![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General
This volume contains problems and solutions related to various well-known algorithms used in VLSI physical design automation. Dr. Lim believes that the best way to learn new algorithms is to walk through a small example by hand. This knowledge will greatly help understand, analyze, and improve some of the well-known algorithms. The author has designed and taught a graduate-level course on physical CAD for VLSI at Georgia Tech. Over the years he has written his homework with such a focus and has maintained typeset version of the solutions. It was then shared with other colleagues teaching physical CAD either as a sole theme or as a part of EDA (electronic design automation) class. Dr. Lim believes that physical design automation still remains as an exciting, highly rewarding field after its birth in the 1970s, and that students with motivation and skills are always in huge demand. His vision is to see the students realize that the learning curve is not so steep after all.
Service-orientierte Architektur: Modewort oder ernstzunehmende Entwicklung? Dieses Buch mochte den Mythos entzaubern, indem es die grundlegenden Aspekte und Eigenschaften erlautert, die hinter SOA und Web Services stecken. Service-orientierte Architekturen mit Web Services wurde unter Beachtung der Anforderungen von Architekten und Entwicklern geschrieben. Es bietet sowohl fur IT-Experten und Manager als auch fur Studenten eine fundierte Basis. Ziel ist es, bleibende Grundlagen zu vermitteln es handelt sich daher nicht um ein Programmierhandbuch. Mochten Sie jedoch besser verstehen, was eine Service-orientierte Architektur ausmacht, wird Ihnen dieses Buch wertvolle Dienste" leisten. Zunachst werden grundlegende Architekturuberlegungen und organisatorische Rahmenbedingungen betrachtet. Basis fur die folgenden Teile ist eine abstrakte Darstellung einer SOA. Es folgt eine Umsetzung auf Basis von Web Services. Im zweiten Teil werden die wesentlichen Basistechniken der Web Services wie die plattformunabhangige Schnittstellenbeschreibung konkretisiert. Der produktive Einsatz von Web Services erfordert jedoch weitere Anforderungen. Themen wie Sicherheit, Performance, Prozesse, Semantik, Transaktionen und Quality of Service werden deshalb im dritten Teil behandelt. Stimmen zum Buch: Nach dem Lesen des Buches sollte der Leser gut gerustet sein, aktiv an den Diskussionen uber Service-Orientierung im Allgemeinen und Web Services im Besonderen teilnehmen zu konnen. Das Buch vermittelt den notwendigen Hintergrund, um bei Bedarf die einzelnen Standards im Detail besser zu verstehen und deren Relevanz fur einen gegebenen Problembereich besser einschatzen zu konnen." Prof. Dr. Frank Leymann, Institut fur Architektur von Anwendungssystemen, Stuttgart "Service-Orientierung und Web Services sind langst gangige Praxis geworden. Ein klares und fundiertes Verstandnis der zugrundeliegenden Konzepte ist fur einen produktiven Einsatz allerdings Voraussetzung - diese vierte Auflage des Buches leistet genau diese Vermittlung in vorbildlicher Art und Weise." Prof. Dr.-Ing. Stefan Tai, Universitat Karlsruhe"
Concluding the Commodore trilogy, this book takes a look at Commodore's resurgence in the late 1980's and then ultimate demise. This was a period of immense creativity from engineers within the company, who began “moonshot†projects using emerging CD-ROM technology. Get to know the people behind Commodore's successes and failures as they battle to stay relevant amidst blistering competition from Nintendo, Apple, and the onslaught of IBM PC clones. Told through interviews with company insiders, this examination of the now defunct company traces the engineering breakthroughs and baffling decisions that led to the demise of Commodore.
JavaScript is no longer to be feared or loathed - the world's most popular and ubiquitous language has evolved into a respectable language. Whether you're writing frontend applications or server side code, the phenomenal features from ES6 and beyond - like the rest operator, generators, destructuring, object literals, arrow functions, modern classes, promises, async, and metaprogramming capabilities - will get you excited and eager to program with JavaScript. You've found the right book to get started quickly and dive deep into the essence of modern JavaScript. Learn practical tips to apply the elegant parts of the language and the gotchas to avoid. JavaScript is a black swan that no one, including the author of the language, thought would become a popular and ubiquitous language. Not long ago, it was the most hated and feared language you could use to program the web. JavaScript ES6 and beyond has gone through a significant makeover. Troublesome features have been replaced with better, elegant, more reliable alternatives. This book includes many practical examples and exercises to help you learn in depth. It will not bore you with idiosyncrasies and arcane details intended for bad interview questions. Instead, it takes you into key features that you can readily use in your day-to-day projects. Whether you program the frontend or the server side, you can now write concise, elegant, and expressive JavaScript with newer features like default parameters, template literals, rest and spread operators, destructuring, arrow functions, and generators. Take it up a notch with features like infinite series, promises, async, and metaprogramming to create flexible, powerful, and extensible libraries. While the evolved features of the language will draw you in, the hundreds of examples in this book will pin the concepts down, for you to use on your projects. Take command of modern JavaScript and unlock your potential to create powerful applications. What You Need: To try out the examples in the book you will need a computer with Node.js, a text editor, and a browser like Chrome installed in it.
