- Table View
- List View
Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers
by Kenneth GeisshirtThis book provides a practical approach to UNIX/Linux authentication. The design principles are explained thoroughly, then illustrated through the examination of popular modules. It is intended as a one-stop introduction and reference to PAM. This book is for experienced system administrators and developers working with multiple Linux/UNIX servers or with both UNIX and Windows servers. It assumes a good level of admin knowledge, and that developers are competent in C development on UNIX-based systems.
PoC or GTFO
by Manul Laphroaig<p>This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. <p>Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide. <p>Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. <p>The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.
PoC or GTFO, Volume 2
by Manul LaphroaigPoC or GTFO, Volume 2 follows-up the wildly popular first volume with issues 9-13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays.The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This second collected volume holds all of the articles from releases nine to thirteen.Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under Linux. How to slow the Windows kernel when exploiting a race condition and how to make a PDF file taht is also an Android app, an audio file, or a Gameboy speedrun. How to hack a Wacom pen table with voltage glitching, then hack it again by pure software to read RDID tags from its surface. How to disassemble every last byte of an Atari game and how to bypass every classic form of copy protection on Apple ][.But above all else, beyond the nifty tricks and silly songs, this book exists to remind you what a clever engineer can build from a box of parts with a bit of free time. Not to show you what others have done, but to show you how they did it so that you can do the same.
PoC or GTFO, Volume 3
by Manul LaphroaigVolume 3 of the PoC || GTFO collection--read as Proof of Concept or Get the Fuck Out--continues the series of wildly popular collections of this hacker journal. Contributions range from humorous poems to deeply technical essays bound in the form of a bible.The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated collection of short essays on computer security, reverse engineering and retrocomputing topics by many of the world's most famous hackers. This third volume contains all articles from releases 14 to 18 in the form of an actual, bound bible.Topics include how to dump the ROM from one of the most secure Sega Genesis games ever created; how to create a PDF that is also a Git repository; how to extract the Game Boy Advance BIOS ROM; how to sniff Bluetooth Low Energy communications with the BCC Micro:Bit; how to conceal ZIP Files in NES Cartridges; how to remotely exploit a TetriNET Server; and more.The journal exists to remind us of what a clever engineer can build from a box of parts and a bit of free time. Not to showcase what others have done, but to explain how they did it so that readers can do these and other clever things themselves.
Pocket CIO – The Guide to Successful IT Asset Management: Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide
by Phara McLachlanCreate and manage a clear working IT asset management strategy with this unique guideKey FeaturesA detailed IT Asset Management (ITAM) guidebook with real-world templates that can be converted into working ITAM documentsIncludes in-depth discussion on how risk management has changed and the possible solutions needed to address the new normalA step-by-step ITAM manual for newbies as well as seasoned ITAM veteransBook DescriptionThis book is a detailed IT Asset Management (ITAM) guidebook with real-world templates that can be converted into working ITAM documents. It is a step-by-step IT Asset Management manual for the newbies as well as the seasoned ITAM veterans, providing a unique insight into asset management. It discusses how risk management has changed over time and the possible solutions needed to address the new normal. This book is your perfect guide to create holistic IT Asset Management and Software Asset Management programs that close the risk gaps, increases productivity and results in cost efficiencies. It allows the IT Asset Managers, Software Asset Managers, and/or the full ITAM program team to take a deep dive by using the templates offered in the guidebook. You will be aware of the specific roles and responsibilities for every aspect of IT Asset Management, Software Asset Management, and Software License Compliance Audit Response. By the end of this book, you will be well aware of what IT and Software Asset Management is all about and the different steps, processes, and roles required to truly master it.What you will learnClose the hidden risk gaps created by IT assets (hardware and software)Create and manage a proactive ITAM and SAM program and policyA clear, concise explanation of what IT Asset Management and Software Asset Management is, the benefits, and resultsThe best ways to manage a software audit and how to be prepared for oneConsiderations for selecting the best technology for a specific company including what questions should be asked at the onsetIncreasing ITAM program and project success with change managementWho this book is forThis book is intended for CIOs, VPs and CTOs of mid to large-sized enterprises and organizations. If you are dealing with changes such as mergers, acquisitions, divestitures, new products or services, cyber security, mandated regulations, expansion, and much more, this book will help you too.
Pod Racer (Level Up)
by R. T. MartinA11_4_ON3 is a gamer who likes to look out for himself—especially when it comes to winning. When he learns he's part of a four-player team with his former gaming crew, no one is happy to work together again. But their team must win this virtual reality racing game, or they'll be trapped inside the virtual world forever. Can he change his attitude for the sake of his team? Or will his self-centered playing be their downfall?
Podcast Journalism: The Promise and Perils of Audio Reporting
by David DowlingPodcasting’s stratospheric rise has inspired a new breed of audio reporting. Offering immersive storytelling for a binge-listening audience as well as reaching previously underserved communities, podcasts have become journalism’s most rapidly growing digital genre, buoying a beleaguered news industry. Yet many concerns have been raised about this new medium, such as the potential for disinformation, the influence of sponsors on content, the dominance of a few publishers and platforms, and at-times questionable adherence to journalistic principles.David O. Dowling critically examines how podcasting and its evolving conventions are transforming reporting—and even reshaping journalism’s core functions and identity. He considers podcast reporting’s most influential achievements as well as its most consequential ethical and journalistic shortcomings, emphasizing the reciprocal influences between podcasting and traditional and digital journalism. Podcasting, both as a medium and a business, has benefited from the blurring of boundaries separating news from entertainment, editorial from advertising, and neutrality from subjectivity. The same qualities and forces that have allowed podcasting to bypass the limitations of traditional categories, expand the space of social and political discourse, and provide openings for marginalized voices have also permitted corporations to extend their reach and far-right firebrands to increase their influence. Equally attentive to the medium’s strengths and flaws, this is a vital book for all readers interested in how podcasting has changed journalism.
Podcast Master
by Ben GreenSenior multimedia producer at the Guardian, Ben Green, tells you everything you need to know about podcasting. Ben Green has been podcasting for over a decade. He has been responsible for several top podcasts, including Football Weekly, the UK's number one sports podcast,and the Guardian Guide to Running podcast.In Podcast Master, he provides a one-stop insider’s guide to everything you need to know about hosting, editing and producing online shows. It is packed with recommendations to help you get the right software and gear, advice on sponsorship and advertising, and tips on everything from platform selection to promotional artwork design.Green’s enthusiasm for the medium’s breadth and depth is infectious. With wit and verve, he takes us through the history of podcasting, shares his recommendations for the podcasts you should be listening to, and reveals proven techniques for reaching and building your audience.Whether you're broadcasting from your bedroom, or are a brand looking to enhance your profile, this authoritative, easy to follow and cutting-edge guide will give you the tools to start a podcast from scratch – or maximise your current one.
Podcasting For Dummies
by Tee Morris Chuck TomasiProduce a podcast like the pros More people than ever are turning to podcasts for on-demand, mobile entertainment and information. Podcasting For Dummies offers a fast and easy way to get the know-how you need to produce and distribute one of your very own. Written by a pair of podcasting pioneers, this book shares insight on the technology behind recording, editing, and sharing podcasts, along with tips and tricks on how to produce a pro-level podcast. Podcasting has enjoyed a recent boom thanks to a new crop of hit podcasts catching the ears of the public and media along with the continued growth of mobile and streaming devices as a source for entertainment. If you want to jump on the podcasting bandwagon, you've come to the right place! In this fully updated edition, would-be and experienced podcasters alike will get all the tech information, production insight, and promotional tips they need to either get a podcast off the ground or improve on an existing one. Get the gear you need Find your podcasting voice Find and build an audience Plan your podcast New tools have made it easier than ever to create a podcast—and this book shows you how.
