Browse Results

Showing 50,326 through 50,350 of 61,889 results

Sicherheit und Vertrauen im Internet: Eine technische Perspektive (essentials)

by Christoph Meinel Harald Sack

Das globale Internet ist ein offenes Netz, das heißt nicht begrenzt und für jedermann zugänglich. Allerdings hat diese Offenheit ihren Preis: Es gibt keine zentrale Kontrolle, die z. B. Unbefugten Einblick in die Kommunikation und damit in die Privatsphäre anderer Internetnutzer verwehren würde. Um dennoch einen ausreichenden Schutz der Vertraulichkeit und Privatsphäre zu gewährleisten, müssen in eigener Verantwortung Techniken und Tools aus der Kryptografie eingesetzt werden, die Nachrichten verschlüsseln oder deren Unversehrtheit sicherstellen helfen. Die Autoren zeigen unterschiedliche Wege auf, wie der Schutz der Privatsphäre im Internet wiederhergestellt werden kann.

Sicherheit von Webanwendungen in der Praxis: Wie Sich Unternehmen Schu?tzen Ko?nnen -- Hintergru?nde, Maßnahmen, Pru?fverfahren Und Prozesse (Edition Kes Ser.)

by Matthias Rohr

Webanwendungen bilden in Unternehmen zahlreiche sensible Geschäftsprozesse ab – ob mit Kunden, mit Mitarbeitern, Partnern und Zulieferern. Daher sind Webapplikationen ein Sicherheitsrisiko für Unternehmen und ihr Schutz von entscheidender Bedeutung. In dem Buch beleuchtet der Autor die wichtigsten Aspekte der Webanwendungssicherheit und stützt sich dabei auf seine langjährige Erfahrung als IT-Security-Berater für Webanwendungen und Entwicklungsprozesse.Der Band bietet neben einem allgemeinen Überblick zum Thema Sicherheit von Webanwendungen ausführliche und praxisorientierte Darstellungen zu wichtigen Einzelfragen: Was sind die häufigsten Schwachstellen und mit welchen Maßnahmen lassen sich Webanwendungen am effektivsten gegen Angriffe absichern? Ein eigenes Kapitel befasst sich mit den Verfahren, die eingesetzt werden, um die Sicherheit von Anwendungen bereits im Entwicklungsprozess zu bewerten und zu überprüfen. Der Autor erläutert zudem, wie sich die Sicherheit in selbst entwickelten und zugekauften Webanwendungen durch organisatorische Prozesse nachhaltig verbessern lässt.Die zweite Auflage des 2014 erstmals erschienen Buchs wurde vor dem Hintergrund neuer Techniken zur Abwehr von Angriffen und neuer Prüfverfahren vollständig überarbeitet und aktualisiert. Auch aktuelle Beratungsprojekte des Autors haben Eingang in die Neuauflage gefunden – insbesondere dort, wo es um organisatorische Aspekte von Webanwendungssicherheit geht.Der Band richtet sich an Entwickler von Webanwendungen, IT-Security- und Qualitätsmanager genauso wie an Leser, die sich in das Thema Webanwendungssicherheit einarbeiten wollen.

Sicherheitsgerichtete Echtzeitsysteme

by Wolfgang A. Halang Rudolf M. Konakovsky

Das Buch behandelt das wichtige Thema Sicherheit bei elektronischen Systemen. Anhand begrifflicher, methodischer und konzeptioneller Grundlagen sicherheitsgerichteter Echtzeitsysteme wird in die Denkweise der Sicherheitstechnik eingeführt. Architekturen für sichere Hardware sowie Verfahren zur Erstellung möglichst fehlerfreier Software und zu deren Verifizierung werden dargestellt und quantitativ bewertet. Weiterhin werden Ergebnisse jüngster Forschungen vorgestellt, so u.a. inhärent sicherheitsfördernde Paradigmen der Echtzeitprogrammierung und -ablauforganisation sowie unkonventionelle sicherheitsgerichtete Architekturen für sicherheitstechnisch abnehmbare Feldbusse und programmierbare elektronische Systeme. Das Buch wurde für die 2. Auflage gründlich überarbeitet und um die Darstellung neuer Patente erweitert.

Sicherheitsgerichtete Echtzeitsysteme

by Wolfgang A. Halang Rudolf M. Konakovsky

Das Buch behandelt das wichtige Thema funktionale Sicherheit programmierbarer elektronischer Systeme. Anhand begrifflicher, methodischer und konzeptioneller Grundlagen sicherheitsgerichteter Echtzeitsysteme wird in die Denkweise der Sicherheitstechnik eingeführt. Architekturen für sichere Hardware sowie Verfahren zur Erstellung möglichst fehlerfreier Software und zu deren Verifizierung werden dargestellt und bewertet. Weiterhin werden Ergebnisse jüngster Forschungen vorgestellt wie inhärent sicherheitsfördernde Paradigmen der Echtzeitprogrammierung und -ablauforganisation oder unkonventionelle sicherheitsgerichtete Architekturen für sicherheitstechnisch abnehmbare Feldbusse und programmierbare elektronische Systeme.Das Buch wurde für die 3. Auflage gründlich überarbeitet und um die Darstellung neuer Patente und Normen erweitert. Die ZielgruppenStudierende der Automatisierungstechnik und der Informatik sowie Systemarchitekten und Entwickler.

Sicherheitskonzepte in der mobilen Kommunikation: Drahtlose Kommunikation – Protokolle und Gefahren

by Wolfgang W. Osterhage

Erfahren Sie in diesem Buch alles über IT-Sicherheit in der drahtlosen KommunikationDurch Computer, das Internet und die digitale Vernetzung hat die drahtlose Kommunikation eine neue Qualität erreicht – sowohl für private Nutzer als auch für Unternehmen und Organisationen. Diese Entwicklung führt zu neuen Herausforderungen für die Sicherheit im Bereich der Kommunikationstechnik. In seinem ausführlichen Buch über IT-Sicherheit gibt Wolfgang Osterhage einen umfassenden Überblick über aktuelle Sicherheitsrisiken in der Kommunikationstechnologie. Er hilft IT-Sicherheitsverantwortlichen und Praktikern dabei, sicherzustellen, dass mögliche Eindringlinge keinen Zugriff auf sensible Daten oder Systemfunktionalitäten erhalten. Sein Buch über IT-Sicherheit in der mobilen Kommunikation unterstützt optimal dabei, zuverlässige Komplettchecks aller drahtlosen Anwendungen von Organisationen und Unternehmen oder auch im privaten Bereich durchzuführen.Behandelte Themenkomplexe und Aufbau der einzelnen KapitelIn seinem Buch „Sicherheit in der mobilen Kommunikation“ gibt Wolfgang Osterhage den aktuellen Stand der drahtlosen Kommunikationstechnologie wieder und beleuchtet verschiedene Sicherheitskonzepte. Er behandelt folgende Themenkomplexe:• WLAN• Mobiltelefonie• Bluetooth• Infrarot• NFCNach diesen Technologien hat er sein Buch über IT-Security in einzelne Kapitel untergliedert. Jedes dieser Kapitel folgt wiederum einem festen Aufbau:1. Technologische Grundlagen2. Mögliche Bedrohungsszenarien3. Organisatorische und technische GegenmaßnahmenSomit bietet das Werk praktische Lösungsansätze für die zuvor beschriebenen Sicherheitsprobleme. Da jedes Kapitel in sich abgeschlossen ist, eignet sich das Buch über drahtlose IT-Sicherheitsarchitekturen optimal zum Querlesen.Bedrohungsszenarien aus dem Unternehmensalltag und ausführliche ChecklistenOsterhages Buch über IT-Sicherheit im Bereich der mobilen Kommunikation liefert zusätzlich zu jeder behandelten Technologie eine umfangreiche Checkliste, welche grundsätzlich als zweispaltige Tabelle aufgebaut ist. Darin beantwortet Osterhage detailliert wichtige Fragen zum Thema Kommunikationssicherheit. Er beleuchtet in seinem Buch außerdem strategische Ansätze und geht genauer auf technische Details ein. Weiterhin liefert das Buch über IT-Sicherheit in der drahtlosen Kommunikation Warnhinweise, falls in einem bestimmten Bereich Bedrohungen vorliegen. Somit deckt es alle wesentlichen Aspekte drahtloser Sicherheit optimal ab.

Side-Channel Analysis of Embedded Systems: An Efficient Algorithmic Approach

by Sylvain Guilley Maamar Ouladj

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

Sidemen: The Book

by The Sidemen

Billions of you have watched their videos and millions of you have followed them on social media.So here we go; it's time to back up because YouTube superstars, The Sidemen, are finally here in book form and they're dishing the dirt on each other as well as the YouTube universe. There's nowhere to hide as KSI, Miniminter, Behzinga, Zerkaa,Vikkstar123, Wroetoshaw and Tobjizzle go in hard on their living habits, their football ability, and their dodgy clobber, while also talking Fifa, Vegas and superheroes. They'll also give you their grand house tour, letting you in on a few secrets, before showing you their hall of fame, as well as revealing some of their greatest shames.Along the way you'll learn how seven of the world's biggest YouTube stars started off with nothing more than a computer console, a PC and a bad haircut before joining forces to crush the internet. And they'll tell you just how they did it (because they're nice like that) with their ultimate guide to YouTube while also sharing their memories of recording their favourite videos as well as a typical day in the life of The Sidemen.You'll feel like you're with them every step of the way, smelling the 'sweet' aroma of the boys' favourite dishes in the kitchen, stamping your passport as you follow them on their trips around the world and kicking every ball as the boys gear up for the biggest football match of their lives. It's going to get personal. It's going to get intense, and JJ is going to have lots of tantrums, so take a moment to prepare yourself, because this is The Sidemen book you've been waiting for!

Sidemen: The book you've been waiting for

by The Sidemen

Billions of you have watched their videos and millions of you have followed them on social media.So here we go; it's time to back up because YouTube superstars, The Sidemen, are finally here in book form and they're dishing the dirt on each other as well as the YouTube universe. There's nowhere to hide as KSI, Miniminter, Behzinga, Zerkaa,Vikkstar123, Wroetoshaw and Tobjizzle go in hard on their living habits, their football ability, and their dodgy clobber, while also talking Fifa, Vegas and superheroes. They'll also give you their grand house tour, letting you in on a few secrets, before showing you their hall of fame, as well as revealing some of their greatest shames.Along the way you'll learn how seven of the world's biggest YouTube stars started off with nothing more than a computer console, a PC and a bad haircut before joining forces to crush the internet. And they'll tell you just how they did it (because they're nice like that) with their ultimate guide to YouTube while also sharing their memories of recording their favourite videos as well as a typical day in the life of The Sidemen.You'll feel like you're with them every step of the way, smelling the 'sweet' aroma of the boys' favourite dishes in the kitchen, stamping your passport as you follow them on their trips around the world and kicking every ball as the boys gear up for the biggest football match of their lives. It's going to get personal. It's going to get intense, and JJ is going to have lots of tantrums, so take a moment to prepare yourself, because this is The Sidemen book you've been waiting for!

Sidesplitting Jokes for Minecrafters: Ghastly Golems and Ghoulish Ghasts (Jokes For Minecrafters #4)

by Brian Boone

Sidesplitting Jokes for Minecrafters: Ghastly Golems and Ghoulish Ghasts is the fourth book in the Jokes for Minecrafters series, which has more than 800 belly laughs waiting for you! This laugh-a-minute book leaves no enderman or zombie unscathed, and comes complete with silly illustrations for even more fun! <p><p> For kids ages 5 and up, this book of jokes will have all your friends and family doubling over! Bust out the funniest of these Minecrafter jokes at home or school for endless jokes and fun! <p> This adventure series is created especially for readers who love the fight of good vs. evil, magical academies like Hogwarts in the Harry Potter saga, and games like Minecraft, Terraria, and Pokemon GO.

