Page 1

Catalog no. CATITB

US VERSION


The following sectional catalogs are available from CRC Press. For a copy, please contact your local representative or CRC Press office. Agricultural and Life Sciences Catalog no. CATAGL • ISBN: 978-0-8493-3864-9

Biomedical Science and Engineering Catalog no. CATBMS • ISBN: 978-0-8493-3866-3

Business, Management and Public Administration Catalog no. CATBMP • ISBN: 978-0-8493-9175-0

Chemistry and Chemical Engineering Catalog no. CATSPC • ISBN: 978-0-8493-3867-0

Civil and Mechanical Engineering Catalog no. CATMCE • ISBN: 978-0-8493-3880-9

Computer Science and Information Technology Catalog no. CATITB • ISBN: 978-0-8493-3878-6

Electrical Engineering Catalog no. CATEEC • ISBN: 978-0-8493-3869-4

Environmental Science and Engineering Catalog no. CATEVE • ISBN: 978-0-8493-3874-8

Food Science and Nutrition

Taylor & Francis Group Pioneers in Publishing Grounded in a century-long tradition of publishing excellence, CRC Press Taylor & Francis continues to provide our world with the resources needed to promote human progress and meet the challenges that might stand in the way of that progress. Producers of printed handbooks, textbooks, tutorials, and field guides, as well as e-books, online libraries, and interactive databases, CRC Press is a full service print and electronic publisher committed to recording the accomplishments and supporting the work of the world’s leading practitioners and researchers. It’s no coincidence that many of the issues in today’s headlines read like a list of CRC new releases… from five or even ten years ago. Just as it’s never been a coincidence that the fields of inquiry our authors pursue today often bear the greatest fruit tomorrow. Whether its advancing agriculture yield, improving infrastructure, developing clean and green alternatives, retrofitting industry, reorganizing healthcare, securing our homeland, streamlining public administration, or defining just who we are and where we are going, CRC has the resources and references to turn students into professionals and leaders, researchers into innovators and pioneers. In the classroom, in the laboratory, and out in the field, wherever challenges are being met by research, ingenuity, and determination, you will find those who create and rely on the authoritative content that is the power of CRC Press.

INVITATION TO AUTHORS

Catalog no. CATFSN • ISBN: 978-0-8493-3876-2

If you have an idea for a book or a manuscript in progress relevant to any scientific, technical, or business discipline, CRC Press is interested. Please visit our authors Web site at www.crcpress.com/authors for more information, or contact:

Forensic Science, Law Enforcement, and Homeland Security

John Lavender, Senior VP Publishing 561-994-0555 • john.lavender@taylorandfrancis.com

Catalog no. CATFSC • ISBN: 978-0-8493-3877-9

Human Factors and Ergonomics / Industrial Engineering and Manufacturing

To order, visit us online at

Catalog no. CATHFI • ISBN: 978-0-8493-3875-5

Mathematics and Statistics Catalog no. CATMTS • ISBN: 978-0-8493-3879-3

Nanoscience and Technology / CleanTech Catalog no. CATMSN • ISBN: 978-0-8493-3885-4

Physics / Materials Science Catalog no. CATPHY • ISBN: 978-0-8493-9176-7

Or contact us via the following numbers: North & South America: From inside the US: Phone: 1-800-272-7737 Fax: 1-800-374-3401 Outside the US: Phone: 1-561-994-0555 Fax: 1-561-361-6018 Rest of the World Bookpoint Tel: +44 (0)1235 400400 • Fax: +44 (0)1235 400401


Product Listings Computer Science Algorithms & Complexity...................................................................................................................................3 Computation......................................................................................................................................................9 Computational Biology....................................................................................................................................12 Computer Engineering....................................................................................................................................19 Computer Engineering / Circuits & Chips........................................................................................................26 Computer Engineering / Embedded Systems.................................................................................................31 Computer Graphics, Multimedia & Visualization.............................................................................................32 Computer Science Theory & General References..........................................................................................35 Cryptography & Coding Theory......................................................................................................................36 Data Mining & Knowledge Discovery..............................................................................................................40 Discrete Systems.............................................................................................................................................46 Human/Computer Interaction..........................................................................................................................51 Image Processing............................................................................................................................................53 Intelligent Systems...........................................................................................................................................57 Internet & Web-based Computing...................................................................................................................63 Machine Learning & Pattern Recognition........................................................................................................66 Programming Languages................................................................................................................................68 Systems & Computer Architecture..................................................................................................................71

Computer Science and Information Technology Catalog - 2009

Table of Contents

Information Technology Database Design & Management...................................................................................................................72 IT Management................................................................................................................................................74 Networking Communications...........................................................................................................................82 Security & Auditing..........................................................................................................................................94 Security & Auditing / Certification & Accreditation........................................................................................104 Security & Auditing / Computer Crime Investigation.....................................................................................106 Software Engineering & Systems Development............................................................................................108 Title Index.............................................................................................................................................................118 Author Index.........................................................................................................................................................122 Sales Agents.........................................................................................................................................................126 Order Form...........................................................................................................................................................128 Ordering Information / Call for Authors........................................................................................ Inside Back Cover

CATITB_K00163_2009 Cat.indd 1

12/19/08 10:25:06 AM


For more information and a complete list

2

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 2

12/19/08 10:25:07 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Fundamentals of Grid Computing

Theory and Applications

Theory, Algorithms and Technologies

Edited by

Edited by

Patrizio Campisi

Frederic Magoules

Karen Egiazarian

Tampere University of Technology, Finland

Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation Series

The always increasing demand for enhancing the quality of images for consumer applications in remote sensing has fueled a resurgence of research into blind deconvolution techniques. Blind Image Deconvolution: Theory and Applications surveys the current state of research and practice as presented by the most recognized experts in the field. This comprehensive treatise discusses Bayesian methods, single- and multi-channel techniques, adaptive and multiframe methods, and a host of applications to multimedia processing, astronomy, remote sensing imagery, and medical and biological imaging at the whole-body, small-part, and cellular levels.

Grid computing is rapidly emerging as the dominant paradigm for wide-area distributed and parallel computing. This book examines key core technologies that cover scheduling and fault tolerance, as well as the generation of data and algorithms. Using a tutorial approach, each of the ten chapters presents a state-of-the-art concept illustrated by an example of particular research in the field. Following an overview of grid computing, leading contributors focus on presenting new and innovative research findings. This volume distills the overabundance of literature on grid computing, providing ready access to the most relevant.

Catalog no. 7367, ISBN: 978-0-8493-7367-1 2007, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $154.95 / £86.00

Catalog no. K10205, ISBN: 978-1-4398-0367-7 July 2009, 6-1/8 x 9-1/4, 331 pp. Suggested Price: $89.95 / £54.99

Computer System Security

Genetic Algorithms and Genetic Programming

Universita degli Studi “Roma TRE,” Italy

Basic Concepts and Solved Exercises

Ecole Centrale Paris, Chatenay Malabry, France

Gildas Avoine

Modern Concepts and Practical Applications

Pascal Junod

Michael Affenzeller, Stefan Wagner, and Stephan Winkler

Catholic University of Louvain, Belgium Nagravision SA, Switzerland

Algorithms and Complexity

Blind Image Deconvolution

3

Johannes Kepler University of Linz, Austria

Philippe Oechslin

EPFL, Lausanne, Switzerland

Series: Numerical Insights, 6

Computer System Security: Basic Concepts and Solved Exercises is designed to expose students and others to the basic aspects of computer security. Written by leading experts and instructors, it covers e-mail security; viruses and antivirus programs; program and network vulnerabilities; firewalls, address translation and filtering; cryptography; secure communications; secure applications; and security management. Written as an accompanying text for courses on network protocols, it also provides a basic tutorial for those whose livelihood depends upon secure systems. The solved exercises included have been taken from courses taught in the Communication Systems department at the EPFL.

Genetic algorithms and genetics programming are known to achieve robust, high-quality solutions to difficult problems. Due to increasing computing power, these methods have been successfully applied to problems in logistics, data mining, and various other fields with complex data. Genetic Algorithms and Genetic Programming: Modern Concepts and Practical Applications introduces basic concepts in an intuitive way. Designed as both a reference and self-study guide for readers from different backgrounds, the book includes theoretical material as well as practical applications. It also provides a supplementary web page with software and source code for heuristic laboratory work, along with illustrative examples.

Catalog no. EF4620, ISBN: 978-1-4200-4620-5 2008, 6-1/8 x 9-1/4, 210 pp. Suggested Price: $57.95 / £31.99

Catalog no. C6293, ISBN: 978-1-58488-629-7 March 2009, 6-1/8 x 9-1/4, 384 pp. Suggested Price: $79.95 / £48.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 3

12/19/08 10:25:07 AM


For more information and a complete list

Textbook

Grid Computing

Techniques and Applications

Edited by

Barry Wilkinson

Azzedine Boukerche

Series: Chapman & Hall/CRC Computational Science

Series: Chapman & Hall/CRC Computer & Information Science Series, 8

Based on the author’s own course, this textbook is designed for a first course on grid computing at the senior undergraduate and firstyear graduate levels. Unlike other texts on the subject, this book includes a lecture structure and student programming assignments. It covers security concepts, schedulers, and workflow editors, along with various grid-enabling applications. The author also explains how to design both a system infrastructure and a grid portal. The supplementary website offers useful resources for instructors, including PowerPoint® slides and software.

The Handbook of Algorithms for Wireless Networking and Mobile Computing focuses on several aspects of mobile computing, particularly algorithmic methods and distributed computing with mobile communications capability. It provides the topics that are crucial for building the foundation for the design and construction of future generations of mobile and wireless networks, including cellular, wireless ad hoc, sensor, and ubiquitous networks. Following an analysis of fundamental algorithms and protocols, the book offers a basic overview of wireless technologies and networks. Other topics include issues related to mobility, aspects of QoS provisioning in wireless networks, and future applications.

Algorithms and Complexity

University of North Carolina, Charlotte, USA

Catalog no. C6953, ISBN: 978-1-4200-6953-2 July 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $79.95 / £48.99

Handbook of Algorithms for Physical Design Automation Edited by

4

Handbook of Algorithms for Wireless Networking and Mobile Computing

Charles J. Alpert

IBM Corporation, Austin, Texas, USA

Dinesh P. Mehta

Colorado School of Mines, Golden, USA

University of Ottawa, Ontario, Canada

Catalog no. C4657, ISBN: 978-1-58488-465-1 2006, 7 x 10, 1040 pp. Suggested Price: $134.95 / £69.99

Handbook of Approximation Algorithms and Metaheuristics Edited by

Teofilo F. Gonzalez

Sachin S. Sapatnekar

University of California, Santa Barbara, USA

University of Minnesota, Minneapolis, USA

Series: Chapman & Hall/CRC Computer & Information Science Series, 10

Handbook of Algorithms for Physical Design Automation provides a detailed overview of VLSI physical design automation, placing particular emphasis on state-of-the-art techniques, trends, and improvement that have emerged over the last decade. After a brief introduction to the modern physical design problem, basic algorithmic techniques, and partitioning, the book discusses significant advances in floorplanning representations and describes recent formulations of the floorplanning problem. It also addresses issues of placement, net layout and optimization, routing multiple signal nets, manufacturability, physical synthesis, special nets, and designing for specialized technologies.

The first book to comprehensively study both approximation algorithms and metaheuristics, this resource presents the methodologies to design and analyze efficient approximation algorithms for a large class of problems and to establish inapproximability results for another class. It discusses local search, neural networks, and metaheuristics, as well as multiobjective problems, sensitivity analysis, and stability. The handbook applies the methodologies to classical problems in combinatorial optimization, computational geometry, and graph problems. In addition, it explores large-scale and emerging applications in networks, bioinformatics, VLSI, game theory, and data analysis.

Catalog no. AU7242, ISBN: 978-0-8493-7242-1 January 2009, 7 x 10, 1024 pp. Suggested Price: $149.95 / £83.00

Catalog no. C5505, ISBN: 978-1-58488-550-4 2007, 7 x 10, 1432 pp. Suggested Price: $129.95 / £71.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 4

12/19/08 10:25:08 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Handbook of Bioinspired Algorithms and Applications Edited by

Stephan Olariu

Old Dominion University, Norfolk, Virginia, USA

Edited by

Albert Y. Zomaya

Paul A. Fishwick

University of Sydney, Australia

University of Florida, Gainesville, USA

Series: Chapman & Hall/CRC Computer & Information Science Series, 7

Series: Chapman & Hall/CRC Computer & Information Science Series

This authoritative handbook reveals the connections between bioinspired techniques and the development of solutions to problems that arise in diverse problem domains. It provides broad coverage along with numerous references to the available literature for more in-depth information. The book’s two sections serve to balance coverage of theory and practical applications. The first section explains the fundamentals of techniques, such as evolutionary algorithms, swarm intelligence, cellular automata, and others. Detailed examples and case studies in the second section illustrate how to apply the theory in actually developing solutions to a particular problem based on a bioinspired technique. Catalog no. C4754, ISBN: 978-1-58488-475-0 2006, 7 x 10, 704 pp. Suggested Price: $144.95 / £79.99

Handbook of Data Structures and Applications Edited by

Algorithms and Complexity

Handbook of Dynamic System Modeling

This interdisciplinary guide explores various types of modeling methods available for dynamic systems. It begins with the general concepts, representations, and philosophy of dynamic models, followed by a section on modeling methodologies that explains how to portray designed models on a computer. After addressing scale, heterogeneity, and composition issues, the handbook covers specific model types that are often characterized by specific visual- or textbased grammars. It concludes with case studies that employ Modelica and Simulink® to construct, simulate, and analyze dynamic models. Each chapter includes mathematical descriptions, pseudocode, and diagrams. Catalog no. C5653, ISBN: 978-1-58488-565-8 2007, 7 x 10, 760 pp. Suggested Price: $109.95 / £57.99

Handbook of Parallel Computing Models, Algorithms and Applications Edited by

Dinesh P. Mehta

Colorado School of Mines, Golden, USA

Sartaj Sahni

University of Florida, Gainesville, USA

5

Sanguthevar Rajasekaran

University of Connecticut, Storrs, USA

John Reif

Duke University, Durham, North Carolina, USA

Series: Chapman & Hall/CRC Computer & Information Science Series, 4

Series: Chapman & Hall/CRC Computer & Information Science Series

Handbook of Data Structures and Applications responds to the needs of data structure and algorithm researchers by providing a comprehensive survey of data structures of various types. Divided into seven parts, the text begins with a review of introductory material, followed by a discussion of well-known classes of data structures, priority queues, dictionary structures, and multidimensional structures. It next analyzes miscellaneous data structures, which are well-known structures that elude easy classification. The book then addresses mechanisms and tools that were developed to facilitate the use of data structures in real programs. It concludes with an examination of applications.

This volume provides an up-to-date assessment of the models and algorithms involved in applying parallel computing to a variety of fields. It reviews recent advances, such as membrane computing, the Inthreads model, and the new releases of the LAPACK and ScaLAPACK libraries. The book also highlights a range of parallel computing problems that include latency, message dissemination, data transfer, call admission control, power aware scheduling, scalability, and data replication, and presents numerous approaches to tackle these problems, including pipelines, I/O techniques, analytical modeling, orthogonal recursive bisection, game theory, and parallel matrix multiplication algorithms.

Catalog no. C4355, ISBN: 978-1-58488-435-4 2005, 7 x 10, 1392 pp. Suggested Price: $109.95 / £57.99

Catalog no. C6234, ISBN: 978-1-58488-623-5 2008, 7 x 10, 1224 pp. Suggested Price: $139.95 / £76.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 5

12/19/08 10:25:08 AM


For more information and a complete list Handbook of Real-Time and Embedded Systems Edited by

High Performance Computing in Remote Sensing

Insup Lee

Edited by

University of Pennsylvania, Philadelphia, USA

Joseph Y-T. Leung

New Jersey Institute of Technology, Newark, USA

Algorithms and Complexity

Sang H. Son

Antonio J. Plaza

University of Extremadura, Caceres, Spain

Chein-I Chang

University of Maryland, Baltimore, USA

University of Virginia, Charlottesville, USA Series: Chapman & Hall/CRC Computer & Information Science Series

This handbook focuses on several major areas of real-time and embedded systems. It examines real-time scheduling and resource management issues and explores the programming languages, paradigms, operating systems, and middleware for these systems. The book also presents challenges encountered in wireless sensor networks and offers ways to solve these problems. It addresses key matters associated with real-time data services and reviews the formalisms, methods, and tools used in real-time and embedded systems. In addition, the book considers how these systems are applied in various fields, including adaptive cruise control in the automobile industry. Catalog no. C6781, ISBN: 978-1-58488-678-5 2008, 7 x 10, 800 pp. Suggested Price: $139.95 / £76.99

Handbook of Scheduling

Algorithms, Models, and 6 Performance Analysis Edited by

Series: Chapman & Hall/CRC Computer & Information Science Series

One of the first volumes to explore state-of-the-art HPC techniques in the context of remote sensing problems, this book focuses on the computational complexity of algorithms that are designed for parallel computing and processing. It addresses key computing concepts and developments in remote sensing and covers application areas not necessarily related to remote sensing, such as multimedia and video processing. Each chapter illustrates a specific parallel computing paradigm, including multiprocessor (cluster-based) systems, large-scale and heterogeneous networks of computers, grid computing platforms, and specialized hardware architectures for remotely sensed data analysis and interpretation. Catalog no. C6625, ISBN: 978-1-58488-662-4 2008, 6-1/8 x 9-1/4, 496 pp. Suggested Price: $104.95 / £57.99

Introduction to Scheduling Edited by

Yves Robert

Ecole Normale Superieure de Lyon, France

Joseph Y-T. Leung

Frederic Vivien

Series: Chapman & Hall/CRC Computer & Information Science Series, 1

Series: Chapman & Hall/CRC Computational Science

This handbook provides full coverage of the most recent and advanced topics in scheduling and draws on researchers from all relevant disciplines to facilitate new insights. Presented in six parts, the book provides introductory material, complete with tutorials and algorithms, then examines classical scheduling problems. Part 3 explores scheduling models that originate in areas such as computer science and operations research. The following section examines scheduling problems that arise in real-time systems. Part 5 discusses stochastic scheduling and queueing networks, and the final section discusses a range of applications in a variety of areas, from airlines to hospitals.

Reviewing classical methods, realistic models, and algorithms, this book offers a through introduction to scheduling. Coverage includes fundamental concepts and basic methods, recent research, and applications with a special focus on distributed systems and computational grids. Other topics include online scheduling, stochastic task-resource systems, and platform models. Examples, theorems, and pedagogical proofs create an interactive learning format. Though rigorous, the book provides enough background to be self-contained and fully accessible to computer scientists, mathematicians, and researchers in related fields.

New Jersey Institute of Technology, Newark, USA

Catalog no. C3979, ISBN: 978-1-58488-397-5 2004, 7 x 10, 1224 pp. Suggested Price: $139.95 / £73.99

Laboratoire LIP, Lyon, France

Catalog no. C7273, ISBN: 978-1-4200-7273-0 July 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $89.95 / £54.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 6

12/19/08 10:25:09 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Numerical Linear Approximation in C Nabih N. Abdelmalek

(Retired) National Research Council of Canada

Hang T. Lau

William A. Malek

Series: Discrete Mathematics and Its Applications, 43

Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation Series, 2

Collecting some of the most popular graph algorithms and optimization procedures, A Java Library of Graph Algorithms and Optimization provides the source code for a library of Java programs that can be used to solve problems in graph theory and combinatorial optimization. Self-contained and largely independent, each topic starts with a problem description and an outline of the solution procedure, followed by its parameter list specification, source code, and a test example that illustrates the usage of the code. An accompanying CD-ROM contains all of the Java code included in the book.

Presenting real-world examples from various disciplines, this volume offers a collection of algorithms with techniques from classical matrix numerical analysis and approximation theory. The book deals with a solution of overdetermined and underdetermined linear systems as well as overdetermined inequalities and linear problems. It discusses the differences in L1, L2, and L-infinity norms, illustrating the interpolatory property of L1 norms, the equioscillatory property of L-infinity norms, and Chebyshev approximation. The authors also cover practical pseudo-inverses and least square approximation. An accompanying CD-ROM provides source code in the C language.

Catalog no. C7184, ISBN: 978-1-58488-718-8 2007, 7 x 10, 386 pp. Suggested Price: $104.95 / £57.99

Catalog no. C9780, ISBN: 978-1-58488-978-6 2008, 6-1/8 x 9-1/4, 968 pp. Suggested Price: $109.95 / £59.99

McGill University, Montreal, Quebec, Canada

Nortel Networks, Canada

Algorithms and Complexity

A Java Library of Graph Algorithms and Optimization

Textbook

Parallel Algorithms

Textbook

Henri Casanova

Methods in Algorithmic Analysis Vladimir A. Dobrushkin

University of Hawaii, Honolulu, USA

Arnaud Legrand

7

CNRS, LIG Laboratory, University of Grenoble, France

Worcester Polytechnic Institute, Massachusetts, USA

Yves Robert

Series: Chapman & Hall/CRC Computer & Information Science Series

Series: Chapman & Hall/CRC Numerical Analytic & Scientific Computation Series, 3

Focusing on the analysis of algorithms, this book presents a comprehensive treatment of the mathematics used to analyze computer algorithms. It provides information on the theory by including code fragments with detailed analysis. Unlike similar books, Methods in Algorithmic Analysis contains material on enumeration with generating functions, shuffle products, combinatorics of strings, counting in regular languages, and asymptotics from recurrences. The text incorporates the use of C++ throughout and includes many examples and exercises of varying levels of difficulty. A solutions manual is available for qualifying instructors.

Focusing on algorithms for distributed-memory parallel architectures, Parallel Algorithms presents a rigorous yet accessible treatment of theoretical models of parallel computation, parallel algorithm design for homogeneous and heterogeneous platforms, complexity and performance analysis, and essential notions of scheduling. It extracts fundamental ideas and algorithmic principles from the mass of practical implementations developed over the last few decades. With many examples, case studies, exercises, and solutions in each chapter, the text encompasses both the theoretical foundations of parallel algorithms and practical parallel algorithm design.

Catalog no. C6829, ISBN: 978-1-4200-6829-0 March 2009, 7 x 10, 608 pp. Suggested Price: $89.95 / £49.99

Ecole Normale Superieure de Lyon, France

Catalog no. C9454, ISBN: 978-1-58488-945-8 January 2009, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $79.95 / £39.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 7

12/19/08 10:25:10 AM


For more information and a complete list Parallel Iterative Algorithms

From Sequential to Grid Computing Jacques Mohcine Bahi, Sylvain Contassot-Vivier, and Raphael Couturier

Algorithms and Complexity

University of Franche-Comte, Belfort, France

A Practical Guide to Data Structures and Algorithms using Java Sally Goldman and Ken Goldman

Washington University, Saint Louis, Missouri, USA

Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation. Series, 1

Series: Chapman & Hall/CRC Applied Algorithms and Data Structures Series

Presenting the theoretical and practical aspects of parallel numerical algorithms, this book illustrates how iterative algorithms can solve numerical problems and discusses their implementation on parallel and distributed computers. It reviews basic convergence results of iterative algorithms and explores the advantages of asynchronism, such as reducing the effect of bottlenecks and the synchronization penalty. The authors also analyze numerous experiments in various computational contexts for linear and nonlinear numerical problems. The book contains several exercises at the end of most chapters as well as an appendix of mathematical results.

This book presents a systematic, applications-centered study of data structures and algorithms and their practical implementations. With fully documented Java implementations on the accompanying CD-ROM, it provides comprehensive coverage of a wide variety of important data structures. Case studies, examples, decision trees, and comparison charts throughout the text illustrate and support a methodology for the careful selection and application of data structures and algorithms. Appendices summarize major features of the Java programming language, introduce asymptotic notation and complexity analysis, and discuss design patterns applied in the book. A solutions manual is available for qualifying instructors.

Catalog no. C808X, ISBN: 978-1-58488-808-6 2008, 6-1/8 x 9-1/4, 240 pp. Suggested Price: $93.95 / £51.99

Petascale Computing

8 Algorithms and Applications Edited by

David A. Bader

Georgia Institute of Technology, Atlanta, USA Series: Chapman & Hall/CRC Computational Science

Featuring contributions from the world’s leading experts in computational science, this volume provides the first collection of articles on petascale algorithms and applications for computational science and engineering.It explores the use of petascale computers for solving the most challenging scientific and engineering problems of the current century. The book covers a breadth of topics in petascale computing, including architectures, software, programming methodologies, tools, scalable algorithms, performance evaluation, and application development. It also discusses expected breakthroughs in the field for computational science and engineering. Catalog no. C9098, ISBN: 978-1-58488-909-0 2008, 6-1/8 x 9-1/4, 616 pp. Suggested Price: $93.95 / £51.99

Catalog no. C455X, ISBN: 978-1-58488-455-2 2008, 7 x 10, 1056 pp. Suggested Price: $104.95 / £57.99

A Programmer’s Companion to Algorithm Analysis Ernst L. Leiss

University of Houston, Texas, USA

Focusing on practical issues, A Programmer’s Companion to Algorithm Analysis bridges the gap between algorithms and software programs. This book explains the fundamental differences between the computational model assumed for algorithms and the real architectures in which programs execute. It highlights the pitfalls that can occur when implementing an algorithm as software and offers suggestions to solve these problems. The book also explores the interactions among program, compiler, and run-time support system, contrasting this with the simpler model assumed for algorithms. Intended for software developers and programmers, it places particular emphasis on the implications of the memory hierarchy on program efficiency. Catalog no. C6730, ISBN: 978-1-58488-673-0 2007, 6-1/8 x 9-1/4, 255 pp., Soft Cover Suggested Price: $55.95 / £30.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 8

12/19/08 10:25:10 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Computation Computational Quantum Mechanics for Nuclear Physics David J. Dean

Oak Ridge National Laboratory, Tennessee, USA

Mortin Hjorth-Jensen

Computational Statistics Handbook with MATLAB® Second Edition Wendy L. Martinez

The Department of Defense, Fredericksburg, Virginia, USA

Angel R. Martinez

Strayer University, Fredericksburg, Virginia, USA

A fundamental challenge to our understanding of the universe, the quantum nuclear many-body problem lies at the heart of lowenergy nuclear physics. Written by two highly regarded researchers and theorists, this work provides a brief description of modern nuclear forces, and their applications in finite nuclei, along with an overview of several many-body techniques, including Quantum Monte Carlo, Configuration Interaction, and coupled cluster methods. The book also focuses on high-performance computing aspects, parallelization methods and libraries, and basic quantum many-body training, while also covering the key algorithms needed to build computer codes for simple problems. Catalog no. C8609, ISBN: 978-1-4200-6609-8 July 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $99.95 / £60.99

Series: Chapman & Hall/CRC Computer Science & Data Analysis

As in the best-selling first edition, this text covers some of the most commonly used contemporary techniques in computational statistics. With a strong, practical focus on implementing the methods, the authors include algorithmic descriptions of the procedures as well as examples that illustrate the use of the algorithms in data analysis. They offer MATLAB® code, example files, and data sets available for download online. Updated for MATLAB R2007a and the Statistics Toolbox, Version 6.0, this edition incorporates many additional computational statistics topics, including multivariate distributions, classifiers, clustering, parametric models, and smoothers.

Computation

University of Oslo, Center of Mathematics for Applications, Norway

Catalog no. C5661, ISBN: 978-1-58488-566-5 2008, 6-1/8 x 9-1/4, 792 pp. Suggested Price: $89.95 / £39.99

Computing for Fundamental Physics A Critical Look at 30 Years of Computing in High-energy Physics

Textbook

Computational Statistics

9

Edited by

An Introduction to R

F. Carminati

Günther Sawitzki

CERN-Physics, Geneva, Switzerland

StatLab, Heidelberg, Germany

Based on a condensed one-week course taught by the author, this text provides a concise introduction to the statistical software package R and its use in computational statistics. It covers the basics of R, including importing data, programming, and graphics. The author also explores data analysis, linear and nonparametric regression, residual diagnostic, statistical comparisons, and multivariate statistics. Integrating R code throughout, the text includes numerous examples and figures to illustrate the methods, provides all data sets and code on the R archive, and contains many exercises, enabling its use as a course text or for self-study. Catalog no. C6782, ISBN: 978-1-4200-8678-2 January 2009, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $79.95 / £48.99

Much more than a computer physics book, this text documents how the development of high-energy computing has fundamentally changed the way we inhabit this planet. Edited by the computing coordinator for CERN’s ALICE project, this remarkable volume brings together pioneering participants who discuss several key computing technologies that have evolved out of the high-energy physics community, including the Internet. It also covers the tumultuous evolution of the hottest topic in computing today, the use of grid computing with its unlimited potential. Specifically, it discusses High Energy (Particle) Physics (HEP), which may ultimately have larger impact on society than that of the World Wide Web. Catalog no. EF6678, ISBN: 978-1-4200-6678-4 April 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $79.95 / £48.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 9

12/19/08 10:25:11 AM


For more information and a complete list Context-Aware Computing and Self-Managing Systems Edited by

Waltenegus Dargie

Technische Universitat, Dresden, Germany

Handbook of Computational Group Theory Derek F. Holt

University of Warwick, Coventry, UK

Bettina Eick

Technische Universität, Braunschweig, Germany

Eamonn A. O’Brien

University of Auckland, New Zealand

Computation

Series: Chapman & Hall/CRC Studies in Informatics Series, 3

Series: Discrete Mathematics and Its Applications, 31

Addressing an emerging topic in computing platforms with broad applications in mobile and pervasive computing, this book presents a comprehensive overview of self-managing networks and contextaware systems and networks. Written by those pioneering the field, this work provides a handbook for researchers working on the designing of such systems. It also serves as a reference for those wishing to get up to speed on context-awareness from the network level to applications in the area of human-computer interaction. Divided into four main parts, the book demonstrates the scope and usefulness of context-aware computing in developing self-managing devices, middleware, networks, and applications.

This handbook covers the whole subject of computational group theory (CGT) at a level suitable for beginning graduate students who have some knowledge of group theory and computer algorithms. It develops the theory of algorithms in full detail, includes complexity analyses whenever possible, and highlights the connections between the different aspects of CGT and other areas of computer algebra. Several specialist sections provide pointers to the current state of the art in these areas, and all sections include exercises of varying difficulty. For each major collection of algorithms, the book includes a section describing applications both within and outside of group theory.

Catalog no. C7771, ISBN: 978-1-4200-7771-1 March 2009, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $99.95 / £60.99

Catalog no. C3723, ISBN: 978-1-58488-372-2 2005, 6-1/8 x 9-1/4, 536 pp. Suggested Price: $104.95 / £57.99

Grid Resource Management

Towards Virtual and Services 10 Compliant Grid Computing Frederic Magoules, Thi-Mai-Huong Nguyen, and Lei Yu

Immunological Computation

Theory and Applications Dipankar Dasgupta

Ecole Centrale Paris, Chatenay Malabry, France

University of Memphis, Tennessee, USA

Series: Chapman & Hall/CRC Numerical Analy & Scient Comp. Series, 4

Fernando Nino

Exploring the data and execution management aspects of grid computing, this book chronicles the current trend of grid developments toward a more service-oriented approach that exposes grid protocols using web services standards. It introduces a new virtual file system for the grid environment and offers a novel framework for deploying scientific applications into a grid environment. The book also covers P2P systems, service-oriented architecture, scheduling algorithms, and semantic technologies. It highlights several grid applications, such as air quality forecasting and P2P media streaming systems, and examines Java WS Core programming and GT4 security.

Over the last decade, the field of immunological computation has progressed slowly and steadily as a branch of computational intelligence. Immunological Computation: Theory and Applications presents up-to-date immunity-based computational techniques. After a brief review of fundamental immunology concepts, it examines computational models based on the negative selection process that occurs in the thymus. The text then explores immune networks, including continuous and discrete immune network models, clonal selection, hybrid models, and computational models based on danger theory. It also discusses realworld applications for the models covered in each chapter.

Catalog no. C7404, ISBN: 978-1-4200-7404-8 January 2009, 6-1/8 x 9-1/4, 306 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU6545, ISBN: 978-1-4200-6545-9 January 2009, 6-1/8 x 9-1/4, 296 pp. Suggested Price: $119.95 / £66.99

National University of Columbia, Bogota

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 10

12/19/08 10:25:12 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Frederic Magoules, Jie Pan, Kiat-An Tan, and Abhinit Kumar

Indian Institute of Technology, Gwalior, India

Parallel Computing in Quantum Chemistry Curtis L. Janssen and Ida M.B. Nielsen

Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation Series, 6

Sandia National Laboratories, Livermore, California, USA

The Grid is rapidly emerging as the dominant paradigm for widearea distributed and parallel computing. Introduction to Grid Computing concentrates on fundamental aspects, including three key core technologies: grid security, data management, and scheduling. It includes a step-by-step framework for putting scientific applications on the grid and details the research work being carried out in actual projects. Globus (USA) and gLite (European), the two most popular middleware options, are explained through the use of concrete examples. Each of the book’s ten chapters presents concepts from both a computer scientist’s and engineer’s point of view.

Through an assessment of parallel computing hardware issues, parallel programming practices, and implementation of key methods, this book enables readers to develop and implement efficient quantum chemistry software capable of utilizing largescale parallel computers. It addresses parallel programming challenges facing quantum chemists that are not covered elsewhere, including message-passing, multi-threading, and parallel computer architectures. It presents in-depth performance analyses of several important quantum chemistry procedures and methods, such as the Hartree–Fock method and Møller–Plesset perturbation theory, and contains many program examples written in the C programming language.

Catalog no. C7406, ISBN: 978-1-4200-7406-2 January 2009, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $79.95 / £48.99

Mathematics of Quantum Computation and Quantum Technology

Catalog no. 51644, ISBN: 978-1-4200-5164-3 2008, 6-1/8 x 9-1/4, 232 pp. Suggested Price: $89.95 / £49.99

Edited by

Process Algebra for Parallel and Distributed Processing

Goong Chen

Edited by

Texas A&M University, College Station, USA

Louis Kauffman

Michael Alexander

11

KPMG, Vienna, Austria

University of Illinois, Chicago, USA

Computation

Introduction to Grid Computing

William Gardner

Samuel J. Lomonaco

University of Guelph, Ontario, Canada

University of Maryland, Baltimore, USA Series: Chapman & Hall/CRC Applied Mathematics & Nonlinear Science

Series: Chapman & Hall/CRC Computational Science

This volume explores the recent mathematical advances made in quantum computing and technology. It begins with topics in quantum computing that include quantum algorithms and hidden subgroups, quantum search, algorithmic complexity, and quantum simulation. The next section covers quantum technology, such as mathematical tools, quantum wave functions, SQUIDs, and optical quantum computing. The section on quantum information deals with error correction, cryptography, entanglement, and communication. The final part explores quantum topology, knot theory, category algebra, and logic. The book also includes recommendations for federal funding of mathematical research on quantum computing.

Exploring the contributors’ own state-of-the-art applications, this volume shows how process algebra has become a powerful tool for solving design and implementation challenges of concurrent systems. It develops formal methods for parallelizing algorithms for multicore architectures, models the behavior of distributed systems, and discusses how process algebra can tackle the design constraints of embedded systems. Highlighting the recent growth in this burgeoning industry, the contributors cover the Cell Broadband Engine processor of Sony, Toshiba, and IBM; a Channel Ambient Machine for mobile applications; the reuse of concurrent artifacts across different hardware platforms, and much more.

Catalog no. C8997, ISBN: 978-1-58488-899-4 2008, 6-1/8 x 9-1/4, 624 pp. Suggested Price: $104.95 / £57.99

Catalog no. C6486, ISBN: 978-1-4200-6486-5 January 2009, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $99.95 / £55.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 11

12/19/08 10:25:12 AM


For more information and a complete list Bioinformatics Basics Applications in Biological Science and Medicine, Second Edition

Computation / Computational Biology

Quantum Computing From Linear Algebra to Physical Realizations

Mikio Nakahara and Tetsuo Ohmi

Lukas K. Buehler

Southwestern College & University of California, San Diego, USA

Hooman H. Rashidi

Kinki University, Osaka, Japan

Yale School of Medicine, New Haven, Connecticut, USA

With explicit derivations, exercises, and selected solutions, this classroom-tested book examines the theoretical aspects of quantum computing and focuses on several candidates of a working quantum computer, evaluating them according to the DiVincenzo criteria. It covers theoretical tools, such as vectors, matrices, quantum gates, and integral and Fourier transforms. The authors discuss how decoherence is an obstacle to the physical realization of a working quantum computer and how quantum error-correcting codes can sometimes overcome this. They also explore applications at the forefront of the field, including the ion trap quantum computer and the solid state realization of a quantum computer.

Completely revised and updated, Bioinformatics Basics: Applications in Biological Science and Medicine, Second Edition continues to be a useful tool for researchers who need to easily access and use databases to gather information on genes, proteins, and diseases. This latest edition of a bestseller covers new approaches to data analysis using databases around the world. It identifies computing techniques that help readers manage the massive flow of information. The structure of this second edition follows that of the first and its content reflects the growth in information. Revised sections expand upon recent developments in genome projects, microarrays, proteomics, genome mapping, and more.

Catalog no. IP606, ISBN: 978-0-7503-0983-7 2008, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $79.95 / £44.99

Catalog no. 1283, ISBN: 978-0-8493-1283-0 2005, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $104.95 / £57.99

Textbook

12

Edited by

Algorithms in Bioinformatics

A Practical Introduction Wing-Kin Sung

National University of Singapore

Combinatorial Pattern Matching Algorithms in Computational Biology Using Perl and R Gabriel Valiente

Technical University of Catalonia, Barcelona, Spain

Series: Chapman & Hall/CRC Mathematical & Computational Biology

Series: Chapman & Hall/CRC Mathematical & Computational Biology

Algorithms in Bioinformatics: A Practical Introduction focuses on using algorithms and discrete mathematics to solve biological problems. The book systematically describes biological applications, presents the corresponding mathematical/computational problems, and demonstrates various algorithmic solutions. The author also discusses the practical use of many algorithmic methods and describes the different algorithms that should be used in different situations. The text provides references for further reading and offers a set of knowledge-testing exercises. The book also includes instruction and data for practical exercises which can be found on the author’s website.

This book addresses specific pattern matching problems for sequences, tressa, and graphs. It examines specific algorithmic problems that arise when dealing with structures in computational biology, including biology sequences, phylogenetic trees, networks, and metabolic and signaling pathways. For each of these problems, the author offers a clear distinction between problems in the analysis of one structure and in the comparative analysis of two or more structures. He also provides full Perl and R implementation as well as pointers to other software, such as CPAN, Bioperl, CRAN, and Bioconductor. The Perl and R source code are included on the author’s website.

Catalog no. C7033, ISBN: 978-1-4200-7033-0 June 2009, 6-1/8 x 9-1/4, 406 pp. Suggested Price: $79.95 / £39.99

Catalog no. C6973, ISBN: 978-1-4200-6973-0 June 2009, 6-1/8 x 9-1/4, 386 pp. Suggested Price: $89.95 / £54.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 12

12/19/08 10:25:13 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Textbook

Comparative Genomics

Basic and Applied Research Edited by

Data Analysis Tools for DNA Microarrays Sorin Draghici

Series: Chapman & Hall/CRC Mathematical & Computational Biology, 4

Through comparative analysis, the genomes of a number of species are providing a deeper understanding of the human genome. This is proving to be highly useful in drug research, especially in the treatment of otherwise intractable conditions. Rather than covering all of comparative genomics, this book compiles firsthand descriptions of the pioneering achievements of prominent researchers from diverse fields. The text focuses on revolutionary advances in DNA-sequencing technology, bold new approaches to the organization and analysis of large phylogenetic data sets, the impact of comparative genomics on our understanding of evolution, and efforts toward developing novel antimicrobial drugs.

To help meet the challenges of DNA research, Data Analysis Tools for DNA Microarrays builds a much-needed foundation in the statistics and data analysis for biologists. It also provides an overview of microarrays required by computer scientists. The author presents the basics of microarray technology and, more importantly, the specific problems it poses from the data analysis perspective. He also introduces, in simple language, the fundamentals of statistics and the details of the techniques most useful in microarray data analysis. Richly illustrated in color, the book comes with a CDROM containing trial software from BioDiscovery and Insightful.

Glaxo Smith Kline, Collegeville, Pennsylvania, USA

Catalog no. 9216, ISBN: 978-0-8493-9216-0 2008, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $154.95 / £86.00

Computational Biology

Wayne State University, Detroit, Michigan, USA

James R. Brown

Catalog no. C3154, ISBN: 978-1-58488-315-9 2003, 6-1/8 x 9-1/4, 552 pp. Suggested Price: $93.95 / £51.99

DNA Methylation Microarrays

Experimental Design and Statistical Analysis

Computational Protein-Protein Interactions

Sun-Chong Wang

National Central University, Chungli Taoyuan, Taiwan

Ruth Nussinov

13

Arturas Petronis

National Cancer Institute, Frederick, Maryland, USA

Centre for Addiction and Mental Health, Toronto, Ontario, Canada

Gideon Schreiber

Series: Chapman & Hall/CRC Biostatistics Series

A description of fundamental and applied aspects of the usefulness of computations when approaching protein-protein interactions, this book incorporates different views of the same biochemical problem from sequence to structure to energetics. It covers proteinprotein interaction prediction and dynamics, design, drug design for inhibition, and uses for predicting function. The text provides an overview of the topic with general chapters understandable by students and junior researches in this area, while also providing advanced material for more specialized readers. The chapters detail the complexity of protein interaction studies and inform readers of potential caveats that might be involved.

Illustrating results with examples based on real firsthand data, this book presents the statistical methods and tools to analyze DNA methylation microarray data. It describes wet-bench technologies that produce the data for analysis, explains how to preprocess the data to remove systematic artifacts resulting from measurement imperfections, and explores differential methylation and genomic tiling arrays. The authors show how cluster and network analyses can link the functions and roles of unannotated DNA elements with known ones. They also survey the open source software, public databases, and other online resources available for microarray research. The accompanying CD-ROM contains files of plots and many color images.

Catalog no. 70053, ISBN: 978-1-4200-7005-7 June 2009, 6-1/8 x 9-1/4, 248 pp. Suggested Price: $99.95 / £60.99

Catalog no. C6727, ISBN: 978-1-4200-6727-9 2008, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $79.95 / £44.99

Herzel, Israel

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 13

12/19/08 10:25:14 AM


For more information and a complete list DNA Microarrays and Related Genomics Techniques Design, Analysis, and Interpretation of Experiments Edited by

David B. Allison, Grier P. Page, T. Mark Beasley, and Jode W. Edwards University of Alabama, Birmingham, USA

Computational Biology

Series: Chapman & Hall/CRC Biostatistics Series, 15

With contributions from distinguished experts in the field, DNA Microarrays and Related Genomics Techniques parallels the steps in conducting and analyzing a microarray experiment from conception to interpretation. This text explores critical aspects of designing a microarray experiment, including power and sample size. It assesses the validity of statistical methods and describes how to ensure the quality and integrity of data. In addition, the authors discuss new methods for interpreting microarray data and examine the various issues associated with analysis. They also address the movement to make large high-dimensional datasets public for further analysis, along with the associated methods. Catalog no. DK2187, ISBN: 978-0-8247-5461-7 2006, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $93.95 / £51.99

Gene Expression Studies using Affymetrix Microarrays Hinrich Gohlmann and Willem Talloen

Johnson & Johnson, Beerse, Belgium Series: Chapman & Hall/CRC Mathematical & Computational Biology

This book tears down the omnipresent language barriers among molecular biology, bioinformatics, and biostatistics researchers by explaining the entire process of a gene expression study from conception to interpretation. It covers important technical and statistical pitfalls and problems, helping not only to explain concepts outside the domain of researchers, but to provide additional guidance in their field of expertise. The book also describes technical and statistical methods conceptually with illustrative examples, enabling those inexperienced with gene expression studies to grasp the basic principles. Catalog no. C6515, ISBN: 978-1-4200-6515-2 May 2009, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $89.95 / £54.99

Textbook

14

Fundamentals of Statistical Bioinformatics Sunil Mathur

University of Mississippi, University, USA

Genetics and Randomness

Series: Statistics: A Series of Textbooks and Monographs

Anatoly Ruvinsky

Fundamentals of Statistical Bioinformatics provides an understanding of biological mechanisms and presents the most current techniques to analyze data obtained through different technologies. This book offers the foundations of mathematics, statistics, biology, and computer science needed to understand the methods presented in the text. Developing concepts from the introductory to the advanced level, the text provides detailed coverage of modern analytical techniques such as Markov chain Monte Carlo (MCMC) and Bayesian methods. It also addresses useful Webbased tools like CDART and provides a working knowledge of the R language and the codes available for analyzing sequences.

With the revolutionary explosion of genetic information in recent decades, it is important to realize the underlying limitations of scientific predictions in genetics. Avoiding unnecessary technical details, this book helps readers accept and embrace a probabilistic view and understand the role of randomness in critical biological processes. It explores the nature of genetic uncertainty from different points of view and at different levels of biological organization. The book also traces the origin of some ideas of randomness starting from the basics of quantum mechanics and molecular genetics to modern evolutionary genetics and the philosophy of mathematics.

Catalog no. C6552, ISBN: 978-1-58488-655-6 June 2009, 6 x 9, 400 pp. Suggested Price: $89.95 / £54.99

University of New England, Australia

Catalog no. 78852, ISBN: 978-1-4200-7885-5 June 2009, 6-1/8 x 9-1/4, 176 pp. Suggested Price: $89.95 / £54.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 14

12/19/08 10:25:14 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Handbook of Computational Molecular Biology

Textbook

Edited by

Introduction to Bioinformatics

Srinivas Aluru

Anna Tramontano

Series: Chapman & Hall/CRC Computer & Information Science Series, 9

Series: Chapman & Hall/CRC Mathematical & Computational Biology, 13

The Handbook of Computational Molecular Biology offers a comprehensive, systematic treatment of computational biology, from the most basic concepts to advanced applications. Algorithmic in nature, the handbook highlights applications to molecular biology through every topic covered. In addition, many of the newer topics in the field are covered in depth, like microarrays, comparative genomics and external memory algorithms, and parallel methods. Written by experts in the field, it covers problems related to understanding genetic diseases, the design of drugs tailored to the individual, deciphering the genomes of specific organisms, and understanding the process of evolution.

From the elucidation and analysis of a genomic sequence to the prediction of a protein structure and the identification of the molecular function, Introduction to Bioinformatics describes the rationale and limitations of the bioinformatics methods and tools that can help solve biological problems. The author addresses the ways to store and retrieve biological data, decrypt information encoded by genomes, and detect and exploit the evolutionary and functional relationships among biological elements. The book also includes material on proteomics that is not found in any other basic bioinformatics textbook. It concludes with a discussion of the future of bioinformatics.

Catalog no. C061, ISBN: 978-1-58488-406-4 2006, 7 x 10, 1104 pp. Suggested Price: $144.95 / £79.99

Catalog no. C5696, ISBN: 978-1-58488-569-6 2007, 6-1/8 x 9-1/4, 192 pp., Soft Cover Suggested Price: $62.95 / £34.99

University of Rome La Sapienza, Italy

Computational Biology

Iowa State University, Ames, USA

Textbook

Handbook of Hidden Markov Models in Bioinformatics Martin Gollery

Active Motif, Incline Village, Nevada Series: Chapman & Hall/CRC Mathematical & Computational Biology

Introduction to Machine Learning and Bioinformatics Sushmita Mitra, Sujay Datta, Theodore Perkins, and George Michailidis

15

University of Michigan, Ann Arbor, USA Series: Chapman & Hall/CRC Computer Science & Data Analysis

Demonstrating that many useful resources can benefit most bioinformatics projects, this handbook focuses on how to choose and use various methods and programs available for HMMs. It explores HMM implementations important in bioinformatics, including SAM, HMMER, Wise2, PSI-BLAST, and MetaMEME, and shows how numerous databases and programs, such as Pfam, SMART, SUPERFAMILY, and PANTHER, are used in bioinformatics projects. With the inclusion of problem sets in each chapter and a CD-ROM of related material, the book discusses the use of HMMs for discovering the homology of a protein family, explains how to build custom HMM databases, and offers solutions to help overcome slow searches.

Examining the connections between these two increasingly intertwined areas, this text presents a unifying, thorough, and accessible introduction to the basic ideas and latest developments in machine learning and bioinformatics. It describes the major problems in bioinformatics and the concepts and algorithms of machine learning. The authors demonstrate the capabilities of key machine learning techniques, such as hidden Markov models and artificial neural networks, and apply state-of-the-art techniques to bioinformatics problems in structural biology, cancer treatment, and proteomics. They also include exercises at the end of some chapters and offer instructional materials on their website.

Catalog no. C6846, ISBN: 978-1-58488-684-6 2008, 6-1/8 x 9-1/4, 176 pp. Suggested Price: $59.95 / £33.99

Catalog no. C682X, ISBN: 978-1-58488-682-2 2008, 6-1/8 x 9-1/4, 384 pp. Suggested Price: $79.95 / £39.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 15

12/19/08 10:25:15 AM


For more information and a complete list Textbook

An Introduction to Systems Biology Design Principles of Biological Circuits Uri Alon

Methods in Microarray Normalization Edited by

Computational Biology

Harvard Medical School, Boston Massachusetts, USA

Phillip Stafford

Series: Chapman & Hall/CRC Mathematical & Computational Biology, 10

Series: Drug Discovery Series

This text presents recently discovered design principles that govern the structure and behavior of biological networks such as gene circuits, highlighting simple, recurring circuit elements that make up the network. It provides a quantitative theory for which circuits are found in a given environment, and a mathematical framework for understanding and even designing biological circuits. Requiring knowledge of only basic mathematics, the book includes a review of the necessary background material. It fills a significant need for a thorough introduction to the concepts, principles, and mathematical tools that will form the basis of future developments in the field. Catalog no. C6420, ISBN: 978-1-58488-642-6 2007, 7 x 10, 320 pp., Soft Cover Suggested Price: $57.95 / £31.99

Kinetic Modelling in Systems Biology 16 Oleg Demin

Arizona State University, Tempe, USA

This text compiles, for the first time, the most useful normalization methods developed for interpreting microarray data. Experts examine the mathematical processes that are important in normalizing data and avoiding inherent systematic biases. They also review modern software, including discussions on key algorithms, comparative data, and download locations. The book contains the latest microarray innovations from companies such as Agilent, Affymetrix, and GeneGo as well as new, readily adaptable normalization methods for expression and CGH arrays. It also provides lists of available open-source molecular profiling normalization algorithms available and reveals where to access them. Catalog no. 52780, ISBN: 978-1-4200-5278-7 2008, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $79.95 / £44.99

Microarray Innovations

Technology and Experimentation

Moscow State University, Moscow, Russia

Edited by

Igor Goryanin

Gary Hardiman

University of Edinburgh, Scotland Series: Chapman & Hall/CRC Mathematical & Computational Biology, 19

University of California at San Diego, La Jolla, USA Series: Drug Discovery Series, 11

Focusing on one of the main pillars in the future development of systems biology, this book explores the kinetic modelling approach and how to apply it to solve real-life problems. It covers model creation techniques, model verification and validation, and simulations and interpretation of biological results. The authors describe underlying algorithms for selected reference methods and present several examples of applications, ranging from drug safety mechanisms to multiple target identification analysis to optimization of E. coli amino acid biosynthesis. The accompanying CD-ROM contains pathway diagrams, model examples, EPE software, and DBSolve installation.

Microarray technologies and applications have evolved steadily with increasing content and better analytical methodologies. This compendium represents a cross section of the past five years of microarray methods and applications and their usage in drug discovery and biomedical research. Expert contributors cover improvements in automation, new substrates for printing arrays, platform comparisons and contrasts, experimental design, data normalization and mining schemes, epigenomic array studies, electronic microarrays, comparative genomic hybridization, microRNA arrays, mutational analyses, clinical diagnostic arrays, protein arrays and neuroscience applications.

Catalog no. C6676, ISBN: 978-1-58488-667-9 January 2009, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $79.95 / £44.99

Catalog no. 94483, ISBN: 978-1-4200-9448-0 March 2009, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $129.95 / £78.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 16

12/19/08 10:25:16 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Textbook

Suzanne Lenhart

University of Tennessee, Knoxville, USA

John T. Workman

Python for Bioinformatics Sebastian Bassi

Cornell University, Ithaca, New York, USA

Universidad Nacional de Quilmes, Bernal, Argentina

Series: Chapman & Hall/CRC Mathematical & Computational Biology

Series: Chapman & Hall/CRC Mathematical & Computational Biology

This text introduces the mathematical aspects of optimal control theory and provides insight into the application of this theory to biological models. It examines various problems, such as the continuous time ordinary differential equation, variations of the initial conditions, linear dependence on the control, and free terminal time. The book also features a range of biological applications, including immunology and epidemic disease models, management decisions in harvesting, and resource allocation models. With numerous examples and exercises, the text includes MATLAB® codes throughout, enabling readers to modify the codes for their own applications.

Python is a popular computer language used in a wide range of applications, from peer-to-peer software to dynamic generated web pages. Python for Bioinformatics provides an accessible introduction to both the Python and BioPython languages. The book addresses advanced topics, from web applications and XML to databases and version control. In addition to useful appendices with reference material on biological file formats, the book presents commented working code and new programming techniques, such as error handling, functions, and modules. It also includes source code as well as a companion CD-ROM that contains a virtual machine with complete installation and a working web server.

Catalog no. C6404, ISBN: 978-1-58488-640-2 2007, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $89.95 / £46.99

Catalog no. C9292, ISBN: 978-1-58488-929-8 May 2009, 6-1/8 x 9-1/4, 456 pp., Soft Cover Suggested Price: $59.95 / £36.99

Pattern Discovery in Bioinformatics Theory & Algorithms

R Programming for Bioinformatics

Laxmi Parida

Robert Gentleman

IBM TJ Watson Research Center, Yorktown Heights, New York, USA

Computational Biology

Optimal Control Applied to Biological Models

17

Fred Hutchinson Cancer Research Center, Washington, USA

Series: Chapman & Hall/CRC Mathematical & Computational Biology

Series: Chapman & Hall/CRC Computer Science & Data Analysis

Taking a systematic approach to pattern discovery, this self-contained book supplies sound mathematical definitions and efficient algorithms to explain vital information about biological data. A solid foundation in computational methods, it explores various data patterns, including strings, clusters, permutations, topology, partial orders, and boolean expressions, to capture a different form of regularity in the data. The book focuses on models of biological sequences, including DNA, RNA, and protein sequences. With numerous exercises at the end of each chapter, it also reviews basic statistics, including probability, information theory, and the central limit theorem.

Drawing on the author’s first-hand experiences as an expert in R, this practical guide focuses on the programming skills needed to use R for the solution of bioinformatics and computational biology problems. It covers the fundamentals of the R language, objectoriented programming in R, and data mark-up and web services languages and tools. The author also examines different aspects of string handling and manipulations; discusses the interfacing of R with other languages, such as C, FORTRAN, Perl, and Python; and explains how to write software packages as well as debug and profile R code. The complete source code is available on the book’s website.

Catalog no. C5491, ISBN: 978-1-58488-549-8 2008, 6-1/8 x 9-1/4, 512 pp. Suggested Price: $83.95 / £46.99

Catalog no. C6367, ISBN: 978-1-4200-6367-7 January 2009, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $69.95 / £38.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 17

12/19/08 10:25:16 AM


For more information and a complete list Statistical and Computational Pharmacogenomics Rongling Wu

University of Florida, Gainesville, USA

Stochastic Modelling for Systems Biology

Min Lin

Darren J. Wilkinson

Duke Clinical Research Institute, Durham, North Carolina, USA

Computational Biology 18

Textbook

Newcastle University, UK

Series: Interdisciplinary Statistics

Series: Chapman & Hall/CRC Mathematical & Computational Biology, 11

Due to the tremendous accumulation of data for genetic markers, pharmacogenomics, the study of the functions and interactions of all genes in the overall variability of drug response, is one of the hottest areas of research in biomedical science. Statistical and Computational Pharmacogenomics presents recent developments in statistical methodology with a number of detailed worked examples that outline how these methods can be applied. This comprehensive volume provides key tools needed to understand and model the genetic variation for drug response and equips statisticians with a thorough understanding of this complex field and how computational skills can be employed.