Discover the history behind photography and learn the skills to get the best from your photographs. A comprehensive all-in-one guide, Photography introduces you to the art, history, and culture of photography, and shows you how to take your own fantastic professional-standard photographs. An in-depth guide to all things photographic, Photography opens with a gallery of more than 30 key figures in photography, from 19th-century pioneers to the top photographers working today. The gallery provides fascinating contrasts between diverse genres, such as art photography, reportage, portrait, and wildlife photography. The book then tells the story of photography, from its "garden shed" beginnings to the rise of the "selfie" today. Photography further features: - All the skills and techniques of photography and features tips for using a smartphone to create stunning photos. - Combines creative typography, graphics, and clear text to present photographic skills in a clear, easily understood way. - Provides an introduction to the history of photography. - Includes a guide to the leading photographers The second half of the book introduces cameras, accessories, and software, explaining what they can do and how to use them. It shows how to take better photographs by mastering the technical aspects of your camera, how to experiment with composition, colour and light, and how to digitally enhance your photos. Inspirational masterclasses covering all genres of photography - landscape, portraits, wildlife, architecture, art - also provide you with an opportunity to apply your newfound skills in a clear and practical way and give advice on becoming a professional photographer yourself. The ideal book for anyone with an interest in the history of photography, or who wants to improve their own photography technique, doubling up as the perfect gift book for photography and art students who are seeking to learn more about these subjects.
Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end solution. There are nearly half a million active IMSS cameras globally, with over 100 million added annually. These cameras are used across enterprises (companies, traffic monitoring, driver enforcement, etc.), in peoples’ homes, on mobile devices (drones, on-vehicle, etc.), and are worn on the body. IMSS systems with a camera and network video recorder for storage are becoming the normal infrastructure for capturing, storing, and transmitting video content (sometimes up to 100 streams) in a secure manner and while protecting privacy. Military, aerospace, and government entities are also embracing digital security and surveillance. IMSS content serves as evidence in courts of law. Security within all of these types of IMSS systems needs to be bolstered by leveraging Intel hardware and software as the last line of defense, and this book provides you with best practices and solutions for maximizing security in your system implementation. What You Will Learn Review the relevant technologies in a surveillance system Define and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocks Optimize the partition and future-proof it with security and manageability Understand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and software Understand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threats Sample applications illustrate how to design in security for several types of IMSS.— Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environment Who This Book Is For Surveillance system designers, integrators, and consultants; professional systems, hardware, and software designers who design, recommend, or integrate surveillance systems; security system integrators; video analytics engineers; agencies that write RFPs and/or RFIs; government, police, and security agencies; and corporate security divisions
This is a project book that guides you through the process of building a traditional Access desktop database that uses one Access database as the front-end (queries, reports, and forms) and another Access database that contains all the tables and data. By separating the data from the rest of the database, the Access database can be easily shared by multiple users over a network. When you build a database the correctly at the outset, later this database can be migrated to another system with fewer issues and fewer objects that need to be redone. Features: Understand the concepts of normalization; Build tables and links to other data sources and understand table relationships; Connect and work with data stored in other formats (Text, Word, Excel, Outlook and PowerPoint); Retrieve data with DAO, ADO, and DLookup statements; Learn how to process text files for import and export; Create expressions, queries and SQL statements; Build bound and unbound forms and reports and write code to preview and print; Incorporate macros in your database; Work with attachments and image files; Learn how to display and query your Access data in the Internet browser; Secure your database for multi-user access; Compact your database to prevent corruption resulting in data loss.
