Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Dissecting the Criminal Corpse
Those convicted of homicide were hanged on the public gallows before being dissected under the Murder Act in Georgian England. Yet, from 1752, whether criminals actually died on the hanging tree or in the dissection room remained a medical mystery in early modern society. Dissecting the Criminal Corpse takes issue with the historical cliché of cor...
Executing Magic in the Modern Era
This book explores the magical and medical history of executions from the eighteenth to the early twentieth century by looking at the afterlife potency of criminal corpses, the healing activities of the executioner, and the magic of the gallows site. The use of corpses in medicine and magic has been recorded back into antiquity. The lacerated bodie...
Android on x86
Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x86 de...
Pro TBB
This book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present ...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
S-BPM in the Wild
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with implications or suggestions for further studies. Significant variables and success factors are identified that...
Interdisciplinary Perspectives on Mortality and its Timings
This volume provides a series of illuminating perspectives on the timings of death, through in-depth studies of Shakespearean tragedy, criminal execution, embalming practices, fears of premature burial, rumours of Adolf Hitler's survival, and the legal concept of brain death. In doing so, it explores a number of questions, including: how do we know...
Harnessing the Power of the Criminal Corpse
This book is the culmination of many years of research on what happened to the bodies of executed criminals in the past. Focusing on the eighteenth and nineteenth centuries, it looks at the consequences of the 1752 Murder Act. These criminal bodies had a crucial role in the history of medicine, and the history of crime, and great symbolic resonance...
The Culture of Capital Punishment in Japan
This free book provides a comparative perspective on capital punishment in Japan and the United States. Alongside the US, Japan is one of only a few developed democracies in the world which retains capital punishment and continues to carry out executions on a regular basis. There are some similarities between the two systems of capital punishment b...
Punishing the Criminal Corpse, 1700-1840
This book analyses the different types of post-execution punishments and other aggravated execution practices, the reasons why they were advocated, and the decision, enshrined in the Murder Act of 1752, to make two post-execution punishments, dissection and gibbeting, an integral part of sentences for murder. It traces the origins of the Act, and t...
Fundamentals of Python Programming
Guido van Rossum created the Python programming language in the late 1980s. In contrast to other popular languages such as C, C++ , Java, and C#, Python strives to provide a simple but powerful syntax. Python is used for software development at companies and organizations such as Google, Yahoo, Facebook, CERN, Industrial Light and Magic, and NAS...
Modern C
Modern C focuses on the new and unique features of modern C programming. The book is based on the latest C standards and offers an up-to-date perspective on this tried-and-true language. C is extraordinarily modern for a 50-year-old programming language. Whether you're writing embedded code, low-level system routines, or high-performance applica...
Computer and Information Sciences
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classific...
The Essence of Software Engineering
This book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research findings dealing with current practical software engineering issues and also pointers to potential future developme...
Designing Digital Work
"This book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, integration and digitization of work processes and collaboration. The authors take a heavily human-centered approach while never losing sight of engineering aspects involved. Rooted in relevant theories, they present a set...
Tools and Algorithms for the Construction and Analysis of Systems
This book constitutes the refereed proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2001. The 36 revised full papers presented together with an invited contribution were carefully reviewed and selected from a total of 125 submissions. The papers are organized in sections on ...
Fundamental Approaches to Software Engineering
This book constitutes the proceedings of the 21st International Conference on Fundamental Approaches to Software Engineering, FASE 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018.The 19 papers presented in this volume were carefully reviewed ...
Programming Languages and Systems
This book constitutes the proceedings of the 27th European Symposium on Programming, ESOP 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. The 36 papers presented in this volume were carefully reviewed and selected from 114 submissions. The ...
Intel Xeon Phi Coprocessor Architecture and Tools
Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It...
The Huawei and Snowden Questions
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
S-BPM Illustrated
S-BPM stands for "subject-oriented business process management" and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for process professionals. Its potential particularly lies in the integration of advanced informati...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Model-Driven Development and Operation of Multi-Cloud Applications
This book summarizes work being undertaken within the collaborative MODAClouds research project, which aims to facilitate interoperability between heterogeneous Cloud platforms and remove the constraints of deployment, portability, and reversibility for end users of Cloud services. Experts involved in the project provide a clear overview of the MOD...
The Golden and Ghoulish Age of the Gibbet in Britain
This book is the first academic study of the post-mortem practice of gibbeting ('hanging in chains'), since the nineteenth century. Gibbeting involved placing the executed body of a malefactor in an iron cage and suspending it from a tall post. A body might remain in the gibbet for many decades, while it gradually fell to pieces. Hanging in chains ...
Remembering and Disremembering the Dead
This book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and when is death, affects how we understand the possibility of posthumous harm and redemption. Whilst it is impossible to hurt the dead, it is possible to harm the wishes, beliefs and memories of persons that once lived. In this wa...
Optimizing HPC Applications with Intel Cluster Tools
Optimizing HPC Applications with Intel Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve...
Exploring Cloud Computing
Cloud Computing is enabling many trends in IT today: microservices, pay-as-you-go pricing, and serverless architectures, to name three. The biggest player in the market's Amazon, who offers the most mature cloud systems through their Amazon Web Services (AWS). Other companies are gaining traction as well: Google invests into their Google Cloud Plat...
Think Python
If you want to learn how to program, working with Python is an excellent way to start. This hands-on guide takes you through the language a step at a time, beginning with basic programming concepts before moving on to functions, recursion, data structures, and object-oriented design. This second edition and its supporting code have been updated for...
One Hundred Years of Chemical Warfare: Research, Deployment, Consequences
Carried by a long-awaited wind, the chlorine cloud passed within a few minutes through the British and French trenches, leaving behind at least 1,000 dead and 4,000 injured. This chemical attack, which amounted to the first use of a weapon of mass destruction, marks a turning point in world history. The preparation as well as the execution of the g...
Programming for Computations - Python
This book presents computer programming as a key method for solving mathematical problems. This second edition of the well-received book has been extensively revised: All code is now written in Python version 3.6 (no longer version 2.7). In addition, the two first chapters of the previous edition have been extended and split up into five new chapte...

1 2