Although stochastic kinetic models are increasingly accepted as the best way to represent and simulate genetic and biochemical networks, most researchers in the field have limited knowledge of stochastic process theory. Stochastic Modelling for Systems Biology provides an accessible introduction to this theory using examples that are familiar to systems biology researchers. Focusing on computer simulation, the author examines the use of stochastic processes for modelling biological systems. Along with the latest simulation techniques and research material, such as parameter inference, the text includes many examples and figures as well as software code in R for various applications.

Catalog no. C8288, ISBN: 978-1-58488-828-4 January 2009, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $79.95 / £44.99

Catalog no. C5408, ISBN: 978-1-58488-540-5 2006, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $88.95 / £49.99

Textbook

Textbook

Statistics in Human Genetics and Molecular Biology

Structural Bioinformatics

An Algorithmic Approach

Cavan Reilly

Forbes J. Burkowski

University of Minnesota, Minneapolis, USA

University of Waterloo, Ontario, Canada

Series: Chapman & Hall/CRC Texts in Statistical Science Series

Series: Chapman & Hall/CRC Mathematical & Computational Biology, 20

Focusing on problems in contemporary genetics and molecular biology, this text describes basic statistical methods used in genetics. It covers cluster analysis, combinatorial optimization, and dynamic programming, along with the core topics of genome mapping, biological sequence analysis, and the analysis of gene expression arrays. The author also explores Bayesian approaches, such as hidden Markov models and block motif methods, as well as modern tools of Bayesian analysis, including Markov chain Monte Carlo (MCMC). The text features a number of worked examples and problem sets at the end of each chapter.

Showcasing the beauty of protein structures, this practical text illustrates how to apply key algorithms to solve problems related to macromolecular structure. It emphasizes a methodology that uses mathematical models to act as links between structural biology and computational algorithms. The author shows that protein structure can produce symmetry and beauty as well as biological function. He also gives many examples of dynamic programming applications, including RNA secondary structure prediction and protein sequence alignment. The book includes problems throughout the text, exercises at the end of each chapter, and a 12-page color insert.

Catalog no. C7263, ISBN: 978-1-4200-7263-1 June 2009, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $59.95 / £36.99

Catalog no. C6838, ISBN: 978-1-58488-683-9 January 2009, 6-1/8 x 9-1/4, 429 pp. Suggested Price: $79.95 / £44.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 18

12/19/08 10:25:17 AM


Textbook

Systems Biology and Bioinformatics

The 3-D Global Spatial Data Model

A Computational Approach

Foundation of the Spatial Data Infrastructure

Kayvan Najarian

Earl F. Burkholder

University of North Carolina, Charlotte, USA

New Mexico State University, Las Cruces, USA

Emphasizing computational methods, Systems Biology and Bioinformatics provides an introduction to systems biology and its impact on biology and medicine. The book reviews the basic principles of molecular and cell biology using a system-oriented approach, with a brief description of the high-throughput biological experiments that produce databases. The methods presented in the text include techniques to discover genes, perform nucleotide and amino acid sequence matching, and estimate static gene dynamic pathways. The book also explains how to use system-oriented models to predict the behavior of biological systems for important applications such as rational drug design.

This book offers a new model for handling digital spatial data, the global spatial data model or GSDM. This groundbreaking spatial model incorporates both a functional model and a stochastic model to connect the physical world to the ECEF rectangular system. Combining horizontal and vertical data into a single, three-dimensional database, this authoritative monograph provides a logical development of theoretical concepts and practical tools that can be used to handle spatial data more efficiently. The book clearly describes procedures that can be used to handle both ECEF and flat-Earth rectangular components in the context of a rigorous global environment.

Catalog no. 46500, ISBN: 978-1-4200-4650-2 April 2009, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $89.95 / £48.99

Catalog no. 63014, ISBN: 978-1-4200-6301-1 2008, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $119.95 / £66.99

Computational Biology / Computer Engineering

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Autonomic Computing

Systems Biology

Concepts, Infrastructure, and Applications

Principles, Methods, and Concepts

19

Edited by

Edited by

Manish Parashar

A.K. Konopka

BioLingua Research, Inc., Gaithersburg, Maryland, USA

With extraordinary clarity, Systems Biology: Principles, Methods, and Concepts focuses on the technical, practical aspects of modeling complex or organic general systems. It also provides in-depth coverage of modeling biochemical, thermodynamic, engineering, and ecological systems. Among other methods and concepts based in logic, computer science, and dynamical systems, it explores pragmatic techniques of general systems theory. This text presents biology as an autonomous science from the perspective of fundamental modeling techniques. A complete resource for anyone interested in biology as an exact science, it includes a comprehensive survey, review, and critique of concepts and methods in systems biology. Catalog no. DK3072, ISBN: 978-0-8247-2520-4 2007, 7 x 10, 256 pp. Suggested Price: $73.95 / £40.99

Rutgers University, Piscataway, New Jersey, USA

Salim Hariri

University of Arizona, Tucson, USA

Autonomic computing systems mimic the human autonomic nervous system to realize a set of “self-*” properties, including selfconfiguration, self-healing, self-optimization, and self-protection. This book begins by introducing the concepts and requirements of autonomic computing and exploring the architectures required to implement such a system. The focus then shifts to the approaches and infrastructures followed by enabling systems, technologies, and services proposed for achieving the self-* properties. In the final section, real-world implementations reveal the applications of emerging autonomic systems, such as dynamic server allocation and runtime reconfiguration and repair. Catalog no. 9367, ISBN: 978-0-8493-9367-9 2007, 6-1/8 x 9-1/4, 568 pp. Suggested Price: $114.95 / £63.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 19

12/19/08 10:25:18 AM


For more information and a complete list The Compiler Design Handbook

Optimizations and Machine Code Generation, Second Edition

The Computer Engineering Handbook Second Edition 2 Volume Set

Computer Engineering

Edited by

Edited by

Y.N. Srikant and Priti Shankar

Vojin G. Oklobdzija

Current computer architectures pose challenges that exceed the capabilities of traditional compilation techniques. Presenting the latest information on optimizations and code generation, The Compiler Design Handbook, Second Edition features 14 new chapters that cover such topics as just-in-time compilation, energy aware compiler optimizations, garbage collection, optimizations for memory hierarchy, profiling and applications, static analysis for secure information flow, compilation for embedded systems, worstcase execution time analysis, software protection, and techniques for debugging software. Chapters on register allocation, software pipelining, and type systems also feature new material.

After nearly six years as the field’s leading reference, the second edition of this award-winning handbook reemerges with completely updated content and a brand new format. The Computer Engineering Handbook, Second Edition is now offered as a set of two carefully focused books that together encompass all aspects of the field. In addition to complete updates throughout the book to reflect the latest issues in low-power design, embedded processors, and new standards, this edition includes a new section on computer memory and storage as well as several new chapters on such topics as semiconductor memory circuits, stream and wireless processors, and nonvolatile memory technologies and applications.

Catalog no. 4382X, ISBN: 978-1-4200-4382-2 2008, 7 x 10, 784 pp. Suggested Price: $144.95 / £79.99

Catalog no. 3860, ISBN: 978-0-8493-8600-8 2008, 7 x 10, 1648 pp. Suggested Price: $159.95 / £89.00

Indian Institute of Science, Bangalore, India

Computer Arithmetic

20 Systems Simulation Using

Simulink, Stateflow, and HDLs

University of California, Davis, USA

Computer Network Time Synchronization The Network Time Protocol

Evgeni Perelroyzen

David L. Mills

Dedicated first and foremost to the engineering implementation of arithmetic devices, this book familiarizes readers with the possibilities given by MATLAB® System tools (Simulink System) and HDLs in the development and implementation of the algorithms for the Computer Arithmetic Computations. The text contains a brief description of the Simulink System from the point of view of Simulink models construction. It examines the relevant component libraries for the construction of such models and for their activation and receiving the results of the simulating. The author also examines the Simulink Models for Arithmetic Systems for General Purpose Processors and Arithmetic Systems for DSP Processors.

Computer Network Time Synchronization explores the technological infrastructure of time dissemination, distribution, and synchronization. The author addresses the architecture, protocols, and algorithms of the Network Time Protocol (NTP) and discusses how to identify and resolve problems encountered in practice. He also demonstrates how to design and configure time synchronization networks and includes coverage of the theory and practice of security and reliability. Presented in engaging, accessible prose, this book offers information valuable to professionals developing time-sensitive computer and network applications, electrical and computer engineers, and computer scientists.

Catalog no. 61275, ISBN: 978-1-4200-6127-7 May 2009, 7 x 10, 550 pp. Suggested Price: $99.95 / £60.99

Catalog no. 5805, ISBN: 978-0-8493-5805-0 2006, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $114.95 / £63.99

Technion, Technion City, Haifa, Israel

University of Delaware, Newark, USA

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 20

12/19/08 10:25:18 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Contemporary Coding Techniques and Applications for Mobile Communications

Design Science Research Methods and Patterns

Osman Nuri Ucan

Vijay K. Vaishnavi

Istanbul University, Turkey

Innovating Information and Communication Technology William Kuechler Jr.

Istanbul Commerce University, Turkey

University of Nevada, Reno, USA

Contemporary Coding Techniques and Applications for Mobile Communications provides a clear, comprehensive, and practical foundation on the basics of contemporary coding techniques and their applications for mobile communications. The first half of the text presents fundamental information on modulation, multiplexing, channel models, and traditional coding methods; the second half explains advanced coding techniques, provides simulation results, and compares them with related methods. The book also presents new coding algorithms and explores new research areas such as image transmission, providing step-by-step guidelines. Catalog no. AU5461, ISBN: 978-1-4200-5461-3 February 2009, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $99.95 / £55.99

Context Aware Pervasive Systems

Just as research innovates technology, this book innovates research activities by breaking new ground with applying patterns, reuse, and design science to research. Design Science Research Methods and Patterns relies on familiar patterns to provide the solid fundamentals of various research philosophies and techniques as well as to demonstrate how to innovate research methods. Filled with practical examples of applying patterns to IT research with an emphasis on reusing research activities to save time and money, this book describes design science research in relation to other information systems research paradigms such as positivist and interpretivist research. Catalog no. AU5932, ISBN: 978-1-4200-5932-8 2008, 6-1/8 x 9-1/4, 248 pp. Suggested Price: $104.95 / £57.99

Digital Signal Processing Fundamentals

21

The Architecture of a New Breed of Applications

Edited by

Seng Loke

Series: The Digital Signal Processing Handbook, Second Edition

The concept of aware systems is one of the most exciting trends in computing today, fueled by recent developments in pervasive computing. This book introduces a new breed of computer applications that are termed “context aware pervasive systems” and provides architectural blueprints for building context aware behavior into applications. It reviews the anatomy of context aware pervasive applications, including mobile services, and discusses the integration of context aware computing with software agents and the Web. It also explores the use of context awareness for addressing and communications. This text distills general design principles and a generic architecture for context aware applications.

Drawing from the knowledge, experience, and insight of leading engineers, researchers, and scholars in the field, this book is one of three self-contained volumes in the new Digital Signal Processing Handbook, Second Edition. Emphasizing theoretical concepts, it features extensive updates on digital filtering, statistic signal processing, adaptive IT filters, and more. A new chapter focuses on conjugate gradients for inverse problems. The book also includes up-to-date sections on signal representation, optimization, and reconstruction; fast algorithms and structures; digital and adaptive filtering; and statistical and multirate signal processing

La Trobe University, Australia

Catalog no. AU7255, ISBN: 978-0-8493-7255-1 2007, 6-1/8 x 9-1/4, 240 pp. Suggested Price: $83.95 / £46.99

Computer Engineering

Georgia State University, Atlanta, USA

Onur Osman

Vijay K. Madisetti

Georgia Institute of Technology, Atlanta, USA

Catalog no. 46063, ISBN: 978-1-4200-4606-9 July 2009, 7 x 10, 700 pp. Suggested Price: $99.95 / £60.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 21

12/19/08 10:25:19 AM


For more information and a complete list

The Digital Signal Processing Handbook Second Edition 3 Volume Set Vijay K. Madisetti

Georgia Institute of Technology, Atlanta, USA

Computer Engineering

Series: Electrical Engineering Handbook, 11

Now available in a three-volume set, The Digital Signal Processing Handbook, Second Edition reflects the latest information on WiFi/WiMax, bandwidth compressive motors, low-power/highperformance DSPs, and more. It evaluates applications in speech, acoustics, video, radar, and telecommunications. Encompassing essential background, technical details, standards, and software, the set features extensive updates and 29 new chapters addressing Internet tomography, radar systems, architecture, and standards. Drawing from the knowledge, experience, and insight of leading engineers, researchers, and scholars, this text is ideal for graduate and professional courses on digital signal processing. Catalog no. 45636, ISBN: 978-1-4200-4563-5 July 2009, 7 x 10, 1930 pp. Suggested Price: $169.95 / £103.00

22

Digital Systems and Applications Edited by

Vojin G. Oklobdzija

University of California, Davis, USA

Discrete-Event Modeling and Simulation

A Practitioner’s Approach Gabriel A. Wainer

Carleton University, Ottawa, Ontario, Canada Series: Computational Analysis, Synthesis, and Design of Dynamic Systems

In recent years, numerous modeling techniques have been introduced to improve the definition and analysis of complex dynamic systems. Through a practical applications approach, this work provides a guide to the creation of discrete-event applications. In addition to presenting hundreds of online examples, this book uses the CD++ tool, an open-source framework that enables the simulation of discrete-event models with specialized support for cellular models. It is a complete text that demonstrates how to use CD++ to develop simulation models and define a variety of uses in different areas, such as biology and chemistry, as well as several artificial systems. Catalog no. 53361, ISBN: 978-1-4200-5336-4 January 2009, 7 x 10, 520 pp. Suggested Price: $99.95 / £60.99

Elementary Mathematical and Computational Tools for Electrical and Computer Engineers Using MATLAB® Second Edition

Series: The Computer Engineering Handbook, Second Edition

Jamal T. Manassah

After nearly six years as the field’s leading reference, the second edition of the award-winning Computer Engineering Handbook presents updated content and a brand new format. Part of this revision, Digital Systems and Applications surveys the latest advances in computer system technologies and the applications that are emerging to take advantage of increasingly sophisticated capabilities. Featuring contributions from leading experts, the book also includes new chapters on parallelizing iterative heuristics, stream and wireless processors, and lightweight embedded systems. Nearly every chapter features updated information that reflects new developments, trends, standards, and technologies.

Updated to conform to MATLAB® 7.1, this second edition discusses the practical tools of mathematics, covering numerical techniques of elementary calculus and linear algebra, difference equations, complex variables, transformation theory, and probability theory. It features a new appendix on symbolic manipulation with MATLAB, an expanded introductory chapter that reduces the need to refer to MATLAB online help or user manuals, and special advanced sections for students and professionals looking for more challenging material. The book also includes numerous exercises and examples that offer a glimpse into problems encountered in engineering practice.

Catalog no. 6195, ISBN: 978-0-8493-8619-0 2008, 7 x 10, 992 pp. Suggested Price: $104.95 / £57.99

Catalog no. 7425, ISBN: 978-0-8493-7425-8 2007, 6-1/8 x 9-1/4, 480 pp. Suggested Price: $83.95 / £46.99

City College of New York, USA

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 22

12/19/08 10:25:19 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Ye Lei

GALILEO Industries Ltd., Shangai, China

The rapid growth of ubiquitous mobile geographic information science has been enabled by expanding wireless coverage, more accurate positioning technologies, and the widespread adoption of mobile devices. This book presents the new inside-out model of GIS to implement WAP and J2ME modes for ubiquitous mobile geographic information services. Following a general overview, the author explains the technical architecture of the geographic information services system. Providing user requirements, system design, and a prototype, the system integration infrastructure is then proposed. The text concludes with a summary of the pervasive computing environment and a discussion of expanding global grids. Catalog no. AU6418, ISBN: 978-1-4200-6418-6 June 2009, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $99.95 / £60.99

Lih-Hsing Hsu

Providence University, Taichung, Taiwan, China

Cheng-Kuan Lin

National Central University, Chungli, Taiwan, China

The advancement of large scale integrated circuit technology has enabled the construction of complex interconnection networks. Graph theory provides a fundamental tool for designing and analyzing such networks. Graph Theory and Interconnection Networks provides a thorough understanding of these interrelated topics. After a brief introduction to graph terminology, this book presents well-known interconnection networks as examples of graphs, followed by in-depth coverage of Hamiltonian graphs. Different types of problems illustrate the wide range of available methods for solving such problems. The text also explores recent progress on the diagnosability of graphs under various models.

Computer Engineering

Geographic Information Services for Ubiquitous Mobile Services

Graph Theory and Interconnection Networks

Catalog no. 44818, ISBN: 978-1-4200-4481-2 January 2009, 6-1/8 x 9-1/4, 720 pp. Suggested Price: $149.95 / £83.00

Grid Computing

Textbook

Infrastructure, Service, and Applications

GIS

A Computing Perspective, Second Edition

Lizhe Wang

Michael Worboys

Beijing University, China

University of Maine, Orono, USA

Rochester Institute of Technology, USA

23

Wei Jie

Jinjun Chen

Matt Duckham

University of Melbourne, Victoria, Australia

Swinburne University of Technology, Melbourne, Australia

GIS: A Computing Perspective, Second Edition provides a full, up-to-date overview of the subjects referred to as GIS, both Geographic Information Systems and their related study: Geographic Information Science. Analyzing the subject from a computing perspective, the second edition explores conceptual and formal models needed to understand spatial information and examines the representations and data structures needed to support adequate system performance. This volume also covers the specialpurpose interfaces and architectures required to interact with and share spatial information and explains the importance of uncertainty and time in spatial information.

The research of Grid computing has made rapid progress in the last few years, developing and evolving in almost all key areas. A comprehensive discussion of recent advances in Grid computing, this book summarizes the concepts, methods, technologies, and applications. Unlike other recent books on the subject that deal only with parts of Grid computing, this one covers the entire field. With chapters based on recent research of Grid experts, it covers important topics such as philosophy, middleware, architecture, services, and applications. It also includes technical details to demonstrate how Grid computing works in the real world and a large number of references and technical reports.

Catalog no. TF1493, ISBN: 978-0-415-28375-5 2004, 7 x 10, 448 pp., Soft Cover Suggested Price: $89.95 / £51.99

Catalog no. 67664, ISBN: 978-1-4200-6766-8 March 2009, 6-1/8 x 9-1/4, 520 pp. Suggested Price: $129.95 / £78.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 23

12/19/08 10:25:20 AM


For more information and a complete list Integration Technologies for Industrial Automated Systems Edited by

Richard Zurawski

ISA Corporation, San Francisco, California, USA

Computer Engineering

Series: Industrial Information Technology, 3

In chapters drawn from Zurawski’s popular works, The Industrial Communication Technology Handbook and The Industrial Information Technology Handbook, this practical guide gives a detailed overview of the roles and uses of software and IT in the integration and communication networking of industrial automation systems. It authoritatively covers e-technologies, software technologies, and network-based technologies for enterprise integration, agentbased technologies for industrial automation, and IT security in automation systems. The book offers expert insight into the solutions, and emerging trends in each area. It also includes recent solutions and standards available for the first time. Catalog no. 9262, ISBN: 978-0-8493-9262-7 2007, 7 x 10, 600 pp. Suggested Price: $114.95 / £63.99

Quantum Computing Devices Principles, Designs, and Analysis

Goong Chen, David A. Church, Berthold-Georg Englert, Carsten Henkel, Bernd Rohwedder, Marlan O. Scully, and M. Suhail Zubairy

Texas A & M University, College Station, Texas, USA Series: Chapman & Hall/CRC Applied Mathematics & Nonlinear Science, 6

One of the first books to thoroughly discuss the most promising devices for the future, Quantum Computing Devices: Principles, Designs, and Analysis explores contemporary and important aspects of quantum computation, particularly focusing on quantum electronic devices as quantum gates. It presents the analysis, design, and modeling of the major types of quantum computing devices: ion traps, cavity quantum electrodynamics (QED), linear optics, quantum dots, nuclear magnetic resonance (NMR), superconducting quantum interference devices (SQUID), and neutral atom traps. Additional coverage includes quantum algorithms, two-level atoms, and imperfect quantum operations. Catalog no. C6811, ISBN: 978-1-58488-681-5 2007, 6-1/8 x 9-1/4, 560 pp. Suggested Price: $88.95 / £49.99

Textbook

24

Programming ArcObjects with VBA A Task-Oriented Approach, Second Edition Kang-Tsung Chang

National Taiwan University, Taipei, Taiwan

Quantum Error Correction and Fault Tolerant Quantum Computing Frank Gaitan

Southern Illinois University, Carbondale, USA

Programming ArcObjects with VBA: A Task-Oriented Approach, Second Edition adds macros and explanations for the new Geoprocessing object introduced in ArcGIS 9.x. Instead of treating this new feature in separate chapters, the author incorporates Geoprocessing code into the existing chapters. The code appears conveniently in boxes that let readers easily compare sample macros. The companion CD-ROM contains 95 complete ArcObjects macros and 33 Geoprocessing macros, along with datasets to execute the code. Each program begins with a short usage description and a list of key properties and methods, followed by the listing and explanation of the code itself.

Although it was once widely believed that quantum computation would never become a reality, the discovery of quantum error correction nearly ten years ago led to explosive development and research within the field. Quantum Error Correction and Fault Tolerant Quantum Computing provides a careful explanation of how quantum error correction is possible and how quantum stabilizer codes are constructed. With examples throughout the text, this book demonstrates how fault-tolerant quantum operations can be implemented on encoded quantum information and presents the accuracy threshold theorem for particular noise models. Featuring extensive references, it also includes homework problems in each chapter.

Catalog no. 9283, ISBN: 978-0-8493-9283-2 2008, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $93.95 / £51.99

Catalog no. 7199, ISBN: 978-0-8493-7199-8 2008, 6-1/8 x 9-1/4, 312 pp. Suggested Price: $99.95 / £44.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 24

12/19/08 10:25:21 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Textbook

Real-Time Digital Signal Processing from MATLAB® to C with the TMS320C6x DSK

Understanding Dynamics of Geographic Domains

Thad B. Welch

Kathleen Stewart Hornsby

Cameron H.G. Wright

May Yuan

Michael G. Morrow

A collection of peer-reviewed articles, this multidisciplinary book combines coverage of topics from the perspective of GIS, computer science, image processing, and information and data processing. It brings together specialists to present the latest research on visualization and computation of dynamics in geographic domains. The coverage incorporates theoretical, cognitive, methodological, and applied articles, making it not only a top-notch reference but also a textbook for a course in this field. Containing an 8-page color insert, the book is divided into three sections: Cognitive Aspects, Representation, and Data Models; Analysis, Computation, and Modeling; and Visualization and Simulation.

Edited by

University of Wyoming, Laramie, USA University of Wisconsin-Madison, USA

Cell phones, GPS receivers, and CD players are a few of the products that rely on real-time digital signal processing. This book bridges the growing divide between theory and practice using a stepby-step transition approach. It builds a practical framework that reinforces basic DSP theory using demonstrations, exercises, and projects that progress from theory to MATLAB® to real-time DSP hardware. The authors include a CD-ROM with all the source code, example files, test signals, and executable programs needed for the examples, exercises, and projects in the text. They also offer solutions throughout the book and challenges at the end of each chapter. Catalog no. 7382, ISBN: 978-0-8493-7382-4 2006, 7 x 10, 400 pp. Suggested Price: $83.95 / £46.99

University of Oklahoma, Norman, USA

Catalog no. 60341, ISBN: 978-1-4200-6034-8 2008, 6-1/8 x 9-1/4, 240 pp. Suggested Price: $99.95 / £55.99

Reconfigurable System Design and Verification

Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing

Pao-Ann Hsiung and Chun-Hsian Huang

Edited by

Vijay K. Madisetti

Marco D. Santambrogio

Universita degli Studi di Milano, Italy

Series: The Digital Signal Processing Handbook, Second Edition

Focusing on system-level design and verification techniques, this text allows readers to immediately grasp concepts and put them into practice. It starts with an overview of reconfigurable computing architectures and platforms and demonstrates how to develop reconfigurable systems. This sets up the discussion of the hardware, software, and system techniques that form the core of the text. The authors classify design and verification techniques into primary and secondary categories, allowing the appropriate ones to be easily located and compared. The techniques discussed range from system modeling and system-level design to co-simulation and formal verification.

Drawing from the knowledge, experience, and insight of leading engineers, researchers, and scholars in the field, Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing is one of three self-contained volumes in the new Digital Signal Processing Handbook, Second Edition. Emphasizing current and future directions of digital signal processing applications in these areas, this edition features three new sections on wireless, networks, and radars. It also includes 22 new chapters that present complete coverage of WiFi, WiMax, ultra wideband applications, broadband networking, Internet tomography, detection and estimation, and synthetic aperture radar systems.

Catalog no. 62662, ISBN: 978-1-4200-6266-3 February 2009, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $99.95 / £60.99

Catalog no. 46047, ISBN: 978-1-4200-4604-5 July 2009, 7 x 10, 760 pp. Suggested Price: $99.95 / £60.99

National Chung Cheng University, Chiayi, Taiwan

Computer Engineering

University of Iowa, Iowa City, USA

Boise State University, Idaho, USA

25

Georgia Institute of Technology, Atlanta, USA

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 25

12/19/08 10:25:22 AM


For more information and a complete list

The Circuits and Filters Handbook Computer Engineering / Circuits & Chips

Third Edition (Five Volume Slipcase Set) Edited by

Spidergon STNoC

Marcello Coppola, Miltos D. Grammatikakis, Riccardo Locatelli, Giuseppe Maruccia, and Lorenzo Pieralisi

Wai-Kai Chen

Series: System-on-Chip Design and Technologies

In its third edition, this groundbreaking bestseller surveys current accomplishments in the field while providing researchers and designers with the comprehensive detail they need for continued research and design. All five volumes have been extensively updated to provide the most current information available in the emerging fields of circuits and filters, both analog and digital. With contributions from more than 150 leading international experts, this reference includes the key mathematical formulas, concepts, definitions, and derivatives that those involved with cutting-edge research and design require. It eschews extensively detailed theory to concentrate on professional applications with numerous examples provided throughout the. The set includes more than 2500 illustrations and hundreds of references. Available as a comprehensive six-volume set, each of the subject-specific volumes can also be purchased separately.

Written by leading experts in the field, Design of CostEfficient Interconnect Processing Units: Spidergon STNoC comprehensively examines the current state-of-the-art and future trends in multiprocessor system-on-chip (MPSoC), in particular network-on-chip (NoC) design. Incorporating simple methods with easy-to-understand examples, this book considers a wealth of important theoretical and practical topics, such as technological deep sub-micron effects, generic NoC components, topological properties, embeddings of common communication patterns, and system-level design. A complementary CD-ROM features a practical NoC training approach based on the award-winning OCCN environment.

University of Illinois, Chicago, USA

Order the Set and Save! Catalog no. 55275, ISBN: 978-1-4200-5527-6 April 2009, 7 x 10, 3150 pp. Suggested Price: $199.95 / £121.00 : Suggested Price for Individual Volumes: $99.95 / £60.99

26

Design of CostEfficient Interconnect Processing Units

Analog and VLSI Circuits Catalog no. 58916, ISBN: 978-1-4200-5891-8 April 2009, 7 x 10, 725 pp.

Computer Aided Design and Design Automation Catalog no. 59181, ISBN: 978-1-4200-5918-2 April 2009, 7 x 10, 419 pp.

Fundamentals of Circuits and Filters Catalog no. 58878, ISBN: 978-1-4200-5887-1 April 2009, 7 x 10, 964 pp.

Nonlinear and Distributed Circuits Catalog no. 58819, ISBN: 978-1-4200-5881-9 April 2009, 7 x 10, 320 pp.

Passive, Active, and Digital Filters Catalog no. 58851, ISBN: 978-1-4200-5885-7 April 2009, 7 x 10, 700 pp.

Catalog no. 44710, ISBN: 978-1-4200-4471-3 January 2009, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $129.95 / £72.99

Digital Design and Fabrication Edited by

Vojin G. Oklobdzija

University of California, Davis, USA Series: The Computer Engineering Handbook, Second Edition

Featuring contributions from leading experts, Digital Design and Fabrication surveys the latest advances in computer architecture and design and the technologies used to manufacture and test them. The book includes a section on memory and storage as well as chapters on semiconductor memory circuits and nonvolatile memory technologies and applications. Offering up-to-date information in every chapter, the book provides a comprehensive, state-of-theart survey of modern computer system design, architecture, and fabrication. It also explores new developments, trends, standards, and technologies. Catalog no. 0200, ISBN: 978-0-8493-8602-2 2008, 7 x 10, 656 pp. Suggested Price: $104.95 / £57.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 26

12/19/08 10:25:22 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Digital Design and Verilog HDL Fundamentals

Digital Integrated Circuits

Design-for-Test Using Simulink® and Stateflow®

Joseph Cavanagh

Evgeni Perelroyzen

Comprehensive and self-contained, this tutorial covers the design of a plethora of combinational and sequential logic circuits using conventional logic design and Verilog HDL. Number systems and number representations are presented along with various binary codes. Several advanced topics are covered, including functional decomposition and iterative networks. A variety of examples are provided for combinational and sequential logic, computer arithmetic, and advanced topics such as Hamming code error correction. Constructs supported by Verilog are described in detail, and all designs are continued to completion. Each chapter includes numerous design issues of varying complexity.

This volume demonstrates how to incorporate Simulink® and Stateflow® into the process of modern digital design. It describes the tools and concepts for simulating interactions, testing systems, and detecting design faults, allowing for better results in the design flow process. The book covers fault modeling and simulation, VLSI testability analysis, the ATPG process, deterministic algorithms, timing verification, and system and embedded core testing. It begins by introducing the Simulink and Stateflow tools, and continues with descriptions of test development and simulation processes. The author also provides examples of Simulink modeling and simulation for the latest design-for-test fields.

Catalog no. 74156, ISBN: 978-1-4200-7415-4 2008, 7 x 10, 1168 pp. Suggested Price: $139.95 / £77.99

Catalog no. 3057, ISBN: 978-0-8493-3057-5 2007, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $109.95 / £60.99

Santa Clara University, California, USA

Technion, Technion City, Haifa, Israel

Computer Engineering / Circuits & Chips

Textbook Textbook

Textbook

Digital Integrated Circuits

Textbook

John E. Ayers

University of Connecticut, Storrs, USA

Svetlana N. Yanushkevich and Vlad P. Shmerko

There is no field of enterprise today more dynamic or challenging than digital integrated circuits. Because of its rapid growth, the field has quickly outgrown most of the available books. Providing a revised instructional text for engineers involved with very large scale integrated circuit design and fabrication, this second edition delves into the dramatic advances, including new applications and changes in the physics of operation made possible by relentless miniaturization. The book includes numerous worked examples, case studies and SPICE computer simulations. An accompanying website offers supplementary material, and qualifying instructors have access to a new instructor’s manual.

With an abundance of insightful examples, problems, and computer experiments, this volume provides a balanced, easy-to-read treatment of the fundamental theory of logic functions and applications in the design of digital devices and systems. It presents the most popular contemporary logic network design techniques based on decision diagrams—an element not found in most standard texts. Focusing on the manipulation of various data structures, the book covers both traditional and advanced topics of logic design, including decision trees and diagrams, and highlights recent key trends, such as nanoelectronics, in the theory and practice of logic network design.

Catalog no. 6987X, ISBN: 978-1-4200-6987-7 June 2009, 6-1/8 x 9-1/4, 750 pp. Suggested Price: $99.95 / £39.99

Catalog no. 60945, ISBN: 978-1-4200-6094-2 2008, 7 x 10, 720 pp. Suggested Price: $129.95 / £49.99

Analysis and Design, Second Edition

27

Introduction to Logic Design University of Calgary, Alberta, Canada

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 27

12/19/08 10:25:23 AM


For more information and a complete list Electronic Design Automation for Integrated Circuits Handbook Computer Engineering / Circuits & Chips

2 Volume Set

Hoi-Jun Yoo and Jun Kyong Kim KAIST, Daejeon, South Korea

Edited by

Kangmin Lee

Louis Scheffer

Cadence Design Systems, San Jose, California, USA

Luciano Lavagno

Cadence Berkeley Laboratories, California, USA

Grant Martin

Tensilica Inc., Santa Clara, California, USA Series: Industrial Information Technology, 3

Presenting a comprehensive overview of the design automation algorithms, tools, and methodologies used to design integrated circuits, the Electronic Design Automation for Integrated Circuits Handbook is available in two volumes. Individually, each volume provides a focused treatment of specialized aspects of design automation. Combined, they provide the most complete reference available in the field, providing unmatched coverage and convenience. The first volume examines system-level and microarchitectural design, logical verification, and testing. The second volume explores RTL to GDSII implementation, analog/ mixed signal design (AMS), physical verification, and technology CAD (TCAD).

Save on the complete set! 28

Low-Power NoC for High-Performance SoC Design

Catalog no. 3096, ISBN: 978-0-8493-3096-4 2006, 7 x 10, 1152 pp. Suggested Price: $164.95 / £92.00

EDA for IC System Design, Verification, and Testing Catalog no. 7923, ISBN: 978-0-8493-7923-9 2006, 7 x 10, 544 pp. Suggested Price: $114.95 / £63.99

EDA for IC Implementation, Circuit Design, and Process Technology Catalog no. 7924, ISBN: 978-0-8493-7924-6 2006, 7 x 10, 608 pp. Suggested Price: $114.95 / £63.99

Samsung Electronics Co, Suwon-si, Korea Series: System-on-Chip Design and Technologies

This resource provides practical knowledge and real examples of how to optimize communication through NoC and how to use NoC in the design of SoC. Employing the UML throughout, the text presents complicated concepts, such as models of computation and communication–computation partitioning in a manner accessible to laypeople. The authors provide guidelines on how to simplify complex networking theory to design a working chip. In addition, they explore the novel NoC techniques and implementations of the BONE project. Examples of real-time decisions, circuit-level design, systems, and chips give the material a real-world context. Catalog no. 51725, ISBN: 978-1-4200-5172-8 2008, 6-1/8 x 9-1/4, 304 pp. Suggested Price: $129.95 / £72.99

Microcontroller Programming

The Microchip PIC® Julio Sanchez

Minnesota State University, Mankato, USA

Maria P. Canton

South Central College, North Mankato, Minnesota, USA

Using the popular and pervasive mid-range 8-bit Microchip PIC® as an archetype, Microcontroller Programming offers a self-contained presentation of the multidisciplinary tools needed to design and implement modern embedded systems and microcontrollers. The authors begin with basic electronics, number systems, and data concepts. They continue with digital logic, arithmetic, conversions, circuits, and circuit components to build a firm background in the computer science and electronics fundamentals involved in programming microcontrollers. For the remainder of the book, they focus on PIC architecture and programming tools and work systematically through programming various functions, modules, and devices. Catalog no. 7189, ISBN: 978-0-8493-7189-9 2007, 7 x 10, 824 pp. Suggested Price: $144.95 / £79.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 28

12/19/08 10:25:24 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Microprocessors and Microcomputer-Based System Design

Microcontrollers

Fundamentals and Applications with PIC Fernando E. Valdes-Perez

Universidad de Oriente, Santiago de Cuba, Cuba

Ramon Pallas-Areny

Second Edition

Mohamed Rafiquzzaman

EPSC-UPC, Castelldefels, Spain

California State Polytechnic University, Pomona, USA

While the official documentation provided for the PIC family from Microchip is extensive, it can also be overwhelming. This book gives users the information necessary to understand the architecture and the programming of microcontrollers. Each topic is described using a reader-centered, top-bottom approach. First, the authors describe the concepts that are common to any microcontroller. Each of the topics is then detailed for PIC microcontrollers. Practical applications supplement each topic to provide further clarity. This book does not limit itself to a digital view of microcontrollers. Instead, it includes aspects of analog signals such as the acquisition and processing of external analog signals.

Microprocessors and Microcomputer-Based System Design, Second Edition discusses the basics of microprocessors, various 32-bit microprocessors, the 8085 microprocessor, the fundamentals of peripheral interfacing, and Intel and Motorola microprocessors. This classic volume includes topics such as floating-point arithmetic, Program Array Logic, and flash memories. It covers the Intel 80486/80960, Motorola 68040, and the Pentium and PowerPC microprocessors, offering detailed descriptions of the architectures, addressing modes, instruction sets, I/O, and system design concepts. The final chapter presents system design concepts, applying the design principles covered in previous chapters to sample problems.

Catalog no. 77678, ISBN: 978-1-4200-7767-4 February 2009, 6-1/8 x 9-1/4, 310 pp. Suggested Price: $99.95 / £60.99

Catalog no. 4475, ISBN: 978-0-8493-4475-6 1995, 7 x 10, 800 pp. Suggested Price: $144.95 / £79.99

Microjoining and Nanojoining Edited by

Protective Relaying

Computer Engineering / Circuits & Chips

Textbook

29

Theory and Applications, Second Edition Walter A. Elmore

Y. Zhou

University of Waterloo, Canada

ABB Power T&D Company, Inc., Coral Springs, Florida, USA

A comprehensive review of microjoining processes and techniques, this book covers solid-state bonding and fusion microwelding, then moves on to microjoining and nanojoining processes. These include bonding mechanisms and metallurgy, process development and optimization, thermal stresses and distortion, positioning and fixturing, sensing, and numerical modelling. It discusses microjoining of materials, including plastics, ceramics, metals, along with advanced materials such as shape memory alloys and nanomaterials. It also presents applications of microjoining, including joining superconductors, the manufacture of medical devices, and the sealing of solid oxide fuel cells.

Targeting the latest microprocessor technologies for more sophisticated applications in the field of power system short-circuit detection, this revised and updated edition imparts fundamental concepts and breakthrough science for the isolation of faulty equipment and minimization of damage in power system apparatus. The second edition clearly describes key procedures, devices, and elements crucial to the protection and control of power system function and stability. It includes chapters and expertise from the most knowledgeable experts in the field of protective relaying and describes microprocessor techniques and troubleshooting strategies in clear and straightforward language.

Catalog no. WP7083, ISBN: 978-1-4200-7083-5 2008, 6-1/8 x 9-1/4, 500 pp. Suggested Price: $339.95 / £179.00

Catalog no. DK2125, ISBN: 978-0-8247-0972-3 2004, 8-1/2 x 11, 432 pp. Suggested Price: $164.95 / £92.00

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 29

12/19/08 10:25:24 AM


For more information and a complete list

Computer Engineering / Circuits & Chips

Textbook

Textbook

Sequential Logic

Verilog HDL

Analysis and Synthesis

Digital Design and Modeling

Joseph Cavanagh

Joseph Cavanagh

Santa Clara University, California, USA

Santa Clara University, California, USA

Emphasizing structured and rigorous design principles that can be applied to practical applications, Sequential Logic offers a thorough exposition of the analysis and synthesis of both synchronous and asynchronous sequential machines. This book reviews the analysis of combinatorial logic, defines sequential machines, and discusses methods for synthesizing synchronous sequential machines. It also covers the analysis and synthesis of asynchronous sequential machines and pulse-mode asynchronous sequential machines. The author presents basic and advanced concepts in sequential machine analysis and synthesis for practicing electrical and computer engineers, undergraduate, and graduate students.

Providing a firm foundation in the design of digital systems using Verilog HDL, this self-contained book presents the complete Verilog language together with a wide variety of examples. It describes the different modeling constructs supported by Verilog with numerous examples designed in each chapter. Where applicable, a detailed review of the theory of the topic is presented together with the logic design principles. All designs are carried through to completion, nothing is left unfinished or partially designed. Each chapter includes numerous problems of varying complexity to be designed by the reader. The Verilog code is available for download online.

Catalog no. 7564, ISBN: 978-0-8493-7564-4 2006, 7 x 10, 912 pp. Suggested Price: $124.95 / £69.99

Unique Chips and Systems 30

Edited by

Catalog no. 51547, ISBN: 978-1-4200-5154-4 2007, 7 x 10, 920 pp. Suggested Price: $124.95 / £69.99

The VLSI Handbook

Eugene John

Second Edition

The University of Texas, San Antonio, USA

Edited by

Juan Rubio

Wai-Kai Chen

Austin, Texas, USA

University of Illinois, Chicago, USA

Series: Computer Engineering Series

Series: Electrical Engineering Handbook, 15

While the integration ability of modern semiconductor technology presents opportunities, issues in power consumption, reliability, and form-factor present challenges. This book explores systems and chips that provide new approaches to designing future computing and communication systems. It presents the TRIPS processor architecture and microarchitecture, the CELL processor from IBM STI, and the continuation based Fuce multi-threading processor. Extended analog computers, Ravenscar, hardware-implemented run-time kernel with delay queues, formal state models and their simulations, and example graphics applications that require enormous computing power complete the coverage.

Written by a stellar international panel of expert contributors, this handbook remains the most up-to-date, reliable, and comprehensive source for real answers to practical problems. In addition to updated information on most topics, this edition features several heavily revised and completely rewritten chapters, new chapters on such topics as CMOS fabrication and high-speed circuit design, heavily revised sections on testing of digital systems and design languages, and two entirely new sections on low-power electronics and VLSI signal processing. An updated compendium of references and other resources, such as software, databases, standards, and seminars, points toward more in-depth information.

Catalog no. 51741, ISBN: 978-1-4200-5174-2 2008, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $104.95 / £57.99

Catalog no. 4199, ISBN: 978-0-8493-4199-1 2007, 7 x 10, 2320 pp. Suggested Price: $185.95 / £103.00

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 30

12/19/08 10:25:25 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Edited by INRIA/RealTime-at-Work, Vandoeuvre Les Nancy, France

Embedded Systems Handbook

Francoise Simonot-Lion

Edited by

Nicolas Navet

Loria/Nancy-Universite INPL, Vandoeuvre Les Nancy, France

Richard Zurawski

Series: Industrial Information Technology

Series: Industrial Information Technology, 6

Highlighting requirements, technologies, and business models, this handbook provides a comprehensive overview of existing and future automotive electronic systems. It presents state-of-the-art methodological and technical solutions in the areas of in-vehicle architectures, multipartner development processes, software engineering methods, embedded communications, and safety and dependability assessment. Offering balanced viewpoints from industry and academic experts, car manufacturers, and suppliers, the book outlines the features and functioning schemes of CAN, LIN, FlexRay, and TTCAN protocols. It also addresses the main problems in the design of automotive embedded systems.

Embedded systems proliferate in everyday applications and are of major importance in industrial settings. The first comprehensive book on the subject, this timely handbook emphasizes emerging trends and technologies, but it also provides a solid foundation for understanding these new developments. Contributions from some of the field’s leading authorities cover all aspects of embedded systems from both the hardware and software perspectives. Topics include real-time embedded systems, security, system-on-chip and network-on-chip design, and networked embedded systems. The final section explores implementations in automotive, industrial automation, and intelligent sensor applications.

Catalog no. 8026, ISBN: 978-0-8493-8026-6 January 2009, 6-1/8 x 9-1/4, 470 pp. Suggested Price: $149.95 / £83.00

Catalog no. 2824, ISBN: 978-0-8493-2824-4 2006, 7 x 10, 1160 pp. Suggested Price: $164.95 / £92.00

ISA Corporation, San Francisco, California, USA

Computer Engineering / Embedded Systems

Automotive Embedded Systems Handbook

Embedded Multiprocessors Scheduling and Synchronization, Second Edition

Model-Based Design for Embedded Systems

Sundararajan Sriram

Texas Instruments, Palo Alto, California, USA

31

Gabriela Nicolescu

Shuvra S. Bhattacharyya

Ecole Polytechnique de Montreal, Quebec, Canada

Series: Signal Processing and Communications, 3

Series: Computational Analysis, Synthesis, and Design of Dynamic Systems

Demonstrating how to design multiprocessor computer systems that are streamlined for multimedia applications, this work presents architectures and design methodologies for parallel systems in embedded DSP applications. It describes unique techniques for optimizing communication and synchronization and provides several examples of practical applications that demonstrate the relevance of the techniques presented. This second edition updates the background material on existing embedded multiprocessors, including single-chip multiprocessors. It also summarizes the new research on dataflow models for signal processing that has been carried out since the publication of the first edition.

Model-based design allows teams to start the design process from a high-level model that is gradually refined through abstraction levels to ultimately yield a prototype. When done well, it encourages enhanced performance and quicker time to market. Elaborating on model-based practices, international experts address the main facets of heterogeneous system design. They focus on multicore methodological issues, real-time analysis, and modeling and validation, taking into account how optical, electronic, and mechanical components often interface. Illustrating applications in several fields, this volume provides designers with readily adaptable solutions for their own practice.

Catalog no. 48015, ISBN: 978-1-4200-4801-8 January 2009, 6 x 9, 384 pp. Suggested Price: $129.95 / £78.99

Catalog no. 67842, ISBN: 978-1-4200-6784-2 July 2009, 6-1/8 x 9-1/4, 550 pp. Suggested Price: $139.95 / £85.00

University of Maryland, College Park, USA

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 31

12/19/08 10:25:26 AM


For more information and a complete list Embedded Systems / Computer Graphics, Multimedia & Visualization

What Every Engineer Should Know About Developing Real-Time Embedded Products Kim R. Fowler

Consultant, Windsor Mill, Maryland, USA Series: What Every Engineer Should Know

Developing real-time embedded products requires understanding the interaction between different disciplines, such as circuit design, power, cooling, packaging, software, and the human interface. This book provides the knowledge and insight needed to evaluate selfcontained embedded systems and to understand the interactions between subsystems. Real-world case studies illustrate each topic in the text and offer a clear guide for preparing and developing project plans. With schedule and estimation templates, What Every Engineer Should Know about Developing Real-Time Embedded Products also presents numerous examples of design tradeoffs, which are critical to successful product development. Catalog no. 7959, ISBN: 978-0-8493-7959-8 2008, 6-1/8 x 9-1/4, 496 pp., Soft Cover Suggested Price: $52.95 / £29.99

Computational Intelligence in Medical Imaging

Techniques and Applications Edited by

G. Schaefer

Aston University, Birmingham, UK

A. Hassanien

Kuwait University, Safat

J. Jiang

University of Bradford, West Yorkshire, UK

Operating at the intersection of computer science and diagnostic radiology, medical imaging continues to evolve with new modalities and improved devices, many of these based on artifical intelligence. This work provides an authoritative source of research and methodology in soft computing as it relates to imaging. It presents developments in image visualization, and image-guided procedures. It also covers the physics of imaging; the physiology of medical images; image processing; imaging informatics; and ultrasonic signal processing. In addition, the editors include discussions on clinical decision making, artificial intelligence in medical education, and medical knowledge engineering. Catalog no. C6059, ISBN: 978-1-4200-6059-1 March 2009, 6-1/8 x 9-1/4, 464 pp. Suggested Price: $99.95 / £60.99

Computation and Visualization for Understanding Dynamics in Geographic Domains

Computational Modelling of Objects Represented in Images

May Yuan

Edited by

Kathleen Stewart Hornsby

João Manuel R.S. Tavares and R.M. Natal Jorge

32 A Research Agenda

University of Oklahoma, Norman, USA University of Iowa, Iowa City, USA

Computation and Visualization for Understanding Dynamics in Geographic Domains: A Research Agenda brings together leading researchers from multiple disciplines to discuss next-generation computation and visualization models used for interpreting geographic domains. This book is based on the workshop held by the University Consortium for Geographic Information Science. It demonstrates current uses of information technologies and elaborates on the need for further developments. It also addresses broad issues and challenges in such areas as spatiotemporal analysis and modeling, spatiotemporal visual analytics; spatiotemporal data mining, spatiotemporal reasoning, and spatiotemporal ontologies. Catalog no. 60325, ISBN: 978-1-4200-6032-4 2008, 6-1/8 x 9-1/4, 120 pp., Soft Cover Suggested Price: $41.95 / £22.99

Fundamentals, Methods and Applications

University of Porto, Portugal

Drawn from the proceedings of the International Symposium CompIMAGE 2006 held in Coimbra, Portugal, this volume contains contributions from worldwide experts. It provides comprehensive coverage of the current state-of-the-art in the fields of image processing and analysis. Topics discussed include image segmentation; data interpolation; registration, acquisition and compression; 3D reconstruction; and objects tracking. The text also examines motion and deformation analysis; objects simulation; medical imaging; computational bioimaging and visualization. Catalog no. SW3495, ISBN: 978-0-415-43349-5 2007, 6-3/4 x 9-3/4, 480 pp. Suggested Price: $185.95 / £103.00

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 32

12/19/08 10:25:26 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Graphics and GUIs with MATLAB® Third Edition Patrick Marchand

Nvidia, Durham, North Carolina, USA

O. Thomas Holland

An Integrated Introduction to Computer Graphics and Geometric Modeling

Naval Surface Warfare Center, Dahlgren, Virginia, USA

Ronald Goldman

The third edition of this popular guide was fully updated to accommodate MATLAB® version 6.x, including its integrated development desktop, enhanced computational engine, and interfaces to external languages. Two new chapters address data visualization and GUI design, and together they provide a solid understanding of when to use GUIs and what works well graphically in various situations. Other added material includes deeper coverage of programming techniques, end-of-chapter problem sets, and updated color illustrations. This edition retains a tutorial nature and appeals to a broad audience, from novice MATLAB users to seasoned MATLAB programmers.

Using an innovative yet comprehensive approach, this book presents a concise introduction to computer graphics and geometric modeling. The author presents major themes in computer graphics, including transformations in the graphics pipeline, ray tracing, radiosity, polygon shading, freeform surfaces, and solid models, and covers topics not found in other books, such as turtles and high-level algorithms. The text begins with fractals to generate interest and then uses a lucid presentation to simplify mathematical concepts. The author also avoids the use of a specific programming language in order to make the book accessible for students in any computer graphics or geometric modeling course.

Catalog no. C3200, ISBN: 978-1-58488-320-3 2003, 7 x 10, 536 pp., Soft Cover Suggested Price: $59.95 / £32.99

Catalog no. K10188, ISBN: 978-1-4398-0334-9 May 2009, 7 x 10, 640 pp. Suggested Price: $89.95 / £48.99

Image and Video Compression for Multimedia Engineering

Rice University, Houston, Texas, USA

Computer Graphics, Multimedia & Visualization

Textbook

Textbook

Fundamentals, Algorithms, and Standards, Second Edition

Interactive Graphics for Data Analysis Principles and Examples Martin Theus

Yun Q. Shi

Munich, Germany

Huifang Sun

Madison, New Jersey, USA

New Jersey Institute of Technology, Newark, USA Mitsubishi Electric Research Lab, Cambridge, Massachusetts, USA Series: Image Processing Series

Advanced technologies have increased demands for visual information and higher quality video frames, creating a gap between the visual data required and limited hardware capabilities. Image and Video Compression for Multimedia Engineering bridges this gap with authoritative information on video and image coding that builds a foundation for future research. This second edition features complete chapters devoted to JPEG 2000 and MPEG-4. It includes an accompanying CD-ROM that contains illustrative examples of image and video compression. This text also provides coverage of the H.264 standard. Supplemental material is available for qualifying instructors. Catalog no. 7364, ISBN: 978-0-8493-7364-0 2008, 7 x 10, 576 pp. Suggested Price: $109.95 / £44.99

33

Simon Urbanek

Series: Chapman & Hall/CRC Computer Science & Data Analysis

This full-color text discusses EDA and how interactive graphical methods can help gain insights as well as generate new questions and hypotheses from datasets. It presents the fundamental principles of graphical data analysis and includes detailed case studies that explain how the principles can be applied to the analysis of realworld datasets. The authors employ Mondrian software throughout to generate plots and use R code to quantify results precisely, test statistical hypotheses, and rearrange data in a nontrivial way. They provide exercises at the end of each chapter and offer course suggestions, slides, and extra code on the book’s website. Catalog no. C5947, ISBN: 978-1-58488-594-8 January 2009, 6-1/8 x 9-1/4, 290 pp. Suggested Price: $79.95 / £39.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 33

12/19/08 10:25:27 AM


For more information and a complete list Textbook

Computer Graphics, Multimedia & Visualization 34

Principles of Speech Coding

Rapid Prototyping and Engineering Applications

Tokunbo Ogunfunmi

A Toolbox for Prototype Development

Madihally Narasimha

Frank W. Liou

Santa Clara University, California, USA Ample Communications Inc., Saratoga, California, USA

University of Missouri-Rolla, USA

Understanding the basics of speech coding is necessary for the design of various modern devices that rely on speech interfaces such as cell phones and PDAs. Offering a detailed yet easily accessible introduction to the field, Principles of Speech Coding provides an in-depth examination of the underlying signal processing techniques that are used in speech coding. The authors present different speech coding standards from various organizations, including the ITU. With a focus on applications such as Voice-over-IP telephony, this comprehensive text demonstrates the practical implementation of a popular standardized speech coder on a DSP processor and covers the most recent research findings.

The key to success of product development is cost, quality, and time to market. These three factors should be properly defined, designed, and assessed in the initial stages of development. Rapid Prototyping and Engineering Applications explores the engineering procedures and practice of applying modern prototyping technologies, such as Rapid Prototyping (RP) and Virtual Prototyping (VP), to quickly deliver new products with lower costs and higher quality. Readers will gain a thorough understanding of using prototyping with modern technologies and tools. This unique text will greatly benefit product development engineers, managers, and students who wish to define and design a successful product.

Catalog no. 7428, ISBN: 978-0-8493-7428-9 May 2009, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $99.95 / £39.99

Catalog no. DK098X, ISBN: 978-0-8493-3409-2 2008, 7 x 10, 568 pp. Suggested Price: $139.95 / £77.99

R Graphics

Video, Speech, and Audio Signal Processing and Associated Standards

Paul Murrell

Vijay K. Madisetti

The University of Auckland, New Zealand

Georgia Institute of Technology, Atlanta, USA

Series: Chapman & Hall/CRC Computer Science & Data Analysis, 5

Series: The Digital Signal Processing Handbook, Second Edition

In today’s world of statistical computing, R is the program of choice for tens of thousands of statisticians, which is why R Graphics is sure to become an instant classic. Considered the leading expert, Murrell gives statisticians the first complete reference on the R graphical system. An in-depth text that takes nothing for granted, it helps both neophytes and seasoned statisticians master the intricacies of R. No other published volume contains information on R’s grid graphics, and much of the information the author provides is original material not found anywhere else. This volume will have a major impact on the future direction of statistical graphics development.

Drawing from the knowledge, experience, and insight of leading engineers, researchers, and scholars in the field, Video, Speech, and Audio Signal Processing and Associated Standards is one of three self-contained volumes in the new Digital Signal Processing Handbook, Second Edition. Encompassing current and future directions, this text focuses on digital signal processing applications in speech and acoustics. In addition to extensive updates, this volume features six new chapters and a new section on relevant standards associated with speech, audio, video, and image processing. It is ideal for advanced undergraduate, graduate, and professional courses on digital signal processing.

