Experience reading like never before
Sign in to continue reading.
Discover and read thousands of books from independent authors across India
Visit the bookstore"It was a wonderful experience interacting with you and appreciate the way you have planned and executed the whole publication process within the agreed timelines.”
Subrat SaurabhAuthor of Kuch Woh Pal
This book attempts to understand the multiple branches that fall under the discipline of entrepreneurship and how such concepts have practical applications. It presents this complex subject in the most comprehensible and easy to understand language. Entrepreneurship refers to the launching, designing and running of a new business and work as a CEO.
This book attempts to understand the multiple branches that fall under the discipline of entrepreneurship and how such concepts have practical applications. It presents this complex subject in the most comprehensible and easy to understand language. Entrepreneurship refers to the launching, designing and running of a new business and work as a CEO.
It is wonderful to see this book published during the peak of the IoT hype cycle, where most writing is in tweets and blog entries. The deployment of traditional IP networks, security technology and Web infrastructure requires a lot of knowledge and skill, and understanding the Internet of Things requires a similar breadth of knowledge. Today we take that knowledge for granted because we have trained the world through books and teaching over several decades. L
It is wonderful to see this book published during the peak of the IoT hype cycle, where most writing is in tweets and blog entries. The deployment of traditional IP networks, security technology and Web infrastructure requires a lot of knowledge and skill, and understanding the Internet of Things requires a similar breadth of knowledge. Today we take that knowledge for granted because we have trained the world through books and teaching over several decades. Luckily most of the knowledge we have gained from building today’s Internet and Web services can be applied to IoT. There are, however, many aspects of IoT technologies that are new, including IPv6 over low-power networks, new applications of TLS security, efficient web transfer protocols and techniques for managing and using devices through commonly understood data objects.
Digital image processing is a popular subject evolving continuously. This book covers topics like image enhancement, transformation, segmentation, compression, restorations, image representation and description, and recognition and interpretation in detail. In general, the field of digital image processing requires sound theoretical knowledge and extensive experimental work involving software simulation and testing with large sets of sample images in Matlab.&n
Digital image processing is a popular subject evolving continuously. This book covers topics like image enhancement, transformation, segmentation, compression, restorations, image representation and description, and recognition and interpretation in detail. In general, the field of digital image processing requires sound theoretical knowledge and extensive experimental work involving software simulation and testing with large sets of sample images in Matlab.
Get complete instructions for manipulating, processing, cleaning, and crunching datasets in Python. This having practical case studies that show you how to solve a broad set of data analysis problems effectively. You will learn the latest versions of pandas, NumPy, IPython, and Jupyter in the process. This book is a practical, modern introduction to data science tools in Python. It’s ideal for analysts new to Python and for Python programmers new to data
Get complete instructions for manipulating, processing, cleaning, and crunching datasets in Python. This having practical case studies that show you how to solve a broad set of data analysis problems effectively. You will learn the latest versions of pandas, NumPy, IPython, and Jupyter in the process. This book is a practical, modern introduction to data science tools in Python. It’s ideal for analysts new to Python and for Python programmers new to data science and scientific computing.
This book deals with the fundamentals of web designing and application development. This book will be of great help to web developers and application developer who are not already familiar with web and application programming. This can upgrade their skills through This book and achieve great height in the world of web programming. The objective of This book is to promote that future by spreading the use of the web sites as widely as possible. It is also integr
This book deals with the fundamentals of web designing and application development. This book will be of great help to web developers and application developer who are not already familiar with web and application programming. This can upgrade their skills through This book and achieve great height in the world of web programming. The objective of This book is to promote that future by spreading the use of the web sites as widely as possible. It is also integral to The Internet applications and other e-Business solutions that that are the foundation of corporate computing.
It gives me immense pleasure in presenting the first edition of the book-Principles of DATA STRUCTURES Using JavaScript which is a unique text valuable for professionals that covers both theoretical and practical aspects of the data structures. The study of data structures is an essential subject of every under graduate and master programs related to computer science. A thorough understanding of the basics of this subject is inevitable for efficient programmin
It gives me immense pleasure in presenting the first edition of the book-Principles of DATA STRUCTURES Using JavaScript which is a unique text valuable for professionals that covers both theoretical and practical aspects of the data structures. The study of data structures is an essential subject of every under graduate and master programs related to computer science. A thorough understanding of the basics of this subject is inevitable for efficient programming. This book covers all the fundamental topics to give a better understanding about the subject.
This book describes a critical new approach for the Internet of Things that makes it possible to extract meaning in context from the billions of new data sources that will emerge. This new approach recognizes the different demands of machine-to-machine networks and proposes an evolutionary three-tiered architecture to enable the next phase of the Internet.
This book describes a critical new approach for the Internet of Things that makes it possible to extract meaning in context from the billions of new data sources that will emerge. This new approach recognizes the different demands of machine-to-machine networks and proposes an evolutionary three-tiered architecture to enable the next phase of the Internet.
Today, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks.
Today, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks.
The nation's critical infrastructure, including the electric power grid, air traffic control system, financial systems, and communication networks, depends extensively on information technology for its operation. National policy makers have become increasingly concerned that adversaries backed by considerable resources will attempt to exploit the cyber vulnerabilities in the critical infrastructure, thereby inflicting substantial harm on the nation.
