|
|
Books > Computing & IT
Chemical modelling covers a wide range of disciplines, and this
book is the first stop for any chemist, materials scientist,
biochemist, or molecular physicist wishing to acquaint themselves
with major developments in the applications and theory of chemical
modelling. Containing both comprehensive and critical reviews, it
is a convenient reference to the current literature. Coverage
includes, but is not limited to, considerations towards rigorous
foundations for the natural-orbital representation of molecular
electronic transitions, quantum and classical embedding schemes for
optical properties, machine learning for excited states, ultrafast
and wave function-based electron dynamics, and attosecond
chemistry.
The success of any organization is largely dependent on positive
feedback and repeat business from patrons. By utilizing acquired
marketing data, business professionals can more accurately assess
practices, services, and products that their customers find
appealing. The Handbook of Research on Intelligent Techniques and
Modeling Applications in Marketing Analytics features innovative
research and implementation practices of analytics in marketing
research. Highlighting various techniques in acquiring and
deciphering marketing data, this publication is a pivotal reference
for professionals, managers, market researchers, and practitioners
interested in the observation and utilization of data on marketing
trends to promote positive business practices.
4 zettabytes (4 billion terabytes) of data generated in 2013, 44
zettabytes predicted for 2020 and 185 zettabytes for 2025. These
figures are staggering and perfectly illustrate this new era of
data deluge. Data has become a major economic and social challenge.
The speed of processing of these data is the weakest link in a
computer system: the storage system. It is therefore crucial to
optimize this operation. During the last decade, storage systems
have experienced a major revolution: the advent of flash memory.
Flash Memory Integration: Performance and Energy Issues contributes
to a better understanding of these revolutions. The authors offer
us an insight into the integration of flash memory in computer
systems, their behavior in performance and in power consumption
compared to traditional storage systems. The book also presents, in
their entirety, various methods for measuring the performance and
energy consumption of storage systems for embedded as well as
desktop/server computer systems. We are invited on a journey to the
memories of the future.
As technology continues to expand and develop, the internet of
things (IoT) is playing a progressive role in the infrastructure of
electronics. The increasing amount of IoT devices, however, has led
to the emergence of significant privacy and security challenges.
Security and Privacy Issues in Sensor Networks and IoT is a
collection of innovative research on the methods and applications
of protection disputes in the internet of things and other
computing structures. While highlighting topics that include cyber
defense, digital forensics, and intrusion detection, this book is
ideally designed for security analysts, IT specialists, software
developers, computer engineers, industry professionals,
academicians, students, and researchers seeking current research on
defense concerns in cyber physical systems.
Mechanical Behaviors of Carbon Nanotubes: Theoretical and Numerical
Approaches presents various theoretical and numerical studies on
mechanical behaviors of carbon nanotubes. The main theoretical
aspects included in the book contain classical molecular dynamics
simulation, atomistic-continuum theory, atomic finite element
method, continuum plate, nonlocal continuum plate, and shell
models. Detailed coverage is also given to structural and elastic
properties, trace of large deformation, buckling and post-buckling
behaviors, fracture, vibration characteristics, wave propagation,
and the most promising engineering applications. This book not only
illustrates the theoretical and numerical methods for analyzing the
mechanical behavior of carbon nanotubes, but also contains
computational results from experiments that have already taken
place.
Written chemical formulas, such as C2H6O, can tell us the
constituent atoms a molecule contains but they cannot differentiate
between the possible geometrical arrangements (isomers) of these
models. Yet the chemical properties of different isomers can vary
hugely. Therefore, to understand the world of chemistry we need to
ask what kind of isomers can be produced from a given atomic
composition, how are isomers converted into each other, how do they
decompose into smaller pieces, and how can they be made from
smaller pieces? The answers to these questions will help us to
discover new chemistry and new molecules. A potential energy
surface (PES) describes a system, such as a molecule, based on
geometrical parameters. The mathematical properties of the PES can
be used to calculate probable isomer structures as well as how they
are formed and how they might behave. Exploration on Quantum
Chemical Potential Energy Surfaces focuses on the PES search based
on quantum chemical calculations. It describes how to explore the
chemical world on PES, discusses fundamental methods and specific
techniques developed for efficient exploration on PES, and
demonstrates several examples of the PES search for chemical
structures and reaction routes.
Coding for Penetration Testers: Building Better Tools, Second
Edition provides readers with an understanding of the scripting
languages that are commonly used when developing tools for
penetration testing, also guiding users through specific examples
of custom tool development and the situations where such tools
might be used. While developing a better understanding of each
language, the book presents real-world scenarios and tool
development that can be incorporated into a tester's toolkit. This
completely updated edition focuses on an expanded discussion on the
use of Powershell, and includes practical updates to all tools and
coverage.