Sideways: The City Google Couldn't Buy

by Josh O'Kane

NATIONAL BESTSELLERFINALIST FOR THE WRITERS' TRUST SHAUGHNESSY COHEN PRIZE FOR POLITICAL WRITINGFrom the Globe and Mail tech reporter who revealed countless controversies while following the Sidewalk Labs fiasco in Toronto, an uncompromising investigation into the bigger story and what the Google sister company's failure there reveals about Big Tech, data privacy and the monetization of everything.When former New York deputy mayor Dan Doctoroff landed in Toronto, promising a revolution in better living through technology, the locals were starstruck. In 2017 a small parcel of land on the city's woefully underdeveloped lakeshore was available for development, and with Google co-founder Larry Page and his trusted chairman Eric Schmidt leaning into Sidewalk Labs' pitch for the long-forsaken property—with Doctoroff as the urban-planning company's CEO—Sidewalk's bid crushed the competition. But as soon as the bid was won, cracks appeared in the partnership between Doctoroff's team and Waterfront Toronto, the government-sponsored organization behind the contest. There were hundreds more acres of undeveloped former port lands nearby that kept creeping into conversation with Sidewalk, and more questions were emerging than answers about how much the public would actually benefit from the Alphabet-owned company's vision for the high-tech neighbourhood—and the data it could harvest from the people living there. Alarm bells began ringing in the city's corridors of power and activism. To Torontonians accustomed to big promises with little follow-through, the fiasco that unfolded seemed at first like just another city-building sideshow. But the pained battle to reel in the power of Sidewalk Labs became a crucible moment in the worldwide battle for privacy rights and against the extension of Big Tech&’s digital might into the physical world around us. With extensive contacts on all sides of the debacle, O'Kane tells a story of global consequence fought over a small, forgotten parcel of mud and pavement, taking readers from California to New York to Toronto to Berlin and back again. In the tradition of extraordinary boardroom dramas like Bad Blood and Super Pumped, Sideways vividly recreates the corporate drama and epic personalities in this David-and-Goliath battle that signalled to the world that all may not be lost in the effort to contain the rapidly growing power of Big Tech.

