Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

A Mini-History Of Computing, George K. Thiruvathukal Oct 2016

A Mini-History Of Computing, George K. Thiruvathukal

George K. Thiruvathukal

This book was produced by George K. Thiruvathukal for the American Institute of Physics to promote interest in the interdisciplinary publication, Computing in Science and Engineering. It accompanied a limited edition set of playing cards that is no longer available (except in PDF). This book features a set of 54 significant computers by era/category, including ancient calculating instruments, pre-electronic mechanical calculators and computers, electronic era computers, and modern computing (minicomputers, maniframes, personal computers, devices, and gaming consoles).


Teleradiology As A Foundation For An Enterprise-Wide Health Care Delivery System, John David N. Dionisio, Ricky K. Taira, Usha Sinha, David B. Johnson, Benjamin Y. Dai, Gregory H. Tashima, Stephen Blythe, Richard Johnson, Hooshang Kangarloo Aug 2015

Teleradiology As A Foundation For An Enterprise-Wide Health Care Delivery System, John David N. Dionisio, Ricky K. Taira, Usha Sinha, David B. Johnson, Benjamin Y. Dai, Gregory H. Tashima, Stephen Blythe, Richard Johnson, Hooshang Kangarloo

John David N. Dionisio

An effective, integrated telemedicine system has been developed that allows (a) teleconsultation between local primary health care providers (primary care physicians and general radiologists) and remote imaging subspecialists and (b) active patient participation related to his or her medical condition and patient education. The initial stage of system development was a traditional teleradiology consultation service between general radiologists and specialists; this established system was expanded to include primary care physicians and patients. The system was developed by using a well-defined process model, resulting in three integrated modules: a patient module, a primary health care provider module, and a specialist module. …


Integrated Multimedia Timeline Of Medical Images And Data For Thoracic Oncology Patients, Denise R. Aberle, John David N. Dionisio, Michael F. Mcnitt-Gray, Ricky K. Taira, Alfonso F. Cárdenas, Jonathan G. Goldin, Kathleen Brown, Robert A. Figlin, Wesley W. Chu Aug 2015

Integrated Multimedia Timeline Of Medical Images And Data For Thoracic Oncology Patients, Denise R. Aberle, John David N. Dionisio, Michael F. Mcnitt-Gray, Ricky K. Taira, Alfonso F. Cárdenas, Jonathan G. Goldin, Kathleen Brown, Robert A. Figlin, Wesley W. Chu

John David N. Dionisio

A prototype multimedia medical database has been developed to provide image and textual data for thoracic oncology patients undergoing treatment of advanced malignancies. The database integrates image data from the hospital pieture archiving and communication system with textual reports from the radiology information system, alphanumeric data contained in the hospital information system, and other electronic medical data. The database presents information in a timeline format and also contains visualization programs that permit the user to view and annotate radiographic measurements in tabular or graphic form. The database provides an efficient and intuitive display of the changing status of oncology patients. …


Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord May 2014

Principles Of Incident Response And Disaster Recovery, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Are you ready to respond to an unauthorized intrusion to your computer network or server? Principles of Incident Response and Disaster Recovery presents methods to identify vulnerabilities and take appropriate countermeasures to prevent and mitigate failure risks for an organization. Not only does book present a foundation in disaster recovery principles and planning, but it also emphasizes the importance of incident response minimizing prolonged downtime that can potentially lead to irreparable loss. This book is the first of its kind to address the overall problem of contingency planning rather than focusing on specific tasks of incident response or disaster recovery.


Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 1st Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security is designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security. This text takes a "view from the top" and presents important information for future managers regarding information security. The material covered in this text is often part of a capstone course in an information security.


Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Information security-driven topic coverage is the basis for this updated book that will benefit readers in the information technology and business fields alike. Management of Information Security, provides an overview of information security from a management perspective, as well as a thorough understanding of the administration of information security. Written by two Certified Information Systems Security Professionals (CISSP), this book has the added credibility of incorporating the CISSP Common Body of Knowledge (CBK), especially in the area of information security management. The second edition has been updated to maintain the industry currency and academic relevance that made the previous edition …


Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden May 2014

Guide To Firewalls And Network Security: Intrusion Detection And Vpns, 2nd Edition, Michael Whitman, Herbert Mattord, Richard Austin, Greg Holden

Herbert J. Mattord

Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus software, intrusion detection systems, and other tools. This book aims to explore firewalls in the context of these other elements, providing readers with a solid, in-depth introduction to firewalls that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file …


Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Explore the field of information security and assurance with this valuable resource that focuses on both the managerial and technical aspects of the discipline. Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the …


Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord May 2014

Management Of Information Security, 3rd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger …


Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 2nd Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Principles of Information Security examines the field of information security to prepare information systems students for their future roles as business decision-makers. This textbook presents a balance of the managerial and the technical aspects of the discipline and addresses knowledge areas of the CISSP (Certified Information Systems Security Professional) certification throughout. The authors discuss information security within a real-world context, by including examples of issues faced by today's professionals and by including tools, such as an opening vignette and "Offline" boxes with interesting sidebar stories in each chapter. Principles of Information Security also offers extensive opportunities for hands-on work.


Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord May 2014

Roadmap To Information Security: For It And Infosec Managers, Michael Whitman, Herbert Mattord

Herbert J. Mattord

Roadmap to Information Security: For IT and Infosec Managers provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on …


Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green May 2014

Guide To Firewalls And Vpns, 3rd Edition, Michael Whitman, Herbert Mattord, Andrew Green

Herbert J. Mattord

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools. GUIDE TO FIREWALLS AND VPNs, THIRD EDITION explores firewalls in the context of these critical elements, providing an in-depth guide that focuses on both managerial and technical aspects of security. Coverage includes packet filtering, authentication, proxy servers, encryption, bastion hosts, virtual private networks (VPNs), log file maintenance, and intrusion detection systems. The book …


Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord May 2014

Principles Of Information Security, 4th Edition, Michael Whitman, Herbert Mattord

Herbert J. Mattord

The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information security, discussions on risk management and security technology, current certification information, and more. The text builds on internationally-recognized standards and bodies of knowledge to provide the knowledge and skills students need for their future roles as business decision-makers. Information security in the modern organization is a management issue which technology alone cannot answer; it is a problem that has important …


Editorial: High-Tech Lust, Katina Michael May 2013

Editorial: High-Tech Lust, Katina Michael

Professor Katina Michael

Are you in love with your Android or Apple device? Do you have a deep affection and suffer from separation anxiety [1] when your smartphone is not within arm’s length of your bed at night?

Don’t worry, you’re not alone. Rossiter [1] differentiates between “brand love” and “brand liking” which is significant. When it comes to our high-tech gadgetry people are likely to be able to cope better with being separated from a partner or child than being separated from a vital piece of technology which goes with them everywhere.


Parsing Combinatory Categorial Grammar Via Planning In Answer Set Programming, Yuliya Lierler, Peter Schueller Dec 2011

Parsing Combinatory Categorial Grammar Via Planning In Answer Set Programming, Yuliya Lierler, Peter Schueller

Yuliya Lierler

Essay, Parsing Combinatory Categorial Grammar via Planning in Answer Set Programming, from Correct reasoning: essays on logic-based AI in honour of Vladimir Lifschitz, co-authored by Yuliya Lierler, UNO faculty member.
Combinatory categorial grammar (CCG) is a grammar formalism used for natural language parsing. CCG assigns structured lexical categories to words and uses a small set of combinatory rules to combine these categories to parse a sentence. In this work we propose and implement a new approach to CCG parsing that relies on a prominent knowledge representation formalism, answer set programming (ASP) - a declarative programming paradigm. We formulate the …


Its Training Update, Veronica Trammell Dec 2011

Its Training Update, Veronica Trammell

Veronica O. Trammell

No abstract provided.


Using Computers To Support Children As Authors: An Examination Of Three Cases, Lisa Kervin, Jessica Mantei Dec 2011

Using Computers To Support Children As Authors: An Examination Of Three Cases, Lisa Kervin, Jessica Mantei

Jessica Mantei

The changing nature of literacy is well documented within the literature, challenging educators to examine their pedagogies in light of the needs of learners in the current climate. The development and creation of non‐linear texts within primary classrooms is of current interest as they reflect the types of texts accessed and created by users of technology and afford children opportunities to make connections between their in and out of school literacy experiences. The authors observed children over extended periods as they collaborated with teachers and peers to author non‐linear texts for a range of purposes. Three case studies will be …


Challenges Before Traditional Media In The Age Of Digital Media-How To Integrate It With Digital Media-The Way Ahead, Ratnesh Dwivedi Mr Mar 2011

Challenges Before Traditional Media In The Age Of Digital Media-How To Integrate It With Digital Media-The Way Ahead, Ratnesh Dwivedi Mr

Ratnesh Dwivedi

You may have heard of digital media, but you may have no idea what it is and how it can help you out when it comes to marketing. It's definitely important that you get up to speed so you can use this to benefit your business. Basically digital media refers to any type of electronic media out there. Today media can be accessed in many ways, including with hand held devices like mobile phones, laptops, desktops, mp3 players, and more.Digital media must be stored in an electronic way, so there is a lot of digital content on the internet today, …