Machine-to-Machine Marketing (M3) via Anonymous Advertising Apps Anywhere Anytime (A5)


Book Description

In today's wireless environment, marketing is more frequently occurring at the server-to-device level-with that device being anything from a laptop or phone to a TV or car. In this real-time digital marketplace, human attributes such as income, marital status, and age are not the most reliable attributes for modeling consumer behaviors. A more effe




Security for Wireless Sensor Networks using Identity-Based Cryptography


Book Description

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.




Reducing Process Costs with Lean, Six Sigma, and Value Engineering Techniques


Book Description

A company with effective cost reduction activities in place will be better positioned to adapt to shifting economic conditions. In fact, it can make the difference between organizations that thrive and those that simply survive during times of economic uncertainty. Reducing Process Costs with Lean, Six Sigma, and Value Engineering Techniques covers







Smart Phone and Next Generation Mobile Computing


Book Description

This in-depth technical guide is an essential resource for anyone involved in the development of "smart mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. Smart Phone and Next-Generation Mobile Computing shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur. - Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side - Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs - Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux - Considers the limitations of existing terminal designs and several pressing application design issues - Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks - Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing




The Linux Command Line, 2nd Edition


Book Description

You've experienced the shiny, point-and-click surface of your Linux computer--now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book's short, easily-digestible chapters, you'll learn how to: • Create and delete files, directories, and symlinks • Administer your system, including networking, package installation, and process management • Use standard input and output, redirection, and pipelines • Edit files with Vi, the world's most popular text editor • Write shell scripts to automate common or boring tasks • Slice and dice text files with cut, paste, grep, patch, and sed Once you overcome your initial "shell shock," you'll find that the command line is a natural and expressive way to communicate with your computer. Just don't be surprised if your mouse starts to gather dust.




Management Information Systems


Book Description

Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.




Models in Microeconomic Theory


Book Description

Models in Microeconomic Theory covers basic models in current microeconomic theory. Part I (Chapters 1-7) presents models of an economic agent, discussing abstract models of preferences, choice, and decision making under uncertainty, before turning to models of the consumer, the producer, and monopoly. Part II (Chapters 8-14) introduces the concept of equilibrium, beginning, unconventionally, with the models of the jungle and an economy with indivisible goods, and continuing with models of an exchange economy, equilibrium with rational expectations, and an economy with asymmetric information. Part III (Chapters 15-16) provides an introduction to game theory, covering strategic and extensive games and the concepts of Nash equilibrium and subgame perfect equilibrium. Part IV (Chapters 17-20) gives a taste of the topics of mechanism design, matching, the axiomatic analysis of economic systems, and social choice. The book focuses on the concepts of model and equilibrium. It states models and results precisely, and provides proofs for all results. It uses only elementary mathematics (with almost no calculus), although many of the proofs involve sustained logical arguments. It includes about 150 exercises. With its formal but accessible style, this textbook is designed for undergraduate students of microeconomics at intermediate and advanced levels.




The Next Digital Decade


Book Description




Computer Networks


Book Description