Experience reading like never before
Sign in to continue reading.
Discover and read thousands of books from independent authors across India
Visit the bookstore"It was a wonderful experience interacting with you and appreciate the way you have planned and executed the whole publication process within the agreed timelines.”
Subrat SaurabhAuthor of Kuch Woh Pal
This book sets out to introduce the IoT use cases and technologies. To demonstrate the effect of IoT and its potential to change our world, several practical examples are discussed. The book also discusses the existing wired and wireless communication technologies that have enabled IoT.
This book sets out to introduce the IoT use cases and technologies. To demonstrate the effect of IoT and its potential to change our world, several practical examples are discussed. The book also discusses the existing wired and wireless communication technologies that have enabled IoT.
This book sets out to introduce the IoT use cases and technologies. To demonstrate the effect of IoT and its potential to change our world, several practical examples are discussed. The book also discusses the existing wired and wireless communication technologies that have enabled IoT.
This book sets out to introduce the IoT use cases and technologies. To demonstrate the effect of IoT and its potential to change our world, several practical examples are discussed. The book also discusses the existing wired and wireless communication technologies that have enabled IoT.
This book is about functional algorithms and data structures. Algorithms and data structures are fundamentals of computer programming. I always enjoyed designing efficient algorithms. when I saw how powerful and creative pointer twiddling could be! Forexample, reversing a singly linked list using three node pointers is a well known algorithm. We scan the list once and reverse it by changing the pointer fields of each node. The three pointer variables guide the
This book is about functional algorithms and data structures. Algorithms and data structures are fundamentals of computer programming. I always enjoyed designing efficient algorithms. when I saw how powerful and creative pointer twiddling could be! Forexample, reversing a singly linked list using three node pointers is a well known algorithm. We scan the list once and reverse it by changing the pointer fields of each node. The three pointer variables guide thereversal process. I have come across many such pointer tricks and have used them as needed. I was next initiated into the world of multi-threading! Variables became shared states between threads! My bagful of tricks was still valid; however, changing state needed a lot of care, to stay away from insidious threading bugs. The real world is never picture perfect and someone forgot to synchronize a data structure.. Immutable objects could be shared without worry among thousands of readers!
This book will introduce you to the Python programming language. It’s aimed at beginning programmers, but even if you’ve written programs before and just want to add Python to your list of languages, Introducing Python will get you started. It’s an unhurried introduction, taking small steps from the basics to more involved and varied topics. It mixes cookbook and tutorial styles to explain new terms and ideas, but not too many at once. Real P
This book will introduce you to the Python programming language. It’s aimed at beginning programmers, but even if you’ve written programs before and just want to add Python to your list of languages, Introducing Python will get you started. It’s an unhurried introduction, taking small steps from the basics to more involved and varied topics. It mixes cookbook and tutorial styles to explain new terms and ideas, but not too many at once. Real Python code is included early and often. It is mainly targeted at newbies. It is useful for experienced programmers as well. The aim is that if all you know about computers is how to save text files, then you can learn Python from this book. If you have previous programming experience, then you can also learn Python from this book. If you do have previous programming experience, you will be interested in the differences between Python and your favorite programming language -We have highlighted many such differences. A little warning though, Python is soon going to become your favorite programming language !
Welcome to the world of Python programming! This book is designed to be a comprehensive guide for those who are new to the language and want to learn the basics of programming with Python.
Python is a powerful and versatile programming language that is widely used in various fields such as web development, data science, artificial intelligence, and more. It is known for its simple syntax, which makes it easy to learn and use for beginners.
Welcome to the world of Python programming! This book is designed to be a comprehensive guide for those who are new to the language and want to learn the basics of programming with Python.
Python is a powerful and versatile programming language that is widely used in various fields such as web development, data science, artificial intelligence, and more. It is known for its simple syntax, which makes it easy to learn and use for beginners.
In this book, you will learn the fundamental concepts of programming such as variables, data types, operators, functions, and control structures. You will also learn how to work with loops, conditional statements, and recursion. Additionally, you will learn how to use some of the built-in functions and libraries that come with Python.
