Archive for the ‘E-Book’ Category
Wiley | 1999-01-25 | ISBN: 047131952X | 324 pages | PDF | 1,9 MB
Information Security/Java “This book is mandatory reading for every user and developer of Webware.” -Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent role. But as Java evolves, its security issues and architectures get more complicated. Written by the world’s leading experts on mobile code security, this updated and expanded edition of the groundbreaking guide to Java security includes lessons for Web users, developers, system administrators, and business decision-makers alike. This book navigates the uncharted waters of mobile code security and arms the reader with the knowledge required for securing Java. It provides in-depth coverage of:
* The base Java security sandbox, made up of the Verifier, Class Loaders, and the Security Manager
* Code signing, stack inspection, and the new Java 2 security architecture
* The pros and cons of language-based enforcement models and trust models
* All known Java security holes and the attack applets that exploit them
* Techniques commonly used in malicious applets
* Twelve rules for developing more secure Java code, with explicit examples
* Hard questions to ask third-party Java security tools vendors
* Card Java security, smart card risks, and their impact on e-commerce security
On the companion Web site http://www.securingjava.com you’ll find:
* The Java Security Hotlist: Over 100 categorized and annotated Java security-related Web links
* An e-mail list to keep subscribers abreast of breaking Java security news
* A complete electronic edition of this book
Primera revision | 267 paginas | Español | ISBN: 846113754X | PDF | 21.4Mb
¿Quieres tener tu propio sitio web y ahorrarte una buena cantidad de dinero?
¿Te dedicas a crear sitios web para clientes y necesitas soluciones rápidas, sencillas y que impacten al cliente? Entonces, utiliza Joomla!
¿Quieres ser tu propio webmaster, sin depender de empresas externas para actualizar tus contenidos, adaptar el sitio web a las necesidades que surjan y realizar el mantenimiento adecuado? Entonces, no dudes en adquirir este libro.
Decides que tu web la diseñe una empresa, que te lo hagan con Joomla!, siempre los contenidos dependerán de lo que tú decidas y cuando tú quieras.
¿Te dedicas a la enseñanza y quieres que tus alumnos dominen la creación y mantenimiento de sitios web?. ¡Utiliza este amplio Tutorial!
¿Tienes un pequeño negocio que no puede invertir en los servicios de un webmaster para que tu empresa se conozca en el mundo entero?. ¡Ya sabes cómo empezar! ¡Aquí está la solución!
Springer; 1 edition | ISBN: 1402055056 | 160 pages | January 2007 | PDF | 1 Mb
Embedded systems have become indispensable in our lives: household appliances, cars, airplanes, power plant control systems, medical equipment, telecommunication systems, space technology, they all contain digital computing systems with dedicated functionality. Most of them, if not all, are real-time systems, i.e. their responses to stimuli have timeliness constraints.
The timeliness requirement has to be met despite some unpredictable, stochastic behaviour of the system. In this book, we address one cause of such stochastic behaviour, namely the application and platform-dependent stochastic task execution times.
The problem of accurately determining the deadline miss ratio of an application and to optimise the performance of a system taking the aforementioned ratio into consideration is extremely important as it has a significant impact on the cost of the end product.
Real-Time Applications with Stochastic Task Execution Times presents three approaches to the analysis of the deadline miss ratio of applications with stochastic task execution times. Each of the three approaches fits best to a different context. The first approach is an exact one and is efficiently applicable to monoprocessor systems. The second approach is an approximate one, which allows for designer-controlled trade-off between analysis accuracy and analysis speed. It is efficiently applicable to multiprocessor systems. The third approach is less accurate but sufficiently fast in order to be placed inside optimisation loops. Based on the last approach, we propose a heuristic for task mapping and priority assignment for deadline miss ratio minimisation.
Packt Publishing | 2007-09-22 | ISBN: 184719088X | 304 pages | PDF | 7,1 Mb
This practical tutorial has detailed, carefully explained case studies using PHP to build new, effective mashup applications, which combine data from multiple external online sources into an integrated Web 2.0 experience. If you are confident with PHP programming and interested in mashing things up, this book is for you! All you need to know about formats, protocols, web services, and web APIs is covered as you learn to write PHP code to remotely consume services like Google Maps, Flickr, Amazon, YouTube, MSN Search, Yahoo!, Last.fm, the Internet UPC Database, and even the California Highway Patrol Traffic data! The 5 real-world PHP projects each start with an overview of technologies and protocols needed and then dive into the tools used and details of creating the project, and you can download each project’s source code. You will learn how these technologies work with each other and how to use this information, together with your imagination, to build your own cutting-edge websites.
Paperback: 444 pages
Data: Oct 2006
Description: This book treats the Mathematics of many important areas in digital information processing.
It covers, in a unified presentation, five topics: Data Compression, Cryptography, Sampling (Signal Theory), Error Control Codes, Data Reduction. The thematic choices are practice-oriented. So, the important final part of the book deals with the Discrete Cosine Transform and the Discrete Wavelet Transform, acting in image compression. The presentation is dense, the examples and numerous exercises are concrete. The pedagogic architecture follows increasing mathematical complexity. A read-and-learn book on Concrete Mathematics, for teachers, students and practitioners in Electronic Engineering, Computer Science and Mathematics.
Paperback: 328 pages
Data: Aug 2007
Description: This textbook is an introduction to probability and statistics for non-mathematics majors who do not need the exhaustive detail and mathematical depth provided in more comprehensive treatments of the subject. The presentation covers the mathematical laws of random phenomena, including discrete and continuous random variables, expectation and variance, and common probability distributions such as the binomial, Poisson, and normal distributions. Main statistical concepts considered are point and interval estimates, hypothesis testing, power function, various statistical tests: z, t, chi-square and Kolmogorov-Smirnov.
* Presents rigorous discussion, with definitions, theorems, and proofs, but aimed at a non-specialist audience;
*Avoids linear algebra;
* Treats informally the few unavoidable concepts from multivariable calculus, such as double integrals;
* Motivates new concepts throughout using examples and brief conceptual discussions;
* Develops basic ideas with clear definitions, carefully designed notation and techniques of statistical analysis, along with well-chosen examples, exercises and applications.
The book contains enough material for two semesters but, with judicious selection, it can also be used for a one-semester course, either in probability and statistics or in probability alone. .Advanced undergraduate and graduate students in computer science, engineering, and other natural and social sciences with only a basic background in calculus will benefit from this introductory text balancing theory with applications.