Catalog no. C486X, ISBN: 978-1-58488-486-6 2006, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $83.95 / £46.99

Series: Dekker Mechanical Engineering

Catalog no. 4608X, ISBN: 978-1-4200-4608-3 July 2009, 7 x 10, 560 pp. Suggested Price: $99.95 / £60.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 34

12/19/08 10:25:28 AM


A Visual Guide to Stata Graphics Second Edition

Textbook

Distributed Systems An Algorithmic Approach Sukumar Ghosh

Michael N. Mitchell

University of Iowa, Iowa City, USA

UCLA Academic Technology Services Consulting Group, Los Angeles, California, USA

With over 900 illustrated examples and quick-reference tabs, this guide shows you how to create and customize graphs for any type of statistical data using either Stata commands or the Graph Editor. The author displays each graph example in color with simple and clear instructions. He demonstrates how to produce various types of graph elements, including marker symbols, lines, legends, captions, titles, axis labels, and grid lines. This thoroughly updated and expanded edition contains a new chapter that explains how to exploit the power of the new Graph Editor. It also includes additional examples. Catalog no. SZ0394, ISBN: 978-1-59718-039-9 2008, 7 3/8 x 9 1/4, 471 pp., Soft Cover Suggested Price: $79.95 / £44.99

Computer Science Handbook Second Edition Edited by

Series: Chapman & Hall/CRC Computer & Information Science Series, 13

Achieving a balance between theory and practice, this text presents the foundational topics of distributed systems and their relationships to real-world applications. With a set of exercises featured in each chapter, the book covers system models, correctness criteria, and proof techniques. It also presents numerous important paradigms in distributed systems, including logical clocks, distributed snapshots, deadlock detection, termination detection, election, and graph algorithms. Additionally, the author addresses failures and faulttolerance techniques in diverse applications, such as consensus, transactions, group communication, replicated data management, and self-stabilization. Catalog no. C5645, ISBN: 978-1-58488-564-1 2007, 7 x 10, 424 pp. Suggested Price: $93.95 / £51.99

Introduction to Mathematics of Satisfiability

Computer Science Theaory & General References

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

35

Victor W. Marek

University of Kentucky, Lexington, USA

Allen B. Tucker

Bowdoin College, Brunswick, Maine, USA

The second edition of this elemental handbook reviews the current state of theory and practice in the field while emphasizing a more practical/applied approach to IT topics such as information management, net-centric computing, and human/computer interaction. With completely revised sections on software engineering, architecture, and operating systems, this thoroughly up-to-date manual is as cutting-edge in the new millennium as it was in the nineties. The Computer Science Handbook, Second Edition includes new information on Web-based software, speech recognition, data mining, cryptography, and distributedobjects computing as well as references and sources for further information. Catalog no. C360X, ISBN: 978-1-58488-360-9 2004, 7 x 10, 2752 pp. Suggested Price: $154.95 / £86.00

Series: Chapman & Hall/CRC Studies in Informatics Series

Addressing a topic with over 80 years of history, this book provides a complete introduction to the mathematics of satisfiability. The text covers basic and more advanced subjects, such as propositional logic, complete sets of functors, normal forms of propositional formulas, and clausal logic. The author, one of the main inventors of answer set programming, also includes algorithms for testing satisfiability and discusses combinatorial circuits along with various classes of theories. Each chapter concludes with a set of exercises to confirm understanding of the concepts, making this work ideal for graduate students and researchers. Catalog no. K10101, ISBN: 978-1-4398-0167-3 May 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $89.95 / £54.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 35

12/19/08 10:25:28 AM


For more information and a complete list Applications of Abstract Algebra with Maple and MATLAB® Second Edition

Textbook

Cryptography & Coding Theory

Probability and Statistics for Computer Scientists Michael Baron

University of Texas, Richardson, USA

Emphasizing methodology and applications, Probability and Statistics for Computer Scientists begins with the fundamental rules of probability and distributions, followed by stochastic processes, Monte Carlo methods, Markov chains, and queuing theory tools. The final chapters cover topics in statistical inference, estimation, testing, regression, and model fitting. The appendix reviews calculus and linear algebra, including methods of differentiation, integration, and matrix operations. Designed for a one-semester computer science course, the text includes MATLAB® codes and is illustrated throughout with numerous examples, exercises, figures, and tables. Catalog no. C6412, ISBN: 978-1-58488-641-9 2007, 6-1/2 x 9-1/2, 432 pp. Suggested Price: $89.95 / £41.99

Richard E. Klima

Appalachian State University, Boone, North Carolina, USA

Neil Sigmon

Radford University, Virginia, USA

Ernest L. Stitzinger

North Carolina State University, Raleigh, USA Series: Discrete Mathematics and Its Applications

This second edition illuminates the applications of abstract algebra in areas like combinatorics, graph theory, coding theory, and cryptography. Carefully integrating Maple™ and MATLAB®, the book provides an in-depth introduction to real-world abstract algebraic problems. The first chapter offers a concise and comprehensive review of prerequisite advanced mathematics. The next several chapters examine block designs, coding theory, and cryptography, while the final chapters cover counting techniques, including Pólya’s and Burnside’s theorems. Other topics discussed include Reed-Solomon codes; the Rivest, Shamir, and Adleman (RSA) cryptosystem; digital signatures; primes for security; elliptic curve cryptosystems; and the Advanced Encryption Standard (AES). Catalog no. C6102, ISBN: 978-1-58488-610-5 2007, 6-1/8 x 9-1/4, 528 pp. Suggested Price: $94.95 / £41.99

Textbook

Applied Algebra 36

Algorithmic Cryptanalysis Antoine Joux

Universite de Versailles Sain-Quentin-en-Yvelines, France Series: Chapman & Hall/CRC Cryptography and Network Security Series

Algorithmic Cryptanalysis surveys algorithmic and programming techniques for cryptographic and cryptanalytic applications. This unique volume discusses elements of computer architectures, such as memory caches and SIMD instructions, and examines their impact on efficiency. Exploring the variety of algorithms useful in cryptanalysis, the book describes efficient algorithms for solving frequently encountered cryptanalytic problems. The author presents the algorithms either as pseudo-code for high level algorithms or as C code for concrete examples. Catalog no. C7002, ISBN: 978-1-4200-7002-6 June 2009, 6-1/8 x 9-1/4, 406 pp. Suggested Price: $89.95 / £54.99

Codes, Ciphers and Discrete Algorithms, Second Edition Darel W. Hardy

Colorado State University, Fort Collins, USA

Fred Richman

Florida Atlantic University, Boca Raton, USA

Carol L. Walker

New Mexico State University, Las Cruces, USA Series: Discrete Mathematics and Its Applications, 55

Revised and updated, this new edition expands algebraic coverage with an additional chapter on groups and details about rings in the finite fields. The comprehensive text includes cryptography, number theory, and two completely new chapters on error correcting codes. It presents various types of algorithms with their complexities. A thorough explanation of the Rijndael Algorithm helps students understand the recently adopted data encryption standard. Unlike other texts, the authors discuss how mathematical techniques can be used to solve practical problems. CRC codes, clearer proof presentation, and twice the number of exercises are added through an interactive CD. Catalog no. C7142, ISBN: 978-1-4200-7142-9 February 2009, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $99.95 / £44.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 36

12/19/08 10:25:29 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Textbook

The Guide to Secrecy From Ancient to Modern Times Richard A. Mollin

Cryptanalysis of Number Theoretic Ciphers

University of Calgary, Alberta, Canada

Samuel S. Wagstaff, Jr.

Series: Discrete Mathematics and Its Applications, 33

Series: Computational Mathematics, 5

Purdue University, West Lafayette, Indiana, USA

This book explores the depth and breadth of the field of cryptology. It begins by tracing its development from inception to modern-day practice. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and publickey cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. It is designed such that the non-professional reader may learn all aspects of secrecy yet it is still suitable as a textbook for a course on a variety of secrecy-related topics.

At the heart of modern cryptographic algorithms lies computational number theory. Written by a number theorist and practicing cryptographer, this book takes readers from basic number theory through the inner workings of ciphers and protocols, to their strengths and weaknesses. Part One provides the mathematical background for cryptography. Part Two describes a selection of cryptographic algorithms, most of which use number theory. Finally, the book presents methods of attack on the cryptographic algorithms and assesses their effectiveness. This book has a broad and eager audience, from those in the military to Internet administration and from E-commerce practitioners to amateur enthusiasts.

Catalog no. C4703, ISBN: 978-1-58488-470-5 2005, 6-1/8 x 9-1/4, 704 pp. Suggested Price: $84.95 / £42.99

Catalog no. C1534, ISBN: 978-1-58488-153-7 2003, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $93.95 / £51.99

Cryptography & Coding Theory

Codes

Textbook

Coding Theory and Cryptography The Essentials, Second Edition

D.C. Hankerson, D.G. Hoffman, D.A. Leonard, C.C. Lindner, K.T. Phelps, C.A. Rodger, and J.R. Wall Series: Pure and Applied Mathematics, 234

Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, used by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an easy-to-use manner appropriate for students with only a basic background in mathematics. Offering revised and updated material on the Berlekamp-Massey decoding algorithm and convolutional codes, thes book introduces the required mathematics as it is needed and provides exercises with solutions. This edition includes an extensive section on cryptography, and is appropriate for an introductory course on the subject. Catalog no. DK1722, ISBN: 978-0-8247-0465-0 2001, 6 x 9, 368 pp. Suggested Price: $93.95 / £51.99

Cryptanalysis of RSA and Its Variants

37

M. Jason Hinek

University of Calgary, Alberta, Canada Series: Chapman & Hall/CRC Cryptography and Network Security Series

The first resource to focus on the security variances of RSA, this volume is a comprehensive survey of the best known algebraic attacks on RSA and its main variants, including Rebalanced RSA, Multi-prime RSA, and Multi-factor RSA. The preliminary material introduces RSA and reviews all the mathematical background needed for the remainder of the book. The next parts collect together all the best known algebraic attacks. For each attack, the author provides either a mathematical proof, or a justification for those that rely on assumptions. For attacks that cannot be proven, he provides experimental evidence to illustrate their practical effectiveness. Catalog no. C7518, ISBN: 978-1-4200-7518-2 July 2009, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $79.95 / £48.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 37

12/19/08 10:25:30 AM


For more information and a complete list Elliptic Curves

Textbook

Cryptography

Theory and Practice, Third Edition

Cryptography & Coding Theory

Douglas R. Stinson

University of Waterloo, Ontario, Canada Series: Discrete Mathematics and Its Applications

The third edition of this best-selling text provides unparalleled coverage of the use of cryptographic protocols that establish the steps that must be taken before any type of secret transmission can be completed. The author shows readers how the various parties to the transaction establish their cryptographic identities or keys, covers many of the cryptographic tools used in network security, and discusses topics that include copyright protection techniques and public key infrastructure. Cryptography: Theory and Practice, Third Edition is an outstanding text for senior undergraduate and graduate courses but also a useful reference for professionals interested in network security and cryptographic protocols. Catalog no. C5084, ISBN: 978-1-58488-508-5 2006, 6-1/8 x 9-1/4, 616 pp. Suggested Price: $69.95 / £39.99

Number Theory and Cryptography, Second Edition Lawrence C. Washington

University of Maryland, College Park, USA Series: Discrete Mathematics and Its Applications, 24

Like its best-selling predecessor, this second edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications. It now includes new chapters on isogenies and hyperelliptic curves, a more complete treatment of the Tate–Lichtenbaum pairing, alternative coordinate systems and related computational issues, and Doud’s analytic method for computing torsion on elliptic curves over Q. This edition also discusses how to perform computations with elliptic curves in several popular computer algebra systems. Basic exercises appear at the end of each chapter. Catalog no. C7146, ISBN: 978-1-4200-7146-7 2008, 6-1/8 x 9-1/4, 536 pp. Suggested Price: $89.95 / £49.99

Textbook

38

Data-driven Block Ciphers for Fast Telecommunication Systems

Handbook of Applied Cryptography Alfred J. Menezes and Scott A. Vanstone

University of Waterloo, Waterloo, Ontario, Canada

Paul C. van Oorschot

Nikolay A. Moldovyan and Alexander A. Moldovyan

Ottawa, Ontario, Canada

SPECTR, St. Petersburg, Russia

Series: Discrete Mathematics and Its Applications, 6

Nikolay Moldovyan and Alexander Moldovyan, holders of several dozen patents in encryption technology, provide the background and detail the applications needed to investigate new properties of PNs especially relevant to the improvement of modern wireless systems. They propose a universal architecture involving controlled bit permutation instruction that permits the performance of both datadriven permutations and an arbitrary prescribed fixed permutation in a single cycle. Because of its efficient use of current hardware, the embedding of this architecture is a highly attractive option for CPU manufacturers. This book details all the information pertinent to this technology.

The Handbook of Applied Cryptography serves as a valuable reference for novices as well as experts. It provides a multifunctional treatment that introduces the more practical aspects of both conventional and public-key cryptography, and offers a valuable source of techniques and algorithms for serious practitioners. The book contains enough abstraction for theoreticians and provides enough detail to actually allow implementation of the algorithms discussed. With outstanding organization that allows easy access to all information, it includes more than 200 algorithms and protocols, extensive cross referencing, and more than 1,250 references that include brief comments on each entry.

Catalog no. AU5411, ISBN: 978-1-4200-5411-8 2008, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $104.95 / £57.99

Catalog no. 8523, ISBN: 978-0-8493-8523-0 1997, 7 x 10, 816 pp. Suggested Price: $89.95 / £42.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 38

12/19/08 10:25:30 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Henri Cohen, Gerhard Frey, Roberto Avanzi, Christophe Doche, Tanja Lange, Kim Nguyen, and Frederik Vercauteren

Katholieke Universiteit Leuven, Heverlee, Belgium

Textbook

Introduction to Modern Cryptography Jonathan Katz

University of Maryland, College Park, USA

Yehuda Lindell

Bar-Ilan University, Ramat Gan, Israel

Series: Discrete Mathematics and Its Applications, 34

Series: Chapman & Hall/CRC Cryptography and Network Security Series

The Handbook of Elliptic and Hyperelliptic Curve Cryptography is the first exhaustive study of virtually all of the mathematical aspects of curve-based public key cryptography. This carefully constructed volume is a state-of-the-art study that explores both theory and applications. It provides a wealth of ready-to-use algorithms enabling fast implementation along with recommendations for selecting appropriate algorithms. The book also considers side-channel attacks and implementation aspects of smart cards. Broad, comprehensive coverage makes this a complete resource for elliptic and hyperelliptic curve cryptography and an invaluable reference to anyone interested in this exciting field.

This text provides a rigorous yet accessible treatment of modern cryptography, focusing on formal definitions, assumptions, and rigorous proofs of security. The first half of the book offers an extensive treatment of private-key cryptography, including encryption, message authentication, and design principles for block ciphers such as the DES and the AES. The second half focuses on publickey cryptography, beginning with a self-contained introduction to the number theory needed for the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.

Catalog no. C5181, ISBN: 978-1-58488-518-4 2006, 7 x 10, 848 pp. Suggested Price: $104.95 / £57.99

Catalog no. C5513, ISBN: 978-1-58488-551-1 2008, 6-1/8 x 9-1/4, 552 pp. Suggested Price: $79.95 / £39.99

An Introduction to Cryptography Second Edition

Cryptography & Coding Theory

Handbook of Elliptic and Hyperelliptic Curve Cryptography

Textbook

Introduction to Network Security

39

Douglas Jacobson

Richard A. Mollin

University of Calgary, Alberta, Canada

Iowa State University, Ames, USA

Series: Discrete Mathematics and Its Applications

Series: Chapman & Hall/CRC Computer & Information Science Series

Continuing a best-selling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. This edition includes two new chapters on current and future applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies. It also explores network security, wireless security, smart cards, and biometrics. The book provides additional information on cryptanalysis and primality testing as well as appendices on DES and primitive roots.

Security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. This volume examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack. It discusses network architecture, the functions of layers in a typical network, and header-, protocol-, authentication-, and traffic-based attacks. It explains the vulnerabilities and mechanisms of each layer of network security. A define-attack-defend methodology is used throughout the book to introduce effective solutions. The text is supplemented with problems, experiments, appendices, and a companion website.

Catalog no. C6188, ISBN: 978-1-58488-618-1 2007, 6-1/8 x 9-1/4, 413 pp. Suggested Price: $79.95 / £39.99

Catalog no. C5432, ISBN: 978-1-58488-543-6 January 2009, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $79.95 / £39.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 39

12/19/08 10:25:31 AM


For more information and a complete list Cryptography & Coding Theory / Data Mining & Knowledge Discovery 40

Textbook

Introduction to Number Theory Martin Erickson and Anthony Vazzana

Truman State University, Kirksville, Missouri, USA Series: Discrete Mathematics and Its Applications

Automated Data Analysis Using Excel Brian D. Bissett

Pfizer Global Research and Development, Groton, Connecticut, USA

Highlighting both fundamental and advanced topics, this introduction provides all of the tools to achieve a solid foundation in number theory. It connects number theory to other branches of mathematics and to real-world problems, such as the ISBN system, RSA codes, and the construction of tournaments. Coverage of special topics includes elliptic curves and Hilbert’s tenth problem. The text uses Mathematica® and Maple™ calculations to elucidate and expand on the theory covered, features numerous worked examples and exercises, and provides a supplemental web page with Mathematica notebooks, Maple worksheets, and links to Internet resources.

This guide shows step-by-step how to construct useful automated data analysis applications for both industrial and academic settings. It features numerous real-world examples and includes a CDROM with sample workbooks, worksheets, and source code. The book begins by discussing fundamental elements, the methods for importing and accessing data, and the creation of reports. The author then describes how to use Excel® to obtain data from nonnative sources, such as databases and third-party calculation tools, and explains how to automate manipulations and calculations on the acquired data sources. The final chapter demonstrates from beginning to end how to create a cohesive, robust application.

Catalog no. C9373, ISBN: 978-1-58488-937-3 2008, 6-1/8 x 9-1/4, 536 pp. Suggested Price: $89.95 / £39.99

Catalog no. C8857, ISBN: 978-1-58488-885-7 2007, 7 x 10, 480 pp., Soft Cover Suggested Price: $62.95 / £34.99

Textbook

Automated Taxon Identification in Systematics

Understanding and Applying Cryptography and Data Security Adam J. Elbirt

The Charles Stark Draper Laboratory, Cambridge, Massachusetts, USA

Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. It focuses on cryptographic algorithms, such as symmetric- and public-key, before dealing with the construction of cryptographic protocols. The author examines tradeoffs between code size, hardware logic resource requirements, memory usage, speed, power consumption, and more. He includes many examples and problems to evaluate implementation results of several software and hardware languages. He also provides C and VHDL frameworks and testing environments on a CD-ROM. Catalog no. AU6160, ISBN: 978-1-4200-6160-4 January 2009, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $79.95 / £44.99

Theory, Approaches and Applications Edited by

Norman MacLeod

Natural History Museum, London, UK Series: Systematics Association Special Volumes

Automated Taxon Identification in Systematics shows how automated identification can be applied to various organismal groups. It is the first text to address the interface between the species recognition question in the biological sciences and the class recognition problem in mathematics and statistics. It will be of interest to taxonomists as well as computational professionals who focus on the biological sciences. Featuring high-profile contributors, the text presents current trends in quantitative approaches to grouprecognition challenges, discusses the identification capabilities of current software systems, and evaluates applications of this technology to present and future problems. Catalog no. 8205, ISBN: 978-0-8493-8205-5 2008, 7 x 10, 368 pp. Suggested Price: $99.95 / £57.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 40

12/19/08 10:25:32 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Techniques, Politics, and Applications Edited by

Gordon B. Curry

University of Glasgow, Scotland

Chemical Information Mining Facilitating Literature-Based Discovery Edited by

Chris J. Humphries

The Natural History Museum, London, UK

Debra L. Banville

Series: Systematics Association Special Volumes

AstraZeneca Pharmaceuticals, Wilmington, Delaware, USA

With changes in technology and a renewed effort to catalog the world’s biodiversity, huge amounts of data are being generated on biodiversity issues. In response to the call for better information systems to manage the biodiversity crisis, a wide range of solutions are being developed for inventorying, managing, and disseminating taxonomic data. This book brings together a diverse array of authors who discuss technical developments to improve the construction, population, and dissemination of biodiversity information. It is designed to inform students and researchers of biodiversity about the changes and challenges that need to be understood by everyone in this information age.

This book focuses on information extraction issues, highlights available solutions, and underscores the value of these solutions to academic and commercial scientists. After introducing the drivers behind chemical text mining, it discusses chemical semantics. The contributors describe the tools that identify and convert chemical names and images to structure-searchable information. They also explain natural language processing, name entity recognition concepts, and semantic web technologies. Following a section on current trends in the field, the book looks at where information mining approaches fit into the research needs within the life sciences.

Catalog no. TF1756, ISBN: 978-0-415-33290-3 2007, 7 x 10, 208 pp. Suggested Price: $89.95 / £51.99

Catalog no. 76493, ISBN: 978-1-4200-7649-3 January 2009, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $99.95 / £55.99

Biological Data Mining

Computational Methods of Feature Selection

Edited by

Edited by

Jake Y. Chen

Huan Liu

Indiana University-Purdue, Indianapolis, USA

Stefano Lonardi

University of California, Riverside, USA

Data Mining & Knowledge Discovery

Biodiversity Databases

41

Arizona State University, Tempe, USA

Hiroshi Motoda

AFOSR/AOARD, Tokyo, Japan

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

With techniques spanning the entire spectrum of bioinformatics, this book features the latest data mining and knowledge discovery advances for post-genome biology. It includes computational biology methods, algorithms, and software that can help sequence analysis, protein structure analysis, comparative genomics, functional genomics, statistical genetics, proteomics, network analysis, integrative systems biology, and translational biomedical applications. Containing contributions from leading experts, the book also shows how to use combinations of computational techniques in data mining or related data management and information sciences to solve real biological problems.

Highlighting current research issues, this concise volume introduces the basic concepts and principles, state-of-the-art algorithms, and inventive applications of feature selection. With excellent surveys, practical guidance, and comprehensive tutorials from leading experts, it chronicles the novel developments of feature selection that have emerged in recent years, including causal feature selection and Relief. The book also presents the latest methodologies and algorithms, such as the Las Vegas, Monte Carlo, and Bayes riskweighted vector quantization algorithms, and contains real-world case studies from a variety of areas, including text classification, web mining, and bioinformatics.

Catalog no. C6847, ISBN: 978-1-4200-8684-3 July 2009, 600 pp. Suggested Price: $99.95 / £60.99

Catalog no. C8784, ISBN: 978-1-58488-878-9 2008, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $93.95 / £51.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 41

12/19/08 10:25:32 AM


For more information and a complete list Constrained Clustering

Advances in Algorithms, Theory, and Applications

Ian Davidson

Data Mining for Global Trends in Mountain Biodiversity

University of California, Davis, USA

Edited by

Kiri Wagstaff

Christian Korner and Eva M. Spehn

Edited by

Sugato Basu

Data Mining & Knowledge Discovery

Google, Inc. Mountain View, California, USA

Jet Propulsion Laboratory, Pasadena, California, USA Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

This volume encompasses many new types of constraints and clustering methods and delivers thorough coverage of the capabilities and limitations of constrained clustering. With contributions from industrial researchers and leading academic experts who pioneered the field, it provides a well-balanced combination of theoretical advances, key algorithmic development, and novel applications. The book presents various types of constraints for clustering and describes useful variations of the standard problem of clustering under constraints. It also demonstrates the application of clustering with constraints to relational, bibliographic, and video data. Catalog no. C9969, ISBN: 978-1-58488-996-0 January 2009, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $79.95 / £44.99

Data Mining for Design and Marketing Edited by

42 Yukio Ohsawa

University of Tokyo, School of Engineering, Japan

Katsutoshi Yada

Kansai University, Osaka, Japan

University of Basel, Switzerland

Electronic databases can open new pathways for testing evolutionary and ecological theory across the world’s mountain ranges. This book examines global trends in mountain biodiversity using electronic biodiversity databases. Expert contributors address two different aspects of global mountain biodiversity assessment: how to link biodiversity data with geophysical data and how to use biodiversity data to substantiate evolutionary theory and phylogeny. The text provides examples of successful mining of geo-referenced data, methodological approaches, and comparisons of mountain regions on a continental scale. The Global Biodiversity Information Facility also offers their perspective. Catalog no. 83694, ISBN: 978-1-4200-8369-9 July 2009, 7 x 10, 288 pp. Suggested Price: $109.95 / £66.99

Data Mining for Intelligence, Fraud & Criminal Detection Advanced Analytics & Information Sharing Technologies

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, 6

Christopher Westphal

Through the techniques of data mining, this book demonstrates how to effectively design business processes and develop competitive products and services. It discusses how data mining can identify valuable consumer patterns which aid marketers and designers in detecting consumers’ needs. The book also explores visualization tools based on the computational methods of data mining. Discourse analysis, chance discovery, knowledge discovery, formal concept analysis, and an adjacency matrix are just some of the novel approaches covered. The book explains how these methods can be applied to website design, personalized e-commerce support tools, and other areas.

Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the types of patterns exposed in one domain can often be translated into another. This book reviews the commonality, framework, and infrastructures necessary to implement complex analytical systems. It addresses analytical approaches, technologies, and methodologies, as well as information sharing and how current fusion-centers are being architected.

Catalog no. C7019, ISBN: 978-1-4200-7019-4 January 2009, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $89.95 / £54.99

Catalog no. AU6723, ISBN: 978-1-4200-6723-1 January 2009, 7 x 10, 440 pp. Suggested Price: $69.95 / £38.99

CEO, Visual Analytics, Frederick, Maryland, USA

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 42

12/19/08 10:25:33 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Data Mining Methods and Applications

Geographic Data Mining and Knowledge Discovery Second Edition

Edited by

Edited by

Kenneth D. Lawrence and Stephan Kudyba

Harvey J. Miller

University of Utah, Salt Lake City, USA

New Jersey Institute of Technology, Newark, USA

Ronald K. Klimberg

Jiawei Han

University of Illinois at Urbana-Champaign, USA

Saint Joseph’s University, Philadelphia, Pennsylvania, USA

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, 8

Addressing a variety of organizational issues, Data Mining Methods and Applications presents a compilation of recent research works on data mining and forecasting techniques, including multivariate, evolutionary, and neural net methods. The book focuses in particular on data mining techniques used for conducting marketing research. Written by a wide range of contributors from academia and industry, this text provides detailed descriptions of applications in numerous areas, such as finance, engineering, healthcare, economics, science, and management. Real-world case studies that are supported by theoretical chapters offer guidance on how to actually perform data mining methods.

This second edition reflects the current state of the art in this field. It includes updated material on geographic knowledge discovery, geographic data warehouse research, map cubes, spatial dependency, spatial clustering methods, clustering techniques for trajectory data, INGENS 2.0, and geovisualization techniques. Recognizing the growth in mobile technologies and trajectory data, this edition provides five new chapters on knowledge discovery from spatiotemporal and mobile objects databases. It also contains new chapters on data quality issues, medoid computation, geographically weighted regression, and an integrated approach to multivariate analysis and geovisualization.

Catalog no. AU8522, ISBN: 978-0-8493-8522-3 2008, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $99.95 / £57.99

Catalog no. C3974, ISBN: 978-1-4200-7397-3 February 2009, 6-1/8 x 9-1/4, 432 pp. Suggested Price: $89.95 / £54.99

Design and Use of Relational Databases in Chemistry

Information Discovery on Electronic Health Records

43

Edited by

Vagelis Hristidis

Florida International University, Miami, USA

TJ O’Donnell

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

Through many examples of good database design, this book shows that relational databases are the best way to store, search, and operate on chemical information. It introduces the concepts of RDMS and SQL. The author describes how relational data tables and new data types help store and use chemical information, how molecular structures can become a new data type in a database, and how client programs can effectively use relational databases. He also explains how a fully functioning chemical relational database system can be built. A supplementary website offers an implementation of every function from the book and a database of structures and data.

With contributions from a multi-disciplinary team of experts, this book presents a comprehensive overview of current research methods and future directions in information discovery using Electronic Health Records (EHRs). To provide a deeper understanding of the process of information discovery with regard to EHRs, the book discusses essential issues involved in preparing and extracting medical data to build a record. Privacy concerns with regard to accessing EHRs are presented by domain experts from legal and computer science perspectives. The book also explores emerging techniques for searching and mining useful knowledge from EHRs, and includes a detailed overview of mining medical images.

President, gNova Inc., San Diego, California, USA

Catalog no. 64428, ISBN: 978-1-4200-6442-1 January 2009, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $129.95 / £72.99

Data Mining & Knowledge Discovery

Textbook

Catalog no. C9038, ISBN: 978-1-4200-9038-3 July 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $89.95 / £54.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 43

12/19/08 10:25:34 AM


For more information and a complete list Multimedia Data Mining

Data Mining & Knowledge Discovery

Knowledge Discovery for Counterterrorism and Law Enforcement

A Systematic Introduction to Concepts and Theory Zhongfei Zhang

State University of New York, Binghamton, USA

Ruofei Zhang

Yahoo Inc., Sunnyvale, California, USA

David Skillicorn

Queen’s University, Kingston, Ontario, Canada

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, 5

Based on cutting-edge research, Knowledge Discovery for Counterterrorism and Law Enforcement presents a new approach to knowledge discovery in adversarial settings. Focusing on the four main applications areas (prediction, clustering, relationship discovery, and textual analysis), it discusses opportunities for concealment that exist and recommends tactics that can aid in detecting them. Designed for professionals working in law enforcement and intelligence, social policymakers, and researchers in knowledge discovery, the book reviews technologies that are currently available and describes their effectiveness in dealing with these issues.

This novel, self-contained book introduces the most current, state-ofthe-art multimedia data mining concepts and theory. It reviews the theoretical foundations of the subject, including feature extraction and representations, knowledge representations, statistical learning theory, and soft computing theory. Clarifying perplexing topics scattered throughout research papers in the field, the book explores the relationship of multimedia data mining to other related areas, such as artificial intelligence. It also highlights various applications that illustrate how multimedia data mining can solve many realworld problems, such as image annotation, video search, and audio classification.

Catalog no. C7399, ISBN: 978-1-4200-7399-7 January 2009, 6-1/8 x 9-1/4, 332 pp. Suggested Price: $79.95 / £44.99

Catalog no. C9667, ISBN: 978-1-58488-966-3 January 2009, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $89.95 / £49.99

Knowledge Discovery from Sensor Data

Next Generation of Data Mining

Edited by

44 Auroop R. Ganguly, Joao Gama, Olufemi A. Omitaomu, Mohamed Gaber, and Ranga Raju Vatsavai

Edited by

Hillol Kargupta, Jiawei Han, Philip S. Yu, Rajeev Motwani, and Vipin Kumar

Series: Industrial Innovation

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, 7

As sensors become ubiquitous, a set of broad requirements is beginning to emerge across high-priority applications including disaster preparedness and management, adaptability to climate change, national and homeland security, and the management of critical infrastructures. This book presents innovative solutions in offline data mining and real-time analysis of sensor or geographically distributed data. It discusses the challenges and requirements for sensor data based knowledge discovery solutions in high-priority applications. It also explores the fusion between heterogeneous data streams from multiple sensor types and reviews applications in science, engineering, and security.

Focusing on the future of data mining, this volume addresses a variety of emerging data mining challenges and potential solutions. It shows how innovative data mining tools and techniques can be applied in a range of areas, including e-science, engineering, social science, ecology, finance, and medicine. With contributions from many well-respected researchers and practitioners in the community, the book examines the algorithms, middleware, infrastructure, and privacy policies associated with ubiquitous, distributed, and high performance data mining. It also discusses the impact of new technologies on data mining and provides recommendations for privacy-preserving mechanisms.

Catalog no. 82329, ISBN: 978-1-4200-8232-6 January 2009, 6-1/8 x 9-1/4, 215 pp. Suggested Price: $89.95 / £49.99

Catalog no. C5867, ISBN: 978-1-4200-8586-0 January 2009, 6-1/8 x 9-1/4, 601 pp. Suggested Price: $89.95 / £49.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 44

12/19/08 10:25:34 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Pattern Recognition Algorithms for Data Mining

Social Computing

Sankar K. Pal

Huan Liu and Arunabha Sen

Pabitra Mitra

Jianping Zhang

Series: Chapman & Hall/CRC Computer Science & Data Analysis

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series,

This valuable text addresses different pattern recognition (PR) tasks in a unified framework with both theoretical and experimental results. Tasks covered include data condensation, feature selection, case generation, clustering/classification, and rule generation and evaluation. Organized into eight chapters, the book begins by introducing PR, data mining, and knowledge discovery concepts. The authors proceed to analyze the tasks of multi-scale data condensation and dimensionality reduction. Then they explore the problem of learning with support vector machine (SVM), and conclude by highlighting the significance of granular computing for different mining tasks in a soft paradigm.

Social Computing: A Data Mining Perspective begins with a brief introduction to social computing and a review of classic graph theory and game theory. It then examines the data used to construct social networks, focusing on emerging Web 2.0 technologies and social networking websites, such as Facebook and MySpace. The book also explores data mining for social network extraction and analysis, presenting link and graph mining algorithms, such as subgraph discovery and clustering. In the last section, the authors provide case studies to illustrate concepts and principles as well as to demonstrate how to integrate components in order to solve realworld problems.

Catalog no. C4576, ISBN: 978-1-58488-457-6 2004, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $97.95 / £54.99

Catalog no. C8330, ISBN: 978-1-4200-8330-9 May 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $69.95 / £42.99

Relational Data Clustering

Text Mining

Indian Institute of Technology, Kanpur, India

Models, Algorithms, and Applications

Arizona State University, Tempe, USA MITRE Corporation, McLean, Virginia, USA

Theory, Application, and Visualization Edited by

Bo Long and Zhongfei Zhang

Ashok Srivastava

Philip S. Yu

Mehran Sahami

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

This is the first book available that presents a comprehensive overview of relational data clustering in data mining research. The text reflects the recent emergence of relational data clustering as an important field of data clustering, with applications in text mining, social network analysis, collaborative filtering, and bioinformatics. It presents an in-depth, systematic discussion of the models, algorithms, and applications for relational data clustering. The book also covers recently emerging models in relational data clustering, including graph-based models, matrix factorization-based models, and probabilistic models.

Featuring contributions from leading researchers in the field, this book provides a detailed overview of text mining theory, applications, and visualization. The theory section discusses text mining, information retrieval, latent semantic analysis, pagerank, latent Dirichlet allocation, and probabilistic relational models. In the segment on text mining applications, the book explores web-based information, system and safety issues, spam filtering, information extraction, link mining, question answering, determining trends, and news reports. The final area of the book covers text visualization and examines how text mining techniques can be used to map information through visualizing databases.

State University of New York, Binghamton, USA University of Illinois, Chicago, USA

Data Mining & Knowledge Discovery

Indian Statistical Institute, Calcutta, India

A Data Mining Perspective

45

Ames Research Center, Moffett Field, California, USA Google, Inc., Mountain View, California, USA

Catalog no. C7261, ISBN: 978-1-4200-7261-7 July 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $79.95 / £48.99

Catalog no. C5940, ISBN: 978-1-4200-5940-3 May 2009, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $79.95 / £48.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 45

12/19/08 10:25:35 AM


For more information and a complete list

Data Mining & Knowledge Discovery / Discrete Systems

The Top Ten Algorithms in Data Mining Edited by

Understanding Complex Datasets

Xindong Wu

University of Vermont, Burlington, USA

Data Mining with Matrix Decompositions

Vipin Kumar

David Skillicorn

University of Minnesota, Minneapolis, USA

Queen’s University, Kingston, Ontario, Canada

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, 9

Series: Chapman & Hall/CRC Data Mining and Knowledge Discovery Series

From classification and clustering to statistical learning, association analysis, and link mining, this book covers the most important topics in data mining research. It presents the ten most influential algorithms used in the data mining community today. Each chapter provides a detailed description of the algorithm, a discussion of available software implementation, advanced topics, and exercises. With a simple data set, examples illustrate how each algorithm works and highlight the overall performance of each algorithm in a realworld application. Featuring contributions from leading researchers, this reference is useful for both professionals and students.

Focusing on data mining mechanics and applications, this book explores the most common matrix decompositions, including singular value, semidiscrete, independent component analysis, non-negative matrix factorization, and tensors. It shows how these matrix decompositions can be used to analyze large datasets in a broad range of application areas, such as information retrieval, topic detection, geochemistry, astrophysics, microarray analysis, process control, counterterrorism, and social network analysis. The book also discusses several important theoretical and algorithmic problems of matrix decompositions and provides MATLAB® scripts to generate examples of matrix decompositions.

Catalog no. C9641, ISBN: 978-1-4200-8964-6 April 2009, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $79.95 / £48.99

Theories of Geographic Concepts

46 Ontological Approaches to

Semantic Integration Marinos Kavouras and Margarita Kokla

Catalog no. C8326, ISBN: 978-1-58488-832-1 2007, 6-1/8 x 9-1/4, 260 pp. Suggested Price: $73.95 / £40.99

Algorithmic Combinatorics on Partial Words Francine Blanchet-Sadri

University of North Carolina, Greensboro, USA

National Technical University of Athens, Greece

Series: Discrete Mathematics and Its Applications

Written by experts in the field, this book addresses theoretical, formal, and pragmatic issues of geographic knowledge representation and integration based on an ontological approach. The first part sets the context by emphasizing the importance of philosophical, cognitive, and formal theories in preserving the semantics of geographic concepts during ontology development and integration. The second section exhausts major theoretical issues related to the subject, and the third part analyzes a number of formal tools. The final section introduces a general framework with the necessary processes and guidelines to ontology integration and applies it to a number of ontology integration cases.

Offering a glimpse into the future direction of research, this book presents a mathematical treatment of combinatorics on partial words designed around algorithms and explores up-and-coming techniques for solving partial word problems. It provides algorithms in English followed by pseudo code to facilitate implementation of the algorithms and includes numerous worked examples, diagrams, exercises, selected solutions, and links to web interfaces. The author of this forward-looking volume covers the topics of periodicity, primitivity, pcodes, binary and ternary correlations, and unavoidable sets of partial words.

Catalog no. 3089, ISBN: 978-0-8493-3089-6 2008, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $144.95 / £79.99

Catalog no. C6092, ISBN: 978-1-4200-6092-8 2008, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $89.95 / £48.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 46

12/19/08 10:25:36 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Edited by

Jack Koolen and Jin Ho Kwak

Department of Mathematics, Pohang University of Science and Technology, Pohang, Korea

Ming-Yao Xu

Chromatic Graph Theory Gary Chartrand and Ping Zhang Western Michigan University, Kalamazoo, Michigan, USA

Department of Mathematics, Peking University, Beijing, China

Series: Discrete Mathematics and Its Applications

Presenting 11 survey papers from a distinguished group of international experts in the fields of combinatorics, group theory and combinatorial topology, Applications of Group Theory to Combinatorics explores design theory, Belyi functions, group theory, transitive graphs, regular maps, and Hurwitz problems. This volume reviews the state of the art in each of these areas, making it extremely useful to those who study graphs, maps, and polytopes having maximal symmetry. The book is also a valuable resource for researchers in group theory and combinatorics, graduate students in mathematics, and other specialists.

Beginning with the origin of the four color problem in 1852, the field of graph colorings has developed into one of the most popular areas of graph theory. Chromatic Graph Theory explores connections between major topics in graph theory and graph colorings, including Ramsey numbers and domination, as well as emerging topics, such as list colorings, rainbow colorings, distance colorings related to the channel assignment problem, and vertex/edge distinguishing colorings. The authors include historical, applied, and algorithmic discussions and provide many exercises and suggestions for study projects.

Catalog no. K00040, ISBN: 978-0-415-47184-8 2008, 6-3/4 x 9-3/4, 188 pp. Suggested Price: $144.95 / £79.99

Catalog no. C8008, ISBN: 978-1-58488-800-0 January 2009, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $99.95 / £55.99

A Combinatorial Approach to Matrix Theory and Its Applications

Textbook

Applied Combinatorics Second Edition

47

Richard A. Brualdi

Fred Roberts

Rutgers University, Piscataway, New Jersey, USA

Barry Tesman

Dickinson College, Carlisle, Pennsylvania, USA

This text focuses on the applications that motivate the development and use of combinatorics. The application examples covered include defective products, disease screening, genome mapping, satellite communication, web data, search engines, telecommunications traffic, smallpox vaccinations, sound systems, oil drilling, dynamic labor markets, and distributed computing. This edition includes new material on list colorings, the inversion distance between permutations and mutations in evolutionary biology, graph coloring, relations, and DNA sequence alignment. The book also explores cryptography, automorphisms of graphs, orthogonal arrays, secret sharing, the RSA cryptosystem, consensus decoding, and Menger’s theorems. Catalog no. K10016, ISBN: 978-1-4200-9982-9 April 2009, 7 x 10, 844 pp. Suggested Price: $99.95 / £60.99

Discrete Systems

Applications of Group Theory to Combinatorics

University of Wisconsin, Madison, USA

Dragos Cvetkovic

Mathematical Institute SANU, Belgrade, Serbia Series: Discrete Mathematics and Its Applications

Placing combinatorial and graph-theoretical tools at the forefront of the development of matrix theory, this book uses graphs to explain basic matrix construction, formulas, computations, ideas, and results. It presents material rarely found in other books at this level, including Gersgorin’s theorem and its extensions, the Kronecker product of matrices, sign-nonsingular matrices, and the evaluation of the permanent matrix. The authors provide a combinatorial argument for the classical Cayley–Hamilton theorem and a combinatorial proof of the Jordan canonical form of a matrix. They also describe several applications of matrices in electrical engineering, physics, and chemistry. Catalog no. C8223, ISBN: 978-1-4200-8223-4 January 2009, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $89.95 / £49.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 47

12/19/08 10:25:36 AM


For more information and a complete list Textbook

Combinatorial Methods with Computer Applications

Factoring Groups into Subsets

Jonathan L. Gross

University of Dundee, Scotland

Columbia University, New York, USA

Sandor Szabo

University of Pecs, Hungary

Arthur D. Sands

Discrete Systems

Series: Discrete Mathematics and Its Applications

Series: Lecture Notes in Pure and Applied Mathematics

This combinatorics text provides in-depth coverage of recurrences, generating functions, partitions, and permutations, along with some of the most interesting graph and network topics, design constructions, and finite geometries. It presents the computer and software algorithms in pseudo-code and incorporates definitions, theorems, proofs, examples, and nearly 300 illustrations as pedagogical elements of the exposition. Numerous problems, solutions, and hints reinforce basic skills and assist with creative problem solving. The author also offers a website with extensive graph theory informational resources as well as a computational engine to help with calculations for some of the exercises.

Focusing mainly on cyclic groups, this book explores the factorization theory of abelian groups. It first shows how to construct new factorizations from old ones. The authors then discuss nonperiodic and periodic factorizations, quasiperiodicity, and the factoring of periodic subsets. They also examine how tiling plays an important role in number theory. The next several chapters cover factorizations of infinite abelian groups; combinatorics, such as Ramsey numbers, Latin squares, and complex Hadamard matrices; and connections with codes, including variable length codes, error correcting codes, and integer codes. The final chapter deals with several classical problems of Fuchs.

Catalog no. C7435, ISBN: 978-1-58488-743-0 2008, 7 x 10, 664 pp. Suggested Price: $99.95 / £44.99

Catalog no. C9046, ISBN: 978-1-4200-9046-8 January 2009, 6-1/8 x 9-1/4, 274 pp., Soft Cover Suggested Price: $179.95 / £109.00

Textbook

Fundamental Number Theory with Applications

Design Theory

48 Second Edition C.C. Lindner and C.A. Rodger

Auburn University, Alabama, USA

Second Edition Richard A. Mollin

University of Calgary, Alberta, Canada

Series: Discrete Mathematics and Its Applications

Series: Discrete Mathematics and Its Applications

Through both formal descriptions and many illustrations, this text presents some of the most important techniques used for constructing combinatorial designs. The revised edition contains extensive new material on embeddings, directed designs, universal algebraic representations of designs, and intersection properties of designs. It focuses on construction methods to provide readers with the expertise to produce nonstandard experimental designs when needed. The text also includes important results in combinatorial designs, such as the existence of orthogonal Latin squares, balanced incomplete and pairwise balanced designs, affine and projective planes, and quadruple systems.

This updated volume presents a mathematically rigorous yet easyto-follow treatment of the fundamentals and applications of the subject. This edition is even more accessible than the previous; adds new fundamental material, including partition theory, generating functions, and combinatorial number theory; and expands coverage of random number generation, Diophantine analysis, and additive number theory. It also includes more applications to cryptography, primality testing, and factoring, and nearly 70 biographies of major contributors to the field. Appendices of background material and almost 400 exercises supplement the coverage. A solutions manual is available for qualifying instructors.

Catalog no. C2965, ISBN: 978-1-4200-8296-8 January 2009, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $89.95 / £49.99

Catalog no. C6659, ISBN: 978-1-4200-6659-3 2008, 6-1/8 x 9-1/4, 384 pp. Suggested Price: $94.95 / £49.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 48

12/19/08 10:25:37 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Textbook

Graph Theory and Its Applications Second Edition

Handbook of Combinatorial Designs Second Edition Edited by

Jonathan L. Gross

Charles J. Colbourn

Columbia University, New York, USA

Arizona State University, Phoenix, USA

Rollins College, Winter Park, Florida, USA Series: Discrete Mathematics and Its Applications

Jeffrey H. Dinitz

University of Vermont, Burlington, USA Series: Discrete Mathematics and Its Applications

Already the most widely used textbook on graph theory, Gross and Yellen’s Graph Theory and Its Applications enhances its appeal with the release of this refreshed and expanded second edition. The superior explanations, original applications, and abundance of study problems that positioned it as the preferred selection of classroom professors worldwide are still to be found in this updated volume. Nearly 200 pages have been added to the second edition including two new chapters, hundreds of new exercises, mostly nonroutine; and illustrated solutions and hints to selected exercises. The authors also extensively revised and reorganized more than half of the previously existing chapters.

Continuing in the best-selling, informative tradition of the first edition, this second edition remains one of the few resources to contain all of the most important results and tables in the area of combinatorial design. The handbook covers the constructions of designs, existence results, properties of designs, and applications of designs. Over 30% longer than the first edition, it contains new chapters on the history of design theory, various codes, bent functions, and numerous examples as well as updated tables, including BIBDs, PBDs, MOLS, and Hadamard matrices. With expanded and updated coverage, the book features new applications in cryptography, computer science, and finance.

Catalog no. C505X, ISBN: 978-1-58488-505-4 2006, 7 x 10, 800 pp. Suggested Price: $89.95 / £45.99

Catalog no. C5068, ISBN: 978-1-58488-506-1 2007, 7 x 10, 1016 pp. Suggested Price: $129.95 / £74.99

Graphs & Digraphs Fourth Edition

Handbook of Discrete and Combinatorial Mathematics

49

Edited by

G. Chartrand

Western Michigan University, Kalamazoo, Michigan, USA

L. Lesniak

Kenneth H. Rosen

Monmouth University, Middletown, New Jersey, USA

Drew University, Madison, New Jersey, USA

Series: Discrete Mathematics and Its Applications

An updated version of the popular book on graph theory, Graphs & Digraphs, Fourth Edition maintains its predecessor’s reputation for being thorough, accurate, and complete. Over the years, the book has evolved from a completely mathematical treatment to one that also considers the mathematical needs of computer scientists. The problems posed are designed to teach readers how to construct various proofs and in doing so, learn the meanings of definitions and concepts. The new edition features major changes to the sections on domination, colorings, distance, and Ramsey theory. The book includes more problems and offers a solutions manual with qualifying course adoption.

The Handbook of Discrete and Combinatorial Mathematics presents a comprehensive collection of ready reference material for all of the important areas of discrete mathematics, including those essential to its applications in computer science and engineering. From the fundamentals of logic, counting, and number theory to a myriad of applications, the book presents the material in a simple, uniform way that emphasizes each topic’s practical aspects. For easy reference, the text incorporates glossaries of important terms, lists of important theorems and formulas, numerous examples, website citations, and summary tables.

Catalog no. C3901, ISBN: 978-1-58488-390-6 2005, 6-1/8 x 9-1/4, 386 pp. Suggested Price: $104.95 / £57.99

Discrete Systems

Jay Yellen

Catalog no. 149, ISBN: 978-0-8493-0149-0 2000, 7 x 10, 1248 pp. Suggested Price: $129.95 / £73.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 49

12/19/08 10:25:38 AM


For more information and a complete list Handbook of Discrete and Computational Geometry Second Edition Edited by

Jacob E. Goodman

City College, New York, New York, USA

Textbook

Introducing Game Theory and its Applications Elliott Mendelson

Queens College, Dept. of Mathematics, Flushing, New York, USA

Joseph O’Rourke

Series: Discrete Mathematics and Its Applications, 28

Series: Discrete Mathematics and Its Applications

The mathematical study of games is an intriguing endeavor with applications that reach beyond chess and poker to economics, business, and even biology. This book presents an easy-to-read introduction to the basic ideas and techniques of game theory. It begins by discussing combinatorial games—a topic often neglected in other texts—then moves to two-person zero-sum games. The final chapter explores the concepts and tools of non-zero-sum games and games with more than two players. Suitable as a textbook, for self-study, and as a reference, this introduction prepares readers for more advanced study of game theory’s applications in economics, business, and the physical, biological, and social sciences.

Smith College, Northampton, Massachusetts, USA

Discrete Systems

Editors Jacob E. Goodman and Joseph O’Rourke reassembled their stellar panel of contributors, added many more, and together thoroughly revised their work to make the most important results and methods, both classic and cutting-edge, accessible in one convenient volume. Now over more then 1500 pages, the Handbook of Discrete and Computational Geometry, Second Edition once again provides unparalled, authoritative coverage of theory, methods, and applications. Highlights of the second edition include thirteen new chapters, thorough revisions of all remaining chapters, extended coverage of computational geometry software, author and subject indices, and greatly expanded bibliographies. Catalog no. C3014, ISBN: 978-1-58488-301-2 2004, 7 x 10, 1560 pp. Suggested Price: $139.95 / £73.99

Handbook of Graph Theory Edited by

50 Jonathan L. Gross

Columbia University, New York, USA

Jay Yellen

Catalog no. C3006, ISBN: 978-1-58488-300-5 2005, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $79.95 / £34.99

Textbook

Introduction to Abstract Algebra

Rollins College, Winter Park, Florida, USA

Jonathan D. H. Smith

Series: Discrete Mathematics and Its Applications, 25

Series: Textbooks in Mathematics

Iowa State University, Ames, USA

The Handbook of Graph Theory is the most comprehensive single-source guide to graph theory ever published. Best-selling authors Gross and Yellen assembled an outstanding team of experts to contribute overviews of more than 50 of the most significant topics in graph theory. They then carefully edited the compilation to produce a unified, authoritative work ideal for ready reference. Designed and edited with non-experts in mind, this handbook makes information easy to find and easy to understand. Each chapter includes lists of definitions and facts accompanied by examples, tables, remarks, a glossary and a bibliography, and in some areas, conjectures and open problems.

This book presents abstract algebra as the main tool underlying discrete mathematics and the digital world. It uses semigroups and monoids as stepping stones to present the concepts of groups and rings. The author discusses the fundamentals of abstract algebra, before offering deeper coverage of group and ring theory. He also provides examples of abstract algebra concepts in matrices and calculus. The text contains numerous pedagogical elements, including exercises of varying levels of difficulty, chapter notes that point out variations in notation and approach, and study projects that cover an array of applications. A solutions manual is available for qualifying instructors.

Catalog no. 8522, ISBN: 978-1-58488-090-5 2004, 7 x 10, 1192 pp. Suggested Price: $129.95 / £67.99

Catalog no. C0637, ISBN: 978-1-4200-6371-4 January 2009, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $89.95 / £49.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 50

12/19/08 10:25:39 AM


Applications of Cognitive Work Analysis

Textbook

Introduction to Combinatorial Designs

Edited by

Ann M. Bisantz

Second Edition

University at Buffalo, New York, USA

W.D. Wallis

Southern Illinois University, Carbondale, USA

This new edition presents a comprehensive look at combinatorial designs. It covers classical designs such as Latin squares, balanced incomplete block designs, and finite projective and affine planes as well as more contemporary designs that include one-factorizations, Room squares, tournament designs, and nested designs. The book features applications in cryptography, computer science, experimental design, communications theory, and more. With every topic, it includes instructive examples and theorems. The text also provides exercises in each section, select answers in the back of the book, and more complete solutions on the author’s website. Catalog no. C8385, ISBN: 978-1-58488-838-3 2007, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $89.95 / £47.99

Textbook

Catherine M. Burns

University of Waterloo, Ontario, Canada

Despite continued interest in Cognitive Work Analysis (CWA) there is no up-to-date book in the area and none which comprehensively documents the use of these methods in real world applications. This is a critical shortcoming as more cognitive engineers and human factors professionals seek to use CWA methods in their own work. This book demonstrates how these often complicated methods can be applied in complex, real-world design contexts, subject to constraints of cost, time, and information. It shows how, when, and where CWA techniques can be integrated into the systems engineering design process and provides concrete evidence for the value that the CWA approach provides. Catalog no. ER151X, ISBN: 978-0-8058-6151-8 January 2009, 6-1/8 x 9-1/4, 370 pp. Suggested Price: $89.95 / £49.99

Discrete Systems / Human/Computer Interaction

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Designing for Accessibility

Sums of Squares of Integers Carlos J. Moreno

City University of New York, New York, USA

Samuel S. Wagstaff, Jr.

A Business Guide to Countering Design Exclusion

Purdue University, West Lafayette, Indiana, USA

Simeon Keates

Series: Discrete Mathematics and Its Applications, 37

Series: Human Factors and Ergonomics

Sums of Squares of Integers combines elementary methods with analytic methods of modular functions to study the representation of integers as sums of squares. It explains how to compute the number of representations of an integer n as the sum of s squares for any s and n. It gives a proof of Szemeredi’s theorem, an important theorem in modern number theory, and it discusses how the modern theory of modular forms complements and clarifies the classical, fundamental results about sums of squares. The text includes applications to fields such as cryptography, crystallography, and thermal radiation. Catalog no. C4568, ISBN: 978-1-58488-456-9 2006, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $104.95 / £57.99

51

IBM T.J. Watson Research Center

A step-by-step guide, this book explores how to design products that offer the right combination of functionality, usability, and accessibility for all consumers. The author articulates why these three elements can make the critical difference in remaining competitive and economically viable over the long term. He provides insightful case studies that illustrate the corporate benefits for designing accessibility, in addition to carefully selected and valuable figures and tables. Demystifying what is involved in designing inclusive products for all users, the book highlights numerous examples for designers, such as creating a tool for Web browsing for older adults, as well as digital television access. Catalog no. ER8946, ISBN: 978-0-8058-6096-2 2007, 6 x 9, 184 pp. Suggested Price: $73.95 / £40.99 Also Available in Soft Cover

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 51

12/19/08 10:25:39 AM


For more information and a complete list Handbook of Digital Human Modeling

Research for Applied Ergonomics and Human Factors Engineering

Human/Computer Interaction

Edited by

Vincent G. Duffy Series: Human Factors and Ergonomics

Many human factors specialists lack the engineering knowledge to communicate possible modifications to their design team. Closing this gap between capability and expectation, Handbook of Digital Human Modeling provides a detailed description of the fundamentals, tools, and applications in the field of digital human modeling. The book covers applications in advanced manufacturing, aerospace, automotive, data visualization and simulation, defense and military systems, design for impaired mobility, healthcare and medical, information systems, and product design. This text also contains tools to help evaluate product and work design while reducing the need for physical prototyping. Catalog no. ER564X, ISBN: 978-0-8058-5646-0 January 2009, 7 x 10, 1006 pp. Suggested Price: $149.95 / £83.00

Human Factors in Simulation and Training Edited by

Dennis A. Vincenzi, John A. Wise, Mustapha Mouloua, and Peter A. Hancock A complete examination of issues and concepts relating to human factors in simulation, this book covers theory and application in space, ships, submarines, naval aviation, and commercial aviation. The text develops and expands on concepts in simulator usage, particularly specific characteristics and issues of simulation and their effect on the validity and functionality of simulators as a training device. The chapters contain in-depth discussions of these particular characteristics and issues. They also incorporate theories pertaining to the motivational aspects of training, simulation of social events, and PC based simulation. Catalog no. 72838, ISBN: 978-1-4200-7283-9 January 2009, 7 x 10, 468 pp. Suggested Price: $99.95 / £55.99

Textbook

Human Factors in Simple and Complex Systems

52 Second Edition

The Universal Access Handbook

Robert W. Proctor

Edited by

Trisha Van Zandt

Institute of Computer Science and University of Crete, Greece

Purdue University, Indiana, USA Ohio State University, Columbus, USA

The second edition of a bestseller, this book provides an understanding of the human factors issues often encountered in the design, implementation, and evaluation of products and systems. Emphasizing the close relationship between basic theory and application, the authors offer a framework for the research process and give an integrated view of the current state of knowledge regarding factors that influence human and system performance, examining how these factors can be accommodated in system design. This edition addresses such concepts as situation awareness and highlights topics of interest, with a special focus on computer applications and human-computer interaction. Catalog no. ER411X, ISBN: 978-0-8058-4119-0 2008, 7 x 10, 696 pp. Suggested Price: $99.95 / £46.99

Series: Human Factors and Ergonomics, 1

Written by leading international authorities from academic, research, and industrial organizations and non-market institutions, The Universal Access Handbook provides a comprehensive and multidisciplinary overview of the field of universal access. The book discusses how to systematically apply universal design principles to information technologies. It presents the historical roots of universal access through the progressive discussion of complementary approaches to the accessibility of interactive applications and services. Reviewing current perspectives and trends, the text also includes examples, case studies, and best practices in new and emerging applications. Catalog no. ER628X, ISBN: 978-0-8058-6280-5 June 2009, 8-1/2 x 11, 744 pp. Suggested Price: $149.95 / £89.00

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 52

12/19/08 10:25:40 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Fundamentals, Evolving Technologies and Emerging Applications, Second Edition Edited by

Textbook

A Concise Introduction to Image Processing using C++ Meiqing Wang

Andrew Sears

UMBC, Baltimore Department of Information, Maryland, USA

Julie A. Jacko

University of Fuzhou, China

Choi-Hong Lai

University of Greenwich, London, UK

Georgia Institute of Technology, Atlanta, USA Series: Human Factors and Ergonomics

Series: Chapman & Hall/CRC Numerical Analysis & Scientific Computation Series, 5

Exploring the evolution in how people use and work with technology, this second edition captures the most important scientific and technical know-how in the field. With contributions from over 130 researchers and professionals, over 5,500 references, 400 figures, and 100 tables, the book provides a wealth of data and a fresh perspective. New topics and authors ensure the revision contains new information and insights and the latest in research and practice. It features cutting-edge advances to the scientific knowledge base and visionary perspectives and developments that will fundamentally transform the way in which researchers and practitioners view the discipline.

