This brief book is an introduction to SQLite for both iOS and Android developers. The book includes an optional introduction to SQL, a discussion of when to use SQLite, and chapters devoted to using SQLite with the most likely programming languages and then goes through adding a simple database to an Android or iOS app and finally a chapter on managing the app’s life cycle. What You Will L…
Introducing SQL Server is a fast and easy introduction to SQL Server and the world of relational databases. You’ll learn how databases work and how to use the T-SQL language by practicing on one of the most widely-used and powerful database engines in the corporate world: Microsoft SQL Server. Do you quake at the sight of a SELECT statement? Start to shiver when people start talking about …
This book constitutes the refereed proceedings of the 6th International Conference on Computational Logistics, ICCL 2015, held in Delft, The Netherlands, in September 2015. The 50 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They are organized in topical sections entitled: transport over ground, transport over water, international coordination …
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
This book contains the refereed proceedings of the 16th International Conference on Business Process Modeling, Development and Support, BPMDS 2015, and the 20th International Conference on Exploring Modeling Methods for Systems Analysis and Design, EMMSAD 2015, held together with the 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015) in Stockholm, Sweden, in …
Learn how to form and execute an enterprise information strategy: topics include data governance strategy, data architecture strategy, information security strategy, big data strategy, and cloud strategy. Manage information like a pro, to achieve much better financial results for the enterprise, more efficient processes, and multiple advantages over competitors. As you’ll discover in Enter…
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…
This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …
The contributed volume aims to explicate and address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. Data Mining aims at the automatic discovery of underlying non-trivial knowledge from datasets by applying intelligent analysis techniques. The interest in this research area has experience…
This book constitutes the refereed proceedings of the 16th International Conference on Engineering Applications of Neural Networks, EANN 2015, held in Rhodes, Greece, in September 2015. The 36 revised full papers presented together with the abstracts of three invited talks and two tutorials were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections…