ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (32)
  • English  (27)
  • German  (5)
  • Chinese
  • French
  • Greek, Modern (1453- )
  • Korean
  • Portuguese
  • 2020-2024
  • 2010-2014  (32)
  • 1985-1989
  • 1935-1939
  • 2014  (18)
  • 2012  (14)
  • 1972
  • 1970
  • Computer Science  (32)
Collection
  • Books  (32)
Source
Language
  • English  (27)
  • German  (5)
  • Chinese
  • French
  • Greek, Modern (1453- )
  • +
Years
  • 2020-2024
  • 2010-2014  (32)
  • 1985-1989
  • 1935-1939
Year
  • 1
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application logic. No prior knowledge of C++ is assumed and the book covers the fundamental aspects of the language for writing BlackBerry 10 apps. Also a particular emphasis is put on how to create a visually enticing user experience with the Cascades framework, which is based on Qt and QML. Starting with the native SDK configuration and an overview of the Momentics IDE, the book is fast-paced and you will rapidly learn many of the best practices and techniques required for developing beautiful BlackBerry 10 apps. Learn BlackBerry 10 App Development is written for developers wishing to learn how to write apps for the new BlackBerry 10 OS and those interested in porting existing iOS and Android apps to BlackBerry 10 as native applications
    Pages: Online-Ressource (XVI, 356 pages) , 104 illustrations
    ISBN: 9781430261582
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Pages: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Unknown
    Bonn : Galileo Press
    Keywords: iPad ; iPhone ; XCode ; Apps
    Description / Table of Contents: Klaus M. Rodewig und Clemens Wagner geben Ihnen einen Einblick in die Architektur des iPhone und des iPad und eine Anleitung zum Programmieren eigener Applikationen. Dabei werden alle wichtigen Themen in der gebotenen Tiefe mit Hintergrundwissen beschrieben. Praktische Beispiele unterstützen Sie von Anfang an, so dass Sie direkt loslegen können. Erste Ergebnisse können Sie im iPhone Simulator direkt testen. Sie erhalten einen Überblick über die verschiedenen iPhone- und iPod Touch-Modelle, erfahren, wie Sie in der Apple Developer Connection Mitglied werden können und Applikationen für das iPhone im Appstore anbieten können. Natürlich kommt in diesem Buch auch der Hintergrund nicht zu kurz. Eine kurze Einführung in Objective-C und Cocoa vermittelt Ihnen alles, was Sie wissen müssen. Inkl. Schnittstellen zum Datenaustausch, Events, Alerts, Datenverwaltung mit Core Data und die verschiedenen Möglichkeiten der Netzwerkprogrammierung. Profis werden von den Tipps und Tricks zur Konfiguration und Verwendung von Xcode, Debugging und der Arbeit mit einem Versionierungssystem profitieren.
    Pages: Online-Ressource (515 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783836214636
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Java 7
    Description / Table of Contents: Die Fortsetzung des Java-Kultbuchs für Entwickler! Hier bekommen Sie umfassendes und kompetentes Praxiswissen zu den vielen Bibliotheken und Technologien in einem Band. Am Beispiel konkreter Java-Projekte zeigt Christian Ullenboom, was man wissen muss über Swing, Netzwerk- und Grafikprogrammierung, RMI und Web-Services, JavaServer Pages und Servlets, Applets, JDBC, Reflection und Annotationen, Logging und Monitoring, Java Native Interface (JNI) und vieles mehr. Dieses Buch ist Ihr unersetzlicher Begleiter bei der täglichen Arbeit!
