![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems
" Biometric Technologies and Verification Systems" is organized
into nine parts composed of 30 chapters, including an extensive
glossary of biometric terms and acronyms. It discusses the current
state-of-the-art in biometric verification/authentication,
identification and system design principles. It also provides a
step-by-step discussion of how biometrics works; how biometric data
in human beings can be collected and analyzed in a number of ways;
how biometrics are currently being used as a method of personal
identification in which people are recognized by their own unique
corporal or behavioral characteristics; and how to create detailed
menus for designing a biometric verification system.
This second edition is not only a thorough update of the first
edition, it is also a marriage of the best-known RISC
architecture--MIPS--with the best-known open-source OS--Linux. The
first part of the book begins with MIPS design principles and then
describes the MIPS instruction set and programmers resources. It
uses the MIPS32 standard as a baseline (the 1st edition used the
R3000) from which to compare all other versions of the architecture
and assumes that MIPS64 is the main option. The second part is a
significant change from the first edition. It provides concrete
examples of operating system low level code, by using Linux as the
example operating system. It describes how Linux is built on the
foundations the MIPS hardware provides and summarizes the Linux
application environment, describing the libraries, kernel
device-drivers and CPU-specific code. It then digs deep into
application code and library support, protection and memory
management, interrupts in the Linux kernel and multiprocessor
Linux.
CD and DVD Forensics will take the reader through all facets of
handling, examining, and processing CD and DVD evidence for
computer forensics. At a time where data forensics is becoming a
major part of law enforcement and prosecution in the public sector,
and corporate and system security in the private sector, the
interest in this subject has just begun to blossom.
Customizable processors have been described as the next natural
step in the evolution of the microprocessor business: a step in the
life of a new technology where top performance alone is no longer
sufficient to guarantee market success. Other factors become
fundamental, such as time to market, convenience, energy
efficiency, and ease of customization.
The design of today's semiconductor chips for various applications,
such as telecommunications, poses various challenges due to the
complexity of these systems. These highly complex systems-on-chips
demand new approaches to connect and manage the communication
between on-chip processing and storage components and networks on
chips (NoCs) provide a powerful solution.
Explores the full range of issues - moral, ethical, social, legal, and technological - involved in developing firm controls and best practices to secure the ever growing information infrastructure upon which societies and individuals depend.
Over 95% of computers around the world are running at least one
Microsoft product. Microsoft Windows Software Update Service is
designed to provide patches and updates to every one of these
computers.
Due to a rapidly growing number of devices and communications, cloud computing has begun to fall behind on its ability to adequately process today's technology. Additionally, companies have begun to look for solutions that would help reduce their infrastructure costs and improve profitability. Fog computing, a paradigm that extends cloud computing and services to the edge of the network, has presented itself as a viable solution and cost-saving method. However, before businesses can implement this new method, concerns regarding its security, privacy, availability, and data protection must be addressed. Advancing Consumer-Centric Fog Computing Architectures is a collection of innovative research on the methods and applications of fog computing in technological, business, and organizational dimensions. Thoroughly examining fog computing with respect to issues of management, trust and privacy, governance, and interoperability, this publication highlights a range of topics including access control mechanism, data confidentiality, and service-oriented architecture. This book is ideally designed for academicians, researchers, software developers, IT professionals, policymakers, technology designers, graduate-level students, managers, and business owners.
This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering.
The sexy, elegant design of the Apple PowerBook combined with the
Unix-like OS X operating system based on FreeBSD, have once again
made OS X the Apple of every hacker s eye. In this unique and
engaging book covering the brand new OS X 10.4 Tiger, the world s
foremost true hackers unleash the power of OS X for everything form
cutting edge research and development to just plain old fun.
This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities
Almost all of the messages that are received by the cerebral cortex
from the environment or from the body's internal receptors come
through the thalamus and much current thought about perceptual
processing is based on sensory pathways that relay in the thalamus.
This volume focuses on three major areas: the role of
thalamocortical communication in cognition and attention; the role
of the thalamus in communication between cortical areas; the
hypothesis that much or all of the information relayed by thalamus,
even to classical, pure "sensory" areas of cortex, represents a
corollary message being sent simultaneously to motor centers. It
presents a broad overview of important recent advances in these
areas.
One of the biggest challenges in chip and system design is
determining whether the hardware works correctly. That is the job
of functional verification engineers and they are the audience for
this comprehensive text from three top industry professionals.
XML in Data Management is for IT managers and technical staff
involved in the creation, administration, or maintenance of a data
management infrastructure that includes XML. For most IT staff, XML
is either just a buzzword that is ignored or a silver bullet to be
used in every nook and cranny of their organization. The truth is
in between the two. This book provides the guidance necessary for
data managers to make measured decisions about XML within their
organizations. Readers will understand the uses of XML, its
component architecture, its strategic implications, and how these
apply to data management.
Enterprise integration is a broad activity that involves solving a range of issues relating to business process definition, common data standards, architectural compatibility, technical interoperability, and organizational alignment. Enterprise Architecture and Integration: Methods, Implementation, and Technologies provides a detailed analysis of the important strategies for integrating IT systems into fields such as e-business and customer-relationship management. This Premier Reference Source supplies readers with a comprehensive survey of existing enterprise architecture and integration approaches, and presents case studies that illustrate best practices. It takes a holistic view of enterprise integration, describing innovative methods, tools, and architectures with which organizations can systematically achieve enterprise integration.
