Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
LanguageLanguage
-
SubjectSubject
-
Item TypeItem Type
-
DisciplineDiscipline
-
YearFrom:-To:
-
More FiltersMore FiltersIs Peer Reviewed
Done
Filters
Reset
172,383
result(s) for
"COMPUTERS / General."
Sort by:
Performance Modeling and Design of Computer Systems
by
Harchol-Balter, Mor
in
Computer systems
,
Computer systems -- Design and construction -- Mathematics
,
COMPUTERS / General. bisacsh
2013
Tackling the questions that systems designers care about, this book brings queueing theory decisively back to computer science. The book is written with computer scientists and engineers in mind and is full of examples from computer systems, as well as manufacturing and operations research. Fun and readable, the book is highly approachable, even for undergraduates, while still being thoroughly rigorous and also covering a much wider span of topics than many queueing books. Readers benefit from a lively mix of motivation and intuition, with illustrations, examples and more than 300 exercises – all while acquiring the skills needed to model, analyze and design large-scale systems with good performance and low cost. The exercises are an important feature, teaching research-level counterintuitive lessons in the design of computer systems. The goal is to train readers not only to customize existing analyses but also to invent their own.
Computer Security and Encryption - An Introduction
by
Chauhan, S. R
,
Jangra, S
in
big data analytics
,
cloud
,
COM053000 COMPUTERS / Security / General
2020
Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers.
Cybersecurity - A Self-Teaching Introduction
by
Garg, Amit
,
Goyal, K. K
in
Business enterprises
,
COM053000 COMPUTERS / Security / General
,
Computer networks
2020
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, self-teaching format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, Cyberlaw, and more. Features: Provides an overview of cybersecurity and cybercrime subjects in an easy to understand, self-teaching format; Includes discussion of information systems, cryptography, data and network security, threats and viruses, electronic payment systems, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, and more.
Flowchart and Algorithm Basics
2020
Including applied and illustrative examples from different subject areas, this book aims to equip readers with all the best, most efficient, and well-structured programming logic in the form of flowcharts and algorithms. --
Programming Fundamentals Using MATLAB
2020
This book covers the MATLAB syntax and the environment, suitable for someone with no programming background. The first four chapters present information on basic MATLAB programming including computing terminology, MATLAB specific syntax and control structures, operators, arrays, and matrices. The next cluster covers grouping data, working with files, making images, creating graphical user interfaces, experimenting with sound, and the debugging environment. The final three chapters contain case studies on using MATLAB and other tools and devices (e.g., Arduino, Linux, Git, Mex, etc.) important for basic programming knowledge. Companion files with code and 4-color figures are on the disc or available from the publisher.
Connected Code
by
Yasmin B. Kafai
,
Quinn Burke
in
Computer programming
,
Computer programming -- Study and teaching (Secondary)
,
Computers and children
2014
Coding, once considered an arcane craft practiced by solitary techies, is now recognized by educators and theorists as a crucial skill, even a new literacy, for all children. Programming is often promoted in K-12 schools as a way to encourage \"computational thinking\" -- which has now become the umbrella term for understanding what computer science has to contribute to reasoning and communicating in an ever-increasingly digital world.InConnected Code,Yasmin Kafai and Quinn Burke argue that although computational thinking represents an excellent starting point, the broader conception of \"computational participation\" better captures the twenty-first-century reality. Computational participation moves beyond the individual to focus on wider social networks and a DIY culture of digital \"making.\" Kafai and Burke describe contemporary examples of computational participation: students who code not for the sake of coding but to create games, stories, and animations to share; the emergence of youth programming communities; the practices and ethical challenges of remixing (rather than starting from scratch); and the move beyond stationary screens to programmable toys, tools, and textiles.
Redux Made Easy with Rematch
by
Moreno, Sergio
in
COM005000 COMPUTERS / Enterprise Applications / General
,
COM060080 COMPUTERS / Web / General
,
COMPUTERS / General
2021
Discover the power of Rematch and its plugins by building a real-world application from scratch
Key Features
Get to grips with the capabilities of Rematch quickly as you build applicationsLearn to use Rematch and its plugins to simplify everyday tasksTake total control of the application state and manage its scalability using Rematch
Book Description
Rematch is Redux best practices without the boilerplate. This book is an easy-to-read guide for anyone who wants to get started with Redux, and for those who are already using it and want to improve their codebase. Complete with hands-on tutorials, projects, and self-assessment questions, this easy-to-follow guide will take you from the simplest through to the most complex layers of Rematch. You’ll learn how to migrate from Redux, and write plugins to set up a fully tested store by integrating it with vanilla JavaScript, React, and React Native. You'll then build a real-world application from scratch with the power of Rematch and its plugins. As you advance, you’ll see how plugins extend Rematch functionalities, understanding how they work and help to create a maintainable project. Finally, you'll analyze the future of Rematch and how the frontend ecosystem is becoming easier to use and maintain with alternatives to Redux. By the end of this book, you'll be able to have total control of the application state and use Rematch to manage its scalability with simplicity.
What you will learn
Understand the principal concepts of Flux and ReduxFind out what the main problems are that Rematch solvesBecome familiar with the Rematch ecosystemDevelop an application using Rematch and React togetherWrite unit and integration tests to get 100% test coverage of your programs with RematchCreate a React Native app with Rematch and ExpoPersist data with redux-persist and RematchBuild a Rematch plugin from scratch
Who this book is for
This book is for React and Redux users looking for better alternatives for Redux. Familiarity with JavaScript, React, and Redux will help you make the most of this book.
Formation Control of Multi-Agent Systems
2019,2018
Formation Control of Multi-Agent Systems: A Graph Rigidity Approach Marcio de Queiroz, Louisiana State University, USA Xiaoyu Cai, FARO Technologies, USA Matthew Feemster, U.S. Naval Academy, USA A comprehensive guide to formation control of multi-agent systems using rigid graph theory This book is the first to provide a comprehensive and unified treatment of the subject of graph rigidity-based formation control of multi-agent systems. Such systems are relevant to a variety of emerging engineering applications, including unmanned robotic vehicles and mobile sensor networks. Graph theory, and rigid graphs in particular, provides a natural tool for describing the multi-agent formation shape as well as the inter-agent sensing, communication, and control topology. Beginning with an introduction to rigid graph theory, the contents of the book are organized by the agent dynamic model (single integrator, double integrator, and mechanical dynamics) and by the type of formation problem (formation acquisition, formation manoeuvring, and target interception). The book presents the material in ascending level of difficulty and in a self-contained manner; thus, facilitating reader understanding. Key features: Uses the concept of graph rigidity as the basis for describing the multi-agent formation geometry and solving formation control problems. Considers different agent models and formation control problems. Control designs throughout the book progressively build upon each other. Provides a primer on rigid graph theory. Combines theory, computer simulations, and experimental results. Formation Control of Multi-Agent Systems: A Graph Rigidity Approach is targeted at researchers and graduate students in the areas of control systems and robotics. Prerequisite knowledge includes linear algebra, matrix theory, control systems, and nonlinear systems.