- Table View
- List View
Application of Wavelets in Speech Processing (SpringerBriefs in Speech Technology)
by Mohamed Hesham FaroukThis book provides a survey on wide-spread of employing wavelets analysis in different applications of speech processing. The author examines development and research in different applications of speech processing. The book also summarizes the state of the art research on wavelet in speech processing.
Application-Oriented Higher Education: A Comparative Study between Germany and China (East-West Crosscurrents in Higher Education)
by Ye Zhang Xinrong ChenThis book investigates the higher education system in Germany and China, and analyzes the differences between academic higher education and application-oriented higher education. It explores the past, present, and future of application-oriented higher education in these two countries, and discusses the advantages and disadvantages of this type of education. Using multiple data collection methods across case studies and student questionnaires, it demonstrates the necessity of a dual track higher education system based on separate entrance test and admission system to tertiary-level education, which ensures that students have transitional options. Further, it highlights the improvement of teaching quality and student satisfaction with application-oriented higher education and concludes that the international perspectives from higher education should be considered as one of the most significant methods of educational strategies.
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards (Oreilly And Associate Ser.)
by Jeff SixWith the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you’ll learn how to address real threats to your app, whether or not you have previous experience with security issues.Examine Android’s architecture and security model, and how it isolates the filesystem and databaseLearn how to use Android permissions and restricted system APIsExplore Android component types, and learn how to secure communications in a multi-tier appUse cryptographic tools to protect data stored on an Android deviceSecure the data transmitted from the device to other parties, including the servers that interact with your app
Application Security in the ISO27001 Environment
by Vinod Vasudevan Anoop Mangla Firosh Ummer Sachin Shetty Sangita Pakala Siddharth AnbalahanApplication Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001. It does this in the context of a wider roll out of an information security management system (ISMS) that conforms to ISO/IEC 27001. Together, the authors offer a wealth of expertise in ISO27001 information security, risk management and software application development. Over 224 pages, they address a range of essential topics, including an introduction to ISO27001 and ISO27002, secure development lifecycles, threat profiling and security testing, and secure coding guidelines. As well as showing how to use ISO27001 to secure individual applications, the book demonstrates how to tackle this issue as part of the development and roll out of an organisation-wide Information Security Management System conforming to the Standard. Software packages are the conduits to critical business data, thus securing applications adequately is of the utmost impo
Application Security Program Handbook
by Derek FisherStop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.In the Application Security Program Handbook you will learn: Why application security is so important to modern software Application security tools you can use throughout the development lifecycle Creating threat models Rating discovered risks Gap analysis on security tools Mitigating web application vulnerabilities Creating a DevSecOps pipeline Application security as a service model Reporting structures that highlight the value of application security Creating a software security ecosystem that benefits development Setting up your program for continuous improvement The Application Security Program Handbook teaches you to implement a robust program of security throughout your development process. It goes well beyond the basics, detailing flexible security fundamentals that can adapt and evolve to new and emerging threats. Its service-oriented approach is perfectly suited to the fast pace of modern development. Your team will quickly switch from viewing security as a chore to an essential part of their daily work. Follow the expert advice in this guide and you&’ll reliably deliver software that is free from security defects and critical vulnerabilities. About the technology Application security is much more than a protective layer bolted onto your code. Real security requires coordinating practices, people, tools, technology, and processes throughout the life cycle of a software product. This book provides a reproducible, step-by-step road map to building a successful application security program. About the book The Application Security Program Handbook delivers effective guidance on establishing and maturing a comprehensive software security plan. In it, you&’ll master techniques for assessing your current application security, determining whether vendor tools are delivering what you need, and modeling risks and threats. As you go, you&’ll learn both how to secure a software application end to end and also how to build a rock-solid process to keep it safe. What's inside Application security tools for the whole development life cycle Finding and fixing web application vulnerabilities Creating a DevSecOps pipeline Setting up your security program for continuous improvement About the reader For software developers, architects, team leaders, and project managers. About the author Derek Fisher has been working in application security for over a decade, where he has seen numerous security successes and failures firsthand. Table of Contents PART 1 DEFINING APPLICATION SECURITY 1 Why do we need application security? 2 Defining the problem 3 Components of application security PART 2 DEVELOPING THE APPLICATION SECURITY PROGRAM 4 Releasing secure code 5 Security belongs to everyone 6 Application security as a service PART 3 DELIVER AND MEASURE 7 Building a roadmap 8 Measuring success 9 Continuously improving the program
