Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
25,569
result(s) for
"Computer networks Programming."
Sort by:
Working with Linux : quick hacks for the command line : shell scripting hacks for Linux developers
Instructs readers on how to increase productivity by using Terminator, Guake, and other tools.
Programming multi-agent systems in AgentSpeak using Jason
by
Hübner, Jomi Fred
,
Wooldridge, Michael
,
Bordini, Rafael H
in
Computer programming
,
Electronics
,
Intelligent agents (Computer software)
2007
This text provides a detailed, practical guide to building multi-agent systems using Jason, one of the most prominent agent programming languages.
Network programming with Go : essential skills for using and securing networks
Dive into key topics in network architecture and Go, such as data serialization, application level protocols, character sets and encodings. This book covers network architecture and gives an overview of the Go language as a primer, covering the latest Go release. Beyond the fundamentals, Network Programming with Go covers key networking and security issues such as HTTP and HTTPS, templates, remote procedure call (RPC), web sockets including HTML5 web sockets, and more. Additionally, author Jan Newmarch guides you in building and connecting to a complete web server based on Go. This book can serve as both as an essential learning guide and reference on Go networking. What You Will Learn Master network programming with Go Carry out data serialization Use application-level protocols Manage character sets and encodings Deal with HTTP(S) Build a complete Go-based web server Work with RPC, web sockets, and more Who This Book Is For Experienced Go programmers and other programmers with some experience with the Go language.
E-business Implementation
2002,2007
'E-business Implementation' is written as a complete guide to successful e-business delivery, from both a project management and a detailed technological perspective. E-business provides a powerful mechanism for organizations to increase productivity and lower costs. However, in order to utilise these considerable benefits, companies must ensure their e-business is implemented correctly and is appropriate to their market segment. 'E-business Implementation' provides a comprehensive guide to successful implementation and is divided into three parts:
Part one begins with a project management structure designed to deliver successful e-business functionality within time and budget, while avoiding the high failure rates common to many technology projects.
Part two details key concepts, technologies, products, vendors, benefits, limitations, and high-level design architectures for e-business, in a phased and risk-managed approach. These include publishing through the Internet and Intranets, portals and content management systems, transacting using e-commerce, integrating internal enterprise applications, integrating with external partners and suppliers, and responding in real-time to changing levels of demand through dynamic e-business and web services.
Part three details a set of critical foundation technologies that must be implemented correctly for the e-business initiative to be successful. These technologies include e-business development languages such as Java, XML and .Net, hardware platforms and their operating systems, security and networking systems, the Internet Domain Name System, and Open Source technologies.
Practical contiki-NG : programming for wireless sensor networks
Explore how to develop and implement wirless server networks (WSN) using Contiki-NG, branded as the operating system for the IoT. The book explains Contiki-NG's advantages in sensing, communication, and energy optimization and enables you to begin solving problems in automation with WSN. \"Practical Contiki-NG\" is a guide to getting started with Contiki-NG programming featuring projects that demonstrate a variety of applications. This book takes a practical and content-driven approach to the latest technologies, including Raspberry Pi, IoT and cloud servers. Readers will go through step-by-step guides and sample scenarios such as sensing, actuating, connectivity, building middleware, and utilizing IoT and cloud-based technologies.
Google hacking for penetration testers
2005,2004
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don’t realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker’s search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as \"Google Hacking.\" When the modern security landscape includes such heady topics as \"blind SQL injection\" and \"integer overflows,\" it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious \"Google hackers,\" this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage.*First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about \"Google Hacking\" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Generative deep learning : teaching machines to paint, write, compose, and play
\"Generative modeling is one of the hottest topics in AI. It's now possible to teach a machine to excel at human endeavors such as painting, writing, and composing music. With this practical book, machine-learning engineers and data scientists will discover how to re-create some of the most impressive examples of generative deep learning models, such as variational autoencoders, generative adversarial networks (GANs), encoder-decoder models, and world models. Author David Foster demonstrates the inner workings of each technique, starting with the basics of deep learning before advancing to some of the most cutting-edge algorithms in the field. Through tips and tricks, you'll understand how to make your models learn more efficiently and become more creative.\"--Amazon.com.
Programming Issues
by
Dongarra, Jack J.
,
Lastovetsky, Alexey L.
in
arithmetic heterogeneity
,
fault tolerance issues of scientific programming for heterogeneous platforms
,
heterogeneous networks of computers and programming
2009
This chapter contains sections titled:
Performance
Fault Tolerance
Arithmetic Heterogeneity
Book Chapter