Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Multimedia Big Data Computing for IoT Applications
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
Engineering Reliable Mobile Applications
Imagine a situation where your services report healthy and serving but you receive multiple user reports of poor availability. How are these users accessing your service? Most likely, they are using your service through a client application, such as a mobile application on their phone. SRE traditionally has only supported systems and services run i...
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, intro...
Learn BlackBerry 10 App Development
Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app's UI, and C++/Qt for the application logic. No prior know...
Sensor Technologies
Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing. It discusses the social, regulatory, and design considerations specific to these domains. ...
Enabling Things to Talk
The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented and rich interfaces. Whereas in the beginning IoT referred to the advent of barcodes and Radio Freque...
Android Application Development for the Intel Platform
The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices...
Intel Xeon Phi Coprocessor Architecture and Tools
Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It...
High-Performance Modelling and Simulation for Big Data Applications
This book is the final compendium of case studies emanated from the 4-year COST Action IC1406 "High-Performance Modelling and Simulation for Big Data Applications" (cHiPSet). Funded by the European Commission from 2015, cHiPSet has created a sustainable reference network linking applied research in High Performance Computing (HPC) and Mod...
Model-Driven Development and Operation of Multi-Cloud Applications
This book summarizes work being undertaken within the collaborative MODAClouds research project, which aims to facilitate interoperability between heterogeneous Cloud platforms and remove the constraints of deployment, portability, and reversibility for end users of Cloud services. Experts involved in the project provide a clear overview of the MOD...
Android on x86
Android on x86: an Introduction to Optimizing for IntelĀ® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x...
Optimizing HPC Applications with Intel Cluster Tools
Optimizing HPC Applications with Intel Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve...
25 Secrets for Faster ASP.NET Applications
Read the tips and tricks recommended by some of the smartest minds in the ASP.NET community. 25 tips from the ASP.NET community for boosting performance in your web applications; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers async/await, Web API, ORMs, interactions between your code and your data...
.NET Microservices
This guide is an introduction to developing microservices-based applications and managing them using containers. It discusses architectural design and implementation approaches using .NET Core and Docker containers. To make it easier to get started with containers and microservices, the guide focuses on a reference containerized and microservice-ba...
Containerized Docker Application Lifecycle with Microsoft Platform and Tools
This book provides end-to-end guidance on the Docker application development lifecycle with Microsoft tools and services while providing an introduction to Docker development concepts for readers who might be new to the Docker ecosystem. This way, anyone can understand the global picture and start planning development projects based on Docker and M...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
Application Insights Succinctly
When running a web application or service, there are three crucial elements to keep tabs on: availability, performance, and usage. A wide variety of technologies are available to monitor these things, but one that stands apart is Application Insights, a developer tool available through the Microsoft Azure cloud platform. In Application Insights Suc...
Developing Backbone.js Applications
If you want to build your site's frontend with the single-page application (SPA) model, this hands-on book shows you how to get the job done with Backbone.js. You'll learn how to create structured JavaScript applications, using Backbone's own flavor of model-view-controller (MVC) architecture. Start with the basics of MVC, SPA, an...
Managing Distributed Cloud Applications and Infrastructure
The emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures but across the cloud-to-edge continuum, is introducing new challenges for managing applications and infrastructure across this continuum. The scale and complexity is simply so complex that it is no longer realistic for...
Building Modern Web Applications With Spring Boot and Vaadin
This guide is a practical introduction to web application development with Spring Boot and Vaadin. It covers the entire development process, from setup to deployment, following a step-by-step approach. You can replicate each section at your own pace as you follow along. The content is suitable for anyone familiar with Java who wants to build ...
Architect Modern Web Applications with ASP.NET Core and Azure
The audience for this guide is mainly developers, development leads, and architects who are interested in building modern web applications using Microsoft technologies and services in the cloud. A secondary audience is technical decision makers who are already familiar ASP.NET or Azure and are looking for information on whether it makes sense to...
CI/CD with Docker and Kubernetes
Containers change how developers build, test, and deploy code. Adopting them takes time. Using them the wrong way can slow down your delivery process. But you don't have a team of engineers to dedicate to this like Spotify or Netflix do. Maybe you're a startup CTO with features to ship - you can't spend hundreds of hours on intern...
Cloud Native DevOps with Kubernetes
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through...
Application Delivery and Load Balancing in Microsoft Azure
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
Intelligent Human Computer Interaction
This book constitutes the thoroughly refereed proceedings of the 9th International Conference on Intelligent Human Computer Interaction, IHCI 2017, held in Evry, France, in December 2017. The 15 papers presented together with three invited papers were carefully reviewed and selected from 25 submissions. The conference is forum for the presentation...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of...
Theory and Applications of Ordered Fuzzy Numbers
This book offers comprehensive coverage on Ordered Fuzzy Numbers, providing readers with both the basic information and the necessary expertise to use them in a variety of real-world applications. The respective chapters, written by leading researchers, discuss the main techniques and applications, together with the advantages and shortcomings of t...
Variant Construction from Theoretical Foundation to Applications
This book presents theoretical framework and sample applications of variant construction. The first part includes the components variant logic, variant measurements, and variant maps, while the second part covers sample applications such as variation with functions, variant stream ciphers, quantum interference, classical/quantum random sequences, w...
New Horizons for a Data-Driven Economy
In this book readers will find technological discussions on the existing and emerging technologies across the different stages of the big data value chain. They will learn about legal aspects of big data, the social impact, and about education needs and requirements. And they will discover the business perspective and how big data technology can be...
Internet of Things
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...

1 2 3 ... 20