Digital Design and Computer Architecture is designed for courses that combine digital logic design with computer organization/architecture or that teach these subjects as a two-course sequence.
UNIX for OpenVMS Users, 3E, makes it easy to see what OpenVMS and UNIX have in common, and to transfer your knowledge and experience in OpenVMS over to the world of UNIX.
The aim of this book is to introduce the general area of Digital Signal Processing from a practical point of view with a working minimum of mathematics.
Security and Loss Prevention, Fifth Edition, encompasses the breadth and depth of considerations involved in implementing general loss prevention concepts and security programs within an organization.
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI).
Microcontrollers are present in many new and existing electronic products, and the PIC microcontroller is a leading processor in the embedded applications market.
Adjunctive treatments, in which patients are provided additional modalities that can assist in their behavior change or the maintenance of their behavior change (i.
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies.
Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment.
Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene.
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.
Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes.
This book provides a comprehensive exploration of next-generation internet, distributed systems, and distributed computing, offering valuable insights into their impact on society and the future of technology.
Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies.
Essential Microsoft(R) SQL Server(R) 2017 installation, configuration, and management techniques for LinuxForeword by Kalen Delaney, Microsoft SQL Server MVPThis comprehensive guide shows, step-by-step, how to set up, configure, and administer SQL Server 2017 on Linux for high performance and high availability.
A practical introduction to Java programming-fully revised for the latest version, Java SE 17Thoroughly updated for Java Platform Standard Edition 17, this hands-on resource shows, step by step, how to get started programming in Java from the very first chapter.
Microsoft(R) Exchange Server 2003 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2003 environment.
The Definitive Java Programming GuideFully updated for Java SE 11, Java: The Complete Reference, Eleventh Edition explains how to develop, compile, debug, and run Java programs.
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure.
Mit gut geplanten Teamstrukturen die Softwareentwicklung nachhaltig beschleunigen- International richtungsweisende Methode, um leistungsfähige Teams zu formen- Anwendbares Praxiswissen: Wie Sie funktionierende Teamgrenzen bestimmen und Team-APIs entwerfen- Kombiband: Enthält neben dem Hauptwerk »Team Topologies« das Workbook zur Interaktion verteilt arbeitender Teams.
A fast-paced guide to get you up and running with Android application development using Android Studio 2Key Features[*] Configure, build, and run Android projects with Android Studio 2[*] Test your apps using the Android emulator and learn how to manage virtual devices[*] Explore how Android Studio 2 can be made a part of your workflow to reduce the overall development timeBook DescriptionAndroid Studio 2, the official IDE for Android application development, dramatically improves your workflow by letting you quickly see changes running on your device or emulator.
Create highly efficient design patterns for scalability, redundancy, and high availability in the AWS CloudKey FeaturesBuild highly robust systems using the cloud infrastructureMake web applications resilient against scheduled and accidental downtimeExplore and apply Amazon-provided services in unique ways to solve common design problemsBook DescriptionWhether you're just getting your feet wet in cloud infrastructure or already creating complex systems, this book will guide you through using the patterns to fit your system needs.
Build your Machine Learning portfolio by creating 6 cutting-edge Artificial Intelligence projects using neural networks in PythonKey FeaturesDiscover neural network architectures (like CNN and LSTM) that are driving recent advancements in AIBuild expert neural networks in Python using popular libraries such as KerasIncludes projects such as object detection, face identification, sentiment analysis, and moreBook DescriptionNeural networks are at the core of recent AI advances, providing some of the best resolutions to many real-world problems, including image recognition, medical diagnosis, text analysis, and more.