Written by experts in fractal-based image and video compression, this book strengthens readers’ knowledge of fundamental principles in image acquisition, conservation, processing, and manipulation, improving their ability to apply these techniques to real-world problems. The book begins with coverage of representation, moves on to communications and processing, and concludes with discussions of processing techniques based on image representations and transformations developed in earlier chapters. Suitable as a text for any course on image processing, the book can also be used for self-study by researchers. The accompanying CD-ROM contains code for all algorithms.

Catalog no. ER9314, ISBN: 978-0-8058-5870-9 2008, 8-1/2 x 11, 1384 pp. Suggested Price: $149.95 / £85.00

Catalog no. C8970, ISBN: 978-1-58488-897-0 January 2009, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $79.95 / £39.99

Also Available in Soft Cover

Human/Computer Interaction / Image Processing

The Human-Computer Interaction Handbook

Four Tightly Focused Volumes Based on

Human-Computer Interaction

Design Issues, Solutions, and Applications

Textbook

Catalog no. 88858, ISBN: 978-1-4200-8885-4 February 2009, 8-1/2 x 11, 340 pp. Suggested Price: $89.95 / £54.99

Biosignal and Medical Image Processing

Human-Computer Interaction

John L. Semmlow

Designing for Diverse Users and Domains Catalog no. 88874, ISBN: 978-1-4200-8887-8 February 2009, 8-1/2 x 11, 240 pp. Suggested Price: $89.95 / £54.99

Human-Computer Interaction Development Process

Catalog no. 88904, ISBN: 978-1-4200-8890-8 February 2009, 8-1/2 x 11, 320 pp. Suggested Price: $89.95 / £54.99

Human-Computer Interaction Fundamentals

Catalog no. 88815, ISBN: 978-1-4200-8881-6 February 2009, 8-1/2 x 11, 304 pp. Suggested Price: $89.95 / £54.99

53

Rutgers University, Piscataway, New Jersey, USA Series: Signal Processing and Communications, 22

This second edition of a popular volume provides a complete set of signal processing tools including diagnostic decision-making tools and classification methods. New chapters cover adaptive neural nets, linear discriminators, and support vector machines. Examples and problems in MATLAB® encourage exploration of important properties of signal and image processing tools. An accompanying CD-ROM features data, support subroutines, and source code from examples in the text. An educational support CD-ROM that contains a solutions manual, a suggested syllabus, and PowerPoint® presentations of all chapters is also available for qualified instructors. Catalog no. 62301, ISBN: 978-1-4200-6230-4 January 2009, 7 x 10, 472 pp. Suggested Price: $99.95 / £39.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 53

12/19/08 10:25:40 AM


For more information and a complete list Color Image Processing

Methods and Applications Edited by

Rastislav Lukac

Epson Edge, Epson Canada Ltd., Ontario, Canada

Konstantinos N. Plataniotis

University of Toronto, Ontario, Canada Series: Image Processing Series, 7

Analysis and Design L. K. Mestha

Xerox Corporation, Webster, New York, USA

Sohail A. Dianat

Rochester Institute of Technology, New York, USA

Image Processing

With advances in image sensors, digital TV, image-enabled consumer electronics, and much more, color image processing is of paramount interest in the computer vision community. This book details recent advances in digital color image acquisition, analysis, processing, and display, exploring emerging color image, video, multimedia, and biomedical processing applications. It examines the latest techniques, algorithms, and solutions for digital color imaging, emphasizing emerging topics such as secure imaging, semantic processing, and digital camera image processing. It comprehensively covers the system design, implementation, and application aspects of digital color imaging.

Control of Digital Imaging Systems: Analysis and Design provides a historical overview of digital printing systems and explores the current status of these systems. It covers key concepts such as image transform, optical and modulation transfer function, and image denoising. It addresses techniques to analyze continuous and discrete linear systems, SISO and MIMO systems, as well as closed-loop linear systems. The basics of one-dimensional and three-dimensional tone control of color management systems are also discussed. The text presents detailed modeling and analysis techniques for internal closed-loop process controls along with techniques for interpolation of multidimensional functions.

Catalog no. 9774, ISBN: 978-0-8493-9774-5 2007, 7 x 10, 600 pp. Suggested Price: $154.95 / £86.00

Catalog no. DK6031, ISBN: 978-0-8493-3746-8 May 2009, 6-1/8 x 9-1/4, 800 pp. Suggested Price: $139.95 / £85.00

Textbook

54

Control of Digital Imaging Systems

Computer Imaging

Digital Color Imaging Handbook

Digital Image Analysis and Processing

Edited by

Scott E Umbaugh

Series: Electrical Engineering & Applied Signal Processing Series, 11

Taking an engineering approach, Computer Imaging: Digital Image Analysis and Processing integrates theory with a conceptual and application-oriented style, allowing readers to understand how topics fit into the structure of application development. It introduces the concepts necessary to understand computer imaging, describes image analysis, provides the tools, concepts, and models required to analyze digital images and develop computer vision applications, discusses application areas for the processing of images, and delivers the information required to use the CVIPtools environment in algorithm development for practical applications and research.

This handbook presents the elements of color science, systems, processing algorithms, and device characteristics relevant to digital color imaging. The first three chapters cover the basics of color vision, perception, and physics that underpin the subject. The remainder of the text presents the technology of color imaging with chapters on color management, device color characterization, image compression, color quantization, gamut mapping, computationally efficient transform algorithms, and color image processing for digital cameras. Each chapter is written by world-class experts and largely self-contained. Supplemental materials are available for download from the CRC Press website.

Southern Illinois University, Edwardsville, USA

Catalog no. 2919, ISBN: 978-0-8493-2919-7 2005, 7 x 10, 688 pp. Suggested Price: $104.95 / £57.99

Gaurav Sharma

University of Rochester, New York, USA

Catalog no. 0900, ISBN: 978-0-8493-0900-7 2003, 6-1/8 x 9-1/4, 816 pp. Suggested Price: $175.95 / £98.00

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 54

12/19/08 10:25:41 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Textbook

Digital Image Processing Uvais Qidwai

Qatar University, Doha

C.H. Chen

University of Massachusetts, North Dartmouth, USA Series: Chapman & Hall/CRC Textbooks in Computing

The Image Processing Handbook Fifth Edition John C. Russ

North Carolina State University, Raleigh, USA

This text focuses on theory algorithms and MATLAB® implementation. Each chapter presents theoretical background with extensive mathematical treatment as well as algorithmic structures and data manipulation that emphasize matrix and linear algebrabased architecture and system design. The chapters also include MATLAB exercises and sample programs to help readers who lack a sound background in engineering and mathematics. The authors provide actual classroom-based summaries that are designed to be used as lecture notes. The accompanying CD-ROM and supplementary website features MATLAB programs, PowerPoint® presentations, and lecture material for instructors.

Image processing is used in a wide variety of applications to improve the visual appearance of images and to prepare images for measurement. Covering techniques for both tasks, this best-selling handbook presents an extensive collection of image processing tools to help readers understand methods used in packaged software and learn to program additions for applications. With over 600 new and revised illustrations, this edition expands discussions on deconvolution, extended dynamic range images, and multichannel imaging with new material on principal components analysis. It also includes a new chapter on human vision and discusses the latest technologies for image capture and printing.

Catalog no. C7950, ISBN: 978-1-4200-7950-0 June 2009, 6-1/8 x 9-1/4, 450 pp. Suggested Price: $89.95 / £54.99

Catalog no. 7254, ISBN: 978-0-8493-7254-4 2007, 7 x 10, 832 pp. Suggested Price: $164.95 / £92.00

Image Processing

An Algorithmic Approach with MATLAB®

Textbook

Image Acquisition and Processing with LabVIEW Second Edition

Image Processing with MATLAB®

Applications in Medicine and Biology Omer Demirkaya

Christopher G. Relf

Walled Lake, Michigan, USA

King Faisal Specialist Hospital & Research Center, Riyadh, Saudi Arabia

Michael C. Ashe

Musa Hakan Asyali

Imaginatics, Waterford, Connecticut, USA

55

Erciyes University, Kayseri, Turkey

Prasanna K. Sahoo

Series: Image Processing Series, 5

Image Acquisition and Processing with LabVIEW provides a comprehensive IMAQ and Vision resource, combining tutorials with imaging related utilities. This second edition presents instructions on using robust technologies that were only emerging when the first edition was published. Offering in-depth coverage of LabVIEW, this book features three complete application frameworks of image processing, machine vision, and video analysis, with step-by-step training on their uses and modifications. The text also includes a CDROM with example code and demonstration versions of LabVIEW and NI Vision software. New chapters address microscopic and macroscopic processing as well as video acquisition. Catalog no. 68474, ISBN: 978-1-4200-6847-4 June 2009, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $119.95 / £72.99

University of Louisville, Kentucky, USA

This text explains complex, theory-laden topics in image processing through examples and MATLAB® algorithms. It provides these algorithms to help scientists and researchers quickly identify the most effective solution method for a particular problem at hand. The authors emphasize three-dimensional processing and analysis as well as statistical and stochastic modeling. They cover the new areas of nonlinear diffusion filtering and PDE-based image filtering, address relatively advanced topics, such as Markov random fieldbased image segmentation, and highlight applications with images from medicine and biology. They also include real-world examples and exercises in every chapter. Catalog no. 9246, ISBN: 978-0-8493-9246-7 January 2009, 6-1/8 x 9-1/4, 468 pp. Suggested Price: $99.95 / £42.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 55

12/19/08 10:25:42 AM


For more information and a complete list Textbook

Introduction to Image Processing and Analysis John C. Russ

North Carolina State University, Raleigh, USA

J. Christian Russ

President/Technical Director, Reindeer Graphics

Image Processing 56

MicroComputed Tomography Methodology and Applications Stuart R. Stock

Northwestern University, Evanston, Illinois, USA

A unique textbook, Introduction to Image Processing and Analysis establishes the programming involved in image processing and analysis by utilizing skills in C compiler and both Windows® and Mac OS programming environments. The provided mathematical background illustrates the workings of algorithms and emphasizes the practical reasons for using certain methods, their effects on images, and their appropriate applications. The chapters work together to combine image processing with image analysis. The text concentrates on image processing and measurement and details the implementation of many of the most widely used and most important image processing and analysis algorithms.

Due to the availability of commercial laboratory systems and the emergence of user facilities at synchrotron radiation sources, studies of microcomputed tomography (or microtomography) have increased exponentially. MicroComputed Tomography provides a complete introduction to microCT, describing how to use this technique effectively and how to understand its results. The first part of the book focuses on methodology, covering experimental methods, data analysis, and visualization approaches, while the second part addresses various microCT applications, including porous solids, microstructural evolution, soft tissue studies, multimode studies, and indirect analyses.

Catalog no. 7073, ISBN: 978-0-8493-7073-1 2008, 7 x 10, 376 pp. Suggested Price: $114.95 / £63.99

Catalog no. 58762, ISBN: 978-1-4200-5876-5 January 2009, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $129.95 / £72.99

Medical Image Processing, Reconstruction and Restoration Concepts and Methods Jiˇrí Jan

Brno University of Technology, Czech Republic

Modern Digital Halftoning Second Edition Daniel L. Lau

University of Kentucky, Lexington, USA

Gonzalo R. Arce

University of Delaware, Newark, USA

Series: Signal Processing and Communications, 25

Series: Signal Processing and Communications, 8

Development of new medical image processing methods and the interpretation of complicated or unexpected results require deep understanding of the underlying theory and methods involved in image processing and analysis. This text provides a firm grounding in the principles as well as insight into the way of treating the image material. It demonstrates consistent reasoning based on a firm grasp of image processing fundamentals, favoring continuous understandable explanation over strict mathematical formalism. The author first considers images as multidimensional signals, then as data sources, and finally delves into individual image processing topics such as tomographic image reconstruction and image fusion.

Documenting the development of digital printing since the first edition, Modern Digital Halftoning, Second Edition offers an integrated and up-to-date treatment of stochastic halftoning and digital printing. Using full-color photographs to enhance the text, this edition incorporates updated models, algorithms, and methods, providing all the necessary tools for continuing research in the field. It features new chapters on dither array construction, human visual models, direct binary search, stochastic moiré, lenticular printing, and digital multitoning. An accompanying CD-ROM contains MATLAB® files that employ numerous halftoning and statistical characterization algorithms from the book.

Catalog no. DK1212, ISBN: 978-0-8247-5849-3 2006, 6 x 9, 760 pp. Suggested Price: $164.95 / £92.00

Catalog no. 47531, ISBN: 978-1-4200-4753-0 2008, 7 x 10, 664 pp. Suggested Price: $159.95 / £89.00

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 56

12/19/08 10:25:42 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Adversarial Reasoning

Kumar Navulur

Mapping Science Institute, Longmont, Colorado, USA Series: Remote Sensing Applications Series, 1

Featuring various hands-on examples to provide understanding of this new approach, Multispectral Image Analysis Using the Object-Oriented Paradigm shows how to extract information from remotely sensed data for applications in agriculture, visual simulation, civil government mapping, forestry, fire risk assessment, and more. This book includes two CD-ROMs presenting sample data that allows readers to try different approaches to problem solving. Suitable for both beginners and advanced users with background in remote sensing and image processing, it also reviews all relevant technologies, demonstrates the advantages of objectbased image analysis, and contains 24 pages of high-quality color images. Catalog no. 43064, ISBN: 978-1-4200-4306-8 2007, 6-1/8 x 9-1/4, 184 pp. Suggested Price: $88.95 / £49.99

Edited by

Alexander Kott

DARPA-Defense Advanced Research Projects Agency

William M. McEneaney

University of California, San Diego, USA Series: Chapman & Hall/CRC Computer & Information Science Series, 10

Featuring approaches that draw from disciplines such as artificial intelligence and cognitive modeling, Adversarial Reasoning: Computational Approaches to Reading the Opponent’s Mind describes technologies and applications that address a broad range of practical problems, including military planning and command, military and foreign intelligence, antiterrorism and domestic security, as well as simulation and training systems. The book presents an overview of each problem and then discusses approaches and applications, combining theoretical rigor with accessibility. This comprehensive volume covers intent and plan recognition, deception discovery, and strategy formulation. Catalog no. C5882, ISBN: 978-1-58488-588-7 2007, 6-1/8 x 9-1/4, 340 pp. Suggested Price: $97.95 / £54.99

Image Processing / Intelligent Systems

Multispectral Image Analysis Using the Object-Oriented Paradigm

Computational Approaches to Reading the Opponent’s Mind

Shape Classification and Analysis Theory and Practice, Second Edition Luciano da Fona Costa

Cybernetic Vision Research, Sao Carlos, Brazil

Roberto Marcond Cesar, Jr.

Artificial Intelligence with Uncertainty

57

Deyi Li

Tsinghua University, Beijing, China

University of Sao Paulo, Brazil

Yi Du

Series: Image Processing Series, 10

Network Management Center, Beijing, China

Shape analysis offers great potential for applications in diverse areas, from materials science to biology and neuroscience. Including numerical tools for characterization, this new edition presents the most advanced imaging techniques for the analysis of general biological shapes, such as cells, tissues, organs, and organisms. Various chapters review the main approaches for shape classification. Although focused on two-dimensional shapes, which are more effectively handled by current technology, the text also covers basic concepts and techniques for three-dimensional shapes. These methods offer a rich resource for the computational characterization and classification of biological shapes. Catalog no. 7929, ISBN: 978-0-8493-7929-1 March 2009, 6-1/8 x 9-1/4, 696 pp. Suggested Price: $129.95 / £78.99

Through mathematical theories, models, and experimental computations, this book explores the uncertainties of knowledge and intelligence that occur during the cognitive processes of human beings. It describes the cloud model, its uncertainties of randomness and fuzziness, and the correlation between them. The book also centers on other physical methods for data mining, such as the data field and knowledge discovery state space. In addition, it presents an inverted pendulum example to discuss reasoning and control with uncertain knowledge as well as provides a cognitive physics model to visualize human thinking with hierarchy. Catalog no. C9985, ISBN: 978-1-58488-998-4 2008, 6-1/8 x 9-1/4, 376 pp. Suggested Price: $93.95 / £51.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 57

12/19/08 10:25:43 AM


For more information and a complete list Autonomous Mobile Robots

Sensing, Control, Decision Making and Applications Edited by

Bio-inspired Flying Robots

Shuzhi Sam Ge

National University of Singapore

Experimental Synthesis of Autonomous Indoor Flyers

Frank L. Lewis

Jean-Christophe Zufferey

The University of Texas at Arlington, USA

Intelligent Systems

Series: Automation and Control Engineering, 22

Serving as the first comprehensive reference on this interdisciplinary technology, Autonomous Mobile Robots authoritatively addresses the theoretical, technical, and practical aspects of the field. The book examines in detail the key components that form an autonomous mobile robot, from sensors and sensor fusion to modeling and control, map building and path planning, and decision making and autonomy, and to the final integration of these components for diversified applications. Expert contributors share hard-won insight into the practical implementation and integration issues involved in developing autonomous and open robotic systems and include examples, illustrations, and applications. Catalog no. DK6033, ISBN: 978-0-8493-3748-2 2006, 6 x 9, 736 pp. Suggested Price: $185.95 / £103.00

Laboratory of Intelligent Systems, Swiss Federal Institute of Technology

Bio-inspired Flying Robots: Experimental Synthesis of Autonomous Indoor Flyers discusses novel ultra-light flying robots and the control systems that have been designed for fully autonomous indoor aerial navigation. Among the aspects discussed in this unique volume are non-negligible weight and energy constraints, as well as the need for rapid (but low-energy) sensory-motor mapping. The book explores the application of biological principles to the development of navigation controllers, which allow flying robots to fly autonomously while avoiding collisions with other objects. Catalog no. EF6684, ISBN: 978-1-4200-6684-5 2008, 6-1/8 x 9-1/4, 250 pp. Suggested Price: $79.95 / £44.99

Deterministic Learning Theory for Identification, Control, and Recognition

58

Bayesian Artificial Intelligence Kevin B. Korb and Ann E. Nicholson Monash University, Victoria, Australia

As the power of Bayesian techniques has become more fully realized, the field of artificial intelligence has embraced Bayesian methodology and integrated it to the point where an introduction to Bayesian techniques is now a core course in many computer science programs. Bayesian Artificial Intelligence keeps mathematical detail to a minimum and covers a broad range of topics. The authors integrate all of Bayesian net technology and learning and apply them both to knowledge engineering. They emphasize understanding and intuition but also provide the algorithms and technical background needed for applications. Software, exercises, and solutions are available on the authors’ website. Catalog no. C3871, ISBN: 978-1-58488-387-6 2004, 392 pp. Suggested Price: $93.95 / £51.99

Cong Wang

National Natural Science Foundation of China, Haidian, Beiji

David J. Hill Series: Automation and Control Engineering, 32

Offering a new perspective on a largely unexplored area of knowledge acquisition, this book provides systematic design approaches for the identification, control, and recognition of nonlinear systems in uncertain environments. It begins with an introduction to the concepts of deterministic learning theory, followed by a discussion of RBF networks. Subsequent chapters describe the conceptual theory of deterministic learning processes and address closed-loop feedback control processes. Deterministic Learning Theory for Identification, Control, and Recognition also presents applications to areas such as fault detection, ECG/EEG pattern recognition, and security analysis. Catalog no. 7553, ISBN: 978-0-8493-7553-8 February 2009, 6-1/8 x 9-1/4, 248 pp. Suggested Price: $139.95 / £85.00

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 58

12/19/08 10:25:44 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Markus C. Hemmer

Governing Lethal Behavior in Autonomous Robots

Fresenius University of Applied Sciences, Cologne, Germany

Ronald Arkin

Expert systems allow scientists to better access, manage, and apply data and specialized knowledge from various disciplines to their own research. Focusing on one of the newest areas in chemistry, the book covers the scientific and computational principles behind expert systems and illustrates how they can improve laboratory workflows and support decision-making processes. It highlights current capabilities for planning and monitoring experiments, data management and interpretation, chemical characterization, and problem solving. It also offers practical strategies for encoding chemical data and discusses the challenges of integrating expert systems into existing laboratory software and instrumentation.

This volume explores the ethical dilemma faced by the developers and users of autonomous robots in military and combat zones. It provides the basis, motivation, theory, and design recommendations for the implementation of an ethical control and reasoning system suitable for constraining lethal actions of autonomous robotic systems. Based upon extensions of existing deliberative/reactive autonomous robotic architectures, it includes recommendations for the suppression of unethical behavior. Through a discussion of issues regarding the ultimate responsibility for the deployment of such systems, readers will gain a background on past, present, and possible future outcomes for autonomous robotic systems.

Catalog no. 5323X, ISBN: 978-1-4200-5323-4 2008, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $144.95 / £79.99

Catalog no. C5948, ISBN: 978-1-4200-8594-5 May 2009, 6-1/8 x 9-1/4, 200 pp., Soft Cover Suggested Price: $59.95 / £36.99

Textbook

Intelligent and Adaptive Systems in Medicine

A First Course in Fuzzy Logic

Georgia Institute of Technology, Atlanta, USA

Edited by

59

Olivier C.L. Haas and Keith J. Burnham

Third Edition

Intelligent Systems

Expert Systems in Chemistry Research

Coventry University, UK

Hung T. Nguyen and Elbert A. Walker

Series: Series in Medical Physics and Biomedical Engineering

The best-selling A First Course in Fuzzy Logic provides an introduction to the theory of fuzzy sets and its areas of application in engineering and decision making. This third edition has been completely revised and expanded with new information on copulas and t-norms and features a new section on type-2 fuzzy sets. It also includes expanded information on generalized modus ponens, the compositional rule of inference, possibility theory, partial knowledge, and fuzzy integrals. With exercises at the end of each chapter, this book remains an essential text for students from such fields as artificial intelligence, computer science, engineering, cognitive science, and probability and statistics.

This book clearly and concisely explains a range of adaptive and intelligent systems, highlighting their benefits and limitations with realistic medical examples. It illustrates how these systems can be used in all stages of medical treatment. Each chapter presents a family of an intelligent and adaptive system, explains the techniques and algorithms behind these systems, and explores how to solve medical and biomedical problems using intelligent and adaptive systems. The text focuses on the tools of fuzzy logic, artificial neural networks, neuro-fuzzy modeling, adaptive and predictive control, systems and statistical modeling, and image processing.

New Mexico State University, Las Cruces, USA

Catalog no. C5262, ISBN: 978-1-58488-526-9 2006, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $104.95 / £57.99

Catalog no. IP385, ISBN: 978-0-7503-0994-3 2008, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $149.95 / £83.00

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 59

12/19/08 10:25:44 AM


For more information and a complete list Intelligent Control Systems with an Introduction to Systems of Systems Harvard University, Cambridge, Massachusetts, USA

Neural Networks, Wavelets, and Chaos Theory for Intelligent Transportation Systems and Smart Structures

Mo Jamshidi

Hojjat Adeli

Ferat Sahin

Xiaomo Jiang

This is the first book that integrates the fundamentals of artificial intelligence and systems control in a framework that can be applied in simple dynamic systems, as well as in a large-scale system of systems for aviation, defense, and distributed manufacturing systems. Wherever possible, MATLAB® code is used to simulate discussed results. Projects are included that will allow readers to obtain first-hand experience with the concepts. By learning, testing, and simulating important theories used in modern systems engineering, readers will discover emerging opportunities in a field that will revolutionize the way large organizations, factories, and manmade systems are managed.

Recent estimates hypothesize that the US will need $1.6 trillion dollars for rehabilitation, replacement, and maintenance of existing infrastructure systems within the next 20 years. Presenting a new vision and way of designing and managing the civil infrastructure of the nation, this text introduces novel technologies, methods, and detailed computational algorithms for the creation of smart structures and intelligent freeways. Cutting across the disciplines of structural and transportation engineering, it provides a unique treatise for attacking and solving some of the most complex problems encountered in the emerging fields of smart structures and intelligent transportation systems.

Catalog no. 79247, ISBN: 978-1-4200-7924-1 May 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $99.95 / £60.99

Catalog no. 85360, ISBN: 978-1-4200-8536-5 January 2009, 7 x 10, 440 pp. Suggested Price: $159.95 / £89.00

Thrishantha Nanayakkara

University of Texas, San Antonio, USA

Intelligent Systems 60

Intelligent Infrastructure

Rochester Institute of Technology, New York, USA

Intelligent Freight Transportation Edited by

Petros A. Ioannou

University of Southern California, Los Angeles, USA Series: Automation and Control Engineering, 27

Ohio State University, Columbus, USA GE-Energy, Greenville, South Carolina, USA

Intelligent Network Video

Understanding Modern Video Surveillance Systems Fredrik Nilsson

Axis Communications Inc., Chelmsford, Massachusetts, USA

With contributions from experts, this book presents techniques and technologies to boost capacity, reduce cost, and improve efficiency in transportation systems. It discusses ports and container terminals, how they interact with surface transportation, and related security issues. It covers fully automated containers, explains cost and performance analysis, and examines new strategies for empty container reuse, truck routing, and dispatching to meet time constraints for service. Additional topics include container terminals of the future, advanced processing technologies, and the gate appointment system. It also examines labor union issues and environmental issues.

This is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also discusses frame rate control, indoor/outdoor installations, and specifications on MPEG-4 and other digital video formats. The book is accompanied by a CD-ROM containing tools for deploying and optimizing an installation. It is an essential resource for security system designers, consultants, and installers, as well as business and security managers.

Catalog no. 0770, ISBN: 978-0-8493-0770-6 2008, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $139.95 / £77.99

Catalog no. AU6156, ISBN: 978-1-4200-6156-7 January 2009, 7 x 10, 416 pp. Suggested Price: $79.95 / £44.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 60

12/19/08 10:25:45 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Intelligent Systems

Yung C. Shin and Chengying Xu

Purdue University, West Lafayette, Indiana, USA

Textbook

An Introduction to Neural Networks

Series: Automation and Control Engineering, 30

Kevin Gurney

Providing a thorough introduction to the field of soft computing techniques, Intelligent Systems: Modeling, Optimization, and Control covers every major technique in artificial intelligence in a clear and practical style. This book highlights current research and applications, addresses issues encountered in the development of applied systems, and describes a wide range of intelligent systems techniques, including neural networks, fuzzy logic, evolutionary strategy, and genetic algorithms. The book demonstrates concepts through simulation examples and practical experimental results. Case studies are also presented from each field to facilitate understanding.

Although mathematical ideas underpin the study of neural networks, this book presents the fundamentals without the full mathematical apparatus. The author tackles virtually all aspects of the field, including artificial neurons as models of their real counterparts; the geometry of network action in pattern space; gradient descent methods; associative memory and Hopfield nets; and self-organization and feature maps. The book provides a concrete focus through several real-world examples, broadening the book’s audience to include both students and professionals in cognitive science, psychology, and computer science as well as those involved in the design, construction, and management of networks.

Catalog no. 51768, ISBN: 978-1-4200-5176-6 January 2009, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $129.95 / £72.99

Catalog no. TF2590, ISBN: 978-1-85728-503-1 1998, 6-1/8 x 9-1/4, 234 pp., Soft Cover Suggested Price: $59.95 / £32.99

Intelligent Systems

Neural Networks for Applied Sciences and Engineering

Technology and Applications, Six Volume Set

University of Sheffield, UK

Intelligent Systems

Modeling, Optimization, and Control

61

Edited by

From Fundamentals to Complex Pattern Recognition

Cornelius T. Leondes

Sandhya Samarasinghe

Emeritus Professor, University of California, USA

Lincoln University, Canterbury, New Zealand

Intelligent systems are playing an increasing role in areas ranging from medicine to the major manufacturing industries to financial markets. The consequences of flawed artificial intelligence systems are equally wide ranging and can be seen, for example, in the programmed trading-driven stock market crash of October 19, 1987. This six-volume set connects theory with proven practical applications to provide broad, multidisciplinary coverage in a single resource. International experts present case-study examples of successful practical techniques and solutions for diverse applications, ranging from robotic systems to speech and signal processing, database management, and manufacturing.

Neural Networks for Applied Sciences and Engineering provides a simple, systematic introduction to neural networks applications. The book features case studies that use real data to demonstrate practical applications. It contains in-depth discussions of data, model validation, and uncertainty assessment issues, as well as data dimensionality and methods to reduce dimensionality. It provides coverage of neural network types for extracting nonlinear patterns in multi-dimension scientific data, including multi-layer perceptron for nonlinear prediction and classification, self organization maps for discovery of unknown data clusters and recurrent networks for nonlinear time-series forecasting.

Catalog no. 1121, ISBN: 978-0-8493-1121-5 2003, 7 x 10, 2400 pp. Suggested Price: $2100.00 / £1167.00

Catalog no. AU3375, ISBN: 978-0-8493-3375-0 2007, 6-1/8 x 9-1/4, 570 pp. Suggested Price: $104.95 / £57.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 61

12/19/08 10:25:46 AM


For more information and a complete list Pervasive Computing in Healthcare

Textbook

Alex Mihailidis

Signal Processing for Intelligent Sensor Systems

University of Toronto, Ontario, Canada

Second Edition

Dadong Wan

David C. Swanson

With an holistic outlook, Pervasive Computing in Healthcare offers an overview of the subject and its application to problems in healthcare and disability. This book covers the basics, including various types of computer science tools and techniques, and introduces important models in applying technology to healthcare, disease, and disability. It presents specific examples of pervasive computing applications in various contexts, such as in the home or in the hospital, and discusses how it can be applied as proactive or preventative methods to help with diseases. This text also provides an understanding of research and methodological issues related to developing technologies.

Signal Processing for Intelligent Sensor Systems, Second Edition integrates a broad range of physics, algorithms and sensing techniques for the development of intelligent systems. Presented in a consistent framework with numerous examples and references to applications, this best-selling volume introduces readers to the essential elements of the subject and clarifies its limitations. The text highlights adaptive least-squared error modelling, and it also covers complex sampling, physical system modelling using digital filters, frequency domain processing, and beamforming. The Z-transform, the Fourier transform, spectral density, and wavenumber transforms are also profiled.

Catalog no. 3621, ISBN: 978-0-8493-3621-8 2007, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $144.95 / £79.99

Catalog no. DK5558, ISBN: 978-0-8247-9942-7 2000, 9 9/10 x 6 4/5, 632 pp. Suggested Price: $149.95 / £79.99

Edited by

Jakob E. Bardram

IT University of Copenhagen, Denmark

Intelligent Systems

Accenture Technology Labs, Chicago, Illinois, USA

62

Quantum Matrix

Pennsylvania State University, State College, USA

Using Artificial Intelligence in Chemistry and Biology A Practical Guide

Robert Croker

Hugh Cartwright

YouTube, Wikipedia, Second Life, and MySpace are only the beginning. The present and the future is Quantum Matrix. Filled with detailed descriptions of cutting-edge technologies in relation to machine evolution and human emotions, this book includes concrete examples of how technology is changing industry. It includes organizational strategies to enhance wellbeing by aiding human evolution. The book also provides insights on how advanced business strategy relates to quantum mechanics, a prerequisite for corporate survival. It covers open source platforms seen as “particles” capable of rewriting the business game rules of an entire industry, such as Napster’s impact on the music industry.

In a lucid, straightforward manner, this book explains how Artificial Intelligence (AI) methods are used by scientists and what can be accomplished with them. Designed for those with no prior programming knowledge, this book efficiently and quickly teaches meaningful scientific applications. Using a practical and direct approach, it addresses the needs of scientists across a range of disciplines. Topics include an introduction to artificial intelligence, artificial neural networks, self-organizing maps, growing cell structures, evolutionary algorithms, cellular automata, expert systems, fuzzy logic, learning classifier systems, and evolvable developmental systems.

Catalog no. AB8982, ISBN: 978-1-4200-8982-0 January 2009, 6-1/8 x 9-1/4, 162 pp. Suggested Price: $129.95 / £72.99

Catalog no. 8412, ISBN: 978-0-8493-8412-7 2008, 6-1/8 x 9-1/4, 360 pp. Suggested Price: $129.95 / £72.99

ANE Books India, Darya Ganj, India

Oxford University, UK

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 62

12/19/08 10:25:46 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Volume 2

Towards the Spatial Semantic Web

Edited by

Edited by

Marios C. Angelides

Peter van Oosterom and Sisi Zlatanova

Brunel University, Middlesex, England, United Kingdom

Delft University of Technology, The Netherlands

Now that text-based search engines have begun to give way to contentand context-aware engines, advanced network infrastructures are starting to emerge. These infrastructures are capable of end-to-end ubiquitous transmission of multimedia content to any device on any network. This book is a collection of expanded papers presented at the 2007 2nd International Workshop on Semantic Media Adaptation and Personalization. It explores recent developments in the field of semantic media adaptation and personalization. Topics discussed include the challenges of collaborative content modeling, video adaptation, information retrieval techniques for semantic media adaptation, and podcasting.

Agreement on the syntax and formats of spatial data and developing systems to handle these is the first step towards the spatial information infrastructure (SII). Although a set of standards has already been established, a wealth of other technical and non-technical aspects must still be addressed. Creating Spatial Information Infrastructures covers these issues in depth. This book reflects recent major initiatives to create an SII, including the European INSPIRE initiative and the US DHS Geospatial Data Model. International research contributors present up-to-date information on current research and standardization efforts for SII. This text also discusses semantic web technologies.

Catalog no. AU7664, ISBN: 978-1-4200-7664-6 February 2009, 6-1/8 x 9-1/4, 480 pp. Suggested Price: $129.95 / £78.99

Catalog no. 70681, ISBN: 978-1-4200-7068-2 2008, 6-1/8 x 9-1/4, 216 pp. Suggested Price: $129.95 / £72.99

Internet & Web-based Computing

Advances in Semantic Media Adaptation and Personalization

Creating Spatial Information Infrastructures

Textbook

Cybersins and Digital Good Deeds A Book About Technology and Ethics

Building Trustworthy Semantic Webs Bhavani Thuraisingham

63

MaryAnn Bell, EdD

Huntsville, Alabama, USA

James L. Van Roekel, EdD and Bobby Ezell, MLS

The University of Texas, Richardson, USA

Sam Houston State University, Huntsville, Texas, USA

The semantic web provides a common framework that allows data to be shared and reused across applications, enterprises, and community boundaries. The major concern today is securing these semantic webs to ensure that they are dependable. Building Trustworthy Semantic Webs addresses this important topic. Including numerous exercises to make it suitable as both a textbook and as a reference guide, this book presents detailed discussions on securing XML, RDF, and information integration. It also provides coverage of privacy for the semantic web, secure web services, and dependability issues such as real-time processing, faulty tolerance, and integrity for the semantic web.

What is safe and responsible behavior for using the Internet? This volume provides a comprehensive look at the innovative—and sometimes unscrupulous—world of rapidly evolving technology and the people who use it. This encyclopedic source helps even the most technology-challenged understand various facets relating to the use and misuse of technology in today’s society. Topics are organized A-to-Z for easy reference, with selections chosen because of historical importance, present relevance, and the likelihood of future impact. Privacy, security, censorship, and much more are discussed in detail to reveal the ethical complexities of each issue.

Catalog no. AU5080, ISBN: 978-0-8493-5080-1 2008, 6-1/8 x 9-1/4, 432 pp. Suggested Price: $83.95 / £46.99

Catalog no. HW15331, ISBN: 978-0-7890-2953-9 2007, 8-1/2 x 6, 187 pp. Suggested Price: $41.95 / £22.99 Also Available in Soft Cover

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 63

12/19/08 10:25:47 AM


For more information and a complete list Textbook Textbook

Digital Watermarking and Steganography

Foundations of Semantic Web Technologies

Internet & Web-based Computing

Fundamentals and Techniques

Pascal Hitzler, Sebastian Rudolph, and Markus Kroetzsch

Frank Y. Shih

New Jersey Institute of Technology, Newark, USA

Series: Chapman & Hall/CRC Textbooks in Computing

In addition to providing mechanical information regarding digital watermarking and steganography, this work also provides the framework needed to develop extensive advanced algorithms. It shows how robust high-capacity watermarking techniques can be successfully used to enlarge the hiding capacity while maintaining the robustness of the watermark. Several algorithms are presented to illustrate the framework and provide assistance in implementing fundamental principles. Alternatives to traditional strategies are presented. The principles taught are illustrated with plentiful graphs and examples in order to simplify the problems and make highly complicated theories readily understandable.

Semantic web is a maturing field of technology that continues to be the emphasis of much focused research. This foundational text introduces the standardized knowledge representation languages for modeling ontologies operating at the core of the semantic web. The authors explain syntax and underlying intuitions through examples, with separate treatment of the underlying formal semantics. They cover RDF schema, Web Ontology Language (OWL), rules, and query languages, such as SPARQL. The book also presents recent developments concerning the OWL 2 revision and the forthcoming Rule Interchange Format (RIF). Ancillary material is available for qualifying instructors.

Catalog no. 47574, ISBN: 978-1-4200-4757-8 2008, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $83.95 / £46.99

Catalog no. C9050, ISBN: 978-1-4200-9050-5 June 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $79.95 / £48.99

University of Karlsruhe, Karlsruhe, Germany

Handbook of Mobile Broadcasting Emergent Semantics

64 Interoperability in Large-

Scale Decentralized Information Systems Philippe Cudré-Mauroux

MIT Computer Science & Artificial Intelligence Laboratory, Cambridge, Massachusetts, USA

DVB-H, DMB, ISDB-T, AND MEDIAFLO Edited by

Borko Furht

Florida Atlantic University, Boca Raton, USA

Syed Ahson

Microsoft Corporation, Bellevue, Washington, USA Series: Internet and Communications

Peer-to-peer systems are evolving with new informationsystem architectures, leading to the idea that the principles of decentralization and self-organization will offer new approaches in informatics. This is true especially for systems that scale with the number of users or for with systems in which central authorities do not prevail. In step with this technological realization among experts, Emergent Semantics: Interoperability in Large-Scale Decentralized Information Systems describes a new way of building global agreements (known as semantic interoperability) based only on decentralized, self-organizing interactions.

Operators are now introducing mobile television and digital video content services globally. This handbook addresses all aspects of these services, providing a comprehensive reference on DVB-H, DMB, ISDB-T, and MediaFLO. Featuring contributions from experts in the field, the text presents technical standards and distribution protocols, offering detailed coverage of video coding, including design methodology and error resilience techniques; state-of-theart technologies such as signaling, optimization, implementation, and simulation; and applications of mobile broadcasting, including emerging areas and new interactive services.

Catalog no. EF9227, ISBN: 978-1-4200-9227-1 January 2009, 6-1/8 x 9-1/4, 240 pp. Suggested Price: $84.95 / £46.99

Catalog no. AU5386, ISBN: 978-1-4200-5386-9 2008, 7 x 10, 744 pp. Suggested Price: $149.95 / £83.00

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 64

12/19/08 10:25:48 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Barney L. Capehart

University of Florida, Gainesville, USA

Lynne C. Capehart

Consultant, Gainesville, Florida, USA

Liyang Yu

Delta Technology, Atlanta, Georgia, USA

Equipping you with the tools to explore the world of the semantic web, this practical resource builds a firm foundation in the concept of the semantic web, its principal technologies, its real-world applications, and its relevant coding examples. After an introduction to the semantic web concept, the book discusses its major technical enablers and the relationships among these components. The author then presents several applications of the semantic web, including Swoogle, FOAF, and a detailed design of a semantic web search engine. The book concludes with discussions on how to add semantics to a traditional web service description and how to develop a search engine for semantic web services. Catalog no. C9330, ISBN: 978-1-58488-933-5 2007, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $73.95 / £40.99

Multimedia Content Encryption

Techniques and Applications Shiguo Lian

The capability and use of IT and web based energy information and control systems have expanded from single facilities to multiple facilities and organizations with buildings located throughout the world. This book answers the question of how to take the mass of available data and extract from it simple and useful information which can determine what actions to take to improve efficiency and productivity of commercial, institutional and industrial facilities. The book also provides insight into the areas of advanced applications for web based EIS and ECS systems, and the integration of IT/web based information and control systems with existing BAS systems. Catalog no. FP8235, ISBN: 978-0-8493-8235-2 2007, 8-1/2 x 11 Suggested Price: $185.95 / £103.00

X Internet

Internet & Web-based Computing

Introduction to the Semantic Web and Semantic Web Services

Web Based Enterprise Energy and Building Automation Systems

65

The Executable and Extendable Internet Jessica Keyes

SAMI Lab, Beijing, China

New Art Technologies, Edgewater, New Jersey, USA

This book presents the latest research on multimedia content encryption. It begins with a brief history and then proceeds to examine performance requirements and fundamental encrypting techniques. It discusses the most common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, it reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. Open issues and areas for further research are also explored.

Many IT experts are beginning to see signs of the end of the operating system as the cornerstone of desktop software. From a strategic as well as a tactical perspective, X Internet: The Executable and Extendable Internet thoroughly defines and describes in detail this new paradigm that is replacing the operating system as the key platform in delivering applications to the desktop. This book provides an in-depth discussion of the importance of X-internet to organizations, showing them how to profit from its use. It also provides a tutorial-based approach to creating X-internet applications, using software engineering methodologies and principles to facilitate understanding of this new subject area.

Catalog no. AU6527, ISBN: 978-1-4200-6527-5 January 2009, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $99.95 / £55.99

Catalog no. AU0418, ISBN: 978-0-8493-0418-7 2007, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $83.95 / £46.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 65

12/19/08 10:25:49 AM


For more information and a complete list Textbook

Machine Learning & Pattern Recognition

Applied Genetic Programming and Machine Learning

Digital Design

Hitoshi Iba and Yoshihiko Hasegawa

Mohammad A. Karim

University of Tokyo, Japan

Topon Kumar Paul

Basic Concepts and Principles Old Dominion University, Norfolk, Virginia, USA

Toshiba Corporation, Japan

Xinghao Chen

Reflecting rapidly developing concepts and newly emerging paradigms in intelligent machines, this text is the first to integrate genetic programming and machine learning techniques to solve diverse real-world tasks.These tasks include financial data prediction, day-trading rule development; and bio-marker selection. Written by leading authorities, this text will teach readers how to use machine learning techniques, make learning operators that efficiently sample a search space, navigate the search process through the design of objective fitness functions, and examine the search performance of the evolutionary system. All source codes and GUIs are available for download from the authors’ website.

Much of modern digital design activities are realized using computeraided design applications, which provide quick turnaround time with ready access to circuit synthesis and simulation applications. Integrating digital design principles with design practices using one of the industry’s most popular design applications, the Xilink Web PACK, this book addresses many of the challenging issues that are critical to modern digital design practices. Digital Design provides an in-depth discussion of optical computing, neural networks, sequential arithmetic processors, and other important topics. The text also features end-of-chapter problems, over 100 worked examples, and more than 500 circuit drawings.

Catalog no. K10206, ISBN: 978-1-4398-0369-1 June 2009, 6-1/8 x 9-1/4, 270 pp. Suggested Price: $79.95 / £48.99

Catalog no. 61313, ISBN: 978-1-4200-6131-4 2008, 7 x 10, 504 pp. Suggested Price: $104.95 / £57.99

Conceptual Structures in Practice Edited by

Endwell, New York, USA

Textbook

Fundamentals of Natural Computing

University Of Karlsruhe, Germany

Basic Concepts, Algorithms, and Applications

Henrik Scharfe

Leandro Nunes de Castro

Series: Chapman & Hall/CRC Studies in Informatics Series

Series: Chapman & Hall/CRC Computer & Information Science Series, 11

Presenting perspectives from both the conceptual graph and FCA communities, this volume takes you through the basic yet nontrivial task of establishing conceptual relations as the foundation for research in knowledge representation and knowledge mining. After providing the formal background in FCA and conceptual graphs, it describes various software tools for analysis and computation, including the ToscanaJ suite. Written by the original visionaries of the field, the next section discusses the history and future directions of conceptual structures. The final chapters explore prominent application areas in computer science, including text analysis, web semantics, and intelligent systems.

A wide-ranging survey of novel techniques and important applications, this book contains theoretical and philosophical discussions, pseudocodes for algorithms, and computing paradigms that illustrate how computational techniques can solve complex problems, simulate nature, explain natural phenomena, and allow the development of new computing technologies. The author uses a consistent and approachable format that includes figures, tables, examples, and exercises that encourage readers to apply the computational tools. Topics include evolutionary computing, neurocomputing, swarm intelligence, immunocomputing, fractal geometry, artificial life, quantum computing, and DNA computing.

Catalog no. C6062, ISBN: 978-1-4200-6062-1 February 2009, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $99.95 / £60.99

Catalog no. C6439, ISBN: 978-1-58488-643-3 2006, 6-1/8 x 9-1/4, 696 pp. Suggested Price: $89.95 / £45.99

66 Pascal Hitzler

Aalborg University, Denmark

Catholic University of Santos, Brazil

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 66

12/19/08 10:25:49 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Multi-Agent Systems Textbook

Edited by

Machine Learning

Adelinde M. Uhrmacher

An Algorithmic Perspective

University of Rostock, Germany

Danny Weyns

Stephen Marsland

Katholieke Universiteit Leuven, Belgium

Massey University, Palmerston North, New Zealand

Series: Computational Analysis, Synthesis, and Design of Dynamic Systems

Introduction to Machine Learning introduces this subject to computer science students and others who may not have a strong mathematical background. Focusing on algorithms and applications, the text presents three distinct sets of problems for each section: standard questions that test understanding of the material, structured programming exercises using code and data from the Internet, and suggested further investigations, often involving some basic programming. The book covers such fundamental topics as neuronal modeling, perceptron, multi-layer perceptron, classification, regression, decision trees, the naïve Bayes’ classifier, unsupervised learning, the self-organizing map, and genetic algorithms.

Multiple agent systems (MAS) have been used extensively as a tool for designing simulation problems; while simulation has often been used for the design of multiple agent studies. This book focuses on the intersection of MAS and simulation, emphasizing application domains. The book starts with a historical overview from different perspectives. A second part discusses the use of simulation in MAS and among a wealth of topics, explains simulation support for agent decision making. A third section zooms in on the specifics of MAS for simulation and a last section presents a number of representative platforms and tools for MAS and simulation.

Catalog no. C6718, ISBN: 978-1-4200-6718-7 April 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $59.95 / £36.99

Machine Learning Algorithms for Spatial Data Analysis and Modelling

Catalog no. 70231, ISBN: 978-1-4200-7023-1 January 2009, 7 x 10, 536 pp. Suggested Price: $139.95 / £85.00

Semisupervised Learning for Computational Linguistics

67

Steven Abney

Mikhail Kanevski, Vadim Timonin, and Alexi Pozdnukhov

University of Michigan, Ann Arbor, USA

This book discusses machine learning algorithms, such as artificial neural networks of different architectures, statistical learning theory, and Support Vector Machines used for the classification and mapping of spatially distributed data. It presents basic geostatistical algorithms as well. The authors describe new trends in machine learning and their application to spatial data, and they also include case studies based on environmental and pollution data. This comprehensive and practical volume includes a CD-ROM with software that will allow both students and researchers to put the concepts to practice.

This book provides a broad, accessible treatment of the theory and linguistic applications of semisupervised methods. It presents a brief history of the field before moving on to discuss well-known natural language processing methods, such as self-training and cotraining. It then centers on machine learning techniques, including the boundary-oriented methods of perceptrons, boosting, SVMs, and the null-category noise model. In addition, the book covers clustering, the EM algorithm, related generative methods, and agreement methods. It concludes with the graph-based method of label propagation along with a detailed discussion of spectral methods.

University of Lausanne, Switzerland

Catalog no. EF8237, ISBN: 978-0-8493-8237-6 January 2009, 6 x 9, 400 pp. Suggested Price: $109.95 / £66.99

Machine Learning & Pattern Recognition

Simulation and Applications

Series: Chapman & Hall/CRC Computer Science & Data Analysis

Catalog no. C5599, ISBN: 978-1-58488-559-7 2008, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $83.95 / £46.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 67

12/19/08 10:25:50 AM


For more information and a complete list

C++ for Mathematicians

Textbook

Edward Scheinerman

Elements of Compiler Design

An Introduction for Students and Professionals

Programming Languages

Johns Hopkins University, Baltimore, Maryland, USA

Alexander Meduna

The first book available on C++ programming that is written specifically for a mathematical audience, C++ for Mathematicians omits the language’s more obscure features in favor of the aspects of greatest utility for mathematical work. Emphasizing the essential role of practice as part of the learning process, the book is ideally designed for undergraduate coursework as well as selfstudy. Each chapter provides many problems and solutions which complement the text and enable you to apply concepts right away. An accompanying CD-ROM provides all numbered programs so that readers can easily use or adapt the code as needed.

This text presents the essentials of compiler writing in an easyto-follow way so readers can grasp compiler construction quickly and clearly. It includes intuitive explanations, theoretical concepts, definitions, algorithms, and compilation techniques. The author examines the mathematical foundations of compiler design and related topics, such as formal languages, automata, and transducers. He also demonstrates how theory and practice work together in a real-world context through the implementation of algorithms, examples, case studies, and software tools, such as lex and yacc. The book contains the C++ implementation of a real compiler as well as a variety of challenging exercises.

Catalog no. C584X, ISBN: 978-1-58488-584-9 2006, 6-1/8 x 9-1/4, 520 pp., Soft Cover Suggested Price: $67.95 / £37.99

Brno University of Technology, Czech Republic

Catalog no. AU6323, ISBN: 978-1-4200-6323-3 2008, 7 x 10, 304 pp. Suggested Price: $93.95 / £51.99

GIS Programming

Textbook

Classical Fortran

68 Programming for

Engineering and Scientific Applications, Second Edition

Concepts and Applications Edited by

Zhi-Jun Liu

University of North Carolina at Greensboro, USA

David Percy

Portland State University, Oregon, USA

Michael Kupferschmid

Larry V. Stanislawski

Rensselaer Polytechnic Institute, Troy, New York, USA

USGS, Rolla, Missouri, USA

This text teaches how to write computer programs in the Classical dialect of the FORTRAN language. Along with numerous updates and revisions throughout, this second edition includes an additional case study on file I/O, new sections that cover CPU timing on Pentium processors, and more information about the g77 compiler and Linux. It continues to use case studies and examples to introduce the language elements and design skills needed to write graceful, correct, and efficient programs for real engineering and scientific applications. A solutions manual is available for qualifying instructors.

Conventional GIS does not provide all the functions needed for geospatial processing. As a result, GIS customization and programming are becoming increasingly important. Focusing on automation and customization, this book describes concepts of computer programming in general and of GIS programming in particular. Python and Visual Basic for Application illustrates the geospatial techniques discussed in the text. Various applications further demonstrate concepts and methods. An included CD-ROM provides a wide range of hands-on exercises as well as sample data for programming. This complete reference is designed to bring professionals up to date in this rapidly evolving field.

Catalog no. 59076, ISBN: 978-1-4200-5907-6 January 2009, 7 x 10, 576 pp. Suggested Price: $89.95 / £54.99

Catalog no. 8527, ISBN: 978-0-8493-8527-8 June 2009, 6 x 9, 250 pp. Suggested Price: $99.95 / £60.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 68

12/19/08 10:25:52 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Owen Jones, Robert Maillardet, and Andrew Robinson University of Melbourne, Parkville, Australia

Andy H. Register

Georgia Tech Research, Smyrna, USA

The first book to deliver broad coverage of the documented and undocumented object-oriented features of MATLAB®, this guide aids readers in creating effective software. Eight basic functions are discussed: constructor, subsref, subsasgn, display, struct, fieldnames, get, and set. Also explored are inheritance topics and the Class Wizard, a powerful MATLAB class generation tool. The final section delves into advanced strategies, including vectorized classes, containers, static variables, and function fronts, protected visibility, and pass-by-reference visibility. Included is a CD-ROM with source code, enabling readers to experiment with modifications and apply new concepts. Catalog no. C911X, ISBN: 978-1-58488-911-3 2007, 7 x 10, 384 pp., Soft Cover Suggested Price: $83.95 / £46.99

An introductory text, Introduction to Scientific Programming and Simulation Using R surveys a range of useful mathematical tools that either require or are illuminated by scientific computation. The focus is on the use of R, an open-source programming environment. Input and output, functions, data structures, and flow programming are covered, as are numerical techniques, probability, simulation, and stochastic modeling. Where appropriate, formal derivations are provided. The text is supplemented with simple yet relevant examples that allow students to see how the tools can be applied to contemporary problems. Catalog no. C6872, ISBN: 978-1-4200-6872-6 March 2009, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $79.95 / £48.99

Textbook

Textbook

Introduction to Concurrency in Programming Languages

Java Programming Fundamentals

Problem Solving Through Object Oriented Analysis and Design

Matthew Sottile

University of Oregon, Eugene, USA

Programming Languages

A Guide to MATLAB® Object-Oriented Programming

Introduction to Scientific Programming and Simulation Using R

69

Premchand S. Nair

Creighton University, Omaha, Nebraska, USA

Craig E. Rasmussen

Los Alamos National Laboratory, New Mexico, USA Series: Chapman & Hall/CRC Computational Science

Designed specifically for application developers, Introduction to Concurrency in Programming Languages provides a survey of high-level programming constructs that make parallel programming more accessible. The book covers the history of parallel languages and explains the relation of hardware developments that motivated these languages to modern systems. It also describes the current state of the art in parallel languages, providing a focus on the PGAS and HPCS language families. Each chapter in this comprehensive volume is accompanied by a set of exercises which further clarify the material. Catalog no. C7213, ISBN: 978-1-4200-7213-6 May 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $79.95 / £48.99

While Java texts are plentiful, it’s difficult to find one that takes a real-world approach—one that encourages students to build on their Java skills through practical exercise. Written by an expert with 18 years of Java teaching experience, this book presents object-oriented programming employing examples taken from everyday life. It uses Java 6 and includes detailed explanations of key concepts, solved examples, and a number of supplements for students and instructors found on an accompanying CD-ROM and a dedicated website. The book also includes a detailed chapter on Graphical User Interface, which allows students to begin to produce programs that they can interact with in more familiar ways. Catalog no. C6547, ISBN: 978-1-4200-6547-3 January 2009, 7 x 10, 729 pp., Soft Cover Suggested Price: $89.95 / £49.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 69

12/19/08 10:25:52 AM


For more information and a complete list LabVIEW™

Advanced Programming Techniques, Second Edition Rick Bitter

Motorola, Schaumburg, Illinois, USA

Taqi Mohiuddin

Mindspeed Technologies, Newport Beach, California, USA

Programming Languages

Matt Nawrocki

Motorola, Schaumburg, Illinois, USA

LabVIEW™: Advanced Programming Techniques reflects changes resulting from Version 8.0 of LabVIEW. This second edition includes a brand new chapter on the new shared variable feature introduced in the latest release. It offers new coverage of Express VIs and new template functionality. The authors present updated information and examples on ActiveX and the Microsoft® .NET™ framework and include new material on Windows XP® hyperthreading. They also provide updates on DAQ functionality and IVI drivers. With an overview of the new project view function, this book remains an essential resource for professionals looking to enhance functionality and stay up-to-date with the latest advances. Catalog no. 3325, ISBN: 978-0-8493-3325-5 2007, 6-1/8 x 9-1/4, 520 pp. Suggested Price: $97.95 / £54.99

Textbook

Programming Language Fundamentals by Example D.E. Stevenson

Clemson University, South Carolina, USA

Surveying the major programming languages that have hallmarked the evolution of computing, Programming Language Fundamentals by Example provides an understanding of the many languages and notations used in computer science, the formal models used to design phases, and the foundations of languages including linguistics. This textbook guides students through the process of implementing a simple interpreter with case-based exercises, questions, and a semester-long project that encompasses all of the concepts and theories presented in the book into one concrete example. It covers also such topics as formal grammars, automata, denotational and axiomatic semantics, and rule-based presentation. Catalog no. AU7016, ISBN: 978-0-8493-7016-8 2007, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $83.95 / £46.99

Textbook

Textbook

70

Object Oriented Programming through Java

Programming Languages for Business Problem Solving Shouhong Wang

University of Massachusetts Dartmouth, USA

P. Radha Krishna

Hai Wang

Covering both the fundamentals and applications, Object Oriented Programming through Java provides a thorough introduction to this popular programming paradigm. It includes coverage of essential topics such as classes, objects, packages, interfaces, multithreading, AWT, Applets, and Swings. The book also includes a detailed overview of various practical applications, including JDBC, Networking classes, and servlets. It contains exercises at the end of every chapter, and sample illustrative programs are used throughout the book. It is a text for courses on object oriented Java programming and a reference for professionals.

