3/05/2011

Beyond 3G – Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0 - pdf

Beyond 3G   Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0Book Description
Giving a sound technical introduction to 3GPP LTE and SAE, this book explains the decisions taken during standardization while also examining the likely competition for LTE such as HSPA+ and WiMAX. As well as looking at next generation network technologies, Beyond 3G – Bringing Networks, Terminals and the Web Together describes the latest mobile device developments, voice and multimedia services and the mobile web 2.0. It considers not only how the systems, devices and software work but also the reasons behind why they are designed in this particular way. How these elements strongly influence each other is discussed as well as how network capabilities, available bandwidth, mobile device capabilities and new application concepts will shape the way we communicate in the future. This book gives an end to end introduction to wireless, from mobile software architecture to core networks, making it a valuable resource for anyone working in the industry.
  • Examines current and next-generation network technologies such as UMTS, HSPA+, WiMAX, LTE and Wifi
  • Analyses and explains performance and capacity in practice as well as future capacity requirements and how they can be fulfilled
  • Introduces the reader to the current cellular telephony architecture and to voice over IP architectures such as SIP, IMS and TISPAN
  • Looks at mobile device hardware and mobile operating system evolution
  • Encompasses all major global wireless standards for application development and the latest state of the mobile web 2.0

Book Details

  • Hardcover: 366 pages
  • Publisher: Wiley (February, 2009)
  • Language: English
  • ISBN-10: 0470751886
  • ISBN-13: 978-0470751886
  • File Size: 7.4 MiB
  • Hits: 919 times

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, 2nd Edition - PDF

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, 2nd EditionBook Description
Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand the current PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.
  • Completely updated to follow the PCI DSS standard 1.2.1
  • Packed with help to develop and implement an effective security strategy to keep infrastructure compliant and secure
  • Both authors have broad information security backgrounds, including extensive PCI DSS experience

Table of Contents
Foreword
Acknowledgments
Chapter 1: About PCI and This Book
Chapter 2: Introduction to Fraud, ID Theft, and Regulatory Mandates
Chapter 3: Why Is PCI Here?
Chapter 4: Building and Maintaining a Secure Network
Chapter 5: Strong Access Controls
Chapter 6: Protecting Cardholder Data
Chapter 7: Using Wireless Networking
Chapter 8: Vulnerability Management
Chapter 9: Logging Events and Monitoring the Cardholder Data Environment
Chapter 10: Managing a PCI DSS Project to Acheive Compliance
Chapter 11: Don't Fear the Assessor
Chapter 12: The Art of Compensating Control
Chapter 13: You're Compliant, Now What?
Chapter 14: PCI and Other Laws, Mandates, and Frameworks
Chapter 15: Myths and Misconceptions of PCI DSS

Book Details

  • Paperback: 368 pages
  • Publisher: Syngress; 2nd Edition (December, 2009)
  • Language: English
  • ISBN-10: 1597494992
  • ISBN-13: 978-1597494991
  • File Size: 2.2 MiB
  • Hits: 929 times

Assessing Information Security: Strategies, Tactics, Logic and Framework - PDF

Assessing Information Security: Strategies, Tactics, Logic and FrameworkBook Description
What do information security and the art of war have in common?
The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own.

The human factor
Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal.

Fight Cybercrime
Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy.

Leadership
Fighting cybercrime is about more than bureaucracy and compliance. Your company's approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company's information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime.

Strategy
Business is an intensely competitive environment. This is why so many executives enjoy the insights that the classics of military strategy, such as Clausewitz and Sun Tzu, provide on how to win. The authors of this book have drawn on Clausewitz in order to interpret the detailed knowledge of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

Benefits to business include:

  • Protect your business information. If you do not carry out proper checks, then something will go badly wrong, and your business will suffer. Use this book to help you understand the best way to implement an information security assessment.
  • Spend money wisely. Information security is not just about having the right equipment. Before you go spending money on fancy gadgets and expensive software, you need to understand what your priorities are, and work out which security measures will be the most effective in protecting your business information.
  • Learn to adapt. The reality is that your business information is not stored in a fixed, fortified place like a castle. Your employees could be blackmailed or bribed, or their company laptops may be hacked into or stolen when they are travelling abroad. So, to protect your company's business information, you must avoid a fortress mentality and be capable of adapting to an ever-changing environment.
  • Prepare to fight back. Defending your company from malicious hackers, or corrupt and embittered employees, is not just a matter of putting appropriate security structures in place. Criminals go for soft targets, but, if they know your company is ready to fight back, they will be deterred from attacking it. When you know how to identify suspicious behaviour among your staff, you will be in a stronger position to prosecute them for any offence against your company.

As the authors argue, 'An information security professional is engaged in a form of continuous warfare which is defensive by its very nature. The aim of this "combat" is not to give an inch of the protected "territory" (data, systems, resources) to the adversaries. '

Book Details

  • Paperback: 412 pages
  • Publisher: IT Governance Publishing (March, 2010)
  • Language: English
  • ISBN-10: 1849280355
  • ISBN-13: 978-1849280358
  • File Size: 4.6 MiB
  • Hits: 1,237 times

Writing and Querying MapReduce Views in CouchDB - pdf

Writing and Querying MapReduce Views in CouchDBBook Description
If you want to use CouchDB to support real-world applications, you'll need to create MapReduce views that let you query this document-oriented database for meaningful data. With this short and concise ebook, you'll learn how to create a variety of MapReduce views to help you query and aggregate data in CouchDB's large, distributed datasets.

You'll get step-by-step instructions and lots of sample code to create and explore several MapReduce views through the course of the book, using an example database you construct. To work with these different views, you'll learn how to use the Futon web administration console and the cURL command line tool that come with CouchDB.

  • Learn how the Map and Reduce steps work independently and together to index your data
  • Use the example database to create several temporary views based on different criteria
  • Discover the uses of Map and Reduce JavaScript functions
  • Convert your temporary views to permanent views within a design document
  • Learn several options for querying the data within your views
  • Limit the number of results returned, skip some results, or reverse the order of the output
  • Group your results by exact keys or by parts of keys

Bradley Holt, co-founder of the creative services firm Found Line, is a web developer and entrepreneur ten years of PHP and MySQL experience. He began using CouchDB before the release of version 1.0. Bradley is an active member of the PHP community, and can be reached at bradley-holt.com.

Book Details

  • Paperback: 76 pages
  • Publisher: O'Reilly Media (January, 2011)
  • Language: English
  • ISBN-10: 1449303129
  • ISBN-13: 978-1449303129
  • File Size: 6.5 MiB
  • Hits: 1,879 times

25 Recipes for Getting Started with R - PDF

25 Recipes for Getting Started with RBook Description
This short, concise book provides beginners with a selection of how-to recipes to solve simple problems with R. Each solution gives you just what you need to know to get started with R for basic statistics, graphics, and regression. These solutions were selected from O'Reilly's R Cookbook, which contains more than 200 recipes for R that you'll find useful once you move beyond the basics.

