Browse Results

Showing 20,826 through 20,850 of 53,917 results

The TCP/IP Guide

by Charles M. Kozierok

From Charles M. Kozierok, the creator of the highly regarded www.pcguide.com, comes The TCP/IP Guide. This completely up-to-date, encyclopedic reference on the TCP/IP protocol suite will appeal to newcomers and the seasoned professional alike. Kozierok details the core protocols that make TCP/IP internetworks function and the most important classic TCP/IP applications, integrating IPv6 coverage throughout. Over 350 illustrations and hundreds of tables help to explain the finer points of this complex topic. The book’s personal, user-friendly writing style lets readers of all levels understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet, and much more.The TCP/IP Guide is a must-have addition to the libraries of internetworking students, educators, networking professionals, and those working toward certification.

Webbots, Spiders, and Screen Scrapers, 2nd Edition

by Michael Schrenk

There's a wealth of data online, but sorting and gathering it by hand can be tedious and time consuming. Rather than click through page after endless page, why not let bots do the work for you?Webbots, Spiders, and Screen Scrapers will show you how to create simple programs with PHP/CURL to mine, parse, and archive online data to help you make informed decisions. Michael Schrenk, a highly regarded webbot developer, teaches you how to develop fault-tolerant designs, how best to launch and schedule the work of your bots, and how to create Internet agents that:–Send email or SMS notifications to alert you to new information quickly–Search different data sources and combine the results on one page, making the data easier to interpret and analyze–Automate purchases, auction bids, and other online activities to save timeSample projects for automating tasks like price monitoring and news aggregation will show you how to put the concepts you learn into practice.This second edition of Webbots, Spiders, and Screen Scrapers includes tricks for dealing with sites that are resistant to crawling and scraping, writing stealthy webbots that mimic human search behavior, and using regular expressions to harvest specific data. As you discover the possibilities of web scraping, you'll see how webbots can save you precious time and give you much greater control over the data available on the Web.

The Rust Programming Language

by Steve Klabnik Carol Nichols

The Rust Programming Language is the official book on Rust, an open-source, community-developed systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety. This is the undisputed go-to guide to Rust, written by two members of the Rust core team, with feedback and contributions from 42 members of the community. The book assumes that you’ve written code in another programming language but makes no assumptions about which one, meaning the material is accessible and useful to developers from a wide variety of programming backgrounds. <P><P>Known by the Rust community as “The Book,” The Rust Programming Language includes concept chapters, where you’ll learn about a particular aspect of Rust, and project chapters, where you’ll apply what you’ve learned so far to build small programs. <P> The Book opens with a quick hands-on project to introduce the basics then explores key concepts in depth, such as ownership, the type system, error handling, and fearless concurrency. Next come detailed explanations of Rust-oriented perspectives on topics like pattern matching, iterators, and smart pointers, with concrete examples and exercises--taking you from theory to practice. The Rust Programming Language will also show you how to:- Grasp important concepts unique to Rust, like ownership, borrowing, and lifetimes- Use Cargo, Rust’s built-in package manager, to build and maintain your code, including downloading and building dependencies- Effectively use Rust’s zero-cost abstractions and employ your own You’ll learn to develop reliable code that’s speed and memory efficient, while avoiding the infamous and arcane programming pitfalls common at the systems level. When you need to dive down into lower-level control, this guide will show you how without taking on the customary risk of crashes or security holes and without requiring you to learn the fine points of a fickle toolchain. You’ll also learn how to create command line programs, build single- and multithreaded web servers, and much more. The Rust Programming Language fully embraces Rust’s potential to empower its users. This friendly and approachable guide will help you build not only your knowledge of Rust but also your ability to program with confidence in a wider variety of domains.

PoC or GTFO, Volume 2

by Manul Laphroaig

PoC or GTFO, Volume 2 follows-up the wildly popular first volume with issues 9-13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays.The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This second collected volume holds all of the articles from releases nine to thirteen.Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under Linux. How to slow the Windows kernel when exploiting a race condition and how to make a PDF file taht is also an Android app, an audio file, or a Gameboy speedrun. How to hack a Wacom pen table with voltage glitching, then hack it again by pure software to read RDID tags from its surface. How to disassemble every last byte of an Atari game and how to bypass every classic form of copy protection on Apple ][.But above all else, beyond the nifty tricks and silly songs, this book exists to remind you what a clever engineer can build from a box of parts with a bit of free time. Not to show you what others have done, but to show you how they did it so that you can do the same.

