alfred J..............................................................24 Merendino; Tom...............................................................75 Merkow; Mark S...............................................................76 Mestha; Lalit K.................................................................37 Michailidis; George...........................................................13 Miller; Christopher A........................................................34 Miller; Dennis P................................................................57 Miller; Harvey J................................................................27 Mills; David L...................................................................18 Minoli; Daniel............................................................55, 62 Mitra; Pabitra....................................................................29 Mitra; Sushmita................................................................13 Mitsa; Theophano.............................................................30 Mjolsnes; Stig F.................................................................20 Mollin; Richard A.............................................................23 Morrow; Michael G..........................................................20 Mosterman; Pieter J..........................................................17 Motoda; Hiroshi...............................................................26

Motwani; Rajeev...............................................................29 Mouloua; Mustapha..........................................................34 Mukund; Madhavan.........................................................50 Murrell; Paul...............................................................22, 28 Murugesan; San................................................................43 Mutafelija; Boris................................................................75 Muuss, CPP; James P.........................................................70 Mylonas; Phivos................................................................43 Myrick; Conrad B.............................................................52

N

Nair; Premchand S............................................................48 Najarian; Kayvan...............................................................14 Najarian; Siamak...............................................................14 Nakahara; Mikio.................................................................9 Nanayakkara; Thrishantha................................................40 Narasimha; Madihally.......................................................22 Navet; Nicolas...................................................................17 Neelakandan; Sriram.........................................................73 Newman; Robert C...........................................................71 Nguyen; Hung T...............................................................40 Nguyen; Kim....................................................................24 Nguyen; Thi-Mai-Huong....................................................7 Nicholson; Ann E.............................................................39 Nicolescu; Gabriela...........................................................17 Nielsen; Ida M. B................................................................8 Nieplocha; Jarek..................................................................7 Nilsson; Fredrik.................................................................41 Ning; Huansheng..............................................................61 Nino; Fernando...................................................................8 Niu; Xin Xin.....................................................................25 Nussinov; Ruth.................................................................11

O

O’Brien; Eamonn A............................................................8 O’Donnell; TJ...................................................................11 Ogunfunmi; Tokunbo.......................................................22 Ohmi; Tetsuo......................................................................9 Ohsawa; Yukio..................................................................26 Oklobdzija; Vojin G..........................................................18 Olariu; Stephan...................................................................4 Olariu; Stephan.................................................................63 Omitaomu; Olufemi A.....................................................28 O’Rourke; Joseph..............................................................32 Osman; Onur...................................................................18 Ou; Jingzhao.....................................................................49

P

Page; Grier P......................................................................12 Pal; Sankar K.....................................................................29 Pallas-Areny; Ramon.........................................................16 Pan; Jie................................................................................8 Paneerselvam; Surekha......................................................45 Park; Chanseok.................................................................47 Park; Sooyong...................................................................72 Paul; Mano.......................................................................70 Paul; Topon Kumar...........................................................44 Peltier; Thomas R..............................................................66 Perkins; Theodore.............................................................13 Perry; Stuart William........................................................36 Petronis; Arturas................................................................11 Pevzner; Boris....................................................................56

Phelps; K.T.......................................................................23 Pieralisi; Lorenzo...............................................................15 Pohlman; Marlin B...........................................................54 Pozdnukhov; Alexi............................................................46 Prasanna; Viktor K............................................................49 Price; Sean.........................................................................68 Ptak; Carol A....................................................................53

Q/R

Qian; Gang.......................................................................41 Qidwai; Uvais...................................................................37 Rabern, CPP; David.........................................................70 Rafiquzzaman; Mohamed..................................................16 Raggad; Bel G...................................................................66 Raghavan; Lakshmikanth..................................................76 Raghavan; P.......................................................................73 Rajasekaran; K.S...............................................................57 Rajasekaran; Sanguthevar....................................................4 Ramakrishnan; Ganesh.....................................................45 Ransome; James F..............................................................55 Rasmussen; Craig E...........................................................48 Ray; Ajoy Kumar...............................................................37 Register; Andy H..............................................................47 Reif; John............................................................................4 Reilly; Cavan.....................................................................14 Reinert; Knut....................................................................10 Reynolds; Wade A.............................................................55 Richardson; Gary L...........................................................58 Richman; Fred..................................................................23 Rittinghouse; John W........................................................55 Robert; Yves........................................................................5 Roberts; Fred.....................................................................23 Robinson; Andrew............................................................48 Robinson; Stewart...............................................................6 Rodger; C.A................................................................23, 31 Rosen; Kenneth H............................................................32 Rotem; Doron...................................................................30 Rousseau; Frederic.............................................................21 Roy; Abhishek...................................................................60 Rudolph; Sebastian...........................................................43 Russ; J. Christian..............................................................38 Russ; John C.....................................................................38 Russac; Janet.....................................................................73 Ruvinsky; Anatoly.............................................................12

