Apress

http://https://www.apress.com/br/apress-open

About

Apress, a Springer Nature company, is a publisher dedicated to meeting the information needs of developers, IT professionals, and tech communities worldwide. Our high-quality, practical content helps technology professionals at all levels increase the skills they need to advance in their day-to-day work. Key topics include big data, databases, open source, web development, Java, Python, Apple & Swift, and Microsoft and .NET titles. The growing demand for open source content and open access publishing options in the tech community has led Apress to offer authors and publishing partners the option to publish open access books.

Peer review info

ApressOpen books are subject to the same solid technical review and publishing processes followed by traditional Apress books.

License info

CC BY-NC-ND


Browse results: Found 27

Listing 11 - 20 of 27 << page
of 3
>>
GUI Design for Android Apps

Authors: ---
ISBN: 9781484203835 9781484203828 Year: Pages: 156 DOI: https://doi.org/10.1007/978-1-4842-0382-8 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 18:21:19
License:

Loading...
Export citation

Choose an application

Abstract

GUI Design for Android Apps is the perfect—and concise—introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform.

Keywords

The InfoSec Handbook: An Introduction to Information Security

Authors: ---
ISBN: 9781430263821 9781430263838 Year: Pages: 392 DOI: https://doi.org/10.1007/978-1-4302-6383-8 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 18:18:21
License:

Loading...
Export citation

Choose an application

Abstract

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face.

Keywords

Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers

Authors:
ISBN: 9781430268390 9781430268383 Year: Pages: 680 DOI: https://doi.org/10.1007/978-1-4302-6838-3 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 18:08:44
License:

Loading...
Export citation

Choose an application

Abstract

Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com).

Keywords

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters

Authors: ---
ISBN: 9781430261483 9781430261490 Year: Pages: 156 DOI: https://doi.org/10.1007/978-1-4302-6149-0 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 16:36:59
License:

Loading...
Export citation

Choose an application

Abstract

Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server’s boot process to fit the datacenter’s requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools.

Keywords

Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers

Authors:
ISBN: 9781430259268 9781430259275 Year: Pages: 232 DOI: https://doi.org/10.1007/978-1-4302-5927-5 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 17:22:07
License:

Loading...
Export citation

Choose an application

Abstract

Intel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It also examines the source code-level optimizations that can be performed to exploit the powerful features of the processor. Xeon Phi is at the heart of world’s fastest commercial supercomputer, which thanks to the massively parallel computing capabilities of Intel Xeon Phi processors coupled with Xeon Phi coprocessors attained 33.86 teraflops of benchmark performance in 2013. Extracting such stellar performance in real-world applications requires a sophisticated understanding of the complex interaction among hardware components, Xeon Phi cores, and the applications running on them. In this book, Rezaur Rahman, an Intel leader in the development of the Xeon Phi coprocessor and the optimization of its applications, presents and details all the features of Xeon Phi core design that are relevant to the practice of application developers, such as its vector units, hardware multithreading, cache hierarchy, and host-to-coprocessor communication channels. Building on this foundation, he shows developers how to solve real-world technical computing problems by selecting, deploying, and optimizing the available algorithms and data structure alternatives matching Xeon Phi’s hardware characteristics. From Rahman’s practical descriptions and extensive code examples, the reader will gain a working knowledge of the Xeon Phi vector instruction set and the Xeon Phi microarchitecture whereby cores execute 512-bit instruction streams in parallel.

Keywords

Learn BlackBerry 10 App Development: A Cascades-Driven Approach

Authors:
ISBN: 9781430261575 9781430261582 Year: Pages: 356 DOI: https://doi.org/10.1007/978-1-4302-6158-2 Language: English
Publisher: Apress Grant: BlackBerry
Subject: Computer Science
Added to DOAB on : 2018-07-20 17:13:56
License:

Loading...
Export citation

Choose an application

Abstract

Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application logic. No prior knowledge of C++ is assumed and the book covers the fundamental aspects of the language for writing BlackBerry 10 apps. Also a particular emphasis is put on how to create a visually enticing user experience with the Cascades framework, which is based on Qt and QML. Starting with the native SDK configuration and an overview of the Momentics IDE, the book is fast-paced and you will rapidly learn many of the best practices and techniques required for developing beautiful BlackBerry 10 apps. Learn BlackBerry 10 App Development is written for developers wishing to learn how to write apps for the new BlackBerry 10 OS and those interested in porting existing iOS and Android apps to BlackBerry 10 as native applications.

Keywords

Managing Risk and Information Security: Protect to Enable (First Edition)

Authors:
ISBN: 9781430251132 9781430251149 Year: Pages: 152 DOI: https://doi.org/10.1007/978-1-4302-5114-9 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 16:42:07
License:

Loading...
Export citation

Choose an application

Abstract

Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk.

Keywords

Managing Risk and Information Security: Protect to Enable (Second Edition)

Authors:
ISBN: 9781484214565 9781484214558 Year: Pages: 187 DOI: https://doi.org/10.1007/978-1-4842-1455-8 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 16:46:06
License:

Loading...
Export citation

Choose an application

Abstract

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. What You'll Learn Review how people perceive risk and the effects it has on information security See why different perceptions of risk within an organization matters Understand and reconcile these differing risk views Gain insights into how to safely enable the use of new technologies Who This Book Is For The primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals.

Keywords

Office 365: Migrating and Managing Your Business in the Cloud

Authors: ---
ISBN: 9781430265269 9781430265276 Year: Pages: 680 DOI: https://doi.org/10.1007/978-1-4302-6527-6 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 18:30:17
License:

Loading...
Export citation

Choose an application

Abstract

Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migration details are included. Cloud technology is a tremendous opportunity for an organization to reduce IT costs, and to improve productivity with increased access, simpler administration and improved services. Those businesses that embrace the advantages of the cloud will receive huge rewards in productivity and lower total cost of ownership over those businesses that choose to ignore it. The challenge for those charged with implementing Microsoft Office 365 is to leverage these advantages with the minimal disruption of their organization. This book provides practical help in moving your business to the Cloud and covers the planning, migration and the follow on management of the Office 365 Cloud services.

Keywords

Optimizing HPC Applications with Intel Cluster Tools

Authors: --- --- ---
ISBN: 9781430264965 9781430264972 Year: Pages: 300 DOI: https://doi.org/10.1007/978-1-4302-6497-2 Language: English
Publisher: Apress Grant: Intel
Subject: Computer Science
Added to DOAB on : 2018-07-20 18:33:12
License:

Loading...
Export citation

Choose an application

Abstract

Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters. The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations.

Keywords

Listing 11 - 20 of 27 << page
of 3
>>