For Database Systems and Database Design and Application courses
offered at the junior, senior and graduate levels in Computer
Science departments. Written by well-known computer scientists,
this introduction to database systems offers a comprehensive
approach, focusing on database design, database use, and
implementation of database applications and database management
systems. The first half of the book provides in-depth coverage of
databases from the point of view of the database designer, user,
and application programmer. It covers the latest database standards
SQL:1999, SQL/PSM, SQL/CLI, JDBC, ODL, and XML, with broader
coverage of SQL than most other texts. The second half of the book
provides in-depth coverage of databases from the point of view of
the DBMS implementor. It focuses on storage structures, query
processing, and transaction management. The book covers the main
techniques in these areas with broader coverage of query
optimisation than most other texts, along with advanced topics
including multidimensional and bitmap indexes, distributed
transactions, and information integration techniques.
The second in the Women Securing the Future with TIPPSS series,
this book provides insight and expert advice from seventeen women
leaders in technology, healthcare and policy to address the
challenges of Trust, Identity, Privacy, Protection, Safety and
Security (TIPPSS) for connected healthcare, and the growing
Internet of Medical Things (IoMT) ecosystem. The ten chapters in
this book delve into trust, security and privacy risks in connected
healthcare for patients, medical devices, personal and clinical
data, healthcare providers and institutions, and provide practical
approaches to manage and protect the data, devices, and humans.
Cybersecurity, technology and legal experts discuss risks, from
data and device hacks to ransomware, and propose approaches to
address the challenges including new frameworks for architecting
and evaluating medical device and connected hospital cybersecurity.
We all need to be aware of the TIPPSS challenges in connected
healthcare, and we call upon engineers, device manufacturers,
system developers and healthcare providers to ensure trust and
manage the risk. Featuring contributions from prominent female
experts and role models in technology, cybersecurity, engineering,
computer science, data science, business, healthcare,
accessibility, research, law, privacy and policy, this book sets
the stage to improve security and safety in our increasingly
connected world.
Translation and communication between cultures can sometimes be a
difficult process. Image-based assessments can offer a way for
large populations to be tested on different subjects without having
to create multiple testing programs. Cross-Cultural Analysis of
Image-Based Assessments: Emerging Research and Opportunities is an
innovative resource that offers insight into the application of
visual assessments across a global and intercultural context.
Highlighting applicable topics which include visual literacy,
psychological assessments, assessment development, and equivalency
measurements, this publication is ideal for psychologists,
therapists, and researchers who would like to stay current on the
most efficient way to test multi-cultural populations in various
fields of knowledge.
Example-Based Super Resolution provides a thorough introduction and
overview of example-based super resolution, covering the most
successful algorithmic approaches and theories behind them with
implementation insights. It also describes current challenges and
explores future trends. Readers of this book will be able to
understand the latest natural image patch statistical models and
the performance limits of example-based super resolution
algorithms, select the best state-of-the-art algorithmic
alternative and tune it for specific use cases, and quickly put
into practice implementations of the latest and most successful
example-based super-resolution methods.
Advances in Computers, the latest volume in the series published
since 1960, presents detailed coverage of innovations in computer
hardware, software, theory, design, and applications. In addition,
it provides contributors with a medium in which they can explore
their subjects in greater depth and breadth than journal articles
usually allow. As a result, many articles have become standard
references that continue to be of significant, lasting value in
this rapidly expanding field.
Trusted Platform Modules (TPMs) are small, inexpensive chips which
provide a limited set of security functions. They are most commonly
found as a motherboard component on laptops and desktops aimed at
the corporate or government markets, but can also be found on many
consumer-grade machines and servers, or purchased as independent
components. Their role is to serve as a Root of Trust - a highly
trusted component from which we can bootstrap trust in other parts
of a system. TPMs are most useful for three kinds of tasks:
remotely identifying a machine, or machine authentication;
providing hardware protection of secrets, or data protection; and
providing verifiable evidence about a machine's state, or
attestation. This book describes the primary uses for TPMs, and
practical considerations such as when TPMs can and should be used,
when they shouldn't be, what advantages they provide, and how to
actually make use of them, with use cases and worked examples of
how to implement these use cases on a real system. Topics covered
include when to use a TPM; TPM concepts and functionality;
programming introduction; provisioning: getting the TPM ready to
use; first steps: TPM keys; machine authentication; data
protection; attestation; other TPM features; software and
specifications; and troubleshooting. Appendices contain basic
cryptographic concepts; command equivalence and requirements
charts; and complete code samples.
The significance of big data can be observed in any decision-making
process as it is often used for forecasting and predictive
analytics. Additionally, big data can be used to build a holistic
view of an enterprise through a collection and analysis of large
data sets retrospectively. As the data deluge deepens, new methods
for analyzing, comprehending, and making use of big data become
necessary. Enterprise Big Data Engineering, Analytics, and
Management presents novel methodologies and practical approaches to
engineering, managing, and analyzing large-scale data sets with a
focus on enterprise applications and implementation. Featuring
essential big data concepts including data mining, artificial
intelligence, and information extraction, this publication provides
a platform for retargeting the current research available in the
field. Data analysts, IT professionals, researchers, and
graduate-level students will find the timely research presented in
this publication essential to furthering their knowledge in the
field.
|
|