![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming
Getting SSL to actually work for most has been a very difficult assignment and most opt for an expensive commercial package, and end up having the same difficult challenge regardless only now you have a vendor and purchase orders to deal with. This book is for the developer who needs to integrate SSL communication with a new application or an existing application without the massive undertaking or expense and for those that want to get up and running and worry about the details later. To that end the OpenSSL project is perfect for that use-of course it wasn't easy getting an open source project to actually work, but this book cuts right through the garbage and gives you the code you can use today without hassel. So, if you don't know what RSA is and have no idea about how an existing TCP/IP connection can have SSL on top of it, then don't worry, this book is for you and though the author doesn't support it, you can also use the understanding of SSL to attack or even counter-attack encryption. It starts with downloading the OpenSSL library, walks you through setting up your own certificates including Authenticode and then shows you the code in both C++ and Delphi. This book, though it walks you through the use of SSL, is NOT a beginners guide and is not for the feint of heart-this book demonstrates one of the more difficult aspects to software engineering and indeed mathematics so enjoy what took nearly 4 years to complete and most of all have some fun.
This book is the first in aseries on novellow power design architectures, methods and design practices. It results from of a large European project started in 1997, whose goal is to promote the further development and the faster and wider industrial use of advanced design methods for reducing the power consumption of electronic systems. Low power design became crucial with the wide spread of portable information and cornrnunication terminals, where a small battery has to last for a long period. High performance electronics, in addition, suffers from a permanent increase of the dissipated power per square millimetre of silicon, due to the increasing eIock-rates, which causes cooling and reliability problems or otherwise limits the performance. The European Union's Information Technologies Programme 'Esprit' did there fore launch a 'Pilot action for Low Power Design', wh ich eventually grew to 19 R&D projects and one coordination project, with an overall budget of 14 million Euro. It is meanwhile known as European Low Power Initiative for Electronic System Design (ESD-LPD) and will be completed by the end of 2001. It involves 30 major Euro pean companies and 20 well-known institutes. The R&D projects aims to develop or demonstrate new design methods for power reduction, while the coordination project takes care that the methods, experiences and results are properly documented and pub licised."
This book discusses smart, agile software development methods and their applications for enterprise crisis management, presenting a systematic approach that promotes agility and crisis management in software engineering. The key finding is that these crises are caused by both technology-based and human-related factors. Being mission-critical, human-related issues are often neglected. To manage the crises, the book suggests an efficient agile methodology including a set of models, methods, patterns, practices and tools. Together, these make a survival toolkit for large-scale software development in crises. Further, the book analyses lifecycles and methodologies focusing on their impact on the project timeline and budget, and incorporates a set of industry-based patterns, practices and case studies, combining academic concepts and practices of software engineering.
"Agile Development and Business Goals" describes a unique,
state-of-the-art methodology that aligns the critical but often
"silo-ed" software development process with core company goals.
Eschewing long-winded "agile philosophy" in favor of a formally
prioritized process, this book serves as a distilled learning guide
for managing technical resources in a manner that directly boosts
your bottom line. Build the teams, define the roles, acquire the
tools, and deliver your world-class software on time and on
budget. * Explains how to employ automation in your development process to improve your company s profitability. * Introduces a compensation structure that incents your technical talent to deliver measurable results on a predictable basis. * Provides real-world solutions - questions to ask when hiring or which build server software to consider, for example - instead of theoretical discussions.
The book provides readers with a snapshot of the state of the art in the field of nature-inspired computing and its application in optimization. The approach is mainly practice-oriented: each bio-inspired technique or algorithm is introduced together with one of its possible applications. Applications cover a wide range of real-world optimization problems: from feature selection and image enhancement to scheduling and dynamic resource management, from wireless sensor networks and wiring network diagnosis to sports training planning and gene expression, from topology control and morphological filters to nutritional meal design and antenna array design. There are a few theoretical chapters comparing different existing techniques, exploring the advantages of nature-inspired computing over other methods, and investigating the mixing time of genetic algorithms. The book also introduces a wide range of algorithms, including the ant colony optimization, the bat algorithm, genetic algorithms, the collision-based optimization algorithm, the flower pollination algorithm, multi-agent systems and particle swarm optimization. This timely book is intended as a practice-oriented reference guide for students, researchers and professionals.
