PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security,...
Learn how to get the most out of all the newest features of Photoshop and improve your images with "Complete Adobe Photoshop CS4 for Digital Photographers." Photoshop is the new darkroom, providing instant results and making professional-level tools accessible even to amateurs. This new edition of the book is filled with brand new...
This book is a gift from the Windows Phone 7 team at Microsoft to the programming community, and I am proud to have been a part of it. Within the pages that follow, I show you the basics of writing applications for Windows Phone 7 using the C# programming language with the Silverlight and XNA 2D frameworks.
Most Internet applications use sockets to implement network communication protocols. TCP/IP Sockets in Java: Practical Guide for Programmers, with its focused, tutorial-based coverage, helps you master the tasks and techniques essential to virtually all client-server projects using sockets in Java. Later chapters teach you to implement...
I am very pleased to have this new book in the Aho/Ullman series Principles of Computer Science. I see this book as a major step toward making computer science theory accessible to the wide range of students who need to know the subject. It covers a good segment of the classical material on data structures and algorithms, but it does so in a...
This book is primarily designed for a senior undergraduate class in Categorical Data Analysis and for majors in biomedical, biostatistics and statistics programs, but can also be used as reference text for researchers working in the area, and /or for an introductory text in a graduate course on the subject. A prerequisite of a one year...
Computer graphics is more than an isolated discipline at an intersection of computer science, mathematics, and engineering. It is the very visible leading edge of a revolution in how we use computers and automation to enhance our lives. It has changed forever the worlds of engineering and science, medicine, and the media, too. The wonderful...
The Verilog language is a hardware description language that provides a means of specifying a digital system at a wide range of levels of abstraction. The language supports the early conceptual stages of design with its behavioral level of abstraction, and the later implementation stages with its structural abstractions. The language includes...
The main motivation to write this book came from all our problems to find suitable material for a textbook that would really help us to teach the practical aspects of data analysis together with the needed theoretical underpinnings. Many books out there tackle either one or the other of these aspects (and, especially for the latter, there are...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....
3G, HSPA and FDD versus TDD Networking, Second Edition is the only book that contrasts the network capacity gains that may be achieved with the advent of adaptive antenna arrays and HSDPA-style adaptive modulation techniques in the context of FDD and TDD CDMA cellular networks. In the five years since the first edition of this...
So you are a computer science (CS) major and you are sitting down to see what this book is about. It has been assigned, the course is required, you have no choice. Still you chose your institution, your major. Maybe your instructor made a good choice. Let's hope so.
Okay, you are not a computer science major, perhaps not even a...