![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
This textbook introduces basic and advanced embedded system topics through Arm Cortex M microcontrollers, covering programmable microcontroller usage starting from basic to advanced concepts using the STMicroelectronics Discovery development board. Designed for use in upper-level undergraduate and graduate courses on microcontrollers, microprocessor systems, and embedded systems, the book explores fundamental and advanced topics, real-time operating systems via FreeRTOS and Mbed OS, and then offers a solid grounding in digital signal processing, digital control, and digital image processing concepts - with emphasis placed on the usage of a microcontroller for these advanced topics. The book uses C language, "the" programming language for microcontrollers, C++ language, and MicroPython, which allows Python language usage on a microcontroller. Sample codes and course slides are available for readers and instructors, and a solutions manual is available to instructors. The book will also be an ideal reference for practicing engineers and electronics hobbyists who wish to become familiar with basic and advanced microcontroller concepts.
Learn the essentials of Networking and Embedded TCP/IP stacks. Part I of this comprehensive book provides a thorough explanation of Micri m's C/TCP-IP stack including its implementation and usage. Part II describes practical, working applications for embedded medical devices built on C/OS-III, C/TCP-IP and Freescale's TWR-K53N512 medical board (ARM Cortex -M4) using IAR developments tools. Each of the included examples feature hands-on working projects, which allow you to get your application running quickly, and can serve as a reference design to develop an embedded system connected to the Internet of Things. This book is the perfect complement to C/OS-III: The Real-Time Kernel for the ARM Cortex -M4 by Jean Labrosse (ISBN 978-0-9823375-2-3), as it uses the same medical application examples but connects them via TCP/IP. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a TCP/IP stack. C/TCP-IP is more than just a great learning platform. It is a full commercial-grade software package, ready to serve as the foundation for a wide range of products. Some of the key topics covered in this book are: Ethernet technology and device drivers IP connectivity Client and Server architecture Socket programming UDP and TCP performance tuning
Addressing Cybersecurity through the lens of a war-time set of varying battlefields is unique. Tying those to Zero Trust is also unique. It has that unique POV that hasn't been covered before combined with a highly credible view of and explanation of Zero Trust.
This book provides insights into contemporary issues and challenges in multi-criteria decision models. It is a useful guide for identifying, understanding and categorising multi-criteria decision models, and ultimately implementing the analysis for effective decision-making. The use of multi-criteria decision models in software reliability engineering is a relatively new field of study, and this book collects all the latest methodologies, tools and techniques in one single volume. It covers model selection, assessment, resource allocation, release management, up-grade planning, open-source systems, bug tracking system management and defect prediction. Multi-Criteria Decision Models in Software Reliability: Methods and Applications will cater to researchers, academicians, post-graduate students, software developers, software reliability engineers and IT managers.
The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.
Unique selling point: The Internet of Things (IoT), AI, and analytics are studied on how they can combat pandemics Core audience: Researchers and medical informatics professionals Place in the market: Academic reference title on timely topic also appealing to professionals
The idea behind this book is to simplify the journey of aspiring readers and researchers to understand the convergence of Big Data with the Cloud. This book presents the latest information on the adaptation and implementation of Big Data technologies in various cloud domains and Industry 4.0. Synergistic Interaction of Big Data with Cloud Computing for Industry 4.0 discusses how to develop adaptive, robust, scalable, and reliable applications that can be used in solutions for day-to-day problems. It focuses on the two frontiers - Big Data and Cloud Computing - and reviews the advantages and consequences of utilizing Cloud Computing to tackle Big Data issues within the manufacturing and production sector as part of Industry 4.0. The book unites some of the top Big Data experts throughout the world who contribute their knowledge and expertise on the different aspects, approaches, and concepts related to new technologies and novel findings. Based on the latest technologies, the book offers case studies and covers the major challenges, issues, and advances in Big Data and Cloud Computing for Industry 4.0. By exploring the basic and high-level concepts, this book serves as a guide for those in the industry, while also helping beginners and more advanced learners understand both basic and more complex aspects of the synergy between Big Data and Cloud Computing.
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.
Unique selling point: A project management book that focuses on managing projects in business Core audience: Project and business managers Place in the market: Professional book that can be used for continuing education
Operation Research methods are often used in every field of modern life like industry, economy and medicine. The authors have compiled of the latest advancements in these methods in this volume comprising some of what is considered the best collection of these new approaches. These can be counted as a direct shortcut to what you may search for. This book provides useful applications of the new developments in OR written by leading scientists from some international universities. Another volume about exciting applications of Operations Research is planned in the near future. We hope you enjoy and benefit from this series!
