Disrupting Finance
This open access Pivot demonstrates how a variety of technologies act as innovation catalysts within the banking and financial services sector. Traditional banks and financial services are under increasing competition from global IT companies such as Google, Apple, Amazon and PayPal whilst facing pressure from investors to reduce costs, increase ag...
Dynamic Spectrum Management
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio, blockchain, and artificial intelligence, and offers valuable guidance for designing advanced wireless communications systems. This b...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Using Blocks in Ruby
Unannounced and unmarked, blocks turn up all over Ruby programs. Their use ranges from some of Ruby's most basic structures, such as loops, to some of its most sophisticated tricks. Similar to closures or lambdas in other languages, blocks enable some of Ruby's vaunted efficiency. Blocks even allow other people to write some of the code you use. ...
SQL Server Concurrency
If you've designed your SQL code intelligently and implemented a sensible indexing strategy, there's a good chance your queries will "fly", when tested in isolation. In the real world, however, where multiple processes can access the same data at the same time, SQL Server often has to make one process wait, sacrificing concurrency and per...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Security in Computer and Information Sciences
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Pro TBB
This book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present ...
Debating Transformations of National Citizenship
This book discusses how national citizenship is being transformed by economic, social and political change. It focuses on the emergence of global markets where citizenship is for sale and on how new reproduction technologies impact citizenship by descent. It also discusses the return of banishment through denationalisation of terrorist suspects, an...
Digital Transformation of the Design, Construction and Management Processes of the Built Environment
This open access book focuses on the development of methods, interoperable and integrated ICT tools, and survey techniques for optimal management of the building process. The construction sector is facing an increasing demand for major innovations in terms of digital dematerialization and technologies such as the Internet of Things, big data, advan...
Performance Tuning with SQL Server Dynamic Management Views
Dynamic Management Views (DMVs) are a significant and valuable addition to the DBA's troubleshooting armory, laying bare previously unavailable information regarding the under-the-covers activity of your database sessions and transactions. Why, then, aren't all DBAs using them? Why do many DBAs continue to ignore them in favour of "tried an...
CSS Notes for Professionals
The CSS Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Crypto 101
Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. Learn how to exploit common cryptographic flaws, armed with nothing but a little time and your favorite programming language. Forge administrator cookies, recover passwords, and even backdoor your own random number generator....
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
I Love Ruby
Ruby is an easy to learn programming language, it was invented by a guy named Matz in Japan. Ruby is a free software and can be used by any one for zero cost. Ruby's popularity was initially confined to Japan, later it slowly trickled out to rest of the world. Things changed with the emergence of Ruby on Rails which is a popular web-development fra...
Access Denied
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries. Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens - most often about politics, b...
Networking with the Micro:bit
This book presents a series of activities to teach the basics of computer networks. While you will not learn all aspects of computer networking, we hope that it will serve as a good starting point. To network micro:bits, we use custom micro:bit radio to radio communication. When one hears the word radio, what comes to mind is the radio that blas...
Oracle Database Notes for Professionals
The Oracle Database Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Objective-C Notes for Professionals
The Objective-C Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Ruby Notes for Professionals
The Ruby Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Swift Notes for Professionals
The Swift Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Nb3Sn Accelerator Magnets
This book is written by world-recognized experts in the fields of applied superconductivity and superconducting accelerator magnet technologies. It provides a contemporary review and assessment of the experience in research and development of high-field accelerator dipole magnets based on Nb3Sn superconductor over the past five decades. The reader ...
Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models
Flow of ions through voltage gated channels can be represented theoretically using stochastic differential equations where the gating mechanism is represented by a Markov model. The flow through a channel can be manipulated using various drugs, and the effect of a given drug can be reflected by changing the Markov model. These lecture notes provide...
Ray Tracing Gems
This book is a must-have for anyone serious about rendering in real time. With the announcement of new ray tracing APIs and hardware to support them, developers can easily create real-time applications with ray tracing as a core component. As ray tracing on the GPU becomes faster, it will play a more central role in real-time rendering. Ray Tracing...
Tales of Research Misconduct
This monograph contributes to the scientific misconduct debate from an oblique perspective, by analysing seven novels devoted to this issue, namely: Arrowsmith by Sinclair Lewis (1925), The affair by C.P. Snow (1960), Cantor's Dilemma by Carl Djerassi (1989), Perlmann's Silence by Pascal Mercier (1995), Intuition by Allegra Goodman (2006), Solar ...
Cyber-Physical Systems of Systems
Technical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective – form the backbone of most of today's infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipment, ...
Housing Estates in the Baltic Countries
This book focuses on the formation and later socio-spatial trajectories of large housing estates in the Baltic countries - Estonia, Latvia, and Lithuania. It also explores claims that a distinctly "westward-looking orientation" in their design produced housing estates that were superior in design to those produced elsewhere in the Soviet ...
Air Quality Integrated Assessment
This book reports on the results of an extended survey conducted across Europe within the framework of the APPRAISAL FP7 project to determine the extent to which an integrated assessment approach to air quality is being adopted, on the one hand, by regional and local authorities to develop air quality plans and, on the other, by researchers. Follow...
New Methods for Measuring and Analyzing Segregation
This book introduces new methods for measuring and analyzing residential segregation. It begins by placing all popular segregation indices in the "difference of group means" framework wherein index scores can be obtained as simple differences of group means on individual-level residential attainments scored from area racial composition. ...
Understanding the Bigger Energy Picture
This book focuses on the global cycles of energy, water and carbon, which are not only the essentials of our main energy carriers, the fossil fuels, but are also the building blocks of life. The book offers an overview of the basic scientific facts and relationships that are needed to understand today's energy generation and use, how they relate to...
Forecasting and Assessing Risk of Individual Electricity Peaks
The overarching aim of this book is to present self-contained theory and algorithms for investigation and prediction of electric demand peaks. A cross-section of popular demand forecasting algorithms from statistics, machine learning and mathematics is presented, followed by extreme value theory techniques with examples.In order to achieve carbon t...

1 2 3 4