S

Sadayappan; Ponuswamy....................................................7 Sahami; Mehran................................................................30 Sahin; Ferat.......................................................................40 Sahoo; Prasanna K............................................................38 Salvendy; Gavriel..............................................................33 Santambrogio; Marco D. .................................................20 Sanyal; Amitabha..............................................................73 Saouma; Victor.................................................................19 Sapatnekar; Sachin S...........................................................3 Savoy; April.......................................................................33 Sawitzki; Günther.............................................................47 Saxby; Graham..................................................................38 Saxena; Navrati.................................................................60 Schaefer; G........................................................................21 Scharfe; Henrik.................................................................45 Scheffer; Louis..................................................................15


Scheinerman; Edward.......................................................47 Schieber; Richard A...........................................................53 Schiel; James.....................................................................74 Schmidt; Bertil..................................................................11 Schmuki; Ruedi................................................................75 Schragenheim; Eli.............................................................53 Schreiber; Gideon.............................................................11 Schulz; Greg......................................................................56 Sears; Andrew...................................................................35 Sen; Arunabha..................................................................29 Senft; Sandra.....................................................................66 Seshaiyer; Padmanabhan.....................................................6 Seshan; Parameswaran.......................................................75 Shankar; Priti....................................................................18 Shapira; Yair......................................................................48 Sharma; Gaurav................................................................37 Sharma; Varum.................................................................57 Sharma; Vivek...................................................................57 Shea; Christopher M.........................................................44 Sheng; Quan Z.................................................................43 Sherif; Mostafa Hashem....................................................74 Shi; Yun Q........................................................................38 Shih; Jerry.........................................................................61 Shih; Timothy K...............................................................22 Shin; Yung C.....................................................................41 Shioya; Hiroyuki...............................................................47 Shmerko; Vlad P................................................................16 Shoshani; Arie...................................................................30 Shpungin; Yoseph..............................................................19 Shuja; Ahmad K................................................................51 Shukla; Anupam...............................................................42 Silvers; Fon........................................................................50 Simonot-Lion; Francoise...................................................17 Sivaselvan; M.V.................................................................19 Skillicorn; David.........................................................28, 30 Slomson; Alan...................................................................33 Solka; Jeffrey.....................................................................27 Son; Sang H........................................................................4 Song; Lingyang.................................................................62 Sottile; Matthew J.............................................................48 Spehn; Eva M....................................................................26 Spivey; Mark D.................................................................71 Srikant; Y.N......................................................................18 Srinivas; J..........................................................................76 Srinivasan; Ashwin ...........................................................45 Sriram; Sundararajan.........................................................17 Srivastava; Ashok...............................................................30 Stafford; Matthew ............................................................61 Stanoyevitch; Alexander....................................................24 Stephanidis; Constantine..................................................36 Sterne; Jonathan................................................................28 Stinson; Douglas R...........................................................24 Stock; Stuart R..................................................................38 Stromberg; Harvey............................................................75 Sugumaran; Ramanathan..................................................21 Sugumaran; Vijayan.....................................................21,72 Sumathi; S........................................................................45 Sun; Huifang.....................................................................38 Sung; Wing-Kin..................................................................9

T

Talloen; Willem................................................................12 Talukder; Asoke K.............................................................72

Tan; Kiat-An.......................................................................8 Tate; Marsha Ann..............................................................36 Tavares; Jo達o Manuel R.S. . ..............................................21 Taylor; John......................................................................31 Tesman; Barry ..................................................................23 Theus; Martin...................................................................27 Thuraisingham; Bhavani.............................................51, 68 Timonin; Vadim...............................................................46 Tipton; Harold F.........................................................65, 70 Tiwari; Ritu......................................................................42 Todorov; Dobromir...........................................................67 Torgo; Luis........................................................................27 Trinckes, Jr.; John J...........................................................65 Tucker; Allen B.................................................................49 Tyler; Christopher W.........................................................45

U/V

Ucan; Osman Nuri...........................................................18 Uhrmacher; Adelinde M...................................................46 Umbaugh; Scott E.............................................................36 Unger; Ron.......................................................................10 Unhelkar; Bhuvan.............................................................54 Urbanek; Simon................................................................27 Valdes-Perez; Fernando E..................................................16 Valiente; Gabriel...............................................................10 Van Der Zee; Durk-Jouke...................................................6 van Oorschot; Paul C........................................................24 van Oosterom; Peter..........................................................43 Van Sickle; Jan..................................................................43 Vanstone; Scott A..............................................................24 Vatsavai; Ranga Raju.........................................................28 Vazzana; Anthony.............................................................25 Vercauteren; Frederik........................................................24 Villafiorita; Adolfo............................................................73 Vincenzi; Dennis A...........................................................34 Vivien; Frederic...................................................................5 von Halle; Barbara............................................................51