    Pages: Online-Ressource (1433 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783836215077
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Information technology ; Information systems ; Information Systems ; Information Systems Applications (incl. Internet) ; IT in Business ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Thinking of Business Processes Systematically --- From Language Acquisition to Subject-oriented Modeling --- The Integrated S-BPM Process Model --- Subject-oriented Process Analysis --- Modeling Processes in a Subject-Oriented Way --- Subject-Oriented Modeling by Construction and Restriction --- Subject-oriented Validation of Processes and Process Models --- Subject-oriented Optimization of Processes --- Organization-specific Implementation of Subject-oriented Processes --- IT-Implementation of Subject-Oriented Business Processes --- Subject-oriented Monitoring of Processes --- A Precise Description of the S-BPM Modeling Method --- Tools for S-BPM --- S-BPM Method by Comparison --- Conclusion --- A Subject-Oriented Interpreter Model for S-BPM
    Pages: Online-Ressource (XVI, 376 pages)
    ISBN: 9783642323928
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Global Text Project
    Keywords: Introduction to Data Mining and CRISP-DM 3 ; Organizational Understanding and Data Understanding ; Data Preparation ; Correlation ; Association Rules ; k-Means Clustering ; Discriminant Analysis ; Linear Regression ; Logistic Regression ; Decision Trees ; Neural Networks ; Text Mining ; Evaluation and Deployment ; Data Mining Ethics
    Description / Table of Contents: Data mining as a discipline is largely invisible; we rarely notice that it’s happening. But when we sign up for a credit card, make an online purchase, or use the internet, we are generating data stored in massive data warehouses. Inside this data lies indicators of our interests, our habits, and our behaviors. Data mining allows people to find and understand those patterns to make informed decisions and better serve their customers. But there are also worries about the practice of data mining. Privacy groups are vocal about companies who hoard vast quantities of data, some of which can be personal. The intent of this book is to introduce you to concepts and practices common in data mining.
    Pages: Online-Ressource (XII, 252 pages) , illustrations, diagrams
    ISBN: 9780615684376
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Text processing (Computer science) ; Image processing ; Computer Science ; Image Processing and Computer Vision ; Document Preparation and Text Processing
    Description / Table of Contents: Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, how they are designed, with observations about tuning the methods for achieving robustness and invariance targets for specific applications. The survey is broader than it is deep, with over 540 references provided to dig deeper. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more. Rather than providing ‘how-to’ source code examples and shortcuts, this book provides a counterpoint discussion to the many fine opencv community source code resources available for hands-on practitioners
    Pages: Online-Ressource (XXXI, 508 pages) , 216 illustrations
    ISBN: 9781430259305
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Unknown
    Bonn : Galileo Press
    Keywords: Windows Server 2012 R2 ; Hyper-V ; Active Directory ; Remotedesktopdienste ; Webserver IIS ; Netzwerkprotokolle ; Kerberos-Authentifizierung
    Description / Table of Contents: Das lösungsorientierte und umfassende Buch zum Windows Server 2012 R2 mit zahlreichen fundierten Hintergrundinformationen. Der Autor Ulrich B. Boddenberg greift bei der Beschreibung des Servers auf seine praktischen Erfahrungen in zahlreichen Projekten bei mittleren und großen Kunden zurück. Denn ein modernes Betriebssystem wie Windows Server 2012 R2 bietet weit mehr als nur die Möglichkeit, Programme auszuführen. Er beschreibt alle zentralen Technologien wie die Virtualisierung mit Hyper-V V3, Active Directory, Remotedesktopdienste, den Webserver IIS sowie SharePoint. Neben diesen konkreten Technologien geht es auch um Grundlagen wie Netzwerkprotokolle, Kerberos-Authentifizierung oder die eingesetzte Hardware. Zentrale Aspekte wie Performance, Verfügbarkeit und Sicherheit ziehen sich durch das gesamte Buch.
    Pages: Online-Ressource (1392 Seiten)
    Edition: 4., akt. Aufl.
    ISBN: 9783836220132
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Ubuntu
    Description / Table of Contents: Umfassender geht es nicht! Hier erfahren Sie alles, was Sie mit der Version 11.04 »Natty Narwhal« (dt. »Schicker Zahnwal«) der beliebtesten Linux-Distribution Ubuntu anstellen können. Von der Installation, der Paketverwaltung über Optimierung, Programmierung, Migration und Kernelkompilierung bis hin zur Virtualisierung und Netzwerktechnik finden Sie alle wichtigen Fragen zu Ubuntu Linux in diesem Buch beantwortet. Darüber hinaus profitieren Sie von mehr als 300 eigens gekennzeichneten Tipps und Tricks sowie von zahlreichen Praxisworkshops. Werden Sie mit diesem Buch ganz einfach zum Ubuntu-Profi! Übrigens: Auch eingefleischte Ubuntu-Nutzer werden in dieser Ausgabe zur aktuellen Version viel Neues entdecken - denn Ubuntu setzt seit »Natty Narwhal« mit der Unity-Oberfläche auf einen neuen Look.
    Pages: Online-Ressource (1118 Seiten)
    Edition: 7., akt. Aufl.
