Browse Results

Showing 52,926 through 52,950 of 53,607 results

Cloud Computing and Big Data: Technologies, Applications and Security (Lecture Notes in Networks and Systems #49)

by Mostapha Zbakh Mohammed Essaaidi Pierre Manneback Chunming Rong

This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big Data. Cloud computing, which can be seen as any subscription-based or pay-per-use service that extends the Internet’s existing capabilities, has gained considerable attention from both academia and the IT industry as a new infrastructure requiring smaller investments in hardware platforms, staff training, or licensing software tools. It is a new paradigm that has ushered in a revolution in both data storage and computation. In parallel to this progress, Big Data technologies, which rely heavily on cloud computing platforms for both data storage and processing, have been developed and deployed at breathtaking speed. They are among the most frequently used technologies for developing applications and services in many fields, such as the web, health, and energy. Accordingly, cloud computing and Big Data technologies are two of the most central current and future research mainstreams. They involve and impact a host of fields, including business, scientific research, and public and private administration. Gathering extended versions of the best papers presented at the Third International Conference on Cloud Computing Technologies and Applications (CloudTech’17), this book offers a valuable resource for all Information System managers, researchers, students, developers, and policymakers involved in the technological and application aspects of cloud computing and Big Data.

Hadoop Cluster Deployment

by Danil Zburivsky

This book is a step-by-step tutorial filled with practical examples which will show you how to build and manage a Hadoop cluster along with its intricacies.This book is ideal for database administrators, data engineers, and system administrators, and it will act as an invaluable reference if you are planning to use the Hadoop platform in your organization. It is expected that you have basic Linux skills since all the examples in this book use this operating system. It is also useful if you have access to test hardware or virtual machines to be able to follow the examples in the book.

Designing Cloud Data Platforms

by Danil Zburivsky Lynda Partner

In Designing Cloud Data Platforms, Danil Zburivsky and Lynda Partner reveal a six-layer approach that increases flexibility and reduces costs. Discover patterns for ingesting data from a variety of sources, then learn to harness pre-built services provided by cloud vendors.Summary Centralized data warehouses, the long-time defacto standard for housing data for analytics, are rapidly giving way to multi-faceted cloud data platforms. Companies that embrace modern cloud data platforms benefit from an integrated view of their business using all of their data and can take advantage of advanced analytic practices to drive predictions and as yet unimagined data services. Designing Cloud Data Platforms is a hands-on guide to envisioning and designing a modern scalable data platform that takes full advantage of the flexibility of the cloud. As you read, you&’ll learn the core components of a cloud data platform design, along with the role of key technologies like Spark and Kafka Streams. You&’ll also explore setting up processes to manage cloud-based data, keep it secure, and using advanced analytic and BI tools to analyze it. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Well-designed pipelines, storage systems, and APIs eliminate the complicated scaling and maintenance required with on-prem data centers. Once you learn the patterns for designing cloud data platforms, you&’ll maximize performance no matter which cloud vendor you use. About the book In Designing Cloud Data Platforms, Danil Zburivsky and Lynda Partner reveal a six-layer approach that increases flexibility and reduces costs. Discover patterns for ingesting data from a variety of sources, then learn to harness pre-built services provided by cloud vendors. What's inside Best practices for structured and unstructured data sets Cloud-ready machine learning tools Metadata and real-time analytics Defensive architecture, access, and security About the reader For data professionals familiar with the basics of cloud computing, and Hadoop or Spark. About the author Danil Zburivsky has over 10 years of experience designing and supporting large-scale data infrastructure for enterprises across the globe. Lynda Partner is the VP of Analytics-as-a-Service at Pythian, and has been on the business side of data for over 20 years. Table of Contents 1 Introducing the data platform 2 Why a data platform and not just a data warehouse 3 Getting bigger and leveraging the Big 3: Amazon, Microsoft Azure, and Google 4 Getting data into the platform 5 Organizing and processing data 6 Real-time data processing and analytics 7 Metadata layer architecture 8 Schema management 9 Data access and security 10 Fueling business value with data platforms

