Digital Video Concepts, Methods, and Metrics

Digital Video Concepts, Methods, and Metrics

Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed and power.


Optimizing HPC Applications with Intel Cluster Tools

Optimizing HPC Applications with Intel Cluster Tools

Optimizing HPC Applications with Intel® Cluster Tools combines an easygoing and informal style with a systematic methodology of parallel program optimization. Real-life examples convey the best known optimization methods applicable in high-performance Linux environments.


The InfoSec Handbook

The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook: An Introduction to Information Security is An easily accessible but detailed book making it easy for beginners to experienced engineers to get the lowdown on the latest policies, practices, tools, and technologies available in the field of information security.


Android Application Development for the Intel Platform

Android Application Development for the Intel Platform

Android Application Development for the Intel® Platform is the perfect introduction for software engineers and mobile app developers. Through well-designed app samples, code samples and case studies, the book teaches Android application development based on the Intel platform–including for smartphones, tablets and embedded devices—covering performance tuning, debugging, and optimization.


GUI Design for Android Apps

GUI Design for Android Apps

GUI Design for Android Apps is the perfect–and concise–introduction for mobile app developers and designers. Excerpted from Android Application Development for the Intel® Platform, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices.


Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s security and management engine, with details on the security features and the steps for configuring and invoking them. It’s written for security professionals and researchers; embedded-system engineers; and software engineers and vendors.


Computer Vision Metrics

Computer Vision Metrics: Survey, Taxonomy, and Analysis

Computer Vision Metrics: Survey, Taxonomy, and Analysis provides an extensive survey and analysis of current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more.


Building the Infrastructure for Cloud Security

Building the Infrastructure for Cloud Security: A Solutions View

Building the Infrastructure for Cloud Security: A Solutions View provides a comprehensive look at the various facets of cloud security – infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective.


Learn BlackBerry 10 App Development

Learn BlackBerry 10 App Development: A Cascades-Driven Approach

Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development: A Cascades-Driven Approach gives you a solid foundation for creating BlackBerry 10 apps efficiently.


The Privacy Engineer’s Manifesto

The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value

The Privacy Engineer’s Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, detailing industry-proven solutions that go beyond mere theory on how to build privacy into products, processes, applications, and systems. The book offers lucid perspectives on the challenges and opportunities raised with the emerging “personal” information economy and how organizations can rise up to meet the organizational, asset management-related and innovation-related challenges ahead.





Free Offer of the Day!

The PHP AnthologyThe Ultimate Interview Guide - Free eBook!
Get tips from the team that conducts over 250 interviews a month. At Morgan Hunter, we interview an average of 257 people a month. We've seen it all - the good, the bad, and the just okay. We want to share our experience with you, because we know what it takes to have a successful interview. In this eBook, we will walk you through the steps you need to take to nail your next interview.