You too can learn to design and develop classic arcade video games like Pong, Pac-Man, Space Invaders, and Scramble. Collision detection, extra lives, power ups, and countless other essential design elements were invented by the mostly anonymous designers at the early pioneering companies that produced these great games. In this book you'll go step by step, using modern, free software tools such as Unity to create five games in the classic style, inspired by retro favorites like: Pong, Breakout, Space Invaders, Scramble, and Pac-Man. All the source code, art, and sound sources for the projects are available on the companion files. You'll discover the fun of making your own games, putting in your own color graphics, adjusting the scoring, coding the AI, and creating the sound effects. You'll gain a deep understanding of the roots of modern video game design: the classics of the '70s and '80s. FEATURES, Uses Unity, C#, Blender, GIMP, and Audacity to make five fun classic games, 4-color throughout with companion files that include source code, art, and full projects (also available for downloading from the publisher), Includes historical anecdotes direct from one of the fabled Atari coin-op programmers, Detailed step-by-step instructions, dozens of exercises, and rules of classic game design, Contains unique insights on applying classic game design concepts to modern games.
WebAssembly fulfills the long-awaited promise of web technologies: fast code, type-safe at compile time, execution in the browser, on embedded devices, or anywhere else. Rust delivers the power of C in a language that strictly enforces type safety. Combine both languages and you can write for the web like never before! Learn how to integrate with JavaScript, run code on platforms other than the browser, and take a step into IoT. Discover the easy way to build cross-platform applications without sacrificing power, and change the way you write code for the web. WebAssembly is more than just a revolutionary new technology. It's reshaping how we build applications for the web and beyond. Where technologies like ActiveX and Flash have failed, you can now write code in whatever language you prefer and compile to WebAssembly for fast, type-safe code that runs in the browser, on mobile devices, embedded devices, and more. Combining WebAssembly's portable, high-performance modules with Rust's safety and power is a perfect development combination. Learn how WebAssembly's stack machine architecture works, install low-level wasm tools, and discover the dark art of writing raw wast code. Build on that foundation and learn how to compile WebAssembly modules from Rust by implementing the logic for a checkers game. Create wasm modules in Rust to interoperate with JavaScript in many compelling ways. Apply your new skills to the world of non-web hosts, and create everything from an app running on a Raspberry Pi that controls a lighting system, to a fully-functioning online multiplayer game engine where developers upload their own arena-bound WebAssembly combat modules. Get started with WebAssembly today, and change the way you think about the web. What You Need: You'll need a Linux, Mac, or Windows workstation with an Internet connection. You'll need an up-to-date web browser that supports WebAssembly. To work with the sample code, you can use your favorite text editor or IDE. The book will guide you through installing the Rust and WebAssembly tools needed for each chapter.
Covering more than 80 countries around the world, this book provides a compelling, contemporary snapshot of how people in other countries are using the Internet, social media, and mobile apps. How do people in other countries use the social media platform Facebook differently than Americans do? What topics are discussed on the largest online forum—one in Indonesia, with more than seven million registered users? Why does Mongolia rate in the top-ten countries worldwide for peak Internet speeds? Readers of Online around the World: A Geographic Encyclopedia of the Internet, Social Media, and Mobile Apps will discover the answers to these questions and learn about people's Internet and social media preferences on six continents—outside of the online community of users within the United States. The book begins with an overview of the Internet, social media platforms, and mobile apps that chronologically examines the development of technological innovations that have made the Internet what it is today. The country-specific entries that follow the overview provide demographic information and describe specific events influenced by online communications, allowing readers to better appreciate the incredible power of online interactions across otherwise-unconnected individuals and the realities and peculiarities of how people communicate in today's fast-paced, globalized, and high-technology environment. This encyclopedia presents social media and the Internet in new light, identifying how the use of language and the specific application of human culture impacts emerging technologies and communications, dramatically affecting everything from politics to social activism, education, and censorship.
When the night sky transforms terrestrial landscapes into otherworldly works of art, you need to know the professional techniques for capturing your own nocturnal masterpieces. This complete course combines the classic beauty of landscapes with the vast, exotic universe of astrophotography, using tried-and-tested methods that guarantee stellar results. You'll learn what gear you need and how to make the most of it; clever tricks for squeezing out every drop of image quality from a pitch-black scene; and straightforward post-production workflows to create compelling compositions of the cosmos.
