ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (20)
  • 2010-2014  (20)
  • 2014  (20)
  • Computer Science  (18)
  • Chemistry and Pharmacology  (2)
  • 1
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Unknown
    Warsaw, Berlin : De Gruyter Open
    Keywords: biochemistry ; laboratory ; lab ; lab manual
    Description / Table of Contents: Biochemistry laboratory manual for undergraduates – an inquiry based approach by Gerczei and Pattison is the first textbook on the market that uses a highly relevant model, antibiotic resistance, to teach seminal topics of biochemistry and molecular biology while incorporating the blossoming field of bioinformatics. The novelty of this manual is the incorporation of a student-driven real real-life research project into the undergraduate curriculum. Since students test their own mutant design, even the most experienced students remain engaged with the process, while the less experienced ones get their first taste of biochemistry research. Inclusion of a research project does not entail a limitation: this manual includes all classic biochemistry techniques such as HPLC or enzyme kinetics and is complete with numerous problem sets relating to each topic.
    Pages: Online-Ressource (XII, 174 Seiten)
    ISBN: 9783110411331
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Text processing (Computer science) ; Image processing ; Computer Science ; Image Processing and Computer Vision ; Document Preparation and Text Processing
    Description / Table of Contents: Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, how they are designed, with observations about tuning the methods for achieving robustness and invariance targets for specific applications. The survey is broader than it is deep, with over 540 references provided to dig deeper. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more. Rather than providing ‘how-to’ source code examples and shortcuts, this book provides a counterpoint discussion to the many fine opencv community source code resources available for hands-on practitioners
    Pages: Online-Ressource (XXXI, 508 pages) , 216 illustrations
    ISBN: 9781430259305
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Pages: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Software Engineering/Programming and Operating Systems ; Data Encryption
    Description / Table of Contents: It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track. --The authors of The Privacy Engineer's Manifesto The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, applications, and systems. The book offers insight on translating the guiding light of OECD Privacy Guidelines, the Fair Information Practice Principles (FIPPs), Generally Accepted Privacy Principles (GAPP) and Privacy by Design (PbD) into concrete concepts that organizations, software/hardware engineers, and system administrators/owners can understand and apply throughout the product or process life cycle—regardless of development methodology—from inception to retirement, including data deletion and destruction. In addition to providing practical methods to applying privacy engineering methodologies, the authors detail how to prepare and organize an enterprise or organization to support and manage products, process, systems, and applications that require personal information. The authors also address how to think about and assign value to the personal information assets being protected. Finally, the team of experts offers thoughts about the information revolution that has only just begun, and how we can live in a world of sensors and trillions of data points without losing our ethics or value(s)...and even have a little fun. The Privacy Engineer's Manifesto is designed to serve multiple stakeholders: Anyone who is involved in designing, developing, deploying and reviewing products, processes, applications, and systems that process personal information, including software/hardware engineers, technical program and product managers, support and sales engineers, system integrators, IT professionals, lawyers, and information privacy and security professionals. This book is a must-read for all practitioners in the personal information economy. Privacy will be an integral part of the next wave in the technology revolution; innovators who emphasize privacy as an integral part of the product life cycle are on the right track. Foreword by Dr. Eric Bonabeau, PhD, Chairman, Icosystem, Inc. & Dean of Computational Sciences, Minerva Schools at KGI
    Pages: Online-Ressource (XXXVI, 400 pages) , 104 illustrations
    ISBN: 9781430263562
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: data science
    Description / Table of Contents: Chapter 1 Introduction --- Overview --- Data Science Is OSEMN --- Intermezzo Chapters --- What Is the Command Line? --- Why Data Science at the Command Line? --- A Real-World Use Case --- Further Reading --- Chapter 2 Getting Started --- Overview --- Setting Up Your Data Science Toolbox --- Essential Concepts and Tools --- Further Reading --- Chapter 3 Obtaining Data --- Overview --- Copying Local Files to the Data Science Toolbox --- Decompressing Files --- Converting Microsoft Excel Spreadsheets --- Querying Relational Databases --- Downloading from the Internet --- Calling Web APIs --- Further Reading --- Chapter 4 Creating Reusable Command-Line Tools --- Overview --- Converting One-Liners into Shell Scripts --- Creating Command-Line Tools with Python and R --- Further Reading --- Chapter 5 Scrubbing Data --- Overview --- Common Scrub Operations for Plain Text --- Working with CSV --- Working with HTML/XML and JSON --- Common Scrub Operations for CSV --- Further Reading --- Chapter 6 Managing Your Data Workflow --- Overview --- Introducing Drake --- Installing Drake --- Obtain Top Ebooks from Project Gutenberg --- Every Workflow Starts with a Single Step --- Well, That Depends --- Rebuilding Specific Targets --- Discussion --- Further Reading --- Chapter 7 Exploring Data --- Overview --- Inspecting Data and Its Properties --- Computing Descriptive Statistics --- Creating Visualizations --- Further Reading --- Chapter 8 Parallel Pipelines --- Overview --- Serial Processing --- Parallel Processing --- Distributed Processing --- Discussion --- Further Reading --- Chapter 9 Modeling Data --- Overview --- More Wine, Please! --- Dimensionality Reduction with Tapkee --- Clustering with Weka --- Regression with SciKit-Learn Laboratory --- Classification with BigML --- Further Reading --- Chapter 10 Conclusion --- Let’s Recap --- Three Pieces of Advice --- Where to Go from Here? --- Getting in Touch
    Pages: Online-Ressource (XVII, 191 pages) , illustrations, diagrams
    ISBN: 9781491947852
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Unknown
    Rijeka : InTech
    Keywords: chemistry ; gas chromatography
    Description / Table of Contents: For decades gas chromatography has been and will remain an irreplaceable analytical technique in many research areas for both quantitative analysis and qualitative characterization/identification, which is still supplementary with HPLC. This book highlights a few areas where significant advances have been reported recently and/or a revisit of basic concepts is deserved. It provides an overview of instrumental developments, frontline and modern research as well as practical industrial applications. The topics include GC-based metabolomics in biomedical, plant and microbial research, natural products as well as characterization of aging of synthetic materials and industrial monitoring, which are contributions of several experts from different disciplines. It also contains best hand-on practices of sample preparation (derivatization) and data processing in daily research. This book is recommended to both basic and experienced researchers in gas chromatography.
    Pages: Online-Ressource (213 Seiten)
    ISBN: 9789535112273
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...