Application Servers for E-Business
by Lisa E. LindgrenThe modern application server is a complex platform that is the linchpin of an enterprise environment that includes a very wide range of technologies-web document formatting, web protocols, server-side scripts, servlets, applets, programming languages, distributed object technologies, security capabilities, directory and naming services, load balan
Application Service Providers in Business
by Luisa Focacci Robert Mockler Marc GartenfeldLearn how to use Application Service Providers to enhance the future of your business!Application Service Providers in Business is a comprehensive analysis of the present ASP model and its place in business today. Business success in today&’s information-intensive marketplace depends on a company&’s ability to acquire and fully use the latest advancements in business-critical applications. By having these applications delivered as services over the Internet, businesses can lessen the demands on company IT staff, and increase the ability to get complex software into use immediately. Within this context, a new outsourcing business model called ASP (Application Service Provider) has emerged that is transforming how businesses access and leverage software applications. The book explains the specific contingent ASP models, including business, enterprise, functional-focused, and vertical market ASPs, and ASP aggregators. It demonstrates how different ASP models have fulfilled diverse market/customer expectations and explores future scenarios for current ASP business models. Case studies, tables, and figures illustrate important concepts and make complex information easy to access and understand. Based on a thorough analysis of the ASP market environment, the book provides detailed Best Practices Guidelines that managers of ASPs can use to improve the chances of success of their respective ASPs. It outlines contingency factors such as application offerings, customer selection, operations, and strategic fit. The book also not only assists business managers in deciding on whether to use an ASP, but it presents ways to use ASPs to effectively support their business process. The ability to provide the workforce with access to data whenever and wherever is crucial for positively impacting a company&’s profitability, and ASPs provide the software to make it possible.Topics included in Application Service Providers in Business are: Best Practices Guidelines strategic management management decision making and planning IT management and outsourcing future of the ASP market ASP business models and much more!Application Service Providers in Business is a comprehensive resource for executives, managers, professors, and business students in the US and worldwide. Using the information and guidelines provided, executives and managers can learn how to use ASPs to enhance their business, and managers of ASPs can learn how to increase their chance of success in the competitive ASP market. The material is also appropriate as a textbook for management and computer information/software development classes.
Application-Specific Arithmetic: Computing Just Right for the Reconfigurable Computer and the Dark Silicon Era
by Florent de Dinechin Martin KummWritten by two experts of the domain, this book presents the most recent advances in computer arithmetic hardware, with a focus on application-specific arithmetic beyond the classic operators and the standard precisions. It targets silicon designers who have to do better with less in the post-Moore era, and FPGA developers who want to exploit the full possibilities of reconfigurable computing platforms.
Application-Specific Hardware Architecture Design with VHDL (Signals and Communication Technology)
by Bogdan BeleanThis book guides readers through the design of hardware architectures using VHDL for digital communication and image processing applications that require performance computing. Further it includes the description of all the VHDL-related notions, such as language, levels of abstraction, combinational vs. sequential logic, structural and behavioral description, digital circuit design, and finite state machines. It also includes numerous examples to make the concepts presented in text more easily understandable.
Application Testing with Capybara
by Matthew RobbinsStart performing integration testing with Capybara immediately. This book will get you up and running quickly and assumes no knowledge or experience of the technology.This book is for developers and testers who have had some exposure to Ruby but who want to know how to test their applications using Capybara and its compatible drivers, such as Selenium-Webdriver and Rack-Test. The examples are deliberately kept simple and example HTML mark-up is always included so that you can copy the examples to practice and experiment on your own machine.