W

Wagner; Ferdinand............................................................75 Wagner; Stefan....................................................................3 Wagner; Thomas...............................................................75 Wagstaff, Jr.; Samuel S......................................................23 Wagstaff; Kiri....................................................................26 Wainer; Gabriel A.............................................................15 Walker; Carol L.................................................................23 Walker; Elbert A................................................................40 Wall; J.R...........................................................................23 Wallace; Manolis...............................................................43 Wallis; W.D.......................................................................33 Wang; Cong......................................................................39 Wang; Edwin....................................................................10 Wang; Lei..........................................................................51 Wang; Lizhe........................................................................7 Wang; Meiqing ................................................................37 Wang; Sun-Chong............................................................11 Ward; Leroy......................................................................58 Washington; Lawrence C..................................................24 Watson; Bruce W................................................................4 Weigle; Michele C.............................................................63 Weintrit; Adam.................................................................40 Welch; Thad B..................................................................20 Westphal; Christopher......................................................26

Weyns; Danny..................................................................46 Whittle; Ralph..................................................................52 Wilkinson; Barry.................................................................7 Wilkinson; Darren J..........................................................14 Wille; Cornelius................................................................76 Willett; Keith D................................................................65 Wilson; Chuck..................................................................69 Winkler; Stephan................................................................3 Wise; John A. . .................................................................34 Wolstenholme; Peter.........................................................75 Wong; Hau San.................................................................36 Worboys; Michael.............................................................19 Wright; Cameron H.G......................................................20 Wu; Naiqi.........................................................................49 Wu; Xindong....................................................................30 Wuthnow; Mark...............................................................61

X/Y/Z

Xian; Bin...........................................................................46 Xiao; Yang.....................................................................6, 62 Xu; Cheng Qing...............................................................25 Xu; Chengying..................................................................41 Yada; Katsutoshi................................................................26 Yan; Lu.............................................................................61 Yang; Laurence T.............................................60, 61, 62, 63 Yang; Yi Xian....................................................................25 Yanushkevich; Svetlana N.................................................16 Yap; Kim-Hui...................................................................36 Yarberry, Jr.; William A.....................................................52 Ye; Hong...........................................................................16 Ye; Shui Qing....................................................................10 Yellen; Jay..........................................................................32 Yi; Zhang..........................................................................47 Yona; Golan......................................................................11 Yoo; Hoi-Jun.....................................................................16 Yu; Jian.............................................................................43 Yu; Lei.................................................................................7 Yu; Philip S.......................................................................29 Yuan; May.........................................................................21 Zambruski; Michael S.......................................................59 Zaphiris; Panayiotis...........................................................44 Zhang; Jianping................................................................29 Zhang; Ping................................................................31, 32 Zhang; Ruofei...................................................................28 Zhang; Yan..........................................50, 60, 61, 62, 63, 68 Zhang; Zhongfei...............................................................28 Zhang; Zhongfei...............................................................29 Zheng; Jun........................................................................68 Zhou; Jiliu........................................................................47 Zhou; MengChu...............................................................49 Zlatanova; Sisi...................................................................43 Zomaya; Albert Y................................................................4 Zufferey; Jean-Christophe.................................................39 Zurawski; Richard.............................................................17

Author Index

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

85


plc

CRC Press • Taylor & Francis • Chapman & Hall/CRC • Auerbach Publications • Productivity Press

Visit us online at

www.crcpress.com

In the Americas Sales Office - CRC Press 6000 Broken Sound Parkway, NW, Suite 300, Boca Raton, FL 33487, U.S.A. Within the Continental USA - Tel: 800-272-7737 • Fax: 800-374-3401 • orders@taylorandfrancis.com Outside the Continental USA - Tel: 561-994-0555 • Fax: 561-361-6018 • international.orders@taylorandfrancis.com

Senior Vice President of Sales

Dennis Weiss Tel: 561-998-2510 Fax: 561-998-2580 e-mail: dennis.weiss@taylorandfrancis.com

Customer Service

Sales Agents

Angela Williams Tel: 800-272-7737 ext. 6091 Fax: 800-374-3401 e-mail: angela.williams@taylorandfrancis.com

Michael Dulisse Tel: 561-998-2582 Fax: 561-361-6049 e-mail: michael.dulisse@taylorandfrancis.com

Academic Sales

Premium/Custom Sales

Retail Bookstores

Library/Medical Wholesalers

Subsidiary Rights Sales

Ryan Prior Tel: 561-998-2516 Fax: 561-361-6049 e-mail: ryan.prior@taylorandfrancis.com