Sieci Linux. Receptury

by Carla Schroder

Jak stworzy? sie? opart? o serwery pracuj?ce pod kontrol? Linuksa?Jak uruchomi? serwer VoIP i sie? VPN? Jak zapewni? bezawaryjn?, wydajn? i bezpieczn? prac? sieci?Mog?oby si? wydawa?, ?e o Linuksie napisano ju? wszystko. Jednak do tej pory nie by?o ksi??ki, która w kompleksowy sposób omawia?aby wszystkie zagadnienia, dotycz?ce spraw sieciowych w tym systemie operacyjnym. A? do teraz! Autor tej ksi??ki przedstawia poszczególne kwestie w sprawdzony w tej serii sposób: problem - rozwi?zanie - dyskusja. Dzi?ki podr?cznikowi "Sieci Linux. Receptury" dowiesz si?, w jaki sposób przygotowa? router, jak skonfigurowa? firewall przy u?yciu pakietu iptables oraz jak stworzy? punkt dost?pu do sieci bezprzewodowej i serwer VoIP, korzystaj?cy z popularnego rozwi?zania Asterisk. Poznasz zaawansowane mo?liwo?ci pakietu OpenSSH oraz sposoby bezpiecznego, zdalnego administrowania serwerem. Dodatkowo nauczysz si? u?ywa? graficznych pulpitów, ??czy? w bezpieczny sposób odleg?e sieci za pomoc? pakietu OpenVPN czy te? udost?pnia? w sieci pliki przy u?yciu serwera Samba. Twoj? ciekawo?? zaspokoi z pewno?ci? opis zastosowania Samby w roli kontrolera domeny. Po lekturze tej ksi??ki nie b?d? Ci obce sposoby monitorowania pracy sieci i us?ug, tworzenia wykresów wykorzystania zasobów czy te? u?ycia adresów IP w wersji szóstej. Jedno jest pewne: je?eli jeste? administratorem sieciowym lub masz ambicj? nim zosta?, ta ksi??ka musi znale?? si? na Twojej pó?ce!Tworzenie bramy opartej o system LinuxBudowa firewalla opartego o iptablesPrzygotowanie punktu dost?pu do sieci bezprzewodowejPrzydzielanie adresów IP za pomoc? serwera DHCPKonfiguracja serwera VoIP - AsteriskZaawansowane tematy, zwi?zane z routingiemZdalna i bezpieczna administracja z wykorzystaniem protoko?u SSHU?ywanie zdalnych pulpitów graficznychTworzenie wirtualnych sieci przy u?yciu pakietu OpenVPNWykorzystanie Linuksa w roli kontrolera domeny WindowsUdost?pnianie plików za pomoc? pakietu SambaUs?ugi katalogowe LDAPMonitorowanie i wizualizacja parametrów pracy sieci i us?ug Zastosowanie protoko?u IPv6Przygotowanie do bezobs?ugowej, sieciowej instalacji nowych systemówAdministrowanie serwerem za pomoc? konsoli pod??czonej przez port szeregowyUruchomienie serwera dial-upAnaliza, diagnoza i rozwi?zywanie problemów sieciowychOdpowiedzi na wszystkie Twoje pytania w jednym miejscu!

Siemens Step 7 (TIA Portal) Programming, a Practical Approach

by David Deeg Jon Stenerson

We saw the need for an understandable book on Siemens Step 7 programming. The book includes a link to download a trial version of Siemens Step 7 (TIA Portal) software. We wanted the book to be practical, and also have breadth and depth of coverage. We also wanted it to be affordable for readers. <p><p>There are many practical explanations and examples to illustrate and ease learning. There is also a step-by-step appendix on creating a project to ease the learning curve. The book covers various models of Siemens PLCs including S7-300, S7-1200, S7-400, and S7-1500. <p><p>The coverage of project organization provides the basis for a good understanding of programming and project organization. The book covers ladder logic and Function Block Diagram (FBD) programming. Linear and modular programming are covered to provide the basis for an understanding of how an S7 project is organized and how it functions.There is In-depth coverage of ladder logic, timers, counters, math, special instructions, function blocks, and technology objects. Wiring and use of of I/O modules for various PLC models is covered. Sinking/sourcing, and the wiring of digital and analog modules are covered. <p><p>There are also practical examples of the use and application of analog modules and their resolution. There is also a chapter that features step-by-step coverage on how to create a working HMI application. The setup and application of Technology Objects for PID and motion control are also covered. There are extensive questions and exercises for each chapter to guide and aide learning. The book includes answers to selected chapter questions and programming exercises.

Siemens Step 7 (tia Portal) Programming, A Practical Approach, 2nd Edition

by David Deeg Jon Stenerson

We saw the need for an understandable book on Siemens Step 7 programming. We also wanted it to be affordable. We added two additional chapters to the second edition. We wanted the book to be practical, and also have breadth and depth of coverage. There are many practical explanations and examples to illustrate and ease learning. There is a step-by-step chapter on creating a project to ease the learning curve. There is also a chapter that features step-by-step coverage on how to create a working HMI application. The setup and application of Technology Objects for PID and motion control are also covered.The coverage of project organization provides the basis for a good understanding of programming and project organization. Linear and modular programming are covered to provide the basis for an understanding of how an S7 project is organized and how it functions. The book covers ladder logic and Function Block Diagram (FBD) programming. There is In-depth coverage of ladder logic, timers, counters, math, special instructions, function blocks, and technology objects. Wiring and use of I/O modules for various PLC models is covered. Sinking/sourcing, and the wiring of digital and analog modules are covered. There are also practical examples of the use and application of analog modules and their resolution. The book covers various models of Siemens PLCs including S7-300, S7-1200, S7-400, and S7-1500.There are extensive questions and exercises for each chapter to guide and aide learning. The book includes answers to selected chapter questions and programming exercises. The book includes a link to download a trial version of Siemens Step 7 (TIA Portal) software. This is the black and white version of the book.

