Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
6,238 result(s) for "COMPUTERS Operating Systems General."
Sort by:
Mobile electronic commerce : foundations, development, and applications
\"Mobile commerce transactions continue to soar, driven largely by the ever-increasing adoption and use of smartphones and tablets. The use of this technology gives consumers the flexibility to shop whenever and wherever they want. This book addresses the role of industry, academia, scientists, engineers, professionals, and students in developing innovative new mobile commerce technologies and systems to further improve the consumer experience. It also discusses the impact of mobile commerce on society, economics, culture, organizations, government, industry, and our daily lives. This book brings together experts from multiple disciplines in industry and academia to stimulate new thinking in the development and application of mobile commerce technology. The book covers important mobile commerce topics, such as critical infrastructure management, mobile security issues, new applications and services, emerging development architectures, mobile business solutions, and future research opportunities. In addition to its multidisciplinary approach, the book also provides a cross-cultural approach intended to overcome cultural barriers and accelerate mobile commerce advancement in the global economy. Authors and researchers from around the world discuss a broad spectrum of methods, tools, and guidelines for designing mobile commerce systems and services in different cultures\"-- Provided by publisher.
Quantitative Graph Theory
This is the first book devoted exclusively to quantitative graph theory. It presents and demonstrates existing and novel methods for analyzing graphs quantitatively. Incorporating interdisciplinary knowledge from graph theory, information theory, measurement theory, and statistical techniques, this book covers a wide range of quantitative-graph theoretical concepts and methods, including those pertaining to real and random graphs. Through its broad coverage, this text fills a gap in the contemporary literature of discrete and applied mathematics, computer science, systems biology, and related disciplines.
Advanced infrastructure penetration testing
It has always been difficult to gain hands-on experience and a comprehensive understanding of advanced penetration testing techniques and vulnerability assessment and management. This book will be your one-stop solution to compromising complex network devices and modern operating systems. This book provides you with advanced penetration testing techniques that will help you exploit databases, web and application servers, switches or routers, Docker, VLAN, VoIP, and VPN. With this book, you will explore exploitation abilities such as offensive PowerShell tools and techniques, CI servers, database exploitation, Active Directory delegation, kernel exploits, cron jobs, VLAN hopping, and Docker breakouts. Moving on, this book will not only walk you through managing vulnerabilities, but will also teach you how to ensure endpoint protection. Toward the end of this book, you will also discover post-exploitation tips, tools, and methodologies to help your organization build an intelligent security system. By the end of this book, you will have mastered the skills and methodologies needed to breach infrastructures and provide complete endpoint protection for your system.
Reactive programming with Swift 4
Learn how to solve blocking user experience and build event based reactive applications with Swift. Key Features Build fast and scalable apps with RxSwift Apply reactive programming to solve complex problems and build efficient programs with reactive user interfaces Take expressiveness, scalability, and maintainability of your Swift code to the next level with this practical guide Book Description RxSwift belongs to a large family of Rx implementations in different programming languages that share almost identical syntax and semantics. Reactive approach will help you to write clean, cohesive, resilient, scalable, and maintainable code with highly configurable behavior. This book will introduce you to the world of reactive programming, primarily focusing on mobile platforms. It will tell how you can benefit from using RxSwift in your projects, existing or new. Further on, the book will demonstrate the unbelievable ease of configuring asynchronous behavior and other aspects of the app that are traditionally considered to be hard to implement and maintain. It will explain what Rx is made of, and how to switch to reactive way of thinking to get the most out of it. Also, test production code using RxTest and the red/ green approach. Finally, the book will dive into real-world recipes and show you how to build a real-world app by applying the reactive paradigm. By the end of the book, you’ll be able to build a reactive swift application by leveraging all the concepts this book takes you through. What you will learn Understand the practical benefits of Rx on a mobile platform Explore the building blocks of Rx, and Rx data flows with marble diagrams Learn how to convert an existing code base into RxSwift code base Learn how to debug and test your Rx Code Work with Playgrounds to transform sequences by filtering them using map, flatmap and other operators Learn how to combine different operators to work with Events in a more controlled manner. Discover RxCocoa and convert your simple UI elements to Reactive components Build a complete RxSwift app using MVVM as design pattern Who this book is for This book is for the developers who are familiar with Swift and iOS application development and are looking out to reduce the complexity of their apps. Prior experience of reactive programming is not necessary.