ICT Innovations 2022. Reshaping the Future Towards a New Normal: 14th International Conference, ICT Innovations 2022, Skopje, Macedonia, September 29 – October 1, 2022, Proceedings (Communications in Computer and Information Science #1740)

by Katerina Zdravkova Lasko Basnarkov

This book constitutes the refereed proceedings of the 14th International Conference on ICT Innovations 2022. Reshaping the Future Towards a New Normal, ICT Innovations 2022, held in Skopje, Macedonia, during September 29–October 1, 2022. The 14 full papers and 1 short papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: theoretical foundations and distributed computing; artificial intelligence and deep learning; applied artificial intelligence; education; and medical informatics.

Perspectives in Business Informatics Research: 17th International Conference, BIR 2018, Stockholm, Sweden, September 24-26, 2018, Proceedings (Lecture Notes in Business Information Processing #330)

by Jelena Zdravkovic Jānis Grabis Selmin Nurcan Janis Stirna

This book constitutes the proceedings of the 17th International Conference on Perspectives in Business Informatics Research, BIR 2018, held in Stockholm, Sweden, in September 2018. This year’s conference theme was “Business Resilience – Organizational and Information System Resilience in Congruence”. The 17 papers presented in this volume were carefully reviewed and selected from 50 submissions. The papers were organized in topical sections named: business, people and system resilience; resilient collaboration; digital transformation; information technology management; enterprise systems and data analytics; and business and information systems development.

?amanie i zabezpieczanie aplikacji w systemie iOS

by Jonathan Zdziarski

Twoja lektura obowi?zkowa!iOS to obecnie jeden z najpopularniejszych systemów operacyjnych, wykorzystywany w urz?dzeniach firmy Apple. Jednak dzi?ki tej popularno?ci jest on te? ?akomym k?skiem dla hakerów. Uzyskanie dost?pu do danych przechowywanych w telefonie mo?e mie? katastrofalne skutki. Dlatego je?eli tworzysz aplikacje na platform? iOS, ta ksi??ka jest dla Ciebie pozycj? obowi?zkow?. Jak obroni? si? przed atakiem? Wszystkie niezb?dne informacje znajdziesz w tym wyj?tkowym podr?czniku. W trakcie lektury dowiesz si?, jak dzia?aj? hakerzy, jak wyszukuj? s?abe punkty aplikacji oraz jak modyfikuj? jej kod. Ponadto nauczysz si? utrudnia? ?ledzenie kodu Twojej aplikacji oraz bezpiecznie usuwa? pliki (tak, aby nie by?o mo?liwe ich odtworzenie). W?ród poruszanych tematów znajdziesz równie? te zwi?zane z transmisj? danych: wykorzystanie protoko?u SSL to nie wszystko, musisz zadba? tak?e o to, ?eby nie by?o mo?liwe przej?cie sesji SSL. We? ksi??k? do r?ki i obro? si? przed atakiem!Dzi?ki tej ksi??ce:zrozumiesz, jak dzia?aj? hakerzyzabezpieczysz swoj? aplikacj? przez nieuprawnionymi zmianamiochronisz swoje bezpieczne po??czeniabezpowrotnie usuniesz niepotrzebne plikizagwarantujesz bezpiecze?stwo danych u?ytkownikom Twojej aplikacjiZadbaj o bezpiecze?stwo danych u?ytkowników Twojej aplikacji!

Hacking and Securing iOS Applications

by Jonathan Zdziarski

<p>Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the exploitable flaws lie in their code, and in this book he will show you as well, in a clear, direct, and immediately applicable style.</p>

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It (Oreilly And Associate Ser.)

by Jonathan Zdziarski

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your appsLearn how attackers infect apps with malware through code injectionDiscover how attackers defeat iOS keychain and data-protection encryptionUse a debugger and custom code injection to manipulate the runtime Objective-C environmentPrevent attackers from hijacking SSL sessions and stealing trafficSecurely delete files and design your apps to prevent forensic data leakageAvoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets

by Jonathan Zdziarski

"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you: Determine what type of data is stored on the device Break v1.x and v2.x passcode-protected iPhones to gain access to the device Build a custom recovery toolkit for the iPhone Interrupt iPhone 3G's "secure wipe" process Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition Recover deleted voicemail, images, email, and other personal data, using data carving techniques Recover geotagged metadata from camera photos Discover Google map lookups, typing cache, and other data stored on the live file system Extract contact information from the iPhone's database Use different recovery strategies based on case needs And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.