Sierra: A Take Control Crash Course

by Scholle Mcfarland

Learn macOS 10.12 Sierra with Mac expert and former Macworld editor Scholle McFarland!Head into the wilds of Sierra with confidence with the detailed "What's New in Sierra" list found this this Crash Course. You'll also learn about big new Sierra features like Siri, app tabs, Desktop and Documents folder syncing, Universal Clipboard, and Apple Pay in Safari. Particularly important is the book's discussion of Optimized Storage, which can save a lot of space on a Mac with a small drive, but should be enabled only when you understand its implications.Our favorite chapter is "Discover the Little Things in Sierra," which explains keeping folders on top of file listings, new text shortcut features, link and video previews in Messages, Picture in Picture, and the somewhat involved steps for setting up Auto Unlock with an Apple Watch. Also, don't miss Scholle's troubleshooting advice, which covers a wide range of misbehavior, from a frozen app to a frozen Mac.You'll also benefit from the book's coverage of core Mac topics. Thanks to a magazine-like layout with lots of steps, lists, and screenshots, you can find just the info you need, whether it involves understanding iCloud Drive, managing your menu bar effectively, configuring Notification Center to be useful, getting the most out of your Finder window's sidebar, dealing with the Dock, pinning tabs in Safari, or any of a myriad of other helpful subjects.Whether you want to browse for a few tips or go deep, you'll learn about...The hidden trick to getting your Mac to respond to "Hey, Siri!"All the things Siri can do for you on the MacImproving your writing with Sierra's new text shortcutsHow to watch a video--even from YouTube!--while you pretend to get work doneThe steps necessary to set your Apple Watch up to unlock your Mac automaticallyUsing Apple Pay with an iPhone--while shopping online in Safari on your MacHow to sort folders on top of files in Finder windows... Or not.The best ways to work with Sierra's new tabs in apps beyond Safari and the FinderUsing Handoff to move a task from your Mac to your iPhone, or vice-versaMoving data between your Apple devices with Universal ClipboardUnderstanding where your Desktop and Documents folders go when syncedHow you access synced Desktop and Documents folders from other devices and older MacsHow to set up Finder window sidebar favorites, and where to find those same favorites in a Save dialogWhat to do if your Mac won't turn on, if you get the spinning beachball of death, or if you need to repair your disk--and how to easily find out if your Mac still has AppleCareAnd much more!

Sign Language Machine Translation (Machine Translation: Technologies and Applications #5)

by Lorraine Leeson Andy Way Dimitar Shterionov

This book, for the first time, collects important current topics in the area of sign language translation in a single volume. The topic is introduced more generally to benefit newcomers to the field before diving into the current state-of-the-art methods of Sign Language Machine Translation (SLMT), together with an in-depth description of issues specific to this topic, including: an introduction to and historical overview of SLMT; ethical issues related to the engagement of and with deaf users; the importance of data; the sign languages of Europe; sign language recognition and synthesis, including via avatars; data-driven and linguistically-informed models of SLMT; gloss translation; fingerspelling; SLMT communication; and SLMT in practice. Of interest to MT developers and users as well as people working in deaf studies, this volume presents cutting-edge research on machine translation in the field of deaf studies.