Agile for Everybody: Creating Fast, Flexible, and Customer-First Organizations

by Matt LeMay

The Agile movement provides real, actionable answers to the question that keeps many company leaders awake at night: How do we stay successful in a fast-changing and unpredictable world? Agile has already transformed how modern companies build and deliver software. This practical book demonstrates how entire organizations—from product managers and engineers to marketers and executives—can put Agile to work.Author Matt LeMay explains Agile in clear, jargon-free terms and provides concrete and actionable steps to help any team put its values and principles into practice. Examples from a wide variety of organizations, including small nonprofits and global financial enterprises, bring to life the on-the-ground realities of Agile across industries and functions.Understand exactly what Agile is and why it mattersUse Agile to address your organization’s specific needs and goalsTake customer centricity from theory into practiceStop wasting time in "report and critique" meetings and start making better decisionsCreate a harmonious cycle of learning, collaborating, and deliveringLearn from Agile experts at companies like IBM, Spotify, and Coca-Cola

Pro Angular 6

by Adam Freeman

Get the most from Angular 6, the leading framework for building dynamic JavaScript applications. Understand the MVC pattern and the benefits it can offer.Best-selling author Adam Freeman shows you how to use Angular in your projects, starting from the nuts and bolts and building up to the most advanced and sophisticated features, going in-depth to give you the knowledge you need. Chapters include common problems and how to avoid them.What You’ll LearnGain a solid architectural understanding of the MVC PatternCreate rich and dynamic web app clients using Angular 6Use the ng tools to create and build an Angular projectExtend and customize Angular 6Test your Angular 6 projectsWhat's New in This EditionRevised for the features and changes in Angular 6Covers @angular/cli, ng command line tools, and WebPackIncludes HttpClient for simplified asynchronous HTTP requestsPresents updates to pipes and localized text displayWho This Book Is ForWeb developers with a foundation knowledge of HTML and JavaScript who want to create rich client-side applications

Large Scale Hierarchical Classification: State of the Art (SpringerBriefs in Computer Science)

by Azad Naik Huzefa Rangwala

This SpringerBrief covers the technical material related to large scale hierarchical classification (LSHC). HC is an important machine learning problem that has been researched and explored extensively in the past few years. In this book, the authors provide a comprehensive overview of various state-of-the-art existing methods and algorithms that were developed to solve the HC problem in large scale domains. Several challenges faced by LSHC is discussed in detail such as: 1. High imbalance between classes at different levels of the hierarchy 2. Incorporating relationships during model learning leads to optimization issues 3. Feature selection 4. Scalability due to large number of examples, features and classes 5. Hierarchical inconsistencies 6. Error propagation due to multiple decisions involved in making predictions for top-down methods The brief also demonstrates how multiple hierarchies can be leveraged for improving the HC performance using different Multi-Task Learning (MTL) frameworks. The purpose of this book is two-fold: 1. Help novice researchers/beginners to get up to speed by providing a comprehensive overview of several existing techniques. 2. Provide several research directions that have not yet been explored extensively to advance the research boundaries in HC. New approaches discussed in this book include detailed information corresponding to the hierarchical inconsistencies, multi-task learning and feature selection for HC. Its results are highly competitive with the state-of-the-art approaches in the literature.

Does Digital Transformation of Government Lead to Enhanced Citizens’ Trust and Confidence in Government? (Springer Theses)

by Mohamed Mahmood

This research contributes to the growing body of knowledge as well as offers significant theoretical contributions and policy implications. As far as the researcher’s knowledge, this is the first research of its type that investigates the relationship between digital enabled transformation of government and citizens’ trust & confidence in government. The proposed conceptual model also makes a novel contribution at a conceptual level, which can be used as a frame of reference by researchers as well as practitioners when planning ICT-enabled transformation projects in government. The context of the research is the Kingdom of Bahrain, the top-ranked country in ICT adoption in the Gulf Cooperation Council (GCC) region.

