Search

Search Results

Results 1-10 of 17 (Search time: 0.067 seconds).
Item hits:
  • Sách/Book


  • Authors: Lourdes Ortega (2013)

  • The field of Second language acquisition (SLA, for short) investigates the human capacity to learn additional languages in late childhood, adolescence, or adulthood, after the first language --in the case of monolinguals-- or languages --in the case of bilinguals-- have already been acquired. Understanding Second Language Acquisition offers a wide-encompassing survey of this burgeoning field, its accumulated findings and proposed theories, its developed research paradigms, and its pending questions for the future. The book zooms in and out of universal, individual, and social forces, in each case evaluating the research findings that have been generated across diverse naturalistic and formal contexts for second language acquisition. It assumes no background in SLA and provides helpf...

  • Sách/Book


  • Authors: Dan C. Marinescu (2013)

  • Cloud Computing: Theory and Practice provides students and IT professionals with an in-depth analysis of the cloud from the ground up. Beginning with a discussion of parallel computing and architectures and distributed systems, the book turns to contemporary cloud infrastructures, how they are being deployed at leading companies such as Amazon, Google and Apple, and how they can be applied in fields such as healthcare, banking and science. The volume also examines how to successfully deploy a cloud application across the enterprise using virtualization, resource management and the right amount of networking support, including content delivery networks and storage area networks. Developers will find a complete introduction to application development provided on a variety of platforms...

  • Sách/Book


  • Authors: N. Vlajic (2013)

  • Upon completion of this material, you should be able to: List the key managerial roles and the main types of managerial positions in an organization. • Describe the POLC project management model. • List and describe organizational/structural approaches to information security. • Explain the difference between security policy, standard and procedure. • Enlist different types of security policy that can be found in an organization

  • Sách/Book


  • Authors: Szigeti, Tim (2013)

  • This authoritative guide to deploying, managing, and optimizing QoS with Cisco technologies has been thoroughly revamped to reflect the newest applications, best practices, hardware, software, and tools for modern networks. This new edition focuses on complex traffic mixes with increased usage of mobile devices, wireless network access, advanced communications, and video. It reflects the growing heterogeneity of video traffic, including passive streaming video, interactive video, and immersive videoconferences. It also addresses shifting bandwidth constraints and congestion points; improved hardware, software, and tools; and emerging QoS applications in network security

  • Sách/Book


  • Authors: N. Vlajic (2013)

  • Define key terms and critical concepts of information security. • List the key challenges of information security, and key protection layers. • Describe the CNSS security model (McCumber Cube). • Be able to differentiate between threats and attacks to information. • Identify today's most common threats and attacks against information.

  • Sách/Book


  • Authors: Xiaohua Tian (2013)

  • Next-generation Internet providers face high expectations, as contemporary users worldwide expect high-quality multimedia functionality in a landscape of ever-expanding network applications. This volume explores the critical research issue of turning today's greatly enhanced hardware capacity to good use in designing a scalable multicast protocol for supporting large-scale multimedia services. Linking new hardware to improved performance in the Internet's next incarnation is a research hot-spot in the computer communications field.

  • Sách/Book


  • Authors: Ahmed Khattab (2013)

  • This book describes a communication paradigm that could shape the future of wireless communication networks, Opportunistic Spectrum Access (OSA) in Cognitive Radio Networks (CRN). While several theoretical OSA approaches have been proposed, they are challenged by the practical limitations of cognitive radios: the key enabling technology of OSA. This book presents an unprecedented formulation of the OSA problem in CNR that takes into account the practical limitations encountered due to existing technologies

  • Sách/Book


  • Authors: Tammy Noergaard (2013)

  • Embedded Systems Architecture is a practical and technical guide to understanding the components that make up an embedded system's architecture. This book is perfect for those starting out as technical professionals such as engineers, programmers and designers of embedded systems; and also for students of computer science, computer engineering and electrical engineering. It gives a much-needed `big picture' for recently graduated engineers grappling with understanding the design of real-world systems for the first time, and provides professionals with a systems-level picture of the key elements that can go into an embedded design, providing a firm foundation on which to build their skills.

  • Sách/Book


  • Authors: Joan Lambert (2013)

  • Demonstrate your expertise with Microsoft Office! Designed to help you practice and prepare for the 2013 Excel Microsoft Office Specialist (MOS) exam, this all-in-one study guide features: Full, objective-by-objective exam coverage Easy-to-follow procedures and illustrations to review essential skills Hands-on practice tasks to apply what you've learned Includes downloadable practice files