Protocols that remain zero-knowledge when many instances are executed concurrently are called concurrent zero-knowledge, and this book is devoted to their study. The book presents constructions of concurrent zero-knowledge protocols, along with proofs of security. It also shows why "traditional" proof techniques (i.e., black-box simulation) are not suitable for establishing the concurrent zero-knowledge property of "message-efficient" protocols.
Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computer Science, Software Engineering, Computer Engineering, and Systems Engineering and Sciences. Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes selected papers form the conference proceedings of the International Conference on Systems, Computing Sciences and Software Engineering (SCSS 2007) which was part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2007).
An increasing number of systems are exploiting mixed reality but to date there are no systematic methods, techniques or guidelines for the development of such systems. In bringing together contributions on a broad range of mixed reality development issues this book provides a sound theoretical foundation for a disciplined approach to mixed reality engineering. Divided into three parts: interaction design, software design and implementation, the first section covers generic and specific mixed reality design elements and provides an overview of the design method; Part 2 addresses technical solutions for interaction techniques, development tools and a global view of the mixed reality software development process. The final section contains detailed case studies to highlight the application of mixed reality in a variety of fields including aviation, architecture, emergency management, games, and healthcare.
In recent years global optimization has found applications in many interesting areas of science and technology including molecular biology, chemical equilibrium problems, medical imaging and networks. The collection of papers in this book indicates the diverse applicability of global optimization. Furthermore, various algorithmic, theoretical developments and computational studies are presented. Audience: All researchers and students working in mathematical programming.
This book gathers high-quality research articles and reviews that reflect the latest advances in the smart network-inspired paradigm and address current issues in IoT applications as well as other emerging areas. Featuring work from both academic and industry researchers, the book provides a concise overview of the current state of the art and highlights some of the most promising and exciting new ideas and techniques. Accordingly, it offers a valuable resource for senior undergraduate and graduate students, researchers, policymakers, and IT professionals and providers working in areas that call for state-of-the-art networks and IoT applications.
Software product lines represent perhaps the most exciting paradigm shift in software development since the advent of high-level programming languages. Nowhere else in software engineering have we seen such breathtaking improvements in cost, quality, time to market, and developer productivity, often registering in the order-of-magnitude range. Here, the authors combine academic research results with real-world industrial experiences, thus presenting a broad view on product line engineering so that both managers and technical specialists will benefit from exposure to this work. They capture the wealth of knowledge that eight companies have gathered during the introduction of the software product line engineering approach in their daily practice.
Dispelling much of the folklore surrounding software maintenance, Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 real-world maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do their work and instructs on the methods required to achieve success. Donald J. Reifer an award winner for his contributions to the field of software engineering and whose experience includes managing the DoD Software Initiatives Office provides step-by-step guidance on how to structure the job to complete the work related to the task. Covering all phases of maintenance up to software retirement, he identifies the resources required to ready support system operation during transition and turnover, details best practices for establishing a maintenance infrastructure, and spells out a wealth of best practices aimed at maintaining and sustaining the product once it is deployed. This book tells you how to manage today 's ever-evolving maintenance environment so you can build the foundation for sound maintenance work. It explains how to create a robust management infrastructure, ensure proper resources are available, establish a user support structure, and conduct a meaningful measurement program. Filled with real-world examples and a detailed case study that is threaded across chapters, it provides you with the understanding and tools to plan for a major upgrade and determine the best time to retire your current software systems.
Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operation. It supplies documented test cases for those requirements as well as best practices for testing nonfunctional requirements for improved information assurance. This resource-rich book includes:
Offering ground-level, already-developed software nonfunctional requirements and corresponding test cases and methods, this book will help to ensure that your software meets its nonfunctional requirements for security and resilience. The accompanying CD filled with helpful checklists and reusable documentation provides you with the tools needed to integrate security into the requirements analysis, design, and testing phases of your software development lifecycle. Some Praise for the Book: This book pulls together the state of the art in thinking about
this important issue in a holistic way with several examples. It
takes you through the entire lifecycle from conception to
implementation ... . ...provides the reader with the tools necessary to jump-start
and mature security within the software development lifecycle
(SDLC).