Sign Language Processing: From Gesture to Meaning

by Achraf Othman

In a world where communication is key to human connection, understanding, and learning from one another, the book investigates the rich and intricate world of sign languages, highlighting the fascinating complexities of visual-spatial languages and their unique role in bridging the gap between hearing and deaf communities through information and communication technology. The book takes a journey through the evolution of sign language processing tools while exploring the cutting-edge techniques used to decipher, analyze, and process them, from the fundamentals of sign language structure and the nuances of non-manual signals to the latest developments in computational linguistics (corpora design, annotation tools, and notation systems), sign language recognition, and machine/deep learning applications. With a mission to reveal the silent language of expression, the author provides a captivating and thought-provoking look into a world often overlooked yet teeming with life and meaning. Offering a comprehensive and engaging overview of the current state of sign language research as well as its prospects, this monograph is an introduction resource for computer scientists, linguistics, educators, academics and sign language interpreters alike. This monograph is an invitation to discover the incredible potential of sign languages to transform human communication, promote inclusivity, and shape the future of technology. The readers will gain a deeper appreciation of the beauty and complexity of sign languages through technology, and they will be inspired to embrace the power of visual communication in our increasingly diverse and interconnected world.

Sign of the Apocalypse: Ruminations and Wit from an American Roadside Prophet

by John Getchell

Friends, neighbors, and passersby from all over the country can’t fail to miss “The Sign’s constantly changing humor and insight. On occasion, The Sign of the Apocalypse (SOTA) traffics in the earnest, but at its heart is rooted in a deep-seated desire to express the sarcastic and snort-worthy. This, and a love of haiku, pizza, Latin, double entendre, and the worst puns ever crafted. Two years in the making, the message on “The Sign” is changed on a daily basis, with the primary benefit of slowing passing traffic to a honking crawl. It was designed to convey pithy tidbits of thought and wordplay. In its conception, SOTA was perpetrated in spite of the objection of the author's girlfriend, and with hopes of creating controversy and dismay in the local community. The girlfriend packed up and left, and the community and town fathers were surprisingly gruntled by the proceedings. Punny and sarcastic signs include: • When attacked by a gang of clowns, go for the juggler • What if doing the hokey pokey really is what it’s all about? • Legalize marinara • A penny saved is ridiculous • Wendy, please take me back / I’m so miserable / it’s almost like / you’re still here

Signal Integrity: Applied Electromagnetics and Professional Practice

by Samuel H. Russ

This fully updated and expanded textbook covers designing working systems at very high frequencies. The updated book includes new chapters on Circuit Board Layout Process and Circuit-Board Attacks and Security and more in-depth material on all the original chapters. As with the first edition, this book combines an intuitive, physics-based approach to electromagnetics with a focus on solving realistic problems. The book emphasizes an intuitive approach to electromagnetics, and then uses this foundation to show the reader how both physical phenomena can cause signals to propagate incorrectly; and how to solve commonly encountered issues. Emphasis is placed on real problems that the author has encountered in his professional career, integrating problem-solving strategies and real signal-integrity case studies throughout the presentation. Students are challenged to think about managing complex design projects and implementing successful engineering and manufacturing processes. For the new edition, the author designed a circuit board that illustrates many of the principles in the book, created instructor materials including PowerPoint slides, a homework bank, and a test bank, and created materials that departments can use for ABET assessment.

Signal Interference in WiFi and ZigBee Networks

by Keqiu Li Gaotao Shi

This book systematically summarizes the fundamentals of WiFi and ZigBee from different levels and provides the detailed theoretical and experimental results for signal interference between these two wireless data transmission technologies. The existing mechanisms and methods of interference mitigation, avoidance and co-existence are carefully explored. Both collaboration and cross-technology communication between WiFi and ZigBee are also introduced as key research trends. Due to the popularity of WiFi and ZigBee, which share the same ISM frequency band, interference is a common problem and addressed in a wide range of literature. This book condenses the newest research results into an approachable format. This is an essential resource for professionals and students in wireless networks as well as network engineers, designers, or planners seeking a backbone of knowledge in WiFi and ZigBee networks.