This volume presents a working knowledge of the major programming languages (including COBOL, C++, Java, HTML, JavaScript, VB.NET, VBA, ASP.NET, Perl, PHP, XML, SQL) used in the current business computing environment.The book examines the concepts shared by these languages and also details the unique features of each. It also focuses on various programming techniques, including structured, object-oriented, client-side and serverside programming, as well as graphical user-interface and multimedia processing. The book is self-contained, providing handson examples, self-review questions, project requirements, report formats, and operational manuals of programming environments.

Institute for Development & Research in Banking Technology, Hyderabad, India

Catalog no. UN4792, ISBN: 978-1-4200-4792-9 2007, 6-1/8 x 9-1/4, 460 pp. Suggested Price: $73.95 / £40.99

Saint Mary’s University, Halifax, Nova Scotia, Canada

Catalog no. AU6264, ISBN: 978-1-4200-6264-9 2008, 7 x 10, 384 pp. Suggested Price: $93.95 / £51.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 70

12/19/08 10:25:53 AM


Synchronous Programming of Reactive Systems with Esterel and SyncCharts

Textbook

Computer Organization, Design, and Architecture Fourth Edition

Luigi Zaffalon

University of Applied Sciences, Geneva, Switzerland

Sajjan G. Shiva

Some computer systems interact strongly with their environment, especially applications used in the transportation industry, communications, and medical modeling. This is also true for any number of industrial processing and man-machine interfaces. These systems are known as reactive. Written by an internationally lauded software engineer and instructor, this pioneering volume fully explains how to develop and check such systems using the highly versatile imperative Esterel programming language, which was developd in the 1980s and is just now maturing to reach its full potential. Its current version is now accepted as an IEEE standard.

With 40% updated material and four new chapters, this edition presents the operating principles, capabilities, and limitations of digital computers to enable development of complex yet efficient systems. It contains additional material that covers the ACM/IEEE computer science and engineering curricula and more coverage on computer organization, embedded systems, and performance evaluation. It provides expanded discussions of RISC, CISC, VLIW, and parallel/pipelined architectures; the latest information on integrated circuit technologies and devices, memory hierarchy, and storage; and updated examples, references, and problems.

Catalog no. EF7509, ISBN: 978-1-4200-7509-0 July 2009, 6 x 9, 480 pp. Suggested Price: $119.95 / £72.99

Catalog no. 0416, ISBN: 978-0-8493-0416-3 2008, 6-1/8 x 9-1/4, 784 pp. Suggested Price: $93.95 / £51.99

University of Memphis, Tennessee, USA

Energy Efficient Hardware The Art of Systems Architecting Third Edition

Programming Languages / Systems & Computer Architecture

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Software Co-Synthesis Using Reconfigurable Hardware Jingzhao Ou

71

Xilinix, San Jose, California, USA

Viktor K. Prasanna

Mark W. Maier

University of Southern California, Los Angeles, USA

Aerospace Corporation, Chantilly, Virginia, USA Series: Systems Engineering

Series: Chapman & Hall/CRC Computer & Information Science Series

The third edition of a bestseller, this book deals in depth with the least understood part of systems design: moving from a vague concept with limited resources to a satisfactory and feasible system and an executable program. Extensively rewritten to reflect the latest trends, the text addresses how to invent a system from scratch, presenting invention/design rules together with clear explanations of how to use them. The author supplies practical guidelines for avoiding common systematic failures while implementing new mandates. He organizes heuristics around a simple and practical process model and includes five major case studies of how successful and unsuccessful systems were architected.

Energy Efficient Hardware: Software Co-Synthesis Using Reconfigurable Hardware serves as the first research monograph to systematically address the various important topics related to energy efficient hardware-software co-synthesis using reconfigurable hardware. The book provides a system-level framework that allows high-level hardware-software design description, co-simulation, and co-debugging. It presents an introduction to techniques for energy performance modeling and optimization algorithms based on performance models. The book also includes techniques for energy estimation, customization of on-chip processors, and performance of energy management functionalities.

Catalog no. 79131, ISBN: 978-1-4200-7913-5 January 2009, 6-1/8 x 9-1/4, 376 pp. Suggested Price: $99.95 / £60.99

Catalog no. C7419, ISBN: 978-1-58488-741-6 May 2009, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $99.95 / £60.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 71

12/19/08 10:25:54 AM


For more information and a complete list Systems & Computer Architecture / Database Design & Management 72

Mechatronic System Control, Logic, and Data Acquisition Edited by

Robert H. Bishop

Database Design Using EntityRelationship Diagrams

The University of Texas at Austin, USA

Sikha Bagui and Richard Earp

Series: The Mechatronics Handbook, Second Edition

Series: Foundations of Database Design, 2

University of West Florida, Pensacola, USA

With updated coverage on all aspects of mechatronics, The Mechatronics Handbook, Second Edition is now available as a set of two books. Each installment offers focused coverage of a particular area of mechatronics, supplying a convenient source of specific information. The second book, Mechatronic System Control, Logic, and Data Acquisition examines the various signals acquired and used in mechatronics and the control systems that depend upon these signals. After introducing the role of control in mechatronics, the book examines such topics as state space analysis, dynamic system response, Kalman filters as dynamic system state observers, neural and fuzzy controllers, and design optimization.

Database Design Using Entity-Relationship Diagrams clarifies ER diagram design by defining it in terms of requirements (end user requests) and specifications (designer feedback to that request). The book emphasizes how communication between designers and users during design is crucial for the elicitation of targeted data, and for the creation of an understandable ER diagram. The authors describe how to develop an ER diagram, how to map it to a database, and how the resulting database can be tested. This definitive guide is a beneficial component of any database course and is a strong supplement for any database professional unfamiliar with ER design.

Catalog no. 9260, ISBN: 978-0-8493-9260-3 2008, 7 x 10, 704 pp. Suggested Price: $104.95 / £57.99

Catalog no. AU1548, ISBN: 978-0-8493-1548-0 2003, 7 x 10, 242 pp. Suggested Price: $79.95 / £46.99

The Decision Model Building and Maintaining a Data Warehouse Fon Silvers

A Framework for Business Logic and Business-Driven SOA Barbara Von Halle and Larry Goldberg

Data Warehouse Analyst and Developer, Tampa, Florida, USA

Knowledge Partners International, Mendham, New Jersey, USA

Based on a foundation of industry-accepted principles, Building and Maintaining a Data Warehouse provides an easy-to-follow approach that is cohesive and holistic. By offering the perspective of a successful data warehouse, as well as that of a failed one, the author details those factors that must be accomplished and those that are best avoided. He looks at areas of a data warehouse individually and in sequence, showing how each piece becomes a working part of the whole. He examines the concepts and principles common to every successful data warehouse, and also explains how to recognize and attend to problematic gaps in an established data warehouse

With so much growth in SOA, BPM, and EDM technology, corporations are in need of a way to arrive at the best decisions regarding the creation of infrastructure that will allow the greatest agility while leveraging current IT assets. Written by two pioneering consultants and bestselling authors with track records of international success, this volume explains how to implement the Decision Model, a stable, rigorous model of core business logic that informs current and emerging technology. It offers a strong theoretical foundation, while succinctly defining the path needed to incorporate agile and iterative techniques to develop a model that can serve as a cornerstone for continual growth.

Catalog no. AU6462, ISBN: 978-1-4200-6462-9 2008, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU2817, ISBN: 978-1-4200-8281-4 June 2009, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $59.95 / £36.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 72

12/19/08 10:25:54 AM


Design and Implementation of Data Mining Tools

How To Secure and Audit Oracle 10g and 11g

Bhavani Thuraisingham, Latifur Khan, M. Awad, and Lei Wang

Ron Ben-Natan

Design and Implementation of Data Mining Tools presents a step-by-step approach that demonstrates how data mining tools are developed. This book discusses intrusion detection for security application, web page prediction for e-commerce application, and image classification for multimedia application. It provides experimental performance results, examines unique contributions, and addresses limitations for each system. Additional coverage includes supporting technologies such as artificial neural networks, future directions for data mining applications, and data management systems. This text is a practical guide for the industry.

This guide demonstrates how to secure sensitive data and comply with internal and eternal audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that should be taken to enable, configure, or administer security-related features. It includes best practices in securing Oracle and on Oracle security options and products. By providing specific instructions and examples, this book bridges the gap between the individuals who install and configure a security feature and those who secure and audit it.

Microsoft Corporation, Redmond, Washington, USA

Catalog no. AU4590, ISBN: 978-1-4200-4590-1 February 2009, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $89.95 / £54.99

Encyclopedia of Library and Information Science Second Edition, Four-Volume Set Edited by

Miriam A. Drake

CTO, Guardium Inc., Waltham, Massachusetts, USA

Catalog no. AU4127, ISBN: 978-1-4200-8412-2 February 2009, 7 x 10, 459 pp. Suggested Price: $69.95 / £42.99

Implementing Electronic Document and Record Management Systems

Database Design & Management

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

73

Georgia Institute of Technology (Emeritus), Atlanta, USA

Azad Adam

A revitalized version of the popular classic, the Encyclopedia of Library and Information Science, Second Edition targets new and dynamic movements in the distribution, acquisition, and development of print and online media-compiling articles from more than 450 information specialists on topics including program planning in the digital era, recruitment, information management, advances in digital technology and encoding, intellectual property, and hardware, software, database selection and design, competitive intelligence, electronic records preservation, decision support systems, ethical issues in information, online library instruction, telecommuting, and digital library projects.

Despite the global shift toward delivering services online, there is little information available on how to electronically deliver documents and records. Implementing Electronic Document and Record Management Systems addresses this need, as well as the host of issues related to paperless enterprises. From starting up the project to systems administration, this book provides complete coverage of every aspect of implementation and management processes. The text also explains managing cultural changes and business process re-engineering that organizations undergo as they switch from paper-based records to electronic documents. Case studies offer a practical look at successful real-world implementations.

Catalog no. DK075X, ISBN: 978-0-8247-2075-9 2003, 8-1/2 x 11, 3500 pp. Suggested Price: $2100.00 / £1167.00

Catalog no. AU8059, ISBN: 978-0-8493-8059-4 2008, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $93.95 / £51.99

Independent Consultant, London, UK

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 73

12/19/08 10:25:55 AM


For more information and a complete list

Database Design & Management / IT Management

Introduction to Data Technologies Paul Murrell

The University of Auckland, New Zealand

Strategic Data Warehousing

Achieving Alignment with Business

Series: Chapman & Hall/CRC Computer Science & Data Analysis, 13

Neera Bhansali

Unique and much requested, this reference provides scientists with a mandatory tutorial on dealing with scientific data as captured by various programming languages, such as HTML, XML, SQL, and PHP. Written by Paul Murrell, the principle developer of the R Project, and based on a university course he teaches, this book presents each of the key technologies and then gives guidance on data handling and processing with each. In addition to chapters containing detailed and historical information, illustrative examples and case studies, Murrell includes entirely separate bare bones chapters for quick reference.

Organization of data warehouses are vital but often ignored aspects of growing enterprises. This work merges technological know-how with managerial practices to show both the business manager and the IT professional how better alignment between data warehouse plans and business strategies can lead to a successful data warehouse adoption that will support the entire infrastructure. More complete than any other text in the field, this resource also addresses the managerial and strategic aspects of data warehouses, offering doable solutions that will allow for the strategic alignment of these warehouses while building them and ensuring that this alignment is sustained.

Catalog no. C6517, ISBN: 978-1-4200-6517-6 March 2009, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $69.95 / £42.99

iMEMS Corporation, Tampa, Florida, USA

Catalog no. AU3945, ISBN: 978-1-4200-8394-1 July 2009, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $69.95 / £42.99

Scientific Data Management

Challenges, Existing

74 Technology, and Deployment Arie Shoshani and Doron Rotem Lawrence Berkeley National Lab, Berkeley, California, USA

Best Practices in Business Technology Management

Series: Chapman & Hall/CRC Computational Science

Stephen J. Andriole

The task of managing scientific data is so overwhelming that scientists spend much of their time managing the data by developing special purpose solutions, rather than using their time effectively for scientific investigation and discovery. This book summarizes stateof-the-art scientific data management technologies that address this problem area. It covers efficient access to storage systems, efficient data movement and management of storage spaces, effectively performing complex data analysis and searches over large data sets, and the automation of multistep scientific processes.

Discussing specific best practices for making specific decisions, this book offers qualitative and quantitative methods, tools, and techniques for deploying and supporting all kinds of information technology. It identifies the range of technology decisions that managers make and the best practices that define good acquisition, deployment, and support decisions, all in an easy to absorb, conversational tone. The book covers the interrelated business technology alignment areas of business strategy as well as technology applications, architecture, infrastructure, support, acquisition, and organization. Each section ends with a summary of actionable best practices.

Catalog no. C6980, ISBN: 978-1-4200-6980-8 June 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $89.95 / £54.99

Villanova University, Pennsylvania, USA

Catalog no. AU6333, ISBN: 978-1-4200-6333-2 January 2009, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $69.95 / £38.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 74

12/19/08 10:25:55 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Visualizing Objectives, Deliverables, Activities, and Schedules Dennis P. Miller, PMP

PMP, Pinehurst, North Carolina, USA Series: ESI International Project Management Series

The Business Value of IT

Managing Risks, Optimizing Performance, and Measuring Results Michael D. S. Harris, David Herron, and Stasia Iwanicki The David Consulting Group, Paoli, Pennsylvania, USA

Unlike other books in this area, this resource not only shows readers what they can do, but shows them how to do it. An organizing, visual communication, team-building, commitment-gaining, and project planning tool, the work breakdown structure (WBS) helps project managers communicate with their teams, clients, and management. This book provides an eight-step process that facilitates the development of the WBS. The process defines the project through its deliverables and validates the initial target date by critical path analysis. The result is a clear visualization of the project’s objectives, deliverables, activities, and schedule.

The Business Value of IT: Managing Risks, Optimizing Performance, and Measuring Results examines how to measure IT performance, how to put a dollar value on IT, and how to justify value of an entire IT program. It places sharp technical focus on the techniques, methods, and processes used to identify and to assess risks. Based on the authors’ extensive experience in the field, this comprehensive text discusses IT from the perspective of its contribution to business, the necessity of governance, the importance of measuring performance, and changes that must be made in order to effectively measure IT.

Catalog no. AU6969, ISBN: 978-1-4200-6969-3 January 2009, 6-1/8 x 9-1/4, 264 pp., Soft Cover Suggested Price: $49.95 / £27.99

Catalog no. AU6474, ISBN: 978-1-4200-6474-2 2008, 6-1/8 x 9-1/4, 296 pp. Suggested Price: $69.95 / £38.99

IT Management

Building a Project Work Breakdown Structure

CISO Leadership Business Intelligence for Telecommunications Deepak Pareek

Essential Principles for Success Edited by

75

Todd Fitzgerald

Milwaukee, Wisconsin, USA

Micki Krause

Resource4Business, Ahmedabad, India

Pacific Life Insurance Company, Newport Beach, California, USA

Series: Informa Telecoms & Media, 2

Series: (ISC)2 Press

Bringing together market research reports, business analyst briefings, and technology references into one comprehensive volume, this work identifies those advances in methods and technology that are being employed to inform decision-making and give companies an edge in the rapidly growing and highly competitive telecommunications industry. The author provides clear explanations without technical jargon, followed by in-depth descriptions regarding the collection and use of information. He defines the recognized stages of business intelligence, examines issues arising from the emergence of customercentric business models, and identifies areas that are likely to require research in the near future.

Compiled by experienced computer security professionals and including interviews with successful CISOs, this book describes the management skills needed by aspiring senior security executives. It provides tools for identifying one’s strengths and weaknesses and honing one’s leadership style, delineates what companies look for when hiring a security professional, and covers practical steps for evaluating an organization’s culture in order to successfully implement a security program that will fit within the culture. A unique reference for IT professionals, CISOs, CIOs, and CSOs, the book includes real-world examples of how to treat the security program as a business.

Catalog no. AU8792, ISBN: 978-0-8493-8792-0 2007, 6-1/8 x 9-1/4, 312 pp. Suggested Price: $88.95 / £49.99

Catalog no. AU7943, ISBN: 978-0-8493-7943-7 2008, 6-1/8 x 9-1/4, 312 pp. Suggested Price: $73.95 / £40.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 75

12/19/08 10:25:56 AM


For more information and a complete list CISO Soft Skills

Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives

The Complete Project Management Office Handbook Second Edition

Ron Collette and Mike Gentile

Gerard M. Hill

Skye Gentile

Series: ESI International Project Management Series

A companion volume to the highly touted CISO Handbook, this book presents tools that empower organizations to identify those intangible negative influencers of security that plague most organizations, and provides further techniques for security professionals to identify, minimize, and overcome these pitfalls within their own customized situations. The book also discusses some proactive techniques that CISOs can utilize in order to effectively secure challenging work environments. Reflecting the experience and solutions of those that are in the trenches of modern organizations, this volume provides practical ideas that can make a difference in the daily lives of security practitioners.

The second edition of The Complete Project Management Office Handbook extends the concepts and considerations of modern project management into the realm of project management oversight, control, and support. Recognizing the need for a centralized organizational entity—the project management office (PMO)—to perform in this capacity, this book considers five stages of PMO along a competency continuum, establishing the depth of its functional responsibility. This revised edition also presents 20 functional models that can be used to guide deliberation and development of PMO operational capability. The text provides a starting point for readers to resolve their specific project management needs.

CISOHandbook.com & Traxx Consulting Services, Newport Beach, California, USA Aptos, California, USA

IT Management

Catalog no. AU9102, ISBN: 978-1-4200-8910-3 January 2009, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $69.95 / £38.99

Principal, Hill Consulting Group, Woodbridge, Virginia, USA

Catalog no. AU4680, ISBN: 978-1-4200-4680-9 2008, 6-1/8 x 9-1/4, 752 pp. Suggested Price: $89.95 / £51.99

The Effective CIO

76

The Complete Project Management Methodology and Toolkit Gerard M. Hill

Principal, Hill Consulting Group, Woodbridge, Virginia, USA

How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance Eric J. Brown

NCI Building Systems, The Woodlands, Texas, USA

William A. Yarberry, Jr. Kingwood, Texas, USA

Written by one of the nation’s most highly regarded project management mentors, The Complete Project Management Methodology and Toolkit provides a combined project and business management solution that any can be readily applied in any industry by both novice and certified project managers. Aligned with common business practices, Gerard Hill’s method shows how to keep to a schedule, maintain areas of responsibility, and evaluate a job’s progress from conception to completion. The text also offers a methodology implementation guide that gives additional insight into the recommended activities that can be customized to meet the needs of individual organizations.

Unlike other books, which merely discuss strategies important to the chief information officer, this volume discusses how the guidelines it recommends can actually be executed. The authors provide not only a survey of existing strategies but include detailed problem-solving ideas, such as how to structure optimal IT and telecom contracts with suppliers, the implications of SOP-98, and accounting for software costs. The book brings together two perspectives: that of a working CIO who must cope with the day-to-day pressure for results, and that of an IT auditor with a special focus on governance and internal control. Examples, charts, templates, and anecdotes supplement the material.

Catalog no. K10095, ISBN: 978-1-4398-0154-3 June 2009, 8-1/2 x 11, 288 pp. Suggested Price: $89.95 / £54.99

Catalog no. AU6460, ISBN: 978-1-4200-6460-5 January 2009, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $79.95 / £44.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 76

12/19/08 10:25:57 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Enterprise Architecture A thru Z

Frameworks, Business Process Modeling, SOA, and Infrastructure Technology

Global Engineering Project Management

Daniel Minoli

SES Americom, Princeton, New Jersey, USA

Independent Consultant, Santa Barbara, California, USA

This volume examines cost-saving trends in architecture planning, administration, and management. The text begins by evaluating the role of Enterprise Architecture planning and Service-Oriented Architecture (SOA) modeling. It provides an extensive review of the most widely-deployed architecture framework models, including The Open Group Architecture and Zachman Architectural Frameworks, as well as formal architecture standards. The first part of the text focuses on the upper layers of the architecture framework, while the second part focuses on the technology architecture. Additional coverage discusses Ethernet, WAN, Internet communication technologies, broadband, and chargeback models.

Engineering projects that cover multiple countries, politics, cultures, and different standards add additional challenges to the tasks of a project manager. This book aligns real-world experiences in international project management with practical project management principles. The book discusses all phases of an international project with real case examples. Written as a hands-on reference, it shows how to anticipate and prepare for upcoming challenges, covering everything from start-up planning and post-project evaluation, to concerns over supply management, cost containment, and intellectual property. Every chapter contains a checklist to remind managers of issues they must prepare for or oversee.

Catalog no. AU8517, ISBN: 978-0-8493-8517-9 2008, 7 x 10, 504 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU7393, ISBN: 978-1-4200-7393-5 2008, 6-1/8 x 9-1/4, 168 pp. Suggested Price: $79.95 / £44.99

IT Management

M. Kemal Atesmen

Enterprise Business Architecture

The Formal Link between Strategy and Results

77

Ralph Whittle

Strategic Business/IT Consultant, Plano, Texas, USA

The Green and Virtual Data Center

Conrad B. Myrick

Greg Schulz

Consultant, Richardson, Texas, USA

StorageIO Group, Stillwater, Minnesota, USA

Introducing Enterprise Business Architecture (EBA) concepts and terms, this book emphasizes the importance of architectures in reaching business goals. It challenges readers to research and analyze the architectural needs of their business, enabling them to understand both their chosen architecture and the behaviors and discipline needed to maximize its potential. The authors illustrate a high-level approach for building the EBA and provide a richly illustrated case study and guidance for relating the value of this approach to your enterprise. They provide suggestions derived from successful engagements that implemented the formal EBA approach with integrated enterprise architectures.

This book provides strategies and blueprints for enabling and deploying environmentally friendly next-generation data centers. It looks at design and implementation tradeoffs using various best practices and technologies to sustain application and business growth while maximizing resources, such as power, cooling, floor space, storage, server performance, and network capacity. The book shows how to make server and storage virtualization energy efficient and still be able to support a diversity of high-performance applications. It also explores performance and capacity planning in a virtual environment that supports resource-demanding applications, such as OLTP and streaming media.

Catalog no. AU2788, ISBN: 978-0-8493-2788-9 2005, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $78.95 / £43.99

Catalog no. AU6669, ISBN: 978-1-4200-8666-9 January 2009, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $79.95 / £48.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 77

12/19/08 10:25:57 AM


For more information and a complete list Handbook of Technology Management in Public Administration Edited by

David S. Greisler

York College of Pennsylvania, USA

Ronald J. Stupak

Fording Brook Associates, Bethesda, Maryland, USA Series: Public Administration and Public Policy, 122

IT Management 78

Information Security Cost Management Ioana V. Bazavan

Pleasanton, California, USA

Ian Lim

Buena Park, California, USA

Using a compilation of articles on various topics relating to technology management, Handbook of Technology Management in Public Administration addresses the management, implementation, and integration of technology across a wide variety of disciplines while highlighting the lessons learned along the way to assist readers in solving contemporary problems. It discusses the creation of innovative paradigms, new boundaries, diversity frameworks, and operational breakthroughs emanating from technology, while at the same time raising questions about the productivity, and intrusions of technology into our personal, organizational, and social environments.

Written in an accessible, informal style, Information Security Cost Management demonstrates how to strategically maximize a limited security budget without compromising the quality of risk management initiatives. Organized into management components, each chapter highlights common pitfalls in security initiatives and recommends cost saving methods to achieve intended results. It presents processes that show how to identify the most critical components of a system’s security, staff a security operation, prioritize spending, manage internal and external audits, assess costs for identity and access management, maximize the use of vendors, and evaluate the costs of outsourcing.

Catalog no. DK3654, ISBN: 978-1-57444-564-0 2007, 7 x 10, 880 pp. Suggested Price: $154.95 / £86.00

Catalog no. AU9275, ISBN: 978-0-8493-9275-7 2007, 6-1/8 x 9-1/4, 255 pp. Suggested Price: $88.95 / £49.99

Implementing the IT Balanced Scorecard

Information Security Policies, Procedures, and Standards

Aligning IT with Corporate Strategy

Guidelines for Effective Information Security Management

Jessica Keyes

Thomas R. Peltier

Thoroughly explaining the concept of the scorecard framework from both the corporate and IT perspectives, Implementing the IT Balanced Scorecard: Aligning IT with Corporate Strategy lays the groundwork for implementation of the scorecard approach. It provides examples, case studies, histories, and current research, offering insight into performance measurement and management, continuous process improvement, benchmarking, metrics selection, and people management. This volume also discusses how to integrate all of these concepts into the four perspectives of the balanced scorecard. The book presents a one-stop-shopping “howto” approach that leads to organizational success.

Providing the mechanics for policy, procedure, and standards development, Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management shows readers what to look for when developing an enterprise’s procedures. It examines the recommended industry standards and shows how to customize them to fit specific needs. Three major sections cover writing policies, writing procedures, and writing standards. Each section can be used separately when needed, or as a whole to develop a comprehensive set of documents. The book contains checklists, sample policies, procedures, standards, guidelines, and a synopsis of the relevant BS 7799 and ISO 17799 standards.

New Art Technologies, Edgewater, New Jersey, USA

Catalog no. AU2621, ISBN: 978-0-8493-2621-9 2005, 6-1/8 x 9-1/4, 528 pp. Suggested Price: $83.95 / £46.99

Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA

Catalog no. AU1137, ISBN: 978-0-8493-1137-6 2002, 7 x 10, 312 pp., Soft Cover Suggested Price: $83.95 / £46.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 78

12/19/08 10:25:58 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Strategies and Solutions

Bhuvan Unhelkar

Jay Liebowitz

Consultant, Wahroonga, Australia

Johns Hopkins University, Rockville, Maryland, USA

Series: Advanced & Emerging Communications Technologies

As the baby boomer generation approaches retirement age, many organizations are facing the potential crisis of lost knowledge. Devised to help those organizations that are dependent on the accumulated knowledge of stakeholders, this book details a proactive approach to knowledge retention. Written by one of the most sought after knowledge management experts, this text explains how to identify at risk knowledge areas and demonstrates how to keep those areas from becoming knowledge vacuums. To reinforce points, the book contains case studies from The Aerospace Corporation, Chevron, and Knowledge Harvesting Inc., which have become models for the implementation of knowledge retention strategies.

Addressing the rapid evolution of global communications, this authoritative resource provides organizations with the detailed guidance they need to help them achieve greater mobility. It explains the steps required to configure, enact, and manage the process of transitioning from reliance on fixed-wired applications to become a more flexible and responsive mobile-enhanced organization. Based on emerging best practices and examples of successful transitions, the author considers the economic drivers, the technical edge, and the social impact of mobile technologies so organizations can forge a customized strategy that will garner maximum results with minimum disruption.

Catalog no. AU6465, ISBN: 978-1-4200-6465-0 January 2009, 6-1/8 x 9-1/4, 144 pp. Suggested Price: $69.95 / £38.99

Catalog no. AU8275, ISBN: 978-1-4200-7827-5 June 2009, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $79.95 / £48.99

IT Management

Knowledge Retention

Mobile Enterprise Transition and Management

Oracle Identity Management Leading IT Projects The IT Manager’s Guide

Governance, Risk, and Compliance Architecture, Third Edition

79

Marlin B. Pohlman

Jessica Keyes

Oracle Corporation, Redwood Shores, California, USA

Senior level IT managers are often responsible for a wide variety of development projects. Leading IT Projects presents a complete tutorial on project management along with information on project manager skill sets. Individual projects are usually managed by project managers; however, IT managers may or may not be conversant in the field of project management. Offering a practical roadmap, this comprehensive text provides an extensive understanding of how technology project management involves the planning, monitoring, and control of the people, processes, and events that occur as a computer system evolves from preliminary concept to operational implementation.

Identity management specialist Marlin B. Pohlman brings over 14 years of experience to this work, offering a definitive guide for corporate stewards who are struggling with the challenge of meeting regulatory compliance pressures while embarking on the path of process and system remediation. He examines multinational regulations, delves into the nature of governance, risk, and compliance (GRC), and outlines a common taxonomy for the GRC space. He also cites current standards, illustrating compliance frameworks such as BSI, ITIL, and COBIT. This text also focuses on specific software components of the Oracle Identity Management solution and includes elements of the Oracle compliance architecture.

Catalog no. AU7082, ISBN: 978-1-4200-7082-8 January 2009, 7 x 10, 336 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU7247, ISBN: 978-1-4200-7247-1 2008, 7 x 10, 552 pp., Soft Cover Suggested Price: $69.95 / £38.99

New Art Technologies, Edgewater, New Jersey, USA

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 79

12/19/08 10:25:59 AM


For more information and a complete list

Practical Guide to Project Planning Ricardo Viana Vargas

Macrosolutions SA, Belo Horizonte, Brazil Series: ESI International Project Management Series

IT Management

This practical, hands-on guide jumpstarts project planning in any organization. Easy-to-follow examples demonstrate how to create the documentation and reports needed to develop and to execute project plans. This book is filled with insightful tips on using the most popular project management tools and software, including Mindmanager for initial planning sessions, Milestone Project Companion for report generation, and Microsoft Project, the most widely used tool for project planning. With templates that can be customized to any type of project, Practical Guide to Project Planning also presents standard project planning processes and principles that comply with PMI’s PMBOK® 3.0. Catalog no. AU4504, ISBN: 978-1-4200-4504-8 2008, 8-1/2 x 11, 232 pp., Soft Cover Suggested Price: $52.95 / £29.99

80

Project Management Recipes for Success Guy L. De Furia

Manassas, Virginia, USA

Quantitative Business Performance Management Challenge, Change, and Dashboard Joseph Raynus

ShareDynamics, Inc., Lexington, Massachusetts, USA

Without adequate understanding of the progress made to achieve organizational goals, corporations quickly lose their competitive edge. They are constantly challenged to reshape their operations, improve performance, and adapt to new markets and opportunities. This text integrates quantitative approaches that have become popular in recent years: Goal Driven Measurements, Business Process Management, Lean Methodology, and the Balanced Score Card. It presents a practical methodology that allows organizations to build a measurements framework with the ability to continuously improve and refine it by providing a feedback loop for analysis. Catalog no. AU7249, ISBN: 978-1-4200-7249-5 July 2009, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $79.95 / £48.99

RFID in the Supply Chain A Guide to Selection and Implementation

Series: ESI International Project Management Series

Judith M. Myerson

Grounded in practicality, this book explains the procedures for running a successful project and highlights the finer points of managing and controlling the project. It is written specifically for those responsible for the hands-on managing of projects, but is also useful to program managers and senior executives. Project managers gain the confidence that comes from following a good recipe for success. Program managers gain a perspective on the myriad of activities their project managers must perform. Senior managers gain a perspective of the approach necessary at the beginning of a project to reduce the number of ill-advised projects and the effort required to achieve successful projects.

Helping readers modernize their operations through RFID, this forward-looking volume provides an overview of the RFID market and presents compelling reasons for transitioning to RFID. It offers a comprehensive education about the hardware, software, and other aspects required to deploy RFID and highlights the separate but equal concerns that business and IT executives have about the implementation of RFID applications. The book includes selection guidelines and implementation examples and discusses the implementation of a business process model. The book’s soupto-nuts coverage ensures that RFID implementations are both successful and cost effective.

Catalog no. AU8240, ISBN: 978-1-4200-7824-4 January 2009, 6-1/8 x 9-1/4, 264 pp., Soft Cover Suggested Price: $49.95 / £27.99

Catalog no. AU3018, ISBN: 978-0-8493-3018-6 2007, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $88.95 / £49.99

IT Consultant, Philadelphia, Pennsylvania, USA

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 80

12/19/08 10:25:59 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Business Intelligence, Competitive Intelligence, and Knowledge Management

Bill Stackpole and Patrick Hanrion

Jay Liebowitz

Presenting valuable information for professionals involved in maintaining and securing Microsoft systems and applications, this guide provides the skills necessary to develop a comprehensive strategy for updating and securing Microsoft systems with the latest packs and patches. It demonstrates how to perform inventories of IT assets, identify old versions as well as new updates and patches, test compatibility, target deployment, and evaluate management technologies. It also shows readers how to create and implement their own deployment plans with recovery and remediation options and illustrates how to recognize potential vulnerabilities.

The usefulness of strategic intelligence goes beyond military settings, as it applies toward improving the strategic decision-making process of any organization. This volume demonstrates how executives can best use internal and external information toward making better decisions. Divided into two major parts, the book first discusses the convergence of knowledge management (KM), business intelligence (BI), and competitive intelligence (CI) into what the author defines as strategic intelligence. The second part of the book describes case studies written by recognized experts in the fields of KM, BI, and CI. The case studies include strategic scenarios at Motorola, AARP, and Northrop Grumman.

Microsoft Corporation, Redmond, Washington, USA

Catalog no. AU5800, ISBN: 978-0-8493-5800-5 2008, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $83.95 / £46.99

A Standard for Enterprise Project Management

Johns Hopkins University, Rockville, Maryland, USA

Catalog no. AU9868, ISBN: 978-0-8493-9868-1 2006, 6-1/8 x 9-1/4, 248 pp. Suggested Price: $93.95 / £51.99

The Strategic Project Leader Mastering Service-Based Project Leadership

Michael S. Zambruski

Jack Ferraro

Series: ESI International Project Management Series

Series: Center for Business Practices

TBA & P, LLC, Chesire, Massachusetts, USA

IT Management

Software Deployment, Updating, and Patching

Strategic Intelligence

81

Project Management Leadership Training, Manassas, Virginia,

From enterprise vision and mission to business requirements to project initiation and management to operations, this practical guide explains each of the basic elements needed for project success and integrates them into a balanced life-cycle continuum. A Standard for Enterprise Project Management includes a decision tree for determining the most appropriate level of project documentation, describes an integrated risk management and escalation policy, and contains more than two dozen templates and completed samples of key project management tools, such as a comprehensive statement of work template. The author offers ancillary material on a CDROM.

In addition to overseeing projects, today’s managers are expected to provide creative input and use their leadership to foster an environment that can respond rather than react to changing parameters and fluctuating objectives. This volume enables managers to develop the competencies and skills essential to creative leadership. It offers a practical framework that enables them to take charge of their own career development, while embracing and mastering the role of strategy leader. This book explores the attitudes and behaviors that define successful leaders so as to provide project managers with actionable advice on how to grow their own leadership skills.

Catalog no. AU7245, ISBN: 978-1-4200-7245-7 January 2009, 8-1/2 x 11, 128 pp., Soft Cover Suggested Price: $79.95 / £44.99

Catalog no. AU8794, ISBN: 978-0-8493-8794-4 2008, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $79.95 / £46.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 81

12/19/08 10:26:00 AM


For more information and a complete list

Networking Communications 82

2-D Electromagnetic Simulation of Passive Microstrip Circuits Alejandro Dueñas Jimenez

Adaptation and Cross Layer Design in Wireless Networks Edited by

Universidad de Guadalajara, Guadalajara, Jalisco, Mexico

Mohamed Ibnkahla

A reference for circuit design engineers and microwave engineers, this book covers the subject in a style that is useful to both. It uses a simple 2-D electromagnetic simulation procedure to provide basic knowledge and practical insight into quotidian problems of microstrip passive circuits applied to microwave systems and digital technologies. The author’s approach follows a natural route starting from analysis of the test circuits, continuing with simulation and finishing with the measurement. At the end of the book some typical problems of signal integrity such as ringing and overshooting are stated and solved by using knowledge acquired though the book.

Adaptation and Cross Layer Design in Wireless Networks is devoted to adaptation in the data link, network, and application layers. It presents the latest adaptation techniques and methodologies, including cross-layer adaptation, joint signal processing, coding and networking, selfishness in mobile ad hoc networks, cooperative and opportunistic protocols, adaptation techniques for multimedia support, self–organizing routing, and tunable security services. It presents new theoretical paradigms and analytical findings supported with various simulation and experimental results. This is the second volume in the Adaptation in Wireless Communications series.

Catalog no. 87053, ISBN: 978-1-4200-8705-5 January 2009, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $139.95 / £77.99

Catalog no. 46039, ISBN: 978-1-4200-4603-8 January 2009, 6-1/8 x 9-1/4, 528 pp. Suggested Price: $99.95 / £55.99

Active and Programmable Networks for Adaptive Architectures and Services

Queen’s University, Kingston, Ontario, Canada

Adaptation in Wireless Communications 2 Volume Set

Mohamed Ibnkahla

Syed Asad Hussain

Queen’s University, Kingston, Ontario, Canada

COMSATS Inst. of Information Technology, Lahore, Pakistan

Series: Electrical Engineering & Applied Signal Processing Series

This forward-looking reference introduces a new generation of network technologies and architecture that allows the creation, customization, and management of new services and applications deployed dynamically into network nodes. The author outlines the architecture of active and programmable networks, discusses the enabling technologies for network programmability in detail, and introduces several paradigms and prototypes. He then explores packet scheduling, management, routing, and security in active and programmable networks and examines active wireless and mobile networks. The final chapter presents several real-world examples of currently deployed active and programmable networks.

The widespread use of adaptation techniques has helped to meet the increased demand for new applications. From adaptive signal processing to cross layer design, Adaptation in Wireless Communications covers all aspects of adaptation in wireless communications in a two-volume set. Each volume provides a unified framework for understanding adaptation and relates various specializations through common terminologies. In addition to simplified state-of-the-art cross layer design approaches, they also describe advanced techniques, such as adaptive resource management, 4G communications, and energy and mobility aware MAC protocols.

Catalog no. AU8214, ISBN: 978-0-8493-8214-7 2007, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $93.95 / £51.99

Catalog no. 45997, ISBN: 978-1-4200-4599-4 January 2009, 6-1/8 x 9-1/4, 1048 pp. Suggested Price: $159.95 / £89.00

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 82

12/19/08 10:26:01 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m VMware® and Microsoft® Platforms in the Virtual Data Center

Surgient Inc., Cedar Park, Texas, USA

Bio-inspired Computing and Communication Networks

Dave McCrory

University of Alabama, Tuscaloosa, USA

David Marshall

Hyper9, Austin, Texas, USA

Wade A. Reynolds

Pflugerville, Texas, USA

Yang Xiao and Fei Hu

Presenting practical guidelines and examples, Advanced Server Virtualization emphasizes design, implementation, and management from both a technical and consulting point of view. It features step-by-step guidelines for planning, deployment, installing, configuring, and creating virtual servers. Covering Microsoft® Virtual Server and VMware®, it addresses platformspecific virtualization features such as virtual machines, hard drives, networking, and resource management. It offers best practices that allow users to avoid common pitfalls and achieve success faster during server virtualization implementations. It also discusses software licensing and the cost-benefits of deploying virtual servers.

While seeking new methods to cope with greater communication demands, researchers are finding inspiration in examples presented by nature. Considering a range of sources from insect to primate communication, leading researchers present state-of-the-art approaches and novel technologies for developing bio-inspired models. They cover mathematical models and present experimental studies of bio-inspired computing and communications. They explore bio-inspired topology control and reconfiguration methods, as well as bio-inspired localization, synchronization, and mobility approaches. They also delve into such forward-thinking concepts as the evolution and self-healing of network architectures.

Catalog no. AU3931, ISBN: 978-0-8493-3931-8 2006, 6-1/8 x 9-1/4, 760 pp. Suggested Price: $79.95 / £46.99

Catalog no. AU0326, ISBN: 978-1-4200-8032-2 July 2009, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $119.95 / £72.99

Networking Communications

Advanced Server Virtualization

Broadband Mobile Multimedia

Techniques and Applications Edited by

Advances in Network Management

Yan Zhang, Shiwen Mao, Laurence T. Yang, and Thomas M Chen

83

Southern Methodist University, Dallas, Texas, USA

Jianguo Ding

East China Normal University, Shanghai, China

Series: Wireless Networks and Mobile Communications

Network management is facing new challenges that stem from the growth in size, heterogeneity, pervasiveness, and complexity of network services and applications. To bring complex network systems under control, it is necessary for the IT industry to improve at developing self-managing, self-healing, and self-configuring systems. From basic concepts to research-level material, this book documents the evolution of management solutions in network management including protocols and techniques. Investigating novel management strategies for emerging networks, the text addresses inferences and dependencies between network management and application-level service management.

This useful guide presents introductory concepts, fundamental techniques, the latest advances, and open issues in broadband wireless multimedia. Divided into four sections, it first introduces various broadband wireless multimedia systems. Using video as an application example, the book then focuses on the routing and crosslayer design issue of multimedia communication over multihop wireless ad hoc and sensor networks. The next section discusses issues related to multimedia communications over WLANs. The book concludes with recent developments in QoS provisioning mechanisms and other enabling technologies, including middleware, mobility management, scheduling, and power control.

Catalog no. AU6452, ISBN: 978-1-4200-6452-0 July 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $69.95 / £42.99

Catalog no. AU5184, ISBN: 978-1-4200-5184-1 2008, 6-1/8 x 9-1/4, 584 pp. Suggested Price: $99.95 / £55.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 83

12/19/08 10:26:02 AM


For more information and a complete list

Business Strategies for the Next-Generation Network Networking Communications

Nigel Seel

Interweave Consulting, Andover, UK Series: Informa Telecoms & Media, 4

Comprehensive Glossary of Telecom Abbreviations and Acronyms Ali Akbar Arabi

Iranian Space Agency (ISA), Tehran, Iran

After reviewing the failed attempts of carriers to retool for the future, this book describes the technologies and capabilities supporting next generation services, focusing particularly on multimedia interactive services, TV, and video-on-demand. The author looks at the IMS layer and how it interworks both downwards into the QoS-enabled IP transport layer and upwards to enable new kinds of applications. Equal attention is paid to the business models of stakeholders in the value chain, including carriers, service providers, broadcasters, and production companies. The author discusses how carriers have attempted to remodel themselves as IP companies before detailing more innovative business models.

Featuring over 16,000 abbreviation entries, the Comprehensive Glossary of Telecom Abbreviations and Acronyms covers various fields including telecommunications, satellite communications, remote sensing, marine communications, radar and military communications, cellular networks, specialized mobile radio, electronics, broadcasting, information technology, fiber optics communications, and much more. This reference also includes abbreviations used in standardization organizations (such as ITU, ISO, IEEE, and ETSI) as well as abbreviations of new technologies. For each entry, all possible relevant phrases that stand for that entry are provided and the related branches of science are specified.

Catalog no. AU8035, ISBN: 978-0-8493-8035-8 2007, 6-1/8 x 9-1/4, 312 pp. Suggested Price: $83.95 / £46.99

Catalog no. AU5866, ISBN: 978-1-4200-5866-6 2008, 6-1/8 x 9-1/4, 408 pp. Suggested Price: $73.95 / £40.99

84

Carrier Ethernet

Providing the Need for Speed Gilbert Held

Converging NGN Wireline and Mobile 3G Networks with IMS Rebecca Copeland

Strategic IMS Solution Consultant, Warwickshire, UK

4-Degree Consulting, Macon, Georgia, USA

Series: Informa Telecoms & Media

Fast and functional, carrier Ethernet technology is the foundation for next-generation networks around the world. The book introduces this networking technology, which can accelerate the delivery of industry standard products and services to the end user. It presents the capabilities of this technology and shows how it improves network performance compared to other technologies. Ensuring seamless migration to carrier Ethernet from existing technologies, the text describes various services that can be enabled over an Ethernet infrastructure, including integration with emerging technologies such as resilient packet ring (RPR) and SONET/SDH.

Delivering deep insight into the role of IMS in fixed line and mobile networks, this guide fosters a clear understanding of the next generation of converged communication. It discusses the sources of standards and their particular areas of activities. Most of the text centers on important aspects of IMS that go beyond session control and multimedia handling to include ID management, service profiles, event triggering, flow- and event-based charging mechanisms, and service-based quality of service. The author also examines network admission, security, border control, and legacy services, enabling a thorough appreciation of new network requirements.

Catalog no. AU6039, ISBN: 978-1-4200-6039-3 2008, 6-1/8 x 9-1/4, 224 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU9250, ISBN: 978-0-8493-9250-4 January 2009, 7 x 10, 518 pp. Suggested Price: $89.95 / £49.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 84

12/19/08 10:26:02 AM


CRC Handbook of Modern Telecommunications Patricia A. Morreale

Enterprise Systems Backup and Recovery

Consultant, Short Hills, New Jersey, USA

A Corporate Insurance Policy

Kornel Terplan

Preston de Guise

Updated to incorporate the explosive advances made in telecommunications since 2000, this bestselling handbook once again brings together the top pioneers in communications technology to provide industry professionals with an authoritative resource. The handbook adds extensive material on the latest in wireless communication networks, protocols, and devices. New sections address such topics as convergence motivators, service delivery management, and network management. It also features several new network designs for mobile communications and wireless networks, and provides in-depth coverage of critical security issues that have come to the forefront in recent years.

This volume provides organizations with an understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of what operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for improving current backup system performance.

Catalog no. 78003, ISBN: 978-1-4200-7800-8 July 2009, 7 x 10, 575 pp. Suggested Price: $175.95 / £98.00

Catalog no. AU6396, ISBN: 978-1-4200-7639-4 January 2009, 7 x 10, 308 pp., Soft Cover Suggested Price: $69.95 / £38.99

Second Edition

Consultant, Hackensack, New Jersey, USA

Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments Navrati Saxena

IDATA Resolutions Pty Ltd., Sydney, Australia

Networking Communications

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Fundamentals of DSL Technology Edited by

Philip Golden

85

Stanford University, California, USA

Hervé Dedieu

Sungkyunkwan University, South Korea

Swiss Federal Institute of Technology, Zurich, Switzerland

Abhishek Roy

Krista S. Jacobsen

Conexant Systems, Noida, India

San Jose, California, USA

Recent advances in web and wireless technologies have resulted in a need for more efficient scheduling and data transmission strategies. While both push and pull strategies have value, it is becoming clear that any optimal solution requires a hybrid method. This work takes a comparative and practical approach that incorporates much of the authors’ original research. They discuss basic push and pull strategies and examine the challenges posed by customer requests and behavior, before defining ideal hybrid approaches. Exceptionally thorough, this original work also demonstrates the value of separating clients by class and looks at a new solution for multi-channel broadcast problems.

Fundamentals of DSL Technology begins with an introductory three-chapter examination of DSL copper transmission channels, reviewing the basic telephone environment, the physical-layer twisted pair, and the noise environment in the twisted pair channel. The book then explores line codes – laying the foundation for later chapters about other aspects of DSL design – and discusses the basic objectives of DSL service, comparing DSL to other broadband delivery methods. The book concludes with a description of other basic aspects of DSL transmission, covering topics such as trellis codes, Reed-Solomon codes and interleaving, turbo and LDPC codes, basic equalization theory, synchronization, and more.

Catalog no. AU4655, ISBN: 978-1-4200-4655-7 2008, 6-1/8 x 9-1/4, 160 pp. Suggested Price: $99.95 / £55.99

Catalog no. AU1913, ISBN: 978-0-8493-1913-6 2006, 7 x 10, 472 pp. Suggested Price: $104.95 / £57.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 85

12/19/08 10:26:03 AM


For more information and a complete list Implementation and Applications of DSL Technology Edited by

Philip Golden

Stanford University, California, USA

Hervé Dedieu

Networking Communications

Swiss Federal Institute of Technology, Zurich, Switzerland

Textbook

Introduction to Broadband Communication Systems

Krista S. Jacobsen

Cajetan M. Akujuobi and Matthew N.O. Sadiku

This book offers deep industrial insight into the development of DSL technologies and their related applications in the telecommunications industry. It compiles the expertise of industry specialists from various perspectives, including chip designers, information theorists, systems engineers, service providers, and more. It addresses specific issues that have been fundamental to the success of DSL technology, including insights into the theory that sustains DSL development, constraints, and challenges. It also offers a vast array of information not currently in the public domain, including the results of many years of practical experience that has never before been put to paper.

Exploring why broadband networks are important in modern-day telecommunications, this text covers the concepts and components of both standard and emerging broadband communication network systems. It presents the latest advances and technology, such as IPv6, next-generation SONET, and WiMax, as well as other topics that include fiber channels, VPN, ISDN, ATM, cable modems, DSL, passive optical networks, satellite communications, and network security, testing, and analysis. Unlike similar texts, the book treats wireless data and personal communication services in separate chapters and includes end-of-chapter exercises to reinforce concepts in the text.

Catalog no. AU3423, ISBN: 978-0-8493-3423-8 2008, 6-1/8 x 9-1/4, 816 pp. Suggested Price: $93.95 / £51.99

Catalog no. C6149, ISBN: 978-1-4200-6149-9 2008, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $104.95 / £57.99

San Jose, California, USA

Prairie View A&M University, Texas, USA

Textbook

IMS 86

A New Model for Blending Applications Mark Wuthnow, Jerry Shih, and Matthew Stafford AT&T Labs, Inc., Austin, Texas, USA Series: Informa Telecoms & Media

Introduction to Communications Technologies

A Guide for Non-Engineers, Second Edition Stephan Jones, Ron Kovac, and Frank M. Groom

Ball State University, Muncie, Indiana, USA

More than merely an explanation of IMS, this book addresses how IMS-based services can be deployed in an operator’s network. The authors delineate the application layer and the types of applications that can be implemented. They begin with an overview of the components that make up IMS, then provide a tutorial on several of the key signaling standards that have been defined for implementation of an end-to-end service. The book covers enabling technologies and how one can take the enables defined by OMA, place them in an IMS network defined by 3GPP, add creativity, and offer new services to the consumer or enterprise customer. It includes vignettes that describe real-life scenarios.

Providing an accessible tutorial on telecommunications and network technologies, this text emphasizes the important relationship between voice and data. This second edition has been substantially updated to reflect the latest cellular and mobile technologies, including OFDM, IPv6, WCDMA, SD-CDMA, 4G, WiMAX, QoS, MPLS, unified messaging, IP telephony, and residential convergence. It also features new chapters on network management and security, as well as digital media. The text covers a wide range of topics, from circuit switching and packet switching technologies to wireless and video technologies. Based on an actual course, the book provides ancillary material for qualifying instructors.

Catalog no. AU9285, ISBN: 978-1-4200-9285-1 July 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $69.95 / £42.99

Catalog no. AU4684, ISBN: 978-1-4200-4684-7 January 2009, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $69.95 / £38.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 86

12/19/08 10:26:04 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Technology, Services, Markets Tony Wakefield

Informa Telecoms & Media, London, England, UK Series: Informa Telecoms & Media

Mobile Telemedicine A Computing and Networking Perspective Edited by

Yang Xiao

The University of Alabama, Tuscaloosa, USA

Hui Chen

Virginia State University, Petersburg, USA

The traditionally separate Fixed, Mobile, and Internet sectors are now converging into a single sector with implications for both technology and business. With so much happening, and so many options available, it is increasingly essential for telecommunication professionals to have a clear view of where the industry is heading. This book provides a solid foundation on which to develop a modern view of telecommunications. It explores the core requirements of telecommunications, from markets to technology, primarily from the mobile standpoint. It examines how mobile communications is evolving to meet the changing needs of the customer, and how technology is changing to meet those needs.

Advances in the area of wireless and mobile telemedicine to diagnose and treat patients have drawn growing attention from healthcare providers, industry, researchers, and governments. This volume examines computing and network dilemmas which arise from wireless and mobile telemedicine. Comprised of the contributions of prominent international researchers, the book gives an overview of patient care and monitoring, discusses the use of telemedicine in cardiology and diabetes, analyzes security and privacy considerations, examines issues relating to networking support, and concludes with a section on the opportunities and challenges that are faced by those involved in this exciting technology.

Catalog no. AU4653, ISBN: 978-1-4200-4653-3 2007, 6-1/8 x 9-1/4, 456 pp. Suggested Price: $73.95 / £40.99

Catalog no. AU6046, ISBN: 978-1-4200-6046-1 2008, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $79.95 / £44.99

IP Multimedia Subsystem (IMS) Handbook

Mobile Web 2.0

Edited by

Edited by

Syed A. Ahson

Syed A. Ahson

Microsoft Corporation, Bellevue, Washington, USA

Microsoft Corporation, Bellevue, Washington, USA

Mohammad Ilyas

Mohammad Ilyas

Florida Atlantic University, Boca Raton, USA

Florida Atlantic University, Boca Raton, USA

IMS promises to be a cost-effective evolution path to future wireless and wireline convergences that meet next-generation service demands and requirements. Organized into three main parts, the IP Multimedia Subsystem (IMS) Handbook is a one-stop guide that focuses on the concepts, technologies, and services of IMS. Featuring articles authored by leading experts in the field, this comprehensive volume provides technical information on all aspects of this exciting technology. The book also explores future research directions and contains extensive bibliographies in each chapter, to assist readers who wish to engage in further study.

From basic concepts to research, this handbook covers all aspects of Mobile Web 2.0. The text identifies the main challenges and proposes a platform architecture that addresses some of these challenges, discusses different platforms for developing mobile services, and examines the effect of context on mobile usability. In addition to exploring mobile social software as an ICT and different platforms for developing mobile services, the book also illustrates a conceptual framework that provides modeling facilities for contextaware, multi-channel Web applications and demonstrates how highlevel modeling constructs can drive the application development process through automatic code generation.