The greatly expanded and updated 3rd edition of this textbook offers the reader a comprehensive introduction to the concepts of logic functions and equations and their applications across computer science and engineering. The authors' approach emphasizes a thorough understanding of the fundamental principles as well as numerical and computer-based solution methods. The book provides insight into applications across propositional logic, binary arithmetic, coding, cryptography, complexity, logic design, and artificial intelligence. Updated throughout, some major additions for the 3rd edition include: a new chapter about the concepts contributing to the power of XBOOLE; a new chapter that introduces into the application of the XBOOLE-Monitor XBM 2; many tasks that support the readers in amplifying the learned content at the end of the chapters; solutions of a large subset of these tasks to confirm learning success; challenging tasks that need the power of the XBOOLE software for their solution. The XBOOLE-monitor XBM 2 software is used to solve the exercises; in this way the time-consuming and error-prone manipulation on the bit level is moved to an ordinary PC, more realistic tasks can be solved, and the challenges of thinking about algorithms leads to a higher level of education.
The past few years have seen a major change in computing systems, as growing data volumes and stalling processor speeds require more and more applications to scale out to clusters. Today, a myriad data sources, from the Internet to business operations to scientific instruments, produce large and valuable data streams. However, the processing capabilities of single machines have not kept up with the size of data. As a result, organizations increasingly need to scale out their computations over clusters. At the same time, the speed and sophistication required of data processing have grown. In addition to simple queries, complex algorithms like machine learning and graph analysis are becoming common. And in addition to batch processing, streaming analysis of real-time data is required to let organizations take timely action. Future computing platforms will need to not only scale out traditional workloads, but support these new applications too. This book, a revised version of the 2014 ACM Dissertation Award winning dissertation, proposes an architecture for cluster computing systems that can tackle emerging data processing workloads at scale. Whereas early cluster computing systems, like MapReduce, handled batch processing, our architecture also enables streaming and interactive queries, while keeping MapReduce's scalability and fault tolerance. And whereas most deployed systems only support simple one-pass computations (e.g., SQL queries), ours also extends to the multi-pass algorithms required for complex analytics like machine learning. Finally, unlike the specialized systems proposed for some of these workloads, our architecture allows these computations to be combined, enabling rich new applications that intermix, for example, streaming and batch processing. We achieve these results through a simple extension to MapReduce that adds primitives for data sharing, called Resilient Distributed Datasets (RDDs). We show that this is enough to capture a wide range of workloads. We implement RDDs in the open source Spark system, which we evaluate using synthetic and real workloads. Spark matches or exceeds the performance of specialized systems in many domains, while offering stronger fault tolerance properties and allowing these workloads to be combined. Finally, we examine the generality of RDDs from both a theoretical modeling perspective and a systems perspective. This version of the dissertation makes corrections throughout the text and adds a new section on the evolution of Apache Spark in industry since 2014. In addition, editing, formatting, and links for the references have been added.
Originally designed for interpersonal communication, today mobile devices are capable of connecting their users to a wide variety of Internet-enabled services and applications. Multimodality in Mobile Computing and Mobile Devices: Methods for Adaptable Usability explores a variety of perspectives on multimodal user interface design, describes a variety of novel multimodal applications, and provides real-life experience reports. Containing research from leading international experts, this innovative publication presents core concepts that define multi-modal, multi-channel, and multi-device interactions and their role in mobile, pervasive, and ubiquitous computing.
This book covers two main topics: First, novel fast and flexible simulation techniques for modern heterogeneous NoC-based multi-core architectures. These are implemented in the full-system simulator called InvadeSIM and designed to study the dynamic behavior of hundreds of parallel application programs running on such architectures while competing for resources. Second, a novel actor-oriented programming library called ActorX10, which allows to formally model parallel streaming applications by actor graphs and to analyze predictable execution behavior as part of so-called hybrid mapping approaches, which are used to guarantee real-time requirements of such applications at design time independent from dynamic workloads by a combination of static analysis and dynamic embedding.
Multimedia has evolved with the introduction of interaction, allowing and encouraging users to control and navigate through content. Experimental multimedia is a new human-computer communication method that allows for the reinvention and redevelopment of user content. Experimental Multimedia Systems for Interactivity and Strategic Innovation presents the next evolutionary step of multimedia where interactivity meets targeted creativity and experimentation. In providing the basic framework for experimental multimedia through case studies that allow the reader to appreciate the design of multimedia systems, this publication's audience extends beyond new media artists to scientists, publishers, and developers who wish to extend their system designs to offer adaptive capabilities combined with multimedia content and dynamic interaction. This publication presents a collection of carefully selected theoretical and applied research chapters with a focus on matters including, but not limited to, aesthetics in publishing, e-health systems, artificial intelligence, augmented reality, human-computer interaction, interactive multimedia, and new media curation. |
You may like...
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,281
Discovery Miles 22 810
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
|