Hands-on information to help you fully exploit the capabilities of MIDP 2.0 on Symbian OS (including MMA, WMA and Bluetooth). This practical guide will walk you through developing example applications illustrating key functionality and explain...
Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and...
The latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance...
This book provides thorough knowledge of Linux TCP/IP stack and kernel framework for its network stack, including complete knowledge of design and implementation. Starting with simple client-server socket programs and progressing to complex...
The eagerly awaited Pattern-Oriented Software Architecture (POSA) Volume 4 is about a pattern language for distributed computing. The authors will guide you through the best practices and introduce you to key areas of building distributed...
Gain a new perspective on how the brain works and inspires new avenues for design in computer science and engineering This unique book is the first of its kind to introduce human memory and basic cognition in terms of physical circuits,...
This much-needed update to the bestselling guide on the extensive changes to the local area networks (LAN) switching technologies explains why LAN switching technologies are critical to network design. This in-depth guide covers the...
This new book, first in the Academy series, is the official guide to the ASD exam, priming candidates for the exam, explaining exactly what they need to know. The Primer explains the knowledge tested in the Accredited Symbian Developer exam,...
The Sarbanes-Oxley Act (SOX) was passed in 2002 in response to a series of high-profile corporate scandals and requires that public companies implement internal controls over financial reporting, operations, and assets; these controls depend...
An information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of...
The aim of this book is to describe the methodology of conducting the THEDRE research «Traceable Human Experiment Design Research». It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate...
For 200 years, industry mastered iron, fire, strength and energy. Today, electronics shapes our everyday objects, integrating chips: computers, phones, keys, games, household appliances, etc. Data, software and calculation frame the conduct of...
Information systems have an enormous potential for improving business performance. With this in mind, companies must set out to exploit and optimize this potential without delay in order to improve their efficiency and continue to set themselves...
A thorough update to the industry standard for designing, developing, and deploying data warehouse and business intelligence systems The world of data warehousing has changed remarkably since the first edition of The Data Warehouse Lifecycle...
Cowritten by Ralph Kimball, the world's leading data warehousing authority, whose previous books have sold more than 150,000 copies Delivers real-world solutions for the most time- and labor-intensive portion of data warehousing-data staging, or...
This book is insightful and thought-provoking for even the most seasoned SAP BW individual. —Richard M. Dunning, Chair, American SAP Users Group Written by the leading experts in the field, this comprehensive guide shows you how to implement the...
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a...
The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019! Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks,...
With the idea of “deep learning” having now become the key to this new generation of solutions, major technological players in the business intelligence sector have taken an interest in the application of Big Data. In this book, the author...
Step into the future with AI The term «Artificial Intelligence» has been around since the 1950s, but a lot has changed since then. Today, AI is referenced in the news, books, movies, and TV shows, and the exact definition is often...
Get a clear picture of IP Multicast applications for delivering commercial high-quality video services This book provides a concise guide to current IP Multicast technology and its applications, with a focus on IP-based Television (IPTV) and...
Mobile Python is the introduction of Python programming language to the mobile space. This practical hands-on book teaches readers how to realize their application ideas on the Symbian OS. Programming on the Symbian mobile platform has been...
A comprehensive look at the emerging science of networks Network science helps you design faster, more resilient communication networks; revise infrastructure systems such as electrical power grids, telecommunications networks, and airline...
A unique overview of network security issues, solutions, and methodologies at an architectural and research level Network Security provides the latest research and addresses likely future developments in network security protocols,...
To analyze complex situations we use everyday analogies that allow us to invest in an unknown domain knowledge we have acquired in a known field. In this work the author proposes a modeling and analysis method that uses the analogy of the...
Where do the digital humanities really come from? Are they really news? What are the theoretical and technical influences that participate in this scientific field that arouses interest and questions? This book tries to show and explain the main...
This book introduces policy, government, and security professionals to the concept of “information warfare,” covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan,...
This fully updated edition demonstrates how businesses can succeed in creating a new culture of information management compliance (IMC) by incorporating an IMC philosophy into a corporate governance structure. Expert advice and insight reveals...
Serving as both a tutorial and a reference guide to the MDX (Multidimensional Expressions) query language, this book shows data warehouse developers what they need to know to build effective multidimensional data warehouses After a brief...
The explosive growth of multimedia data transmission has generated a critical need for efficient, high-capacity image databases, as well as powerful search engines to retrieve image data from them. This book brings together contributions by an...
Image processing-from basics to advanced applications Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and...
The absolute beginner's guide to learning basic computer skills Computing Fundamentals, Introduction to Computers gets you up to speed on basic computing skills, showing you everything you need to know to conquer entry-level computing courses....
The de facto official source on facial animation—now updated! If you want to do character facial modeling and animation at the high levels achieved in today’s films and games, Stop Staring: Facial Modeling and Animation Done Right, Third...
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents...
When it comes to computer games, the numbers are astounding: the world's top professional gamer has won over half a million dollars shooting virtual monsters on-screen; online games claim literally millions of subscribers; while worldwide...
This is the definitive guide for Symbian C++ developers looking to use Symbian SQL in applications or system software. Since Symbian SQL and SQLite are relatively new additions to the Symbian platform, Inside Symbian SQL begins with an...
Take a look inside Symbian OS with an under-the-hood view of Symbian's revolutionary new real-time smartphone kernel Describes the functioning of the new real-time kernel, which will become ubiquitious on Symbian OS phones in the next 5-10 years...
What are we to make of the information society? Many prominent theorists have argued it to be the most profound and comprehensive transformation of economy, culture and politics since the rise of the industrial way of life in the 18th century....
This book explores the domain of software maintenance management and provides road maps for improving software maintenance organizations. It describes full maintenance maturity models organized by levels 1, 2, and 3, which allow for benchmarking...
Understanding Information Transmission introduces you to the entire field of information technology. In this consumer handbook and introductory student resource, seven chapters span the gamut of the field—the nature, storage, transmission,...
Speech coding is a highly mature branch of signal processing deployed in products such as cellular phones, communication devices, and more recently, voice over internet protocol This book collects many of the techniques used in speech coding and...
Although devoted to constructions of good codes for error control, secrecy or data compression, the emphasis is on the first direction. Introduces a number of important classes of error-detecting and error-correcting codes as well as their...
Geared to IT professionals eager to get into the all-important field of data warehousing, this book explores all topics needed by those who design and implement data warehouses. Readers will learn about planning requirements, architecture,...
Increase profits and reduce costs by utilizing this collection of models of the most commonly asked data mining questions In order to find new ways to improve customer sales and support, and as well as manage risk, business managers must be able...
Data mining can be defined as the process of selection, exploration and modelling of large databases, in order to discover models and patterns. The increasing availability of data in the current information society has led to the need for valid...
With the advent of the Web along with the unprecedented amount of information available in electronic format, conceptual data analysis is more useful and practical than ever, because this technology addresses important limitations of the systems...
The purpose of this book is to provide a practical approach for IT professionals to acquire the necessary knowledge and expertise in data modeling to function effectively. It begins with an overview of basic data modeling concepts, introduces...
Turn unstructured data into valuable business insight Unstructured Data Analytics provides an accessible, non-technical introduction to the analysis of unstructured data. Written by global experts in the analytics space, this book presents...
The first book to provide a comprehensive overview of the subject rather than a collection of papers. The author is a recognized authority in the field as well as an outstanding teacher lauded for his ability to convey these concepts clearly to...
A practical, step-by-step guide to Maya 2011 Four previous editions can’t be wrong: this book is the perfect introduction to 3D and Maya. Learn to build and animate your own digital models and scenes with step-by-step instruction and fun and...