Total Books: 1009 - 1026 / 3461

Total Books: 1009 - 1026 / 3461

img

C++ /CLI : The Visual C++ Language for .NET

C++/CLI: The Visual C++ Language for .NET introduces Microsoft's extensions to the C++ syntax that allow you to target the common language runtime the key to the heart of the .NET 3.0 platform. In 12 no-fluff chapters, Microsoft insider Gordon Hogenson takes you into the core of the C++/CLI language and explains both how the language elements work and how Microsoft intends them to be used.

2007 English Computer Science
img

C# 10 in a Nutshell : The Definitive Reference

When you have questions about C# 10.0 or .NET 6, this guide has the answers you need. C# is a language of unusual flexibility and breadth, but with its continual growth, there's so much more to learn. In the tradition of O'Reilly's Nutshell guides, this thoroughly updated edition is simply the best one-volume reference to the C# language available today. Organized around concepts and use cases, this comprehensive and complete reference provides intermediate and advanced programmers with a concise map of C# and .NET that also plumbs significant depths

2022 English Computer Science
img

Business process management : Concepts, languages, architectures

Business process management is usually treated from two different perspectives: business administration and computer science. While business administration professionals tend to consider information technology as a subordinate aspect for experts to handle, by contrast computer scientists often consider business goals and organizational regulations as terms that do not deserve much thought but require the appropriate level of abstraction.This textbook is ideally suited for classes on business process management, information systems architecture, and workflow management. It is also valuable for project managers and IT professionals working in business process management.

2007 English Computer Science
img

Building the Infrastructure for Cloud Security : A Solutions view

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

2014 English Computer Science
img

Building Spring 2 Enterprise Applications

This book covers the first steps of using Spring while discussing the relevant technologies that Spring can be integrated with, what to be aware of, and how working with Spring makes them easier to use. Focuses on the most useful features of Spring, including persistence and transaction management as well as the complete Spring web tools portfolio. Introduces three-tier application design and how to test these designs.

2007 English Computer Science
img

Building Online Communities with Drupal, phpBB, and WordPress

Content management, blogs, and online forums are among the most significant online trends today, and Drupal, phpBB, and WordPress are three of the most popular open source applications facilitating these trends. Drupal is a full content management system that allows you to create any type of website you desire, from an e-commerce to a community-based site. phpBB enables you to set up a bulletin board or forum. And WordPress is the software of choice for the exploding blog community. All three technologies are based on PHP and MySQL.

2006 English Computer Science
img

Building better interfaces for remote sutonomous systems : An introduction for systems engineers

This book provides foundational knowledge for designing autonomous, asynchronous systems and explains aspects of users relevant to designing for these systems, introduces principles for user-centered design, and prepares readers for more advanced and specific readings.

2021 English Computer Science
img

Building an Enterprise Architecture Practice : Tools, Tips, Best Practices, Ready-to-Use Insights

This book clearly describes how to establish an architecture practice that delivers value for an organization. The authors demonstrate a wealth of experience and a deep understanding of the multifaceted nature of this challenging task and they provide sound advice on how to avoid the many pitfalls that may be encountered along the way. Building an Enterprise Architecture Practice provides practical advice on how to develop your enterprise architecture practice.

2006 English Computer Science
img

Building a Data Warehouse : With Examples in SQL Server

The book is organized as follows. In the beginning of this book (chapters 1 through 6), you learn how to build a data warehouse, for example, defining the architecture, understanding the methodology, gathering the requirements, designing the data models, and creating the databases. Then in chapters 7 through 10, you learn how to populate the data warehouse, for example, extracting from source systems, loading the data stores, maintaining data quality, and utilizing the metadata. After you populate the data warehouse, in chapters 11 through 15, you explore how to present data to users using reports and multidimensional databases and how to use the data in the data warehouse for business intelligence, customer relationship management, and other purposes. Chapters 16 and 17 wrap up the book: After you have built your data warehouse, before it can be released to production, you need to test it thoroughly. After your application is in production, you need to understand how to administer data warehouse operation.