Susie Carlisle Tel: 561-998-2538 Fax: 561-361-6049 e-mail: susie.carlisle@taylorandfrancis.com

Evelyn Elias Tel: 561-361-6010 Fax: 561-361-6049 e-mail: evelyn.elias@taylorandfrancis.com

Evelyn Elias Tel: 561-361-6010 Fax: 561-361-6049 e-mail: evelyn.elias@taylorandfrancis.com

Jennifer Strong Tel: 212-216-7851 Fax: 212-244-1563 e-mail: jennifer.strong@taylorandfrancis.com

Milton Park Sales Office - Taylor & Francis Group (Books Ltd) 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN, UK

Group Sales Director

Academic Representatives (UK)

China Liaison Office

Customer Services

Christoph Chesher Tel: +44 (0) 20 7017 6194 Fax: +44 (0) 20 7017 6748 e-mail: christoph.chesher@tandf.co.uk

Tim Page Higher Education Sales Manager Mobile: 07824 690646 e-mail: tim.page@tandf.co.uk

Book orders should be addressed to the appropriate overseas agent or the Customer Service Department at Bookpoint:

International Sales Director

International Enquiries

Graham Crossley Tel: +44 (0) 20 7017 6048 Fax: +44 (0) 20 7017 6748 e-mail: graham.crossley@tandf.co.uk

Kate Pearce International Sales Support Manager (Books) Tel: +44 (0) 20 7017 6053 Fax: +44 (0) 20 7017 6748 e-mail: kate.pearce@tandf.co.uk

Yan Pei Manager Taylor & Francis Room 523 Resource Building No. 151 North Street Zhongguancun Beijing, China 100080 P.O. Box: 8762 Tel/Fax: +86 (10) 58876523 e-mail: yanpei@tandf.co.sg

Foreign Rights

Standing Orders

Head of UK Sales Nick Perry Tel: +44 (0) 20 7017 6132 Fax: +44 (0) 20 7017 6732 e-mail: nick.perry@tandf.co.uk

Corporate and Institutional Sales Alfred Lea Tel: +44 (0) 20 7017 6273 Fax: +44 (0) 20 7017 6732 e-mail: cis@tandf.co.uk

86

Latin American Sales

UK Sales Support Executive Judith Cavell Tel: +44 (0) 20 7017 6191 Fax: +44 (0) 20 7017 6732 e-mail: judith.cavell@tandf.co.uk

Central and South America and Mexico Michael Dulisse Sales Office, Boca Raton, FL Taylor & Francis 6000 Broken Sound Parkway, NW, Suite 300, Boca Raton, FL 33487, USA Tel: 561-998-2582 Fax: 561-361-6049 e-mail: michael.dulisse@taylorandfrancis.com Ethan E. Atkin Cranbury International LLC 7 Clarendon Ave, Suite 2 Montpelier, VT 05602, USA Tel: +1 802 223 6565 Fax: +1 802 223 6824 e-mail: eatkin@cranburyinternational.com

European and Japanese Enquiries Lucy Astone International Sales Support Coordinator Tel: +44 (0) 20 7017 6149 Fax: +44 (0) 20 7017 6748 e-mail: lucy.astone@tandf.co.uk

South Asian, Middle Eastern and African Enquiries

Adele Parker e-mail: adele.parker@tandf.co.uk

Exhibitions Katie Gilbert Exhibitions Manager Tel: 020 7017 6310 e-mail: katie.gilbert@tandf.co.uk

Taylor & Francis Bookpoint 130 Milton Park, Abingdon, Oxon OX14 4SB Tel: +44 (0) 1235 400 524 Fax: +44 (0) 1235 400 525 e-mail (UK): uktrade@tandf.co.uk e-mail (international): international@tandf.co.uk If you would like to receive books on our improved preselective standing order system, or if you would like to have further information about this service, please contact your area manager or Customer Services Department.

Reanna Young International Sales Support Coordinator Tel: +44 (0) 20 7017 6114 Fax: +44 (0) 20 7017 6748 e-mail: reanna.young@tandf.co.uk

Caribbean and The West Indies

New Zealand

Middle East and North Africa

Jasmina Basic Area Sales Manager Milton Park Sales Office Tel: +44 (0) 20 7017 6187 Fax: +44 (0) 20 7017 6748 e-mail: jasmina.basic@tandf.co.uk

Macmillan Publishers NZ Ltd Victoria Johnson 6 Ride Way, Albany, Auckland, NZ Tel: +64 9414 0350 Fax: +64 9414 0357 e-mail: vicki@macmillan.co.nz