Recent Advances in Intuitionistic Fuzzy Logic Systems: Theoretical Aspects and Applications (Studies in Fuzziness and Soft Computing #372)

by Said Melliani Oscar Castillo

This book aims at providing an overview of state-of-the-art in both the theory and methods of intuitionistic fuzzy logic, partial differential equations and numerical methods in informatics. It covers topics such as fuzzy intuitionistic Hilbert spaces, intuitionistic fuzzy differential equations, fuzzy intuitionistic metric spaces, and numerical methods for differential equations. It reports on applications such as fuzzy real time scheduling, intelligent control, diagnostics and time series prediction. Chapters were carefully selected among contributions presented at the second edition of the International Conference on Intuitionistic Fuzzy Sets and Mathematical Science, ICIFSMAS, held on April 11-13, 2018, at Al Akhawayn University of Ifrane, in Morocco.

Handbook of Big Data Analytics (Springer Handbooks Of Computational Statistics Ser.)

by Xiaotong Shen Henry Horng-Shing Lu Wolfgang Karl Härdle

Addressing a broad range of big data analytics in cross-disciplinary applications, this essential handbook focuses on the statistical prospects offered by recent developments in this field. To do so, it covers statistical methods for high-dimensional problems, algorithmic designs, computation tools, analysis flows and the software-hardware co-designs that are needed to support insightful discoveries from big data. The book is primarily intended for statisticians, computer experts, engineers and application developers interested in using big data analytics with statistics. Readers should have a solid background in statistics and computer science.

Computational Linguistics and Intelligent Text Processing: 18th International Conference, CICLing 2017, Budapest, Hungary, April 17–23, 2017, Revised Selected Papers, Part I (Lecture Notes in Computer Science #10761)

by Alexander Gelbukh

The two-volume set LNCS 10761 + 10762 constitutes revised selected papers from the CICLing 2017 conference which took place in Budapest, Hungary, in April 2017. The total of 90 papers presented in the two volumes was carefully reviewed and selected from numerous submissions. In addition, the proceedings contain 4 invited papers.The papers are organized in the following topical sections:Part I: general; morphology and text segmentation; syntax and parsing; word sense disambiguation; reference and coreference resolution; named entity recognition; semantics and text similarity; information extraction; speech recognition; applications to linguistics and the humanities. Part II: sentiment analysis; opinion mining; author profiling and authorship attribution; social network analysis; machine translation; text summarization; information retrieval and text classification; practical applications.

Computational Linguistics and Intelligent Text Processing: 18th International Conference, CICLing 2017, Budapest, Hungary, April 17–23, 2017, Revised Selected Papers, Part II (Lecture Notes in Computer Science #10762)

by Alexander Gelbukh

The two-volume set LNCS 10761 + 10762 constitutes revised selected papers from the CICLing 2017 conference which took place in Budapest, Hungary, in April 2017. The total of 90 papers presented in the two volumes was carefully reviewed and selected from numerous submissions. In addition, the proceedings contain 4 invited papers.The papers are organized in the following topical sections:Part I: general; morphology and text segmentation; syntax and parsing; word sense disambiguation; reference and coreference resolution; named entity recognition; semantics and text similarity; information extraction; speech recognition; applications to linguistics and the humanities. Part II: sentiment analysis; opinion mining; author profiling and authorship attribution; social network analysis; machine translation; text summarization; information retrieval and text classification; practical applications.

The Proceedings of the International Conference on Sensing and Imaging: Chengdu University Of Information Technology, Chengdu, Sichuan, China, On June 5-7 2017 (Lecture Notes in Electrical Engineering #506)

by Ming Jiang Nathan Ida Alfred K. Louis Eric Todd Quinto

This book collects ​a number of papers presented at the International Conference on Sensing and Imaging, which was held at Chengdu University of Information Technology on June 5-7, 2017. Sensing and imaging is an interdisciplinary field covering a variety of sciences and techniques such as optics, electricity, magnetism, heat, sound, mathematics, and computing technology. The field has diverse applications of interest such as sensing techniques, imaging, and image processing techniques. This book will appeal to professionals and researchers within the field.

Security Policy in System-on-Chip Designs: Specification, Implementation and Verification

by Sandip Ray Abhishek Basak Swarup Bhunia

This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs – current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for “hardware patching”, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices.Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices;Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject;Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies;Introduces a rigorous, disciplined approach to “hardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field;Includes discussion of current and emerging approaches for security policy verification.

Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II (Lecture Notes in Computer Science #10992)

by Hovav Shacham Alexandra Boldyreva

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

The Robot and Us: An 'Antidisciplinary' Perspective on the Scientific and Social Impacts of Robotics (Biosystems & Biorobotics #20)

by Maria Chiara Carrozza

This book offers a clear, yet comprehensive overview of the role of robots in our society. It especially focuses on the interaction between humans and robots, and on the social and political aspects of the integration of robots with humans, in their everyday life, both in the private and working sphere alike. Based on the lessons held by the author at “Scuola di Politiche” (transl. School of Political Sciences), this self-contained book mainly addresses an educated, though not-specialist, audience.

