Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Information Technology & Software Development


61. 

Mining User Generated Content

Mining User Generated Content

By: Marie-Francine Moens; Juanzi Li; Tat-Seng Chua

Publisher: Chapman and Hall/CRC

Publication Date: 28-JAN-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This volume is the first focused effort to compile state-of-the-art research and address future directions of UGC. It explains how to collect, index, and analyze UGC to uncover social trends and user habits. The book describes how to mine various media, including social annotation, music information retrieval, and networks, and discusses the mining and searching of different types of UGC, such as Wikis and blogs. It also presents many applications of UGC, including the use of UGC to answer questions and summarize information. ...

62. 

A First Course in Machine Learning

A First Course in Machine Learning

By: Simon Rogers; Mark Girolami

Publisher: Chapman and Hall/CRC

Publication Date: 25-OCT-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Requiring minimal mathematical prerequisites, this classroom-tested text covers the core mathematical and statistical techniques needed to understand some of the most popular machine learning algorithms, including classification, clustering, and projection algorithms. The MATLAB<SUP>®</SUP>/Octave scripts available online enable readers to recreate plots that appear in the book and investigate changing model specifications and parameter values. By experimenting with the various algorithms and concepts, readers see how an abstract set of equations can be used to solve real problems. A...

63. 

Parallel Science and Engineering Applications: The Charm++ Approach

Parallel Science and Engineering Applications: The Charm++ Approach

By: Laxmikant Kale; Abhinav Bhatele

Publisher: CRC Press

Publication Date: 28-OCT-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book highlights the use of Charm++ in a wide variety of scientific and engineering fields. It emphasizes the adaptivity, asynchrony, and message-driven execution of Charm++ and explains design choices in application development. With illustrative examples throughout, the text describes associated tools, parallelization strategies, and parallel performance. It discusses the various design considerations when writing a parallel application in Charm++ and presents the application of these design principles to applications ranging from molecular dynamics, quantum chemistry, cosmological...

64. 

Rough Cuts
Java in a Nutshell, 6th Edition

Java in a Nutshell, 6th Edition

By: Benjamin J Evans;

Publisher: O'Reilly Media, Inc.

Publication Date: 15-SEP-2014

Insert Date: 18-APR-2014

Table of Contents • Start Reading

The sixth edition of Java in a Nutshell helps experienced Java programmers get the most out of Java 7 and 8, but it’s also a learning path for new developers. With examples rewritten to take full advantage of modern Java APIs and development best practices, this fully updated book brings you up to date and gets you ready to develop Java applications for the future....

65. 

Understanding Information Retrieval Systems: Management, Types, and Standards

Understanding Information Retrieval Systems: Management, Types, and Standards

By: Marcia Bates

Publisher: Auerbach Publications

Publication Date: 20-DEC-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Information retrieval (IR) is concerned with searching for documents, information within documents, metadata about documents, relational databases, and the web. This book covers the management, types, and technical standards of these increasingly important systems, including those used in libraries and museums, medicine, geographic information, music, computer-supported collaborative work, web mining, social mining, and the Semantic Web. Leading contributors in the field address digital asset management, piracy in digital media, records compliance, information storage technologies, and...

66. 

IT Release Management: A Hands-on Guide

IT Release Management: A Hands-on Guide

By: Dave Howard

Publisher: CRC Press

Publication Date: 13-JUL-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

When implemented correctly, release management can help to ensure quality is integrated throughout the development, implementation, and delivery of services, applications, and infrastructure. Clearly illustrating the effective implementation of a release process, this hands-on guide examines the similarities and differences of release management and project management to clarify the distinctions between the two complementary processes. Shedding light on the day-to-day challenges that need to be overcome, it details the principles of effective implementation—including what to implement, how...

67. 

Bayesian Programming

Bayesian Programming

By: Pierre Bessiere; Emmanuel Mazer; Juan Ahuactzin; Kamel Mekhnacha

Publisher: Chapman and Hall/CRC

Publication Date: 20-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

A new modeling methodology, new inference algorithms, new programming languages, and new hardware are all needed to create a complete Bayesian computing framework. Focusing on the methodology and algorithms, this book describes the first steps toward reaching that goal. It emphasizes probability as an alternative to Boolean logic, covering new methods to build probabilistic programs for real-world applications. The book encourages readers to explore emerging areas and develop new programming languages and hardware architectures. A Python package is available on a supplementary website. ...