Podcasting For Dummies
by Tee Morris Chuck TomasiUnderstand the do's and don'ts of podcasting Produce unique content that attracts listeners Build a studio that rivals pro podcasters How to talk your way to the top As more and more people turn to podcasts for entertainment, information, and education, the market for new players has never been bigger—or more competitive. And with corporations and A-list celebs moving in on the action, it's more important than ever to know how to stand out from the crowd. Written by two podcasting veterans, this book gives you everything you need to launch a podcast. Get the insider info on how to produce quality audio (and even video), keep your content fresh, find your voice, and build an audience. Inside... Building your podcasting studio Developing your podcast theme Conducting great interviews Recording and editing episodes Distributing your podcast Adding sponsorships Expanding your podcast consumption
Podcasting For Dummies
by Tee Morris Chuck TomasiStep up to the mic and unleash your inner host with Podcasting For Dummies Ever wonder what it takes to get your very own podcast up and running? How to get the gear you need, pick a great topic, secure fascinating guests, and assemble it all into a refined and irresistible product? Well wonder no more! Because Podcasting For Dummies has the essential guidance you need to get your brand-new podcast up and running. From selecting the right recording equipment to identifying an audience and pro-level production tips, you'll find all the killer info to help you get started on your next big idea. You'll also get: Software and hardware tips to create and produce a crystal-clear podcast Interview advice, whether you'll be seeing your guests in-person or over Zoom Strategies for choosing the perfect platform, finding sponsors, and advertising and marketing your new creation Pointers for setting up a streaming account and doing live podcasting like an expert With everyone from A-list brands to world-famous celebrities getting in on the podcast craze, it's time you took your turn on the mic. Grab Podcasting For Dummies today and turn up the volume on the practice that's transformed countless amateurs into household names!
Podcasting For Dummies, 2nd Edition
by Tee Morris Chuck Tomasi Evo TerraNew tools have made it easier to create a podcast. The second edition of Podcasting For Dummies shows you how you can create and distribute your own online recordings using tools you already have. This edition also covers what you need to build a top-notch podcasting studio. Expert podcasters Tee Morris and Evo Terra are joined on this edition by a fellow podcasting guru, Chuck Tomasi, to walk you through recording, editing, posting, and promoting a podcast. Chapters cover: Choosing a topic that fits your expertise Writing an outline or script for your podcast Turning your existing computer into a desktop podcasting studio Picking the microphone, headphones, and audio editing software that best suit your needs Upgrading to pro-level podcasting equipment Conducting interviews and recording an interview subject who's not in the room with you Navigating the XML code you need to share your podcast Finding a place to host your podcast online Promoting your podcasts in the blogosphere, online discussion groups, and social networking sites Seeking out sponsors, advertising, and subscriptions to make your podcast pay Creating podcasts designed to promote a business
Podcasting Hacks
by Jack HerringtonPodcasting does for Internet audio listeners what TiVo does for television viewers--it puts you in charge of when you enjoy a program. Podcasting is a web-based broadcast medium that sends audio content (most commonly in the MP3 format) directly to an iPod or other digital audio player. You subscribe to audio feeds, receive new files automatically, and listen to them at your convenience. As you can imagine, podcasting is taking the "blogsphere" by storm. A podcast is a professional-quality Internet radio broadcast, and like blogging and HTML before it, this revolutionary new way of publishing to the Internet has become the new outlet for personal expression. If you've got Internet access and a copy of Podcasting Hacks, you can find out just how easy it is to listen to and create your own Internet audio programs. With Podcasting Hacks , Jack Herrington, a software engineer with 20 years of experience developing applications using a diverse set of languages and tools, delivers the ultimate how-to of podcasting for anyone looking to get the most out of this hot new medium. Since August 2004 (the month that iPodder.com editor Adam Curry considers the start of podcasting), audio blogging has exploded. Podcasts cover every conceivable topic, including sex, relationships, technology, religion, home brewing, recreational drugs, rock 'n roll, food, entertainment, politics, and much more. There were podcasts from the Democratic National Convention in Fall 2004, and some programs on Air America and NPR are also podcasts. Podcasting Hacks offers expert tips and tools for blogging out loud--for transmitting (and receiving) audio content worldwide with ease. This groundbreaking volume covers both entry-level and advanced topics perfect for aspiring and experienced podcasters. Herrington shows you how to get started, create quality sound, use the right software, develop a great show, distribute a podcast, and build an audience. More advanced topics include audio editing, podcasting on the go, and even videocasting.
