Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Information Technology & Software Development


41. 

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

Managing Risk and Security in Outsourcing IT Services: Onshore, Offshore and the Cloud

By: Frank Siepmann

Publisher: Auerbach Publications

Publication Date: 09-DEC-2013

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book explains how to address the risks that can arise from outsourcing or adopting cloud technology. Providing you with an understanding of the fundamentals, it supplies authoritative guidance and examples on how to tailor the right risk approach for your organization. Covering onshore, offshore, and cloud services, it provides concrete examples and illustrative case studies that describe the specifics of what to do and what not to do across a variety of implementation scenarios. This book provides the fundamental understanding and guidance readers need to keep information, processes,...

42. 

Manifold Learning Theory and Applications

Manifold Learning Theory and Applications

By: Yunqian Ma; Yun Fu

Publisher: CRC Press

Publication Date: 20-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Incorporating state-of-the-art techniques, this book provides complete theoretical and practical treatment of manifold learning. An excellent entry point for readers new to the subject, it supplies a high-level introductory view of the topic as well as in-depth discussion of the key technical details. It summarizes up-to-date advances in manifold learning. The comprehensive range of topics include basic theoretical background, implementation, and practical applications in fields such as medical, biometrics, multimedia, and computer vision. ...

43. 

Undocumented Secrets of MATLAB-Java Programming

Undocumented Secrets of MATLAB-Java Programming

By: Yair Altman

Publisher: Chapman and Hall/CRC

Publication Date: 05-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Many people know that a major part of the functionality of the MATLAB<SUP>®</SUP> software package is based on Java. But fewer people know how to manipulate Java to achieve improved appearance and functionality and thus heighten MATLAB software’s applicability to real world, modern situations. Organized by related functionality/usage and ordered from facile to complex, this book presents examples, instruction, and code snippets in stand-alone, self-contained chapters. Requiring <EM>no prior Java knowledge</EM>, this book provides numerous online references and resources to show readers how...

44. 

IT Best Practices: Management, Teams, Quality, Performance, and Projects

IT Best Practices: Management, Teams, Quality, Performance, and Projects

By: Tom Witt

Publisher: Auerbach Publications

Publication Date: 20-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Ideal for project, IT, and systems development managers, this book details the skills, knowledge, and attributes needed to bringing about large-scale change. It explains how to incorporate quality methods into the change management process and outlines a holistic approach for transformation management. Its comprehensive coverage spans team building, quality, project methodology, resource allocation, process engineering, and management best practices. The material covered is validated with references to concepts and processes from such business greats as Dr. Deming, Jack Welch, and Henry...

45. 

Security De-Engineering: Solving the Problems in Information Risk Management

Security De-Engineering: Solving the Problems in Information Risk Management

By: Ian Tibble

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

With organizations facing growing security challenges from both automated and manual attacks, these incidents now represent more of a threat to the bottom line than ever before. This book explains the problems in corporate information security and how to solve them. Based on more than a decade of global experience, the author explains how the industry has faltered and how a gradual decline in analytical skills has led the corporate world on a disastrous collision course with automated malware attacks and manual intrusions. ...

46. 

Statistical Learning and Data Science

Statistical Learning and Data Science

By: Mireille Summa; Leon Bottou; Bernard Goldfarb; Fionn Murtagh; Catherine Pardoux; Myriam Touati

Publisher: Chapman and Hall/CRC

Publication Date: 19-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Driven by a vast range of applications, data analysis and learning from data are vibrant areas of research. Various methodologies, including unsupervised data analysis, supervised machine learning, and semi-supervised techniques, have continued to develop to cope with the increasing amount of data collected through modern technology. With a focus on applications, this volume presents contributions from some of the leading researchers in the different fields of data analysis. Synthesizing the methodologies into a coherent framework, the book covers a range of topics, from large-scale...

47. 

Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big Data, Second Edition

Statistical and Machine-Learning Data Mining: Techniques for Better Predictive Modeling and Analysis of Big Data, Second Edition

By: Bruce Ratner

Publisher: CRC Press

Publication Date: 19-DEC-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Focusing on uniquely large-scale statistical models that effectively consider big data identifying structures (variables) with the appropriate predictive power in order to yield reliable, robust, relevant large scale analyses, this revised edition incorporates 13 new chapters, as well as expanded explanations of the author's own popular machine-learning GenIQ Model. The book highlights the needs of data analysts, regression modelers, non-regression modelers, and data miners across all industry sectors, delivering practical yet powerful, simple yet insightful quantitative techniques that...

48. 

IP Telephony Interconnection Reference: Challenges, Models, and Engineering

IP Telephony Interconnection Reference: Challenges, Models, and Engineering

By: Mohamed Boucadair; Isabel Borges; Pedro Neves; Olafur Einarsson

Publisher: CRC Press

Publication Date: 04-NOV-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Written to address the growth of IP telephony service offerings within the corporate and residential realm, this book discusses technical and regulatory issues related to IP Telephony Interconnection. It describes business and interconnection models and solutions, and provides an overview of emerging architectures such as IMS and TISPAN. The authors offer a detailed overview of the SPPEERMINT activity and proposed architecture, the current work undertaken in DRINKS, the use of ENUM for interconnection, and ENUM implementation status, among others. This text is a first of its kind to offer...

49. 

Communication Architectures for Systems-on-Chip

Communication Architectures for Systems-on-Chip

By: José Ayala

Publisher: CRC Press

Publication Date: 14-MAR-2011

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book covers the current communication architectures that are implemented in manufactured systems-on-chip, as well as those that are being proposed to overcome the existing limitations. The text addresses well-established communication buses and less-common networks on chip, along with modern technologies that propose the use of carbon nano tubes and optical links to speed up data transfer and increase both security levels and quality of service. Contributors address on-chip transaction security involving critical information and the mechanisms to protect from an external attack,...

50. 

Knowledge-based Configuration

Knowledge-based Configuration

By: Alexander Felfernig; Lothar Hotz; Claire Bagley; Juha Tiihonen

Publisher: Morgan Kaufmann

Publication Date: 02-APR-2014

Insert Date: 19-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Knowledge-based Configuration incorporates knowledge representation formalisms to capture complex product models and reasoning methods to provide intelligent interactive behavior with the user. This book represents the first time that corporate and academic worlds collaborate integrating research and commercial benefits of knowledge-based configuration. Foundational interdisciplinary material is provided for composing models from increasingly complex products and services. Case studies, the latest research, and graphical knowledge representations that increase understanding of...

51. 

Advanced Windows RT Memory Dump Analysis: ARM Version

Advanced Windows RT Memory Dump Analysis: ARM Version

By: 

Publisher: OpenTask

Publication Date: 18-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The full transcript of Software Diagnostics Services training with 9 step-by-step exercises. Learn how to navigate through memory dump space and Windows data structures to perform memory forensics, troubleshoot and debug complex software incidents. The training uses a unique and innovative pattern-driven analysis approach to speed up the learning curve. It consists of practical step-by-step exercises using WinDbg to diagnose structural and behavioural patterns in Windows RT kernel and complete (physical) memory dumps. Additional topics include memory search, kernel linked list navigation,...

52. 

Raspberry Pi Cookbook for Python Programmers

Raspberry Pi Cookbook for Python Programmers

By: Tim Cox

Publisher: Packt Publishing

Publication Date: 16-APR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Over 50 easy-to-comprehend tailor-made recipes to get the most out of the Raspberry Pi and unleash its huge potential using Python Install your first operating system, share files over the network, and run programs remotely Unleash the hidden potential of the Raspberry Pi’s powerful Video Core IV graphics processor with your own hardware accelerated 3D graphics Discover how to create your own electronic circuits to interact with the Raspberry Pi Interface with purpose-built add-ons and adapt off-the-shelf household devices In Detail The Raspberry Pi foundation has...

53. 

