ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (227)
  • Computer Science  (227)
Collection
Source
Language
  • 1
    Keywords: holography
    Description / Table of Contents: Chapter 1: Volume Holography: Novel Materials, Methods and Applications by Tina Sabel and Marga C. Lensen --- Chapter 2: Volume Holographic Optical Elements as Solar Concentrators by Maria Antonietta Ferrara, Gaetano Bianco, Fabio Borbone, Roberto Centore, Valerio Striano and Giuseppe Coppola --- Chapter 3: Volume Bragg Gratings: Fundamentals and Applications in Laser Beam Combining and Beam Phase Transformations by Ivan Divliansky --- Chapter 4: Holographically Recorded Low Spatial Frequency Volume Bragg Gratings and Holographic Optical Elements by Suzanne Martin, Hoda Akbari, Sanjay Keshri, Dennis Bade, Izabela Naydenova, Kevin Murphy and Vincent Toal --- Chapter 5: Holographic Optical Elements and Application by Nam Kim, Yan-Ling Piao and Hui-Ying Wu --- Chapter 6: Holographic Data Storage Using Parallel-Aligned Liquid Crystal on Silicon Displays by Francisco J. Martínez Guardiola, Andrés Márquez Ruiz, Sergi Gallego Rico, Roberto Fernández Fernández, Jorge Francés Monllor, Manuel Ortuño Sánchez, Inmaculada Pascual Villalobos and Augusto Beléndez Vázquez --- Chapter 7: Microtopography and Thickness Measurement with Digital Holographic Microscopy Highlighting and Its Tomographic Capacity by Miguel León-Rodríguez, Juan A. Rayas-Alvarez, Amalia Martínez- García and Raúl R. Cordero --- Chapter 8: 3D Capture and 3D Contents Generation for Holographic Imaging by Elena Stoykova, Hoonjong Kang, Youngmin Kim, Joosup Park, Sunghee Hong and Jisoo Hong --- Chapter 9: Multiwavelength Digital Holography and Phase-Shifting Interferometry Selectively Extracting Wavelength Information: Phase-Division Multiplexing (PDM) of Wavelengths by Tatsuki Tahara, Reo Otani, Yasuhiko Arai and Yasuhiro Takaki --- Chapter 10: Dynamic Imaging with X-ray Holography by Büttner Felix --- Chapter 11: Indirect Off-Axis Holography for Antenna Metrology by Ana Arboleya, Jaime Laviada, Juha Ala-Laurinaho, Yuri Álvarez, Fernando Las-Heras and Antti V. Räisänen --- Chapter 12: Surface Characterization by the Use of Digital Holography by Dahi Ghareab Abdelsalam, Takeshi Yasui, Takayuki Ogawa and Baoli Yao --- Chapter 13: Digital Holographic Interferometry for Analysing High-Density Gradients in Fluid Mechanics by Jean-Michel Desse and François Olchewsky --- Chapter 14: Holography: The Usefulness of Digital Holographic Microscopy for Clinical Diagnostics by Zahra El-Schich, Sofia Kamlund, Birgit Janicke, Kersti Alm and Anette Gjörloff Wingren --- Chapter 15: Unlabeled Semen Analysis by Means of the Holographic Imaging by Giuseppe Coppola, Maria Antonietta Ferrara, Giuseppe Di Caprio, Gianfranco Coppola and Brian Dale --- Chapter 16: One-Step Holographic Photoalignment for Twisted Nematic Liquid Crystal Gratings by Kotaro Kawai, Moritsugu Sakamoto, Kohei Noda, Tomoyuki Sasaki, Nobuhiro Kawatsuki and Hiroshi Ono --- Chapter 17: Application of High Performance Photoinitiating Systems for Holographic Grating Recording by C. Ley, C. Carré, A. Ibrahim and X. Allonas --- Chapter 18: Fluorite Crystals with Color Centers: A Medium for Recording Extremely Stable but Broadly Transformable Holograms by Aleksandr I. Ryskin, Aleksandr E. Angervaks and Andrei V. Veniaminov --- Chapter 19: New Photo-Thermo-Refractive Glasses for Holographic Optical Elements: Properties and Applications by Nikonorov Nikolay, Ivanov Sergey, Dubrovin Victor and Ignatiev Alexander --- Chapter 20: Active Holography by Zurab V. Wardosanidze --- Chapter 21: Two-Wave Mixing in Organic-Inorganic Hybrid Structures for Dynamic Holography by Vera Marinova, Shiuan Huei Lin and Ken Yuh Hsu