Printed in full color.Software development happens in your head. Not in an editor, IDE, or designtool. You're well educated on how to work with software and hardware, but what about "wetware"--our own brains? Learning new skills and new technology is critical to your career, and it's all in your head.In this book by Andy Hunt, you'll learn how our brains are wired, and how to take advantage of your brain's architecture. You'll learn new tricks and tipsto learn more, faster, and retain more of what you learn.You need a pragmatic approach to thinking and learning. You need to "Refactor Your Wetware."Programmers have to learn constantly; not just the stereotypical new technologies, but also the problem domain of the application, the whims of the user community, the quirks of your teammates, the shifting sands of the industry, and the evolving characteristics of the project itself as it is built. We'll journey together through bits of cognitive and neuroscience, learning and behavioral theory. You'll see some surprising aspects of how our brains work, and how you can take advantage of the system to improve your own learning and thinking skills. In this book you'll learn how to: Use the Dreyfus Model of Skill Acquisition to become more expertLeverage the architecture of the brain to strengthen different thinking modesAvoid common "known bugs" in your mindLearn more deliberately and more effectivelyManage knowledge more efficiently
Discover the ultimate companion book to Ubisoft's most highly anticipated game of 2020.Discover the ultimate companion book to Ubisoft's most highly anticipated game of 2020, Watch Dogs Legion (R). In a near-future London on the brink of becoming a complete authoritarian state, the only way to rise up is to recruit everyone in to the resistance. This in-world book gathers the investigative work of an American reporter who has followed DedSec's history, from its emergence in the United States, to its influence around the world, and its sudden disappearance in London. The investigation picks up in the city as new forces emerge to rise up against the surveillance state. Explore the world of Watch Dogs Legion, with research files and information that provide an overview of key aspects of the universe, including images of the transformed city of London, factions, vehicles, weapons, technology, and more. Readers can also examine the roots of London's central conflict by tracking the events that led to this current state of affairs. Packed with immersive text, exclusive artwork, and detailed illustrations, this book is the definitive guide to Watch Dogs lore.
Stochastic phenomena play a central role in various scientific disciplines and underpin applications in popular industrial sectors. The purpose of the book is to introduce the reader to advanced concepts in the analysis of stochastic models starting from a detailed, intuitive and yet rigorous presentation of basic concepts. A special emphasis will be placed on problem solving and numerical implementations, with detailed solutions to all of the results and source code in the C programming language provided. The book will also cover recent specialised techniques for popular problems, providing a valuable reference for advanced readers with an active interest in the field.
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have a solid foundation if you bring in a dedicated security staff later. Identify the weaknesses in your system, and defend against the attacks most likely to compromise your organization, without needing to become a trained security professional. Computer security is a complex issue. But you don't have to be an expert in all the esoteric details to prevent many common attacks. Attackers are opportunistic and won't use a complex attack when a simple one will do. You can get a lot of benefit without too much complexity, by putting systems and processes in place that ensure you aren't making the obvious mistakes. Secure your systems better, with simple (though not always easy) practices. Plan to patch often to improve your security posture. Identify the most common software vulnerabilities, so you can avoid them when writing software. Discover cryptography - how it works, how easy it is to get wrong, and how to get it right. Configure your Windows computers securely. Defend your organization against phishing attacks with training and technical defenses. Make simple changes to harden your system against attackers. What You Need: You don't need any particular software to follow along with this book. Examples in the book describe security vulnerabilities and how to look for them. These examples will be more interesting if you have access to a code base you've worked on. Similarly, some examples describe network vulnerabilities and how to detect them. These will be more interesting with access to a network you support.
'Heady, exhilarating, often astonishing' New York Times 'Iridescently original, deeply disorientating and yet somehow radically hopeful ... worth reading and rereading' Brian Eno 'Be prepared to re-evaluate your relationship with the amazing life forms with whom we share the planet. Fascinating, innovative and thought provoking: I thoroughly recommend Ways of Being' Dr Jane Goodall, DBE Recent years have seen rapid advances in 'artificial' intelligence, which increasingly appears to be something stranger than we ever imagined. At the same time, we are becoming more aware of the other intelligences which have been with us all along, unrecognized. These other beings are the animals, plants, and natural systems that surround us, and are slowly revealing their complexity and knowledge - just as the new technologies we've built are threatening to cause their extinction, and ours. In Ways of Being, writer and artist James Bridle considers the fascinating, uncanny and multiple ways of existing on earth. What can we learn from these other forms of intelligence and personhood, and how can we change our societies to live more equitably with one another and the non-human world? From Greek oracles to octopuses, forests to satellites, Bridle tells a radical new story about ecology, technology and intelligence. We must, they argue, expand our definition of these terms to build a meaningful and free relationship with the non-human, one based on solidarity and cognitive diversity. We have so much to learn, and many worlds to gain.