R is a powerful tool for statistics and graphics, but getting started with this language can be frustrating. This short, concise book provides beginners with a selection of how-to recipes to solve simple problems with R. Each solution gives you just what you need to know to use R for basic statistics, graphics, and regression.

You'll find recipes on reading data files, creating data frames, computing basic statistics, testing means and correlations, creating a scatter plot, performing simple linear regression, and many more. These solutions were selected from O'Reilly's R Cookbook, which contains more than 200 recipes for R that you'll find useful once you move beyond the basics.

About the Author
Paul Teetor is a quantitative developer with Masters degrees in statistics and computer science. He specializes in analytics and software engineering for investment management, securities trading, and risk management. He works with hedge funds, market makers, and portfolio managers in the greater Chicago area.

Book Details

  • Paperback: 58 pages
  • Publisher: O'Reilly Media (January, 2011)
  • Language: English
  • ISBN-10: 1449303234
  • ISBN-13: 978-1449303235
  • File Size: 5.8 MiB
  • Hits: 1,736 times

21 Recipes for Mining Twitter - pdf

21 Recipes for Mining TwitterBook Description
Millions of public Twitter streams harbor a wealth of data, and once you mine them, you can gain some valuable insights. This short and concise book offers a collection of recipes to help you extract nuggets of Twitter information using easy-to-learn Python tools. Each recipe offers a discussion of how and why the solution works, so you can quickly adapt it to fit your particular needs. The recipes include techniques to:
  • Use OAuth to access Twitter data
  • Create and analyze graphs of retweet relationships
  • Use the streaming API to harvest tweets in realtime
  • Harvest and analyze friends and followers
  • Discover friendship cliques
  • Summarize webpages from short URLs

This book is a perfect companion to O'Reilly's Mining the Social Web.

About the Author
Matthew Russell, Vice President of Engineering at Digital Reasoning Systems (http://www.digitalreasoning.com/) and Principal at Zaffra (http://zaffra.com), is a computer scientist who is passionate about data mining, open source, and web application technologies. He's also the author of Dojo: The Definitive Guide (O'Reilly).

Book Details

  • Paperback: 72 pages
  • Publisher: O'Reilly Media (January, 2011)
  • Language: English
  • ISBN-10: 1449303161
  • ISBN-13: 978-1449303167
  • File Size: 5.8 MiB
  • Hits: 2,062 times

Securing the Smart Grid: Next Generation Power Grid Security - pdf

Securing the Smart Grid: Next Generation Power Grid SecurityBook Description
Smart Grids are the future of energy. By creating networks from power plant to home, utility companies will be able to regulate power consumption making sure that consumers are receiving the amount that is needed, no more or less. While this new use of networking technology and unique applications such as smart meters will help to conserve energy it also opens up a pipeline, that was regulated manually, into the computer world of interconnected networks. The infrastructure that is being built will need to have robust security as an attack on this network could create chaos to tens of thousands of power consumers, stop a utility company in its tracks, or be used in a cyberwar.

Securing the Smart Grid takes a look at grid security today, how it is developing and being deployed into now over 10 million households in the US alone. Direct attacks to smart meters as well as attacks via the networks will be detailed along with suggestions for defense against them. A framework for how security should be implemented throughout this growing system will be included directing security consultants, and system and network architects on how to keep the grid strong against attackers big and small.

  • Details how old and new hacking techniques can be used against the grid and how to defend against them
  • Discusses current security initiatives and how they fall short of what is needed
  • Find out how hackers can use the new infrastructure against itself

Review
"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject – a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."
– Dr. Patrick Engebretson, Assistant Professor of Computer Security, Dakota State University.

"Easy to read and full of valuable information, this book provides a wide-eyed view of our future and the security challenges we will be facing in our day-to-day lives. Exploring everything from home systems to large-scale power plants, this is a must-read for everyone in our technological society."
– Thomas Wilhelm, ISSMP, CISSP, SCSECA, SCNA, SCSA, IEM, IAM

Book Details

  • Paperback: 320 pages
  • Publisher: Syngress (October, 2010)
  • Language: English
  • ISBN-10: 1597495700
  • ISBN-13: 978-1597495707
  • File Size: 6.3 MiB
  • Hits: 807 times

Practical Lock Picking: A Physical Penetration Tester’s Training Guide - pdf

Practical Lock Picking: A Physical Penetration Testers Training GuideBook Description
For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on the subject (which tend to be either massive volumes detailing every conceivable style of lock or brief "spy manuals" that only skim the surface) this book is for INFOSEC professionals that need essential, core knowledge of lockpicking and seek the ability to open most locks with relative ease. Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly. Everything from straightforward lockpicking to quick-entry techniques like shimming, bumping, and bypassing is explained and shown.Whether you're being hired to penetrate security or simply trying to harden your own defenses, this book is essential.
  • Detailed photos make learning as easy as picking a lock
  • DVD is filled with indispensible lock picking videos and color photos
  • Extensive appendix details tools and toolkits currently available for all your lock picking needs

Review
"Practical Lock Picking (PLP) is an awesome book. I don't provide physical testing services, but as a security professional familiar with Deviant's reputation I was curious to read PLP. Not only is PLP an incredible resource, it should also serve as a model text for others who want to write a good book. First, although the book is less than 250 pages, it is very reasonably priced. Second, Deviant wastes NO space. There is no filler material, background found in other readily available texts, reprinted Web site content, etc. Third, the writing is exceptionally clear and methodical, with extreme attention to detail and a master's approach to educating the reader. Finally, the diagrams, pictures, and figures are superb."
–Richard Bejtlich, TaoSecurity

"No matter what your background is, if you want a new and fascinating insight into this world, I don't think any book will give you a better introduction to this field than this one."
–Barry Wels, Founder and President, The open Organisation Of Lockpickers

"You have exhausted your budgets on the myriad of high tech cyber threats and finally have time to take a breath. Just as you settle in your chair to review the dashboard which shows the fruits of your tireless effort, an alert hits your phone. The voice on the phone cries out 'The servers are GONE!' This book will show you what happens when attackers decide to 'get physical."
–Chris Nickerson, Lares Consulting

"The clear explanation and plentiful diagrams leave the reader with a clear idea of how lock mechanisms work, and the practice exercises that follow build on this knowledge to allow the reader to quickly progress before moving on to the simpler techniques, shimming and bumping…Overall the book does much to dispel the myth that lock-picking is an arcane, difficult art and puts the reader in a position to carry out more effective physical security reviews…In summary this is an excellent practical introduction to the subject and the publishers are to be congratulated for producing another good niche penetration testing book."
–Nick Dunn, BCS, The Chartered Institute for IT

Book Details

  • Paperback: 236 pages
  • Publisher: Syngress (July, 2010)
  • Language: English
  • ISBN-10: 1597496111
  • ISBN-13: 978-1597496117
  • File Size: 5.2 MiB
  • Hits: 1,910 times

Software Engineering Reviews and Audits - PDF

Software Engineering Reviews and AuditsBook Description
Accurate software engineering reviews and audits have become essential to the success of software companies and military and aerospace programs. These reviews and audits define the framework and specific requirements for verifying software development efforts.Authored by an industry professional with three decades of experience, Software Engineering Reviews and Audits offers authoritative guidance for conducting and performing software first article inspections, and functional and physical configuration software audits. It prepares readers to answer common questions for conducting and performing software reviews and audits, such as: What is required, who needs to participate, and how do we ensure success in all specified requirements in test and released configuration baselines?