    ISBN: 9783836217651
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Unknown
    Bonn : Galileo Press
    Keywords: LINUX ; UNIX ; SHELL ; Systemprogrammierung
    Description / Table of Contents: Dieses umfassende Handbuch bietet Ihnen nahezu vollständiges Linux-Wissen. Es erklärt, wie man Linux als leistungsstarke Workstation nutzen kann und widmet sich ausführlich professionelleren Themen wie Administration des Systems, Shell, Netzwerkkonfiguration und Sicherheit. Das Buch ist geeignet für Nutzer aller gängigen Linux-Distributionen. Die beiliegenden Multiboot-DVDs enthalten eine große Auswahl an Linux-Systemen. Das Buch ist konsequent praxisnah geschrieben, immer verständlich und sehr gründlich in der Behandlung aller Themen. Diese 5. Auflage wurde umfassend aktualisiert und verbessert. Sowohl Einsteiger als auch Profis werden von diesem kompetenten Handbuch profitieren.
    Pages: Online-Ressource (1282 Seiten)
    Edition: 5., akt. Aufl.
    ISBN: 9783836218221
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Keywords: Information technology ; Information systems ; Information Systems ; Information Systems Applications (incl. Internet) ; IT in Business ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Thinking of Business Processes Systematically --- From Language Acquisition to Subject-oriented Modeling --- The Integrated S-BPM Process Model --- Subject-oriented Process Analysis --- Modeling Processes in a Subject-Oriented Way --- Subject-Oriented Modeling by Construction and Restriction --- Subject-oriented Validation of Processes and Process Models --- Subject-oriented Optimization of Processes --- Organization-specific Implementation of Subject-oriented Processes --- IT-Implementation of Subject-Oriented Business Processes --- Subject-oriented Monitoring of Processes --- A Precise Description of the S-BPM Modeling Method --- Tools for S-BPM --- S-BPM Method by Comparison --- Conclusion --- A Subject-Oriented Interpreter Model for S-BPM
    Pages: Online-Ressource (XVI, 376 pages)
    ISBN: 9783642323928
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Unknown
    Freexian SARL
    Keywords: Debian ; Ubuntu ; Debian GNU/Linux ; Linux ; Administrator
    Description / Table of Contents: Accessible to all, this book teaches the essentials to anyone who wants to become an effective and independent Debian GNU/Linux administrator. It covers all the topics that a competent Linux administrator should master, from the installation and the update of the system, up to the creation of packages and the compilation of the kernel, but also monitoring, backup and migration, without forgetting advanced topics like SELinux setup to secure services, automated installations, or virtualization with Xen, KVM or LXC.
    Pages: Online-Ressource (XXIV, 468 Seiten)
    ISBN: 9791091414012
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Unknown
    London : Ubiquity Press
    Keywords: Open Data ; Open Science ; Open Access ; Text Mining ; Data Mining
    Description / Table of Contents: In 2010 the Panton Principles for Open Data in Science were published. These principles were founded upon the idea that "Science is based on building on, reusing and openly criticising the published body of scientific knowledge" (http://pantonprinciples.org) and they provide a succinct list of the fundamentals to observe when making your data open. Intended for a broad audience of academics, publishers and librarians, Issues in Research Data explores the implications of the Panton Principles through a number of perspectives on open research data in the sciences and beyond. The book features chapters by open data experts in a range of academic disciplines, covering practical information on licensing, ethics, and advice for data curators, alongside more theoretical issues surrounding the adoption of open data. As the book is open access, each chapter can stand alone from the main volume so that communities can host, distribute, build upon and remix the content that is relevant to them. Readers can access the online version via the QR code or DOI link at the front of the book.