2008 English Computer Science
img

Brain and Human Body Modeling : Computational Human Modeling at EMBC 2018

This book describes modern applications of computational human modeling with specific emphasis in the areas of neurology and neuroelectromagnetics, depression and cancer treatments, radio-frequency studies and wireless communications. Special consideration is also given to the use of human modeling to the computational assessment of relevant regulatory and safety requirements. Readers working on applications that may expose human subjects to electromagnetic radiation will benefit from this book’s coverage of the latest developments in computational modelling and human phantom development to assess a given technology’s safety and efficacy in a timely manner.

2019 English Computer Science
img

Boundary value problems, Weyl Functions, and differential operators

This book presents a comprehensive survey of modern operator techniques for boundary value problems and spectral theory, employing abstract boundary mappings and Weyl functions.

2020 English Computer Science
img

Boundary Representation Modelling Techniques

Boundary representation is the principle solid modelling method used in modern CAD/CAM systems. There have been a long series of developments on which currently available systems are based, full details of which are only partially known. Ian Stroud’s thorough coverage of these developments puts this technology in perspective. Ian Stroud started working with boundary representation solid modelling in 1977. Since then he has researched and is researching a wide variety of topics in and around this field. The information in the book comes from the results of this research.

2006 English Computer Science
img

Botnet Detection : Countering the Largest Security Threat

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based on the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets. It provides botnet detection techniques and response strategies, as well as the latest results from leading academic, industry and government researchers.

2008 English Computer Science
img

Body Sensor Networks

While the problems of long-term stability and biocompatibility are being addressed, several promising prototypes are starting to emerge for managing patients with acute diabetes, for treatment of epilepsy and other debilitating neurological disorders and for monitoring of patients with chronic cardiac diseases. Despite the technological developments in sensing and monitoring devices, issues related to system integration, sensor miniaturization, low-power sensor interface circuitry design, wireless telemetric links and signal processing still have to be investigated.

2006 English Computer Science
img

Blog Design Solutions

In this book, a team of renowned web designers take you through the ins and outs of putting together great blogs. They waste no time harking on about the philosophy of blogs, or the community behind them. Instead, they get straight to the practical details, showing how to set up a basic blog in some of the world's most popular blogging engines Movable Type, ExpressionEngine, WordPress, and Textpattern. With your blog set up, they then show you how to build great looking, usable layouts for your blog. The last chapter even shows you how to build your very own PHP/MySQL-based blog engine!

2006 English Computer Science
img

Blockchains For Network Security : Principles, technologies and applications

Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms. Over the past few years, blockchain technology has been used in a variety of network interaction systems such as smart contracts, public services, Internet of Things (IoT), social networks, reputation systems and security and financial services. With its widespread adoption, there has been increased focus on utilizing blockchain technologies to address network security concerns and vulnerabilities as well as understanding real-world security implications.

2020 English Computer Science
img

Blockchain : Empowering Secure Data Sharing

The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, allowing readers to understand the importance of data sharing security based on the blockchain framework, as well as the threats to security and privacy. Further, by presenting specific data sharing case studies, it offers insights into solving data security sharing problems in more practical fields. The book is intended for readers with a basic understanding of the blockchain infrastructure, consensus mechanisms, smart contracts, secure multiparty computing, homomorphic encryption and image retrieval technologies.

2020 English Computer Science
img

Biomimetic neural learning for intelligent robots : Intelligent systems, cognitive robotics, and neuroscience

This book presents research performed as part of the EU project on biomimeticmultimodal learning in a mirror neuron-based robot (MirrorBot) and contribu-tions presented at the International AI-Workshop on NeuroBotics. The over-all aim of the book is to present a broad spectrum of current research intobiomimetic neural learning for intelligent autonomous robots. In this book we show the development of newtechniques using cell assemblies, associative neural networks, and Hebbian-typelearning in order to associate vision, language and motor concepts. We havedeveloped biomimetic multimodal learning and language instruction in a robotto investigate the task of searching for objects. As well as the research performedin this area for the MirrorBot project, the second part of this book incorporatessignificant contributions from other research in the field of biomimetic robotics.This second part of the book concentrates on the progress made in neuroscienceinspired robotic learning approaches (in short: NeuroBotics). We hope that this book stimulates and encourages new research in this in-teresting and dynamic area.

2005 English Computer Science

Total Books: 1009 - 1026 / 3461