Complete with resource-rich appendices, this concise guide will help you:

  • Conduct effective and efficient software reviews and audits
  • Understand how to structure the software development life cycle
  • Review software designs and testing plans properly
  • Access best methods for reviews and audits
  • Achieve compliance with mandatory and contractual software requirements

The author includes checklists, sample forms, and a glossary of industry terms and acronyms to help ensure formal audits are successful the first time around. The contents of the text will help you maintain a professional setting where software is developed for profit, increase service quality, generate cost reductions, and improve individual and team efforts.

Book Details

  • Hardcover: 260 pages
  • Publisher: CRC Press (January, 2011)
  • Language: English
  • ISBN-10: 143985145X
  • ISBN-13: 978-1439851456
  • File Size: 6.5 MiB
  • Hits: 1,819 times

Real Life Applications of Soft Computing - pdf

Real Life Applications of Soft ComputingDescription
Rapid advancements in the application of soft computing tools and techniques have proven valuable in the development of highly scalable systems and resulted in brilliant applications, including those in biometric identification, interactive voice response systems, and data mining. Although many resources on the subject adequately cover the theoretic concepts, few provide clear insight into practical application.

Filling this need, Real Life Applications of Soft Computing explains such applications, including the underlying technology and its implementation. While these systems initially seem complex, the authors clearly demonstrate how they can be modeled, designed, and implemented. Written in a manner that makes it accessible to novices, the book begins by covering the theoretical foundations of soft computing. It supplies a concise explanation of various models, principles, algorithms, tools, and techniques, including artificial neural networks, fuzzy systems, evolutionary algorithms, and hybrid algorithms.

Supplying in-depth exposure to real life systems, the text provides:

  • Multi-dimensional coverage supported by references, figures, and tables
  • Warnings about common pitfalls in the implementation process, as well as detailed examinations of possible solutions
  • A timely account of developments in various areas of application
  • Solved examples and exercises in each chapter

Detailing a wide range of contemporary applications, the text includes coverage of those in biometric systems, including physiological and behavioral biometrics. It also examines applications in legal threat assessment, robotic path planning, and navigation control. The authors consider fusion methods in biometrics and bioinformatics and also provide effective disease identification techniques.

Complete with algorithms for robotic path planning, the book addresses character recognition and presents the picture compression technique by using a customized hybrid algorithm. The authors conclude with a discussion of parallel architecture for artificial neural networks and supply guidelines for creating and implementing effective soft computing designs.

Book Details

  • Hardcover: 686 pages
  • Publisher: CRC Press (May, 2010)
  • Language: English
  • ISBN-10: 1439822875
  • ISBN-13: 978-1439822876
  • File Size: 16.5 MiB
  • Hits: 1,210 times

3/03/2011

Adobe Acrobat X Classroom in a Book - PDF

Adobe Acrobat X Classroom in a BookBook Description
The fastest, easiest, most comprehensive way to learn Adobe Acrobat X

Classroom in a Book, the best-selling series of hands-on software  training workbooks, helps you learn the features of Adobe software  quickly and easily. Classroom in a Book offers what no other book or  training program does – an official training series from Adobe Systems  Incorporated, developed with the support of Adobe product experts.

Adobe Acrobat X Classroom in a Book contains  13 lessons. The book covers the basics of learning Adobe Acrobat and  provides countless tips and techniques to help you become more  productive with the program. You can follow the book from start to  finish or choose only those lessons that interest you.

About the Author
The Adobe Creative Team of designers, writers, and editors has  extensive, real world knowledge of Adobe products. They work closely  with the Adobe product development teams and Adobe's Instructional  Communications team to come up with creative, challenging, and visually  appealing projects to help both new and experienced users get up to  speed quickly on Adobe software products.

Book Details

  • Paperback: 336 pages
  • Publisher: Adobe Press (December, 2010)
  • Language: English
  • ISBN-10: 0321751256
  • ISBN-13: 978-0321751256
  • File Size: 6.5 MiB
  • Hits: 1,042 times

Wireless Networking Based Control - PDF

Wireless Networking Based ControlBook Description
Wireless Network Based Control‏  Due to advantages of encompassing mobility, reconfigurability, easy  commissioning and spatio-temporal sensing, wireless networking is  gaining significant momentum in several areas of application. And while  the initial focus in wireless networking has been on communication and  sensing, a new field has emerged that uses the same communication  channel for enabling network control, which leads to several interesting  issues and possibilities not typically covered in traditional  wire-based network control.

Wireless Network Based Control‏ discusses those interesting issues and  possibilities, both the theory and application relevant to them,  focusing on the core theme of control using wireless network and control  of the information exchanged over the wireless network. It covers many  topics including, but not limited to, the following: Robust  stabilization of wireless network control systems in the presence of  delays, packet drop out, fading; state estimation over wireless network  under random measurement delay; cyber-physical control over wireless  sensor and actuator networks; estimation of a dynamical system over a  wireless fading channel using Kalman filter; control over wireless  multi-hop networks based on time-delay and finite spectrum assignment;  position localization in wireless sensor networks; cross-layer optimized  based protocols for control over wireless sensor networks; rendezvous  problems and consensus protocols for application in control of  distributed mobile wireless networks; redeployment control of mobile  sensors for enhancing wireless network quality and channel capacity; and  coordinated control over low-frequency-radio-based ad-hoc underwater  wireless communication network. Timely and unique, this collection of work from top researchers is a  seminal text in this rapidly-growing field.