Numerous policy proposals have been advanced, and several bills have been introduced in Congress to tackle parts of the cyber security challenge. It is focused on helping students acquired the skills sought in the professional workforce.
The "Internet of Things for Beginners: A Practical Approach" book is in active development by a joint effort from both academia and industrial collaborators, acknowledging that the Internet of Things of the future will be built on top of scalable and mature protocols, such as IPv6, 6LoWPAN and IEEE 802.15.4. Open-Source Operating Systems as Contiki, with more than 10 years of history and actively supported by universities and research centres, have been
The "Internet of Things for Beginners: A Practical Approach" book is in active development by a joint effort from both academia and industrial collaborators, acknowledging that the Internet of Things of the future will be built on top of scalable and mature protocols, such as IPv6, 6LoWPAN and IEEE 802.15.4. Open-Source Operating Systems as Contiki, with more than 10 years of history and actively supported by universities and research centres, have been paving the Internet of Things Road since the early beginnings of Wireless Sensor Networks and M2M communication, enabling the new IoT paradigm.
System and network architects, administrators and software developers will find this book useful as an overview of IoT architecture and technology. At the same time, business and product managers will find the book useful as an introduction to the market segments, applications and requirements as input for a successful IoT product or service. Finally, the technology overview is a great starting place to find the information needed to dive deeper into a particu
System and network architects, administrators and software developers will find this book useful as an overview of IoT architecture and technology. At the same time, business and product managers will find the book useful as an introduction to the market segments, applications and requirements as input for a successful IoT product or service. Finally, the technology overview is a great starting place to find the information needed to dive deeper into a particular area, and the architecture overview covers a wide range of design paradigms. One important point made is that without trust and security built into IoT technology and systems in a holistic way, we will not see an Internet of Things, but continue to see silos of things.
It would be an understatement to say that Artificial Intelligence (AI) is a popular topic at the moment, and it is unlikely to become any less important in the future. More researchers than ever work on AI in some form, and more non-researchers than ever are interested in the field. It would also be an understatement to say that games are a popular application area for AI research. While board games have been central to AI research since the inception of the f
It would be an understatement to say that Artificial Intelligence (AI) is a popular topic at the moment, and it is unlikely to become any less important in the future. More researchers than ever work on AI in some form, and more non-researchers than ever are interested in the field. It would also be an understatement to say that games are a popular application area for AI research. While board games have been central to AI research since the inception of the field, video games have during the last decade increasingly become the domain of choice for testing and showcasing new algorithms. At the same time, video games themselves have become more diverse and sophisticated, and some of them incorporate advances in AI for controlling non-player characters, generating content or adapting to players. Game developers have increasingly realized the power of AI methods to analyze large volumes of player data and optimize game designs. And a small but growing community of researchers and designers experiment with ways of using AI to design and create complete games, automatically or in dialog with humans. It is indeed an exciting time to be working on AI and games. As far as we know, it is the first compre- hensive textbook covering the field. With comprehensive, we mean that it features all the major application areas of AI methods within games: game-playing, con- tent generation and player modeling.
Today, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks.
Today, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks.
The nation's critical infrastructure, including the electric power grid, air traffic control system, financial systems, and communication networks, depends extensively on information technology for its operation. National policy makers have become increasingly concerned that adversaries backed by considerable resources will attempt to exploit the cyber vulnerabilities in the critical infrastructure, thereby inflicting substantial harm on the nation.
Numerous policy proposals have been advanced, and several bills have been introduced in Congress to tackle parts of the cyber security challenge. It is focused on helping students acquired the skills sought in the professional workforce
This book introduces you to web designing and web programming. It covers HTML, CSS, Bootstrap, JavaScript, jQuery and HTML 5 at the beginner level. this book about easy-to-understand, step-by-step tutorials helps you quickly master the basics of HTML and CSS before moving on to more advanced topics such as graphics.
1. It focuses on solving the problems with practical examples instead of explaining language details in theory. This w
This book introduces you to web designing and web programming. It covers HTML, CSS, Bootstrap, JavaScript, jQuery and HTML 5 at the beginner level. this book about easy-to-understand, step-by-step tutorials helps you quickly master the basics of HTML and CSS before moving on to more advanced topics such as graphics.
1. It focuses on solving the problems with practical examples instead of explaining language details in theory. This way readers can have a good understanding of the overall picture of web designing.
2. It includes many practical examples so that readers not only read, but they can also enjoy success when their program finally runs. This book cannot be completed in one hour, or one day because of the hands-on requirement. The recommended duration for completing this book is about 7 hours a week for two months.
3. No previous experience required. By following each short, one-hour lesson in this book, anyone can learn the basics of web development.
Why this Book?
• Fully implement the HTML and CSS standards
• Work with text and create links
• Add images and graphics to your page
• Use CSS to style a site and position elements on a page
• Structure a page with HTML
• Use responsive web design to make your pages look good on different-sized screens
• Use JavaScript to add dynamic elements and interactivity on your pages
• Leverage jQuery to add JavaScript features to your pages
• Design for the mobile web with Bootstrap and Java Script
Are you sure you want to close this?
You might lose all unsaved changes.
The items in your Cart will be deleted, click ok to proceed.