Podcasting Marketing Strategy: A Complete Guide to Creating, Publishing and Monetizing a Successful Podcast
by Daniel Rowles Ciaran RogersPodcasting is a hugely persuasive yet under-utilized channel accessed by an affluent and influential demographic. In a crowded and noisy digital environment, it gives organizations, brand builders and marketers the unique opportunity to stand out and drive engagement with target audiences. It offers accurate and measurable levels of allegiance that can only be dreamed of on other digital channels. Podcasting Marketing Strategy is a complete guide to the podcast environment. It describes the importance of podcasting for businesses and explains why, uniquely, it has the highest level of consumer commitment than any other social media. Written by an award-winning author and his co-host of the global top ten iTunes podcast, The Digital Marketing Podcast, this book explains how podcasting can drive business results, advises on how to record, edit and advertise your content and provides a unique digital marketing toolkit. Supported by case studies from influential organizations around the globe, Podcasting Marketing Strategy is the definitive authority to making and publishing podcasts that deliver quantifiable results.
Podcasts in der Unternehmenskommunikation: Wie Sie mit strategischen Audioformaten Ihre Zielgruppen erreichen (essentials)
by Stephan SchreyerDieses Buch gibt einen schnellen Überblick über das Thema Podcast. Wie muss das Thema Podcast strategisch angegangen werden, damit es nachhaltig einen Mehrwert für ein Unternehmen bietet? Sind Podcasts nur ein Hype oder können sie sinnvoller Teil des Kommunikations- und Marketingmixes eines Unternehmens sein? Podcasts sind der aktuelle Trend in der Kommunikation und im Marketing. Täglich kommen unzählige neue Formate auf den Markt. Die hohe Smartphonedichte, ein verändertes Mediennutzungsverhalten, bessere mobile Datenverfügbarkeit und große Player wie Audible und Spotify haben geholfen, das klassische „Hörspiel“ in moderner Form aus der Versenkung zu holen. Dieses essential hilft dabei, strategisch eigene Podcastmaßnahmen für das Unternehmen zu entwickeln.
Podman for DevOps: Containerization reimagined with Podman and its companion tools
by Alessandro Arrichiello Gianni Salinetti Brent J. BaudeBuild, deploy, and manage containers with the next-generation engine and toolsKey FeaturesDiscover key differences between Docker and PodmanBuild brand new container images with Buildah, the Podman companionLearn how to manage and integrate containers securely in your existing infrastructureBook DescriptionAs containers have become the new de facto standard for packaging applications and their dependencies, understanding how to implement, build, and manage them is now an essential skill for developers, system administrators, and SRE/operations teams. Podman and its companion tools Buildah and Skopeo make a great toolset to boost the development, execution, and management of containerized applications.Starting with the basic concepts of containerization and its underlying technology, this book will help you get your first container up and running with Podman. You'll explore the complete toolkit and go over the development of new containers, their lifecycle management, troubleshooting, and security aspects. Together with Podman, the book illustrates Buildah and Skopeo to complete the tools ecosystem and cover the complete workflow for building, releasing, and managing optimized container images. Podman for DevOps provides a comprehensive view of the full-stack container technology and its relationship with the operating system foundations, along with crucial topics such as networking, monitoring, and integration with systemd, docker-compose, and Kubernetes.By the end of this DevOps book, you'll have developed the skills needed to build and package your applications inside containers as well as to deploy, manage, and integrate them with system services.What you will learnUnderstand Podman's daemonless approach as a container engineRun, manage, and secure containers with PodmanDiscover the strategies, concepts, and command-line options for using Buildah to build containers from scratchManage OCI images with SkopeoTroubleshoot runtime, build, and isolation issuesIntegrate Podman containers with existing networking and system servicesWho this book is forThe book is for cloud developers looking to learn how to build and package applications inside containers and system administrators who want to deploy, manage, and integrate them with system services and orchestration solutions. This book provides a detailed comparison between Docker and Podman to aid you in learning Podman quickly.