    Pages: Online-Ressource (VI, 164 Seiten)
    ISBN: 9781909188327
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Keywords: data science
    Description / Table of Contents: Chapter 1 Introduction --- Overview --- Data Science Is OSEMN --- Intermezzo Chapters --- What Is the Command Line? --- Why Data Science at the Command Line? --- A Real-World Use Case --- Further Reading --- Chapter 2 Getting Started --- Overview --- Setting Up Your Data Science Toolbox --- Essential Concepts and Tools --- Further Reading --- Chapter 3 Obtaining Data --- Overview --- Copying Local Files to the Data Science Toolbox --- Decompressing Files --- Converting Microsoft Excel Spreadsheets --- Querying Relational Databases --- Downloading from the Internet --- Calling Web APIs --- Further Reading --- Chapter 4 Creating Reusable Command-Line Tools --- Overview --- Converting One-Liners into Shell Scripts --- Creating Command-Line Tools with Python and R --- Further Reading --- Chapter 5 Scrubbing Data --- Overview --- Common Scrub Operations for Plain Text --- Working with CSV --- Working with HTML/XML and JSON --- Common Scrub Operations for CSV --- Further Reading --- Chapter 6 Managing Your Data Workflow --- Overview --- Introducing Drake --- Installing Drake --- Obtain Top Ebooks from Project Gutenberg --- Every Workflow Starts with a Single Step --- Well, That Depends --- Rebuilding Specific Targets --- Discussion --- Further Reading --- Chapter 7 Exploring Data --- Overview --- Inspecting Data and Its Properties --- Computing Descriptive Statistics --- Creating Visualizations --- Further Reading --- Chapter 8 Parallel Pipelines --- Overview --- Serial Processing --- Parallel Processing --- Distributed Processing --- Discussion --- Further Reading --- Chapter 9 Modeling Data --- Overview --- More Wine, Please! --- Dimensionality Reduction with Tapkee --- Clustering with Weka --- Regression with SciKit-Learn Laboratory --- Classification with BigML --- Further Reading --- Chapter 10 Conclusion --- Let’s Recap --- Three Pieces of Advice --- Where to Go from Here? --- Getting in Touch
    Pages: Online-Ressource (XVII, 191 pages) , illustrations, diagrams
    ISBN: 9781491947852
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Unknown
    Berkeley, CA : Apress
    Keywords: Open source software ; Computer programming ; Software engineering ; Open Source ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented version control is a necessity for successful web projects, whether large or small. With this book you’ll learn how to master the world of distributed version workflow, use the distributed features of Git to the full, and extend Git to meet your every need. Written by Git pros Scott Chacon and Ben Straub, Pro Git (Second Edition) builds on the hugely successful first edition, and is now fully updated for Git version 2.0, as well as including an indispensable chapter on GitHub. It’s the best book for all your Git needs
    Pages: Online-Ressource (XXI, 456 pages) , 208 illustrations
    Edition: 2nd edition
    ISBN: 9781484200766
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Computer Science ; Programming Techniques
    Description / Table of Contents: The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices, such as Samsung, Lenovo, and Asus. The increase in Android devices featuring Intel processors has created a demand for Android applications optimized for Intel Architecture: Android Application Development for the Intel® Platform is the perfect introduction for software engineers and mobile app developers. Through well-designed app samples, code samples and case studies, the book teaches Android application development based on the Intel platform—including for smartphones, tablets, and embedded devices—covering performance tuning, debugging and optimization. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University
    Pages: Online-Ressource (XX, 520 pages) , 278 illustrations
    ISBN: 9781484201008
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Keywords: Computer science ; Multimedia information systems ; Computer Science ; Computer Science, general ; Multimedia Information Systems
    Description / Table of Contents: Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed and power. The practical aspects are many: Uploading video to the Internet is only the beginning of a trend where a consumer controls video quality and speed by trading off various other factors. Open source and proprietary applications such as video e-mail, private party content generation, editing and archiving, and cloud asset management would give further control to the end-user. Digital video is frequently compressed and coded for easier storage and transmission. This process involves visual quality loss due to typical data compression techniques and requires use of high performance computing systems. A careful balance between the amount of compression, the visual quality loss and the coding speed is necessary to keep the total system cost down, while delivering a good user experience for various video applications. At the same time, power consumption optimizations are also essential to get the job done on inexpensive consumer platforms. Trade-offs can be made among these factors, and relevant considerations are particularly important in resource-constrained low power devices. To better understand the trade-offs this book discusses a comprehensive set of engineering principles, strategies, methods and metrics. It also exposes readers to approaches on how to differentiate and rank video coding solutions
    Pages: Online-Ressource (XVII, 368 pages) , 115 illustrations
    ISBN: 9781430267133
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters. The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations
    Pages: Online-Ressource (XXIV, 300 pages) , 74 illustrations
    ISBN: 9781430264972
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Description / Table of Contents: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Pages: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It's written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work
    Pages: Online-Ressource (XX, 272 pages) , 74 illustrations
    ISBN: 9781430265726
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; User interfaces (Computer systems) ; Computer Science ; User Interfaces and Human Computer Interaction ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: GUI Design for Android Apps is the perfect—and concise—introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform
    Pages: Online-Ressource (XI, 156 pages) , 65 illustrations
    ISBN: 9781484203828
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...