Australasia

Australia and New Zealand

Jasmina Basic Area Sales Manager – Middle East and Africa Milton Park Sales Office Tel: +44 (0) 20 7017 6187 Fax: +44 (0) 20 7017 6748 e-mail: jasmina.basic@tandf.co.uk Zoe Kaviani IPS (Middle East) Ltd P.O. Box 27533 Dubai, UAE Tel: +971 4 282 8801 Fax: +971 4 282 8804 e-mail: itpme@emirates.net.ae Website: http://www.ipsme.com

Kate Pearce Milton Park Sales Office Tel: +44 (0) 20 7017 6053 Fax: +44 (0) 20 7017 6748 e-mail: kate.pearce@tandf.co.uk

Australia Palgrave Macmillan Level 1, 15-19 Claremont Street, South Yarra Melbourne, Vic 3141, Australia Tel: +61 3 9825 1111 Fax: +61 3 9825 1010 e-mail: palgrave@macmillan.com.au www.palgravemacmillan.com.au

CRC Press and Marcel Dekker only Libraries may wish to order from their local bookseller, Palgrave Macmillan or DA Information Services Pty Ltd 648 Whitehorse Road, Mitcham Victoria, Australia Tel: +61 3 9210 7804 Fax: +61 3 9210 7788 www.dadirect.com.au

Australia Europa Publications (non-exclusive) James Bennett 3 Narabang Way, Belrose, NSW 2085 Australia Tel: +02 9986 7064 Fax: +02 9986 7030 www.bennett.com.au

Rest of Africa Jasmina Basic Area Sales Manager – Middle East and Africa Milton Park Sales Office


Korea

Chinke Ojiji Publishers Support Services Ltd Plot 2 Adewunmi Estate Oregun Road (Near First Bank Oregun) PO Box 9270, Ikeja, Lagos State Tel: +234 1 774 1073 Fax: +234 1 493 0419 e-mail: chinkeojiji@yahoo.co.uk

Se-Yung Jun ICK (Information & Culture Korea) 473-19 Seokyo-dong, Mapo-ku Seoul, Korea 121-842 Tel: +82 2 3141-4791 Fax: +82 2 3141-7733 e-mail: cs.ick@ick.co.kr

Botswana

For all Taylor & Francis Group imprints please order from our Singapore Sales Office Singapore Sales Office Taylor & Francis Asia Pacific 240 MacPherson Road #08-01 Pines Industrial Building Singapore 348574 Tel: +65 6741 5166 Fax: +65 6742 9356 e-mail: sales@tandf.com.sg

Arthur Oageng Book Promotions/Horizon Books Botswana Gaborone International Finance Park Plot 113-114, Unit 33, Kgale Mews 2, Suite 3 Gaborone, Botswana Tel: +267 393 1194 Fax: +267 392 4908 e-mail: arthur.oageng@online.co.bw

South Africa, Namibia, Lesotho and Swaziland Michelle Symington Book Promotions Ltd BMD Office Park, 108 De Waal Road Diep River, 7800 Cape Town South Africa Tel: +27 21 707 5700 General Fax: +27 21 707 5795 Orders Fax: +27 21 707 5794 e-mail: msymingtom@bookpro.co.za

South Asia Ryan Cooper Area Sales Manager Milton Park Sales Office Tel: +44 (0) 20 7017 6113 Fax: +44 (0) 20 7017 6748 e-mail: ryan.cooper@tandf.co.uk

India Taylor & Francis Books India Pvt Ltd. 912 Tolstoy House 15-17, Tolstoy Marg New Delhi 110 001 Tel: +91 (0) 11 2371 2131 +91 (0) 11 2335 1453 Fax: +91 (0) 11 2371 2132 e-mail: tandfindia@airtelbroadband.in

Pakistan M. Anwer Iqbal Book Bird Mian Chambers, 3 Temple Road PO Box 518, Lahore, Pakistan Tel: +92 42 636 7275 Fax: +92 42 636 1370 e-mail: bookbird@brain.net.pk

Sri Lanka Nirosha Saravanapavan e-mail: niroshas@sltnet.lk Mobile: 0094 714 750911

Japan Hans Van Ess Book Sales and Marketing Executive Taylor & Francis Group 7F Koshin Bldg. 2-23-4 Kanda-Jimbocho Chiyoda, Tokyo 101-0051, Japan Tel: +81 (0) 3 5848 7061 Mobile: +81 (0) 80 5426 3552 e-mail: hans.vaness@informa.com United Publishers Services Limited 1-32-5 Higashi-shinagawa Shinagawa-ku, Tokyo 140-0002 Tel: +81 (0) 3 5479 7251 Fax: +81 (0) 3 5479 7307 e-mail: info@ups.co.jp Editorial Office Takahiko Kaneko Edition Synapse Yamaguchi Bldg. 3F 2-8-5 Uchikanda Chiyoda-Ku, Tokyo 101 0047, Japan Tel: +81 (0) 3 5296 9186 Fax: +81 (0) 3 3252 1822 e-mail: edsynapse@nifty.ne.jp

