Browse Results

Showing 34,176 through 34,200 of 34,602 results

Structure of Solutions of Variational Problems

by Alexander J. Zaslavski

Structure of Solutions of Variational Problems is devoted to recent progress made in the studies of the structure of approximate solutions of variational problems considered on subintervals of a real line. Results on properties of approximate solutions which are independent of the length of the interval, for all sufficiently large intervals are presented in a clear manner. Solutions, new approaches, techniques and methods to a number of difficult problems in the calculus of variations are illustrated throughout this book. This book also contains significant results and information about the turnpike property of the variational problems. This well-known property is a general phenomenon which holds for large classes of variational problems. The author examines the following in relation to the turnpike property in individual (non-generic) turnpike results, sufficient and necessary conditions for the turnpike phenomenon as well as in the non-intersection property for extremals of variational problems. This book appeals to mathematicians working in optimal control and the calculus as well as with graduate students.

Project Manager Street Smarts

by Linda Kretz Zaval Terri Wagner

Hands-on practice for the most common-and most difficult-project management tasksBreaking into the field of project management is difficult, and the Project Management Institute requires that Project Management Professionals (PMPs) have on-the-job experience before earning their certification. This handy, task-based resource addresses the most common and the most challenging tasks Project Managers face and demonstrates how to perform these tasks.The Street Smarts series is designed to help current or aspiring professionals put their certification to work for them. Full of practical, real world scenarios, each book features actual tasks from the field and then offers step-by-step exercises that teach the skills necessary to complete those tasks.Aimed at anyone looking to gain hands-on experience in the field of project management by offering a unique look at the daily routine of a project managerOffers a variety of real-world scenarios, covering everything from the most common tasks to the most demanding roadblocksWalks you through step-by-step instructions of working with a project: initiating, planning, executing, monitoring and controlling, and closingDemonstrates defining a scope, developing a project charter, creating the work breakdown structure, managing resource allocation, and moreDesigned to provide you with an accurate look into the field of project management, this book offers you a unique and insightful perspective on the demands of a project manager on a day-to-day basis.

Inductive Logic Programming

by Gerson Zaverucha Vítor Santos Costa Aline Paes

This book constitutes the thoroughly refereed post-proceedings of the 23rd International Conference on Inductive Logic Programming, ILP 2013, held in Rio de Janeiro, Brazil, in August 2013. The 9 revised extended papers were carefully reviewed and selected from 42 submissions. The conference now focuses on all aspects of learning in logic, multi-relational learning and data mining, statistical relational learning, graph and tree mining, relational reinforcement learning, and other forms of learning from structured data.

Open and Distance Education in Australia, Europe and the Americas: National Perspectives in a Digital Age (SpringerBriefs in Education)

by Olaf Zawacki-Richter Adnan Qayyum

This book is open access under a CC BY 4.0 license.This book describes the history, structure and institutions of open and distance education in six countries: Australia, Brazil, Canada, Germany, the UK and the US. It discusses how open and distance education is evolving in a digital age to reflect the needs and circumstances of national higher education systems in these countries, and explores the similarities and differences between the ways in which they are organized and structured. It is the first book to make such comparisons and draw conclusions about the nature of open and distance education in the context of various national higher education systems. In a digital era with growing use of online education as well as open and distance education, this book is particularly useful for policy-makers and senior administrators who want to learn about organizing and expanding open and distance education provision. It is also a valuable reference for researchers, academics and students interested in understanding the different approaches to open and distance education.

High Performance MySQL, 2nd Edition

by Jeremy Zawodny Baron Schwartz Peter Zaitsev Vadim Tkachenko

High Performance MySQL is the definitive guide to building fast, reliable systems with MySQL. Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity. High Performance MySQL teaches you advanced techniques in depth so you can bring out MySQL's full power. Learn how to design schemas, indexes, queries and advanced MySQL features for maximum performance, and get detailed guidance for tuning your MySQL server, operating system, and hardware to their fullest potential. You'll also learn practical, safe, high-performance ways to scale your applications with replication, load balancing, high availability, and failover. This second edition is completely revised and greatly expanded, with deeper coverage in all areas. Major additions include: * Emphasis throughout on both performance and reliability * Thorough coverage of storage engines, including in-depth tuning and optimizations for the InnoDB storage engine * Effects of new features in MySQL 5.0 and 5.1, including stored procedures, partitioned databases, triggers, and views * A detailed discussion on how to build very large, highly scalable systems with MySQL * New options for backups and replication * Optimization of advanced querying features, such as full-text searches * Four new appendices The book also includes chapters on benchmarking, profiling, backups, security, and tools and techniques to help you measure, monitor, and manage your MySQL installations.