iPhone Forensics: Recovering Evidence, Personal Data and Corporate Assets

by Jonathan Zdziarski

With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you: * Determine what type of data is stored on the device * Break v1.x and v2.x passcode-protected iPhones to gain access to the device * Build a custom recovery toolkit for the iPhone * Interrupt iPhone 3G's "secure wipe" process * Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition * Recover deleted voicemail, images, email, and other personal data, using data carving techniques * Recover geotagged metadata from camera photos * Discover Google map lookups, typing cache, and other data stored on the live file system * Extract contact information from the iPhone's database * Use different recovery strategies based on case needs And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.

iPhone Open Application Development: Write Native Applications Using the Open Source Tool Chain

by Jonathan Zdziarski

"Great for beginners -- even if you don't know object-oriented programming, you can learn from examples on the 'Net and be on your way very soon. You will be able to confidently build apps that rival the ones included by Apple itself."-- Josh Content, iPhone DeveloperDevelopers everywhere are eager to create applications for the iPhone, and many of them prefer the open source, community-developed tool chain to Apple's own toolkit. In this new edition of iPhone Open Application Development, author Jonathan Zdziarski covers the latest version of the open toolkit -- now updated for Apple's iPhone 2.x software and iPhone 3G -- and explains in clear language how to create applications using Objective-C and the iPhone API. Zdziarski, who cracked the iPhone code and built the first fully-functional application with the open toolkit, includes detailed recipes and complete examples for graphics and audio programming, games programming with the CoreSurfaces and CoreImage interfaces, working with iTunes, and using sensors. With the open toolkit and this book, you can build iPhone applications that:Display status bars, preference tables, and other standard elements of the iPhone user interfacePlay pre-recorded files or program-generated soundsRead and write plain text files and HTML files, including pages from the Web, and control display elements, such as scrollbarsRead and respond to changes in orientation when the user turns the phone aroundAnd more. The first edition of this book developed an instant following and became the center of a movement. The second edition of iPhone Open Application Development will make this open source toolkit an indispensable part of iPhone application development.

iPhone Open Application Development: Write Native Objective-C Applications for the iPhone

by Jonathan Zdziarski

Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the express purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the original hackers of the iPhone -- explains the iPhone's native environment and how you can build software for this device using its Objective-C, C, and C++ development frameworks.iPhone Open Application Development walks you through the iPhone's native development environment, offers an overview of the Objective-C language you'll use with it, and supplies background for the iPhone operating system. You also get detailed recipes and working examples for everyone's favorite iPhone features -- graphics and audio programming, interfaces for adding multitouch functionality to games, the use of hardware sensors, and the device's vast user interface kit. This book explains:How to access the iPhone's underlying operating system The makeup of an iPhone application How to get the open source tool chain running on your desktop The iPhone's core user interface framework, which is heavily tied to major application-level functions Using the many touted iPhone features such as multitouch, hardware sensors, and gestures Intercepting and handling event notifications for many iPhone-related events Raw video surfaces and 3D transformations that take you deeper into advanced graphics on the iPhone How to record and play simple sounds and intercept sound events Advanced digital audio output using Apple's new Audio Toolbox framework Advanced user interface components such as section lists, keyboards, and image manipulation The Appendix includes a compendium of miscellaneous code examples for cool application features, such as using the camera and creating a CoverFlow®-like album browser. This book is a true hacker's book, designed for the millions of users who have run third party applications on their iPhone, but its concepts and code examples have shown to be remarkably similar to Apple's official SDK, making this book a valuable resource for both camps. Any programmer can use this book to write applications with the same spectacular effects that made the device an immediate hit, and impress users just as much as the official iPhone software does. That programmer can easily be you.