East and Southeast Asia

Malaysia and Brunei

David Yeong General Manager Taylor & Francis Publishing Services Taylor & Francis Asia Pacific No. 23-2, Jalan PJS 8/18 Dataran Mentari 46150 Petaling Jaya Selangor Darul Ehsan Malaysia Tel: +60 (3) 5630 1361 Fax: +60 (3) 5630 1732 Mobile: +60 (0)16 331 9912 e-mail: david.yeong@tandf.com.sg

Singapore, Philippines and Indonesia

Francis Chua, Sales Manager Singapore Sales Office e-mail: francis.chua@tandf.com.sg

Vietnam

Jeffrey Lim, Books Sales Director Singapore Sales Office e-mail: jeffrey.lim@tandf.com.sg

Hong Kong

Taylor & Francis Asia Pacific Tel: +852 91796613 Jeffrey Lim, Books Sales Director e-mail: jeffrey.lim@tandf.com.sg Jolly Chan, Account Manager e-mail: jolly.chan@tandf.com.sg

Thailand

Taylor & Francis Asia Pacific Tel: +66 (2) 6427954-6 ext. 406 Fax: +66 (2) 6427677 Jeffrey Lim, Books Sales Director e-mail: jeffrey.lim@tandf.com.sg Nonglak Sawaithong, Sales Executive e-mail: s.nonglak@tandf.com.sg

Taiwan

Taylor & Francis Asia Pacific Tel: +886 (2) 2578 6106 ext.125 Fax: +886 (2) 2578 6507 Jeffrey Lim, Books Sales Director e-mail: jeffrey.lim@tandf.com.sg Raymond Hsu, Sales Executive e-mail: raymond.hsu@tandf.com.sg

China

Taylor & Francis Asia Pacific Room 903, Resource Building No.151 North Street Zhongguancun, Beijing, China 100080 Tel/Fax: +86 (10) 58876903 Jeffrey Lim, Books Sales Director e-mail: jeffrey.lim@tandf.com.sg Cynthia Ji, Sales & Marketing Executive e-mail: cynthia.ji@tandf.com.sg

Shanghai Region

Chris Ye, Senior Sales Executive Tel: +86 135 64618686 e-mail: chris.ye@tandf.com.sg

Israel and the Palestinian Territories Ryan Cooper Area Sales Manager Milton Park Sales Office Tel: +44 (0) 20 7017 6113 Fax: +44 (0) 20 7017 6748 e-mail: ryan.cooper@tandf.co.uk and Rodney Franklin Franklin’s International PO BOX 3772 7, Tel Aviv 61376, Israel Tel: +972 356 00724 Fax: +972 356 00479 e-mail: rodneyf@netvision.net.il

Europe Peter Havinga European Sales Manager A. Hofmanweg 5a, 2031 BH Haarlem The Netherlands Tel: +31 (0) 23 750 5730 Fax: +31 (0) 23 750 5701 Mobile: +31 (0) 6 515 69560 e-mail: peter.havinga@tandf.co.uk

Belgium, The Netherlands, France and Luxembourg Liza Walraven Sales Representative A. Hofmanweg 5a, 2031 BH Haarlem The Netherlands Tel: 0031 (0) 23 750 5731 Fax: 0031 (0) 23 750 5701 Mobile: 0031 (0) 6 238 49668 e-mail: liza.walraven@informa.com

England and Wales London (East, Northwest, North) and Eastern England Bob Davis Senior Area Representative Mobile: 07889 263 856 Fax: 01621 819 833 e-mail: bob.davis@tandf.co.uk

Southern England Daphne Edwards Area Representative Mobile: 07802 536 233 Tel: +44 (0) 20 7017 6259 e-mail: daphne.edwards@tandf.co.uk

Oxfordshire, West Midlands and South Wales John Blake Area Representative Mobile: 07889 263 857 Fax: 01242 228 691 e-mail: john.blake@tandf.co.uk

North and Northwest England Lucy Greaves Area Representative Mobile: 07860 633156 Fax: 01663 746682 e-mail: lucy.greaves@tandf.co.uk

London (EC, SE, SW, W and WC) Charlotte Westgate Area Representative Mobile: 07917 648040 e-mail: charlotte.westgate@tandf.co.uk

Greece

Scotland and North of England

Ryan Cooper Area Sales Manager Milton Park Sales Office Tel: +44 (0) 20 7017 6113 Fax: +44 (0) 20 7017 6748 e-mail: ryan.cooper@tandf.co.uk

Bob Fairbrother Area Representative Mobile: +44 (0) 7825 748476 E-mail: bob.fairbrother@tandf.co.uk Nick Pepper Area Representative Tel: 01434 250331 Mobile: 07825 748476

