eBooks-it.org Logo
eBooks-IT.org Inner Image

CRC Press eBooks Page 19

Download free CRC Press eBooks Page 19

Parallel Science and Engineering Applications

The Charm++ Approach
Parallel Science and Engineering Applications Image
Developed in the context of science and engineering applications, with each abstraction motivated by and further honed by specific application needs, Charm++ is a production-quality system that runs on almost all parallel computers available. Parallel Science and Engineering Applications: The Charm++ Approach surveys a diverse and scalable collection of science and engineering applications, most of which are used regularly on supercomputers by scientists to further their research. After a brief introduction to Charm++, the book presents several parallel CSE codes written in the Charm++ model, along with their underlying scientific and numerical formulations, explaining their parallelization strategies and parallel performance. These chapters demonstr...

Agile Strategy Management

Techniques for Continuous Alignment and Improvement
Agile Strategy Management Image
Your strategic initiatives are constantly under fire due to the evolving nature of markets, technology, laws, and government. To ensure your strategy succeeds, it must remain flexible while confronting these shifting challenges. Agile Strategy Management: Techniques for Continuous Alignment and Improvement explains how to achieve this flexibility by building agility into the initiation, development, implementation, and governance of your strategic initiatives.The book details what it takes to initiate, develop, implement, and govern a healthy strategy that delivers the benefits expected by all stakeholders. It presents insights gained by the authors organization over the last 25 years helping their clients achieve success with their strategic initiat...

What Every Engineer Should Know About Cyber Security and Digital Forensics

What Every Engineer Should Know About Cyber Security and Digital Forensics Image
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology. Designed for the non-security professional, What Every Engineer Should Know About Cyber Security and Digital Forensics is an overview of the field of cyber security. Exploring the cyber security topics that every engineer should understand, the book discusses: Network security Personal data security Cloud computing Mobile computing Preparing for an incident Incident response Evidence handling Internet usage Law and compliance Security and forensic certifications Application of the concepts is demonstrated thr...

GPU Pro

Advanced Rendering Techniques
GPU Pro Image
This book covers essential tools and techniques for programming the graphics processing unit. Brought to you by Wolfgang Engel and the same team of editors who made the ShaderX series a success, this volume covers advanced rendering techniques, engine design, GPGPU techniques, related mathematical techniques, and game postmortems. A special emphasis is placed on handheld programming to account for the increased importance of graphics on mobile devices, especially the iPhone and iPod touch. Example programs and source code can be downloadedfrom the book's CRC Press web page....

Managing Trust in Cyberspace

Managing Trust in Cyberspace Image
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cl...



2007 - 2017 © eBooks-IT.org