    Pages: Online-Ressource (516 Seiten)
    ISBN: 9789535130383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Unknown
    Rijeka : InTech
    Keywords: Cloud computing ; Internet of Things
    Description / Table of Contents: Chapter 1: State-of-the-Art Antenna Technology for Cloud Radio Access Networks (C-RANs) by Waleed Tariq Sethi, Abdullah Alfakhri, Muhammad Ahmad Ashraf, Amr G. Alasaad and Saleh Alshebeili --- Chapter 2: Cloud Computing for Next-Generation Sequencing Data Analysis by Shanrong Zhao, Kirk Watrous, Chi Zhang and Baohong Zhang --- Chapter 3: Green-Aware Virtual Machine Migration Strategy in Sustainable Cloud Computing Environments by Xiaoying Wang, Guojing Zhang, Mengqin Yang and Lei Zhang --- Chapter 4: M-ary Optical Computing by Jian Wang and Yun Long --- Chapter 5: Networking Solutions for Integrated Heterogeneous Wireless Ecosystem by Roman Florea, Aleksandr Ometov, Adam Surak, Sergey Andreev and Yevgeni Koucheryavy
    Pages: Online-Ressource (138 Seiten)
    ISBN: 9789535132448
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Unknown
    Bonn : Galileo Press
    Keywords: Python 2.5
    Description / Table of Contents: Dieses Buch bietet sowohl eine umfassende Einführung in die Sprache Python als auch viele weiterführende Kapitel zu fortgeschrittenen Themen wie GUI-Entwicklung, Web-Programmierung mit Django oder Netzwerkkommunikation. Nach der Lektüre sind Sie in der Lage, Python professionell einzusetzen. Die Einführung erfolgt systematisch vom ersten einfachen Programm bis hin zu komplexen objektorientierten Programmen. Das Buch ist konsequent praxisorientiert und zum Lernen und Nachschlagen hervorragend geeignet.
    Pages: Online-Ressource (819 Seiten) , Illustrationen, Diagramme, Karten
    Edition: 1. Aufl.
    ISBN: 9783836211109
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Unknown
    Bonn : Galileo Press
    Keywords: Betriebssystem ; Open Source ; LINUX ; UNIX
    Description / Table of Contents: Dieses Buch bietet einen umfassenden Einblick in die Systemprogrammierung unter Linux und Unix. Es ist für Leser mit Betriebssystem-Kenntnissen und C-Wissen geeignet. Aus dem Inhalt: Umfassende Einführung, E/A-Funktionen, Attribute von Dateien und Verzeichnissen, Zugriff auf Systeminformationen, Prozesse und Dämonprozesse, Umgebungsvariablen eines Prozesses, Signale, Interprozesskommunikation, Threads, Netzwerkprogrammierung, MySQL, Terminal E/A und Benutzerschnittstellen für die Konsole, Sicherheit, XWindow-Programmierung, Windowmanager, Systeminformationen, Devices, GTK+. Neu in dieser 2., erweiterten Auflage: ein Kapitel zu System- und Benutzerdateien, ein stark erweitertes Thread-Kapitel und Ausführungen zu Dämonen, Zombies und Prozessen und zu Unix-Domain-Sockets.
    Pages: Online-Ressource (1216 Seiten)
    Edition: 2., akt. und erw. Auf.
    ISBN: 9783898427494
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: LINUX
    Pages: Online-Ressource (430 Seiten)
    Edition: 1. Aufl.