Big Data: Conceptual Analysis and Applications (Studies in Big Data #58)

by Yuriy P. Zaychenko Michael Z. Zgurovsky

The book is devoted to the analysis of big data in order to extract from these data hidden patterns necessary for making decisions about the rational behavior of complex systems with the different nature that generate this data. To solve these problems, a group of new methods and tools is used, based on the self-organization of computational processes, the use of crisp and fuzzy cluster analysis methods, hybrid neural-fuzzy networks, and others. The book solves various practical problems. In particular, for the tasks of 3D image recognition and automatic speech recognition large-scale neural networks with applications for Deep Learning systems were used. Application of hybrid neuro-fuzzy networks for analyzing stock markets was presented. The analysis of big historical, economic and physical data revealed the hidden Fibonacci pattern about the course of systemic world conflicts and their connection with the Kondratieff big economic cycles and the Schwabe–Wolf solar activity cycles. The book is useful for system analysts and practitioners working with complex systems in various spheres of human activity.

Multiscale Signal Analysis and Modeling

by Ahmed I. Zayed Xiaoping Shen

Multiscale Signal Analysis and Modeling presents recent advances in multiscale analysis and modeling using wavelets and other systems. This book also presents applications in digital signal processing using sampling theory and techniques from various function spaces, filter design, feature extraction and classification, signal and image representation/transmission, coding, nonparametric statistical signal processing, and statistical learning theory.

System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control #172)

by Salman Ben Zayed Abdullah Bin Gani Mohd Khalit Bin Othman

This book presents an advanced systematic mapping review (SMR) and state-of-the-art taxonomy of emergency departments (EDs). Focusing on the patients’ level of fulfilment and how it can be enhanced, it examines existing problems like waiting periods and overcrowding and how these can be alleviated to provide a better service. The author examined research papers from 1964 to 2018, and developed six research questions, organising them using mapping studies, the primary objectives of which were firstly, to obtain a common understanding of the problems that need to be highlighted in EDs, and secondly, to re-analyse the methods used. Focusing on quality, the book encourages citations of experimental methods from important studies concerning EDs that can improve services. Through different research papers, various thematic areas in the healthcare sector were examined, like the determination of the relative efficiency of pre-discharge interventions; the analysis of care and managing common indications during the last stages of life; using e-Health to enhance effectiveness and proficiency; the seriousness of patient differences among EDs; the identification of quality problems in healthcare contexts; existing opportunities and the suggested plans. The book concludes that an analytical decision-making process should be used to assess a health technology on the basis of its performance. It stresses the importance of updating this analytical system frequently.

Cloud Computing and Big Data: Technologies, Applications and Security (Lecture Notes in Networks and Systems #49)

by Mostapha Zbakh Mohammed Essaaidi Pierre Manneback Chunming Rong

This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big Data. Cloud computing, which can be seen as any subscription-based or pay-per-use service that extends the Internet’s existing capabilities, has gained considerable attention from both academia and the IT industry as a new infrastructure requiring smaller investments in hardware platforms, staff training, or licensing software tools. It is a new paradigm that has ushered in a revolution in both data storage and computation. In parallel to this progress, Big Data technologies, which rely heavily on cloud computing platforms for both data storage and processing, have been developed and deployed at breathtaking speed. They are among the most frequently used technologies for developing applications and services in many fields, such as the web, health, and energy. Accordingly, cloud computing and Big Data technologies are two of the most central current and future research mainstreams. They involve and impact a host of fields, including business, scientific research, and public and private administration. Gathering extended versions of the best papers presented at the Third International Conference on Cloud Computing Technologies and Applications (CloudTech’17), this book offers a valuable resource for all Information System managers, researchers, students, developers, and policymakers involved in the technological and application aspects of cloud computing and Big Data.

Hadoop Cluster Deployment

by Danil Zburivsky

This book is a step-by-step tutorial filled with practical examples which will show you how to build and manage a Hadoop cluster along with its intricacies.This book is ideal for database administrators, data engineers, and system administrators, and it will act as an invaluable reference if you are planning to use the Hadoop platform in your organization. It is expected that you have basic Linux skills since all the examples in this book use this operating system. It is also useful if you have access to test hardware or virtual machines to be able to follow the examples in the book.