Nordic Countries Keith Gray Sales Representative Taylor & Francis Group c/o IBC Euroforum Blegdamsvej 104A, 2100 Copenhagen ø Denmark Tel: +45 4195 1428 Mobile: +45 6064 8041 e-mail: keith.gray@informa.com

Germany, Austria and Switzerland Eva Kneissl Area Sales Manager

(Maternity leave cover for Gabriela Mauch)

Mobile: +49 (0) 173905 9469 e-mail: eva.kneissl@informa.com

Spain, Portugal, and Italy Philip Veysey Area Sales Manager Príncipe de Vergara 109, 28002 Madrid, Spain Tel: +34 91 700 0688 Fax: +34 91 141 2304 Mobile: +34 68 777 3678 e-mail: philip.veysey@informa.com

Eastern Europe Marek Lewinson (Humanities and Social Sciences) Bohaterewicza 3/45 03-982 Warsaw, Poland Tel/fax: +48 (0) 22 6714819 Mobile: +48 (0) 602 707 037 e-mail: mlewinso@it.com.pl Radek Janousek (Science and Technology) Pod Nouzovem 972/21 197 00 Prague, Czech Republic Tel: +42 (0) 28 658 49888 Mobile: +42 (0) 602294014 e-mail: radek@mareklewinson.com

Sales Agents

Nigeria

Ireland and Northern Ireland Conor Graham / Michael Darcy Brookside Publishing Services 2 Brookside, Dundrum Road, Dublin 14 Tel: 00 353 1 298 9937 Fax: 00 353 1 298 7912 e-mail: sales@brookside.ie

Library Supply Nigel Berkeley Library Supply and London Key Accounts Manager Mobile: 07795 968206 e-mail: nigel.berkeley@tandf.co.uk

Online Retailers Rod Abraham Assistant UK Sales Manager Mobile: 07860 380 814 Fax: 01372 273 744 e-mail: rod.abraham@tandf.co.uk

87


ORDER FORM 1

Order Form 88

2

BILL TO

SHIP TO (Fill in only if different than box 1)

Name_____________________________________________________________

Name_____________________________________________________________

Title______________________________________________________________

Title______________________________________________________________

Organization________________________________________________________

Organization________________________________________________________

Address___________________________________________________________

Address___________________________________________________________

City________________________________State/Province___________________

City________________________________State/Province___________________

Country__________________________ Zip/Postal Code____________________

Country__________________________ Zip/Postal Code____________________

Daytime Phone (

Daytime Phone (

)_____________________ Fax ( (Required to Process Order)

)__________________

e-Mail Address______________________________________________________

3

)_____________________ Fax (

)__________________

e-Mail Address______________________________________________________

Please send me the following: ISBN NO.

4

QUANTITY

TITLE

PRICE EACH

TOTAL PRICE

Subtotal

Method of Payment

Tax o I’ve enclosed check #_____________________ payable to CRC Press LLC

Shipping Charges

o Bill My Company (Purchase Order Attached) o Please Charge to: o MasterCard

o VISA

Order Total

o American Express

CARD NO.

Exp. Date MO.

Sec. Code YR.

Signature _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Phone Number _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ (Signature and Phone Number Required to Process Order)

SHIPPING AND HANDLING Region Delivery Time First Title Additional Title For expedited USA (continental) 3-5 days $4.99 $1.99 shipping, Alaska, Hawaii, Puerto Rico 4-5 days $14.99 $2.99 call your nearest Canada 3-7 days $7.99 $1.99 CRC PRESS Latin America varies by region $9.99 $2.99 office Rest of the World varies by region call for pricing

Ordering Locations In the Americas: Rest of the World: CRC PRESS CRC PRESS / BOOKPOINT

PO Box 409267 Atlanta, GA 30384-9267 Tel: 1-800-634-7064 Fax: 1-800-248-4724 From Outside the Continental U.S. Tel: 1-561-994-0555 Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

130 Milton Park Abingdon, Oxon, OX14 4SB, UK Tel: +44 (0) 1235 400 524 Fax: +44 (0) 1235 400 525 e-mail: (UK): uk.trade@tandf.co.uk (Int’l): international@tandf.co.uk

Corporate Offices CRC PRESS UK CRC PRESS

6000 Broken Sound Parkway, NW, Suite 300 Albert House, 4th floor Boca Raton, FL 33487, USA 1 - 4 Singer Street Tel: 1-800-272-7737 London EC2A 4BQ Fax: 1-800-374-3401 UK From Outside the Continental U.S. Tel: 44 (0) 20 7017 6000 Tel: 1-561-994-0555 Fax: 44 (0) 20 7017 6747 Fax: 1-561-361-6018 e-mail: enquiries@crcpress.com e-mail: orders@taylorandfrancis.com

www.crcpress.com


The following subject catalogs are available from CRC Press. You can view them online at the URLs listed or contact your local sales representative for copies.