Podman in Action: Secure, rootless containers for Kubernetes, microservices, and more
by Daniel WalshThe next generation of containers is here. Learn Podman directly from its creator, discover its exceptional security features, and start managing rootless containers that integrate easily into your systems. In Podman in Action you will learn how to: Build and run containers in rootless mode Develop and manage pods Use SystemD to oversee a container&’s lifecycle Work with the Podman service via Python Keep your containers confined using Podman security features Manage containerized applications on edge devices Podman in Action shows you how to deploy containerized applications on Linux, Windows, and MacOS systems using Podman. Written by Daniel Walsh, who leads the Red Hat Podman team, this book teaches you how to securely manage the entire application lifecycle without human intervention. You&’ll quickly get to grips with Podman&’s unique advantages over Docker, and learn how easy it is to migrate your Docker-based infrastructure. It also demonstrates how, with Podman, you can easily convert containerized applications into Kubernetes-based microservices. About the technology It&’s time to upgrade your container engine! The Podman container manager delivers flexible image layer control, seamless Kubernetes compatibility, and rootless containers that can be created, run, and managed by users without admin rights. Plus, its OCI-compliant support for the Docker API lets you shift existing containers to Podman without breaking your scripts or changing the way you work. About the book Podman in Action introduces the Podman container manager. The easy-to-follow explanations and examples give you a clear view of what containers are, how they work, and how to manage them using Podman&’s powerful features. You&’ll get a deep look at the Linux components Podman uses and even learn more about Docker along the way. You&’ll especially appreciate author Dan Walsh&’s unique insights into container security. What's inside Develop and manage pods Key security concepts including SELinux and SECCOMP Use systemd to oversee a container&’s lifecycle Keep your containers confined using Podman security Manage containerized applications on edge devices Install and run Podman on MacOS and Windows About the reader For developers or system administrators experienced with Linux and Docker. About the author Daniel Walsh is a senior distinguished engineer at Red Hat, and leads the team that created Podman. Table of Contents PART 1 FOUNDATIONS 1 Podman: A next-generation container engine 2 Command line 3 Volumes 4 Pods PART 2 DESIGN 5 Customization and configuration files 6 Rootless containers PART 3 ADVANCED TOPICS 7 Integration with systemd 8 Working with Kubernetes 9 Podman as a service PART 4 CONTAINER SECURITY 10 Security container isolation 11 Additional security considerations
Podstawy ochrony komputerów
by Rick Lehtinen G. T. Gangemi Sr. Deborah RussellZadbaj o bezpiecze?stwo swojego komputera Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniajšce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany sposób. Okazuje si? wówczas, ?e skaner wykrywa dziesištki, a nawet setki wirusów, programy zaczynajš dzia?a? nieprawid?owo, a z dysku ginš wa?ne dane. Pó? biedy, je?li jest to tylko domowy komputer z prywatnymi plikami. Du?o gorsze skutki mo?e mie? w?amanie do firmowej bazy danych lub przechwycenie poufnej komunikacji. Ksiš?ka "Podstawy ochrony komputerów" to wszechstronne wprowadzenie do najwa?niejszych zagadnie? dotyczšcych bezpiecze?stwa danych i sprz?tu. Czytajšc jš, poznasz zagro?enia, jakie czyhajš na u?ytkowników komputerów, ale tak?e skuteczne techniki ochrony. Nauczysz si? kontrolowa? dost?p do danych, prowadzi? efektywnš polityk? zabezpiecze?, wykrywa? i usuwa? wirusy oraz zapobiega? przenikaniu ich do systemu. Dowiesz si?, jak zapewni? bezpiecze?stwo komputera w sieci oraz jak u?ywa? szyfrowania do przesy?ania poufnych informacji. Przeczytasz te? o najnowszych technikach zabezpieczenia bazujšcego na danych biometrycznych (wzorze siatkówki czy odciskach palców) oraz ochronie sieci bezprzewodowych. Niebezpiecze?stwa gro?šce u?ytkownikom komputerów Kontrolowanie dost?pu do komputera Walka z wirusami Prowadzenie skutecznej polityki zabezpiecze? Bezpieczne korzystanie z sieci Szyfrowanie poufnych danych Komunikacja bez ryzyka Zabezpieczenia biometryczne Tworzenie bezpiecznych sieci bezprzewodowych Stosuj skuteczne zabezpieczenia i zapewnij maksymalne bezpiecze?stwo swojemu komputerowi!
