In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Addressing the demand for authoritative information on...
Although formal analysis programming techniques may be quite old, the introduction of formal methods only dates from the 1980s. These techniques enable us to analyze the behavior of a software application, described in a programming language. It took until the end of the 1990s before formal methods or the B method could be implemented in...
Build your own sophisticated modular home security system using the popular Raspberry Pi board
About This Book
This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet
Building an analysis ecosystem for a smarter approach tointelligence
Keith Carter's Actionable Intelligence: A Guide to DeliveringBusiness Results with Big Data Fast! is the comprehensive guideto achieving the dream that business intelligence practitionershave been chasing since the concept itself came into being....
Data is rapidly becoming the powerhouse of industry, butlow-quality data can actually put a company at a disadvantage. Tobe used effectively, data must accurately reflect the real-worldscenario it represents, and it must be in a form that is usable andaccessible. Quality data...
You’ve mastered the basics, conquered the soldering iron, and programmed a robot or two; now you’ve got a set of skills and tools to take your Arduino exploits further. But what do you do once you’ve exhausted your to-build list?
Arduino Playground will show you how to keep your hardware hands busy...
UNIX® and Linux® System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.
Getting a jump on learning how coding makes technology work is essential to prepare kids for the future. Unfortunately, many parents, teachers, and mentors didn't learn the unique logic and language of coding in school. Helping Kids withCoding For Dummies comes to the...
Evolutionary Algorithms (EAs) are population-based, stochastic search algorithms that mimic natural evolution. Due to their ability to find excellent solutions for conventionally hard and dynamic problems within acceptable time, EAs have attracted interest from many researchers and practitioners in recent years. This book...
Embrace the exciting new technology of Raspberry Pi!
With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started...
This book is a tutorial on image processing. Each chapter explains basic
concepts with words and figures, shows image processing results with pho-
tographs, and implements the operations in C. Information herein comes
from articles published in The C/C++ Users Journal from 1990 through
1998 and from the first edition of this book...