Table of contents

  • Joint optimization of wireless  control-communication network.
  • Robust stabilization of wired and  wireless packet based networked control systems.
  • Rendezvous problem and  consensus protocols.
  • Decentralized control of networked autonomous  vehicles, theory and implementation.
  • Analysis, design, and application  of 802.11 wireless feedback control.
  • Stability of wireless networked  control systems in the presence of delays and packet dropouts.
  • Consensus  based overlapping decentralized estimation and control in lossy  networks.
  • Control scalability in the presence of channel  interference.
  • Wireless nodal architecture based on software-defined and  cognitive radio concepts for enhanced network capacity based distributed  control.
  • Distributed crosslayer delay optimization for network  control.
  • Wireless communication architecture for the active  aircraft.
  • Distributed control of interactive power network over wireless  information network.
  • Wireless network control for industrial  automation.
  • Additional topics

Book Details

  • Hardcover: 346 pages
  • Publisher: Springer (December, 2010)
  • Language: English
  • ISBN-10: 1441973923
  • ISBN-13: 978-1441973924
  • File Size: 9.7 MiB
  • Hits: 1,332 times

Computer Vision: Detection, Recognition and Reconstruction - PDF

Computer Vision: Detection, Recognition and ReconstructionBook Description
Computer vision is the science and technology of making machines that see. It is concerned with the theory, design and implementation of algorithms that can automatically process visual data to recognize objects, track and recover their shape and spatial layout. The International Computer Vision Summer School – ICVSS was established in 2007 to provide both an objective and clear overview and an in-depth analysis of the state-of-the-art research in Computer Vision. The courses are delivered by world renowned experts in the field, from both academia and industry, and cover both theoretical and practical aspects of real Computer Vision problems. The school is organized every year by University of Cambridge (Computer Vision and Robotics Group) and University of Catania (Image Processing Lab). Different topics are covered each year. A summary of the past Computer Vision Summer Schools can be found at: http://www.dmi.unict.it/icvss This edited volume contains a selection of articles covering some of the talks and tutorials held during the first two editions of the school on topics such as Recognition, Registration and Reconstruction. The chapters provide an in-depth overview of these challenging areas with key references to the existing literature.

Table of contents:
Part 1 Is Human Vision Any Good?.
Part 2  Knowing a Good Feature When  You See it: Ground Truth and Methodology to Evaluate Local Features For  Recognition.
Part 3 Dynamic Graph Cuts and their Applications in  Computer Vision.
Part 4 Discriminative Graphical Models for  Context-Based Classification.
Part 5 From the Subspace Methods to the  Mutual Subspace Method.
Part 6 What, Where and Who? Telling the Story  of an Image by Activity classification, Scene Recognition and Object  Categorization.
Part 7 Semantic Texton Forests.
Part 8 Multi-view  Object Categorization and Pose Estimation.
Part 9 A Vision-based Remote  Control.
Part 10 Multi-view Multi-object Detection and Tracking.
Part 11 Shape from Photographs: a Multi-View Stereo Pipeline.
Part 12  Practical 3D reconstruction based on Photometric Stereo.
Part 13 Index

Book Details

  • Hardcover: 375 pages
  • Publisher: Springer (July, 2010)
  • Language: English
  • ISBN-10: 3642128475
  • ISBN-13: 978-3642128479
  • File Size: 14.1 MiB
  • Hits: 1,614 times

Computer Vision: Algorithms and Applications - PDF

Computer Vision: Algorithms and ApplicationsBook Description
Humans perceive the three-dimensional structure of the world with  apparent ease. However, despite all of the recent advances in computer  vision research, the dream of having a computer interpret an image at  the same level as a two-year old remains elusive. Why is computer vision  such a challenging problem and what is the current state of the art?

Computer Vision: Algorithms and Applications explores the variety of techniques commonly used to analyze and  interpret images. It also describes challenging real-world applications  where vision is being successfully used, both for specialized  applications such as medical imaging, and for fun, consumer-level tasks  such as image editing and stitching, which students can apply to their  own personal photos and videos.

More than just a source of  "recipes," this exceptionally authoritative and comprehensive  textbook/reference also takes a scientific approach to basic vision  problems, formulating physical models of the imaging process before  inverting them to produce descriptions of a scene. These problems are  also analyzed using statistical models and solved using rigorous  engineering techniques

Topics and features:

  • Structured  to support active curricula and project-oriented courses, with tips in  the Introduction for using the book in a variety of customized courses
  • Presents  exercises at the end of each chapter with a heavy emphasis on testing  algorithms and containing numerous suggestions for small mid-term  projects
  • Provides additional material and more detailed  mathematical topics in the Appendices, which cover linear algebra,  numerical techniques, and Bayesian estimation theory
  • Suggests  additional reading at the end of each chapter, including the latest  research in each sub-field, in addition to a full Bibliography at the  end of the book
  • Supplies supplementary course material for students at the associated website, http://szeliski.org/Book/

Suitable  for an upper-level undergraduate or graduate-level course in computer  science or engineering, this textbook focuses on basic techniques that  work under real-world conditions and encourages students to push their  creative boundaries. Its design and exposition also make it eminently  suitable as a unique reference to the fundamental techniques and current  research literature in computer vision.

Book Details

  • Hardcover: 812 pages
  • Publisher: Springer (November, 2010)
  • Language: English
  • ISBN-10: 1848829345
  • ISBN-13: 978-1848829343
  • File Size: 20.5 MiB
  • Hits: 2,009 times

Essential SQLAlchemy - PDF

Essential SQLAlchemyBook Description
Essential SQLAlchemy introduces a high-level  open-source code library that makes it easier for Python programmers to  access relational databases such as Oracle, DB2, MySQL, PostgreSQL, and  SQLite. SQLAlchemy has become increasingly popular since its release,  but it still lacks good offline documentation. This practical book fills  the gap, and because a developer wrote it, you get an objective look at  SQLAlchemy's tools rather than an advocate's description of all the  "cool" features.

SQLAlchemy includes both a database  server-independent SQL expression language and an object-relational  mapper (ORM) that lets you map "plain old Python objects" (POPOs) to  database tables without substantially changing your existing Python  code. Essential SQLAlchemy demonstrates how to use the library to  create a simple database application, walks you through simple queries,  and explains how to use SQLAlchemy to connect to multiple databases  simultaneously with the same Metadata. You also learn how to:

  • Create custom types to be used in your schema, and when it's useful to use custom rather than built-in types
  • Run queries, updates, and deletes with SQLAlchemy's SQL expression language
  • Build  an object mapper with SQLAlchemy, and understand the differences  between this and active record patterns used in other ORMs
  • Create objects, save them to a session, and flush them to the database
  • Use SQLAlchemy to model object oriented inheritance
  • Provide a declarative, active record pattern for use with SQLAlchemy using the Elixir extension
  • Use the SQLSoup extension to provide an automatic metadata and object model based on database reflection

In  addition, you'll learn how and when to use other extensions to  SQLAlchemy, including AssociationProxy, OrderingList, and more.

Essential SQLAlchemy is the much-needed guide for every Python developer using this code  library. Instead of a feature-by-feature documentation, this book takes  an "essentials" approach that gives you exactly what you need to become  productive with SQLAlchemy right away.