Networking Communications

Introduction to Mobile Communications

Developing and Delivering Services to Mobile Phones

Catalog no. 64592, ISBN: 978-1-4200-6459-9 January 2009, 6-1/8 x 9-1/4, 560 pp. Suggested Price: $139.95 / £77.99

87

Catalog no. K10067, ISBN: 978-1-4398-0082-9 July 2009, 6-1/8 x 9-1/4, 650 pp. Suggested Price: $119.95 / £72.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 87

12/19/08 10:26:04 AM


For more information and a complete list Mobile WiMAX

Toward Broadband Wireless Metropolitan Area Networks

Near Field Communications Handbook

Edited by

Edited by

Yan Zhang

Syed A. Ahson

Simula Research Laboratory, Norway

Networking Communications

Hsiao-Hwa Chen

National Cheng Kung University, Taiwan

Mohammad Ilyas

Series: Wireless Networks and Mobile Communications

Series: Internet and Communications

Providing a comprehensive technical and practical guide, Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks covers fundamentals and recent advances as well as the latest standard specifications in the IEEE 802.16 families. This book explores various key challenges in diverse scenarios including OFDM-based physical layer techniques, smart and distributed antenna systems, MIMO technology, and efficient signal processing algorithms. It covers security management, effective protocols, practical system integration, performance analysis, simulation, experiment, and future directions in WirelessMAN. This text is a valuable resource for students and researchers in this rapidly evolving field. Catalog no. AU2624, ISBN: 978-0-8493-2624-0 2008, 7 x 10, 472 pp. Suggested Price: $104.95 / £57.99

88

Microsoft Corporation, Bellevue, Washington, USA

Multi-Objective Optimization in Computer Networks Using Metaheuristics

Florida Atlantic University, Boca Raton, USA

Near Field Communications, or NFC, is a short-range high frequency wireless communication technology that enables the exchange of data between devices over a decimeter. The technology is a simple extension of the ISO 14443 proximity-card standard (contact less card, RFID) that combines the interface of a smartcard and a reader into a single device with practical implications. A complete reference for NFC, this handbook presents technical information about all aspects of NFC, and also provides useful applications. This volume covers basic concepts as well as research grade material and includes a discussion of the future direction of this growing technology. Catalog no. AU8149, ISBN: 978-1-4200-8814-4 July 2009, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $99.95 / £60.99

Yezid Donoso

Universidad de los Andes, Bogota, Colombia

Network Design for IP Convergence

Ramon Fabregat

Yezid Donoso

Metaheuristics are widely used to solve important practical combinatorial optimization problems. Many new multicast applications emerging from the internet–such as TV over the Internet, radio over the Internet, and multipoint video streaming– require reduced bandwidth consumption, end-to-end delay, and packet loss ratio. It is necessary to design and provide for these kinds of applications as well as for the resources needed to function well. Using metaheuristics, Multi-Objective Optimization in Computer Networks Using Metaheuristics provides a solution to the multi-objective problem in routing computer networks. It analyzes layer 3 (IP), layer 2 (MPLS), and layer 1 (GMPLS and wireless functions).

Emerging Internet Quality of Service mechanisms are leading to widespread use of real-time multimedia services, but this requires drastically improved technology and standards. To assist designers and operators, this work provides a guide to the state of the field and emerging advances. It includes an introduction to LAN/MAN/ WAN network design detailing the latest network architecture and equipment and describes routing baseline architecture for inter-networking protocols. It also covers IP protocols and interconnections between different level 1 technologies and between different level 2 technologies with IP routing. Finally, it details service connections, providing designs and configurations.

Girona, Spain

Catalog no. AU8084, ISBN: 978-0-8493-8084-6 2007, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $104.95 / £57.99

Universidad de los Andes, Bogota, Colombia

Catalog no. AU6750, ISBN: 978-1-4200-6750-7 January 2009, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $79.95 / £44.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 88

12/19/08 10:26:05 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Packet Forwarding Technologies Weidong Wu

Principles of Mobile Computing and Communications

Wuhan University of Science and Technology, China

Mazliza Othman

This book explores packet forwarding concepts and implementation technologies. Following an introduction to the architecture of IP routers, the author discusses how IP address lookup is one of the major bottlenecks in high-performance routers. He describes the characteristics of a routing table and addresses the difficulty of the longest-matching prefix search. The remainder of the book deals with fast IP address lookup. Coverage includes the various available architectures, data structures, and algorithms based on software and hardware as well as detailed discussions on state-of-the-art innovations. The text also presents simulation results for comparing the performance between algorithms.

Assuming only a basic knowledge of communication networks, Principles of Mobile Computing and Communications provides an understanding of wireless networks and relevant standards, highlighting issues that are unique to the mobile computing environment and exploring the differences between conventional and mobile applications. This book covers wireless network standards for cellular networks, WLANs, WPANs, wireless sensor networks, MANETs, and mobile IPs. It discusses location identification techniques as well as location systems. It also explores the issue of security in wireless networks and presents case studies to illustrate the requirements for developing mobile applications. A website provides ancillary material for classroom use.

Catalog no. AU8057, ISBN: 978-0-8493-8057-0 2008, 7 x 10, 448 pp. Suggested Price: $93.95 / £51.99

University of Malaysia, Kuala Lumpur

Networking Communications

Textbook

Catalog no. AU6158, ISBN: 978-1-4200-6158-1 2008, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $93.95 / £51.99

RFID and Sensor Networks Performance Analysis of Queuing and Computer Networks G.R. Dattatreya

Architectures, Protocols, Security and Integrations Edited by

89

Yan Zhang

Simula Research Laboratory, Norway

Laurence T. Yang

University Of Texas, Dallas, USA

St. Francis Xavier University, Antigonish NS, Canada

Series: Chapman & Hall/CRC Computer & Information Science Series

Jiming Chen

With examples and exercises, this text develops simple models and analytical methods from first principles in order to evaluate performance metrics of various configurations of computer systems and networks. It includes simple, analytically tractable models, such as optimization of saturated CSMA/CD and CSMA/CA LANs; presents models for complex systems as analyzable modifications and/or interconnections of simple models; and contains a wide variety of queuing models, including bursty, MMPP, approximate self-similar traffic, and fluid flow. The author also discusses timing and synchronization in the analysis of discrete time (slotted) networks.

Integrating Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) for the first time, this comprehensive text explains the importance of their complementary nature, flexible combination, and ubiquitous computing. With a section devoted to each individual element, the text covers the tags, readers, and middleware associated with RFID. It then provides insight into the routing, medium access control, and cross-layer optimization of WSN. The book discusses the enhanced visibility and monitoring capability that is possible and observes practical uses such as a smart home, a surveillance system, and applications for personal health care.

Catalog no. C9861, ISBN: 978-1-58488-986-1 2008, 6-1/8 x 9-1/4, 472 pp. Suggested Price: $89.95 / £49.99

Catalog no. AU7777, ISBN: 978-1-4200-7777-3 June 2009, 6-1/8 x 9-1/4, 450 pp. Suggested Price: $99.95 / £60.99

Zhejiang University, Hangzhou, China

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 89

12/19/08 10:26:06 AM


For more information and a complete list SIP Handbook Security in an IPv6 Environment

Services, Technologies, and Security of Session Initiation Protocol

Daniel Minoli

Edited by

Jake Kouns

Microsoft Corporation, Bellevue, Washington, USA

SES Engineering, Princeton, New Jersey, USA

Networking Communications

Markel Corporation, Glen Allen, Virginia, USA

Syed A. Ahson

Mohammad Ilyas

Florida Atlantic University, Boca Raton, USA

As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The text discusses general security mechanisms and approaches as well as IPv6 security features. In addition to firewall use, the authors also examine the fundamental topic of IPSec and its use in IPv6 environments. A final chapter addresses security considerations for migration environments that may consist of mixed IPv4 and IPv6 networks.

This volume provides a powerful hands-on reference for designers and planners of Session Initiation Protocol (SIP) networks. It reviews various services associated with SIPs, examines different technologies involved in their utilization, and explores the myriad of security issues that their use engenders. Supplemented with a wealth of figures and equations, the book draws on the experience of many worldwide contributors. Because of the editors’ pivotal influence and their proximity to both the current market and the latest science, SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol is certain to become the definitive text on this emerging technology.

Catalog no. AU2294, ISBN: 978-1-4200-9229-5 January 2009, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $79.95 / £44.99

Catalog no. 6603X, ISBN: 978-1-4200-6603-6 January 2009, 6-1/8 x 9-1/4, 614 pp. Suggested Price: $149.95 / £83.00

Service Delivery Platforms

Developing and Deploying Converged Multimedia Services 90 Edited by

Syed A. Ahson

Microsoft Corporation, Bellevue, Washington, USA

Mohammad Ilyas

TCP Performance over UMTS-HSDPA Systems Mohamad Assaad

Ecole Supérieure d’Electricité, Gif-sur-Yvette, France

Djamal Zeghlache

Florida Atlantic University, Boca Raton, USA

Institut National Des Telecommunications, Evry, France

In the telecommunications industry, it is becoming increasingly important for operators to quickly provide a service delivery platform. This book discusses the fundamental requirements of service delivery platforms, evaluating their basic functions and feasibility. Starting with content and media in modern networks, the text presents the entire user experience, including requirements for the user terminal, supporting systems, broadcasting, and networks. Expert contributors explore the evolving role of service delivery platforms, explaining various applications and delivery mechanisms, providing an overview of enabling technologies, and addressing a wide range of security issues.

TCP Performance over UMTS-HSDPA Systems provides a comprehensive study of the effect of TCP on both achieved application bit rate performance and system capacity. The book describes how to reduce, with or without modification of TCP implementations, the effect of wireless networks on TCP. Emphasizing the effect of scheduling to improve TCP performance over wireless systems, the authors focus on the performance of TCP traffic over HSDPA. This text is ideal for advanced undergraduate students, graduate students, and researchers with basic knowledge in wireless networks that are keen on learning more about the UMTS access network evolution and interactions of the wireless link with TCP.

Catalog no. K10071, ISBN: 978-1-4398-0089-8 July 2009, 6-1/8 x 9-1/4, 650 pp. Suggested Price: $119.95 / £72.99

Catalog no. AU6838, ISBN: 978-0-8493-6838-7 2007, 6-1/8 x 9-1/4, 211 pp. Suggested Price: $83.95 / £46.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 90

12/19/08 10:26:06 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Unlicensed Mobile Access Technology Edited by

Yan Zhang

Packets to Perceptual Voice Quality

Simula Research Laboratory, Norway

Vlatko Lipovac

Jianhua Ma

VoIP is a term used in IP telephony for managing the delivery of digital voice information sent in discrete packets using the Internet Protocol, rather than traditional circuit-committed protocols of public telephone networks. The new technology of sending voice information in digital form is addressed completely in Testing Integrated QoS of VoIP: Packets to Perceptual Voice Quality, which details the techniques of testing VoIP networks to ensure quality of service. It also includes information on reducing oneway delay, jitter, and data loss for VoIP traffic while retaining the performance of other business-critical network applications.

Unlicensed mobile access (UMA) technology offers seamless access to GSM and GPRS mobile services networks over unlicensed spectrum technologies, including Bluetooth, WiMAX, and WiFi. This book provides a complete cross-reference source for UMA technology and UMA-relevant technologies. Presenting a fundamental introduction with definitions of concepts, explanations of protocols and emerging standards, as well as detailed discussions of applications, it covers important topics such as system/network architecture, capacity, mobility management, vertical handoff, routing, medium access control, scheduling, congestion control, adaptive channel assignment, and security.

University of Dubrovnik, Croatia

Laurence T. Yang

St. Francis Xavier University, Antigonish NS, Canada Hosei University, Koganei, Japan

Catalog no. AU3521, ISBN: 978-0-8493-3521-1 June 2009, 6-1/8 x 9-1/4, 350 pp. Suggested Price: $89.95 / £54.99

Networking Communications

Testing Integrated QoS of VoIP

Protocols, Architectures, Security, Standards and Applications

Catalog no. AU5537, ISBN: 978-1-4200-5537-5 January 2009, 7 x 10, 424 pp. Suggested Price: $99.95 / £55.99

The Internet of Things

From RFID to the Next-Generation Pervasive Networked Systems Edited by

Lu Yan, Yan Zhang, Laurence T. Yang, and Huansheng Ning Series: Wireless Networks and Mobile Communications

The realization of the “Internet of Things”– a world in which billions of objects will report their location, identity, and history over wireless connections– will require dramatic changes in systems, architectures, and communications. Although RFID has already laid the foundation for this, further research and development is needed to enable such a pervasive networking world, which should be flexible, adaptive, and secure. Reflecting current trends and future directions in the industry, The Internet of Things provides a comprehensive technical and practical guide to recent advances in pervasive networked systems through detailed discussions, realworld case studies, and experience reports. Catalog no. AU5281, ISBN: 978-1-4200-5281-7 2008, 6-1/8 x 9-1/4, 336 pp. Suggested Price: $99.95 / £55.99

Value-Added Services for Next Generation Networks

91

Thierry Van de Velde

Cisco Systems, Diegem, Belgium Series: Informa Telecoms & Media

Value-Added Services for Next Generation Networks provides a SWOT analysis of PSTN/GSM operators and new entrants that are facing such threats as internet communities, unlicensed spectrum, and low ARPU markets. This book summarizes the NGN standardization bodies and addresses the role of rating, promotions, and campaigns in stimulating revenue, evaluating the effectiveness of usage-based charges. Showing how the NGN can be interconnected to the existing infrastructure, it describes the architectural requirements in a modern VAS platform and presents 20 original VAS for the NGN. It also examines the role of personal contact lists and instant multimedia messaging in the end user experience. Catalog no. AU7318, ISBN: 978-0-8493-7318-3 2008, 6-1/8 x 9-1/4, 176 pp. Suggested Price: $83.95 / £46.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 91

12/19/08 10:26:07 AM


For more information and a complete list Vehicular Networks from Theory to Practice Edited by

Stephan Olariu and Michele C. Weigle

Old Dominion University, Norfolk, Virginia, USA

Networking Communications

Series: Chapman & Hall/CRC Computer & Information Science Series, 20

VoIP Handbook

Applications, Technologies, Reliability, and Security Edited by

Syed A. Ahson

Microsoft Corporation, Bellevue, Washington, USA

Mohammad Ilyas

Florida Atlantic University, Boca Raton, USA

The past decade has witnessed the emergence of Vehicular Ad-hoc Networks (VANET). While the original motivation for VANET was to promote traffic safety, more recently, privacy and security concerns have received attention. In addition, VANETS open new vistas for Internet access, distributed gaming, and the fast-growing mobile entertainment industry. This book is the first comprehensive source of information about VANETS, and introduces the reader to state-of-the-art research, technologies, tools, and innovations relating to this exciting new technology. Almost 800 pages examine everything from traffic engineering, applications, networking and computational issues, to psychology and human factors. Catalog no. C5883, ISBN: 978-1-4200-8588-4 March 2009, 6-1/8 x 9-1/4, 464 pp. Suggested Price: $99.95 / £60.99

From basic concepts to future research directions, the VoIP Handbook provides technical information about all aspects of VoIP. Voice over Internet protocol (VoIP) can facilitate tasks that may be more difficult to achieve using traditional networks, such as the ability to route calls to VoIP phones. This essential book explores the wide range of applications that VoIP offers, including smartphones and access to emergency services. Leading expert contributors in the field offer their perspectives on numerous related topics, including reliability models. As a single reference source, this comprehensive text also presents the latest technologies and addresses various security issues. Catalog no. 70207, ISBN: 978-1-4200-7020-0 January 2009, 7 x 10, 440 pp. Suggested Price: $99.95 / £55.99

WiMAX 92

VMware Certified Professional Test Prep Merle Ilgenfritz, VCP, VCI Crossville, Tennessee, USA

John Ilgenfritz, VCP, VCI

A Wireless Technology Revolution G.S.V. Radha Krishna Rao

Cognizant Technology, Chennai, India

G. Radhamani

Multimedia University, Selangor, Malaysia

Munhall, Pennsylvania, USA

Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate comprehensive study guide to the VCP exam. Tightly organized and highly practical, it boosts classroom training so administrators can successfully prepare for the exam. On the job, it lets administrators maximize their ability to support VMware. This guide covers theentire body of knowledge required of a VMware certified professional, provides the tools needed to keep that knowledge current, and helps develop the expertise to apply that knowledge to real solutions. Catalog no. AU6599, ISBN: 978-1-4200-6599-2 January 2009, 7 x 10, 880 pp. Suggested Price: $69.95 / £38.99

Examining the technology’s global development and deployment activities, WiMAX: A Wireless Technology Revolution presents its unique features and evaluates its revolutionary approach. The book covers the mission, product, and services of WiMAX, as well as specific elements such as security and mobility. It discusses the implementation of the IEEE 802.16 standard and also explores how WiMax stacks up to 3G and 4G with respect to economic and opportunity costs. This reference also analyzes the future prospects of WiMAX and its contribution to the wireless and mobile communication technology field. It is a must-have resource for those who are either intrigued or involved with this technology. Catalog no. AU7059, ISBN: 978-0-8493-7059-5 2008, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $73.95 / £40.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 92

12/19/08 10:26:08 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Wireless Mesh Networking Edited by

Advanced Research and Technology

Yan Zhang

Edited by

Siemens AG Communications, Munich, Germany

Yang Xiao

The University of Alabama, Tuscaloosa, USA

Also known as WiMAX (Worldwide Interoperability for Microwave Access), IEEE 802.16 (802.16a, 802.16d, 802.16e, WiBro)-based technology can potentially deliver fixed, portable, and mobile wireless solutions. Tutorial in nature, this book features original, unpublished, state-of -the-art research in various aspects of protocol (Layer 2 and above) design and engineering for WiMAX/MobileFi. It addresses many research-oriented issues in WiMAX such as MAC layer optimization, scheduling, link adaptation, error control, multihop routing mobility, location and handoff management, QoS specification and metrics, standardization status reports, privacy and security protocols, and proxies and middleware. Catalog no. AU4351, ISBN: 978-1-4200-4351-8 2008, 6-1/8 x 9-1/4, 448 pp. Suggested Price: $93.95 / £51.99

Simula Research Laboratory, Norway

Jijun Luo

Honglin Hu

Shanghai Research Center for Wireless Communications, China

Wireless Mesh Networking: Architectures, Protocols and Standards is the first book to provide readers a comprehensive technical guide covering recent and open issues in wireless mesh networks. This unique volume explores the various key challenges in diverse scenarios as well as emerging standards, including capacity and scalability. It focuses on concepts, effective protocols proposals, system integration, performance analysis techniques, simulation, experiments, and future research directions. It contains illustrative figures and allows for complete cross-referencing. It also details information on the particular techniques for efficiently improving the mesh network performance.

Networking Communications

WiMAX/MobileFi

Architectures, Protocols and Standards

Catalog no. AU7399, ISBN: 978-0-8493-7399-2 2007, 6-1/8 x 9-1/4, 608 pp. Suggested Price: $93.95 / £51.99

Wireless Quality of Service Wireless Ad Hoc and Sensor Networks

Protocols, Performance, and Control Jagannathan Sarangapani

The University of Missouri-Rolla, USA

Techniques, Standards, and Applications Edited by

93

Maode Ma

Nanyang Technological University, Singapore

Mieso K. Denko

University of Guelph, Ontario, Canada

Yan Zhang

Series: Automation and Control Engineering

Simula Research Laboratory, Norway

Wireless Ad Hoc and Sensor Networks: Protocols, Performance, and Control addresses the basic theory, architectures, and technologies that are necessary to implement quality of service (QoS) control in wired and wireless networks. This book provides understanding of technical concepts related to computer network and wireless Internet control protocols as well as those specific to wired, cellular, wireless ad hoc, and sensor networks. With an overview of existing QoS methods, the text describes recent advances with practical approaches for implementation in high-speed networks. Coverage also includes underlying QoS techniques developed through Lyapunov-based design with simulation examples and proofs.

This volume systematically addresses the QoS issues found in many types of popular wireless networks, including LANs, PANs, MANs, 3G, mobile ad hoc, sensor, and heterogeneous. It introduces the fundamental concepts of QoS provisioning and presents various techniques, such as the Markov chain model and a distributed admission control mechanism, to combat QoS problems that include performance impairments in WLAN hotspots, video streaming applications, and broadband wireless access. The book covers the standards of different wireless networks and the QoS service frameworks specified in the standards, along with recent research progress on improving the performance of QoS services in wireless networks.

Catalog no. DK3149, ISBN: 978-0-8247-2675-1 2007, 6 x 9, 536 pp. Suggested Price: $144.95 / £79.99

Catalog no. AU5130, ISBN: 978-1-4200-5130-8 January 2009, 6-1/8 x 9-1/4, 376 pp. Suggested Price: $89.95 / £49.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 93

12/19/08 10:26:08 AM


For more information and a complete list

802.1X Port-Based Authentication Edwin Lyle Brown

Security & Auditing

Morganza, Louisiana, USA

Written to appeal to a broad audience, 802.1X Port-Based Authentication defines this complex concept in accessible terms and explores its various applications to today’s computer networks that are using this particular network protocol. This text assumes that the reader has only a general understanding of computer networking. It presents an introductory overview as well as a subject overview in each chapter and provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Featuring examples derived from the 802.1X implementation, this book also addresses troubleshooting issues in a Cisco environment. Catalog no. AU4464, ISBN: 978-1-4200-4464-5 2007, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $73.95 / £40.99

Assessing and Managing Security Risk in IT Systems

A Structured Methodology John McCumber

Symantec Corporation, Reston, Virginia, USA

This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes. Catalog no. AU2232, ISBN: 978-0-8493-2232-7 2005, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $62.95 / £34.99

Textbook

94

Access Control, Security and Trust A Logical Approach

Shiu-Kai Chin and Susan Beth Older Syracuse University, New York, USA

Series: Chapman & Hall/CRC Cryptography and Network Security Series

Using propositional modal logic to explain access control principles, this work provides the mathematical means to comprehend, analyze, create and verify the policies and control mechanisms used to protect resources. It starts with a preliminary introduction and then covers distributed access control, resources and sharing, and security monitors, the latter of which serves as a bridge to classical security models. While structured as a text for advanced undergraduates and graduate students, the book also meets the reference needs of those computer engineers, computer scientists, and information technologists responsible for designing, implementing, and verifying computer and information systems. Catalog no. C8628, ISBN: 978-1-58488-862-8 June 2009, 6-1/8 x 9-1/4, 512 pp. Suggested Price: $89.95 / £49.99

Building an Effective Information Security Policy Architecture Sandy Bacik

Consultant, Fuquay Varina, North Carolina, USA

Through the use of questionnaires, interviews, and assessments, Building an Effective Security Policy Architecture demonstrates how to evaluate an organization’s culture and its ability to meet various security standards and requirements. The author provides practical guidance for building, writing, and implementing policy architecture that is designed to specifically fit within that culture. Recognizing that the effectiveness of a policy is dependent on cooperation and compliance, the author also demonstrates how to communicate that policy and provides advice on how to gain support. Samples of effective policy architecture are included. Catalog no. AU5905, ISBN: 978-1-4200-5905-2 2008, 6-1/8 x 9-1/4, 368 pp. Suggested Price: $79.95 / £44.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 94

12/19/08 10:26:09 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Measuring Regulatory Compliance, Operational Resilience, and ROI

Digital Privacy

Theory, Technologies, and Practices Edited by

Debra S. Herrmann

Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, and Sabrina De Capitani Vimercati

This book defines more than 900 metrics measuring compliance with current legislation, resiliency of security controls, and return on investment. It explains what needs to be measured, why and how to measure it, and how to tie security and privacy metrics to business goals and objectives. The metrics are scaled by information sensitivity, asset criticality, and risk; aligned to correspond with different lateral and hierarchical functions; designed with flexible measurement boundaries; and can be implemented individually or in combination. The text includes numerous examples and sample reports and stresses a complete assessment by evaluating physical, personnel, IT, and operational security controls.

Throughout recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. Reflecting the growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-theart technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. The book features contributions from experts in academia, industry, and government.

U.S. Nuclear Regulatory Commission, Washington, D.C., USA

Catalog no. AU5402, ISBN: 978-0-8493-5402-1 2007, 7 x 10, 848 pp. Suggested Price: $124.95 / £69.99

Security & Auditing

Complete Guide to Security and Privacy Metrics

Catalog no. AU5217, ISBN: 978-1-4200-5217-6 2008, 6-1/8 x 9-1/4, 496 pp. Suggested Price: $73.95 / £40.99

Critical Infrastructure Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies

95

FISMA Compliance

Principles and Best Practices

Tyson Macaulay

Patrick D. Howard

CISSIP, CISA, ISSPCS, Ottawa, Ontario, Canada

US Dept. of Housing & Urban Development, Washington, D.C., USA

Critical Infrastructure (CI) is a little understood topic, which seems to generate more fear than rational discussion. CIs are considered fundamental to the functioning of modern economies. Moving beyond definitions, this volume looks at the “iron triangle” within CI: power, telecom, and finance. It introduces the concept of CIs as industrial and enterprise “risk conductors,” highlighting the fact that a CI failure can propagate an impact throughout an enterprise. This text rethinks the concept of a CI according to contemporary factors, providing guidance for mitigating risk within the framework of national economies.

Few organizations have not felt the impact of government regulation in the area of information systems security. In light of new legislation such as the Federal Information Security Management Act (FISMA), there is an increased need to measure the ability of government organizations and companies subject to these standards to protect information. This book provides practical guidelines for addressing FISMA compliance. It offers workable solutions for establishing and operating a security compliance program, including how to gain management support, design and staff a compliance capability, build organizational relationships, and integrate compliance into the system development life cycle.

Catalog no. AU6835, ISBN: 978-1-4200-6835-1 January 2009, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU8291, ISBN: 978-1-4200-7829-9 May 2009, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $79.95 / £48.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 95

12/19/08 10:26:10 AM


For more information and a complete list Industrial Automation and Process Control Security SCADA, DCS, PLC, HMI

Information Security

Security & Auditing

Tyson Macaulay

CISSIP, CISA, ISSPCS, Ottawa, Ontario, Canada

Design, Implementation, Measurement, and Compliance

Bryan Singer

Timothy P. Layton

SCADA (Supervisory Control and Data Acquisition) systems do not necessarily mesh well with standard IT security. Nevertheless, when combined, the two can create deepened levels of protection. Industrial Automation and Process Control Security: SCADA, DCS, PLC, HMI demonstrates how to develop a SCADA cyber security program. It also explores how to work with internal and external IT resources in order to properly implement it. The technical level of this text provides sufficient detail and sophistication to comprehensively address areas of concern, yet the book remains readily accessible to a wide audience.

Information Security presents an in-depth perspective of the ISO/ IEC 17799 Information Security Standard and provides a detailed analysis of how to effectively measure an information security program using this standard. It includes a qualitative-based risk assessment methodology and describes a quantitative measurement framework that organizations can adopt and implement within the risk assessment process, allowing firms to customize practices to their own needs. This text also includes a comprehensive gap analysis of the recently rescinded standard against the newly released version, making the transition to the new standard much easier for organizations and practitioners.

Alabaster, Alabama, USA

Catalog no. K10111, ISBN: 978-1-4398-0196-3 July 2009, 6-1/8 x 9-1/4, 320 pp. Suggested Price: $79.95 / £48.99

Grover, Missouri, USA

Catalog no. AU7087, ISBN: 978-0-8493-7087-8 2007, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $93.95 / £51.99

Information Security Architecture 96

Information Assurance Architecture Keith D. Willett

CTN Technologies, Millersville, Maryland, USA

Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow. By studying this book, readers will acquire the skills necessary to develop a security architecture that serves specific needs. They will come to understand distinctions amongst engineering architecture, solutions architecture, and systems engineering. The book also shows how the Zachman and the Federal Enterprise Architecture models can be used together to achieve the goals of a business or government agency. Catalog no. AU8067, ISBN: 978-0-8493-8067-9 2008, 6-1/8 x 9-1/4, 624 pp. Suggested Price: $79.95 / £44.99

An Integrated Approach to Security in the Organization, Second Edition Jan Killmeyer

Tudor Engineering Management, Butler, Pennsylvania, USA

Exploring the evolution of information security (IS), this book looks at the development of the field from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear, organized methods and by guiding you to the most effective resources available. Building on the foundation of the first edition, this volume discusses three additional components: monitoring and detection, computer incident and emergency response, and disaster recovery and business continuity planning. Each chapter provides an understanding of the component and details how it relates to the rest of the IS architecture. Catalog no. AU1549, ISBN: 978-0-8493-1549-7 2006, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $83.95 / £46.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 96

12/19/08 10:26:10 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Information Security Management Metrics

HFT Associates, Villa Park, California, USA

A Definitive Guide to Effective Security Monitoring and Measurement

Micki Krause, CISSP

W. Krag Brotby, CISM

A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this text forms the basis on which all IT security programs and certifications are created. Considered the gold-standard reference of Information Security, Volume 3 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is revised annually, keeping IT professionals updated and current in their field and on the job. A CD-ROM version of this book is also available which includes the content from every annual edition since 1997, as well as material never printed.

Information Security Management Metrics offers a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management. With case studies and tools for monitoring specific items, this book offers practical guidance for implementing metrics across an entire organization, thereby improving budget and resource allocation, and reducing the possibility that unanticipated events will have catastrophic impacts. The book presents metrics that complement those used by IT managers, and demonstrates how to make adjustments to metrics without interrupting business processes.

Sixth Edition, Volume 3 Edited by

Harold F. Tipton, CISSP

Pacific Life Insurance Company, Newport Beach, California, USA

Catalog no. AU0925, ISBN: 978-1-4200-9092-5 April 2009, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $99.95 / £60.99

Information Security Management Handbook 2009 CD-ROM Edition

Catalog no. AU0984, ISBN: 978-1-4200-9098-7 March 2009, CD-ROM Suggested Price: $199.95 / £121.00

Information Security Management Handbook Sixth Edition, Volume 1

Catalog no. AU7495, ISBN: 978-0-8493-7495-1 2007, 7 x 10, 3,280 pp. Suggested Price: $159.95 / £88.00

Information Security Management Handbook Sixth Edition, Volume 2

Catalog no. AU6708, ISBN: 978-1-4200-6708-8 2008, 7 x 10, 456 pp. Suggested Price: $99.95 / £55.99

Enterprise Security Architect, Thousand Oaks, California, USA

Security & Auditing

Information Security Management Handbook

Catalog no. AU5285, ISBN: 978-1-4200-5285-5 February 2009, 6-1/8 x 9-1/4, 200 pp. Suggested Price: $79.95 / £48.99

Information Security Policies and Procedures

97

A Practitioner’s Reference, Second Edition Thomas R. Peltier

Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA

This book illustrates how policies and procedures support the efficient running of an organization. It points out how security documents and standards are key elements in the business process, but should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives or mission requirements; they are elements that aid in the execution of management policies. The author details how security policies support management directions, and emphasizes how information security must be integrated into all business processes. The book examines Tier 1, Tier 2, and Tier 3 policies. Catalog no. AU1958, ISBN: 978-0-8493-1958-7 2004, 6-1/8 x 9-1/4, 408 pp. Suggested Price: $93.95 / £51.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 97

12/19/08 10:26:11 AM


For more information and a complete list

Information Security Risk Analysis Second Edition Thomas R. Peltier

Security & Auditing 98

Investigations in the Workplace

Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA

Eugene F. Ferraro, CPP, CFE, PCI

Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the assessment process. The text offers a thorough discussion of recent changes to FRAAP and the need to develop a pre-screening method for risk assessment and business impact analysis.

Confronted with the opposing demands of loss prevention, asset protection, and ever expanding employee rights issues, it is essential for security professionals, lawyers, and human resource directors to understand the process of investigation and know how to properly conduct internal investigations. This book targets both the private security professional and the consumer of corporate investigative services. The text provides the tools necessary to serve the reader who is contemplating an internal investigation for the first time, or one who conducts them regularly. The book’s modern case studies, statistics, checklists, and references make it an authoritative reference on the subject.

Catalog no. AU3346, ISBN: 978-0-8493-3346-0 2005, 6-1/8 x 9-1/4, 360 pp., Soft Cover Suggested Price: $83.95 / £46.99

Catalog no. AU1648, ISBN: 978-0-8493-1648-7 2006, 6-1/8 x 9-1/4, 600 pp. Suggested Price: $83.95 / £46.99

Information Technology Control and Audit Third Edition

Sandra Senft and Frederick Gallegos

Business Controls, Inc., Golden, Colorado, USA

Textbook

IS Security Auditing

Complying with ISO 27001 and 17799

California State Polytechnic University, Pomona, USA

Bel G. Raggad

Now in its third edition, this book is an excellent introductory reference to IT governance, controls, and auditing. It reviews pertinent legislation; discusses the future of auditing in the 21st century; and examines governance, strategy and standards, and acquisition and implementation. In a section on delivery and support, it explores service management, service continuity, systems management, and operations management. Finally, the authors review advanced topics such as virtual environment, virtual security, e-commerce, and enterprise resource planning. This new edition includes guidelines for preparing for CISA Exam, and includes numerous illustrations to help readers visualize concepts.

Corporate information security is crucial for generating continuous business value in the modern world. Information security audits remain a critical component of achieving corporate security. This book presents a security audit methodology that conforms to the new security standard ISO 27001. Detailed sections illustrate how to conduct a nominal security audit that conforms to the ISO 17799 standard and a technical security audit for certification against the ISO 27001. Along with case studies that demonstrate implementation, the text provides a detailed methodology that explains how to devise a risk-driven security program as well as an effective information security management system.

Catalog no. AU6550, ISBN: 978-1-4200-6550-3 January 2009, 7 x 10, 774 pp. Suggested Price: $89.95 / £49.99

Catalog no. AU7854, ISBN: 978-1-4200-7854-1 June 2009, 6-1/8 x 9-1/4, 384 pp. Suggested Price: $79.95 / £48.99

Pace University, Pleasantville, New York, USA

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 98

12/19/08 10:26:12 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Key Strategies for Business Improvement Dimitris N. Chorafas

Managing an Information Security and Privacy Awareness and Training Program

Consultant for Major Corporations, France & Switzerland

Rebecca Herold

Written as a contribution to the accounting and auditing professions, this book links two key strategies for business improvement: information technology auditing and Sarbanes-Oxley compliance. Both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board’s audit committee and CEO. All of the concepts are reviewed in detail and reinforced with case studies which demonstrate the proper steps needed for complete analysis. Those companies that make good use of the procedures in this book will avoid the lure of easy money that moved Enron and Worldcom from world class organizations to colossal disasters.

Managing an Information Security and Privacy Awareness and Training Program provides a starting point and an all-inone resource for infosec and privacy education practitioners who are building programs for their organizations. The author applies knowledge obtained through her work in education, creating a comprehensive resource of nearly everything involved with managing an infosec and privacy training course. This book includes examples and tools from a wide range of businesses, enabling readers to select effective components that will be beneficial to their enterprises. The text progresses from the inception of an education program through development, implementation, delivery, and evaluation.

Catalog no. AU6170, ISBN: 978-1-4200-8617-1 January 2009, 6-1/8 x 9-1/4, 305 pp. Suggested Price: $89.95 / £49.99

Catalog no. AU2963, ISBN: 978-0-8493-2963-0 2005, 6-1/8 x 9-1/4, 552 pp. Suggested Price: $83.95 / £46.99

IT Security Governance Guidebook with Security Program Metrics on CD-ROM Fred Cohen

Fred Cohen & Associates, Livermore, California, USA

Rebecca Herold, LLC, Van Meter, Iowa, USA

Mechanics of User Identification and Authentication

Security & Auditing

IT Auditing and Sarbanes-Oxley Compliance

99

Fundamentals of Identity Management Dobromir Todorov

Series: The CISO Toolkit, 1

Consultant, Buckinghamshire, UK

The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics formed from repeatable and comparable measurement, designed to correspond to the enterprise security governance model provided in the text. This allows an enterprise to measure its overall information protection program.

User identification and authentication are essential to modern security. Mechanics of User Identification and Authentication introduces the philosophy behind user authentication and access control and presents key concepts for practical applications. It outlines the process of controlled access to resources through authentication, authorization, and accounting and provides specific information on the user authentication process for both UNIX and Windows. Addressing more advanced applications and services, the author presents common security models such as GSSAPI and discusses authentication architecture. Each method is presented with a specific authentication scenario.

Catalog no. AU8435, ISBN: 978-0-8493-8435-6 2007, 7 x 10, 208 pp. Suggested Price: $104.95 / £57.99

Catalog no. AU5219, ISBN: 978-1-4200-5219-0 2007, 6-1/8 x 9-1/4, 760 pp. Suggested Price: $83.95 / £46.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 99

12/19/08 10:26:12 AM


For more information and a complete list

National Security Issues in Science, Law, and Technology Edited by

Security & Auditing 100

The Practical Guide to HIPAA Privacy and Security Compliance Kevin Beaver

Principle Logic, Acworth, Georgia, USA

Thomas A. Johnson

Rebecca Herold

Using the best scientific decision-making practices, this book introduces the concept of risk management and its application in the structure of national security decisions. It examines the acquisition and utilization of all-source intelligence and addresses reaction and prevention strategies applicable to chemical, biological, and nuclear weapons; agricultural terrorism; cyberterrorism; and other potential threats. It discusses legal issues and illustrates the dispassionate analysis of our intelligence, law enforcement, and military operations and actions. The book also considers the redirection of our national research and laboratory system to investigate weapons we have yet to confront.

This book is a one-stop resource for HIPAA privacy and security advice that can immediately be applied to any organization’s unique situation. It defines what HIPAA is, what it requires, and what can be done to achieve and maintain compliance. It describes the HIPAA Privacy and Security Rules and compliance tasks in easy-tounderstand language, focusing not on technical jargon, but on what organizations need to do to meet requirements. Anyone preparing an organization for HIPAA laws will receive expert guidance on requirements and other commonly-discussed topics. The book enables organizations determine how HIPAA will impact them, regardless of whether they are a HIPAA covered entity.

Catalog no. DK5817, ISBN: 978-1-57444-908-2 2007, 6-1/8 x 9-1/4, 680 pp. Suggested Price: $144.95 / £79.99

Catalog no. AU1953, ISBN: 978-0-8493-1953-2 2004, 6-1/8 x 9-1/4, 496 pp. Suggested Price: $104.95 / £57.99

University of New Haven, Connecticut, USA

Organizational Crisis Management The Human Factor Gerald Lewis

Rebecca Herold, LLC, Van Meter, Iowa, USA

A Practical Guide to Information Systems Strategic Planning Second Edition Anita Cassidy

COMPASS, Framingham, Massachusetts, USA

Strategic Computing Directions, Prior Lake, Minnesota, USA

Organizational Crisis Management: The Human Factor offers a theoretical background and practical strategies for responding to workplace crises. Responding to a paradigm that focuses on the operational aspects of continuity to the detriment of human factors, this volume provides a comprehensive understanding of the unavoidable yet often complex reactions of people to a wide array of organizational disruptions. Based upon the author’s vast experience in the field, this book is a “nuts and bolts” resource that you can immediately apply to a wide range of organizational environments. The book also looks at legal and security aspects of workplace disruption.

Taking a new look at the role of IS governance in strategic planning, this second edition reflects advances in technology and provides a thorough planning methodology. The author details a quick and easy approach with concepts, techniques, and templates for analyzing, organizing, communicating, and implementing an IS strategy. This approach unites an organization in a collaborative effort resulting in a solid direction that has the support of the entire organization. Establishing this direction cultivates the support of management, enabling necessary strategic IS investments. The book guides readers through the development of an effective IS plan formulated from their company’s business plan.

Catalog no. AU3962, ISBN: 978-0-8493-3962-2 2006, 6-1/8 x 9-1/4, 208 pp. Suggested Price: $83.95 / £46.99

Catalog no. AU5073, ISBN: 978-0-8493-5073-3 2006, 6-1/8 x 9-1/4, 400 pp. Suggested Price: $62.95 / £34.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 100

12/19/08 10:26:13 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

Sudhanshu Kairab

Security for Service Oriented Architectures

Amper, Politziner, & Mattia, P.C., East Brunswick, New Jersey, USA

Bhavani Thuraisingham

Taking a process-focused approach, A Practical Guide to Security Assessments presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. The book includes an Appendix that contains questionnaires that can be modified and used to conduct security assessments.

An exploration of security issues for the SOA and web services, this book reviews the developments in web services and web service oriented architectures and describes ways of securing these technologies. It focuses on confidentiality, privacy, trust, and integrity management. The author demonstrates the breadth and depth of the applications of these technologies in multiple domains. He lays the groundwork with discussions of concepts in trustworthy information systems and security for SOA, then covers secure web services and applications. The book discusses these technologies in secure interoperability, defense, and medical applications.

Catalog no. AU1706, ISBN: 978-0-8493-1706-4 2005, 6-1/8 x 9-1/4, 520 pp. Suggested Price: $83.95 / £46.99

Catalog no. AU7331, ISBN: 978-1-4200-7331-7 June 2009, 6-1/8 x 9-1/4, 250 pp. Suggested Price: $89.95 / £54.99

The Secrets to Carrier Class Network Security

Security in Distributed, Grid, Mobile, and Pervasive Computing

Victor Oppleman

Yang Xiao

VOSTROM Holdings, Inc., Virginia Beach, USA

The University of Alabama, Tuscaloosa, USA

The author is a network security expert who has developed security products and services for the world’s largest telecommunications carriers. Now, with The Secrets to Carrier Class Network Security, readers can apply the author’s Tier-1 security expertise toward networks of all sizes. This book details how to: defend networks from telecom (ISP) carrier-induced weaknesses; design network environments with proven, vendor-neutral security architectures; prevent networks from becoming a source of attack; and identify and react more quickly to threats. It tells how the world’s best hackers develop new threats and provides a sneak peek at the next wave of hacking techniques.

This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It reviews security challenges in content distribution networks, and describes key agreement protocols based on the DiffieHellman key exchange. The author also discusses key management protocols for complex distributed systems, along with securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. Following an examination of grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.

Catalog no. AU3158, ISBN: 978-0-8493-3158-9 May 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $79.95 / £48.99

Catalog no. AU7921, ISBN: 978-0-8493-7921-5 2007, 6-1/8 x 9-1/4, 440 pp. Suggested Price: $93.95 / £51.99

The University of Texas, Richardson, USA

Security & Auditing

A Practical Guide to Security Assessments

101

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 101

12/19/08 10:26:13 AM


For more information and a complete list Security in Wireless Mesh Networks Security in RFID and Sensor Networks

Simula Research Laboratory, Norway

Jun Zheng

Yan Zhang

City University of New York, USA

Paris Kitsos

Hellenic Open University, Patras, Greece

Shanghai Research Center for Wireless Communications, China

Series: Wireless Networks and Mobile Communications, 13

Series: Wireless Networks and Mobile Communications

Interest in Radio Frequency Identification (RFID) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on the fundamentals, security challenges, and solutions in RFID, Wireless Security Networks (WSNs), and integrated RFID&WSN. Complete with several detailed case studies, this essential reference includes practical examples for intuitive understanding and necessary information to assist professionals, engineers, and researchers involved in the security of RFID and WSNs.

Wireless Mesh Networks (WMN) is a promising technology that will play an increasingly important role in the next generation wireless mobile networks. This volume provides an introduction to security issues, recent advances, and future directions. The book examines the emerging standards of security, addressing such topics as authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and protection, secure routing, security standards, security policy, and more. This text also presents numerous case studies as well as various applications.

Simula Research Laboratory, Norway

Security & Auditing

Catalog no. AU6839, ISBN: 978-1-4200-6839-9 March 2009, 7 x 10, 480 pp. Suggested Price: $99.95 / £60.99

102

Yan Zhang

Security in Sensor Networks Edited by

Honglin Hu

Catalog no. AU8250, ISBN: 978-0-8493-8250-5 January 2009, 6-1/8 x 9-1/4, 552 pp. Suggested Price: $89.95 / £49.99

Security of Mobile Communications Noureddine Boudriga

Yang Xiao

The University of Alabama, Tuscaloosa, USA

University of the 7th of November at Carthage, Tunisia

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks serves as an invaluable reference for researchers, educators, and practitioners in the field. With contributions from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks.

This innovative text provides comprehensive coverage of all of the various security issues that face the mobile communications industry. Discussions include hacking and infecting with viruses; techniques used to provide access control, authentication, and authorization; the security of SIM-like cards; standards implemented by the GSM, third generation, WLAN, and ad-hoc networks; the security of wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems; and the applications using IP mobility. Mobile communications scientists, students, engineers, and telecom service providers, will find this to be an invaluable resource.

Catalog no. AU7058, ISBN: 978-0-8493-7058-8 2007, 6-1/8 x 9-1/4, 341 pp. Suggested Price: $104.95 / £57.99

Catalog no. AU7941, ISBN: 978-0-8493-7941-3 May 2009, 6-1/8 x 9-1/4, 544 pp. Suggested Price: $99.95 / £60.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 102

12/19/08 10:26:14 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m The Security Risk Assessment Handbook A Complete Guide for Performing Security Risk Assessments Douglas J. Landoll

En Pointe Technologies, Austin, Texas, USA

Vulnerability Management New York, New York, USA

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations.

Vulnerability management proactively prevents the exploitation of IT security gaps and weaknesses that exist particularly within a larger organization. This book demonstrates how prevention can reduce the potential for exploitation and shows that it takes considerably less time and resources to manage potential weaknesses, than to clean up after a violation. Written by a leading expert in IT security, this volume provides guidance for creating a vulnerability management program in a large, globally distributed company. It covers areas often neglected or falsely appearing secure. The text includes checklists and details the activities that constitute successful management.

Catalog no. AU2998, ISBN: 978-0-8493-2998-2 2006, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $83.95 / £46.99

Catalog no. K10093, ISBN: 978-1-4398-0150-5 May 2009, 6-1/8 x 9-1/4, 600 pp. Suggested Price: $79.95 / £48.99

Security & Auditing

Park Foreman

Wireless Security and Cryptography Successful Strategies for Implementing ISO 27001 Micki Krause

Specifications and Implementations Edited by

103

Nicolas Sklavos

University of Patras, Greece

Xinmiao Zhang

Pacific Life Insurance Company, Newport Beach, California, USA

Case Western Reserve University, Cleveland, Ohio, USA

Today’s information security managers must deal with a myriad of legislation, regulation, and requirements. This book provides a perspective on the ISO 27001 security standard within the context of other security frameworks. It defines strategies, processes, and instructions for implementing a security program that complies with the ISO 27001 standard. Individual chapters cover why and how to implement a security management governance structure; why and how to develop, implement, and maintain security standards and procedures; how the security program encompasses tangential functions such as physical security; and how to prepare for organizational readiness for ISO 27001 certification.

This reference explores the latest technologies and applications needed to overcome security issues in wireless and handheld communications devices. While several books on the market cover similar topics, this handbook is unique in its dealing with specification and implementation aspects, including hardware design techniques. It provides broader coverage than many other books and covers recent research directions in the field. This book also proposes efficient and novel methods to implement security schemes in wireless protocols with high performance. It provides the state-of-the-art in implementation of wireless protocol security for current and future wireless communications.

Catalog no. AU7428, ISBN: 978-1-4200-7428-4 September 2009, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $79.95 / £48.99

Catalog no. 8771, ISBN: 978-0-8493-8771-5 2007, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $93.95 / £51.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 103

12/19/08 10:26:15 AM


For more information and a complete list

Security & Auditing / Certification & Accreditation 104

Building and Implementing a Security Certification and Accreditation Program

Official (ISC)2 Guide to the CAPCM CBK® Patrick D. Howard

Complete Guide to CISM® Certification

US Dept. of Housing & Urban Development, Washington, D.C., USA Series: (ISC)2 Press

Thomas R. Peltier and Justin Peltier

An officially sanctioned guide, this volume demonstrates the effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in public and private organizations. It provides security professionals with an overview of C&A components, enabling security professionals to learn how to secure systems via standard, repeatable processes. The book begins with a description of what it takes to build a C&A program and continues with an analysis of various C&A processes. The text then provides a case study of the successful C&A implementation in a major U.S. government department. It also offers a collection of samples in the appendices.

Complete Guide to CISM® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The authors explain each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

Catalog no. AU2062, ISBN: 978-0-8493-2062-0 2006, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $93.95 / £51.99

Catalog no. AU5356, ISBN: 978-0-8493-5356-7 2007, 6-1/8 x 9-1/4, 480 pp. Suggested Price: $83.95 / £46.99

The Complete Guide for CPP® Examination Preparation James P. Muuss, CPP

Reliant Protective Services Inc., Phoenix, Arizona, USA

David Rabern, CPP

Thomas R. Peltier Associates, LLC, Wyandotte, Michigan, USA

How to Achieve 27001 Certification

An Example of Applied Compliance Management Sigurjon Thor Arnason

Social Insurance Administration, Reykjavik, Iceland

Keith D. Willett

International Counterintelligence Services, Scottsdale, Arizona, USA

CTN Technologies, Millersville, Maryland, USA

The Complete Guide for CPP Examination Preparation provides a thorough foundation of security concepts and practices. This volume does more than impart the information required for you to pass the CPP exam, it also delivers insight into what taking the exam is like, and provides an appreciation for the work and knowledge needed to gain CPP certification. The book addresses security management, investigations, protection of sensitive information, substance abuse, physical security, personnel security, emergency planning, management of a guard force, legal aspects of security, and the role of a security professional as a liaison with both management and law enforcement.

Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an understanding of information security management standards and support for those implementing the ISO 17799 standard to pass an audit. This book provides questions and answers to determine information security strengths and weaknesses with respect to the standard. It presents detailed, step-by-step information to plan implementation and help an organization prepare for audit and certification. It also includes a questionnaire to assess readiness for an audit, with useful information on what the auditor wants to see.

Catalog no. 2896, ISBN: 978-0-8493-2896-1 2006, 6-1/8 x 9-1/4, 592 pp. Suggested Price: $83.95 / £46.99

Catalog no. AU3648, ISBN: 978-0-8493-3648-5 2008, 6-1/8 x 9-1/4, 352 pp. Suggested Price: $83.95 / £46.99

®

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 104

12/19/08 10:26:15 AM


Official (ISC)2 Guide to the CISSP® CBK®

Official (ISC)2 Guide to the SSCP® CBK®

Edited by

Harold F. Tipton Kevin Henry

(ISC)2 Institute, North Gower, Ontario, Canada

Diana-Lynn Contesti, Douglas Andre, Eric Waxvik, Paul A. Henry, Bonnie A. Goins

Series: (ISC)2 Press

Series: (ISC)2 Press

This officially sanctioned resource is the best and most up-to-date study guide available for those seeking CISSP certification. Offering a compendium of information security topics, the book is detailed enough to also serve as an authoritative resource for those executives or organizational managers seeking to maintain or improve security measures. The book is packaged with a CD-ROM, which includes sample exams simulating the actual exam, with the same number and types of questions, and the same allotment of time. It even grades the exam, provides correct answers, and identifies areas where more study is needed.

SSCP Certification is the key to unlocking the upper ranks of security implementation at the world’s most prestigious organizations. For anyone who is serious about becoming a leading tactician at the front lines, the (ISC)² Systems Security Certified Practitioner (SSCP®) Certification is an absolute necessity, demanded by cuttingedge companies worldwide now more than ever. Nowhere else are the seven domains of the CBK embodied more adeptly than in the Official (ISC)² Guide to the SSCP® CBK®. In a milestone effort by (ISC)², the world’s leading tacticians with hands-on experience in IT security acknowledge and explain the importance of the security implementation process.

HFT Associates, Villa Park, California, USA

Catalog no. AU8231, ISBN: 978-0-8493-8231-4 2007, 6-1/8 x 9-1/4, 1112 pp. Suggested Price: $73.95 / £40.99

Catalog no. AU2774, ISBN: 978-0-8493-2774-2 2007, 6-1/8 x 9-1/4, 608 pp. Suggested Price: $62.95 / £34.99

Official (ISC)2 Guide to the CISSP®ISSMP® CBK®

Official (ISC)2 Guide to the CISSP®-ISSEP® CBK®

James Litchko, Cheryl Hennell, Craig Wright, and Maura van der Linden

Susan Hansche, CISSP

Security & Auditing / Certification & Accreditation

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

105

PEC Solutions, Fairfax, Virginia, USA Series: (ISC)2 Press

Series: (ISC) Press 2

The Official (ISC)² Guide to the CISSP -ISSMP CBK provides an overview of management topics related to information security. This iteration provides for a more expanded enterprise model of security and management, one that delves into project management, risk management, and continuity planning. Preparing the professional for certification, as well as for job readiness, this resource promotes an understanding of what are now five ISSEP domains. These include Enterprise Security Management Practices, Enterprise-Wide System Development Security, Law, Investigations, Forensics and Ethics, Overseeing Compliance of Operations Security, and Business Continuity and Disaster Recovery Planning. ®

Catalog no. AU9443, ISBN: 978-1-4200-9443-5 May 2009, 6-1/8 x 9-1/4, 700 pp. Suggested Price: $79.95 / £48.99

®

®

The Official (ISC)2 Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created ISSEP Exam. The first fully comprehensive guide to the test, this book promotes understanding of the four ISSEP domains. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling readers to differentiate the correlation of security’s role in the design and development process. It also details key points of more than 50 U.S. government policies and procedures that must be understood in order to gain ISSEP certification. Catalog no. AU2341, ISBN: 978-0-8493-2341-6 2006, 6-1/8 x 9-1/4, 1024 pp. Suggested Price: $73.95 / £40.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 105

12/19/08 10:26:16 AM


For more information and a complete list

Security & Auditing / Computer Crime Investigation

Textbook

Computer Forensics Evidence Collection and Management Robert C. Newman

Georgia Southern University, Statesboro, USA

Presenting background information in computer and information systems and their use in the cyber environment, this book supplies the tools, procedures, and skills to collect and preserve electronic evidence of misuse whether it is from a network, an individual computer, a telephone system, or personal electronic device. More importantly, it covers the proper techniques and procedures for collecting and preserving computer evidence that will stand up in a court of law. The book includes checklists on how evidence should be handled and recommends policies for organizations to adopt to protect themselves from malfeasance. Catalog no. AU0561, ISBN: 978-0-8493-0561-0 2007, 6-1/8 x 9-1/4, 432 pp. Suggested Price: $83.95 / £46.99

Cyber Fraud

Tactics, Techniques and Procedures Rick Howard

Verisign iDefense Security Intelligence Serv, Dulles, Virginia, USA

Within the past four years, cyber crime has evolved from a minor nuisance to a major concern involving well-organized actors and highly sophisticated organizations. This volume explores the state of threats present in the cyber fraud underground. It discusses phishing/ pharming, trojans/toolkits, direct threats, and the emerging trend of pump-and-dump scams. By examining the operations of the cyber criminal, the book provides perspectives into the general incentives, risks, and behavioral patterns of the fraudsters. Armed with this information, organizations and individuals are better able to develop countermeasures and crafting tactics to disrupt the fraud underground and secure their systems. Catalog no. AU9127, ISBN: 978-1-4200-9127-4 April 2009, 7 x 10, 496 pp. Suggested Price: $79.95 / £48.99

Cyber Forensics

A Field Manual for Collecting, Examining, and Preserv106 ing Evidence of Computer Crimes, Second Edition Albert J. Marcella, Jr.

CISA Business Automation Consultants, LLC

Doug Menendez

CISA, Saint Louis, Missouri, USA

Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details the scope of cyber forensics to reveal and track legal and illegal activity. The authors provide step-bystep instructions through the basics of investigation and introduce the tools and procedures required to legally seize and forensically evaluate a suspect machine. The book covers rules of evidence, chain of custody, standard operating procedures, the manipulation of technology to conceal illegal activities, and how cyber forensics can uncover them. Extensive appendices include pertinent websites, organizations, and legislation. Catalog no. AU8328, ISBN: 978-0-8493-8328-1 2008, 7 x 10, 528 pp. Suggested Price: $73.95 / £40.99

Financial Investigation and Forensic Accounting Second Edition

George A. Manning

Consultant-Enrolled IRS Agent (Retired), Campbellton, Florida, USA

Written by an IRS agent with more than twenty years of experience, this book offers a thorough examination of current methods and legal concerns for the detection and prosecution of economic crimes. It guides the investigator through the process, from detection to indictment and conviction. It explains the mechanics of gambling, fraud, and money laundering, and illustrates how prosecutors present the tax codes, offshore banking laws, and the RICO statutes to judges and juries. Each chapter provides a summary along with applicable outlines. This updated edition provides additional focus on locating terrorist funds, related legislation, and computer fraud. Catalog no. 2223, ISBN: 978-0-8493-2223-5 2005, 7 x 10, 600 pp. Suggested Price: $124.95 / £69.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 106

12/19/08 10:26:17 AM


Forensic Computer Crime Investigation Edited by

Thomas A. Johnson

University of New Haven, Connecticut, USA

Malicious Bots

An Inside Look into the Cyber-Criminal Underground of the Internet Ken Dunham and Jim Melnick

Series: International Forensic Science and Investigation, 13

iSIGHT Partners, Dallas, Texas, USA

From describing the fundamentals of computer crimes and the scenes left in their wake to detailing how to build an effective forensic investigative force, this book is an essential guide on how to beat cyber criminals at their own game. It takes you into the minds of computer criminals, noting universal characteristics and behaviors; it discusses strategies and techniques common to successful investigations; and it reveals how to overcome challenges that may arise when securing digital forensic evidence. The book also contains a chapter devoted to investigating Internet crimes against children. Additional chapters include information on strategies unique to international forensics and cyber terrorism.