Applications and Challenges of Geospatial Technology: Potential and Future Trends
by Pavan Kumar Meenu Rani Prem Chandra Pandey Haroon Sajjad Bhagwan Singh ChaudharyThis book advances the scientific understanding and application of space-based technologies to address a variety of areas related to sustainable development; including environmental systems analysis, environmental management, clean processes, green chemistry, and green engineering. Geo-spatial techniques have gained considerable interest in recent decades among the earth and environmental science communities for solving and understanding various complex problems and approaches towards sustainable technologies. The book encompasses several scopes of interests on sustainable technologies in areas such as water resources, forestry, remote sensing, meteorology, atmospheric and oceanic modeling, environmental engineering and management, civil engineering, air and environmental pollution, water quality problems, etc. The book will appeal to people with an interest in geo-spatial techniques, sustainable development and other diverse backgrounds within earth and environmental sciences field.
Applications and Computational Elements of Industrial Hygiene.
by Martin B. Stern Zack MansdorfPresenting the only textbook available today that covers all of the critical elements of industrial hygiene ó conceptual information, computational coverage, case studies, and sample problems and exercises ó in one volume. Organized around the basic rubrics of industrial hygiene, this book helps students to think like industrial hygienists while offering the latest techniques for practicing professionals. Applications and Computational Elements of Industrial Hygiene is the most complete reference available on IH, and is also an ideal study aid for exam preparation.This is the first and only textbook that includes all critical computations for each concept covered. Each chapter discusses a different hazard and how to recognize, evaluate, and control it. The advantage of this approach is clear; technical issues, instrumental techniques, engineering control procedures ó relevant issues from A to Z ó are discussed for each hazard. Chapters conclude with case studies that offer critical insight into the practical aspects of the field. The book also covers emerging issues that will affect industrial hygienists in the future. The book includes real-life situations and experiences to demonstrate practical applications of concepts presented in the text.For students, Applications and Computational Elements of Industrial Hygiene offers critical material formerly scattered across multiple sources. For seasoned industrial hygienists, this is an essential problem-solving tool and state-of-the-art reference that consolidates and updates previously scattered information.
Applications and Investigations in Earth Science
by Edward J. Tarbuck Frederick K. Lutgens Dennis G. Tasa Kenneth G. PinzkeDesigned to accompany Tarbuck and Lutgen's Earth Science and Foundations of Earth Science , this manual can be used for any Earth Science lab course, in conjunction with any text. The Eighth Edition minimizes the need for faculty instruction in the lab, freeing instructors to interact directly with students. Widely praised for its concise coverage and dynamic illustrations by Dennis Tasa, the text contains twenty-three step-by-step exercises that reinforce major topics in geology, oceanography, meteorology, and astronomy.
Applications and Investigations in Earth Science
by Dennis Tasa Edward Tarbuck Frederick LutgensPerfect for use with any Earth Science text, this versatile collection of introductory-level laboratory experiences examines the basic principles and concepts of the Earth sciences. Widely praised for its concise coverage and dynamic illustrations by Dennis Tasa, the text contains twenty-three step-by-step exercises that reinforce major topics in geology, oceanography, meteorology, and astronomy. The Seventh Edition offers over 80 new photos, redrawn illustrations, and safety "Caution" boxes throughout.
Applications and Markets for Cooperating Objects (SpringerBriefs in Electrical and Computer Engineering)
by Stamatis Karnouskos Pedro José Marrón Luca Mottola Giancarlo Fortino José Ramiro Martínez-de DiosThis book provides an overview and an insight in cooperative objects and defines the classification of topics into the different areas. A significant number of researchers and industrial partners were contacted in order to prepare the roadmap. The book presents of the main results provided by the corresponding European project "CONET".