Poetic Operations: Trans of Color Art in Digital Media (ASTERISK)
by micha cárdenasIn Poetic Operations artist and theorist micha cárdenas considers contemporary digital media, artwork, and poetry in order to articulate trans of color strategies for safety and survival. Drawing on decolonial theory, women of color feminism, media theory, and queer of color critique, cárdenas develops a method she calls algorithmic analysis. Understanding algorithms as sets of instructions designed to perform specific tasks (like a recipe), she breaks them into their component parts, called operations. By focusing on these operations, cárdenas identifies how trans and gender-non-conforming artists, especially artists of color, rewrite algorithms to counter violence and develop strategies for liberation. In her analyses of Giuseppe Campuzano's holographic art, Esdras Parra's and Kai Cheng Thom's poetry, Mattie Brice's digital games, Janelle Monáe's music videos, and her own artistic practice, cárdenas shows how algorithmic analysis provides new modes of understanding the complex processes of identity and oppression and the intersection of gender, sexuality, and race.
Poetry's Data: Digital Humanities and the History of Prosody
by Meredith MartinWhy literary studies must confront digital mediationWe live and research in a technologically mediated landscape in which old models of reading and researching—methods that presume an autonomous, single scholar gathering resources and making claims—no longer hold. Scholars have yet to theorize either the embeddedness of their sources inside multiple layers of mediation or their own place in an information ecosystem that demands our active participation. In Poetry&’s Data, Meredith Martin explores what current access to data might mean for mapping the discourse of poems. Martin&’s account of her work learning about digital humanities so that she could build a database of historic prosodic materials becomes a through line in a narrative that chronicles how literature has understood poetry&’s data—its sounds—from the sixteenth century to the present day.Digital knowledge infrastructures have historical antecedents that scholars have been trained to theorize. And yet, as Martin points out, we have not been trained to identify and navigate, let alone critique, the current landscape of knowledge production. Through five chapters and five examples from the Princeton Prosody Archive, Martin shows that the histories of mediation and format are essential to the teaching of poetry and poetic form.
Point Cloud Compression: Technologies and Standardization
by Wen Gao Wei Gao Ge Li3D point clouds have broad applications across various industries and have contributed to advancements in fields such as autonomous driving, immersive media, metaverse, and cultural heritage protection. With the fast growth of 3D point cloud data and its applications, the need for efficient compression technologies has become paramount. This book delves into the forefront of point cloud compression, exploring key technologies, standardization efforts, and future prospects. This comprehensive book uncovers the foundational concepts, data acquisition methods, and datasets associated with point cloud compression. By examining the fundamental compression technologies, readers can obtain a clear understanding of prediction coding, transform coding, quantization techniques, and entropy coding. Through vivid illustrations and examples, the book elucidates how these techniques have evolved over the years and their potentials for the future. To provide a complete picture, the book presents cutting-edge research methods in point cloud compression and facilitates comparisons among them. Readers can be equipped with an in-depth understanding of the latest advancements, and can gain insights into the various approaches employed in this dynamic field. Another distinguishing aspect of this book is its exploration of standardization works for point cloud compression. Notable standards, such as MPEG G-PCC, AVS PCC, and MPEG V-PCC, are thoroughly illustrated. By delving into the methods used in geometry-based, video-based, and deep learning-based compression, readers become familiar with the latest breakthroughs in the standard communities.