CompTIA cybersecurity analyst (CSA+) study guide: exam CS0-001
NOTE: The name of the exam has changed from CSA+ to CySA+. However, the CS0-001 exam objectives are exactly the same. After the book was printed with CSA+ in the title, CompTIA changed the name to CySA+. We have corrected the title to CySA+ in subsequent book printings, but earlier printings that were sold may still show CSA+ in the title. Please rest assured that the book content is 100% the same.Prepare yourself for the newest CompTIA certification The CompTIA Cybersecurity Analyst+ (CySA+) Study Guide provides 100% coverage of all exam objectives for the new CySA+ certification. The CySA+ certification validates a candidate's skills to configure and use threat detection tools, perform data analysis, identify vulnerabilities with a goal of securing and protecting organizations systems. Focus your review for the CySA+ with Sybex and benefit from real-world examples drawn from experts, hands-on labs, insight on how to create your own cybersecurity toolkit, and end-of-chapter review questions help you gauge your understanding each step of the way. You also gain access to the Sybex interactive learning environment that includes electronic flashcards, a searchable glossary, and hundreds of bonus practice questions. This study guide provides the guidance and knowledge you need to demonstrate your skill set in cybersecurity. Key exam topics include: Threat management Vulnerability management Cyber incident response Security architecture and toolsets
Harnessing the UEFI Shell
Focusing on the use of the UEFI Shell and its recently released formal specification, this book unlocks a wide range of usage models which can help people best utilize the shell solutions. This text also expands on the obvious intended utilization of the shell and explains how it can be used in various areas such as security, networking, configuration, and other anticipated uses such as manufacturing, diagnostics, etc. Among other topics, Harnessing the UEFI Shell demonstrates how to write Shell scripts, how to write a Shell application, how to use provisioning options and more. Since the Shell is also a UEFI component, the book will make clear how the two things interoperate and how both Shell developers as well as UEFI developers can dip into the other's field to further expand the power of their solutions. Harnessing the UEFI Shell is authored by the three chairs of the UEFI working sub-teams, Michael Rothman (Intel, chair of the UEFI Configuration and UEFI Shell sub-teams), Vincent Zimmer (Intel, chair of the UEFI networking sub-team and security sub-team), and Tim Lewis (Insyde Software, chair of the UEFI security sub-team). This book is perfect for any OEMs that ship UEFI-based solutions (which is all of the MNCs such as IBM, Dell, HP, Apple, etc.), software developers who are focused on delivering solutions targeted to manufacturing, diagnostics, hobbyists, or stand-alone kiosk environments.
Rechnerarchitektur: Einfuhrung in den Aufbau moderner Computer
The author offers a step-by-step introduction to the basic architecture of modern computers, placing an emphasis on clarity and transparency. The book covers the standard elements in an introductory university course on computer architecture. It includes over 120 exercises with solutions, making it an ideal work for self-study or for lecture preparation and follow-up.
Quick Boot
Quick Boot is designed to give developers a background in the basic architecture and details of a typical boot sequence. More specifically, this book describes the basic initialization sequence that allows developers the freedom to boot an OS without a fully featured system BIOS. Various specifications provide the basics of both the code bases and the standards. This book also provides insights into optimization techniques for more advanced developers. With proper background information, the required specifications on hand, and diligence, many developers can create quality boot solutions using this text. Pete Dice is Engineering Director of Verifone, where he manages OS Engineering teams in Dublin, Ireland and Riga Latvia. Dice successfully launched Intel® Quark™, Intel's first generation SoC as well as invented the Intel® Galileo™ development board and developed a freemium SW strategy to scale Intel IoT gateway features across product lines. He is also credited with architecting the \"Moon Island\" software stack and business model.
Learn Swift by Building Applications
Swift Language is now more powerful than ever; it has introduced new ways to solve old problems and has gone on to become one of the fastest growing popular languages. It is now a de-facto choice for iOS developers and it powers most of the newly released and popular apps. This practical guide will help you to begin your journey with Swift.