Skip to main content

Books in Programming techniques

31-40 of 86 results in All results

Agent-Based Spatial Simulation with NetLogo Volume 1

  • 1st Edition
  • August 19, 2015
  • Arnaud Banos + 2 more
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 0 5 5 - 3
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 7 2 3 - 5
Agent-based modeling is a flexible and intuitive approach that is close to both data and theories, which gives it a special position in the majority of scientific communities. Agent models are as much tools of understanding, exploration and adaptation as they are media for interdisciplinary exchange. It is in this kind of framework that this book is situated, beginning with agent-based modeling of spatialized phenomena with a methodological and practical orientation. Through a governing example, taking inspiration from a real problem in epidemiology, this book proposes, with pedagogy and economy, a guide to good practices of agent modeling. The reader will thus be able to understand and put the modeling into practice and acquire a certain amount of autonomy.

Advances in Computers

  • 1st Edition
  • Volume 99
  • August 18, 2015
  • Atif Memon
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 2 1 3 1 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 3 3 9 - 6
Advances in Computers carries on a tradition of excellence, presenting detailed coverage of innovations in computer hardware, software, theory, design, and applications. The book provides contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles typically allow. The articles included in this book will become standard references, with lasting value in this rapidly expanding field.

Formal Verification

  • 1st Edition
  • July 24, 2015
  • Erik Seligman + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 0 8 1 5 - 7
Formal Verification: An Essential Toolkit for Modern VLSI Design presents practical approaches for design and validation, with hands-on advice to help working engineers integrate these techniques into their work. Formal Verification (FV) enables a designer to directly analyze and mathematically explore the quality or other aspects of a Register Transfer Level (RTL) design without using simulations. This can reduce time spent validating designs and more quickly reach a final design for manufacturing. Building on a basic knowledge of SystemVerilog, this book demystifies FV and presents the practical applications that are bringing it into mainstream design and validation processes at Intel and other companies. After reading this book, readers will be prepared to introduce FV in their organization and effectively deploy FV techniques to increase design and validation productivity.

High Performance Parallelism Pearls Volume Two

  • 1st Edition
  • July 23, 2015
  • Jim Jeffers + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 3 8 1 9 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 8 9 0 - 1
High Performance Parallelism Pearls Volume 2 offers another set of examples that demonstrate how to leverage parallelism. Similar to Volume 1, the techniques included here explain how to use processors and coprocessors with the same programming – illustrating the most effective ways to combine Xeon Phi coprocessors with Xeon and other multicore processors. The book includes examples of successful programming efforts, drawn from across industries and domains such as biomed, genetics, finance, manufacturing, imaging, and more. Each chapter in this edited work includes detailed explanations of the programming techniques used, while showing high performance results on both Intel Xeon Phi coprocessors and multicore processors. Learn from dozens of new examples and case studies illustrating "success stories" demonstrating not just the features of Xeon-powered systems, but also how to leverage parallelism across these heterogeneous systems.

Dissecting the Hack

  • 1st Edition
  • July 20, 2015
  • Jayson E Street
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 4 2 7 8 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 4 2 8 2 - 3
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.

Advances in Computers

  • 1st Edition
  • Volume 98
  • June 17, 2015
  • Suyel Namasudra
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 2 1 3 2 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 3 4 0 - 2
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of significant, lasting value in this rapidly expanding field.

Adaptive User Interfaces

  • 1st Edition
  • December 6, 2014
  • Dermot Browne
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 2 5 - 4
This book describes techniques for designing and building adaptive user interfaces developed in the large AID project undertaken by the contributors.

A Comparative Study of Parallel Programming Languages: The Salishan Problems

  • 1st Edition
  • December 6, 2014
  • J.T. Feo
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 2 0 - 9
As execution speeds reach the physical limits of single cpu computers, the only hope of achieving greater computing power is with parallel systems. Researchers have proposed countless new programming languages, but their differences, similarities, strengths, weaknesses and problem domains are subtle and often not well understood. Informed comparison of parallel languages is difficult.This volume compares eight parallel programming languages based on solutions to four problems. Each chapter includes a description of the language's philosophy, semantics and syntax, and a solution to each problem. By considering solutions rather than language features or theoretical properties, the gap is bridged between the language specialists and users. Both professionals and students in the fields of computer and computational science will find the discussions helpful and understandable.

How to Defeat Advanced Malware

  • 1st Edition
  • December 5, 2014
  • Henry Dalziel
  • Simon Crosby
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 3 1 - 8
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 5 3 - 0
How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

Real Time Programming 1985

  • 1st Edition
  • June 28, 2014
  • G.M. Bull + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 8 0 3 - 0
Examines the entire field of real-time programming, with emphasis on the most recent developments in industrial control and the design of process control systems. The topics covered include programming of statistical quality control applications, graphical languages for real-time programming, programming of personal computers and work stations for real-time applications. Contains 17 papers.