Provides a wide snapshot of building knowledge-based systems, inconsistency measures, methods for handling consistency, and methods for integrating knowledge bases. Provides the mathematical background to solve problems of restoring consistency and problems of integrating probabilistic knowledge bases in the integrating process. The research results presented in the book can be applied in decision support systems, semantic web systems, multimedia information retrieval systems, medical imaging systems, cooperative information systems, and more.
1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses
The papers in this volume are based on lectures given at the IMA workshop on the Parallel Solution of PDE during June 9-13, 1997. The numerical solution of partial differential equations has been of major importance to the development of many technologies and has been the target of much of the development of parallel computer hardware and software. Parallel computer offers the promise of greatly increased performance and the routine calculation of previously intractable problems.This volume contains papers on the development and assessment of new approximation and solution techniques that can take advantage of parallel computers. It will be of interest to applied mathematicians, computer scientists, and engineers concerned with investigating the state of the art and future directions in numerical computing.Topics include domain decomposition methods, parallel multi-grid methods, front tracking methods, sparse matrix techniques, adaptive methods, fictitious domain methods, and novel time and space discretizations. Applications discussed include fluid dynamics, radiative transfer, solid mechanics, and semiconductor simulation.
This is the book that will teach programmers to write faster, more efficient code for parallel processors. The reader is introduced to a vast array of procedures and paradigms on which actual coding may be based. Examples and real-life simulations using these devices are presented in C and FORTRAN. The ease in writing code and the satisfaction of running high-performance programs will reward programmers who can learn the tools of presented here.
Become your own iPhone guru Your first time using an iPhone comes with a lot of excitement. It can also be a bit intimidating. After all, it's jam-packed with apps and cool features, but there's no handy manual to help you unravel all the device's mysteries.iPhone For Seniors For Dummies can help you take your first iPhone steps and save you the trouble of finding someone to answer your questions. It features the tasks that you most likely want to do--like chatting on FaceTime, shooting videos and photos, and connecting on social media. It also introduces you to the App store so that you can break away from the iPhone's pre-installed apps and really personalize your shiny gadget. The easy-to-follow steps in this book with its accompanying illustrations help you manage, personalize, and communicate using your iPhone. You discover how to do everything from shopping online and organizing appointments to taking and sharing pictures and downloading and listening to your favorite music. It provides help with brand new iPhone models as well as older devices, including how to upgrade older iPhones with the latest software.Topics include how to: Swipe, tap, and scroll through the iPhone interface Capture memorable photos and home videos Find apps in the App store Customize your iPhone's accessibility features Bypass the keyboard and use Siri Read books and listen to music Keep your iPhone working If you're new to the iPhone or just need a reminder on how to do a few things, iPhone For Seniors For Dummies gives you all the tips and tricks you need. You'll soon be swiping and tapping its screen as if you've been doing it forever.
Delivers the hard information the reader needs to assess network options for the 1990s. It describes how networks are configured, what your options are in the multivendor environment, and how you can get the most efficient and effective network solutions with limited communications budgets.
Is your enterprise's strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so...you're not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn't work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It's a management issue, a leadership issue, a strategy issue: It's a "must have right"...a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed. After years of distinguished work as a corporate executive, board member, author, consultant, and expert witness in the field of risk management and cybersecurity, David X Martin is THE pioneering thought leader in the new field of CyRMSM. Martin has created an entirely new paradigm that approaches security as a business problem and aligns it with business needs. He is the go-to guy on this vitally important issue. In this new book, Martin shares his experience and expertise to help you navigate today's dangerous cybersecurity terrain, and take proactive steps to prepare your company-and yourself -to survive, thrive, and keep your data (and your reputation) secure.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.
Are you a programmer who wants to get started quickly in a new language? This book is for you. Are you a novice who wants to learn to program? This book is not for you. Are you a Python programmer who needs encyclopaedic information? This book is not for you. Like any mainstream language, Python has loops, if statements, assignment statements, functions, etc. I'll show you what these look like in Python. I won't waste your time telling you what they're good for. Python has features you may not be familiar with--iterators, list comprehensions, maybe even dictionaries. I'll spend more time on these. I'll cover some of the library functions I found most immediately useful, and tell you where to find more. In short, this book will help you hit the ground running. Next week, you'll be ready to buy that Python encyclopaedia.