Evolving OpenMP for Evolving Architectures: 14th International Workshop on OpenMP, IWOMP 2018, Barcelona, Spain, September 26–28, 2018, Proceedings (Lecture Notes in Computer Science #11128)

by Bronis R. de Supinski Pedro Valero-Lara Xavier Martorell Sergi Mateo Bellido Jesus Labarta

This book constitutes the proceedings of the 14th International Workshop on Open MP, IWOMP 2018, held in Barcelona, Spain, in September 2018.The 16 full papers presented in this volume were carefully reviewed and selected for inclusion in this book. The papers are organized in topical sections named: best paper; loops and OpenMP; OpenMP in heterogeneous systems; OpenMP improvements and innovations; OpenMP user experiences: applications and tools; and tasking evaluations.

Design Automation Techniques for Approximation Circuits: Verification, Synthesis and Test

by Arun Chandrasekharan Daniel Große Rolf Drechsler

This book describes reliable and efficient design automation techniques for the design and implementation of an approximate computing system. The authors address the important facets of approximate computing hardware design - from formal verification and error guarantees to synthesis and test of approximation systems. They provide algorithms and methodologies based on classical formal verification, synthesis and test techniques for an approximate computing IC design flow. This is one of the first books in Approximate Computing that addresses the design automation aspects, aiming for not only sketching the possibility, but providing a comprehensive overview of different tasks and especially how they can be implemented.

Computer Algebra in Scientific Computing: 20th International Workshop, CASC 2018, Lille, France, September 17–21, 2018, Proceedings (Lecture Notes in Computer Science #11077)

by Vladimir P. Gerdt Wolfram Koepf Werner M. Seiler Evgenii V. Vorozhtsov

This book constitutes the proceedings of the 20th International Workshop on Computer Algebra in Scientific Computing, CASC 2018, held in Lille, France, in September 2018. The 24 full papers of this volume presented with an abstract of an invited talk and one paper corresponding to another invited talk were carefully reviewed and selected from 29 submissions. They deal with cutting-edge research in all major disciplines of computer algebra in sciences such as physics, chemistry, life sciences, and engineering.Chapter “Positive Solutions of Systems of Signed Parametric Polynomial Inequalities” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Java üben mit dem Plotter: Ein Überblick für Studierende und Einsteiger (essentials)

by Stephan Euler

Dieses essential zeigt, wie man in Java-Anwendungen mit dem Plotter grafische Darstellungen erzeugen kann. Mit dem Plotter-Objekt – angelehnt an den Stiftplotter, der sich mit Steuerbefehlen über Papier bewegt – wird eine einfache Schnittstelle zur grafischen Programmierung angeboten. Bereits beim Einstieg in die Programmierung entstehen so erste grafische Darstellungen wie z.B. Funktionsverläufe und Simulationsergebnisse. Durch einfache Programmierbeispiele und Aufgaben wird der Umgang mit grundlegenden Konzepten wie Variablen, Kontrollstrukturen, Methoden und Klassen geübt.

Cyber Situational Awareness in Public-Private-Partnerships: Organisationsübergreifende Cyber-Sicherheitsvorfälle effektiv bewältigen