Getting Started with SOQL

Getting Started with SOQL

By: Magulan D

Publisher: Packt Publishing

Publication Date: 16-APR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Revolutionize the use of simple query strings to make them more efficient using SOQL Write optimized SOQL statements Discover the standards to follow while writing SOQL statements Learn how to write SOQL statements without hitting the limits set by Salesforce.com In Detail Salesforce Object Querying Language(SOQL) is used by Salesforce to search database applications. Although only one object can be queried at a time, SOQL allows for greater flexibility over the queries for more objects. This in turn allows for greater accuracy in searches, though the query does...

54. 

Outlier Detection for Temporal Data

Outlier Detection for Temporal Data

By: Manish Gupta; Jing Gao; Charu Aggarwal; Jiawei Han

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Outlier (or anomaly) detection is a very broad field which has been studied in the context of a large number of research areas like statistics, data mining, sensor networks, environmental science, distributed systems, spatio-temporal mining, etc. Initial research in outlier detection focused on time series-based outliers (in statistics). Since then, outlier detection has been studied on a large variety of data types including high-dimensional data, uncertain data, stream data, network data, time series data, spatial data, and spatio-temporal data. While there have been many tutorials and...

55. 

Exploring New Roles for Librarians

Exploring New Roles for Librarians

By: Lisa Federer

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Librarians have been providing support to researchers for many years, typically with a focus on responding to researchers’ needs for access to the existing literature. However, librarians’ skills and expertise make them uniquely suited to provide a wide range of assistance to researchers across the entire research process, from conception of the research question to archiving of collected data at the project’s conclusion. In response to increasingly stringent demands on researchers to share their data, and as computationally intensive and primarily data-driven scientific methods begin to take...

56. 

Rough Cuts
Object Storage with Swift

Object Storage with Swift

By: Joe Arnold

Publisher: O'Reilly Media, Inc.

Publication Date: 15-JUN-2014

Insert Date: 18-APR-2014

Table of Contents • Start Reading

Learn how to gain maximum benefit from Swift, the highly available, distributed, object/blob store for OpenStack. Written by members of the team who maintain Swift, this practical book gets system administrators up to speed on Swift’s use and administration, and includes advanced topics....

57. 

Image Encryption: A Communication Perspective

Image Encryption: A Communication Perspective

By: El-Samie, Abd; Hossam Ahmed; Ibrahim Elashry; Mai Shahieen; Osama Faragallah; El-Sayed El-Rabaie; Saleh Alshebeili

Publisher: CRC Press

Publication Date: 14-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Investigating image encryption approaches, this book examines image encryption algorithms for the purpose of wireless communication of images in secure form. It considers two directions for image encryption: permutation-based encryption and diffusion-based encryption. Covering the range of image encryption principles and techniques, it presents hybrid encryption algorithms to enhance the characteristics of traditional algorithms. It explores number theory-based encryption algorithms, details the strength of different encryption algorithms, and describes their ability to work within the...

58. 

Managing Trust in Cyberspace

Managing Trust in Cyberspace

By: Sabu Thampi; Bharat Bhargava; Pradeep Atrey

Publisher: Chapman and Hall/CRC

Publication Date: 14-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Bringing together cross-disciplinary expertise, this illustrated, tutorial-style text addresses fundamentals underpinning computational trust models and covers trust management processes for dynamic open systems and applications. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book walks through online identity management, examines using trust and argumentation in recommender...

59. 

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications

By: Xiangyun Zhou; Lingyang Song; Yan Zhang

Publisher: CRC Press

Publication Date: 15-NOV-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. Presenting high-level discussions along with specific examples, and illustrations, this is an ideal reference for anyone that needs to obtain a macro-level understanding of physical layer security and its role in...

60. 

Improving the Performance of Wireless LANs: A Practical Guide

Improving the Performance of Wireless LANs: A Practical Guide

By: Nurul Sarkar

Publisher: Chapman and Hall/CRC

Publication Date: 08-JAN-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book quantifies the key factors of WLAN performance and describes methods for improvement. It provides theoretical background and empirical results for the optimum planning and deployment of indoor WLAN systems, explaining the fundamentals while supplying guidelines for design, modeling, and performance evaluation. It discusses environmental effects on WLAN systems, protocol redesign for routing and MAC, and traffic distribution; examines emerging and future network technologies; and includes radio propagation and site measurements, simulations for various network design scenarios,...