This book introduces a new scheduler to fairly and efficiently distribute system resources to many users of varying usage patterns compete for them in large shared computing environments. The Rawlsian Fair scheduler developed for this effort is shown to boost performance while reducing delay in high performance computing workloads of certain types including the following four types examined in this book: i. Class A - similar but complementary workloads ii. Class B - similar but steady vs intermittent workloads iii. Class C - Large vs small workloads iv. Class D - Large vs noise-like workloads This new scheduler achieves short-term fairness for small timescale demanding rapid response to varying workloads and usage profiles. Rawlsian Fair scheduler is shown to consistently benefit workload Classes C and D while it only benefits Classes A and B workloads where they become disproportionate as the number of users increases. A simulation framework, dSim, simulates the new Rawlsian Fair scheduling mechanism. The dSim helps achieve instantaneous fairness in High Performance Computing environments, effective utilization of computing resources, and user satisfaction through the Rawlsian Fair scheduler.
Align IT projects strategically to achieve business goals and objectives Project management and leadership to seize opportunities and manage threats Build and follow a roadmap to implement strategic governance Assess and improve project management capabilities Includes templates and case studies
With the rapid penetration of technology in varied application domains, the existing cities are getting connected more seamlessly. Cities becomes smart by inducing ICT in the classical city infrastructure for its management. According to McKenzie Report, about 68% of the world population will migrate towards urban settlements in near future. This migration is largely because of the improved Quality of Life (QoL) and livelihood in urban settlements. In the light of urbanization, climate change, democratic flaws, and rising urban welfare expenditures, smart cities have emerged as an important approach for society's future development. Smart cities have achieved enhanced QoL by giving smart information to people regarding healthcare, transportation, smart parking, smart traffic structure, smart home, smart agronomy, community security etc. Typically, in smart cities data is sensed by the sensor devices and provided to end users for further use. The sensitive data is transferred with the help of internet creating higher chances for the adversaries to breach the data. Considering the privacy and security as the area of prime focus, this book covers the most prominent security vulnerabilities associated with varied application areas like healthcare, manufacturing, transportation, education and agriculture etc. Furthermore, the massive amount of data being generated through ubiquitous sensors placed across the smart cities needs to be handled in an effective, efficient, secured and privacy preserved manner. Since a typical smart city ecosystem is data driven, it is imperative to manage this data in an optimal manner. Enabling technologies like Internet of Things (IoT), Natural Language Processing (NLP), Blockchain Technology, Deep Learning, Machine Learning, Computer vision, Big Data Analytics, Next Generation Networks and Software Defined Networks (SDN) provide exemplary benefits if they are integrated in the classical city ecosystem in an effective manner. The application of Artificial Intelligence (AI) is expanding across many domains in the smart city, such as infrastructure, transportation, environmental protection, power and energy, privacy and security, governance, data management, healthcare, and more. AI has the potential to improve human health, prosperity, and happiness by reducing our reliance on manual labor and accelerating our progress in the sciences and technologies. NLP is an extensive domain of AI and is used in collaboration with machine learning and deep learning algorithms for clinical informatics and data processing. In modern smart cities, blockchain provides a complete framework that controls the city operations and ensures that they are managed as effectively as possible. Besides having an impact on our daily lives, it also facilitates many areas of city management.
Internet of Things and the Law: Legal Strategies for Consumer-Centric Smart Technologies is the most comprehensive and up-to-date analysis of the legal issues in the Internet of Things (IoT). For decades, the decreasing importance of tangible wealth and power - and the increasing significance of their disembodied counterparts - has been the subject of much legal research. For some time now, legal scholars have grappled with how laws drafted for tangible property and predigital 'offline' technologies can cope with dematerialisation, digitalisation, and the internet. As dematerialisation continues, this book aims to illuminate the opposite movement: rematerialisation, namely, the return of data, knowledge, and power within a physical 'smart' world. This development frames the book's central question: can the law steer rematerialisation in a human-centric and socially just direction? To answer it, the book focuses on the IoT, the sociotechnological phenomenon that is primarily responsible for this shift. After a thorough analysis of how existing laws can be interpreted to empower IoT end users, Noto La Diega leaves us with the fundamental question of what happens when the law fails us and concludes with a call for collective resistance against 'smart' capitalism. |
![]() ![]() You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,531
Discovery Miles 15 310
Inclusive Radio Communications for 5G…
Claude Oestges, Francois Quitin
Paperback
R2,996
Discovery Miles 29 960
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues
Paperback
R4,844
Discovery Miles 48 440
|