Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...
The intention of this book is to provide a thorough reference for those considering a migration
into the virtualized world. The majority of our target readers will likely be seasoned system
administrators and engineers who grew up in and still manage primarily a hardware-based
server environment containing a large assortment of both...
The field of machine perception concerns the building of machines
that sense and interpret their environments. This book is about visual
perception. Potential applications for such systems include tasks such as
automation of industrial processes of inspection and assembly,
automated medical x-ray diagnosis, vehicle guidance and...
Crystallization from solution is a core technology in major sectors of the
chemical process and allied industries. Crystals are produced in varying sizes
ranging from as small as a few tens of nanometers to several millimetres
or more, both as discrete particles and as structured agglomerates. Well-
established examples include bulk...
Information is the lifeblood of knowledge, the flotsam of events and perspectives
created in every second of history. There is so much to capture and yet so little
time and so few resources to make sense of it all. Just as we get tantalisingly
close, the holy grail of true knowledge slips further over the horizon.
The 14th International Conference on Human–Computer Interaction, HCI International
2011, was held in Orlando, Florida, USA, July 9–14, 2011, jointly
with the Symposium on Human Interface (Japan) 2011, the 9th International
Conference on Engineering Psychology and Cognitive Ergonomics, the 6th International
Conference on...
Introduction to Microcontrollers is a comprehensive introductory text/reference for electrical and computer engineers, students, and even hobbyists who have little experience in a high-level programming language. The book helps them understand how a typical microcontroller executes assembly language instructions and addressing modes on...
To be successful, the portable electronic designer must view the prod-
uct design process as a part of a broader process of product development.
While the insights and creativity of the individual designer are critical
in creating a successful product, the designer must be prepared to
engage through every phase of product development...
Welcome to Java Foundations. This book is designed to serve as the primary
resource for a two- or three-term introductory course sequence, ranging from the
most basic programming concepts to the design and implementation of complex
data structures. This unified approach makes the important introductory
sequence more cohesive and...
Project management is more than merely parceling out work assignments to
individuals and hoping that they will somehow accomplish a desired result. In
fact, projects that could have been successful often fail because of such take-itfor-
granted approaches. Individuals need hard information and real skills to
work successfully in a...
Computer vision is the science and technology of making machines that see.
It is concerned with the theory, design and implementation of algorithms that
can automatically process visual data to recognize objects, track and recover
their shape and spatial layout.
The International Computer Vision Summer School - ICVSS was...
In the five months that I have been researching and writing Cloud Computing Bible, it has become clear to me that most people recognize that cloud computing is a big deal, even if they are not really clear why that is so. Every day newspaper and magazine articles and radio and TV stories report on cloud computing. The phrase “in the...