We will also cover some advanced topics such as object-oriented programming, decorators, generators, and exception handling. By the end of this book, you will have the skills and knowledge to write your own programs and start your journey as a Python developer.
essential in today's online, interconnected world, when computers outsell TVs and e-commerce sales outpace those of "brick-and-mortar" establishments. Network vulnerabilities have accelerated the growth of identity theft and computer virus outbreaks, driving up demand for knowledgeable and ambitious system administrators who can secure networks. Introduction to Network Security will help you improve your understanding of potential vulnerabilities, learn how to
essential in today's online, interconnected world, when computers outsell TVs and e-commerce sales outpace those of "brick-and-mortar" establishments. Network vulnerabilities have accelerated the growth of identity theft and computer virus outbreaks, driving up demand for knowledgeable and ambitious system administrators who can secure networks. Introduction to Network Security will help you improve your understanding of potential vulnerabilities, learn how to use useful mitigation choices, and respond to attacks rapidly whether you are responsible for safeguarding your networks from these dangers or are studying security. Your ability to plan, create, implement, evaluate, and maintain networks and network protocols will be taught to you in this book. It details the constraints and how these systems function at the moment.
The blockchain technology is thoroughly examined in this book, along with how users might profit from it. Since its conception, blockchain has combined revolutionary technology with a social promise. Blockchains are now used to maintain data for a variety of purposes, despite initially being proposed as a solution for the cryptocurrency Bitcoin's record-keeping mechanism. After reading this book, the reader will be able to speak confidently about the subject a
The blockchain technology is thoroughly examined in this book, along with how users might profit from it. Since its conception, blockchain has combined revolutionary technology with a social promise. Blockchains are now used to maintain data for a variety of purposes, despite initially being proposed as a solution for the cryptocurrency Bitcoin's record-keeping mechanism. After reading this book, the reader will be able to speak confidently about the subject and understand significant technological differences. The reader will also gain valuable insight into the security flaws and limitations of blockchain software.
Open source software is free software for your business or personal use. Open source developers freely share their knowledge and make the source code available to the public. The software is distributed with a license which allows other developers to modify it and/or add to it. Some examples of open source software are: WordPress, Ubuntu, and Mozilla, creators of the Firefox browser.
Open source software is free software for your business or personal use. Open source developers freely share their knowledge and make the source code available to the public. The software is distributed with a license which allows other developers to modify it and/or add to it. Some examples of open source software are: WordPress, Ubuntu, and Mozilla, creators of the Firefox browser.
This book “Database Management Systems- The Detailed Version ” provides the fundamentals of database Management. This book is based on the latest syllabus (R2017) of Anna University, Chennai, for the Sixth Semester Engineering Students.
Chapter I: provides a Detailed brief about relational databases and also focuses on database system architecture. It also gives a glimpse about SQL Fundamentals and an Overall View of Dif
This book “Database Management Systems- The Detailed Version ” provides the fundamentals of database Management. This book is based on the latest syllabus (R2017) of Anna University, Chennai, for the Sixth Semester Engineering Students.
Chapter I: provides a Detailed brief about relational databases and also focuses on database system architecture. It also gives a glimpse about SQL Fundamentals and an Overall View of Different types of SQLs
Chapter II: Provides a detailed study about the Strategies used in the design of an Efficient database and also Provides Details about the different types of normalization.
Chapter III: This unit carries the information of Transaction concepts and also gives a Brief description on concurrency control and also discusses the Various facilities for transaction and recovery.
Chapter IV: This unit gives a Brief on the Concepts of RAID and also discusses the Basics of indexing and different types of indexing techniques principles of hashing query optimization . Are been discussed
Chapter V: This unit carries the information that focuses on distributed Systems Architecture and different types of advanced databases like object based databases ,XML Databases and also focuses on basics of Information Retrievals
Discussions of the Internet of Things (IoT) typically focus on one of a few topics. Chief among them is security: even at this early stage we are awash in stories about manufacturers moving into the field without updating their threat models and the consequences of this gap in their thinking. Researchers are hacking cars, finding security flaws in connected toys, and fretting about botnets composed of baby monitors and personal digital recorders.
Discussions of the Internet of Things (IoT) typically focus on one of a few topics. Chief among them is security: even at this early stage we are awash in stories about manufacturers moving into the field without updating their threat models and the consequences of this gap in their thinking. Researchers are hacking cars, finding security flaws in connected toys, and fretting about botnets composed of baby monitors and personal digital recorders.
