Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Solving the Powertrain Puzzle
Every four years, Schaeffler provides an insight into its latest developments and technologies from the engine, transmission and chassis as well as hybridization and electric mobility sectors. In 2014 the Schaeffler Symposium with the motto "Solving the Powertrain Puzzle" took place from 3th to 4th of April in Baden-Baden. Mobility for to...
Foundations of Software Science and Computation Structures
This book constitutes the proceedings of the 15th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2012, held as part of the joint European Conference on Theory and Practice of Software, ETAPS 2012, which took place in Tallinn, Estonia, in March/April 2012. The 29 papers presented in this book toget...
Fundamental Approaches to Software Engineering
This book constitutes the proceedings of the 21st International Conference on Fundamental Approaches to Software Engineering, FASE 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018.The 19 papers presented in this volume were carefully reviewed ...
Programming Languages and Systems
This book constitutes the proceedings of the 27th European Symposium on Programming, ESOP 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. The 36 papers presented in this volume were carefully reviewed and selected from 114 submissions. The ...
Tools and Algorithms for the Construction and Analysis of Systems
The LNCS 11427 and 11428 proceedings set constitutes the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019. The tot...
Foundations of Software Science and Computation Structures
This book constitutes the proceedings of the 21st International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 31 papers presented in this volume were ca...
One Hundred Years of Chemical Warfare: Research, Deployment, Consequences
Carried by a long-awaited wind, the chlorine cloud passed within a few minutes through the British and French trenches, leaving behind at least 1,000 dead and 4,000 injured. This chemical attack, which amounted to the first use of a weapon of mass destruction, marks a turning point in world history. The preparation as well as the execution of the g...
Pro Git
Pro Git, 2nd Edition is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented v...
Learn BlackBerry 10 App Development
Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app's UI, and C++/Qt for the application logic. No prior know...
Vote Buying in Indonesia
Muhtadi's analysis of vote-buying in post-democratization Indonesia is original, profound, subtle, nuanced, and convincing as well as beautifully organized and well written. Equally important, its imaginative policy prescriptions will be widely read and cited as a significant contribution to the literature of comparative electoral politics. �...
Aging Well
This book outlines the challenges of supporting the health and wellbeing of older adults around the world and offers examples of solutions designed by stakeholders, healthcare providers, and public, private and nonprofit organizations in the United States. The solutions presented address challenges including: providing person-centered long-term car...
The Values of Independent Hip-Hop in the Post-Golden Era
Utilizing a mixed-methods approach, this book uncovers the historical trajectory of U.S. independent hip-hop in the post-golden era, seeking to understand its complex relationship to mainstream hip-hop culture and U.S. culture more generally. Christopher Vito analyzes the lyrics of indie hip-hop albums from 2000-2013 to uncover the dominant ideolog...
Managing Risk and Information Security
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Man...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
Sensor Technologies
Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing. It discusses the social, regulatory, and design considerations specific to these domains. ...
Rethinking Productivity in Software Engineering
Get the most out of this foundational reference and improve the productivity of your software teams. This book collects the wisdom of the 2017 "Dagstuhl" seminar on productivity in software engineering, a meeting of community leaders, who came together with the goal of rethinking traditional definitions and measures of productivity. The ...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of...
Tools and Algorithms for the Construction and Analysis of Systems
This book constitutes the refereed proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2001. The 36 revised full papers presented together with an invited contribution were carefully reviewed and selected from a total of 125 submissions. The papers are organized in sections on ...
Ray Tracing Gems
This book is a must-have for anyone serious about rendering in real time. With the announcement of new ray tracing APIs and hardware to support them, developers can easily create real-time applications with ray tracing as a core component. As ray tracing on the GPU becomes faster, it will play a more central role in real-time rendering. Ray Tracing...
Android Application Development for the Intel Platform
The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices...
Office 365
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migrati...
TouchDevelop
Mobile devices such as smartphones and tablets are set to become the main computers that virtually all people will own and carry with them at all times. And yet,mobile devices are not yet used for all computing tasks. A project at Microsoft Research was created to answer a simple question: "It is possible to create interesting apps directly on...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Radiation Monitoring and Dose Estimation of the Fukushima Nuclear Accident
This book provides comprehensive research findings related to the environmental monitoring of radiation, levels of radioactive nuclides in various environments, and dose estimation in residents after the Fukushima nuclear power plant accident caused severe environmental contamination with radioactive nuclides. At the beginning of the book, a techni...
MARE-WINT
This book provides a holistic, interdisciplinary overview of offshore wind energy, and is a must-read for advanced researchers. Topics, from the design and analysis of future turbines, to the decommissioning of wind farms, are covered. The scope of the work ranges from analytical, numerical and experimental advancements in structural and fluid mech...
Computer Vision Metrics
Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, ...
Intel Xeon Phi Coprocessor Architecture and Tools
Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It...
Habitats and Biota of the Gulf of Mexico: Before the Deepwater Horizon Oil Spill
The Gulf of Mexico is an open and dynamic marine ecosystem rich in natural resources but heavily impacted by human activities, including agricultural, industrial, commercial and coastal development. Nutrients and pollutants from coastal communities and dozens of rivers flow into the Gulf, including material from the Mississippi River watershed, whi...
Pro TBB
This book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present ...
Habitats and Biota of the Gulf of Mexico: Before the Deepwater Horizon Oil Spill
The Gulf of Mexico is an open and dynamic marine ecosystem rich in natural resources but heavily impacted by human activities, including agricultural, industrial, commercial and coastal development. Nutrients and pollutants from coastal communities and dozens of rivers flow into the Gulf, including material from the Mississippi River watershed, whi...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...

1 2 3