Signal Processing Applications Using Multidimensional Polynomial Splines (SpringerBriefs in Applied Sciences and Technology)

by Madhusudan Singh Dhananjay Singh Zaynidinov Hakimjon

This book highlights new methods, algorithms and software for the digital processing and recovery of signals. In addition, it describes a new method for modeling one dimensional and multidimensional signals as successions of local polynomial splines and their spectral characteristics. It provides examples of how the proposed methods can be applied in specific cases, together with signal processing software examples in the MATLAB environment, and models of special processes in the Simulink environment. The book’s goal is to make it easier for beginners to understand the subject matter; it is intended for engineers, undergraduate and graduate students engaged in research or the evaluation and design of hardware and software for the digital processing and recovery of signals.

Signal Processing and Image Processing for Acoustical Imaging

by Woon Siong Gan

This book discusses the applications of signal and image processing in acoustical imaging. It first describes the basic tools involved – the 2D transform, fast Fourier transform (FFT) and applications, and deconvolution – before introducing readers to higher-order statistics, wavelets, and neural networks. It also addresses the important topic of digital signal processing, focusing on the example of homomorphic signal processing. The book then details the design of digital filters and array signal processing, and lastly examines applications in image processing: image enhancement and optimization, image restoration, and image compression.

Signal Processing and Machine Learning with Applications

by Michael M. Richter Sheuli Paul Veton Këpuska Marius Silaghi

Signal processing captures, interprets, describes and manipulates physical phenomena. Mathematics, statistics, probability, and stochastic processes are among the signal processing languages we use to interpret real-world phenomena, model them, and extract useful information. This book presents different kinds of signals humans use and applies them for human machine interaction to communicate. Signal Processing and Machine Learning with Applications presents methods that are used to perform various Machine Learning and Artificial Intelligence tasks in conjunction with their applications. It is organized in three parts: Realms of Signal Processing; Machine Learning and Recognition; and Advanced Applications and Artificial Intelligence. The comprehensive coverage is accompanied by numerous examples, questions with solutions, with historical notes. The book is intended for advanced undergraduate and postgraduate students, researchers and practitioners who are engaged with signal processing, machine learning and the applications.

Signal Processing for Intelligent Sensor Systems with MATLAB

by David C. Swanson

Signal Processing for Intelligent Sensors with MATLAB, Second Edition once again presents the key topics and salient information required for sensor design and application. Organized to make it accessible to engineers in school as well as those practicing in the field, this reference explores a broad array of subjects and is divided into sections:

Signal Processing in Medicine and Biology: Innovations in Big Data Processing

by Iyad Obeid Ivan Selesnick Joseph Picone

​Signal Processing in Medicine and Biology: Innovations in Big Data Processing provides an interdisciplinary look at state-of-the-art innovations in biomedical signal processing, especially as it applies to large data sets and machine learning. Chapters are presented with detailed mathematics and complete implementation specifics so that readers can completely master these techniques. The book presents tutorials and examples of successful applications and will appeal to a wide range of professionals, researchers, and students interested in applications of signal processing, medicine, and biology at the intersection between healthcare, engineering, and computer science.

Signal Processing, Telecommunication and Embedded Systems with AI and ML Applications: Proceedings of 8th International Conference on Microelectronics Electromagnetics and Telecommunications (ICMEET 2023) (Lecture Notes in Electrical Engineering #1281)

by Vikrant Bhateja Jaume Anguera V. V. S. S. S. Chakravarthy Anumoy Ghosh Wendy Flores Fuentes

The book discusses the latest developments and outlines future trends in the fields of microelectronics, electromagnetics, and telecommunication. It contains original research works presented at the International Conference on Microelectronics, Electromagnetics and Telecommunication (ICMEET 2023), organized by Department of Electronics and Communication Engineering, National Institute of Technology Mizoram, India during 6 – 7 October 2023. The book is divided into two volumes, and it covers papers written by scientists, research scholars and practitioners from leading universities, engineering colleges and R&D institutes from all over the world and share the latest breakthroughs in and promising solutions to the most important issues facing today’s society.

Refine Search

Showing 50,326 through 50,350 of 61,889 results