This book is an essential desktop reference for the CERT C coding standard. The CERT C Coding Standard is an indispensable collection of expert information. The standard itemizes those coding errors that are the root causes of software vulnerabilities in C and prioritizes them by severity, likelihood of exploitation, and remediation costs. Each guideline provides examples of insecure code as well as secure, alternative implementations. If uniformly applied, these guidelines will eliminate the critical coding errors that lead to buffer overflows, format string vulnerabilities, integer overflow, and other common software vulnerabilities.
Machine learning is an intimidating subject until you know the fundamentals. If you understand basic coding concepts, this introductory guide will help you gain a solid foundation in machine learning principles.
This exciting and entertaining textbook is ideal for courses in information, communication and coding. It is an unparalleled entry point to these subjects for professionals working in areas as diverse as computational biology, data mining, financial engineering and machine learning.
Since the publication of Wireless Video Communications five years ago, the area of video compression and wireless transceivers has evolved even further. This new edition addresses a range of recent developments in these areas, giving cognizance to the associated transmission aspects and issues of error resilience. Video Compression and Communications has been updated and condensed yet remains all-encompassing, giving a comprehensive overview of the subject. Covering compression issues, coding delay, implementational complexity and bitrate, the book also looks at the historical perspective to video communication. * New edition of successful and informative text, Wireless Video Communications * Substantial new material has been added on areas such as H.264, MPEG4 coding and transceivers * Clear presentation and broad scope make it essential for anyone interested in wireless communications * Systematically converts the lessons of Shannon´s information theory into design principles applicable to practical wireless systems. This book is ideal for postgraduates and researchers in communication systems but will also be a valuable reference to undergraduates, development and systems engineers of video compression applications as well as industrialists, managers and visual communications practitioners.
Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD-ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression. This book provides a comprehensive reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, analysis of most common methods, and discussions on the use and comparative benefits of methods and description of ´´how to´´ use them. Detailed descriptions and explanations of the most well-known and frequently used compression methods are covered in a self-contained fashion, with an accessible style and technical level for specialists and non-specialists.
Software developers need to worry about security as never before. They need clear guidance on safe coding practices, and that´s exactly what this book delivers. The book does not delve deep into theory, or rant about the politics of security. Instead, it clearly and simply lays out the most common threats that programmers need to defend against. It then shows programmers how to make their defense. The book takes a broad focus, ranging over SQL injection, worms and buffer overflows, password security, and more. It sets programmers on the path towards successfully defending against the entire gamut of security threats that they might face.
There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists use computers in factoring large integers, determining primes, testing conjectures, and solving other problems. This book takes the reader from elementary number theory, via algorithmic number theory, to applied number theory in computer science. It introduces basic concepts, results, and methods, and discusses their applications in the design of hardware and software, cryptography, and security. It is aimed at undergraduates in computing and information technology, but will also be valuable to mathematics students interested in applications. In this 2nd edition full proofs of many theorems are added and some corrections are made.
Beginning Visual Basic 2008 Databases teaches you everything you need to know about relational databases, SQL, and ADO.NET 2.0. It gives you a sound start in developing console and Windows database applications. The book also includes chapters on the new SQL Server XML data type and the forthcoming LINQ enhancements to the next version of Visual Basic. In addition to teaching you such basics as using SQL to communicate with databases, this book provides you with detailed, code-practical techniques to access data in VB 2008 across a range of coding situations.