eIoT
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abate glo...
Software Above the Level of a Single Device
When considering "the Internet of Things," it's easy to miss the bigger pattern: we are no longer just building software for individual devices, but creating networks of intelligence and action that make it possible to completely rethink how we organize work, play, and society itself. This report provides the complete text of Tim O'Reilly...
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves
Selfies, blogs and lifelogging devices help us understand ourselves, building on long histories of written, visual and quantitative modes of self-representations. This book uses examples to explore the balance between using technology to see ourselves and allowing our machines to tell us who we are....
Mobile Research Methods
Daily activity sees data constantly flowing through cameras, the internet, satellites, radio frequencies, sensors, private appliances, cars, smartphones, tablets and the like. Among all the tools currently used, mobile devices, especially mobile phones, smartphones and tablets, are the most widespread, with their use becoming prevalent in everyday ...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Managing Risk and Information Security
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing...
Enabling Things to Talk
The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented and rich interfaces. Whereas in the beginning IoT referred to the advent of barcodes and Radio Freque...
Android Application Development for the Intel Platform
The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices...
Vessel Health and Preservation: The Right Approach for Vascular Access
This book offers updated and revised information on vessel health and preservation (VHP), a model concept first published in poster form in 2008 and in JVA in 2012, which has received a great deal of attention, especially in the US, UK and Australia. The book presents a model and a new way of thinking applied to vascular access and administration o...
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
GUI Design for Android Apps
GUI Design for Android Apps is the perfect - and concise - introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. T...
Android on x86
Android on x86: an Introduction to Optimizing for IntelĀ® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x86 de...
Energy Efficient Servers
Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outline...
Web Page Size, Speed, and Performance
Consumers prefer fast, no-nonsense web experiences, yet reports show that the top 2,000 retail websites have grown increasingly bigger and slower over the past three years. In this O'Reilly report, content strategist Terrence Dorsey examines why web pages have become so fat, and offers guidelines to help your company reverse the trend. Bigger sc...
Digital Video Concepts, Methods, and Metrics
Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to...
802.11ac: A Survival Guide
The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring. Author Matthew Gast - an industry expert who led the development of ...
Why Should I Care? Mobile Security for The Rest of Us
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief Informati...
Programming Windows Store Apps with HTML, CSS, and JavaScript
Microsoft Press is pleased to offer the second edition of Kraig Brockschmidt's in-depth ebook on writing Windows Store apps using HTML, CSS3, and JavaScript on the Windows 8.1 platform. The ebook includes 20 chapters and 4 appendices....
Windows 10 IT Pro Essentials: Support Secrets
That group includes full-time professional trainers, of course, but it also includes IT pros and those brave souls who staff the help desk in corporations. Most of all, it includes the incredibly large population of people who have earned a reputation for being "the person who knows Windows." With that knowledge comes a seemingly endle...
Deploying Windows 10
Get a head start deploying Windows 10 - with tips and best practices from experts in the field. This guide shows you how to deploy Windows 10 in an automated way without impacting end users by leveraging System Center Configuration Manager, which is the most used product to deploy Microsoft operating systems in the industry today. Windows 10 rep...
Introducing Windows 10 for IT Professionals
Get a head start evaluating Windows 10-with technical insights from award-winning journalist and Windows expert Ed Bott. This guide introduces new features and capabilities, providing a practical, high-level overview for IT professionals ready to begin deployment planning now. The goal of this book is to help you sort out what's new in Windows 1...
Data Parallel C++
Learn how to accelerate C++ programs using data parallelism. This open book enables C++ programmers to be at the forefront of this exciting and important new development that is helping to push computing to new levels. It is full of practical advice, detailed explanations, and code examples to illustrate key topics. Data parallelism in C++ enables...
Oslo Manual on Select Topics of the Law of Armed Conflict
This open book provides a valuable restatement of the current law of armed conflict regarding hostilities in a diverse range of contexts: outer space, cyber operations, remote and autonomous weapons, undersea systems and devices, submarine cables, civilians participating in unmanned operations, military objectives by nature, civilian airliners, des...
Help! My Computer is Broken
Want to know how to fix common computer problems, without having to wade through technical jargon? Or are you the family on-call technical support person, and need a bit of help? Help! My Computer Is Broken takes the most common computer problems and tells you how to fix them. It's as simple as that! If you've ever wondered why your laptop won't...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's use o...
Target Suitability and the Crime Drop
This is a chapter from The Criminal Act: The Role and Influence of Routine Activity Theory edited by Martin A. Andresen and Graham Farrell. Target suitability is a cornerstone of Marcus Felson's routine activities approach, and critical in determining crime rates. Recent research identifies reduced target suitability, via improved security, as cent...
Innovative Medicine
This book is devoted to innovative medicine, comprising the proceedings of the Uehara Memorial Foundation Symposium 2014. It remains extremely rare for the findings of basic research to be developed into clinical applications, and it takes a long time for the process to be achieved. The task of advancing the development of basic research into clini...
Stable Isotopes to Trace Migratory Birds and to Identify Harmful Diseases
This manuscript discusses the potentials of the approaches as mentioned below to monitor the AIVs in WMW. Molecular diagnostic platforms enable for accurate detection of the AIVs in the feces of infected birds. Similar technologies can be used to determine the bird species through DNA barcoding, enabling non-invasive research on the epidemiology of...
Contemporary Bioethics
This book discusses the common principles of morality and ethics derived from divinely endowed intuitive reason through the creation of al-fitr' a (nature) and human intellect (al-'aql). Biomedical topics are presented and ethical issues related to topics such as genetic testing, assisted reproduction and organ transplantation are discussed.Whereas...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Anti-fragile ICT Systems
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-frag...

1 2 3