The objectives of this book are to provide a solid foundation for the classical the
ory of sequential algorithms and to cover some of the most important recent al
gorithmic developments, including the rapidly advancing theory of parallel and
distributed algorithms. The book is intended to serve as a text for a core upper...
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...
Our main aim in writing this book is to make the concepts of pattern recognition clear
to undergraduate and postgraduate students of the subject. We will not deal with
pre-processing of data. Rather, assuming that patterns are represented using some
appropriate pre-processing techniques in the form of vectors of numbers, we will...
The short history of computing machines has witnessed some major events, which
forever transformed our usage of technology. From the first massive main frames to
the democratization of personal computers, and then the interconnection of networks.
Mobility is the next revolution. Like the primitive soup, all the ingredients are now...
Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...
The world of hacking is a world of pain and frustration. Frustration for the hacker as
he tries to figure out how to break the latest and greatest security device, and pain for
the manufacturer or corporation that made or was relying on that device.
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...
Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV.
Soon, Android will be in cars and all sort of other places as well.
However, the general theme of Android devices will be smaller screens and/or no
hardware keyboard. And, by the numbers, Android will probably be associated mostly
with smartphones for...
Computers are at the heart of most activities nowadays. A processor is the central component of
a computer, but nowadays, we can find processors embedded in many other components, such as
game consoles, consumer electronic devices and cars, just to mention a few.
This lecture presents a thorough study of the microarchitecture...
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...
Concurrent processes can exhibit extremely complicated behavior, and
neither informal reasoning nor testing is reliable enough to establish their
correctness. In this thesis, we develop a new technique for the verification
of parallel programs. The technique is stated in terms of axioms and inference
rules, and it is used to prove...
Recent advances in digital communications and storage technologies
have brought major changes for consumers. High-capacity hard disks
and DVDs can store large amounts of audiovisual data. In addition, faster
Internet connection speeds and the emerging high bitrate DSL connections
provide sufficient bandwidth for entertainment...
Microsoft Visual Basic for Applications (VBA) is an exceptional programming language and
environment. The language has grown out of a need to have a programming language that
would allow more business-focused individuals to write programs, but equally support the
programming features that developers look for in a product. The...