Point-of-Interest Recommendation in Location-Based Social Networks (SpringerBriefs in Computer Science)
by Irwin King Michael R. Lyu Shenglin ZhaoThis book systematically introduces Point-of-interest (POI) recommendations in Location-based Social Networks (LBSNs). Starting with a review of the advances in this area, the book then analyzes user mobility in LBSNs from geographical and temporal perspectives. Further, it demonstrates how to build a state-of-the-art POI recommendation system by incorporating the user behavior analysis. Lastly, the book discusses future research directions in this area. This book is intended for professionals involved in POI recommendation and graduate students working on problems related to location-based services. It is assumed that readers have a basic knowledge of mathematics, as well as some background in recommendation systems.
Pointers in C
by Naveen Toppo Hrishikesh DewanPointers in C provides a resource for professionals and advanced students needing in-depth but hands-on coverage of pointer basics and advanced features. The goal is to help programmers in wielding the full potential of pointers. In spite of its vast usage, understanding and proper usage of pointers remains a significant problem. This book's aim is to first introduce the basic building blocks such as elaborate details about memory, the compilation process (parsing/preprocessing/assembler/object code generation), the runtime memory organization of an executable and virtual memory. These basic building blocks will help both beginners and advanced readers to grasp the notion of pointers very easily and clearly. The book is enriched with several illustrations, pictorial examples, and code from different contexts (Device driver code snippets, algorithm, and data structures code where pointers are used). Pointers in C contains several quick tips which will be useful for programmers for not just learning the pointer concept but also while using other features of the C language. Chapters in the book are intuitive, and there is a strict logical flow among them and each chapter forms a basis for the next chapter. This book contains every small aspect of pointer features in the C language in their entirety. What you'll learn The concept of pointers and their use with different data types Basic and advanced features of pointers Concepts of compilers, virtual memory, data structures, algorithms and string processing Concepts of memory and runtime organization Referencing and dereferencing of pointer variables NULL pointers, Dangling pointers, VOID pointers and CONST qualifiers Workings of dynamic data structures Pointers to pointers Triple, and quadrupal pointers Self referential structures, structure padding, and cache based optimization techniques. Who this book is for Professional programmers, advanced students of computer science, and enthusiasts of the C language. Embedded systems programmers will also find the advanced knowledge of pointers offered in this book very helpful. Table of Contents 1. Memory, Run-time Memory Organization, and Virtual Memory 2. Pointer Basics 3. Pointer Arithmetic and Single Dimension Arrays 4. Pointers and Strings 5. Pointers and Multidimensional Arrays 6. Pointers to Structures 7. Function Pointers 8. Pointers to File I/O 9. Pointers to File I/O
Pointers in C Programming: A Modern Approach to Memory Management, Recursive Data Structures, Strings, and Arrays
by Thomas MailundGain a better understanding of pointers, from the basics of how pointers function at the machine level, to using them for a variety of common and advanced scenarios. This short contemporary guide book on pointers in C programming provides a resource for professionals and advanced students needing in-depth hands-on coverage of pointer basics and advanced features. It includes the latest versions of the C language, C20, C17, and C14. You’ll see how pointers are used to provide vital C features, such as strings, arrays, higher-order functions and polymorphic data structures. Along the way, you’ll cover how pointers can optimize a program to run faster or use less memory than it would otherwise.There are plenty of code examples in the book to emulate and adapt to meet your specific needs.What You Will LearnWork effectively with pointers in your C programmingLearn how to effectively manage dynamic memoryProgram with strings and arraysCreate recursive data structuresImplement function pointersWho This Book Is For Intermediate to advanced level professional programmers, software developers, and advanced students or researchers. Prior experience with C programming is expected.
Poison! (Freestylers: Data Beast #3)
by Andrew Fusek PetersA short thriller that's high on suspense! This is a perfect page turner if you want to finish a story in one sitting, especially for reluctant and struggling readers. Cool, edgy computer hackers, Kiran and Ros are teens on a mission to fight crime and injustice with the help of a shape-shifting data beast they've created.In Poison!, Kiran and Roz set out to prove that a chemical company is polluting the river near their school and the poisoning the fish that live in it. With the help of the data beast they attempt to bring the murky activities into the light - and the beast goes on a dangerous mission to save the threatened fish.Reading level for this book:-ATOS: 2.6Lexile ® Measure: 360LBook Band: 11 Lime