Book Details

  • Paperback: 240 pages
  • Publisher: O'Reilly Media (June, 2008)
  • Language: English
  • ISBN-10: 0596516142
  • ISBN-13: 978-0596516147
  • File Size: 8.5 MiB
  • Hits: 1,958 times

Transactional Memory, 2nd Edition - PDF

Transactional Memory, 2nd EditionBook Description
The advent of multicore processors has renewed interest in the idea  of incorporating transactions into the programming model used to write  parallel programs. This approach, known as transactional memory, offers  an alternative, and hopefully better, way to coordinate concurrent  threads. The ACI (atomicity, consistency, isolation) properties of  transactions provide a foundation to ensure that concurrent reads and  writes of shared data do not produce inconsistent or incorrect results.  At a higher level, a computation wrapped in a transaction executes  atomically – either it completes successfully and commits its result in  its entirety or it aborts. In addition, isolation ensures the  transaction produces the same result as if no other transactions were  executing concurrently. Although transactions are not a parallel  programming panacea, they shift much of the burden of synchronizing and  coordinating parallel computations from a programmer to a compiler, to a  language runtime system, or to hardware. The challenge for the system  implementers is to build an efficient transactional memory  infrastructure. This book presents an overview of the state of the art  in the design and implementation of transactional memory systems, as of  early spring 2010.

Table of Contents:

  1. Introduction
  2. Basic Transactions
  3. Building on Basic Transactions
  4. Software  Transactional Memory
  5. Hardware-Supported Transactional Memory
  6. Conclusions

Book Details

  • Paperback: 264 pages
  • Publisher: Morgan and Claypool Publishers; 2nd Edition (June, 2010)
  • Language: English
  • ISBN-10: 1608452352
  • ISBN-13: 978-1608452354
  • File Size: 7.7 MiB
  • Hits: 1,484 times

CISSP All-in-One Exam Guide, 5th Edition - PDF

CISSP All in One Exam Guide, 5th EditionBook Description
Get complete coverage of the latest release of the Certified  Information Systems Security Professional (CISSP) exam inside this  comprehensive, fully updated resource. Written by the leading expert in  IT security certification and training, this authoritative guide covers  all 10 CISSP exam domains developed by the International Information  Systems Security Certification Consortium (ISC2). You'll find learning  objectives at the beginning of each chapter, exam tips, practice exam  questions, and in-depth explanations. Designed to help you pass the  CISSP exam with ease, this definitive volume also serves as an essential  on-the-job reference.COVERS ALL 10 CISSP DOMAINS:
  • Information security and risk management
  • Access control
  • Security architecture and design
  • Physical and environmental security
  • Telecommunications and network security
  • Cryptography
  • Business continuity and disaster recovery planning
  • Legal regulations, compliance, and investigations
  • Application security
  • Operations security

THE CD-ROM FEATURES:

  • Hundreds of practice exam questions
  • Video training excerpt from the author
  • E-book

Shon Harris,  CISSP, is a security consultant, a former member of the Information  Warfare unit in the Air Force, and a contributing writer to Information Security Magazine and Windows 2000 Magazine. She is the author of the previous editions of this book.

Book Details

  • Hardcover: 1216 pages
  • Publisher: McGraw-Hill Osborne Media; 5th Edition (January, 2010)
  • Language: English
  • ISBN-10: 0071602178
  • ISBN-13: 978-0071602174
  • File Size: 33.8 MiB
  • Hits: 1,607 times

SharePoint 2010 Disaster Recovery Guide - PDF

SharePoint 2010 Disaster Recovery GuideBook Description
Microsoft?s SharePoint platform is a complex, diverse technical tool designed to meet a range of business needs and uses. It requires several other platforms and applications for implementation, and it can be integrated with other external line of business applications. This diversity also applies to the numerous methods, tools, and approaches to preserve your SharePoint farm if it becomes affected by a catastrophic event. The majority of this book introduces you to those methods, tools, and approaches for backing up and restoring SharePoint.

Furthermore, it covers the key concepts and activities necessary to develop a disaster recovery plan for SharePoint. After covering those concepts, it dives into all the crucial technical aspects of preserving SharePoint using the tools Microsoft provides with it.

About the Author
John Ferringer is a Microsoft Certified Technology Specialist in the  installation and configuration of WSS v3, MOSS 2007, and SCOM 2007. He  has co-authored the SharePoint 2007 Disaster Recovery Guide (Cengage  Learning). He is a Solutions Architect for Apparatus, Inc. in  Indianapolis, IN, has over five years of experience administering and  supporting SharePoint technologies and over eleven years working in the  technology consulting industry. John also runs SearchForSharePoint.com, a  custom search engine for SharePoint.

Sean McDonough is a Product  Manager for SharePoint Products at Idera, a Microsoft gold certified  partner and creator of tools for SharePoint, SQL Server, and PowerShell.  Sean is a consultant and a regular speaker at SharePoint events, and he  has worked with a number of Fortune 500 companies to architect,  implement, troubleshoot, tune, and customize their SharePoint  environments. Sean is an MCTS, an MCPD, and the co-author of both the  SharePoint 2007 Disaster Recovery Guide and the SharePoint 2010 Disaster  Recovery Guide.

Book Details

  • Paperback: 448 pages
  • Publisher: Course Technology PTR; 2nd Edition (September, 2010)
  • Language: English
  • ISBN-10: 1435456459
  • ISBN-13: 978-1435456457
  • File Size: 8.5 MiB
  • Hits: 1,308 times

3/02/2011

Invent Your Own Computer Games with Python, 2nd Edition - PDF

Invent Your Own Computer Games with Python, 2nd EditionBook Description
"Invent Your Own Computer Games with Python" is a free book (as in, open source) and a free eBook (as in, no cost to download) that teaches you how to program in the Python programming language. Each chapter gives you the complete source code for a new game, and then teaches the programming concepts from the example.

"Invent with Python" was written to be understandable by kids as  young as 10 to 12 years old, although it is great for anyone of any age  who has never programmed before.

This second edition has revised and expanded content, including a Pygame tutorial library to make games with graphics, animation, and sound.