Up-to-date practice questions that cover every topic on the 2022 version of the CISM exam Take the current version of the challenging CISM exam with complete confidence using the detailed information contained in this fully updated self-study guide. Written by an expert in the field, the book features hundreds of practice exam questions that match those on the live test in content, format, tone, and feel. In-depth answer explanations are provided for both the correct and incorrect answer choices. CISM Certified Information Security Manager Practice Exams, Second Edition supplements the CISM All-in-One Exam Guide and completely covers every objective of the 2022 exam release. In total, the book contains more than 300 realistic practice questions. •  Offers 100% coverage of all four CISM exam domains •  Online content includes access to an additional 150 practice questions in the TotalTester Online customizable test   engine •  Written by a computer security expert, author, and lecturer
Discover the importance of learning C++ with Diane Zak's popular AN INTRODUCTION TO PROGRAMMING WITH C++, 8E. This book's distinctive emphasis clarifies how mastering C++ programming skills will benefit you now and throughout your career. This unique text incorporates a student-focused approach that continually highlights the importance and relevance of the programming concepts you are learning. Memorable new examples portray concepts in action, while abundant new hands-on exercises, including mini-quizzes, Labs, and "Try This" features, guide you in absorbing, practicing, and applying concepts as you progress. Trust AN INTRODUCTION TO PROGRAMMING WITH C++, 8E to keep you enthusiastic about learning as you master the skills of C++.
From Business Strategy to IT Action gives companies of all sizes
the tools to effectively link IT to business strategy and produce
effective, actionable strategies for bottom-line results. The
authors present CEOs, CFOs, CIOs, and IT managers with a powerful
and accessible resource packed with such useful material as:
Online algorithms are a rich area of research with widespread applications in scheduling, combinatorial optimization, and resource allocation problems. This lucid textbook provides an easy but rigorous introduction to online algorithms for graduate and senior undergraduate students. In-depth coverage of most of the important topics is presented with special emphasis on elegant analysis. The book starts with classical online paradigms like the ski-rental, paging, list-accessing, bin packing, where performance of online algorithms is studied under the worst-case input and moves on to newer paradigms like 'beyond worst case', where online algorithms are augmented with predictions using machine learning algorithms. The book goes on to cover multiple applied problems such as routing in communication networks, server provisioning in cloud systems, communication with energy harvested from renewable sources, and sub-modular partitioning. Finally, a wide range of solved examples and practice exercises are included, allowing hands-on exposure to the concepts.
Physics forms the basis for many of the motions and behaviors seen in both the real world and in the virtual worlds of animated films, visual effects, and computer games. By describing the underlying physical principles and then creating simulations based on these principles, these computer-generated worlds are brought to life. Physically Based Modeling and Animation goes behind the scenes of computer animation and details the mathematical and algorithmic foundations that are used to determine the behavior underlying the movement of virtual objects and materials. Dr. Donald House and Dr. John Keyser offer an approachable, hands-on view of the equations and programming that form the foundations of this field. They guide readers from the beginnings of modeling and simulation to more advanced techniques, enabling them to master what they need to know in order to understand and create their own animations Emphasizes the underlying concepts of the field, and is not tied to any particular software package, language, or API. Develops concepts in mathematics, physics, numerical methods, and software design in a highly integrated way, enhancing both motivation and understanding. Progressively develops the material over the book, starting from very basic techniques, and building on these to introduce topics of increasing complexity. Motivates the topics by tying the underlying physical and mathematical techniques directly to applications in computer animation.
This enthusiastic introduction provides support for Excel beginners and focuses on using the program immediately for maximum efficiency. With 1,104 screenshots and explicit information on everything from rows, columns, and cells to subtotaling, sorting, and pivot tables, this guide aims to alleviate the frustrations that come with using the program for the first time. This manual offers strategies for avoiding problems and streamlining efficiency and assists readers from start to finish, turning Excel 2010 novices into experts.
|
You may like...
MATLAB (R) for Engineers Explained
Fredrik Gustafsson, Niclas Bergman
Hardcover
R1,432
Discovery Miles 14 320
International Brigade Against Apartheid…
Ronnie Kasrils, Muff Andersson, …
Paperback
Where Science and Ethics Meet - Dilemmas…
Chris Willmott, Salvador Macip
Hardcover
Introduction to Stochastic Programming
John R. Birge, Francois Louveaux
Hardcover
R2,556
Discovery Miles 25 560
|