Big Data is one of the most popular buzzwords in technology industry today. Organizations worldwide have realized the value of the immense volume of data available and are trying their best to manage, analyse and unleash the power of data to build strategies and develop a competitive edge. At the same time, the advent of the technology has led to the evolution of a variety of new and enhanced job roles. The objective of this book is to create a new breed of ve
Big Data is one of the most popular buzzwords in technology industry today. Organizations worldwide have realized the value of the immense volume of data available and are trying their best to manage, analyse and unleash the power of data to build strategies and develop a competitive edge. At the same time, the advent of the technology has led to the evolution of a variety of new and enhanced job roles. The objective of this book is to create a new breed of versatile Big Data analysts and developers, who are thoroughly conversant with the basic and advanced analytic techniques for manipulating and analysing data.
This textbook explores the different aspects of data mining from the fundamentals to the complex data types and their applications, capturing the wide diversity of problem domains for data mining issues.
This textbook explores the different aspects of data mining from the fundamentals to the complex data types and their applications, capturing the wide diversity of problem domains for data mining issues.
The theoretical principles are presented in a succinct and clear manner in Introduction to Formal Languages, Automata Theory, and Computation, which includes an in-depth study of formal grammar and basic automata types. The book also looks at the fundamental theory and concepts of computation, making it ideal for undergraduate computer science and information technology courses. At the relevant areas, an overview of recent trends in the field and applications
The theoretical principles are presented in a succinct and clear manner in Introduction to Formal Languages, Automata Theory, and Computation, which includes an in-depth study of formal grammar and basic automata types. The book also looks at the fundamental theory and concepts of computation, making it ideal for undergraduate computer science and information technology courses. At the relevant areas, an overview of recent trends in the field and applications are provided to pique the attention of active learners.
Learning the NoSQL will be made simple in this book, because NoSQL database were created to handle big data as part of their fundamental architecture. Additional engineering is not required as it is when SQL databases are used to handle web-scale applications. The path to data scalability is straight forward and well understandable.
NoSQL databases are often based on a scale-out strategy. This makes scaling to large data volumes much cheaper than whe
Learning the NoSQL will be made simple in this book, because NoSQL database were created to handle big data as part of their fundamental architecture. Additional engineering is not required as it is when SQL databases are used to handle web-scale applications. The path to data scalability is straight forward and well understandable.
NoSQL databases are often based on a scale-out strategy. This makes scaling to large data volumes much cheaper than when using the scale-up approach the SQL databases take.
This book provides a quick introduction to the Wireless communications, a broad and dynamic field that has spurred tremendous excitement and technological advances over the last few decades. The goal of this book is to provide readers with a comprehensive understanding of the fundamental principles underlying wireless communications. These principles include the characteristics and performance limits of wireless systems, the techniques and mathematical tools n
This book provides a quick introduction to the Wireless communications, a broad and dynamic field that has spurred tremendous excitement and technological advances over the last few decades. The goal of this book is to provide readers with a comprehensive understanding of the fundamental principles underlying wireless communications. These principles include the characteristics and performance limits of wireless systems, the techniques and mathematical tools needed to analyze them, and the insights and trade-offs associated with their design.Current and envisioned wireless systems are used to motivate and exemplify these fundamental principles. The book can be used as a senior- or graduate-level textbook and as a reference for engineers, academic and industrial researchers, and students working in the wireless field.
Wireless Communication is the fastest growing and most vibrant technological area in the communication field. Wireless Communication is a method of transmitting information from one point to another, without using any connection like wires, cables or any physical medium.
Generally, in a communication system, information is transmitted from transmitter to receiver that is placed over a limited distance. With the help of Wireless Communication, the transmitter and receiver can be placed anywhere between a few meters (like a T.V. Remote Control) to a few thousand kilometers (Satellite Communication).
Some hope blockchain will revolutionise all, while others dismiss it as a deplorable hype machine that deserves no consideration. We believe the truth is somewhere in the middle, and since blockchain technology is here to stay, We believe that reading this book is one of the best investments you can make.
Some hope blockchain will revolutionise all, while others dismiss it as a deplorable hype machine that deserves no consideration. We believe the truth is somewhere in the middle, and since blockchain technology is here to stay, We believe that reading this book is one of the best investments you can make.
Are you sure you want to close this?
You might lose all unsaved changes.
The items in your Cart will be deleted, click ok to proceed.