by Florian Skopik Tímea Páhi Maria Leitner

Digitale Dienste werden für unsere Gesellschaft immer wichtiger, daher gelangen sie auch stärker ins Visier von Wirtschaftskriminellen, Spionen, Terroristen oder staatsfeindlichen Gruppierungen. Wie schützen sich Unternehmen und Staaten vor solchen Cyber-Attacken? Ein wichtiger Grundstein ist die Schaffung von Behörden, wie sie die EU-Richtlinie über Maßnahmen zur Gewährleistung eines hohen gemeinsamen Sicherheitsniveaus von Netz- und Informationssystemen (NIS) vorsieht. Das Buch zeigt, wie sich die Zusammenarbeit von Unternehmen mit diesen NIS-Behörden gestaltet mit dem gemeinsamen Ziel, Cyber-Sicherheit zu etablieren und zu gewährleisten. Darüber hinaus legen die Autoren dar, wie sich die NIS-Richtlinie und die im Mai 2018 in Kraft getretene EU-Datenschutz-Grundverordnung (DSGVO) auf Security-Prozesse in Unternehmen auswirken können. Das Buch verknüpft technische, organisatorische und rechtliche Aspekte der Zusammenarbeit und spiegelt damit die Komplexität des Themas wider. Zugleich liefert es zahlreiche Vorschläge zur Umsetzung der EU-Richtlinie. Im Mittelpunkt steht dabei das Konzept der „Cyber Situational Awareness“ – das bewusste Erfassen der aktuellen Lage – und damit ein Instrument, mit dem sich die Reaktionsfähigkeit bei Cyber-Angriffen wesentlich erhöhen lässt. Folgende Themen werden erläutert: • Aufbau und Nutzung von Cyber Situational Awareness • Erstellung von Cyber-Lagebildern auf nationaler Ebene • Informations- und Datenquellen für Cyber-Lagebilder• Informationsaustausch zwischen Cyber-Lagezentren und Stakeholdern • Informations- und Meldepflichten von Unternehmen• Planspiel zur Bildung und Evaluierung von Cyber Situational Awareness

Machines, Mechanism and Robotics: Proceedings of iNaCoMM 2017 (Lecture Notes in Mechanical Engineering)

by D N Badodkar T A Dwarakanath

This book offers a collection of original peer-reviewed contributions presented at the 3rd International and 18th National Conference on Machines and Mechanisms (iNaCoMM), organized by Division of Remote Handling & Robotics, Bhabha Atomic Research Centre, Mumbai, India, from December 13th to 15th, 2017 (iNaCoMM 2017). It reports on various theoretical and practical features of machines, mechanisms and robotics; the contributions include carefully selected, novel ideas on and approaches to design, analysis, prototype development, assessment and surveys. Applications in machine and mechanism engineering, serial and parallel manipulators, power reactor engineering, autonomous vehicles, engineering in medicine, image-based data analytics, compliant mechanisms, and safety mechanisms are covered. Further papers provide in-depth analyses of data preparation, isolation and brain segmentation for focused visualization and robot-based neurosurgery, new approaches to parallel mechanism-based Master-Slave manipulators, solutions to forward kinematic problems, and surveys and optimizations based on historical and contemporary compliant mechanism-based design. The spectrum of contributions on theory and practice reveals central trends and newer branches of research in connection with these topics.

Mobile and Wireless Technology 2018: International Conference on Mobile and Wireless Technology (ICMWT 2018) (Lecture Notes in Electrical Engineering #513)

by Hyuncheol Kim Kuinam J. Kim

This book presents peer-reviewed contributions from the 5th International Conference on Mobile and Wireless Technology (ICMWT 2018), held June 25-27, 2018 in Hong Kong. This conference provided researchers and practitioners from both academia and industry with a platform to keep them abreast of cutting-edge developments in the field. The book includes papers on mobile and wireless networks and their applications, the increasingly important security issues relating to mobile and wireless systems, data management, as well as the latest developments in mobile software development, and multimedia and wireless communications.

Recent Developments in Machine Learning and Data Analytics: IC3 2018 (Advances in Intelligent Systems and Computing #740)

by Jugal Kalita Valentina Emilia Balas Samarjeet Borah Ratika Pradhan

This book presents high-quality papers from an international forum for research on computational approaches to learning. It includes current research and findings from various research labs, universities and institutions that may lead to development of marketable products. It also provides solid support for these findings in the form of empirical studies, theoretical analysis, or comparison to psychological phenomena. Further, it features work that shows how to apply learning methods to solve important application problems as well as how machine learning research is conducted. The book is divided into two main parts: Machine Learning Techniques, which covers machine learning-related research and findings; and, Data Analytics, which introduces recent developments in this domain. Additionally, the book includes work on data analytics using machine learning techniques.

Communication, Networks and Computing: First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers (Communications in Computer and Information Science #839)

by Shekhar Verma Ranjeet Singh Tomar Brijesh Kumar Chaurasia Vrijendra Singh Jemal Abawajy

This book (CCIS 839) constitutes the refereed proceedings of the First International Conference on Communication, Networks and Computings, CNC 2018, held in Gwalior, India, in March 2018. The 70 full papers were carefully reviewed and selected from 182 submissions. The papers are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication system.

Refine Search

Showing 20,826 through 20,850 of 53,917 results