68. 

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits

By: James Tiller

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Presenting the underlying methodologies and concepts required for successful penetration testing, this book discusses the process of penetration testing from both consultative and technical perspectives. It provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. It depicts attack scenarios to show the complete cycle of attack from the hacker’s perspective. The methodology detailed provides a comprehensive solution to meeting the objectives of penetration testing. The author covers the deliverables, including the final report,...

69. 

Data Mining in Biomedical Imaging, Signaling, and Systems

Data Mining in Biomedical Imaging, Signaling, and Systems

By: Sumeet Dua; U, Acharya

Publisher: Auerbach Publications

Publication Date: 16-MAY-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This comprehensive volume demonstrates the broad scope of uses for data mining and includes detailed strategies and methodologies for analyzing data from biomedical images, signals, and systems. Written by experts in the field, it presents data mining techniques in the context of various important clinical issues, including diagnosis and grading of depression, identification and classification of arrhythmia and ischemia, and description of classification paradigms for mammograms. The book provides ample information and techniques to benefit researchers, practitioners, and educators of...

70. 

Knowledge Science: Modeling the Knowledge Creation Process

Knowledge Science: Modeling the Knowledge Creation Process

By: Yoshiteru Nakamori

Publisher: CRC Press

Publication Date: 03-AUG-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Explaining how to improve our knowledge-based society, this book addresses problems in collecting, synthesizing, coordinating, and creating knowledge. It provides knowledge engineering tools and a framework for integrating knowledge creation, discovery, and management. The text covers knowledge technology, knowledge management, knowledge discovery and data mining, knowledge synthesis, knowledge justification, and knowledge construction. Experienced researchers in decision science, artificial intelligence, systems engineering, behavioral science, and management science present new methods...

71. 

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

By: Douglas Landoll

Publisher: CRC Press

Publication Date: 20-MAY-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Picking up where the bestselling first edition left off, this second edition explains how to conduct an effective risk assessment. Supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting, it provides the tools needed to solicit and review the scope and rigor of risk assessment proposals with competence and confidence. Trusted to assess security for leading organizations and government agencies, including the CIA, NSA, and NATO, Douglas Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals...

72. 

Model-Based Testing for Embedded Systems

Model-Based Testing for Embedded Systems

By: Justyna Zander; Ina Schieferdecker; Pieter Mosterman

Publisher: CRC Press

Publication Date: 15-SEP-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book explores model-based testing from a number of different perspectives. Combining various aspects of embedded systems and software—and how they are applied—it covers theory and practice concerning the test specification and validation of complex software-intensive embedded systems. Model-based testing refers to software testing in which test cases are either wholly or partially derived from a model, illustrating selected aspects of a system under test. Detailed examples from industry provide solutions that are applicable in real-world testing practices. The text provides a better...

73. 

Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach

Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach

By: Florin Balasa; Dhiraj Pradhan

Publisher: Chapman and Hall/CRC

Publication Date: 16-NOV-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Providing an algebraic framework for memory management tasks, this book illustrates how to optimize energy consumption in memory subsystems using CAD solutions. It covers data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. The book shows how these techniques are used to evaluate the data storage of an application, reduce dynamic and static energy consumption, design energy-efficient address generation units, and much more. The algorithmic style of the text should help readers create prototype software tools...

74. 

Fundamentals of Multicore Software Development

Fundamentals of Multicore Software Development

By: Victor Pankratius; Ali-Reza Adl-Tabatabai; Walter Tichy

Publisher: CRC Press

Publication Date: 12-DEC-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

With multicore processors now in every computer, server, and embedded device, the need for cost-effective, reliable parallel software has never been greater. By explaining key aspects of multicore programming, this book helps software engineers understand parallel programming and master the multicore challenge. Accessible to newcomers to the field, it covers the fundamentals of multicore hardware, parallel design patterns, and parallel programming in C++, .NET, and Java. It also discusses manycore computing on graphics cards and heterogeneous multicore platforms, automatic parallelization,...

75. 

