eBooks-it.org Logo
eBooks-IT.org Inner Image

The Technology of Video and Audio Streaming

The Technology of Video and Audio Streaming Image

Book Details:

Publisher:Focal Press
Series: Focal Press , Technology
Author:David Austerberry
Edition:1
ISBN-10:0240805801
ISBN-13:9780240805801
Pages:360
Published:Oct 13 2004
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:5.8 MB

Book Description:

* Learn the end-to-end process, starting with capture from a video or audio source through to the consumer's media player* A quick-start quide to streaming media technologies* How to monetize content and protect revenue with digital rights managementFor broadcasters, web developers, project managers implementing streaming media systems, David Austerberry shows how to deploy the technology on your site, from video and audio capture through to the consumer's media player. The book first deals with Internet basics and gives a thorough coverage of telecommunications networks and the last mile to the home. Video and audio formats are covered, as well as compression standards including Windows Media and MPEG-4. The book then guides you through the streaming process, showing in-depth how to encode audio and video. The deployment of media servers, live webcasting and how the stream is displayed by the consumer's media player are also covered.A final section on associated technologies illustrates how you can protect your revenue sources with digital rights management, looks at content delivery networks and provides examples of successful streaming applications.The supporting website, www.davidausterberry.com/streaming.html, offers updated links to sources of information, manufacturers and suppliers.David Austerberry is co-owner of the new media communications consultancy, Informed Sauce. He has worked with streaming media since the late nineties. Before that, he has been product manager for a number of broadcast equipment manufacturers, and formerly had many years with a leading broadcaster.

Download Link:

Related Books:

Statistical Signal Processing of Complex-Valued Data

The Theory of Improper and Noncircular Signals
Statistical Signal Processing of Complex-Valued Data Image
Complex-valued random signals are embedded in the very fabric of science and engineering, yet the usual assumptions made about their statistical behavior are often a poor representation of the underlying physics. This book deals with improper and noncircular complex signals, which do not conform to classical assumptions, and it demonstrates how correct treatment of these signals can have significant payoffs. The book begins with detailed coverage of the fundamental theory and presents a variety of tools and algorithms for dealing with improper and noncircular signals. It provides a comprehensive account of the main applications, covering detection, estimation, and signal analysis of stationary, nonstationary, and cyclostationary processes. Providing ...

The Business of iPhone and iPad App Development

Making and Marketing Apps that Succeed
The Business of iPhone and iPad App Development Image
2nd Edition
The phenomenal success of the iPhone, iPad and the iPod touch has ushered in a gold rush for developers, but with well over 300,000 apps in the highly competitive App Store, it has become increasingly difficult for new apps to stand out in the crowd. Achieving consumer awareness and sales longevity for your iOS app requires a lot of organization and some strategic planning. Updated and expanded for iOS 4, this bestselling book will show you how to incorporate marketing and business savvy into every aspect of the design and development process, giving your app the best possible chance of succeeding in the App Store. The Business of iPhone and iPad App ...

The Basics of Hacking and Penetration Testing

Ethical Hacking and Penetration Testing Made Easy
The Basics of Hacking and Penetration Testing Image
2nd Edition
The Basics of Hacking and Penetration Testing, 2nd Ed. serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. No prior hacking experience is needed. You will learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack and Kali Linux, Google reconnaissance, MetaGooFil, DNS interrogation, Nmap, Nessus, Metasploit, the Social Engineer Toolkit (SET) , w3af, Netcat, post exploitation tactics, the Hacker Defender rootkit, and more. The book provides a simple and clean explanatio...



2007 - 2021 © eBooks-IT.org