Business Process Management Workshops: BPM 2019 International Workshops, Vienna, Austria, September 1–6, 2019, Revised Selected Papers (Lecture Notes in Business Information Processing #362)

by Uwe Zdun Remco Dijkman Chiara Di Francescomarino

This book constitutes revised papers from the twelve International Workshops held at the 17th International Conference on Business Process Management, BPM 2019, in Vienna, Austria, in September 2019:The third International Workshop on Artificial Intelligence for Business Process Management (AI4BPM)The third International Workshop on Business Processes Meet Internet-of-Things (BP-Meet-IoT)The 15th International Workshop on Business Process Intelligence (BPI)The first International Workshop on Business Process Management in the era of Digital Innovation and Transformation (BPMinDIT)The 12th International Workshop on Social and Human Aspects of Business Process Management (BPMS2)The 7th International Workshop on Declarative, Decision and Hybrid approaches to processes (DEC2H)The second International Workshop on Methods for Interpretation of Industrial Event Logs (MIEL)The first International Workshop on Process Management in Digital Production (PM-DiPro)The second International Workshop on Process-Oriented Data Science for Healthcare (PODS4H)The fourth International Workshop on Process Querying (PQ)The second International Workshop on Security and Privacy-enhanced Business Process Management (SPBP)The first International Workshop on the Value and Quality of Enterprise Modelling (VEnMo)Each of the workshops discussed research still in progress and focused on aspects of business process management, either a particular technical aspect or a particular application domain. These proceedings present the work that was discussed during the workshops.

Process-Driven SOA: Patterns for Aligning Business and IT

by Uwe Zdun Carsten Hentrich

Process-Driven SOA: Patterns for Aligning Business and IT supplies detailed guidance on how to design and build software architectures that follow the principles of business-IT alignment. It illustrates the design process using proven patterns that address complex business/technical scenarios, where integrated concepts of service-oriented architecture (SOA), Business Process Management (BPM), and Event-Driven Architecture (EDA) are required. The book demonstrates that SOA is not limited to technical issues but instead, is a holistic challenge where aspects of SOA, EDA, and BPM must be addressed together. An ideal guide for SOA solution architects, designers, developers, managers, and students about to enter the field, the book: Provides an accessible introduction to basic and more advanced concepts in process-driven SOA Illustrates how to manage the complexities of business aligned IT architectures with detailed examples and industry cases Outlines a step-by-step design process using proven patterns to address complex business/ technical scenarios Integrates SOA, BPM, and EDA into practical patterns promoting SOA 2.0 Describing how to synchronize parallel enterprise processes, the authors explain how to cope with the architectural and design decisions you are likely to encounter when designing and implementing process-driven SOA systems. The decisions are described in the form of software patterns to provide you with a practical guideline for addressing key problems using time-tested solutions.

Software Architecture

by Uwe Zdun Bedir Tekinerdogan Ali Babar

A software architecture manifests the major early design decisions, which determine the system's development, deployment and evolution. Thus, making better architectural decisions is one of the large challenges in software engineering. Software architecture knowledge management is about capturing practical experience and translating it into generalized architectural knowledge, and using this knowledge in the communication with stakeholders during all phases of the software lifecycle. This book presents a concise description of knowledge management in the software architecture discipline. It explains the importance of sound knowledge management practices for improving software architecture processes and products, and makes clear the role of knowledge management in software architecture and software development processes. It presents many approaches that are in use in software companies today, approaches that have been used in other domains, and approaches under development in academia. After an initial introduction by the editors, the contributions are grouped in three parts on "Architecture Knowledge Management", "Strategies and Approaches for Managing Architectural Knowledge", and "Tools and Techniques for Managing Architectural Knowledge". The presentation aims at information technology and software engineering professionals, in particular software architects and software architecture researchers. For the industrial audience, the book gives a broad and concise understanding of the importance of knowledge management for improving software architecture process and building capabilities in designing and evaluating better architectures for their mission- and business-critical systems. For researchers, the book will help to understand the applications of various knowledge management approaches in an industrial setting and to identify research challenges and opportunities.