The architectural concept of a memory hierarchy has been immensely successful, making possible today's spectacular pace of technology evolution in both the volume of data and the speed of data access. Its success is difficult to understand, however, when examined within the traditional "memoryless" framework of performance analysis. The memoryless' framework cannot properly reflect a memory hierarchy's ability to take advantage of patterns of data use that are transient. The Fractal Structure of Data Reference: Applications to the Memory Hierarchy both introduces, and justifies empirically, an alternative modeling framework in which arrivals are driven by a statistically self-similar underlying process, and are transient in nature. The substance of this book comes from the ability of the model to impose a mathematically tractable structure on important problems involving the operation and performance of a memory hierarchy. It describes events as they play out at a wide range of time scales, from the operation of file buffers and storage control cache, to a statistical view of entire disk storage applications. Striking insights are obtained about how memory hierarchies work, and how to exploit them to best advantage. The emphasis is on the practical application of such results. The Fractal Structure of Data Reference: Applications to the Memory Hierarchy will be of interest to professionals working in the area of applied computer performance and capacity planning, particularly those with a focus on disk storage. The book is also an excellent reference for those interested in database and data structure research.
The general theme of this conference is notations, methods, and tool support for the calculation of programs from specifications. The purpose of this working conference is to present the results of ongoing research, descriptions of existing and proposed systems, and applications to the production of practical software.
This collection of papers is dedicated to the memory of Gaetano Fichera, a great mathematician and also a good friend to the editors. Regrettably it took an unusual amount of time to bring this collection out. This was primarily due to the fact that the main editor who had collected all of the materials, for this volume, P. D. Panagiotopoulos, died unexpectedly during the period when we were editing the manuscript. The other two editors in appreciation of Panagiotopoulos' contribution to this field, believe it is therefore fitting that this collection be dedicated to his memory also. The theme of the collection is centered around the seminal research of G. Fichera on the Signorini problem. Variants on this idea enter in different ways. For example, by bringing in friction the problem is no longer self-adjoint and the minimization formulation is not valid. A large portion of this collection is devoted to survey papers concerning hemivariational methods, with a main point of its application to nonsmooth mechanics. Hemivariational inequali ties, which are a generalization of variational inequalities, were pioneered by Panagiotopoulos. There are many applications of this theory to the study of non convex energy functionals occurring in many branches of mechanics. An area of concentration concerns contact problems, in particular, quasistatic and dynamic contact problems with friction and damage. Nonsmooth optimization methods which may be divided into the main groups of subgradient methods and bundle methods are also discussed in this collection."
In 2013, the International Conference on Advance Information Systems Engineering (CAiSE) turns 25. Initially launched in 1989, for all these years the conference has provided a broad forum for researchers working in the area of Information Systems Engineering. To reflect on the work done so far and to examine prospects for future work, the CAiSE Steering Committee decided to present a selection of seminal papers published for the conference during these years and to ask their authors, all prominent researchers in the field, to comment on their work and how it has developed over the years. The scope of the papers selected covers a broad range of topics related to modeling and designing information systems, collecting and managing requirements, and with special attention to how information systems are engineered towards their final development and deployment as software components.With this approach, the book provides not only a historical analysis on how information systems engineering evolved over the years, but also a fascinating social network analysis of the research community. Additionally, many inspiring ideas for future research and new perspectives in this area are sparked by the intriguing comments of the renowned authors.
This book focuses on the use of open source software for geospatial analysis. It demonstrates the effectiveness of the command line interface for handling both vector, raster and 3D geospatial data. Appropriate open-source tools for data processing are clearly explained and discusses how they can be used to solve everyday tasks. A series of fully worked case studies are presented including vector spatial analysis, remote sensing data analysis, landcover classification and LiDAR processing. A hands-on introduction to the application programming interface (API) of GDAL/OGR in Python/C++ is provided for readers who want to extend existing tools and/or develop their own software.
This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security. The primary target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts. |
You may like...
Clean Architecture - A Craftsman's Guide…
Robert Martin
Paperback
(1)
Web Services - Concepts, Methodologies…
Information Reso Management Association
Hardcover
R8,957
Discovery Miles 89 570
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R3,940
Discovery Miles 39 400
Trends, Applications, and Challenges of…
Mohammad Amin Kuhail, Bayan Abu Shawar, …
Hardcover
R6,683
Discovery Miles 66 830
|