    ISBN: 3897214164
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Unknown
    Bonn : Galileo Press
    Keywords: Windows Server 2008 R2 ; Hyper-V ; Active Directory ; Remotedesktopdienste ; Webserver IIS ; Netzwerkprotokolle ; Kerberos-Authentifizierung
    Description / Table of Contents: Das lösungsorientierte und praktische Handbuch zum Windows Server 2008 R2 mit zahlreichen fundierten Hintergrundinformationen! Der Autor Ulrich B. Boddenberg greift bei der Beschreibung des Servers auf seine praktischen Erfahrungen in zahlreichen Projekten bei mittleren und großen Kunden zurück. Denn ein modernes Betriebssystem wie Windows Server 2008 R2 bietet weit mehr als nur die Möglichkeit, Programme auszuführen. Er beschreibt alle zentralen Technologien, wie die Virtualisierung mit Hyper-V, Active Directory, Terminaldienste und den Webserver IIS. Neben diesen konkreten Technologien geht es auch um Grundlagen wie Netzwerkprotokolle, Kerberos-Authentifizierung oder die eingesetzte Hardware. Zentrale Aspekte wie Performance, Verfügbarkeit und Sicherheit ziehen sich durch das gesamte Buch.
    Pages: Online-Ressource (1410 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 9783836215282
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Unknown
    Bonn : Galileo Press
    Keywords: Visual Basic ; Visual Basic 2008 ; Visual Studio ; Objektorientierte Programmierung ; OOP
    Description / Table of Contents: Wer Anwendungen mit Visual Basic 2008 programmieren will, findet in diesem Buch alles, was er dafür braucht. Neben dem Framework und der Entwicklungsumgebung Visual Studio sowie der Sprachsyntax von Visual Basic wird ausführlich auf die objektorientierte Programmierung eingegangen. Häufig verwendete Programmiertechniken werden ebenso gezeigt wie die Entwicklung grafischer Oberflächen mit WinForms und WPF sowie die Datenbankanbindung mit ADO.Net. Das Buch enthält alle Neuerungen des Visual Studio 2008. So werden die Themen LINQ (Language Integrated Query, ganz neu in .NET 3.5) oder etwa XAML (eXtensible Application Markup Language) sehr ausführlich in eigenen neuen Kapiteln behandelt.
    Pages: Online-Ressource (1323 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 9783836211710
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Unknown
    Bonn : Rheinwerk Verlag
    Keywords: Java ; Java Version 8 ; JSE 8
    Description / Table of Contents: Unser Handbuch ist die erste Wahl, wenn es um aktuelles und praktisches Java-Wissen geht. Java-Einsteiger, Studenten und Umsteiger profitieren seit mehr als einem Jahrzehnt von diesem Lehrwerk. Neben der Behandlung der Sprachgrundlagen von Java (Neu in Java 8: Lambda-Ausdrücke) gibt es kompakte Einführungen in Spezialthemen. So erfahren Sie einiges über Threads, Swing, Netzwerkprogrammierung, NetBeans, RMI, XML und Java, Servlets und Java Server Pages. Dieses Buch gehört in das Regal eines jeden Java-Programmierers.
    Pages: Online-Ressource (1312 Seiten) , Illustrationen, Diagramme
    Edition: 12., akt. Aufl.
    ISBN: 9783836241199
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Wavelets (Mathematics)
    Description / Table of Contents: "Beyond Wavelets" presents state-of-the-art theories, methods, algorithms, and applications of mathematical extensions for classical wavelet analysis. Wavelets, introduced 20 years ago by Morlet and Grossmann and developed very rapidly during the 1980's and 1990's, has created a common link between computational mathematics and other disciplines of science and engineering. Classical wavelets have provided effective and efficient mathematical tools for time-frequency analysis which enhances and replaces the Fourier approach. However, with the current advances in science and technology, there is an immediate need to extend wavelet mathematical tools as well. "Beyond Wavelets" presents a list of ideas and mathematical foundations for such extensions, including: continuous and digital ridgelets, brushlets, steerable wavelet packets, contourlets, eno-wavelets, spline-wavelet frames, and quasi-affine wavelets. Wavelet subband algorithms are extended to pyramidal directional and nonuniform filter banks. In addition, this volume includes a method for tomographic reconstruction using a mechanical image model and a statistical study for independent adaptive signal representation. Investigators already familiar with wavelet methods from areas such as engineering, statistics, and mathematics will benefit by owning this volume. *Curvelets, Contourlets, Ridgelets, *Digital Implementation of Ridgelet Packets *Steerable Wavelet Packets *Essentially Non-Oscillatory Wavelets *Medical Imaging *Non-Uniform Filter Banks *Spline-wavelet frames and *Vanishing Moment Recovery Functions
    Pages: Online-Ressource (xiv, 305 pages)
    Edition: 1st ed
    ISBN: 9780127432731
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...