?amanie i zabezpieczanie aplikacji w systemie iOS

by Jonathan Zdziarski

Twoja lektura obowi?zkowa!iOS to obecnie jeden z najpopularniejszych systemów operacyjnych, wykorzystywany w urz?dzeniach firmy Apple. Jednak dzi?ki tej popularno?ci jest on te? ?akomym k?skiem dla hakerów. Uzyskanie dost?pu do danych przechowywanych w telefonie mo?e mie? katastrofalne skutki. Dlatego je?eli tworzysz aplikacje na platform? iOS, ta ksi??ka jest dla Ciebie pozycj? obowi?zkow?. Jak obroni? si? przed atakiem? Wszystkie niezb?dne informacje znajdziesz w tym wyj?tkowym podr?czniku. W trakcie lektury dowiesz si?, jak dzia?aj? hakerzy, jak wyszukuj? s?abe punkty aplikacji oraz jak modyfikuj? jej kod. Ponadto nauczysz si? utrudnia? ?ledzenie kodu Twojej aplikacji oraz bezpiecznie usuwa? pliki (tak, aby nie by?o mo?liwe ich odtworzenie). W?ród poruszanych tematów znajdziesz równie? te zwi?zane z transmisj? danych: wykorzystanie protoko?u SSL to nie wszystko, musisz zadba? tak?e o to, ?eby nie by?o mo?liwe przej?cie sesji SSL. We? ksi??k? do r?ki i obro? si? przed atakiem!Dzi?ki tej ksi??ce:zrozumiesz, jak dzia?aj? hakerzyzabezpieczysz swoj? aplikacj? przez nieuprawnionymi zmianamiochronisz swoje bezpieczne po??czeniabezpowrotnie usuniesz niepotrzebne plikizagwarantujesz bezpiecze?stwo danych u?ytkownikom Twojej aplikacjiZadbaj o bezpiecze?stwo danych u?ytkowników Twojej aplikacji!

Hacking and Securing iOS Applications

by Jonathan Zdziarski

<p>Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the exploitable flaws lie in their code, and in this book he will show you as well, in a clear, direct, and immediately applicable style.</p>

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It (Oreilly And Associate Ser.)

by Jonathan Zdziarski

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your appsLearn how attackers infect apps with malware through code injectionDiscover how attackers defeat iOS keychain and data-protection encryptionUse a debugger and custom code injection to manipulate the runtime Objective-C environmentPrevent attackers from hijacking SSL sessions and stealing trafficSecurely delete files and design your apps to prevent forensic data leakageAvoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets

by Jonathan Zdziarski

"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you: Determine what type of data is stored on the device Break v1.x and v2.x passcode-protected iPhones to gain access to the device Build a custom recovery toolkit for the iPhone Interrupt iPhone 3G's "secure wipe" process Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition Recover deleted voicemail, images, email, and other personal data, using data carving techniques Recover geotagged metadata from camera photos Discover Google map lookups, typing cache, and other data stored on the live file system Extract contact information from the iPhone's database Use different recovery strategies based on case needs And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.

iPhone Forensics: Recovering Evidence, Personal Data and Corporate Assets

by Jonathan Zdziarski

With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you: * Determine what type of data is stored on the device * Break v1.x and v2.x passcode-protected iPhones to gain access to the device * Build a custom recovery toolkit for the iPhone * Interrupt iPhone 3G's "secure wipe" process * Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition * Recover deleted voicemail, images, email, and other personal data, using data carving techniques * Recover geotagged metadata from camera photos * Discover Google map lookups, typing cache, and other data stored on the live file system * Extract contact information from the iPhone's database * Use different recovery strategies based on case needs And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.

iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain

by Jonathan Zdziarski

"Great for beginners -- even if you don't know object-oriented programming, you can learn from examples on the 'Net and be on your way very soon. You will be able to confidently build apps that rival the ones included by Apple itself."-- Josh Content, iPhone DeveloperDevelopers everywhere are eager to create applications for the iPhone, and many of them prefer the open source, community-developed tool chain to Apple's own toolkit. In this new edition of iPhone Open Application Development, author Jonathan Zdziarski covers the latest version of the open toolkit -- now updated for Apple's iPhone 2.x software and iPhone 3G -- and explains in clear language how to create applications using Objective-C and the iPhone API. Zdziarski, who cracked the iPhone code and built the first fully-functional application with the open toolkit, includes detailed recipes and complete examples for graphics and audio programming, games programming with the CoreSurfaces and CoreImage interfaces, working with iTunes, and using sensors. With the open toolkit and this book, you can build iPhone applications that:Display status bars, preference tables, and other standard elements of the iPhone user interfacePlay pre-recorded files or program-generated soundsRead and write plain text files and HTML files, including pages from the Web, and control display elements, such as scrollbarsRead and respond to changes in orientation when the user turns the phone aroundAnd more. The first edition of this book developed an instant following and became the center of a movement. The second edition of iPhone Open Application Development will make this open source toolkit an indispensable part of iPhone application development.