Applications and Metrology at Nanometer Scale 1: Smart Materials, Electromagnetic Waves and Uncertainties
by Pierre Richard Dahoo Philippe Pougnet Abdelkhalak El HamiTo develop innovations in quantum engineering and nanosystems, designers need to adopt the expertise that has been developed in research laboratories. This requires a thorough understanding of the experimental measurement techniques and theoretical models, based on the principles of quantum mechanics. This book presents experimental methods enabling the development and characterization of materials at the nanometer scale, based on practical engineering cases, such as 5G and the interference of polarized light when applied for electromagnetic waves. Using the example of electromechanical, multi-physical coupling in piezoelectric systems, smart materials technology is discussed, with an emphasis on scale reduction and mechanical engineering applications. Statistical analysis methods are presented in terms of their usefulness in systems engineering for experimentation, characterization or design, since safety factors and the most advanced reliability calculation techniques are included from the outset. This book provides valuable support for teachers and researchers but is also intended for engineering students, working engineers and Master's students.
Applications and Metrology at Nanometer-Scale 2: Measurement Systems, Quantum Engineering and RBDO Method
by Pierre-Richard Dahoo Philippe Pougnet Abdelkhalak El HamiNanoscience, nanotechnologies and the laws of quantum physics are sources of disruptive innovation that open up new fields of application. Quantum engineering enables the development of very sensitive materials, sensor measurement systems and computers. Quantum computing, which is based on two-level systems, makes it possible to manufacture computers with high computational power. This book provides essential knowledge and culminates with an industrial application of quantum engineering and nanotechnologies. It presents optical systems for measuring at the nanoscale, as well as quantum physics models that describe how a two-state system interacts with its environment. The concept of spin and its derivation from the Dirac equation is also explored, while theoretical foundations and example applications aid in understanding how a quantum gate works. Application of the reliability-based design optimization (RBDO) method of mechanical structures is implemented, in order to ensure reliability of estimates from the measurement of mechanical properties of carbon nanotube structures. This book provides valuable support for teachers and researchers but is also intended for engineering students, working engineers and Master's students.
Applications and Techniques in Information Security: 11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12–13, 2020, Proceedings (Communications in Computer and Information Science #1338)
by Lejla Batina Gang LiThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research.
Applications and Techniques in Information Security: 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings (Communications in Computer and Information Science #950)
by Qingfeng Chen Jia Wu Shichao Zhang Changan Yuan Lynn Batten Gang LiThis book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
Applications and Techniques in Information Security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings (Communications in Computer and Information Science #651)
by Gang Li Lynn BattenThis book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
Applications and Techniques in Information Security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings (Communications in Computer and Information Science #719)
by Gang Li Lynn Batten Dong Seong Kim Xuyun ZhangThis book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
Applications and Techniques in Information Security: 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings (Communications in Computer and Information Science #557)
by Gang Li Wenjia Niu Jiqiang Liu Jianlong Tan Li Guo Zhen Han Lynn BattenThis book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.
Applications and Techniques in Information Security: 12th International Conference, ATIS 2021, Virtual Event, December 16–17, 2021, Revised Selected Papers (Communications in Computer and Information Science #1554)
by Shiva Raj Pokhrel Min Yu Gang LiThis book constitutes the refereed proceedings of the 12th International Conference on Applications and Techniques in Information Security, ATIS 2021, held as a virtual event in December 2021. The 9 full papers along with the 5 short papers presented in the volume were carefully reviewed and selected from 67 submissions. The papers are focused on all aspects on techniques and applications in information security research.
Applications and Techniques in Information Security: 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers (Communications in Computer and Information Science #1804)
by Srikanth Prabhu Shiva Raj Pokhrel Gang LiThis book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30–31, 2022.The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
Applications and Techniques in Information Security: 14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024, Proceedings (Communications in Computer and Information Science #2306)
by V. S. Shankar Sriram Anila Glory H. Gang Li Shiva Raj PokhrelThis book constitutes the refereed proceedings of the 14th International Conference, on Applications and Techniques in Information Security, ATIS 2024, held in Tamil Nadu, India, November 22-24, 2024. The 24 full papers presented were carefully reviewed and selected from 149 submissions. The conference focuses on Advancing Quantum Computing and Cryptography; AI-Driven Cybersecurity: The Role of Machine Learning; Advancing Cybersecurity with Deep Learning Techniques; and Securing Connected Systems: IoT, Cloud, and Web Security Strategies.