iPhone SDK Application Development: Building Applications for the Appstore

by Jonathan Zdziarski

This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK frameworks necessary for designing full-featured applications. This book will help you: * Design user interface elements with Interface Builder and the UI Kit framework * Create application controls, such as windows and navigation bars * Build and manage layers and transformations using Core Graphics and Quartz Core * Mix and play sound files using AVFoundation, and record and play back digital sound streams using Audio Toolbox * Handle network programming with the CFNetwork framework * Use the Core Location framework to interact with the iPhone's GPS * Add movie players to your application iPhone SDK Application Development will benefit experienced developers and those just starting out on the iPhone. Important development concepts are explained thoroughly, and enough advanced examples are provided to make this book a great reference once you become an expert.

iPhone SDK Application Development: Building Applications for the AppStore

by Jonathan Zdziarski

This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK frameworks necessary for designing full-featured applications. This book will help you: Design user interface elements with Interface Builder and the UI Kit framework Create application controls, such as windows and navigation bars Build and manage layers and transformations using Core Graphics and Quartz Core Mix and play sound files using AVFoundation, and record and play back digital sound streams using Audio Toolbox Handle network programming with the CFNetwork framework Use the Core Location framework to interact with the iPhone's GPS Add movie players to your application iPhone SDK Application Development will benefit experienced developers and those just starting out on the iPhone. Important development concepts are explained thoroughly, and enough advanced examples are provided to make this book a great reference once you become an expert.

Ending Spam

by Jonathan A. Zdziarski

Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language classification and machine learning combine to produce remarkably accurate spam filters. After reading Ending Spam , you'll have a complete understanding of the mathematical approaches used by today's spam filters as well as decoding, tokenization, various algorithms (including Bayesian analysis and Markovian discrimination) and the benefits of using open-source solutions to end spam. Zdziarski interviewed creators of many of the best spam filters and has included their insights in this revealing examination of the anti-spam crusade. If you're a programmer designing a new spam filter, a network admin implementing a spam-filtering solution, or just someone who's curious about how spam filters work and the tactics spammers use to evade them, Ending Spam will serve as an informative analysis of the war against spammers. TOC Introduction PART I: An Introduction to Spam Filtering Chapter 1: The History of Spam Chapter 2: Historical Approaches to Fighting Spam Chapter 3: Language Classification Concepts Chapter 4: Statistical Filtering Fundamentals PART II: Fundamentals of Statistical Filtering Chapter 5: Decoding: Uncombobulating Messages Chapter 6: Tokenization: The Building Blocks of Spam Chapter 7: The Low-Down Dirty Tricks of Spammers Chapter 8: Data Storage for a Zillion Records Chapter 9: Scaling in Large Environments PART III: Advanced Concepts of Statistical Filtering Chapter 10: Testing Theory Chapter 11: Concept Identification: Advanced Tokenization Chapter 12: Fifth-Order Markovian Discrimination Chapter 13: Intelligent Feature Set Reduction Chapter 14: Collaborative Algorithms Appendix: Shining Examples of Filtering Index

iPhone Open Application Development

by Jonathan A. Zdziarski

Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the express purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the original hackers of the iPhone -- explains the iPhone's native environment and how you can build software for this device using its Objective-C, C, and C++ development frameworks. iPhone Open Application Development walks you through the iPhone's native development environment, offers an overview of the Objective-C language you'll use with it, and supplies background for the iPhone operating system. You also get detailed recipes and working examples for everyone's favorite iPhone features -- graphics and audio programming, interfaces for adding multitouch functionality to games, the use of hardware sensors, and the device's vast user interface kit. This book explains: How to access the iPhone's underlying operating system The makeup of an iPhone application How to get the open source tool chain running on your desktop The iPhone's core user interface framework, which is heavily tied to major application-level functions Using the many touted iPhone features such as multitouch, hardware sensors, and gestures Intercepting and handling event notifications for many iPhone-related events Raw video surfaces and 3D transformations that take you deeper into advanced graphics on the iPhone How to record and play simple sounds and intercept sound events Advanced digital audio output using Apple's new Audio Toolbox framework Advanced user interface components such as section lists, keyboards, and image manipulation The Appendix includes a compendium of miscellaneous code examples for cool application features, such as using the camera and creating a CoverFlow®-like album browser. This book is a true hacker's book, designed for the millions of users who have run third party applications on their iPhone, but its concepts and code examples have shown to be remarkably similar to Apple's official SDK, making this book a valuable resource for both camps. Any programmer can use this book to write applications with the same spectacular effects that made the device an immediate hit, and impress users just as much as the official iPhone software does. That programmer can easily be you.