iPhone Open Application Development: Write Native Objective-C Applications for the iPhone

by Jonathan Zdziarski

Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the express purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the original hackers of the iPhone -- explains the iPhone's native environment and how you can build software for this device using its Objective-C, C, and C++ development frameworks.iPhone Open Application Development walks you through the iPhone's native development environment, offers an overview of the Objective-C language you'll use with it, and supplies background for the iPhone operating system. You also get detailed recipes and working examples for everyone's favorite iPhone features -- graphics and audio programming, interfaces for adding multitouch functionality to games, the use of hardware sensors, and the device's vast user interface kit. This book explains:How to access the iPhone's underlying operating system The makeup of an iPhone application How to get the open source tool chain running on your desktop The iPhone's core user interface framework, which is heavily tied to major application-level functions Using the many touted iPhone features such as multitouch, hardware sensors, and gestures Intercepting and handling event notifications for many iPhone-related events Raw video surfaces and 3D transformations that take you deeper into advanced graphics on the iPhone How to record and play simple sounds and intercept sound events Advanced digital audio output using Apple's new Audio Toolbox framework Advanced user interface components such as section lists, keyboards, and image manipulation The Appendix includes a compendium of miscellaneous code examples for cool application features, such as using the camera and creating a CoverFlow®-like album browser. This book is a true hacker's book, designed for the millions of users who have run third party applications on their iPhone, but its concepts and code examples have shown to be remarkably similar to Apple's official SDK, making this book a valuable resource for both camps. Any programmer can use this book to write applications with the same spectacular effects that made the device an immediate hit, and impress users just as much as the official iPhone software does. That programmer can easily be you.

iPhone SDK Application Development: Building Applications for the Appstore

by Jonathan Zdziarski

This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK frameworks necessary for designing full-featured applications. This book will help you: * Design user interface elements with Interface Builder and the UI Kit framework * Create application controls, such as windows and navigation bars * Build and manage layers and transformations using Core Graphics and Quartz Core * Mix and play sound files using AVFoundation, and record and play back digital sound streams using Audio Toolbox * Handle network programming with the CFNetwork framework * Use the Core Location framework to interact with the iPhone's GPS * Add movie players to your application iPhone SDK Application Development will benefit experienced developers and those just starting out on the iPhone. Important development concepts are explained thoroughly, and enough advanced examples are provided to make this book a great reference once you become an expert.

iPhone SDK Application Development: Building Applications for the AppStore

by Jonathan Zdziarski

This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK frameworks necessary for designing full-featured applications. This book will help you: Design user interface elements with Interface Builder and the UI Kit framework Create application controls, such as windows and navigation bars Build and manage layers and transformations using Core Graphics and Quartz Core Mix and play sound files using AVFoundation, and record and play back digital sound streams using Audio Toolbox Handle network programming with the CFNetwork framework Use the Core Location framework to interact with the iPhone's GPS Add movie players to your application iPhone SDK Application Development will benefit experienced developers and those just starting out on the iPhone. Important development concepts are explained thoroughly, and enough advanced examples are provided to make this book a great reference once you become an expert.

Ending Spam

by Jonathan A. Zdziarski

Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language classification and machine learning combine to produce remarkably accurate spam filters. After reading Ending Spam , you'll have a complete understanding of the mathematical approaches used by today's spam filters as well as decoding, tokenization, various algorithms (including Bayesian analysis and Markovian discrimination) and the benefits of using open-source solutions to end spam. Zdziarski interviewed creators of many of the best spam filters and has included their insights in this revealing examination of the anti-spam crusade. If you're a programmer designing a new spam filter, a network admin implementing a spam-filtering solution, or just someone who's curious about how spam filters work and the tactics spammers use to evade them, Ending Spam will serve as an informative analysis of the war against spammers. TOC Introduction PART I: An Introduction to Spam Filtering Chapter 1: The History of Spam Chapter 2: Historical Approaches to Fighting Spam Chapter 3: Language Classification Concepts Chapter 4: Statistical Filtering Fundamentals PART II: Fundamentals of Statistical Filtering Chapter 5: Decoding: Uncombobulating Messages Chapter 6: Tokenization: The Building Blocks of Spam Chapter 7: The Low-Down Dirty Tricks of Spammers Chapter 8: Data Storage for a Zillion Records Chapter 9: Scaling in Large Environments PART III: Advanced Concepts of Statistical Filtering Chapter 10: Testing Theory Chapter 11: Concept Identification: Advanced Tokenization Chapter 12: Fifth-Order Markovian Discrimination Chapter 13: Intelligent Feature Set Reduction Chapter 14: Collaborative Algorithms Appendix: Shining Examples of Filtering Index

