Programming Persistent Memory
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times - a huge leap forward in byte-addressable capacity compar...
SQL Server Hardware
SQL Server Hardware will provide the fundamental knowledge and resources you need to make intelligent decisions about choice, and optimal installation and configuration, of SQL Server hardware, operating system and the SQL Server RDBMS. Relational databases place heavy demands on their underlying hardware and many of these databases are mission-...
Deploying Windows 10
Get a head start deploying Windows 10 - with tips and best practices from experts in the field. This guide shows you how to deploy Windows 10 in an automated way without impacting end users by leveraging System Center Configuration Manager, which is the most used product to deploy Microsoft operating systems in the industry today. Windows 10 rep...
Operating Systems and Middleware
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Android on x86
Android on x86: an Introduction to Optimizing for IntelĀ® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x86 de...
Energy Efficient Servers
Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outline...
The Design and Implementation of the Anykernel and Rump Kernels
The mission of the first edition of this book was to introduce the anykernel and rump kernels and motivate their existence. Additionally, we explored the characteristics of the technology through various experiments. The paramount, often criminally overlooked experiment was the one hiding in plain sight: is it possible to construct the system in a ...
Travel Marketing, Tourism Economics and the Airline Product
This book provides a comprehensive introduction to travel marketing, tourism economics and the airline product. At the same time, it provides an overview on the political, socio-economic, environmental and technological impacts of tourism and its related sectors.This publication covers both theory and practice in an engaging style, that will spark ...
Optimizing software in C++
This is an optimization manual for advanced C++ programmers. This book are not for beginners. Topics include: - The choice of platform and operating system. - Choice of compiler and framework. - Finding performance bottlenecks. - The efficiency of different C++ constructs. - Multi-core systems. - Parallelization with vector operations. - CPU dispa...
Pro Git
Pro Git, 2nd Edition is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented v...
Microfinance 3.0
This book focuses on the achievements, current trends and further potential of microfinance to scale-up and serve many more clients with financial services that enable them to improve their living conditions. The book asks what it takes to achieve sustainable impact: to know your clients and to understand their needs, to treat them in a fair and tr...
Formalizing the Shadow Economy in Serbia
The main objective of this book is to develop a strategy and policy measures to enhance the formalization of the shadow economy in order to improve the competitiveness of the economy and contribute to economic growth; it explores these issues with special reference to Serbia. The size and development of the shadow economy in Serbia and other Centra...
Computer and Information Sciences
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classific...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of long...
Informatics in the Future
This volume discusses the prospects and evolution of informatics (or computer science), which has become the operating system of our world, and is today seen as the science of the information society. Its artifacts change the world and its methods have an impact on how we think about and perceive the world. Classical computer science is built on th...
Tools and Algorithms for the Construction and Analysis of Systems
This book constitutes the refereed proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2001. The 36 revised full papers presented together with an invited contribution were carefully reviewed and selected from a total of 125 submissions. The papers are organized in sections on ...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Tools and Algorithms for the Construction and Analysis of Systems
The LNCS 11427 and 11428 proceedings set constitutes the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019. The tot...
The Huawei and Snowden Questions
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
Foundations of Software Science and Computation Structures
This book constitutes the proceedings of the 21st International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2018, which took place in Thessaloniki, Greece, in April 2018, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2018.The 31 papers presented in this volume were ca...
High-Performance Modelling and Simulation for Big Data Applications
This book is the final compendium of case studies emanated from the 4-year COST Action IC1406 "High-Performance Modelling and Simulation for Big Data Applications" (cHiPSet). Funded by the European Commission from 2015, cHiPSet has created a sustainable reference network linking applied research in High Performance Computing (HPC) and Mod...
Internet of Things
First IFIP International Cross-Domain Conference, IFIPIoT 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-19, 2018, Revised Selected Papers...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Built on Value
This book presents the concept of value as the central component to success and longevity of the global ICT industry player, Huawei. It provides examples of how Huawei focuses on customers to pursue sustainable and profitable growth rather than focusing on capital market valuation, which is a familiar scenario among Western companies. It is the bus...
GUI Design for Android Apps
GUI Design for Android Apps is the perfect - and concise - introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. T...
Solving PDEs in Python
This book offers a concise and gentle introduction to finite element programming in Python based on the popular FEniCS software library. Using a series of examples, including the Poisson equation, the equations of linear elasticity, the incompressible Navier - Stokes equations, and systems of nonlinear advection - diffusion - reaction equations, it...
Embedded Firmware Solutions
Embedded Firmware Solutions is the perfect introduction and daily-use field guide - for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel's new firmware direction (including Quark coverage), showing how to integrate IntelĀ® Architecture designs into their plans. Featuring hands-on examples an...
Optimizing HPC Applications with Intel Cluster Tools
Optimizing HPC Applications with Intel Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve...

1 2