Interactive Visualization and Plotting with Julia: Create impressive data visualizations through Julia packages such as Plots, Makie, Gadfly, and more

by Diego Javier Zea

Represent and analyze data using Plots to find actionable insights using Julia programmingKey FeaturesLearn to use static and interactive plots to explore data with JuliaBecome well versed with the various plotting attributes needed to customize your plotsCreate insightful and appealing plots using data interactions, animations, layouts, and themesBook DescriptionThe Julia programming language offers a fresh perspective into the data visualization field.Interactive Visualization and Plotting with Julia begins by introducing the Julia language and the Plots package. The book then gives a quick overview of the Julia plotting ecosystem to help you choose the best library for your task. In particular, you will discover the many ways to create interactive visualizations with its packages. You'll also leverage Pluto notebooks to gain interactivity and use them intensively through this book. You'll find out how to create animations, a handy skill for communication and teaching. Then, the book shows how to solve data analysis problems using DataFrames and various plotting packages based on the grammar of graphics. Furthermore, you'll discover how to create the most common statistical plots for data exploration. Also, you'll learn to visualize geographically distributed data, graphs and networks, and biological data. Lastly, this book will go deeper into plot customizations with Plots, Makie, and Gadfly—focusing on the former—teaching you to create plot themes, arrange multiple plots into a single figure, and build new plot types.By the end of this Julia book, you'll be able to create interactive and publication-quality static plots for data analysis and exploration tasks using Julia.What you will learnCreate interactive plots with Makie, Plots, Jupyter, and PlutoCreate standard statistical plots and visualize clustering resultsPlot geographically distributed and biological dataVisualize graphs and networks using GraphRecipes and GraphPlotsFind out how to draw and animate objects with Javis, Plots, and MakieDefine plot themes to reuse plot visual aspect customizationsArrange plots using Plots, Makie, and Gadfly layout systemsDefine new plot types and determine how Plots and Makie show objectsWho this book is forData analysts looking to explore Julia's data visualization capabilities will find this book helpful, along with scientists and academics who want to generate and communicate knowledge and improve their teaching material. This data visualization book will also interest Julia programmers willing to delve into the language plotting ecosystem and improve their visualization skills. Basic programming knowledge is assumed — but the book will introduce you to Julia's important features. Familiarity with mathematical and statistical concepts will help you make the most of some of the chapters.