Multi-Label Dimensionality Reduction

Multi-Label Dimensionality Reduction

By: Liang Sun; Shuiwang Ji; Jieping Ye

Publisher: Chapman and Hall/CRC

Publication Date: 04-NOV-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The data mining and machine learning literature currently lacks a unified treatment of multi-label dimensionality reduction that incorporates both algorithmic developments and applications. Addressing this shortfall, this book covers the methodological developments, theoretical properties, computational aspects, and applications of many multi-label dimensionality reduction algorithms, including existing dimensionality reduction algorithms and new developments of traditional algorithms. It illustrates how to apply the algorithms to solve real-world problems. A supplementary website provides...

76. 

Joomla!® 3 Boot Camp: 30-Minute Lessons to Joomla!® 3 Mastery

Joomla!® 3 Boot Camp: 30-Minute Lessons to Joomla!® 3 Mastery

By: Robin D. Turner; Herb Boeckenhaupt

Publisher: Course Technology PTR

Publication Date: 16-APR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Joomla!, the award-winning, free, open-source software that lets users build websites and powerful online applications, is the most popular website software available, used by many of the world's top companies. JOOMLA! 3 BOOT CAMP: 30-MINUTE LESSONS TO JOOMLA! 3 MASTERY takes a unique approach to helping you master Joomla! 3. Following a comprehensive introduction to the newly revamped Joomla! platform, the authors present an extensive series of "How do I...?" solutions for installing and managing a Joomla! 3 website. You simply look up the tasks you wish to perform and learn how to insert...

77. 

Transforming Business: Big Data, Mobility, and Globalization

Transforming Business: Big Data, Mobility, and Globalization

By: 

Publisher: John Wiley & Sons

Publication Date: 17-DEC-2012

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

A unique perspective of an evolved role for company leadership Based on the findings of an extensive research project that surveyed more than 5,500 enterprise employees and functional decision makers across the United States and China, Transforming Business: Big Data, Mobility and Globalization explores the influence of technology in the workplace and the implications to company culture, functional responsibilities and competitive advantage. This in-depth analysis illuminates emerging technological trends, the changing workforce, and the shifting face of business and industry while...

78. 

Scratch 2.0 Beginner's Guide Second Edition

Scratch 2.0 Beginner's Guide Second Edition

By: Michael Badger

Publisher: Packt Publishing

Publication Date: 15-APR-2014

Insert Date: 17-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Create digital stories, games, art, and animations through six unique project Discover how to use the new Scratch Version 2.0 to create games, animations, and digital stories Six hands-on projects that get you learning by doing with projects for all ages and experience levels Learn universal computer programming basics with no previous programming knowledge required In Detail As 21st century people, we live a digital life, but computer scientists around the world warn of a declining pool of digitally literate computer science students. The Scratch environment makes it...

79. 

Women in IT in the New Social Era

Women in IT in the New Social Era

By: Sonja Bernhardt

Publisher: IGI Global

Publication Date: 31-MAR-2014

Insert Date: 17-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Research and statistics support the view that current programs are failing to keep women in the ICT field. Currently, there exist very few solutions to this growing problem. Women in IT in the New Social Era: A Critical Evidence-Based Review of Gender Inequality and the Potential for Change aims to bring this topic to the forefront of discussion about what can be done to correct this lopsided gender distribution. This reference work will be an essential guide for government professionals, students, and researchers in the ICT field looking to develop a solution to equalize the retention rate...

80. 

Rough Cuts
Node.js, MongoDB, and AngularJS Web Development

Node.js, MongoDB, and AngularJS Web Development

By: Brad Dayley

Publisher: Addison-Wesley Professional

Publication Date: 24-JUN-2014

Insert Date: 17-APR-2014

Table of Contents • Start Reading

This is the Rough Cut version of the printed book. Node.js, MongoDB and AngularJS Web Development The definitive guide to building JavaScript-based Web applications from server to database to frontend Node.js, MongoDB, and AngularJS are three new web development technologies that together provide an easy to implement, fully integrated web development stack. Node.js is a leading server-side programming environment, MongoDB is the most popular NoSQL database, and AngularJS is quickly becoming the leading framework for MVC-based front-end development. Together they allow web programmers...