Originally designed to sabotage or annihilate websites, computerized “bots” are increasingly being used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, this volume provides a much needed resource for understanding the scope, sophistication, and criminal uses of bots and how to more proactively protect against them. Accessibly written, but with sufficient technical detail, the book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks over the last four years to reveal the who, how, and why behind them.

Catalog no. DK2950, ISBN: 978-0-8247-2435-1 2006, 6 x 9, 336 pp. Suggested Price: $124.95 / £69.99

Catalog no. AU6903, ISBN: 978-1-4200-6903-7 January 2009, 6-1/8 x 9-1/4, 168 pp. Suggested Price: $59.95 / £33.99

Insider Computer Fraud

An In-depth Framework for Detecting and Defending against Insider IT Attacks

Practical Hacking Techniques and Countermeasures

Kenneth Brancik

Mark D. Spivey

Information Security Consultant, New York, USA

Consultant, Tomball, Texas, USA

Employees often have easy access to sensitive information about a company and its customers, making them prime candidates to sabotage a system or to sell privileged information. Illustrated with practical case studies, this volume presents methods, safeguards and techniques for IT professionals to protect against insider computer fraud. Drawing from the author’s two decades experience in assessing the adequacy of IT security for the banking and securities industries, this book provides an understanding of application risks and controls, web-service security, and the identification and mitigation of fraud.

Practical Hacking Techniques and Countermeasures examines computer security from the hacker’s perspective, demonstrating how a security system can be designed and structured to repel an attack. It shows how an attack is conceptualized, formulated and performed. With the VMware® Workstation software package available on the accompanying CD-ROM, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. With examples of attacks on Windows and Linux, the author also covers such topics as footprinting, scanning, sniffing, passwords, and other attack tools. This text provides valuable information for constructing a system of defense.

Catalog no. AU4659, ISBN: 978-1-4200-4659-5 2008, 6-1/8 x 9-1/4, 504 pp. Suggested Price: $83.95 / £46.99

Security & Auditing / Computer Crime Investigation

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

107

Catalog no. AU7057, ISBN: 978-0-8493-7057-1 2007, 7 x 10, 752 pp. Suggested Price: $83.95 / £46.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 107

12/19/08 10:26:18 AM


For more information and a complete list Profiling Hackers

Software Engineering & Systems Development 108

The Science of Criminal Profiling as Applied to the World of Hacking Raoul Chiesa

Mediaservice.net, Italy

Stefania Ducci

Applied Software Product-Line Engineering Kyo C. Kang

POSTECH, Pohang, South Korea

United Nations Interregional Crime and Justice Research Institute, Turin, Italy

Vijayan Sugumaran

Silvio Ciappi

Sooyong Park

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory and focusing on the relationship between technology and crime, this volume offers insight into the hacking realm by telling attentiongrabbing tales about bizarre characters that practice hacking as an art. Applying the behavioral science of criminal profiling to the world of internet predators, the text addresses key issues such as the motivation behind hacking and whether it is possible to determine a hacker’s profile on the basis of his behavior or types of intrusion.

Greater competition is pressuring industries to improve efficiency through the use of Software Product Line (SPL), which in recent years has drastically increased the productivity of IT-related industries, with many more improvements possible. This handbook details various aspects of SPL implementation in different domains, while documenting best practices with regard to system development. Expert contributors from academia and industry come together to focus on core asset development, product development, and management, addressing the process, technical, and organizational issues needed to meet the demand for information in what is becoming a global paradigm shift.

University of Pisa, Italy

Catalog no. AU8693, ISBN: 978-1-4200-8693-5 January 2009, 6-1/8 x 9-1/4, 279 pp., Soft Cover Suggested Price: $49.95 / £27.99

Wireless Crime and Forensic Investigation

Oakland University, Rochester, Michigan, USA Sogang University, Seoul, South Korea

Catalog no. AU6841, ISBN: 978-1-4200-6841-2 July 2009, 6-1/8 x 9-1/4, 416 pp. Suggested Price: $89.95 / £54.99

Applied Software Risk Management A Guide for Software Project Managers

Gregory Kipper

C. Ravindranath Pandian

From short text messaging to investigating war, this book explores all aspects of wireless technology, including how it is used in daily life and how it might be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and the forensic investigation techniques that are used for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques, and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, is self-contained for quick comprehension.

Few software projects are completed on time, on budget, and to their original specification. Research supports that projects usually fail due to management, rather than technical mistakes. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, this volume covers key components of the risk management process, current processes, and best practices for software risk identification, risk planning, and techniques of risk analysis. The book brings together concepts across software engineering with a project management perspective, presenting examples of the scientific method in risk perception, analysis, and resolution.

Computer Security Innovations, Herndon, Virginia, USA

Catalog no. AU3188, ISBN: 978-0-8493-3188-6 2007, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $83.95 / £46.99

Quality Improvements Consultants, Hyderabad, India

Catalog no. AU0524, ISBN: 978-0-8493-0524-5 2007, 6-1/8 x 9-1/4, 264 pp. Suggested Price: $93.95 / £51.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 108

12/19/08 10:26:18 AM


Architecting Secure Software Systems Asoke K. Talukder

SRIT House, Kundalahalli, Bangalore, India

Manish Chaitanya

The Art of Software Modeling Benjamin A. Lieberman

Irving, Texas, USA

BioLogic Software Consulting, Littleton, Colorado, USA

This volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they explore the security of telecommunications and other distributed services through Service Oriented Architecture (SOA). The book employs a versatile multi-platform approach which allows users to seamlessly integrate the material into their own programming paradigm regardless of their individual programming backgrounds. The text also provides real-world code snippets for experimentation.

Using a multidisciplinary approach, The Art of Software Modeling covers model theory, practice, and presentation in detail. This book describes the driving need for model creation and demonstrates how to create system models. Presenting model examples of business workflows, requirements capture, and software architecture documentation, the text discusses research and information capture, model forms, and verification. Model information, consideration of perception and cognition of diagrams, model view composition, color theory, and presentation techniques are also included to illustrate the presentation. Each section is independent to allow readers to customize the text to their needs.

Catalog no. AU7843, ISBN: 978-1-4200-8784-0 January 2009, 7 x 10, 446 pp. Suggested Price: $59.95 / £33.99

Catalog no. AU4462, ISBN: 978-1-4200-4462-1 2007, 6-1/8 x 9-1/4, 296 pp. Suggested Price: $78.95 / £43.99

Architecting Software Intensive Systems

Building Software

A Practitioners Guide Anthony J. Lattanze

Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

Software Engineering & Systems Development

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

109

A Practitioner’s Guide

Nikhilesh Krishnamurthy and Amitabh Saran Los Gatos, California, USA

Series: Applied Software Engineering Series

Focusing on the architecture centric design method (ACDM), this book provides deep insight into designing software architectures for systems and explains ways to effectively use architectural design artifacts once created. The text describes how to integrate ACDM with existing organizational structures and processes, and demonstrates how to tailor defined software process frameworks and methodologies to ACDM in order to design the architecture for a software intensive system. The chapters offer practical guidelines for the general iterative model, the general waterfall model, the rational unified process, the team software process, scrum, and extreme programming.

Providing a framework to guide software professionals through the many aspects of development, Building Software: A Practitioner’s Guide shows how to master systems development and manage many of the soft and technical skills that are crucial to the successful delivery of systems and software. It encourages tapping into a wealth of cross-domain and legacy solutions to overcome common problems, such as confusion about requirements and issues of quality, schedule, communication, and people management. The book offers insight into the inner workings of software reliability along with sound advice on ensuring that it meets customer and organizational needs.

Catalog no. AU4569, ISBN: 978-1-4200-4569-7 January 2009, 7 x 10, 416 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU7303, ISBN: 978-0-8493-7303-9 2008, 6-1/8 x 9-1/4, 384 pp. Suggested Price: $83.95 / £46.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 109

12/19/08 10:26:19 AM


For more information and a complete list

Software Engineering & Systems Development 110

CAD and GIS Integration Hassan A. Karimi

University of Pittsburgh, Pennsylvania, USA

Burcu Akinci

The Debugger’s Handbook

Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

J.F. DiMarzio

Problem solving through CAD and GIS requires a proper integration of these systems for efficient and effective processing of data and operations. Currently, there is no single book that covers the breadth and depth of CAD/GIS integration issues and solutions. This book provides in-depth descriptions of existing and emerging methodologies, techniques, and technologies for integrating CAD and GIS and includes example applications requiring efficient and effective solutions through proper CAD/GIS integration. The text delineates the technical aspects of integrating CAD/GIS, helping readers learn concepts and techniques to analyze, design, and implement projects ranging from the simple to the complex.

Focused on the best practices for writing code as well as on the methods to perform more effective debugging, The Debugger’s Handbook promotes a natural debugging approach to writing code. The author begins by examining and defining a bug, the circumstances favorable to producing bugs, and the methods of averting them from the start. The book does not emphasize techniques for a specific programming language but offers guidance on the basic philosophies and practices that can minimize the appearance of bugs in any language. Extensive use of examples– with sample code given in VB, VB .NET, C++, and Java– reinforce a practical understanding of the concepts and offer ample opportunity to put them to use.

Catalog no. AU6805, ISBN: 978-1-4200-6805-4 June 2009, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $89.95 / £54.99

Wesley Chapel, Florida, USA

Catalog no. AU8034, ISBN: 978-0-8493-8034-1 2007, 6-1/8 x 9-1/4, 458 pp. Suggested Price: $88.95 / £49.99

Delivering Successful Projects with TSPSM and Six Sigma Data Flow Analysis Theory and Practice

Uday Khedker, Amitabha Sanyal, and Bageshri Karkare IIT Bombay, Mumbai, India

A Practical Guide to Implementing Team Software ProcessSM Mukesh Jain

Microsoft, Bellevue, Washington, USA

This work provides an in-depth treatment of data flow analysis technique. Reviewing inter-procedural analysis and incremental flow analysis, this book is the first to extend detailed coverage of data flow analysis beyond bit vectors. Supplemented by numerous case studies and examples, this text equips readers with a combination of mutually supportive theory and practice. It examines mathematical functions and includes studies of data flow analysis implantations through use of the GNU Compiler Collection. Readers can experiment with the analyses described in the book by accessing the author’s web page where they will find OPTEX (Optimization Explorer) software and source code.

Mukesh Jain of Microsoft details how TSP techniques can be followed to plan the right project, take the right steps, and get the right results, every time. The author shares real-world experience through his implementation of TSP at Microsoft India and documents how the TSP teams delivered high quality software on schedule and within budget. Through this case study, he examines how teams improved the software development process by combining TSP with Six Sigma. This combination delivered significant benefits in predictability and dramatically increased the number of zero-defect projects. The book also explores common pitfalls to avoid while implementing TSP and the coaching of TSP teams.

Catalog no. 2880, ISBN: 978-0-8493-2880-0 March 2009, 6-1/8 x 9-1/4, 395 pp. Suggested Price: $99.95 / £60.99

Catalog no. AU6143, ISBN: 978-1-4200-6143-7 January 2009, 6-1/8 x 9-1/4, 280 pp. Suggested Price: $79.95 / £44.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 110

12/19/08 10:26:20 AM


Effective Software Maintenance and Evolution

Essential Software Testing

Stanislaw Jarzabek

Greg Fournier

With software maintenance costs averaging 50% of total computing costs, it is necessary to have an effective maintenance program in place. Aging legacy systems pose an especially rough challenge as veteran programmers retire and their successors are left to figure out how the systems operate. This volume explores program analyzers, reverse engineering tools, and reengineering tools in-depth and explains the best ways to deploy them. It also discusses using XMLbased tools, the roles of software components, object technology, and metaprogramming in improving systems maintenance, as well as how to align software with business goals through strategic maintenance.

With the help of Use-Case-driven techniques that are appropriate for any software development project, this manual communicates a realistic approach to software testing that gets the job done in an efficient manner. Covering basic testing concepts and employing a hands-on approach, the book shows how to determine what to test, how to select the proper tests, and how to properly perform the actual tests. It also discusses techniques for building and tracing tests, and demonstrates how to conduct and record results. The methods presented in this handbook are equally accessible to testers, software managers, and developers.

A Reuse-Based Approach National University of Singapore

A Use-Case Approach

Enlighten Solutions, Colorado Springs, USA

Catalog no. AU3592, ISBN: 978-0-8493-3592-1 2007, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $83.95 / £46.99

Embedded Linux System Design and Development P. Raghavan

Philips Innovation Campus, Bangalore, India

Amol Lad and Sriram Neelakandan

Catalog no. AU9811, ISBN: 978-1-4200-8981-3 January 2009, 7 x 10, Soft Cover Suggested Price: $59.95 / £33.99

Global Software Development Handbook

Software Engineering & Systems Development

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

111

Raghvinder Sangwan, Matthew Bass, Neel Mullick, Daniel J. Paulish, and Juergen Kazmeier Siemens, Princeton, New Jersey, USA

Verismo Networks, Bangalore, India

Series: Applied Software Engineering Series, 3

Containing a full development roadmap for embedded Linux systems, this book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. The authors deliver practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It explores MTD model for flash based embedded storage, realtime programming, various drivers, uClinux architecture, and the embedded Linux graphics subsystem. The book also offers tips on how to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications.

Offering a unique perspective on global agility, this handbook describes the convergence of two movements– globally distributed and agile software development. The book explores techniques that can bridge distances, create cohesion, promote quality, and strengthen lines of communication. The authors delineate an organizational structure that not only fosters team building, but also achieves effective collaboration among the central and satellite teams. They explore the issues surrounding quality and the processes required to realize quality in a distributed environment. This authoritative work elucidates how to effectively manage communication among geographically distributed teams.

Catalog no. AU0586, ISBN: 978-0-8493-4058-1 2006, 7 x 10, 432 pp. Suggested Price: $73.95 / £40.99

Catalog no. AU9384, ISBN: 978-0-8493-9384-6 2007, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $83.95 / £46.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 111

12/19/08 10:26:20 AM


For more information and a complete list

Software Engineering & Systems Development 112

Interpreting the CMMI® Grid Application Systems Design April J. Wells

Oracle, Austin, Texas, USA

Grid Application Systems Design discusses the considerations for this new concept in applications design. Beginning with the history and theory of Grid computing, the book examines Grid design issues and the highly distributed computing model. It explains applications design issues concerning high capacity bandwidth, multiple interconnection requirements for end users, and the redirection of connections into the different components of a system. This book combines a solid technical examination with an overview of the business issues involved in implementing and using Grid database technology. Catalog no. AU2997, ISBN: 978-0-8493-2997-5 2008, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $83.95 / £46.99

Handbook of Mobile Middleware

A Process Improvement Approach, Second Edition Margaret K. Kulpa and Kent A. Johnson

Agiledigm, Inc., Ormond Beach, Florida, USA

Taking a broad approach that speaks to experienced and inexperienced process improvement practitioners, CMMI experts and CMMI novices, this second edition examines the latest version of the CMMI. Divided into six sections, the text first clarifies the concept of process improvement, makes the case for how and why to employ CMMI, and outlines its structure. It then provides an overview of the process areas, supported by real-world display tables, templates, and charts designed to aid organizations in their improvement efforts. Subsequent sections address measurement issues including basic metrics, statistical process control, and high maturity concerns, as well as SCAMPISM appraisal types. Catalog no. AU6052, ISBN: 978-1-4200-6052-2 2008, 6-1/8 x 9-1/4, 424 pp. Suggested Price: $69.95 / £38.99

Edited by

Manage Software Testing

Paolo Bellavista and Antonio Corradi

Peter Farrell-Vinay

The Handbook of Mobile Middleware provides an overview of developments in the various fields related to how software supports mobile computing. Authored by internationally recognized experts, it integrates the valuable insight gained from actual deployments into a full compendium. It presents mobile middleware motivations, requirements, and technologies, and offers a taxonomy of solutions organized on the basis of their goals: mobility/disconnection handling; location-based support; and context-based support. The book focuses on the application domains in which mobile middleware has demonstrated its feasibility and effectiveness, detailing the pros, cons, and trade-offs of these emerging solutions.

Showing test managers what to focus on strategically, tactically, and operationally, this book provides a comprehensive guide to all aspects of test management for those inheriting or starting a test team. It covers unit, system, and non-functional tests with examples on how to estimate the number of bugs expected to be found, the time required for testing, and the date when a release is ready. Using a risk-based approach, the author addresses a range of questions about a software product under development. This text shows test managers how to develop a basis to assess software team processes and achievements, and guides them through the business and organizational issues that they confront.

Catalog no. AU3833, ISBN: 978-0-8493-3833-5 2007, 6-1/8 x 9-1/4, 1377 pp. Suggested Price: $144.95 / £79.99

Catalog no. AU9383, ISBN: 978-0-8493-9383-9 2008, 7 x 10, 600 pp. Suggested Price: $99.95 / £55.99

DEIS, University of Bologna, Italy

Surrey, UK

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 112

12/19/08 10:26:21 AM


Managing Global Development Risk

Modeling Software with Finite State Machines A Practical Approach

James M. Hussey and Steven E. Hall

Ferdinand Wagner, Ruedi Schmuki, Thomas Wagner, and Peter Wolstenholme

Over the past several years, there has been increasing concern over the growth of offshore outsourcing. The challenge now lies in how to embrace this inevitable trend in order to address issues of global development. This book provides the tools, techniques, and knowledge necessary to achieve project success with offshore resources. This comprehensive text discusses initiating, planning, executing, controlling, and closing global development projects. In addition, it explores offshore trends as well as the emergence of global development managers. The book also includes an accompanying CD-ROM with project templates.

Modeling Software with Finite State Machines: A Practical Approach explains how to apply finite state machines to software development. It provides a critical analysis of using finite state machines as a foundation for executable specifications to reduce software development effort and improve quality. It discusses the designs of state machines and systems of state machines. It also presents a detailed analysis of development issues relating to behavior modeling with design examples and design rules for using finite state machines. This text demonstrates the implementation of these concepts using StateWORKS software and introduces the basic components of this software.

Technology Partners International Inc., Lakewood, Colorado, USA

Catalog no. AU5520, ISBN: 978-1-4200-5520-7 2008, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $73.95 / £40.99

The Method Framework for Engineering System Architectures Donald G. Firesmith with Peter Capell, Dietrich Falkenthal, Charles B. Hammons, DeWitt T. Latimer IV, and Tom Merendino

Catalog no. AU8086, ISBN: 978-0-8493-8086-0 2006, 6-1/8 x 9-1/4, 392 pp. Suggested Price: $97.95 / £54.99

Patterns for Performance and Operability

Software Engineering & Systems Development

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

113

Building and Testing Enterprise Software

Chris Ford, Ido Gileadi, Sanjiv Purba, and Mike Moerman

Offering a practical way to generate effective and efficient projectspecific system architecture engineering methods, this volume addresses the entire range of systems architecture including hardware, software, subsystems, and systems of systems. It defines a set of architectural roles and teams and provides a repository of reusable architectural engineering process components to develop high-quality system architectures. It examines a cohesive set of tailorable tasks and components steps for producing associated architectural work products and establishes a recommended set of industry best practices for engineering the architecture of softwareintensive systems.

Applications that work perfectly in controlled settings often fail in production environments, impacting business operations. This book explores a frequently overlooked aspect of software development: non-functional design and testing. In the real world, hostile production conditions and changing business usage can lead to unforeseen downtime or unacceptable system performance. Written by technologists and based on real field experience, the book examines common failure scenarios, defensive design patterns, and effective performance strategies. It illustrates approaches to planning and executing comprehensive testing to ensure compliance with critical non-functional requirements.

Catalog no. AU8575, ISBN: 978-1-4200-8575-4 January 2009, 7 x 10, 512 pp. Suggested Price: $79.95 / £44.99

Catalog no. AU5334, ISBN: 978-1-4200-5334-0 2008, 6-1/8 x 9-1/4, 344 pp. Suggested Price: $73.95 / £40.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 113

12/19/08 10:26:22 AM


For more information and a complete list

Software Engineering & Systems Development

Process Improvement with CMMI® v1.2 and ISO Standards Boris Mutafelija

Fairfax, Virginia, USA

Harvey Stromberg

Rockville, Maryland, USA

In this age of globalization, it is important for process improvement practitioners to be able to comprehend and work with the different standards and frameworks used around the world. This volume assists users in becoming more versatile using multiple process standards when creating their organizational and project processes. The book examines the structure and content of Capability Maturity Model IntegrationSM, version 1.2. It then provides summaries of several ISO standards, and discusses the detailed relationships between four specific ISO standards and CMMI®. It also introduces process mapping and illustrates how mappings can be used to advantage when comparing different frameworks. Catalog no. AU5283, ISBN: 978-1-4200-5283-1 January 2009, 6-1/8 x 9-1/4, 406 pp. Suggested Price: $69.95 / £38.99

Security Software Development

Assessing and Managing Security Risks Douglas A. Ashbaugh, CISSP

Software Engineering Services, West Des Moines, Iowa, USA

Examining current problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development life cycle using a test case based on the author’s personal experience in software development. The book covers methods used to assess risk, discussing the pros and cons of each method. Readers are then guided through each step of the process. The book concludes with discussions of how to sustain a risk assessment and risk management process within an organization. Catalog no. AU6380, ISBN: 978-1-4200-6380-6 January 2009, 6-1/8 x 9-1/4, 321 pp. Suggested Price: $79.95 / £44.99

Textbook

114

Requirements Engineering for Software and Systems Phillip A. Laplante Series: Applied Software Engineering Series, 4

Service Oriented Enterprises Setrag Khoshafian

Pegasystems Inc, Cambridge, Massachusetts, USA

A review of the state of the technology, this book explores developments in intelligent systems and soft computing techniques and their application in diverse areas within manufacturing. Topics include advanced production machines and systems, collaborative and responsive manufacturing systems, digital and e-manufacturing, and virtual enterprises. The book also reviews fit manufacturing, human machine interfaces, innovative design technologies, and intelligent and competitive manufacturing. Additionally, it covers intelligent planning and scheduling systems, mechatronics and MEMS, micro and nano manufacturing, production automation and control, robotics, and reconfigurable and sustainable manufacturing systems.

This comprehensive text covers all the components, issues, standards, and technologies that create a service-oriented enterprise. Filled with real-world examples, it offers innovative and practical service-oriented solutions. Its framework for aligning services with business goals empowers IT executives to make the right decisions about deploying service-oriented applications, architectures, and platforms. Software professionals are guided through each step of the service-oriented development process from analysis and design to content and portal integration and service management. The book also focuses on business processes and rules in the context of Web services and service-oriented computing.

Catalog no. AU6467, ISBN: 978-1-4200-6467-4 March 2009, 6-1/8 x 9-1/4, 272 pp. Suggested Price: $89.95 / £54.99

Catalog no. AU5360, ISBN: 978-0-8493-5360-4 2007, 6-1/8 x 9-1/4, 464 pp. Suggested Price: $83.95 / £46.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 114

12/19/08 10:26:22 AM


Service-Oriented Architecture

SOA Strategy, Methodology, and Technology

Software Engineering Foundations

James Lawler

Pace University, New York, New York, USA

A Software Science Perspective

H. Howell-Barber

Yingxu Wang

University of Calgary, Alberta, Canada

Principal Consultant - HBink, Riverdale, New York, USA

Firms are aggressively beginning to design, develop, and implement advanced and complex Web service systems. This volume guides readers through the business strategies, methodologies, and technologies used to successfully plan and deploy Web services. Interdepartmental case studies illustrate business dimensions, technological dimensions, and methodological principles as well as key critical factors for successful implementation of service-oriented projects. Based on the authors’ practical experience, the book describes the best practices and provides insightful tips for using this competitive-edge technology to improve business operations. Catalog no. AU4500, ISBN: 978-1-4200-4500-0 2008, 6-1/8 x 9-1/4, 288 pp. Suggested Price: $73.95 / £40.99

Six Sigma Software Development Second Edition

Series: Software Engineering Series

Covering the theoretical and empirical foundations of software engineering, this book integrates the latest research, methodologies, and their applications. Based on the author’s 30 years of experience, it examines a wide range of underlying theories from philosophy, cognitive informatics, denotational mathematics, system science, organization laws, and engineering economics. Written for all levels of readership, the book contains in-depth information, annotated references, real-world problems, and heuristics. Comprehensive in scope, this volume delineates an overarching, durable, and transdisciplinary theoretical framework as well as alternative solutions and open issues for further research. Catalog no. AU1931, ISBN: 978-0-8493-1931-0 2008, 6-1/8 x 9-1/4, 1488 pp. Suggested Price: $134.95 / £74.99

Software Solutions for Engineers and Scientists

Software Engineering & Systems Development

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

115

Julio Sanchez

Minnesota State University, Mankato, USA

Christine B. Tayntor

Maria P. Canton

Independent Consultant, Cheyenne, Wyoming, USA

South Central College, North Mankato, Minnesota, USA

Revised and updated, this second edition clearly explains Six Sigma concepts and their application, maps Six Sigma concepts and tools to all aspects of system development, and proposes the use of Six Sigma tools to evaluate and improve the overall performance of the IT department. In addition to classic Six Sigma, the book introduces Design for Six Sigma (DFSS) and illustrates when and how its tools and techniques can be used to increase the robustness and reliability of a new system. It also shows how the judicious application of lean tools can reduce the complexity of IT processes.

Engineers and scientists often need to develop software to suit their particular needs, but they do not always have the advanced programming skills that are required to do so. Serving as a comprehensive problem-solving resource, Software Solutions for Engineers and Scientists provides development tools and practical shortcuts for professionals who already have basic programming skills but may lack the knowledge needed to perform sophisticated tasks and difficult mathematic calculations. This book includes mathematical-computation intensive code along with programming techniques that are compatible with both Visual C++ console applications as well as Windows program applications.

Catalog no. AU4426, ISBN: 978-1-4200-4426-3 2007, 6-1/8 x 9-1/4, 488 pp., Soft Cover Suggested Price: $67.95 / £37.99

Catalog no. 43021, ISBN: 978-1-4200-4302-0 2008, 7 x 10, 944 pp. Suggested Price: $104.95 / £57.99

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 115

12/19/08 10:26:23 AM


For more information and a complete list

Textbook

Software Engineering & Systems Development 116

Software Testing

A Craftsman’s Approach, Third Edition Paul C. Jorgensen

Testing Code Security

Grand Valley State University, Allendale, Michigan, USA

Maura A. van der Linden

A bestseller in its first two editions, Software Testing: A Craftsman’s Approach, Third Edition has been thoroughly revised and updated to highlight issues such as how Agile and XP development environments have radically changed the role of software testers by making testing integral to every phase of the development process. Coverage also includes model-based and test-driven development, reexamination of all-pairs testing, and explanation of the four contexts of software testing. The author provides new downloadable programs that demonstrate white-box, black-box and other fundamental types testing. This text continues to serve as a valuable reference for software testers, developers, and engineers.

Written in simple terms, this is a resource designed to teach testers the essential software security concepts needed to conduct effective tests. Offering real life examples, it considers foundation concepts, processes and techniques in security testing, security test planning, threat-modeling, and specific root vulnerability problems and how to test for them. It also includes a collection of background overviews on related topics to fill common knowledge gaps. With cases illustrating the most common classes of security vulnerabilities, the book is for all testers working in any environment, and gives extra insight to threats particular to Microsoft Windows® platforms.

Catalog no. AU7475, ISBN: 978-0-8493-7475-3 2008, 7 x 10, 440 pp. Suggested Price: $99.95 / £55.99

Software Testing and Continuous Quality Improvement Third Edition

Microsoft, Snohomish, Washington, USA

Catalog no. AU9251, ISBN: 978-0-8493-9251-1 2007, 6-1/8 x 9-1/4, 328 pp. Suggested Price: $83.95 / £46.99

User Interface Software

Principles and Technologies Manuel Perez-Quinones, Pardha Pyla, and Manas Tungare

William E. Lewis

Virginia Tech, Blacksburg, Virginia, USA

President and CEO, Smartware Technologies Inc., Plano, Texas, USA

Series: Chapman & Hall/CRC Textbooks in Computing

The third edition of this bestseller provides a comprehensive look at software testing as part of the project management process, emphasizing testing and quality goals early on in development. Building on the success of previous editions, the text explains how compliance testing helps an IT organization meet Sarbanes-Oxley and Basel II requirements. The sections on test effort estimation are fully updated, providing greater emphasis on testing metrics. New chapters address process, application, and organizational metrics. The book also examines all aspects of functional testing and looks at the relation between changing business strategies and changes to applications in development.

A timely contribution for those involved with human-computer interaction, this text explains how to build interactive software by applying principles from the fields of human-computer interaction, psychology, and software engineering. The primary focus of the book is on how to build interactive software, with a secondary emphasis on what makes systems easy to use. The book uses several different styles of user interfaces (desktop, mobile, web) to illustrate the principles behind building interactive software, and employs several languages and technologies throughout. New technologies, such as mashups and RSS feeds are included, along with social software principles.

Catalog no. AU0733, ISBN: 978-1-4200-8073-5 January 2009, 6-1/8 x 9-1/4, 712 pp. Suggested Price: $79.95 / £44.99

Catalog no. C8252, ISBN: 978-1-4200-8252-4 June 2009, 6-1/8 x 9-1/4, 300 pp. Suggested Price: $79.95 / £48.99

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 116

12/19/08 10:26:24 AM


VMware ESX Essentials in the Virtual Data Center David Marshall

Hyper9, Austin, Texas, USA

Stephen S. Beaver

Florida Hospital, Altamonte, USA

Jason W. McCarty

Equifax, Baton Rouge, Louisiana, USA

Based on actual experiences with implementing and managing large scale projects and environments, this book emphasizes the design, implementation, and management of a VMware ESX server, offering technical and consultative points of view. Providing practical guides and examples, the chapter organization focuses first on introducing a concept and background for that concept, before providing a realworld scenario on which the planning and implementation example is based. Finally, for more technical readers, the book includes advanced topics and additional resources. It covers the two most popular current releases of 2.5 and 3.0, as well the upcoming 3.1 release. Catalog no. AU7027, ISBN: 978-1-4200-7027-9 January 2009, 6-1/8 x 9-1/4, 256 pp. Suggested Price: $59.95 / £33.99

What Every Engineer Should Know about Software Engineering

Software Engineering & Systems Development

o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

117

Phillip A. Laplante

The Pennsylvania State University, Malvern, USA Series: What Every Engineer Should Know

Although software engineering is an established discipline, many practicing software engineers have little or no formal education. Moreover, the ever-morphing, multidimensional nature of the field creates challenges for practitioners. This volume provides the knowledge and tools to help engineers and students understand the profession of software engineering, and ultimately lower software development and maintenance costs. Written in a question and answer format, this authoritative guide presents most major programming languages, development approaches, and paradigms. It also details the designing and building of software, and covers software quality assurance. Catalog no. 7228, ISBN: 978-0-8493-7228-5 2007, 6-1/8 x 9-1/4, 328 pp., Soft Cover Suggested Price: $52.95 / £29.99 Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 117

12/19/08 10:26:24 AM


For more information and a complete list 2-D Electromagnetic Simulation of Passive Microstrip Circuits...............................................................................82 The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure...............................................19 802.1X Port-Based Authentication....................................94

A

Title Index 118

Access Control, Security and Trust: A Logical Approach...94 Active and Programmable Networks for Adaptive Architectures and Services.................................................82 Adaptation and Cross Layer Design in Wireless Networks.............................................................................82 Adaptation in Wireless Communications 2 Volume Set......................................................................82 Advanced Server Virtualization: VMware and Microsoft Platforms in the Virtual Data Center................................83 Advances in Network Management...................................83 Advances in Semantic Media Adaptation and Personalization, Volume 2................................................63 Adversarial Reasoning: Computational Approaches to Reading the Opponent’s Mind...........................................57 Algorithmic Combinatorics on Partial Words...................46 Algorithmic Cryptanalysis.................................................36 Algorithms in Bioinformatics: A Pratical Introduction....12 An Integrated Introduction to Computer Graphics and Geometric Modeling..........................................................33 An Introduction to Cryptography, Second Edition............39 An Introduction to Neural Networks.................................61 An Introduction to Systems Biology: Design Principles of Biological Circuits............................16 Analog and VSLI Circuits...................................................26 Applications of Abstract Algebra with Maple and MATLAB®, Second Edition...............................................36 Applications of Cognitive Work Analysis...........................51 Applications of Group Theory to Combinatorics .............47 Applied Algebra: Codes, Ciphers and Discrete Algorithms, Second Edition...............................................36 Applied Combinatorics, Second Edition............................47 Applied Genetic Programming and Machine Learning.............................................................................66 Applied Software Product-Line Engineering...................108 Applied Software Risk Management: A Guide for Software Project Managers...........................108 Architecting Secure Software Systems.............................109 Architecting Software Intensive Systems: A Practitioners Guide.......................................................109 The Art of Software Modeling..........................................109 The Art of Systems Architecting, Third Edition.................71 Artificial Intelligence with Uncertainty.............................57 Assessing and Managing Security Risk in IT Systems: A Structured Methodology.................................................94 Automated Data Analysis Using Excel...............................40 Automated Taxon Identification in Systematics: Theory, Approaches and Applications...............................40 Automotive Embedded Systems Handbook.......................31 Autonomic Computing: Concepts, Infrastructure, and Applications.......................................................................19 Autonomous Mobile Robots: Sensing, Control, Decision Making and Applications...................................................58

B Bayesian Artificial Intelligence.........................................58 Best Practices in Business Technology Management.......74 Bio-inspired Computing and Communication Networks.............................................................................83

Bio-inspired Flying Robots: Experimental Synthesis of Autonomous Indoor Flyers................................................58 Biodiversity Databases: Techniques, Politics, and Applications.......................................................................41 Bioinformatics Basics: Applications in Biological Science and Medicine........................................................12 Biological Data Mining.....................................................41 Biosignal and Medical Image Processing.........................53 Blind Image Deconvolution: Theory and Applications......3 Broadband Mobile Multimedia: Techniques and Applications.......................................................................83 Building a Project Work Breakdown Structure: Visualizing Objectives, Deliverables, Activities, and Schedules............75 Building an Effective Information Security Policy Architecture........................................................................94 Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAPcm CBK®......................104 Building and Maintaining a Data Warehouse..................72 Building Software: A Practitioner’s Guide.......................109 Building Trustworthy Semantic Webs...............................63 Business Intelligence for Telecommunications................75 Business Strategies for the Next-Generation Network......84 The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results................................75

C C++ for Mathematicians: An Introduction for Students and Professionals................................................68 CAD and GIS Integration.................................................110 Carrier Ethernet: Providing the Need for Speed................84 Chemical Information Mining: Facilitating Literature-Based Discovery................................................41 Chromatic Graph Theory..................................................47 The Circuits and Filters Handbook, Third Edition (Six Volume Slipcase Set).................................................26 CISO Leadership: Essential Principles for Success............75 CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives...76 Classical Fortran: Programming for Engineering and Scientific Applications, Second Edition.............................68 Codes: The Guide to Secrecy From Ancient to Modern Times..................................................................................37 Coding Theory and Cryptography: The Essentials, Second Edition.........................................37 Color Image Processing: Methods and Applications........54 A Combinatorial Approach to Matrix Theory and Its Applications.......................................................................47 Combinatorial Methods with Computer Applications......48 Combinatorial Pattern Matching Algorithms in Computational Biology using Perl and R.........................12 Comparative Genomics: Basic and Applied Research......13 The Compiler Design Handbook: Optimizations and Machine Code Generation, Second Edition......................20 The Complete Guide for CPP® Examination Preparation......................................................................104 Complete Guide to CISM® Certification..........................104 Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI...........................................................95 The Complete Project Management Methodology and Toolkit................................................................................76 The Complete Project Management Office Handbook, Second Edition...................................................................76

Comprehensive Glossary of Telecom Abbreviations and Acronyms...........................................................................84 Computation and Visualization for Understanding Dynamics in Geographic Domains: A Research Agenda.............................................................32 Computational Intelligence in Medical Imaging: Techniques and Applications.............................................32 Computational Methods of Feature Selection...................41 Computational Modelling of Objects Represented in Images: Fundamentals, Methods and Applications ........32 Computational Protein-Protein Interactions...................13 Computational Quantum Mechanics for Nuclear Physics.................................................................................9 Computational Statistics Handbook with MATLAB®, Second Edition.....................................................................9 Computational Statistics: An Introduction to R.................9 Computer Aided Design and Design Automation.............26 Computer Arithmetic: Systems Simulation Using Simulink, Stateflow, and HDLs..........................................20 The Computer Engineering Handbook, Second Edition - 2 Volume Set..........................................20 Computer Forensics: Evidence Collection and Management....................................................................106 Computer Imaging: Digital Image Analysis and Processing..........................................................................54 Computer Network Time Synchronization: The Network Time Protocol...............................................20 Computer Organization, Design, and Architecture, Fourth Edition...................................................................71 Computer Science Handbook, Second Edition.................35 Computer System Security: Basic Concepts and Solved Exercises...............................................................................3 Computing for Fundamental Physics: A Critical Look at 30 Years of Computing in High-energy Physics..................9 Conceptual Structures in Practice.....................................66 A Concise Introduction to Image Processing using C++.........................................................................53 Constrained Clustering: Advances in Algorithms, Theory, and Applications...................................................42 Contemporary Coding Techniques and Applications for Mobile Communications...................................................21 Context-Aware Computing and Self-Managing Systems...............................................................................10 Context-Aware Pervasive Systems: Architectures for a New Breed of Applications...................21 Control of Digital Imaging Systems: Analysis and Design...........................................................54 Converging NGN Wireline and Mobile 3G Networks with IMS.............................................................84 CRC Handbook of Modern Telecommunications, Second Edition...................................................................85 Creating Spatial Information Infrastructures: Towards the Spatial Semantic Web...................................63 Critical Infrastructure: Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies..............................................................95 Cryptanalysis of Number Theoretic Ciphers.....................37 Cryptanalysis of RSA and Its Variants...............................37 Cryptography: Theory and Practice, Third Edition..........38 Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition..................................106 Cyber Fraud: Tactics, Techniques and Procedures.........106 Cybersins and Digital Good Deeds: A Book About Technology and Ethics......................................................63

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 118

12/19/08 10:26:24 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Data Analysis Tools for DNA Microarrays..........................13 Data Flow Analysis: Theory and Practice........................110 Data Mining for Design and Marketing............................42 Data Mining for Global Trends in Mountain Biodiversity.......................................................42 Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies......................................................................42 Data Mining Methods and Applications............................43 Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments..............85 Data-driven Block Ciphers for Fast Telecommunication Systems...............................................................................38 Database Design Using Entity-Relationship Diagrams....72 The Debugger’s Handbook..............................................110 The Decision Model: A Framework for Business Logic and Business-Driven SOA........................................72 Delivering Successful Projects with TSPSM and Six Sigma: A Practical Guide to Implementing Team Software ProcessSM.................................................110 Design and Implementation of Data Mining Tools..........73 Design and Use of Relational Databases in Chemistry.....43 Design of Cost-Efficient Interconnect Processing Units: Spidergon STNoC...............................................................26 Design Science Research Methods and Patterns: Innovating Information and Communication Technology.........................................................................21 Design Theory, Second Edition..........................................48 Designing for Accessibility: A Business Guide to Countering Design Exclusion...........................................51 Deterministic Learning Theory for Identification, Control, and Recognition..................................................58 Digital Color Imaging Handbook.....................................54 Digital Design and Fabrication.........................................26 Digital Design and Verilog HDL Fundamentals................27 Digital Design: Basic Concepts and Principles.................66 Digital Image Processing: An Algorithmic Approach with MATLAB®...................................................55 Digital Integrated Circuits: Analysis and Design, Second Edition...................................................................27 Digital Integrated Circuits: Design-for-Test Using Simulink® and Stateflow®................................................27 Digital Privacy: Theory, Technologies, and Practices.......95 Digital Signal Processing Fundamentals..........................21 The Digital Signal Processing Handbook, Second Edition - 3 Volume Set..........................................22 Digital Systems and Applications......................................22 Digital Watermarking and Steganography: Fundamentals and Techniques.........................................64 Discrete-Event Modeling and Simulation: A Practitioner’s Approach..................................................22 Distributed Systems: An Algorithmic Approach................35 DNA Methylation Microarrays: Experimental Design and Statistical Analysis...................13 DNA Microarrays and Related Genomics Techniques: Design, Analysis, and Interpretation of Experiments.......14

E EDA for IC Implementation, Circuit Design, and Process Technology....................................................28 EDA for IC System Design, Verification, and Testing........28 The Effective CIO: How to Achieve Outstanding Success through Strategic Alignment, Financial Management, and IT Governance....................................76

Effective Software Maintenance and Evolution: A Reuse-Based Approach.................................................111 Electronic Design Automation for Integrated Circuits Handbook - 2 Volume Set..................................................28 Elementary Mathematical and Computational Tools for Electrical and Computer Engineers Using MATLAB®, Second Edition...................................................................22 Elements of Compiler Design............................................68 Elliptic Curves: Number Theory and Cryptography, Second Edition...................................................................38 Embedded Linux System Design and Development.......111 Embedded Multiprocessors: Scheduling and Synchronization, Second Edition......................................31 Embedded Systems Handbook...........................................31 Emergent Semantics..........................................................64 Encyclopedia of Library and Information Science, Second Edition...................................................................73 Energy Efficient Hardware - Software Co-Synthesis Using Reconfigurable Hardware.......................................71 Enterprise Architecture A thru Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology.........................................................................77 Enterprise Business Architecture: The Formal Link between Strategy and Results............................................77 Enterprise Systems Backup and Recovery: A Corporate Insurance Policy............................................85 Essential Software Testing: A Use-Case Approach...........111 Expert Systems in Chemistry Research.............................59

F Factoring Groups into Subsets..........................................48 Financial Investigation and Forensic Accounting, Second Edition.................................................................106 A First Course in Fuzzy Logic, Third Edition....................59 FISMA Compliance: Principles and Best Practices...........95 Forensic Computer Crime Investigation.........................107 Foundations of Semantic Web Technologies....................64 Fundamental Number Theory with Applications, Second Edition...................................................................48 Fundamentals of Circuits and Filters................................26 Fundamentals of DSL Technology....................................85 Fundamentals of Grid Computing: Theory, Algorithms and Technologies.................................................................3 Fundamentals of Natural Computing: Basic Concepts, Algorithms, and Applications............................................66 Fundamentals of Statistical Bioinformatics.....................14

G Gene Expression Studies using Affymetrix Microarrays........................................................................14 Genetic Algorithms and Genetic Programming: Modern Concepts and Practical Applications.....................3 Genetics and Randomness................................................14 Geographic Data Mining and Knowledge Discovery, Second Edition...................................................................43 Geographic Information Services for Ubiquitous Mobile Services..................................................................23 GIS Programming: Concepts and Applications................68 GIS: A Computing Perspective, Second Edition................23 Global Engineering Project Management........................77 Global Software Development Handbook.......................111 Governing Lethal Behavior in Autonomous Robots.........59 Graph Theory and Interconnection Networks..................23 Graph Theory and Its Applications, Second Edition...................................................................49

Graphics and GUIs with MATLAB®, Third Edition...........33 Graphs & Digraphs, Fourth Edition..................................49 The Green and Virtual Data Center...................................77 Grid Application Systems Design.....................................112 Grid Computing: Infrastructure, Service, and Applications................................................................23 Grid Computing: Techniques and Applications..................4 Grid Resource Management: Towards Virtual and Services Compliant Grid Computing................................10 A Guide to MATLAB® Object-Oriented Programming.....69

H Handbook of Algorithms for Physical Design Automation..........................................................................4 Handbook of Algorithms for Wireless Networking and Mobile Computing...............................................................4 Handbook of Applied Cryptography..................................38 Handbook of Approximation Algorithms and Metaheuristics......................................................................4 Handbook of Bioinspired Algorithms and Applications.....5 Handbook of Combinatorial Designs, Second Edition.....49 Handbook of Computational Group Theory.....................10 Handbook of Computational Molecular Biology..............15 Handbook of Data Structures and Applications..................5 Handbook of Digital Human Modeling: Research for Applied Ergonomics and Human Factors Engineering.......................................................................52 Handbook of Discrete and Combinatorial Mathematics......................................................................50 Handbook of Dynamic System Modeling............................5 Handbook of Elliptic and Hyperelliptic Curve Cryptography.....................................................................39 Handbook of Graph Theory...............................................50 Handbook of Hidden Markov Models in Bioinformatics...................................................................15 Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO.............................64 Handbook of Mobile Middleware....................................112 Handbook of Parallel Computing: Models, Algorithms and Applications..................................5 Handbook of Real-Time and Embedded Systems...............6 Handbook of Scheduling: Algorithms, Models, and Performance Analysis..........................................................6 Handbook of Technology Management in Public Administration...................................................................78 High Performance Computing in Remote Sensing............6 How to Achieve 27001 Certification: An Example of Applied Compliance Management..................................104 How To Secure and Audit Oracle 10g and 11g..................73 Human Factors in Simple and Complex Systems, Second Edition...................................................................52 Human Factors in Simulation and Training....................52 Human-Computer Interaction Fundamentals.................53 The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications, Second Edition.............................................53 Human-Computer Interaction: Design Issues, Solutions, and Applications................................................................53 Human-Computer Interaction: Designing for Diverse Users and Domains............................................................53 Human-Computer Interaction: Development Process.....53

Title Index

D

119

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 119

12/19/08 10:26:25 AM


For more information and a complete list I

Title Index 120

Image Acquisition and Processing with LabVIEW, Second Edition...................................................................58 Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards, Second Edition.........................................33 The Image Processing Handbook: Fifth Edition..............55 Image Processing with MATLAB®: Applications in Medicine and Biology........................................................55 Immunological Computation: Theory and Applications....................................................10 Implementation and Applications of DSL Technology.....86 Implementing Electronic Document and Record Management Systems........................................................73 Implementing the IT Balanced Scorecard: Aligning IT with Corporate Strategy.................................78 IMS: A New Model for Blending Applications....................86 Industrial Automation and Process Control Security: SCADA, DCS, PLC, HMI......................................................96 Information Assurance Architecture.................................96 Information Discovery on Electronic Health Records......43 Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition...................................................................96 Information Security Cost Management..........................78 Information Security Management Handbook, 2009 CD-ROM Edition.......................................................97 Information Security Management Handbook, Sixth Edition, Volume 1....................................................97 Information Security Management Handbook, Sixth Edition, Volume 2....................................................97 Information Security Management Handbook, Sixth Edition, Volume 3....................................................97 Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement.....................................................................97 Information Security Policies and Procedures: A Practitioner’s Reference, Second Edition.......................97 Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management........................................................78 Information Security Risk Analysis, Second Edition........98 Information Security: Design, Implementation, Measurement, and Compliance........................................96 Information Technology Control and Audit, Third Edition.....................................................................98 Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks......107 Integration Technologies for Industrial Automated Systems...............................................................................24 Intelligent and Adaptive Systems in Medicine..................59 Intelligent Control Systems with an Introduction to Systems of Systems.............................................................60 Intelligent Freight Transportation....................................60 Intelligent Infrastructure: Neural Networks, Wavelets, and Chaos Theory for Intelligent Transportation Systems and Smart Structures.................60 Intelligent Network Video: Understanding Modern Video Surveillance Systems..................................60 Intelligent Systems: Modeling, Optimization, and Control........................................................................61 Intelligent Systems: Technology and Applications, Six Volume Set...................................................................61 Interactive Graphics for Data Analysis: Principles and Examples...........................................................................33

The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems................91 Interpreting the CMMI® A Process Improvement Approach, Second Edition...............................................112 Introducing Game Theory and its Applications...............50 Introduction to Abstract Algebra.......................................50 Introduction to Bioinformatics.........................................15 Introduction to Broadband Communication Systems.....86 Introduction to Combinatorial Designs, Second Edition...................................................................51 Introduction to Communications Technologies: A Guide for Non-Engineers, Second Edition.....................86 Introduction to Concurrency in Programming Languages..........................................................................69 Introduction to Data Technologies...................................74 Introduction to Grid Computing.......................................11 Introduction to Image Processing and Analysis...............56 Introduction to Logic Design............................................27 Introduction to Machine Learning and Bioinformatics...................................................................15 Introduction to Mathematics of Satisfiability...................35 Introduction to Mobile Communications: Technology, Services, Markets...........................................87 Introduction to Modern Cryptography..............................39 Introduction to Network Security......................................39 Introduction to Number Theory........................................40 Introduction to Scheduling.................................................6 Introduction to Scientific Programming and Simulation Using R....................................................69 Introduction to the Semantic Web and Semantic Web Services...............................................................................65 Investigations in the Workplace........................................98 IP Multimedia Subsystem (IMS) Handbook....................87 IS Security Auditing: Complying with ISO 27001 and 17799.................................................................................98 IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement........................ 99 IT Security Governance Guidebook with Security Program Metrics on CD-ROM...........................................99

J, K, L A Java Library of Graph Algorithms and Optimization......7 Java Programming Fundamentals: Problem Solving Through Object Oriented Analysis and Design.................69 Kinetic Modelling in Systems Biology...............................16 Knowledge Discovery for Counterterrorism and Law Enforcement......................................................................44 Knowledge Discovery from Sensor Data............................44 Knowledge Retention: Strategies and Solutions...............79 LabVIEWTM: Advanced Programming Techniques, Second Edition...................................................................70 Leading IT Projects: The IT Manager’s Guide..................79 Low-Power NoC for High-Performance SoC Design.........28

M Machine Learning Algorithms for Spatial Data Analysis and Modelling....................................................................67 Machine Learning: An Algorithmic Perspective................67 Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet.................107 Manage Software Testing.................................................112 Managing an Information Security and Privacy Awareness and Training Program.....................................99 Managing Global Development Risk..............................113

Mathematics of Quantum Computation and Quantum Technology........................................................11 Mechanics of User Identification and Authentication: Fundamentals of Identity Management...........................99 Mechatronic System Control, Logic, and Data Acquisition................................................................72 Medical Image Processing, Reconstruction and Restoration: Concepts and Methods..................................56 The Method Framework for Engineering System Architectures....................................................................113 Methods in Algorithmic Analysis.........................................7 Methods in Microarray Normalization.............................16 Microarray Innovations: Technology and Experimentation................................................................16 MicroComputed Tomography: Methodology and Applications.......................................................................56 Microcontroller Programming: The Microchip PIC®......28 Microcontrollers: Fundamentals and Applications with PIC.............................................................................29 Microjoining and Nanojoining.........................................29 Microprocessors and Microcomputer-Based System Design, Second Edition.........................................29 Mobile Enterprise Transition and Management...............79 Mobile Telemedicine: A Computing and Networking Perspective.........................................................................87 Mobile Web 2.0: Developing and Delivering Services to Mobile Phones...................................................................87 Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks..............................................88 Model-Based Design for Embedded Systems.....................31 Modeling Software with Finite State Machines: A Practical Approach.......................................................113 Modern Digital Halftoning, Second Edition.....................56 Multi-Agent Systems: Simulation and Applications.........67 Multi-Objective Optimization in Computer Networks Using Metaheuristics.........................................................88 Multimedia Content Encryption: Techniques and Applications.......................................................................65 Multimedia Data Mining: A Systematic Introduction to Concepts and Theory...............................44 Multispectral Image Analysis Using the Object-Oriented Paradigm................................................57

N National Security Issues in Science, Law, and Technology...............................................................100 Near Field Communications Handbook...........................88 Network Design for IP Convergence..................................88 Neural Networks for Applied Sciences and Engineering: From Fundamentals to Complex Pattern Recognition....61 Next Generation of Data Mining.......................................44 Nonlinear and Distributed Circuits...................................26 Numerical Linear Approximation in C...............................7

O Object Oriented Programming Through Java..................70 Official (ISC)2 Guide to the CISSP® - ISSMP® CBK®. ...105 Official (ISC)2 Guide to the CISSP® CBK®.....................105 Official (ISC)2 Guide to the CISSP®-ISSEP® CBK®.......105 Official (ISC)2 Guide to the SSCP® CBK®. .....................105 Optimal Control Applied to Biological Models.................17 Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition...........................79 Organizational Crisis Management: The Human Factor..........................................................100

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 120

12/19/08 10:26:26 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m Packet Forwarding Technologies......................................89 Parallel Algorithms..............................................................7 Parallel Computing in Quantum Chemistry....................11 Parallel Iterative Algorithms: From Sequential to Grid Computing...............................................................8 Passive, Active, and Digital Filters.....................................26 Pattern Discovery in Bioinformatics: Theory & Algorithms.........................................................17 Pattern Recognition Algorithms for Data Mining............45 Patterns for Performance and Operability: Building and Testing Enterprise Software.......................113 Performance Analysis of Queuing and Computer Networks...........................................................89 Pervasive Computing in Healthcare..................................62 Petascale Computing: Algorithms and Applications..........8 A Practical Guide to Data Structures and Algorithms using Java............................................................................8 The Practical Guide to HIPAA Privacy and Security Compliance ......................................................100 A Practical Guide to Information Systems Strategic Planning, Second Edition...............................................100 Practical Guide to Project Planning.................................80 A Practical Guide to Security Assessments......................101 Practical Hacking Techniques and Countermeasures....107 Principles of Mobile Computing and Communications...............................................................89 Principles of Speech Coding..............................................34 Probability and Statistics for Computer Scientists............36 Process Algebra for Parallel and Distributed Processing..........................................................................11 Process Improvement with CMMI® v1.2 and ISO Standards...........................................................114 Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking......................................108 A Programmer’s Companion to Algorithm Analysis...........8 Programming ArcObjects with VBA: A Task-Oriented Approach, Second Edition.................................................24 Programming Language Fundamentals by Example......70 Programming Languages for Business Problem Solving................................................................70 Project Management Recipes for Success.........................80 Protective Relaying: Theory and Applications..................29 Python for Bioinformatics.................................................17

q Quantitative Business Performance Management: Challenge, Change, and Dashboard.................................80 Quantum Computing Devices: Principles, Designs, and Analysis........................................................24 Quantum Computing: From Linear Algebra to Physical Realizations........................................................12 Quantum Error Correction and Fault Tolerant Quantum Computing........................................................24 Quantum Matrix................................................................62

R R Graphics.........................................................................34 R Programming for Bioinformatics..................................17 Rapid Prototyping and Engineering Applications: A Toolbox for Prototype Development..................................34 Real-Time Digital Signal Processing from Matlab® to C with the TMS320C6x DSK..........................................25 Reconfigurable System Design and Verification...............25

Relational Data Clustering: Models, Algorithms, and Applications.......................................................................45 Requirements Engineering for Software and Systems...114 RFID and Sensor Networks: Architectures, Protocols, Security and Integrations..................................................89 RFID in the Supply Chain: A Guide to Selection and Implementation.................................................................80