Mastering Responsive Web Design with HTML5 and CSS3

by Ricardo Zea

Become a master in RWD with this practical, engaging guide About This Book * Build responsive designs with solid yet simple HTML5 and CSS3 best practices * Use CSS preprocessors (Sass) to speed up the creation of CSS * Each chapter covers a different feature of RWD with carefully chosen, interesting examples, including the latest developments in responsive design Who This Book Is For If you already know some HTML and CSS and understand the principles of responsive web design, this book is for you. There's something here for you to learn regardless of if you're a web designer or web developer, or whether you're a seasoned expert web professional. What You Will Learn * Install and use Sass with SCSS syntax to create your CSS * Use HTML5 tags the right way for the right type of content * Enhance the experience of users with assistive technology with ARIA roles * Design with desktop-first approach but implement with mobile-first methodology * For your layouts, either create and use your own scalable CSS grid, or use Flexbox * Create three types of navigation for small screen devices * Find the best way to serve the best type of image and how to make videos responsive * Build custom responsive emails to ensure the message gets across regardless of the device In Detail Responsive web design is getting more complex day by day and without the necessary design and development skill sets, it's a matter of time before we're left behind. Building meaningful and accessible websites and apps using HTML5 and CSS3 is a must if we want to create memorable experiences for the users. In the ever-changing world of web designers and developers, being proficient in responsive web design is no longer an option, it is mandatory. Whether you're a web designer or web developer, or a seasoned expert web professional, this book will bolster your HTML and CSS skills to a master level. The book is designed in a way that each chapter will take you one step closer to becoming an expert in RWD. The book begins with introducing you to the power of CSS preprocessors, Sass in this case, to increase the speed of writing repetitive CSS tasks, then use simple but meaningful HTML examples; and add ARIA roles to increase accessibility. You will also understand why a mobile-first approach is ideal. Next, you will learn how to use an easily scalable CSS grid or if you prefer, use Flexbox instead. Create navigations for small screen devices using the "drawer navigation," "off-canvas" or "toggle" navigation patterns, and also implement images and media in both responsive and responsible ways. Finally, you will build a solid and meaningful typographic scale and make sure your messages and communications display correctly with responsive emails. Style and approach Designing and developing for the web should be fun, and that's the tone used in the book. This book is written in a step-by-step format with clean-cut examples. You will also find tips and notes all over the book to help clarify those small and simple details most books and tutorials assume you already know.

Web Developer's Reference Guide

by Ricardo Zea Talha Khan Joshua Johanan

A one-stop guide to the essentials of web development including popular frameworks such as jQuery, Bootstrap, AngularJS, and Node.js About This Book * Understand the essential elements of HTML, CSS, and JavaScript, including how and when to use them * Walk through three of the best and most popular web development frameworks - jQuery, Bootstrap, and AngularJS * References for any function you will need in your day-to-day web development Who This Book Is For This book is perfect for beginners but more advanced web developers will also benefit. Laid out so you can refer to as much or as little as you need to, with this book you can exhaustively explore essential concepts for modern web developers. What You Will Learn * Explore detailed explanations of all the major HTML elements and attributes, illustrated with examples * Take a deep dive into CSS properties and functions and master their usage * Find clear, concise descriptions of JavaScript syntax and expressions * Recognize various JavaScript design patterns and learn the basics of JavaScript object-orientated programming * Implement the latest ECMAScript 6 for client-side scripting in your web applications * Discover new ways to develop your website's front end quickly and easily using Bootstrap * Write JavaScript extensibly using jQuery-JavaScript's feature-rich library * Delve into the key Node.js modules used in JavaScript server-side programming * Access AngularJS 's important modules, controllers, directives, and services quickly In Detail This comprehensive reference guide takes you through each topic in web development and highlights the most popular and important elements of each area. Starting with HTML, you will learn key elements and attributes and how they relate to each other. Next, you will explore CSS pseudo-classes and pseudo-elements, followed by CSS properties and functions. This will introduce you to many powerful and new selectors. You will then move on to JavaScript. This section will not just introduce functions, but will provide you with an entire reference for the language and paradigms. You will discover more about three of the most popular frameworks today--Bootstrap, which builds on CSS, jQuery which builds on JavaScript, and AngularJS, which also builds on JavaScript. Finally, you will take a walk-through Node.js, which is a server-side framework that allows you to write programs in JavaScript. Style and approach This book is an easy-to-follow, comprehensive reference guide. Each topic, function, or element is listed methodically along with parameters, return values, and descriptions. Examples are also included to help you put the concepts to use quickly in the real world.

Privacy in a Digital, Networked World

by Sherali Zeadally Mohamad Badra

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.

Internet of Things. IoT Infrastructures: Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #169)

by Sherali Zeadally Hakima Chaouchi Mohamad Badra Radu-Laurentiu Vieriu Benny Mandler Dagmar Cagáňová Johann Marquez-Barja Miguel Elias Mitre Campista Stefano Giordano Maria Fazio Andrey Somov

The two-volume set LNICST 169 and 170 constitutes the thoroughly refereed post-conference proceedings of the Second International Internet of Things Summit, IoT 360° 2015, held in Rome, Italy, in October 2015. The IoT 360° is an event bringing a 360 degree perspective on IoT-related projects in important sectors such as mobility, security, healthcare and urban spaces. The conference also aims to coach involved people on the whole path between research to innovation and the way through to commercialization in the IoT domain. This volume contains 62 revised full papers at the following four conferences: The International Conference on Safety and Security in Internet of Things, SaSeIoT, the International Conference on Smart Objects and Technologies for Social Good, GOODTECHS, the International Conference on Cloud, Networking for IoT systems, CN4IoT, and the International Conference on IoT Technologies for HealthCare, HealthyIoT.