Taylor & Francis Group

Agricultural and Life Sciences Catalog no. CATAGL • ISBN: 978-0-8493-3864-9 http://issuu.com/CRCPress/docs/annualcat_aglife

Biomedical Science and Engineering

Pioneers in Publishing

Catalog no. CATBMS • ISBN: 978-0-8493-3866-3 http://issuu.com/CRCPress/docs/annualcat_biomed

Business, Management, and Public Administration Catalog no. CATBMP • ISBN: 978-0-8493-9175-0 http://issuu.com/CRCPress/docs/annualcat_bus_pub_admin

Chemistry and Chemical Engineering Catalog no. CATSPC • ISBN: 978-0-8493-3867-0

Grounded in a century-long tradition of publishing excellence, CRC Press Taylor & Francis continues to provide our world with the resources needed to promote human progress and meet the challenges that might stand in the way of that progress. Producers of printed handbooks, textbooks, tutorials, and field guides, as well as e-books, online libraries, and interactive databases, CRC Press is a full service print and electronic publisher committed to recording the accomplishments and supporting the work of the world’s leading practitioners and researchers.

http://issuu.com/CRCPress/docs/annualcat_chem

Civil and Mechanical Engineering Catalog no. CATMCE • ISBN: 978-0-8493-3880-9 http://issuu.com/CRCPress/docs/annualcat_civil_mech_eng

Computer Science and Information Technology Catalog no. CATITB • ISBN: 978-0-8493-3878-6 http://issuu.com/CRCPress/docs/annualcat_compsci_it

Electrical Engineering Catalog no. CATEEC • ISBN: 978-0-8493-3869-4 http://issuu.com/CRCPress/docs/annualcat_elec_eng

Environmental Science and Engineering

It’s no coincidence that many of the issues in today’s headlines read like a list of CRC new releases… from five or even ten years ago. Just as it’s never been a coincidence that the fields of inquiry our authors pursue today often bear the greatest fruit tomorrow. Whether its advancing agriculture yield, improving infrastructure, developing clean and green alternatives, retrofitting industry, reorganizing healthcare, securing our homeland, streamlining public administration, or defining just who we are and where we are going, CRC has the resources and references to turn students into professionals and leaders, researchers into innovators and pioneers. In the classroom, in the laboratory, and out in the field, wherever challenges are being met by research, ingenuity, and determination, you will find those who create and rely on the authoritative content that is the power of CRC Press.

Catalog no. CATEVE • ISBN: 978-0-8493-3874-8 http://issuu.com/CRCPress/docs/annualcat_envsci

Food Science and Nutrition Catalog no. CATFSN • ISBN: 978-0-8493-3876-2 http://issuu.com/CRCPress/docs/annualcat_foodsci

Forensic Science, Law Enforcement, and Homeland Security Catalog no. CATFSC • ISBN: 978-0-8493-3877-9

INVITATION TO AUTHORS If you have an idea for a book or a manuscript in progress relevant to any scientific, technical, or business discipline, CRC Press is interested. Please contact:

John Lavender, Senior VP Publishing 561-994-0555 • john.lavender@taylorandfrancis.com

http://issuu.com/CRCPress/docs/annualcat_forensics

Human Factors and Ergonomics / Industrial Engineering and Manufacturing

To order, visit us online at

Catalog no. CATHFI • ISBN: 978-0-8493-3875-5 http://issuu.com/CRCPress/docs/annualcat_erg_indust_eng

Mathematics and Statistics Catalog no. CATMTS • ISBN: 978-0-8493-3879-3 http://issuu.com/CRCPress/docs/annualcat_math_stats

Nanoscience and Technology / CleanTech Catalog no. CATMSN • ISBN: 978-0-8493-3885-4 http://issuu.com/CRCPress/docs/annualcat_nano_clean_tech

Physics / Materials Science Catalog no. CATPHY • ISBN: 978-0-8493-9176-7 http://issuu.com/CRCPress/docs/annualcat_physics_matsci

Or contact us via the following numbers: North & South America: From inside the US: Phone: 1-800-272-7737 Fax: 1-800-374-3401 Outside the US: Phone: 1-561-994-0555 Fax: 1-561-361-6018 Rest of the World Bookpoint Tel: +44 (0)1235 400400 • Fax: +44 (0)1235 400401


• • • • •

All netBASE ebook Content on One Platform Pay-per-view Chapters Individual eBook Purchases Annual and Perpetual Subscription Options Available Improved Search and Functionality

Free Trials Available for Libraries

Contact us today to begin your Free Trial e-reference@taylorandfrancis.com or 1.888.318.2367


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.