iPhone Open Application Development

by Jonathan A. Zdziarski

Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the express purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the original hackers of the iPhone -- explains the iPhone's native environment and how you can build software for this device using its Objective-C, C, and C++ development frameworks. iPhone Open Application Development walks you through the iPhone's native development environment, offers an overview of the Objective-C language you'll use with it, and supplies background for the iPhone operating system. You also get detailed recipes and working examples for everyone's favorite iPhone features -- graphics and audio programming, interfaces for adding multitouch functionality to games, the use of hardware sensors, and the device's vast user interface kit. This book explains: How to access the iPhone's underlying operating system The makeup of an iPhone application How to get the open source tool chain running on your desktop The iPhone's core user interface framework, which is heavily tied to major application-level functions Using the many touted iPhone features such as multitouch, hardware sensors, and gestures Intercepting and handling event notifications for many iPhone-related events Raw video surfaces and 3D transformations that take you deeper into advanced graphics on the iPhone How to record and play simple sounds and intercept sound events Advanced digital audio output using Apple's new Audio Toolbox framework Advanced user interface components such as section lists, keyboards, and image manipulation The Appendix includes a compendium of miscellaneous code examples for cool application features, such as using the camera and creating a CoverFlow®-like album browser. This book is a true hacker's book, designed for the millions of users who have run third party applications on their iPhone, but its concepts and code examples have shown to be remarkably similar to Apple's official SDK, making this book a valuable resource for both camps. Any programmer can use this book to write applications with the same spectacular effects that made the device an immediate hit, and impress users just as much as the official iPhone software does. That programmer can easily be you.

Mastering Responsive Web Design with HTML5 and CSS3

by Ricardo Zea

Become a master in RWD with this practical, engaging guide About This Book * Build responsive designs with solid yet simple HTML5 and CSS3 best practices * Use CSS preprocessors (Sass) to speed up the creation of CSS * Each chapter covers a different feature of RWD with carefully chosen, interesting examples, including the latest developments in responsive design Who This Book Is For If you already know some HTML and CSS and understand the principles of responsive web design, this book is for you. There's something here for you to learn regardless of if you're a web designer or web developer, or whether you're a seasoned expert web professional. What You Will Learn * Install and use Sass with SCSS syntax to create your CSS * Use HTML5 tags the right way for the right type of content * Enhance the experience of users with assistive technology with ARIA roles * Design with desktop-first approach but implement with mobile-first methodology * For your layouts, either create and use your own scalable CSS grid, or use Flexbox * Create three types of navigation for small screen devices * Find the best way to serve the best type of image and how to make videos responsive * Build custom responsive emails to ensure the message gets across regardless of the device In Detail Responsive web design is getting more complex day by day and without the necessary design and development skill sets, it's a matter of time before we're left behind. Building meaningful and accessible websites and apps using HTML5 and CSS3 is a must if we want to create memorable experiences for the users. In the ever-changing world of web designers and developers, being proficient in responsive web design is no longer an option, it is mandatory. Whether you're a web designer or web developer, or a seasoned expert web professional, this book will bolster your HTML and CSS skills to a master level. The book is designed in a way that each chapter will take you one step closer to becoming an expert in RWD. The book begins with introducing you to the power of CSS preprocessors, Sass in this case, to increase the speed of writing repetitive CSS tasks, then use simple but meaningful HTML examples; and add ARIA roles to increase accessibility. You will also understand why a mobile-first approach is ideal. Next, you will learn how to use an easily scalable CSS grid or if you prefer, use Flexbox instead. Create navigations for small screen devices using the "drawer navigation," "off-canvas" or "toggle" navigation patterns, and also implement images and media in both responsive and responsible ways. Finally, you will build a solid and meaningful typographic scale and make sure your messages and communications display correctly with responsive emails. Style and approach Designing and developing for the web should be fun, and that's the tone used in the book. This book is written in a step-by-step format with clean-cut examples. You will also find tips and notes all over the book to help clarify those small and simple details most books and tutorials assume you already know.

Refine Search

Showing 34,176 through 34,200 of 34,602 results