Reviews
"This book is totally appropriate for someone who has never programmed before. Everything is explained, right from the ground up, in a lively, interesting style which doesn't dumb things down."
– J. Hartley, tartley.com

"I am a college professor who occasionally teaches courses for liberal arts students. [...] I offered a game programming course in the Python programming language using Sweigart's book. The students loved this book. It starts at the very beginning and leads them, game by fascinating game, to become highly capable programmers."
– Dr. Robert C. Gann

"I picked up a copy of this book and was in all honesty blown away by how easy the concepts of python are introduced to the reader in a clear and concise manner. The fact that you are also making small little games with your programs throughout this book helps with motivation as tasks get harder and harder – it keeps it all fun while learning. [...] I e-mailed the author and got great personal help to advance further – that was of course much appreciated as well."
– Tor Hagen

"This Spring, we used this book for six weeks of a homeschool "Physics and Modeling" class. I am extremely happy with the book. It received many compliments from the students for ease of use, the hands-on approach, and the fact that game programming starts right away."
– Maria A. Droujkova naturalmath.com

"I used to write a column on a greek magazine about learning Python and PyGame. [...] Since I found this book, every time the topic of learning programming is mentioned – especially from a person interested on making games – I point people to it."
– Konstantinos Michalopoulos

Book Details

  • Paperback: 438 pages
  • Publisher: Albert Sweigart (May, 2010)
  • Language: English
  • ISBN-10: 0982106017
  • ISBN-13: 978-0982106013
  • File Size: 8.0 MiB
  • Hits: 2,419 times

Introduction to Algorithms, 3rd Edition - PDF

Introduction to Algorithms, 3rd EditionBook Description
Some books on algorithms are rigorous but incomplete; others cover masses of material but lack rigor. Introduction to Algorithms uniquely combines rigor and comprehensiveness. The book covers a broad  range of algorithms in depth, yet makes their design and analysis  accessible to all levels of readers. Each chapter is relatively  self-contained and can be used as a unit of study. The algorithms are  described in English and in a pseudocode designed to be readable by  anyone who has done a little programming. The explanations have been  kept elementary without sacrificing depth of coverage or mathematical  rigor.

The first edition became a widely used text in  universities worldwide as well as the standard reference for  professionals. The second edition featured new chapters on the role of  algorithms, probabilistic analysis and randomized algorithms, and linear  programming. The third edition has been revised and updated throughout.  It includes two completely new chapters, on van Emde Boas trees and  multithreaded algorithms, and substantial additions to the chapter on  recurrences (now called "Divide-and-Conquer"). It features improved  treatment of dynamic programming and greedy algorithms and a new notion  of edge-based flow in the material on flow networks. Many new exercises  and problems have been added for this edition.

As of the third edition, this textbook is published exclusively by the MIT Press.

Review
"In light of the explosive growth in the amount of data and the  diversity of computing applications, efficient algorithms are needed now  more than ever. This beautifully written, thoughtfully organized book  is the definitive introductory book on the design and analysis of  algorithms. The first half offers an effective method to teach and study  algorithms; the second half then engages more advanced readers and  curious students with compelling material on both the possibilities and  the challenges in this fascinating field."
—Shang-Hua Teng, University of Southern California

"Introduction to Algorithms, the 'bible' of the field, is a comprehensive textbook covering the full  spectrum of modern algorithms: from the fastest algorithms and data  structures to polynomial-time algorithms for seemingly intractable  problems, from classical algorithms in graph theory to special  algorithms for string matching, computational geometry, and number  theory. The revised third edition notably adds a chapter on van Emde  Boas trees, one of the most useful data structures, and on multithreaded  algorithms, a topic of increasing importance."
—Daniel Spielman, Department of Computer Science, Yale University

"As  an educator and researcher in the field of algorithms for over two  decades, I can unequivocally say that the Cormen book is the best  textbook that I have ever seen on this subject. It offers an incisive,  encyclopedic, and modern treatment of algorithms, and our department  will continue to use it for teaching at both the graduate and  undergraduate levels, as well as a reliable research reference."
—Gabriel Robins, Department of Computer Science, University of Virginia

Book Details

  • Hardcover: 1312 pages
  • Publisher: MIT Press; 3rd Edition (September, 2009)
  • Language: English
  • ISBN-10: 0262033844
  • ISBN-13: 978-0262033848
  • File Size: 5.5 MiB
  • Hits: 5,048 times

The Art of Assembly Language, 2nd Edition - PDF

The Art of Assembly Language, 2nd EditionBook Description
Assembly is a low-level programming language that's one step above a  computer's native machine language. Although assembly language is  commonly used for writing device drivers, emulators, and video games,  many programmers find its somewhat unfriendly syntax intimidating to  learn and use.

Since 1996, Randall Hyde's The Art of Assembly Language has provided a comprehensive, plain-English, and patient introduction  to assembly for non-assembly programmers. Hyde's primary teaching tool,  High Level Assembler (or HLA), incorporates many of the features found  in high-level languages (like C, C++, and Java) to help you quickly  grasp basic assembly concepts. HLA lets you write true low-level code  while enjoying the benefits of high-level language programming.

As you read The Art of Assembly Language,  you'll learn the low-level theory fundamental to computer science and  turn that understanding into real, functional code. You'll learn how to:

  • Edit, compile, and run an HLA program
  • Declare and use constants, scalar variables, pointers, arrays, structures, unions, and namespaces
  • Translate arithmetic expressions (integer and floating point)
  • Convert high-level control structures

This much anticipated second edition of The Art of Assembly Language has been updated to reflect recent changes to HLA and to support Linux,  Mac OS X, and FreeBSD. Whether you're new to programming or you have  experience with high-level languages, The Art of Assembly Language, 2nd Edition is your essential guide to learning this complex, low-level language.

Book Details

  • Paperback: 760 pages
  • Publisher: No Starch Press; 2nd Edition (March, 2010)
  • Language: English
  • ISBN-10: 1593272073
  • ISBN-13: 978-1593272074
  • File Size: 21.9 MiB
  • Hits: 2,917 times

UML 2 Semantics and Applications - PDF

UML 2 Semantics and ApplicationsBook Description
A coherent and integrated account of the leading UML 2 semantics work  and the practical applications of UML semantics developmentWith contributions from leading experts in the field, the book begins  with an introduction to UML and goes on to offer in-depth and up-to-date  coverage of:
  • The role of semantics
  • Considerations and rationale for a UML system model
  • Definition of the UML system model
  • UML descriptive semantics
  • Axiomatic semantics of UML class diagrams
  • The object constraint language
  • Axiomatic semantics of state machines
  • A coalgebraic semantic framework for reasoning about interaction designs
  • Semantics of activity diagrams
  • Verification of UML models
  • State invariants
  • Model transformation specification and verification

Additionally, readers are provided with expert guidance on how to  resolve semantic problems and a section on applications of UML semantics  with model analysis. UML 2 Semantics and Applications is an  ideal resource for researchers and tool-builders working in UML, among  others. It is also an excellent textbook for postgraduate teaching and  research.