S Scientific Data Management: Challenges, Existing Technology, and Deployment............................................74 The Secrets to Carrier Class Network Security.................101 Security for Service Oriented Architectures.....................101 Security in an IPv6 Environment.....................................90 Security in Distributed, Grid, Mobile, and Pervasive Computing.......................................................................101 Security in RFID and Sensor Networks...........................102 Security in Sensor Networks............................................102 Security in Wireless Mesh Networks................................102 Security of Mobile Communications..............................102 The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments...........103 Security Software Development: Assessing and Managing Security Risks.................................................114 Semisupervised Learning for Computational Linguistics..........................................................................67 Sequential Logic: Analysis and Synthesis..........................30 Service Delivery Platforms: Developing and Deploying Converged Multimedia Services........................................90 Service Oriented Enterprises............................................114 Service-Oriented Architecture: SOA Strategy, Methodology, and Technology.........................................115 Shape Classification and Analysis: Theory and Practice, Second Edition...................................................................57 Signal Processing for Intelligent Sensor Networks with MATLAB, Second Edition...................................................62 SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol................................................90 Six Sigma Software Development, Second Edition........115 Social Computing: A Data Mining Perspective.................45 Software Deployment, Updating, and Patching...............81 Software Engineering Foundations: A Software Science Perspective........................................115 Software Solutions for Engineers and Scientists.............115 Software Testing and Continuous Quality Improvement, Third Edition...........................................116 Software Testing: A Craftsman’s Approach, Third Edition...................................................................116 A Standard for Enterprise Project Management...............81 Statistical and Computational Pharmacogenomics........18 Statistics in Human Genetics and Molecular Biology...............................................................................18 Stochastic Modelling for Systems Biology.........................18 Strategic Data Warehousing: Achieving Alignment with Business.....................................................................74 Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management......................81 The Strategic Project Leader: Mastering Service-Based Project Leadership.............................................................81 Structural Bioinformatics: An Algorithmic Approach............................................................................18 Successful Strategies for Implementing ISO 27001.......103 Sums of Squares of Integers..............................................51 Synchronous Programming of Reactive Systems with Esterel and SyncCharts......................................................71

Systems Biology and Bioinformatics: A Computational Approach............................................................................19 Systems Biology: Principles, Methods, and Concepts.......19

T, U TCP Performance over UMTS-HSDPA Systems.................90 Testing Code Security.......................................................116 Testing Integrated QoS of VoIP: Packets to Perceptual Voice Quality......................................................................91 Text Mining: Theory, Application, and Visualization.......45 Theories of Geographic Concepts: Ontological Approaches to Semantic Integration.................................46 The Top Ten Algorithms in Data Mining..........................46 Understanding and Applying Cryptography and Data Security..............................................................................40 Understanding Complex Datasets: Data Mining with Matrix Decompositions......................................................46 Understanding Dynamics of Geographic Domains..........25 Unique Chips and Systems................................................30 The Universal Access Handbook........................................52 Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications.........91 User Interface Software: Principles and Technologies....................................................................116 Using Artificial Intelligence in Chemistry and Biology: A Practical Guide.................................................62

Title Index

P

V Value-Added Services for Next Generation Networks........91 Vehicular Networks from Theory to Practice....................92 Verilog HDL: Digital Design and Modeling.......................30 Video, Speech, and Audio Signal Processing and Associated Standards..........................................................34 A Visual Guide to Stata Graphics, Second Edition............35 The VLSI Handbook, Second Edition................................30 VMware Certified Professional Test Prep...........................92 VMware ESX Essentials in the Virtual Data Center.........117 VoIP Handbook: Applications, Technologies, Reliability, and Security.....................................................92 Vulnerability Management..............................................103

W, X, Y, Z Web Based Enterprise Energy and Building Automation Systems..........................................................65 What Every Engineer Should Know About Developing Real-Time Embedded Products.........................................32 What Every Engineer Should Know about Software Engineering.....................................................................117 WiMAX: A Wireless Technology Revolution.......................92 WiMAX/MobileFi: Advanced Research and Technology.........................................................................93 Wireless Ad Hoc and Sensor Networks: Protocols, Performance, and Control.................................................93 Wireless Crime and Forensic Investigation.....................108 Wireless Mesh Networking: Architectures, Protocols and Standards....................................................93 Wireless Quality of Service: Techniques, Standards, and Applications..............................................93 Wireless Security and Cryptography: Specifications and Implementations......................................................103 Wireless, Networking, Radar, Sensor Array Processing, and Nonlinear Signal Processing......................................25 X Internet: The Executable and Extendable Internet.......65

121

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 121

12/19/08 10:26:26 AM


For more information and a complete list A

Author Index

Abdelmalek; Nabih N...........................................................7 Abney; Steven.....................................................................67 Acquisti; Alessandro...........................................................95 Adam; Azad........................................................................73 Adeli; Hojjat.......................................................................60 Affenzeller; Michael.............................................................3 Ahson; Syed ...............................................64, 87, 88, 90, 92 Akinci; Burcu...................................................................110 Akujuobi; Cajetan M..........................................................86 Alexander; Michael............................................................11 Allison; David B..................................................................14 Alon; Uri.............................................................................16 Alpert; Charles J....................................................................4 Aluru; Srinivas...................................................................15 Andre; Douglas.................................................................105 Andriole; Stephen J............................................................74 Angelides; Marios C............................................................63 Arabi; Ali Akbar..................................................................84 Arce; Gonzalo R.................................................................56 Arkin; Ronald.....................................................................59 Arnason; Sigurjon Thor...................................................104 Ashbaugh, CISSP; Douglas A...........................................114 Ashe; Michael C..................................................................55 Assaad; Mohamad..............................................................90 Asyali; Musa Hakan...........................................................55 Atesmen; M. Kemal............................................................77 Avanzi; Roberto..................................................................39 Avoine; Gildas.......................................................................3 Awad; M..............................................................................73 Ayers; John E......................................................................28

B

122

Bacik; Sandy......................................................................94 Bader; David A......................................................................8 Bagui; Sikha......................................................................72 Bahi; Jacques Mohcine........................................................8 Banville; Debra L...............................................................41 Bardram; Jakob E..............................................................62 Baron; Michael..................................................................36 Bass; Matthew..................................................................111 Bassi; Sebastian.................................................................17 Basu; Sugato......................................................................42 Bazavan; Ioana V...............................................................78 Beasley; T. Mark.................................................................14 Beaver; Kevin...................................................................100 Beaver; Stephen S............................................................117 Bell; MaryAnn....................................................................63 Bellavista; Paolo..............................................................112 Ben-Natan; Ron.................................................................73 Bhansali; Neera.................................................................74 Bhattacharyya; Shuvra S...................................................31 Bishop; Robert H................................................................72 Bissett; Brian D..................................................................40 Bitter; Rick.........................................................................70 Blanchet-Sadri; Francine..................................................46 Boudriga; Noureddine.....................................................102 Boukerche; Azzedine............................................................4 Brancik; Kenneth.............................................................107 Brotby, CISM; W. Krag........................................................97 Brown; Edwin Lyle.............................................................94 Brown; Eric J......................................................................76

Brown; James R..................................................................13 Brualdi; Richard A.............................................................47 Buehler; Lukas K................................................................12 Burkholder; Earl F..............................................................19 Burkowski; Forbes J............................................................18 Burnham; Keith J...............................................................59

C Campisi; Patrizio.................................................................3 Canton; Maria P.........................................................28, 115 Capehart; Barney L............................................................65 Capehart; Lynne C.............................................................65 Capell; Peter.....................................................................113 Carminati; F.........................................................................9 Cartwright; Hugh...............................................................62 Casanova; Henri...................................................................7 Cassidy; Anita...................................................................100 Cavanagh; Joseph..............................................................27 Cavanagh; Joseph..............................................................30 Cesar, Jr.; Roberto Marcond...............................................57 Chaitanya; Manish..........................................................109 Chang; Chein-I....................................................................6 Chang; Kang-Tsung...........................................................24 Chartrand; Gary...........................................................47, 49 Chen; C.H...........................................................................55 Chen; Goong................................................................11, 24 Chen; Hsiao-Hwa...............................................................88 Chen; Hui...........................................................................87 Chen; Jake Y.......................................................................41 Chen; Jiming......................................................................89 Chen; Jinjun.......................................................................23 Chen; Thomas M...............................................................83 Chen; Wai-Kai..............................................................26, 30 Chen; Xinghao...................................................................66 Chiesa; Raoul...................................................................108 Chin; Shiu-Kai...................................................................94 Chorafas; Dimitris N..........................................................99 Church; David A.................................................................24 Ciappi; Silvio....................................................................108 Cohen; Fred........................................................................99 Cohen; Henri......................................................................39 Colbourn; Charles J............................................................49 Collette; Ron......................................................................76 Contassot-Vivier; Sylvain.....................................................8 Contesti; Diana-Lynn.......................................................105 Copeland; Rebecca.............................................................84 Coppola; Marcello..............................................................26 Corradi; Antonio..............................................................112 Costa; Luciano da Fona.....................................................57 Couturier; Raphael..............................................................8 Croker; Robert....................................................................62 Cudre-Mauroux; Philippe.................................................64 Curry; Gordon B.................................................................41 Cvetkovic; Dragos...............................................................47

D Dargie; Waltenegus............................................................10 Dasgupta; Dipankar...........................................................10 Datta; Sujay.......................................................................15 Dattatreya; G.R..................................................................89 Davidson; Ian.....................................................................42 De Capitani Vimercati; Sabrina.........................................95

de Castro; Leandro Nunes..................................................66 De Furia; Guy L..................................................................80 de Guise; Preston...............................................................85 Dean; David J.......................................................................9 Dedieu; Hervé...............................................................85, 86 Demin; Oleg.......................................................................16 Demirkaya; Omer..............................................................55 Denko; Mieso K..................................................................93 Dianat; Sohail A.................................................................54 DiMarzio; J.F.....................................................................110 Ding; Jianguo.....................................................................83 Dinitz; Jeffrey H..................................................................49 Dobrushkin; Vladimir A.......................................................7 Doche; Christophe.............................................................39 Donoso; Yezid.....................................................................88 Draghici; Sorin..................................................................13 Drake; Miriam A................................................................73 Du; Yi..................................................................................57 Ducci; Stefania.................................................................108 Duckham; Matt..................................................................23 Duffy; Vincent G.................................................................52 Dunham; Ken..................................................................107

E Earp; Richard.....................................................................72 Edwards; Jode W.................................................................14 Egiazarian; Karen................................................................3 Eick; Bettina.......................................................................10 Elbirt; Adam J.....................................................................40 Elmore; Walter A................................................................29 Englert; Berthold-Georg....................................................24 Erickson; Martin................................................................40 Ezell, Bobby.......................................................................63

F Fabregat; Ramon...............................................................88 Falkenthal; Dietrich.........................................................113 Farrell-Vinay; Peter..........................................................112 Ferraro, CPP, CFE, PCI; Eugene F......................................98 Ferraro; Jack.......................................................................81 Firesmith; Donald G........................................................113 Fishwick; Paul A..................................................................5 Fitzgerald; Todd.................................................................75 Ford; Chris.......................................................................113 Foreman; Park.................................................................103 Fournier; Greg.................................................................111 Fowler; Kim R....................................................................32 Frey; Gerhard.....................................................................39 Furht; Borko.......................................................................64

G Gaber; Mohamed...............................................................44 Gaitan; Frank.....................................................................24 Gallegos; Frederick............................................................98 Gama; Joao........................................................................44 Ganguly; Auroop R............................................................44 Gardner; William...............................................................11 Ge; Shuzhi Sam.................................................................58 Gentile; Mike......................................................................76 Gentile; Skye......................................................................76 Gentleman; Robert............................................................17 Ghosh; Sukumar...............................................................35 Gileadi; Ido......................................................................113

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 122

12/19/08 10:26:27 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

H Haas; Olivier C. L...............................................................59 Hall; Steven E...................................................................113 Hammons; Charles B.......................................................113 Han; Jiawei...................................................................43, 44 Hancock; Peter A................................................................52 Hankerson; D.C..................................................................37 Hanrion; Patrick................................................................81 Hansche; Susan, CISSP...................................................105 Hardiman, Gary.................................................................16 Hardy; Darel W...................................................................36 Hariri; Salim......................................................................19 Harris; Michael D. S...........................................................75 Hasegawa; Yoshihiko.........................................................66 Hassanien; A.......................................................................32 Held; Gilbert.......................................................................84 Hemmer; Markus C............................................................59 Henkel; Carsten..................................................................24 Hennell; Cheryl................................................................105 Henry; Kevin.....................................................................105 Henry; Paul A...................................................................105 Herold; Rebecca.........................................................99, 100 Herrmann; Debra S............................................................95 Herron; David.....................................................................75 Hill; David J........................................................................58 Hill; Gerard M....................................................................76 Hinek; M. Jason..................................................................37 Hitzler; Pascal..............................................................64, 66 Hjorth-Jensen; Mortin..........................................................9 Hoffman; D.G.....................................................................37 Holland; O. Thomas..........................................................33 Holt; Derek F.......................................................................10 Hornsby; Kathleen Stewart..........................................25, 32 Howard; Patrick D......................................................95, 104 Howard; Rick...................................................................106 Howell-Barber; H.............................................................115 Hristidis; Vagelis.................................................................43 Hsiung; Pao-Ann...............................................................25 Hsu; Lih-Hsing...................................................................23 Hu; Fei................................................................................83 Hu; Honglin...............................................................93, 102 Huang, Chun-Hsian..........................................................25 Humphries; Chris J............................................................41 Hussain; Syed Asad............................................................82 Hussey; James M..............................................................113

I Iba; Hitoshi........................................................................66 Ibnkahla; Mohamed..........................................................82 Ilgenfritz; John...................................................................92 Ilgenfritz; Merle.................................................................92 Ilyas; Mohammad...........................................87, 88, 90, 92 Institute of Computer Science and University of Crete, Greece.................................................................................52 Ioannou; Petros A..............................................................60 Iwanicki; Stasia.................................................................75

J Jacko; Julie A......................................................................53 Jacobsen; Krista S.........................................................85, 86 Jacobson; Douglas.............................................................39 Jain; Mukesh....................................................................110 Jamshidi; Mo......................................................................60 Jan; Jiri...............................................................................56 Janssen; Curtis L................................................................11 Jarzabek; Stanislaw..........................................................110 Jiang; J................................................................................32 Jiang; Xiaomo....................................................................60 Jie; Wei................................................................................23 Jimenez; Alejandro Dueñas...............................................82 John; Eugene.....................................................................30 Johnson; Kent A................................................................112 Johnson; Thomas A..................................................100, 107 Jones; Owen........................................................................69 Jones; Stephan...................................................................86 Jorge; R.M. Natal................................................................32 Jorgensen; Paul C............................................................116 Joux; Antoine.....................................................................36 Junod; Pascal.......................................................................3

K Kairab; Sudhanshu..........................................................101 Kanevski; Mikhail..............................................................67 Kang; Kyo C......................................................................108 Kargupta; Hillol.................................................................44 Karim; Mohammad A........................................................66 Karimi; Hassan A.............................................................110 Karkare; Bageshri............................................................110 Katz; Jonathan...................................................................39 Kauffman; Louis................................................................11 Kavouras; Marinos.............................................................46 Kazmeier; Juergen...........................................................111 Keyes; Jessica......................................................................65 Keyes; Jessica................................................................78, 79 Khan; Latifur.....................................................................73 Khedker; Uday..................................................................110 Khoshafian; Setrag..........................................................114 Killmeyer; Jan....................................................................96 Kim; Jun Kyong..................................................................28 Kipper; Gregory................................................................108 Kitsos; Paris......................................................................102 Klima; Richard E...............................................................36 Klimberg; Ronald K...........................................................43 Kokla; Margarita................................................................46 Konopka; A.K......................................................................19 Koolen; Jack.......................................................................47 Korb; Kevin B.....................................................................58 Korner; Christian...............................................................42 Kott; Alexander...................................................................57

Kouns; Jake........................................................................90 Kovac; Ron.........................................................................86 Krause; Micki.......................................................75, 97, 103 Krishna; P. Radha..............................................................70 Krishnamurthy; Nikhilesh...............................................109 Kroetzsch; Markus.............................................................64 Kudyba; Stephan................................................................43 Kuechler Jr.; William..........................................................21 Kulpa; Margaret K............................................................112 Kumar; Abhinit..................................................................11 Kumar; Vipin................................................................44, 46 Kupferschmid; Michael.....................................................68 Kwak; Jin Ho......................................................................47

L Lad; Amol.........................................................................110 Lai; Choi-Hong..................................................................53 Lambrinoudakis; Costos....................................................95 Landoll; Douglas J...........................................................103 Lange; Tanja......................................................................39 Laplante; Philip A....................................................114, 117 Latimer; DeWitt T.............................................................113 Lattanze; Anthony J..........................................................109 Lau; Daniel L.....................................................................56 Lau; Hang T.........................................................................7 Lavagno; Luciano..............................................................28 Lawler; James . ................................................................115 Lawrence; Kenneth D.........................................................43 Layton; Timothy P..............................................................96 Lee; Insup.............................................................................6 Lee; Kangmin.....................................................................28 Legrand; Arnaud..................................................................7 Lei; Ye.................................................................................23 Leiss; Ernst L........................................................................8 Lenhart; Suzanne..............................................................17 Leonard; D.A......................................................................37 Leondes; Cornelius T..........................................................61 Lesniak; L...........................................................................49 Leung; Joseph Y-T.................................................................6 Lewis; Frank L....................................................................58 Lewis; Gerald....................................................................100 Lewis; William E..............................................................116 Li; Deyi...............................................................................57 Lian; Shiguo......................................................................65 Lieberman; Benjamin A..................................................109 Liebowitz; Jay...............................................................79, 81 Lim; Ian.............................................................................78 Lin; Cheng-Kuan...............................................................23 Lin; Min.............................................................................18 Lindell; Yehuda..................................................................39 Lindner; C.C.................................................................37, 48 Liou; Frank W.....................................................................34 Lipovac; Vlatko...................................................................91 Litchko; James.................................................................105 Liu; Huan.....................................................................41, 45 Liu; Zhi-Jun.......................................................................68 Locatelli; Riccardo.............................................................26 Loke; Seng..........................................................................21 Lomonaco; Samuel J.........................................................11 Lonardi; Stefano................................................................41 Long; Bo.............................................................................45 Lukac; Rastislav.................................................................54 Luo; Jijun...........................................................................93

Author Index

Gohlmann; Hinrich...........................................................14 Goins; Bonnie A...............................................................105 Goldberg; Larry..................................................................72 Golden; Philip..............................................................85, 86 Goldman; Ken......................................................................8 Goldman; Ronald..............................................................33 Goldman; Sally ...................................................................8 Gollery; Martin...................................................................15 Gonzalez; Teofilo F...............................................................4 Goodman; Jacob E.............................................................50 Goryanin; Igor...................................................................16 Grammatikakis; Miltos D..................................................26 Greisler; David S. ..............................................................78 Gritzalis; Stefanos..............................................................95 Groom; Frank M................................................................86 Gross; Jonathan L..................................................48, 49, 50 Gurney; Kevin....................................................................61

123

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 123

12/19/08 10:26:28 AM


For more information and a complete list

Author Index 124

M

N

Ma; Jianhua.......................................................................91 Ma; Maode.........................................................................93 Macaulay; Tyson..........................................................95, 96 MacLeod; Norman.............................................................40 Madisetti; Vijay K.............................................21, 22, 25, 34 Magoules; Frederic...................................................3, 10, 11 Maier; Mark W....................................................................71 Maillardet; Robert..............................................................69 Malek; William A.................................................................7 Manassah; Jamal T............................................................22 Manning; George A..........................................................106 Mao; Shiwen......................................................................83 Marcella, Jr.; Albert V........................................................106 Marchand; Patrick.............................................................33 Marek; Victor W..................................................................35 Marshall; David.........................................................83, 117 Marsland; Stephen.............................................................67 Martin; Grant.....................................................................28 Martinez; Angel R................................................................9 Martinez; Wendy L...............................................................9 Maruccia; Giuseppe...........................................................26 Mathur; Sunil....................................................................14 McCarty; Jason W.............................................................117 McCrory; Dave....................................................................83 McCumber; John................................................................94 McEneaney; William M.....................................................57 Meduna; Alexander............................................................68 Mehta; Dinesh P...............................................................4, 5 Melnick; Jim.....................................................................107 Mendelson; Elliott..............................................................50 Menendez; Doug..............................................................106 Menezes; Alfred J................................................................38 Merendino; Tom..............................................................113 Mestha; L. K.......................................................................54 Michailidis; George............................................................15 Mihailidis; Alex..................................................................62 Miller; Dennis P..................................................................75 Miller; Harvey J..................................................................43 Mills; David L.....................................................................20 Minoli; Daniel..............................................................77, 90 Mitchell; Michael N...........................................................35 Mitra; Pabitra.....................................................................45 Mitra; Sushmita.................................................................15 Moerman; Mike...............................................................113 Mohiuddin; Taqi................................................................70 Moldovyan; Alexander A....................................................38 Moldovyan; Nikolay A........................................................38 Mollin; Richard A..................................................37, 39, 48 Morreale, Patricia A...........................................................85 Morrow; Michael G............................................................25 Motoda; Hiroshi.................................................................41 Motwani; Rajeev................................................................44 Mouloua; Mustapha..........................................................52 Mullick; Neel....................................................................111 Murrell; Paul...............................................................34, 74 Mutafelija; Boris..............................................................114 Muuss, CPP; James P........................................................104 Myerson; Judith M..............................................................80 Myrick; Conrad B...............................................................77

Nair; Premchand S............................................................69 Najarian; Kayvan...............................................................19 Nakahara; Mikio................................................................12 Nanayakkara; Thrishantha...............................................60 Narasimha; Madihally.......................................................34 Navet; Nicolas....................................................................31 Navulur; Kumar.................................................................57 Nawrocki; Matt...................................................................70 Neelakandan; Sriram......................................................110 Newman; Robert C...........................................................106 Nguyen; Hung T.................................................................59 Nguyen; Kim......................................................................39 Nguyen; Thi-Mai-Huong...................................................10 Nicholson; Ann E...............................................................58 Nicolescu; Gabriela............................................................31 Nielsen; Ida M.B.................................................................11 Nilsson; Fredrik..................................................................60 Ning; Huansheng...............................................................91 Nino; Fernando..................................................................10 Nussinov; Ruth..................................................................13

O O’Brien; Eamonn A............................................................10 O’Donnell; TJ.....................................................................43 O’Rourke; Joseph...............................................................50 Oechslin; Philippe...............................................................3 Ogunfunmi; Tokunbo.......................................................34 Ohmi; Tetsuo.....................................................................12 Ohsawa; Yukio...................................................................42 Oklobdzija; Vojin G................................................20, 22, 26 Olariu; Stephan.............................................................5, 92 Older; Susan Beth..............................................................94 Omitaomu; Olufemi A.......................................................44 Oppleman; Victor.............................................................101 Osman; Onur.....................................................................21 Othman; Mazliza...............................................................89 Ou; Jingzhao......................................................................71

P Page; Grier P.......................................................................14 Pal; Sankar K.....................................................................45 Pallas-Areny; Ramon.........................................................29 Pan; Jie...............................................................................11 Pandian; C. Ravindranath..............................................108 Parashar; Manish..............................................................19 Pareek; Deepak..................................................................75 Parida, Laxmi....................................................................17 Park; Sooyong..................................................................108 Paul; Topon Kumar...........................................................66 Paulish; Daniel J..............................................................111 Peltier; Justin...................................................................104 Peltier; Thomas R..........................................78, 97, 98, 104 Percy; David.......................................................................68 Perelroyzen; Evgeni.....................................................20, 27 Perez-Quinones; Manuel.................................................116 Perkins; Theodore..............................................................15 Petronis; Arturas................................................................13 Phelps; K.T.........................................................................37 Pieralisi; Lorenzo...............................................................26 Plataniotis; Konstantinos N...............................................54 Plaza; Antonio J...................................................................6

Pohlman; Marlin B............................................................79 Pozdnukhov; Alexi.............................................................67 Prasanna; Viktor K.............................................................71 Proctor; Robert W...............................................................52 Purba; Sanjiv...................................................................113 Pyla; Pardha....................................................................116

Q, R Qidwai; Uvais.....................................................................55 Rabern, CPP; David.........................................................104 Radhamani; G...................................................................92 Rafiquzzaman; Mohamed.................................................29 Raggad; Bel G....................................................................98 Raghavan; P.....................................................................110 Rajasekaran; Sanguthevar..................................................5 Rao; G.S.V. Radha Krishna................................................92 Rashidi; Hooman H...........................................................12 Rasmussen; Craig E...........................................................69 Raynus; Joseph...................................................................80 Register; Andy H.................................................................69 Reif; John.............................................................................5 Reilly; Cavan......................................................................18 Relf; Christopher G............................................................55 Reynolds; Wade A...............................................................83 Richman; Fred...................................................................36 Robert; Yves......................................................................6, 7 Roberts; Fred......................................................................47 Robinson; Andrew..............................................................69 Rodger; C.A..................................................................37, 48 Rohwedder; Bernd.............................................................24 Rosen; Kenneth H..............................................................49 Rotem; Doron....................................................................74 Roy; Abhishek....................................................................85 Rubio; Juan........................................................................30 Rudolph; Sebastian...........................................................64 Russ; J. Christian...............................................................56 Russ; John C.................................................................55, 56 Ruvinsky; Anatoly..............................................................14

S Sadiku; Matthew N.O.........................................................86 Sahami; Mehran................................................................45 Sahin; Ferat.......................................................................60 Sahni; Sartaj........................................................................5 Sahoo; Prasanna K............................................................55 Samarasinghe; Sandhya...................................................61 Sanchez; Julio............................................................28, 115 Sands; Arthur D..................................................................48 Sangwan; Raghvinder.....................................................111 Santambrogio; Marco D....................................................25 Sanyal; Amitabha............................................................110 Sapatnekar; Sachin S..........................................................4 Saran; Amitabh................................................................109 Sarangapani; Jagannathan...............................................93 Sawitzki; Günther................................................................9 Saxena; Navrati.................................................................85 Schaefer; G.........................................................................32 Scharfe; Henrik..................................................................66 Scheffer; Louis...................................................................28 Scheinerman; Edward.......................................................68 Schmuki; Ruedi...............................................................113 Schreiber; Gideon..............................................................13

In North & South America Tel: 1-800-272-7737 • Fax: 1-800-374-3401 (Outside the U.S.) Tel: 1-561-994-0555 • Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 124

12/19/08 10:26:29 AM


o f t i t l e s , v i s i t u s a t w w w. c r c p r e s s . c o m

T Talloen; Willem.................................................................14 Talukder; Asoke K............................................................109 Tan; Kiat-An.......................................................................11 Tavares; João Manuel R.S. . ..............................................32 Tayntor; Christine B.........................................................115 Terplan, Kornel..................................................................85 Tesman; Barry . .................................................................47 Theus; Martin....................................................................33 Thuraisingham; Bhavani....................................63, 73, 101 Timonin; Vadim.................................................................67 Tipton; Harold F.........................................................97, 105 Todorov; Dobromir............................................................99 Tramontano; Anna............................................................15 Tucker; Allen B...................................................................35 Tungare; Manas...............................................................116

U Ucan; Osman Nuri.............................................................21 Uhrmacher; Adelinde M....................................................67 Umbaugh; Scott E..............................................................54 Unhelkar; Bhuvan.............................................................79 Urbanek; Simon.................................................................33

V Vaishnavi; Vijay K..............................................................21 Valdes-Perez; Fernando E..................................................29 Valiente; Gabriel................................................................12 Van de Velde; Thierry.........................................................91 van der Linden; Maura . .........................................105, 116 van Oorschot; Paul C.........................................................38 van Oosterom; Peter..........................................................63 Van Roekel; James L..........................................................63 Vanstone; Scott A................................................................38 Vargas; Ricardo Viana........................................................80 Vatsavai; Ranga Raju........................................................44 Vazzana; Anthony..............................................................40 Vercauteren; Frederik.........................................................39 Vincenzi; Dennis A.............................................................52 Vivien; Frederic....................................................................6 Von Halle; Barbara.............................................................72

W Wagner; Ferdinand..........................................................113 Wagner; Stefan.....................................................................3 Wagner; Thomas..............................................................113 Wagstaff, Jr.; Samuel S.......................................................37 Wagstaff; Kiri......................................................................42 Wainer; Gabriel A...............................................................22 Wakefield; Tony..................................................................87 Walker; Carol L..................................................................36 Walker; Elbert A.................................................................59 Wall; J.R.............................................................................37 Wallis; W.D.........................................................................51 Wan; Dadong.....................................................................62 Wang; Cong........................................................................58 Wang; Hai..........................................................................70 Wang; Lei...........................................................................73 Wang; Lizhe.......................................................................23 Wang; Meiqing . ................................................................53 Wang; Shouhong...............................................................70 Wang; Sun-Chong.............................................................13 Wang; Yingxu..................................................................115 Washington; Lawrence C...................................................38 Waxvik; Eric.....................................................................105 Weigle; Michele C...............................................................92 Welch; Thad B....................................................................25 Wells; April J.....................................................................112 Westphal; Christopher........................................................42 Weyns; Danny....................................................................67 Whittle; Ralph....................................................................77 Wilkinson; Barry..................................................................4 Wilkinson; Darren J...........................................................18 Willett; Keith D...................................................................96 Winkler; Stephan.................................................................3 Wise; John A.......................................................................52 Wolstenholme; Peter........................................................113 Worboys; Michael...............................................................23 Workman; John T...............................................................17

Wright; Cameron H.G........................................................25 Wright; Craig....................................................................105 Wu; Rongling.....................................................................18 Wu; Weidong......................................................................89 Wu; Xindong......................................................................46 Wuthnow; Mark.................................................................86

X Xiao; Yang..............................................83, 87, 93, 101, 102 Xu; Chengying...................................................................61 Xu; Ming-Yao.....................................................................47

Y Yada; Katsutoshi................................................................42 Yan; Lu...............................................................................91 Yang; Laurence T...................................................83, 89, 91 Yanushkevich, Svetlana N.................................................27 Yarberry, Jr.; William A.......................................................76 Yellen; Jay.....................................................................49, 50 Yoo; Hoi-Jun.......................................................................28 Yu; Lei................................................................................10 Yu; Liyang..........................................................................65 Yu; Philip S..................................................................44, 45 Yuan; May....................................................................25, 32

Author Index

Schulz; Greg.......................................................................77 Scully; Marlan O................................................................24 Sears; Andrew.....................................................................53 Seel; Nigel..........................................................................84 Semmlow; John L..............................................................53 Sen; Arunabha...................................................................45 Senft; Sandra.....................................................................98 Shankar; Priti....................................................................20 Sharma; Gaurav................................................................54 Shi; Yun Q..........................................................................33 Shih; Frank Y.....................................................................64 Shih; Jerry..........................................................................86 Shin; Yung C......................................................................61 Shiva; Sajjan G..................................................................71 Shmerko, Vlad P.................................................................27 Shoshani; Arie....................................................................74 Sigmon; Neil......................................................................36 Silvers; Fon.........................................................................72 Simonot-Lion; Francoise...................................................31 Singer; Bryan.....................................................................96 Skillicorn; David..........................................................44, 46 Sklavos; Nicolas...............................................................103 Smith; Jonathan D. H........................................................50 Son; Sang H.........................................................................6 Sottile; Matthew.................................................................69 Spehn; Eva M.....................................................................42 Spivey; Mark D.................................................................107 Srikant; Y.N........................................................................20 Sriram; Sundararajan.......................................................31 Srivastava; Ashok...............................................................45 Stackpole; Bill....................................................................81 Stafford; Matthew...............................................................86 Stafford; Phillip.................................................................16 Stanislawski; Larry V..........................................................68 Stevenson; D.E...................................................................70 Stinson; Douglas R............................................................37 Stitzinger; Ernest L............................................................36 Stock; Stuart R...................................................................56 Stromberg; Harvey...........................................................114 Stupak; Ronald J................................................................78 Sugumaran; Vijayan........................................................108 Sun; Huifang.....................................................................33 Sung; Wing-Kin.................................................................12 Swanson; David C..............................................................62 Szabo; Sandor....................................................................48

Z Zaffalon; Luigi...................................................................71 Zambruski; Michael S........................................................81 Zandt; Trisha Van...............................................................52 Zeghlache; Djamal............................................................90 Zhang; Jianping.................................................................45 Zhang; Ping.......................................................................47 Zhang; Ruofei....................................................................44 Zhang; Xinmiao...............................................................103 Zhang; Yan.........................................83, 88, 89, 91, 93, 102 Zhang; Zhongfei..........................................................44, 45 Zheng; Jun.......................................................................102 Zhou; Y...............................................................................29 Zlatanova; Sisi...................................................................63 Zomaya; Albert Y..................................................................5 Zubairy; M. Suhail.............................................................24 Zufferey; Jean-Christophe..................................................58 Zurawski; Richard.......................................................24, 31

125

Rest of the World Tel: +44 (0) 1235 400 524 • Fax: +44 (0) 1235 400 525 e-mail: (UK) uk.trade@tandf.co.uk • (International) international@tandf.co.uk

CATITB_K00163_2009 Cat.indd 125

12/19/08 10:26:29 AM


plc

CRC Press • Taylor & Francis • Chapman & Hall/CRC • Auerbach Publications • Productivity Press

Visit us online at

www.crcpress.com

In the Americas Sales Office - CRC Press 6000 Broken Sound Parkway, NW, Suite 300, Boca Raton, FL 33487, U.S.A. Within the Continental USA - Tel: 800-272-7737 • Fax: 800-374-3401 • orders@taylorandfrancis.com Outside the Continental USA - Tel: 561-994-0555 • Fax: 561-361-6018 • international.orders@taylorandfrancis.com

Senior Vice President of Sales

Dennis Weiss Tel: 561-998-2510 Fax: 561-998-2580 e-mail: dennis.weiss@taylorandfrancis.com

Customer Service

Sales Agents

Angela Williams Tel: 800-272-7737 ext. 6091 Fax: 800-374-3401 e-mail: angela.williams@taylorandfrancis.com

Michael Dulisse Tel: 561-998-2582 Fax: 561-361-6049 e-mail: michael.dulisse@taylorandfrancis.com

Academic Sales

Premium/Custom Sales

Retail Bookstores

Library/Medical Wholesalers

Subsidiary Rights Sales

Ryan Prior Tel: 561-998-2516 Fax: 561-361-6049 e-mail: ryan.prior@taylorandfrancis.com

Susie Carlisle Tel: 561-998-2538 Fax: 561-361-6049 e-mail: susie.carlisle@taylorandfrancis.com

Evelyn Elias Tel: 561-361-6010 Fax: 561-361-6049 e-mail: evelyn.elias@taylorandfrancis.com

Evelyn Elias Tel: 561-361-6010 Fax: 561-361-6049 e-mail: evelyn.elias@taylorandfrancis.com

Jennifer Strong Tel: 212-216-7851 Fax: 212-244-1563 e-mail: jennifer.strong@taylorandfrancis.com

Milton Park Sales Office - Taylor & Francis Group (Books Ltd) 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN, UK

Group Sales Director

Academic Representatives (UK)

Christoph Chesher Tel: +44 (0) 20 7017 6194 Fax: +44 (0) 20 7017 6748 e-mail: christoph.chesher@tandf.co.uk

Tim Page Higher Education Sales Manager Mobile: 07824 690646 e-mail: tim.page@tandf.co.uk

International Sales Director Graham Crossley Tel: +44 (0) 20 7017 6048 Fax: +44 (0) 20 7017 6748 e-mail: graham.crossley@tandf.co.uk

Head of UK Sales Nick Perry Tel: +44 (0) 20 7017 6132 Fax: +44 (0) 20 7017 6732 e-mail: nick.perry@tandf.co.uk

Corporate and Institutional Sales Alfred Lea Tel: +44 (0) 20 7017 6273 Fax: +44 (0) 20 7017 6732 e-mail: cis@tandf.co.uk

126

Latin American Sales

UK Sales Administrator Judith Cavell Tel: +44 (0) 20 7017 6191 Fax: +44 (0) 20 7017 6732 e-mail: judith.cavell@tandf.co.uk

Central and South America and Mexico Michael Dulisse Sales Office, Boca Raton, FL Taylor & Francis 6000 Broken Sound Parkway, NW, Suite 300, Boca Raton, FL 33487, USA Tel: 561-998-2582 Fax: 561-361-6049 e-mail: michael.dulisse@taylorandfrancis.com Ethan E. Atkin Cranbury International LLC 7 Clarendon Ave, Suite 2 Montpelier, VT 05602, USA Tel: +1 802 223 6565 Fax: +1 802 223 6824 e-mail: eatkin@cranburyinternational.com

CATITB_K00163_2009 Cat.indd 126

China Liaison Office

Yan Pei Manager Taylor & Francis Room 523 European and Japanese Enquiries Resource Building No. 151 North Street Zhongguancun Lucy Astone Beijing, China 100080 International Sales Support Coordinator P.O. Box: 8762 Tel: +44 (0) 20 7017 6149 Tel/Fax: +86 (10) 58876523 Fax: +44 (0) 20 7017 6748 e-mail: yanpei@tandf.co.sg e-mail: lucy.astone@tandf.co.uk

International Enquiries Kate Pearce International Sales Support Manager (Books) Tel: +44 (0) 20 7017 6053 Fax: +44 (0) 20 7017 6748 e-mail: kate.pearce@tandf.co.uk

South Asian, Middle Eastern and African Enquiries

Foreign Rights

Adele Parker e-mail: adele.parker@tandf.co.uk

Customer Services Taylor & Francis Bookpoint 130 Milton Park, Abingdon, Oxon OX14 4SB Tel: +44 (0) 1235 400 524 Fax: +44 (0) 1235 400 525 e-mail (UK): uktrade@tandf.co.uk e-mail (internationally): international@tandf.co.uk www.hodderheadline.co.uk/Bookpoint

Standing Orders

If you would like to receive books on our improved preselective standing order system, or if you would like to have further information about this service, please contact your area manager or Customer Services Department.

Exhibitions Katie Gilbert Exhibitions Manager Tel: 020 7017 6310 e-mail: katie.gilbert@tandf.co.uk

Reanna Young International Sales Support Coordinator Tel: +44 (0) 20 7017 6114 Fax: +44 (0) 20 7017 6748 e-mail: reanna.young@tandf.co.uk

Caribbean and The West Indies

New Zealand

Middle East and North Africa

Jasmina Basic Area Sales Manager Milton Park Sales Office Tel: +44 (0) 20 7017 6187 Fax: +44 (0) 20 7017 6748 e-mail: jasmina.basic@tandf.co.uk

Macmillan Publishers NZ Ltd Victoria Johnson 6 Ride Way, Albany, Auckland, NZ Tel: +64 9414 0350 Fax: +64 9414 0357 e-mail: vicki@macmillan.co.nz

Australasia

Australia and New Zealand

Jasmina Basic Area Sales Manager – Middle East and Africa Milton Park Sales Office Tel: +44 (0) 20 7017 6187 Fax: +44 (0) 20 7017 6748 e-mail: jasmina.basic@tandf.co.uk Zoe Kaviani IPS (Middle East) Ltd P.O. Box 27533 Dubai, UAE Tel: +971 4 282 8801 Fax: +971 4 282 8804 e-mail: itpme@emirates.net.ae Website: http://www.ipsme.com

Kate Pearce Milton Park Sales Office Tel: +44 (0) 20 7017 6053 Fax: +44 (0) 20 7017 6748 e-mail: kate.pearce@tandf.co.uk

Australia Palgrave Macmillan Level 1, 15-19 Claremont Street, South Yarra Melbourne, Vic 3141, Australia Tel: +61 3 9825 1111 Fax: +61 3 9825 1010 e-mail: palgrave@macmillan.com.au www.palgravemacmillan.com.au

CRC Press and Marcel Dekker only Libraries may wish to order from their local bookseller, Palgrave Macmillan or DA Information Services Pty Ltd 648 Whitehorse Road, Mitcham Victoria, Australia Tel: +61 3 9210 7804 Fax: +61 3 9210 7788 www.dadirect.com.au

Australia Europa Publications (non-exclusive) James Bennett 3 Narabang Way, Belrose, NSW 2085 Australia Tel: +02 9986 7064 Fax: +02 9986 7030 www.bennett.com.au

Rest of Africa Jasmina Basic Area Sales Manager – Middle East and Africa Milton Park Sales Office

12/19/08 10:26:30 AM


Nigeria

Korea

Europe

England and Wales

Chinke Ojiji Publishers Support Services Ltd Plot 2 Adewunmi Estate Oregun Road (Near First Bank Oregun) PO Box 9270, Ikeja, Lagos State Tel: +234 1 774 1073 Fax: +234 1 493 0419 e-mail: chinkeojiji@yahoo.co.uk

Se-Yung Jun ICK (Information & Culture Korea) 473-19 Seokyo-dong, Mapo-ku Seoul, Korea 121-842 Tel: +82 2 3141-4791 Fax: +82 2 3141-7733 e-mail: cs.ick@ick.co.kr

Peter Havinga European Sales Manager A. Hofmanweg 5a, 2031 BH Haarlem The Netherlands Tel: +31 (0) 23 750 5730 Fax: +31 (0) 23 750 5701 Mobile: +31 (0) 6 515 69560 e-mail: peter.havinga@tandf.co.uk

London (East, Northwest, North) and Eastern England

Botswana

For all Taylor & Francis Group imprints please order from our Singapore Sales Office Singapore Sales Office Taylor & Francis Asia Pacific 240 Macpherson Road #08–01 Pines Industrial Building Singapore 348574 Tel: +65 6741 5166 Fax: +65 6742 9356 e-mail: sales@tandf.com.sg

Belgium, The Netherlands, France and Luxembourg

Southern England

South Africa, Namibia, Lesotho and Swaziland Michelle Symington Book Promotions Ltd BMD Office Park, 108 De Waal Road Diep River, 7800 Cape Town South Africa Tel: +27 21 707 5700 General Fax: +27 21 707 5795 Orders Fax: +27 21 707 5794 e-mail: msymingtom@bookpro.co.za

South Asia Ryan Cooper Area Sales Manager Milton Park Sales Office Tel: +44 (0) 20 7017 6113 Fax: +44 (0) 20 7017 6748 e-mail: ryan.cooper@tandf.co.uk

India Taylor & Francis Books India Pvt Ltd. 912 Tolstoy House 15-17, Tolstoy Marg New Delhi 110 001 Tel: +91 (0) 11 2371 2131 +91 (0) 11 2335 1453 Fax: +91 (0) 11 2371 2132 e-mail: tandfindia@airtelbroadband.in

Pakistan M. Anwer Iqbal Book Bird Mian Chambers, 3 Temple Road PO Box 518, Lahore, Pakistan Tel: +92 42 636 7275 Fax: +92 42 636 1370 e-mail: bookbird@brain.net.pk

Sri Lanka Nirosha Saravanapavan e-mail: niroshas@sltnet.lk Mobile: 0094 714 750911

Japan Hans Van Ess Book Sales and Marketing Executive Taylor & Francis Group 7F Koshin Bldg. 2-23-4 Kanda-Jimbocho Chiyoda, Tokyo 101-0051, Japan Tel: +81 (0) 3 5848 7061 Mobile: +81 (0) 80 5426 3552 e-mail: hans.vaness@informa.com United Publishers Services Limited 1-32-5 Higashi-shinagawa Shinagawa-ku, Tokyo 140-0002 Tel: +81 (0) 3 5479 7251 Fax: +81 (0) 3 5479 7307 e-mail: info@ups.co.jp Editorial Office Takahiko Kaneko Edition Synapse Yamaguchi Bldg. 3F 2-8-5 Uchikanda Chiyoda-Ku, Tokyo 101 0047, Japan Tel: +81 (0) 3 5296 9186 Fax: +81 (0) 3 3252 1822 e-mail: edsynapse@nifty.ne.jp

CATITB_K00163_2009 Cat.indd 127

Hong Kong and Vietnam

Jeffrey Lim, Books Sales Director Singapore Sales Office e-mail: jeffrey.lim@tandf.com.sg

Singapore, Philippines and Indonesia

Francis Chua, Sales Manager Singapore Sales Office e-mail: francis.chua@tandf.com.sg

Thailand

Taylor & Francis Asia Pacific Tel: +66 (2) 6427954-6 ext. 406 Fax: +66 (2) 6427677 Jeffrey Lim, Books Sales Director e-mail: jeffrey.lim@tandf.com.sg Nonglak Sawaithong, Sales Executive e-mail: s.nonglak@tandf.com.sg

Malaysia and Brunei

David Yeong General Manager Taylor & Francis Publishing Services Taylor & Francis Asia Pacific No. 23-2, Jalan PJS 8/18 Dataran Mentari, 46150 Petaling Jaya, Selangor Darul Ehsan, Malaysia Tel: +60 (3) 5630 1361 Fax: +60 (3) 5360 1732 Mobile: +60 (0) 16 331 9912 e-mail: david.yeong@tandf.com.sg

Taiwan

Taylor & Francis Asia Pacific Tel: +886 (2) 2578 6106 ext.125 Fax: +886 (2) 2578 6507 Mobile: +886 (9) 7216 9672 Jeffrey Lim, Books Sales Director e-mail: jeffrey.lim@tandf.com.sg Raymond Hsu, Sales Executive e-mail: raymond.hsu@tandf.com.sg

China

Taylor & Francis Room 903, Resource Building No.151 North Street Zhongguancun, Beijing, China 100080 Tel/Fax: +86 (10) 58876523 Jeffrey Lim, Books Sales Director e-mail: jeffrey.lim@tandf.com.sg Cynthia Ji, Sales & Marketing Executive e-mail: cynthia.ji@tandf.com.sg

Israel and the Palestinian Territories Ryan Cooper Area Sales Manager Milton Park Sales Office Tel: +44 (0) 20 7017 6113 Fax: +44 (0) 20 7017 6748 e-mail: ryan.cooper@tandf.co.uk and Rodney Franklin Franklin’s International PO BOX 3772 7, Tel Aviv 61376, Israel Tel: +972 356 00724 Fax: +972 356 00479 e-mail: rodneyf@netvision.net.il

Liza Walraven Sales Representative A. Hofmanweg 5a, 2031 BH Haarlem The Netherlands Tel: 0031 (0) 23 750 5731 Fax: 0031 (0) 23 750 5701 Mobile: 0031 (0) 6 238 49668 e-mail: liza.walraven@informa.com

Greece Ryan Cooper Area Sales Manager Milton Park Sales Office Tel: +44 (0) 20 7017 6113 Fax: +44 (0) 20 7017 6748 e-mail: ryan.cooper@tandf.co.uk

Nordic Countries Keith Gray Sales Representative Taylor & Francis Group c/o IBC Euroforum Blegdamsvej 104A, 2100 Copenhagen ø Denmark Tel: +45 4195 1428 Mobile: +45 6064 8041 e-mail: keith.gray@informa.com

Nordic Countries Sara Pellijeff Sales Representative Taylor & Francis Group Kungsbroplan 3A, Box 7022 112 27 Stockholm, Sweden Tel: +46 (0)8 440 80 58 Fax: + 46 (0)8 587 662 40 Mobile: +46 (0) 709 965 860 e-mail: sara.pellijeff@informa.com

Germany, Austria and Switzerland Eva Kneissl Area Sales Manager

Daphne Edwards Area Representative Mobile: 07802 536 233 Tel: +44 (0) 20 7017 6259 e-mail: daphne.edwards@tandf.co.uk

Oxfordshire, West Midlands and South Wales John Blake Area Representative Mobile: 07889 263 857 Fax: 01242 228 691 e-mail: john.blake@tandf.co.uk

North and Northwest England Lucy Greaves Area Representative Mobile: 07860 633156 Fax: 01663 746682 e-mail: lucy.greaves@tandf.co.uk

London (EC, SE, SW, W and WC) Charlotte Westgate Area Representative Mobile: 07917 648040 e-mail: charlotte.westgate@tandf.co.uk

Scotland and North of England To be confirmed. Please contact: Nick Perry Area Representative Tel: +44 (0) 20 7017 6132 Fax: +44 (0) 20 7017 6732 e-mail: nick.perry@tandf.co.uk

Ireland and Northern Ireland Conor Graham / Michael Darcy Brookside Publishing Services 2 Brookside, Dundrum Road, Dublin 14 Tel: 00 353 1 298 9937 Fax: 00 353 1 298 7912 e-mail: sales@brookside.ie

(Maternity leave cover for Gabriela Mauch)

Library Supply

Spain, Portugal, and Italy

Nigel Berkeley Library Supply and London Key Accounts Manager Mobile: 07795 968206 e-mail: nigel.berkeley@tandf.co.uk

Mobile: +49 (0) 173905 9469 e-mail: eva.kneissl@informa.com

Philip Veysey Area Sales Manager Príncipe de Vergara 109, 28002 Madrid, Spain Tel: +34 91 700 0688 Fax: +34 91 141 2304 Mobile: +34 68 777 3678 e-mail: philip.veysey@informa.com

Eastern Europe

Sales Agents

Carlson Moilwa Sales Manager Book Promotions/Horizon Books Botswana Gaborone International Finance Park Plot 113-114, Unit 33, Kgale Mews 2, Suite 3 Gaborone, Botswana Tel: + 267 392 4901 Fax: + 267 392 4908 e-mail: crm@vbn.co.bw

East and Southeast Asia

Bob Davis Senior Area Representative Mobile: 07889 263 856 Fax: 01621 819 833 e-mail: bob.davis@tandf.co.uk

127

Online Retailers Rod Abraham Assistant UK Sales Manager Mobile: 07860 380 814 Fax: 01372 273 744 e-mail: rod.abraham@tandf.co.uk

Marek Lewinson (Humanities and Social Sciences) Bohaterewicza 3/45 03-982 Warsaw, Poland Tel/fax: +48 (0) 22 6714819 Mobile: +48 (0) 602 707 037 e-mail: mlewinso@it.com.pl Radek Janousek (Science and Technology) Pod Nouzovem 972/21 197 00 Prague, Czech Republic Tel: +42 (0) 28 658 49888 Mobile: +42 (0) 602294014 e-mail: radek@mareklewinson.com

12/19/08 10:26:30 AM


ORDER FORM 1

2

BILL TO Name_____________________________________________________________

Name_____________________________________________________________

Title______________________________________________________________

Title______________________________________________________________

Organization________________________________________________________

Organization________________________________________________________

Address___________________________________________________________

Address___________________________________________________________

City________________________________State/Province___________________

City________________________________State/Province___________________

Country__________________________ Zip/Postal Code____________________

Country__________________________ Zip/Postal Code____________________

Daytime Phone (

Daytime Phone (

)_____________________ Fax ( (Required to Process Order)

)__________________

e-Mail Address______________________________________________________

Order Form 128

SHIP TO (Fill in only if different than box 1)

3

)_____________________ Fax (

)__________________

e-Mail Address______________________________________________________

Please send me the following: ISBN NO.

4

QUANTITY

TITLE

PRICE EACH 

TOTAL PRICE

Subtotal

Method of Payment

Tax o I’ve enclosed check #_____________________ payable to CRC Press LLC

Shipping Charges

o Bill My Company (Purchase Order Attached) o Please Charge to: o MasterCard

o VISA

Order Total

o American Express

CARD NO.

Exp. Date MO.

Sec. Code YR.

Signature _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Phone Number _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ (Signature and Phone Number Required to Process Order)

SHIPPING AND HANDLING Region Delivery Time First Title Additional Title For expedited USA (continental) 3-5 days $4.99 $1.99 shipping, Alaska, Hawaii, Puerto Rico 4-5 days $14.99 $2.99 call your nearest Canada 3-7 days $7.99 $1.99 CRC PRESS Latin America varies by region $9.99 $2.99 office Rest of the World varies by region call for pricing

Ordering Locations Rest of the World: In the Americas: CRC PRESS / BOOKPOINT CRC PRESS

PO Box 409267 Atlanta, GA 30384-9267 Tel: 1-800-634-7064 Fax: 1-800-248-4724 From Outside the Continental U.S. Tel: 1-561-994-0555 Fax: 1-561-361-6018 e-mail: orders@taylorandfrancis.com

CATITB_K00163_2009 Cat.indd 128

130 Milton Park Abingdon, Oxon, OX14 4SB, UK Tel: +44 (0) 1235 400 524 Fax: +44 (0) 1235 400 525 e-mail: (UK): uk.trade@tandf.co.uk (Int’l): international@tandf.co.uk

Corporate Offices CRC PRESS CRC PRESS UK

6000 Broken Sound Parkway, NW, Suite 300 Albert House, 4th floor Boca Raton, FL 33487, USA 1 - 4 Singer Street Tel: 1-800-272-7737 London EC2A 4BQ Fax: 1-800-374-3401 UK From Outside the Continental U.S. Tel: 44 (0) 20 7017 6000 Tel: 1-561-994-0555 Fax: 44 (0) 20 7017 6747 Fax: 1-561-361-6018 e-mail: enquiries@crcpress.com e-mail: orders@taylorandfrancis.com

www.crcpress.com

12/19/08 10:26:31 AM


The following sectional catalogs are available from CRC Press. For a copy, please contact your local representative or CRC Press office. Agricultural and Life Sciences Catalog no. CATAGL • ISBN: 978-0-8493-3864-9

Biomedical Science and Engineering Catalog no. CATBMS • ISBN: 978-0-8493-3866-3

Business, Management and Public Administration Catalog no. CATBMP • ISBN: 978-0-8493-9175-0

Chemistry and Chemical Engineering Catalog no. CATSPC • ISBN: 978-0-8493-3867-0

Civil and Mechanical Engineering Catalog no. CATMCE • ISBN: 978-0-8493-3880-9

Computer Science and Information Technology Catalog no. CATITB • ISBN: 978-0-8493-3878-6

Electrical Engineering Catalog no. CATEEC • ISBN: 978-0-8493-3869-4

Environmental Science and Engineering Catalog no. CATEVE • ISBN: 978-0-8493-3874-8

Food Science and Nutrition

Taylor & Francis Group Pioneers in Publishing Grounded in a century-long tradition of publishing excellence, CRC Press Taylor & Francis continues to provide our world with the resources needed to promote human progress and meet the challenges that might stand in the way of that progress. Producers of printed handbooks, textbooks, tutorials, and field guides, as well as e-books, online libraries, and interactive databases, CRC Press is a full service print and electronic publisher committed to recording the accomplishments and supporting the work of the world’s leading practitioners and researchers. It’s no coincidence that many of the issues in today’s headlines read like a list of CRC new releases… from five or even ten years ago. Just as it’s never been a coincidence that the fields of inquiry our authors pursue today often bear the greatest fruit tomorrow. Whether its advancing agriculture yield, improving infrastructure, developing clean and green alternatives, retrofitting industry, reorganizing healthcare, securing our homeland, streamlining public administration, or defining just who we are and where we are going, CRC has the resources and references to turn students into professionals and leaders, researchers into innovators and pioneers. In the classroom, in the laboratory, and out in the field, wherever challenges are being met by research, ingenuity, and determination, you will find those who create and rely on the authoritative content that is the power of CRC Press.

INVITATION TO AUTHORS

Catalog no. CATFSN • ISBN: 978-0-8493-3876-2

If you have an idea for a book or a manuscript in progress relevant to any scientific, technical, or business discipline, CRC Press is interested. Please visit our authors Web site at www.crcpress.com/authors for more information, or contact:

Forensic Science, Law Enforcement, and Homeland Security

John Lavender, Senior VP Publishing 561-994-0555 • john.lavender@taylorandfrancis.com

Catalog no. CATFSC • ISBN: 978-0-8493-3877-9

Human Factors and Ergonomics / Industrial Engineering and Manufacturing

To order, visit us online at

Catalog no. CATHFI • ISBN: 978-0-8493-3875-5

Mathematics and Statistics Catalog no. CATMTS • ISBN: 978-0-8493-3879-3

Nanoscience and Technology / CleanTech Catalog no. CATMSN • ISBN: 978-0-8493-3885-4

Physics / Materials Science Catalog no. CATPHY • ISBN: 978-0-8493-9176-7

Or contact us via the following numbers: North & South America: From inside the US: Phone: 1-800-272-7737 Fax: 1-800-374-3401 Outside the US: Phone: 1-561-994-0555 Fax: 1-561-361-6018 Rest of the World Bookpoint Tel: +44 (0)1235 400400 • Fax: +44 (0)1235 400401


Computer Science and Information Technology  

Annual catalog featuring all titles in computer science and information technology.

Read more
Read more
Similar to
Popular now
Just for you