Communication Technologies, Information Security and Sustainable Development: Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papers (Communications in Computer and Information Science #414)

by Sherali Zeadally Faisal Karim Shaikh Bhawani Shankar Chowdhry Dil Muhammad Akbar Hussain Aftab Ahmed Memon Muhammad Aslam Uqaili

This book constitutes the thoroughly refereed proceedings of the Third International Multi-topic Conference on Communications, Technologies, Information Security and Sustainable Development, IMTIC 2013, held in Jamshoro, Pakistan, in December 2013. The 27 revised papers presented in this volume were carefully reviewed and selected from 140 submissions. The topics presented had a reasonable balance between theory and practice in multi-disciplined topics including wireless sensor networks, cloud computing, wireless communication, antenna design, signal processing, software engineering, image processing, bioinformatics and telemedicine, neural networks, automation and control, and green renewable energy.

DevSecOps for .NET Core: Securing Modern Software Applications

by Afzaal Ahmad Zeeshan

Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not only learn the various stages in the DevOps pipeline through examples of solutions developed and deployed using .NET Core, but also go through open source SDKs and toolkits that will help you to incorporate automation, security, and compliance. The book starts with an outline of modern software engineering principles and gives you an overview of DevOps in .NET Core. It further explains automation in DevOps for product development along with security principles to improve product quality. Next, you will learn how to improve your product quality and avoid code issues such as SQL injection prevention, cross-site scripting, and many more. Moving forward, you will go through the steps necessary to make security, compliance, audit, and UX automated to increase the efficiency of your organization. You’ll see demonstrations of the CI phase of DevOps, on-premise and hosted, along with code analysis methods to verify product quality. Finally, you will learn network security in Docker and containers followed by compliance and security standards. After reading DevSecOps for .NET Core, you will be able to understand how automation, security, and compliance works in all the stages of the DevOps pipeline while showcasing real-world examples of solutions developed and deployed using .NET Core 3. What You Will Learn Implement security for the .NET Core runtime for cross-functional workloads Work with code style and review guidelines to improve the security, performance, and maintenance of components Add to DevOps pipelines to scan code for security vulnerabilities Deploy software on a secure infrastructure, on Docker, Kubernetes, and cloud environments Who This Book Is ForSoftware engineers and developers who develop and maintain a secure code repository.

Bayesian Natural Language Semantics and Pragmatics (Language, Cognition, and Mind #2)

by Henk Zeevat Hans-Christian Schmitz

The contributions in this volume focus on the Bayesian interpretation of natural languages, which is widely used in areas of artificial intelligence, cognitive science, and computational linguistics. This is the first volume to take up topics in Bayesian Natural Language Interpretation and make proposals based on information theory, probability theory, and related fields. The methodologies offered here extend to the target semantic and pragmatic analyses of computational natural language interpretation. Bayesian approaches to natural language semantics and pragmatics are based on methods from signal processing and the causal Bayesian models pioneered by especially Pearl. In signal processing, the Bayesian method finds the most probable interpretation by finding the one that maximizes the product of the prior probability and the likelihood of the interpretation. It thus stresses the importance of a production model for interpretation as in Grice's contributions to pragmatics or in interpretation by abduction.

Spies, Lies, and Algorithms: The History and Future of American Intelligence

by Amy B. Zegart

A riveting account of espionage for the digital age, from one of America’s leading intelligence expertsSpying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology.Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington’s Revolutionary War spies to today’s spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America’s intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare.A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today.

Refine Search

Showing 52,926 through 52,950 of 53,607 results