Book Details

  • Hardcover: 400 pages
  • Publisher: Wiley (October, 2009)
  • Language: English
  • ISBN-10: 0470409088
  • ISBN-13: 978-0470409084
  • File Size: 6.5 MiB
  • Hits: 2,838 times

CMOS Circuit Design, Layout, and Simulation, 3rd Edition - PDF

CMOS Circuit Design, Layout, and Simulation, 3rd EditionBook Description
The Third Edition of CMOS Circuit Design, Layout, and Simulation continues to cover the practical design of both analog and digital  integrated circuits, offering a vital, contemporary view of a wide range  of analog/digital circuit blocks including: phase-locked-loops,  delta-sigma sensing circuits, voltage/current references, op-amps, the  design of data converters, and much more. Regardless of one's integrated  circuit (IC) design skill level, this book allows readers to experience  both the theory behind, and the hands-on implementation of,  complementary metal oxide semiconductor (CMOS) IC design via detailed  derivations, discussions, and hundreds of design, layout, and simulation  examples.

From the Back Cover
Now updated—the classic guide to CMOS circuits, from design to implementationThe Third Edition of CMOS Circuit Design, Layout, and Simulation continues to cover the practical design of both analog and digital  integrated circuits, offering a vital, contemporary view of a wide range  of analog/digital circuit blocks including: phase-locked-loops,  delta-sigma sensing circuits, voltage/current references, op-amps, the  design of data converters, and much more. Regardless of one's integrated  circuit (IC) design skill level, this book allows readers to experience  both the theory behind, and the hands-on implementation of,  complementary metal oxide semiconductor (CMOS) IC design via detailed  derivations, discussions, and hundreds of design, layout, and simulation  examples.

Inside, readers will continue to find the relevant and practical material that made the first two editions bestsellers. The Third Edition has been updated and includes new chapters covering the implementation  of data converters and the analysis/design of feedback amplifiers The  additional material makes the book even more useful as an academic text  and companion for the working design engineer. Featured in this Third Edition:

  • In-depth coverage of both analog and digital transistor-level design techniques
  • Integration of the book's material with online resources found at CMOSedu.com
  • Detailed  discussions on the design of phase- and delay-locked loops,  mixed-signal circuits, data converters, and circuit noise
  • Real-world process parameters, design rules, and layout examples
  • Hundreds of practical design examples, discussions, and end-of-chapter problems
  • Theory and discussions detailing the trade-offs and considerations when designing at the transistor level

The book's accompanying Web site, CMOSedu.com, offers numerous  examples for many computer-aided design (CAD) tools including Cadence,  Electric, HSPICE, LASI, LTspice, Spectre, and WinSpice. Readers can  recreate, modify, or simulate the design examples presented in the book.  In addition, the solutions to the book's end-of-chapter problems, the  book's figures, and additional homework problems without solutions are  found at CMOSedu.com.

This Third Edition of CMOS Circuit Design, Layout, and Simulation is the ideal companion for undergraduate and graduate students in  electrical and computer engineering as well as both novice and senior  engineers working on transistor-level integrated circuit design.

Book Details

  • Hardcover: 1208 pages
  • Publisher: Wiley-IEEE Press; 3 edition (September, 2010)
  • Language: English
  • ISBN-10: 0470881321
  • ISBN-13: 978-0470881323
  • File Size: 17.4 MiB
  • Hits: 950 times

Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft’s Hypervisor - pdf

Windows Server 2008 R2 Hyper V: Insiders Guide to Microsofts HypervisorBook Description
Get the inside scoop on Hyper-V for Windows Server 2008 R2Virtualization is a top priority for thousands of companies all over  the world. Written by an author team that is part of the Windows  virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will  walk you through Hyper-V essentials so you can get you up to speed and  down to business with Hyper-V.

Now fully updated for  Windows Server 2008 R2 Hyper-V, you will find additional content on new  features and capabilities such as Live Migration and support for 64  Logical Processors (LP).

  • Teaches how to manage  virtual machines with the latest System Center tools such as Virtual  Machine Manager 2008 R2, Data Protection Manager 2010, and Operations  Manager 2007 R2
  • Covers all of the new functionalities of  Windows Server 2008 R2 Hyper-V, including Live Migration, 64 LP support,  Processor Compatibility Mode, enhanced processor functionality support,  hot-add and remove of storage, TCP Offload support, and VM Queue  support
  • Demonstrates key scenarios for Hyper-V, including  server consolidation, testing and development, Business Continuity and  Disaster Recovery, and Dynamic IT
  • Provides step-by-step instructions and examples

This insiders guide will help you get the most out of your hardware and reduce cost with Windows Server 2008 R2 Hyper-V.

From the Back Cover
Jump into Hyper-V and start virtualizingWant to  efficiently run multiple copies of Windows and Linux on the same server?  Or create highly available virtual machines with Windows Server 2008  and Windows Server 2008 R2? Written by members of the virtualization  team at Microsoft, the new edition of this practical guide has been  fully updated to cover the new features and capabilities of Windows  Server 2008 R2 Hyper-V. From installing and configuring to achieving  high availability and automating tasks, this book provides you with  expert tips and best practices to help you start taking advantage of  Hyper-V today.

  • Build a scalable environment that helps you increase processing without additional IT investments
  • Migrate your virtual machine, automate tasks, and utilize scripting
  • Ensure high availability and improve the performance of your virtual networks
  • Take advantage of new features and new processor functionality
  • Discover how to use virtualization for disaster recovery and quick migrations
  • Learn to effectively manage virtual machines with the latest System  Center tools: Virtual Machine Manager 2008 R2, Data Protection Manager  2010, and System Center Operations Manager 2007 R2

Book Details

  • Paperback: 408 pages
  • Publisher: Sybex (June, 2010)
  • Language: English
  • ISBN-10: 047062700X
  • ISBN-13: 978-0470627006
  • File Size: 8.5 MiB
  • Hits: 1,464 times

Mastering Microsoft Exchange Server 2007 SP1, 2nd Edition - PDF

Mastering Microsoft Exchange Server 2007 SP1, 2nd EditionBook Description
Microsoft Exchange Server provides a reliable messaging system that  protects against spam and viruses and allows for access to e-mail,  voicemail, and calendars from a variety devices and any location. Fully  updated for the latest release of Microsoft Exchange Server 2007 Service  Pack 1 (SP1), this book offers a look at the significant improvements  and exciting features of SP1 and explains how they will increase  productivity. You?ll walk through planning and design, installation,  administration and management, maintenance, and more and also take a  look at SP1?s interoperability with Windows Server 2008, unified  messaging, and enhancements in mobile e-mail security and management.

From the Back Cover
Master the SP1 Release of Exchange Server 2007

Collaboration  is essential in business, and the latest SP1 improvements in Exchange  Server 2007 make collaborating, calendaring, and sharing databases  easier and safer than ever. The new version of this bestselling guide is  your one-stop resource for it all.

Step-by-step tutorials  walk you through planning, design, installation, and administration of  Exchange Server 2007 SP1. You’ll master professional techniques,  discover SP1′s new interoperability with Windows Server 2008, get up to  speed on new safeguards for mobile e-mail security, and explore  improvements to Exchange ActiveSync and Outlook Web Access.

