Web Application Design and Implementation uses a hands-on approach of the major technologies and programming languages to teach readers web development. Providing an understanding of all major aspects of web programming in order to achieve the construction of a database-driven website, the book features state-of-the-art programming...
The only book to offer special coverage of the fundamentals of multicore DSP for implementation on the TMS320C66xx SoC
This unique book provides readers with an understanding of the TMS320C66xx SoC as well as its constraints. It offers critical analysis of each element, which not only broadens their knowledge of...
The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...
Streamline data analysis with an intuitive, visual Six Sigma strategy
Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...
This book examines the Internet of Things (IoT) and Data Analytics from a technical, application, and business point of view.
Internet of Things and Data Analytics Handbook describes essential technical knowledge, building blocks, processes, design principles, implementation, and marketing...
The use of computation and simulation has become an essential part of the scientific process. Being able to transform a theory into an algorithm requires significant theoretical insight, detailed physical and mathematical understanding, and a working level of competency in programming.
This book provides an introduction to concurrent, real-time, distributed programming with Java object-oriented language support as an algorithm description tool. It describes in particular the mechanisms of synchronization (cooperative and competitive) and sharing of data (internal class, static variables) between threads in Java. He...
This second edition of the fully revised and updated From Photon to Pixel presents essential elements in modern digital photographic devices. Our universal infatuation with photography profoundly affects its usage and development.
While some sides of photographic “culture” remain wholly unchanged – art photography,...
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...
An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies
DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...
Even if the NFC standard is young (developed in 2004), I have
been asked to write this book for several years now, due to the
pioneering role played in France (and in Europe) by our Computer
Science Master’s degree MBDS (www.mbds-fr.org) at the University
of Nice – Sophia-Antipolis around the prototyping of innovative...