Whether  you’re new to Exchange Server 2007 or are seeking instruction in the  latest SP1 enhancements, this solid reference has the practical content  you need to master Microsoft’s widely used groupware solution.

Coverage includes:

  • Mastering the fundamentals of messaging system administration
  • Planning, installing, and managing a new Exchange Server 2007 SP1 system or an upgrade
  • Managing e-mail recipients, address lists, e-mail limits, and storage
  • Securing messages in transit, including e-mails on mobile devices
  • Setting up solid processes for backup and disaster recovery
  • Exploring SP1′s new interoperability with Windows Server® 2008
  • Achieving Unified Messaging with Microsoft Office Communications Server 2007
  • Examining new features for Outlook® Web Access and ActiveSync®
  • Design a New Exchange Server 2007 SP1 System or Upgrade
  • Create, Deploy, and Administer a Collaborative Messaging Solution
  • Take Advantage of Enhanced SP1 Security, Including Mobile Devices
  • Log, Audit, and Monitor All Activities to Keep Out Unwanted Content
  • Learn in the Context of Real-World Scenarios and Tasks

Book Details

  • Paperback: 1032 pages
  • Publisher: Sybex; 2nd Edition (February, 2009)
  • Language: English
  • ISBN-10: 0470417331
  • ISBN-13: 978-0470417331
  • File Size: 22.8 MiB
  • Hits: 677 times

Objective-C Phrasebook - PDF

Objective C PhrasebookBook Description
Objective-C Phrasebook gives you the code  phrases you need to quickly and effectively complete your programming  projects with Objective-C, on systems including iOS and Mac OS X.

Concise and Accessible
Easy to carry and easy to use–lets you ditch all those bulky books for one portable pocket guide

Flexible and Functional
Packed with more than 100 customizable code snippets–so you can readily code elegant Objective-C in just about any situation

Table of Contents
Introduction xiv
1 The Objective-C Philosophy 1
2 An Objective-C Primer 17
3 Memory Management 59
4 Common Objective-C Patterns 75
5 Numbers 99
6 Manipulating Strings 113
7 Working with Collections 135
8 Dates and Times 157
9 Working with Property Lists 169
10 Interacting with the Environment 185
11 Key-Value Coding 195
12 Handling Errors 209
13 Accessing Directories and Files 227
14 Threads 245
15 Blocks and Grand Central 259
16 Notifications 273
17 Network Access 283
18 Debugging Objective-C 297
19 The Objective-C Runtime 309
Index 325

Book Details

  • Paperback: 352 pages
  • Publisher: Addison-Wesley Professional (February, 2011)
  • Language: English
  • ISBN-10: 0321743628
  • ISBN-13: 978-0321743626
  • File Size: 7.5 MiB
  • Hits: 2,915 times

Notes on Digital Signal Processing: Practical Recipes for Design, Analysis and Implementation - pdf

Notes on Digital Signal Processing: Practical Recipes for Design, Analysis and ImplementationBook Description
The Most Complete, Modern, and Useful Collection of DSP Recipes:  More Than 50 Practical Solutions and More than 30 Summaries of Pertinent  Mathematical Concepts for Working Engineers

Notes on Digital Signal Processing is a comprehensive, easy-to-use collection of step-by-step procedures  for designing and implementing modern DSP solutions. Leading DSP expert  and IEEE Signal Processing Magazine associate editor C. Britton  Rorabaugh goes far beyond the basic procedures found in other books  while providing the supporting explanations and mathematical materials  needed for a deeper understanding.

Rorabaugh  covers the full spectrum of challenges working engineers are likely to  encounter and delves into crucial DSP nuances discussed nowhere else.  Readers will find valuable, tested recipes for working with multiple  sampling techniques; Fourier analysis and fast Fourier transforms;  window functions; classical spectrum analysis; FIR and IIR filter  design; analog prototype filters; z-transform analysis; multirate and statistical signal processing; bandpass and quadrature techniques; and much more.

Notes on Digital Signal Processing begins with mapping diagrams that illuminate the relationships between  all topics covered in the book. Many recipes include examples  demonstrating actual applications, and most sections rely on widely used  MATLAB tools.

  • DSP fundamentals: ideal, natural, and instantaneous sampling; delta functions; physical signal reconstruction; and more
  • Fourier Analysis: Fourier series and transforms; discrete-time and discrete Fourier transforms; signal truncation; DFT leakage and resolution
  • Fast Fourier transforms: decimation in time and frequency; prime factor algorithms; and fast convolution
  • Window techniques: sinusoidal analysis; window characteristics and choices; Kaiser windows; and more
  • Classical spectrum analysis: unmodified and modified periodograms; Bartlett's and Welch's periodograms; and periodogram performance
  • FIR filters: design options; linear-phase FIR filters; periodicities; basic and Kaiser window methods; and the Parks-McClellan algorithm
  • Analog prototype filters: Laplace transforms; characterization; and Butterworth, Chebyshev, elliptic, and Bessel filters
  • z-Transform analysis: computation and transforms using partial fraction expansion
  • IIR filters: design options; impulse invariance methods; and bilinear transformation
  • Multirate signal processing: decimation and interpolation fundamentals; multistage and polyphase decimators and interpolation
  • Bandpass and quadrature techniques: bandpass sampling; wedge diagrams; complex and analytic signals; and advanced signal generation techniques
  • Statistical signal processing: parametric modeling of discrete-time signals; autoregressive signal models; fitting AR and All-Pole models; and more

Book Details

  • Hardcover: 288 pages
  • Publisher: Prentice Hall (November, 2010)
  • Language: English
  • ISBN-10: 0131583344
  • ISBN-13: 978-0131583344
  • File Size: 41.0 MiB
  • Hits: 1,123 times

3/01/2011

Using NOOKcolor and NOOK, 2nd Edition - pdf

Using NOOKcolor and NOOK, 2nd EditionBook Description
Make the most of your new B&N NOOKcolor or  NOOK ebook reader! Read books, play media, get free content, uncover  powerful, little-known features you'll love!

Do all this, and much more…

  • Find and read free books on your NOOKcolor or NOOK
  • Use B&N's unique LendMe feature to lend and borrow books
  • Play music, audiobooks, podcasts, even video
  • Automatically download full-color book covers
  • Use your NOOKcolor or NOOK to browse the web
  • Add highlights and bookmarks
  • Read B&N ebooks on your iPhone, iPad, computer, Android phone, or Blackberry
  • Add third-party apps that make your NOOK even more powerful
  • Set up your own color wallpaper or screensaver
  • Even publish your own ebooks with B&N PubIt

Book Details

  • Hardcover: 336 pages
  • Publisher: Que (January, 2011)
  • Language: English
  • ISBN-10: 0789741091
  • ISBN-13: 978-0789741097
  • File Size: 40.8 MiB
  • Hits: 499 times