0413~0414_時報全書系
0414~0415_4月選書

英文書 > 全部商品

Autodesk Inventor 2026

Cadartifex  著
Cadartifex 出版
2025/08/02 出版

Autodesk Inventor 2026: A Power Guide for Beginners and Intermediate Users has been designed for both instructor-led courses and self-paced learning. This textbook aims to assist engineers and designers interested in learning Autodesk Inventor to create 3D mechanical designs. It is an excellent guide for new Inventor users and a valuable teaching aid for classroom training.The textbook consists of 14 chapters and a total of 794 pages, covering major environments of Autodesk Inventor, such as the Sketching environment, Part modeling environment, Assembly environment, Presentation environment, and Drawing environment. It teaches you how to use Autodesk Inventor mechanical design software to build parametric 3D solid components and assemblies, as well as create animations and 2D drawings.This textbook not only focuses on the usage of the tools and commands of Autodesk Inventor but also on the concept of design. Each chapter contains tutorials that provide step-by-step instructions for creating mechanical designs and drawings with ease. Who Should Read This Book?This textbook is written to benefit a wide range of Autodesk Inventor users, varying from beginners to advanced users as well as Autodesk Inventor instructors. The easy-to-follow chapters of this textbook allow easy comprehension of different design techniques, Autodesk Inventor tools, and design principles.Interactive Learning SupportKey tutorial steps are accompanied by QR codes that link to video demonstrations, helping users through challenging stages of the learning process.

9 特價2072
立即代訂
下次再買

AutoCAD 2026

Cadartifex  著
Cadartifex 出版
2025/08/02 出版

AutoCAD 2026: A Power Guide for Beginners and Intermediate Users textbook is designed for instructor-led courses as well as for self-paced learning. It is intended to help engineers, designers, and CAD operators interested in learning AutoCAD to create 2D engineering drawings as well as 3D Models. This textbook is a great help for new AutoCAD users and a great teaching aid for classroom training. The textbook consists of 13 chapters, and a total of 552 pages covering major workspaces of AutoCAD such as Drafting & Annotation and 3D Modeling, teaching you to use AutoCAD software for creating, editing, plotting, and managing real-world 2D engineering drawings and 3D Models.This textbook not only focuses on the usage of the tools and commands of AutoCAD but also the concept of design. Every chapter of this textbook contains tutorials that provide users with step-by-step instructions on how to create mechanical designs and drawings in AutoCAD. Additionally, each chapter ends with a hands-on test drive, allowing readers to apply what they've learned and explore AutoCAD's powerful features.Who Should Read This TextbookThis textbook is written to benefit a wide range of AutoCAD users, varying from beginners to advanced users as well as AutoCAD instructors. The easy-to-follow chapters of this book allow you to understand different design techniques and AutoCAD tools/commands easily.Interactive Learning SupportTutorials are supported by QR codes that provide instant access to video demonstrations for additional help, making it easier to follow each step visually.

9 特價1538
立即代訂
下次再買

AI Ethics

Mindful Pages 出版
2025/08/01 出版

As machines grow smarter, the real challenge isn't what AI can do-but what it should do. This urgent and thought-provoking guide tackles the pressing ethical questions surrounding artificial intelligence, from bias in algorithms to the moral implications of autonomous systems. It explores how our values, laws, and philosophical frameworks must evolve in tandem with machines that now make decisions about healthcare, security, employment, and human identity. Inside, you'll uncover: - The hidden biases coded into AI systems and their real-world impacts - What accountability looks like in machine-led decision-making - How ancient moral philosophy applies to futuristic tech - The dangers of unchecked automation and ethical "outsourcing" - The frameworks emerging to build a more transparent and fair digital future Perfect for tech professionals, policy thinkers, and curious citizens, this book offers a clear, accessible, and deeply reflective journey through the ethical maze of our AI-driven era. It will equip readers to ask smarter questions, challenge passive adoption, and advocate for a future where humanity stays at the centre of innovation.

9 特價1637
立即代訂
下次再買

Data Rookies Labs Data Mining with R

2025/08/01 出版

Unlock the power of R and dive into real-world data mining. This hands-on workbook guides you through clustering, classification, and association techniques using approachable language, engaging labs, and no programming prerequisites. Ideal for beginners, students, and instructors alike, you'll learn to explore, normalize, and model data step-by-step-building skills that transfer directly into data science careers. R isn't just a language here-it's a gateway to applied analytics, made accessible through structured, beginner-friendly labs.Extensive resources are available from the publisher (slides, data, code, worksheets).

9 特價1743
立即代訂
下次再買

Image Processing and Computer Vision Masterclass with Python

Sandipan,Dey  著
2025/08/01 出版

Image processing and computer vision technologies, combined with the rapid advancements in generative AI, have become foundational to many modern applications. As visual data continues to grow exponentially, the ability to analyze, interpret, and generate images using advanced algorithms and AI is more critical than ever for driving innovation across industries.This book provides a thorough exploration of advanced techniques and practical implementations in the field of computer vision. This book offers a problem-oriented approach that bridges traditional image processing with modern machine learning and generative AI methods. ​​This new edition significantly expands into specialized domains with medical imaging applications using professional libraries like pydicom, ITK, and nnUNet for clinical diagnosis, including COVID-19 detection and brain tumor segmentation, plus remote sensing analysis with satellite processing.By the end of this book, readers will have developed strong practical skills in both classical and cutting-edge image processing and computer vision techniques, empowered to confidently design, implement, and adapt solutions across a wide range of real-world applications. They will emerge with a deep understanding of theory, hands-on coding experience, and the ability to leverage AI and generative models to push the boundaries of visual computing. WHAT YOU WILL LEARN● Restore and enhance images using classical and deep learning methods.● Segment images with advanced clustering and neural network techniques.● Extract and match features for image alignment and recognition.● Build and train image classifiers with ML and AI.● Learn advanced restoration and inpainting techniques using cutting-edge deep learning models. ● Explore specialized domain expertise in medical imaging applications using professional libraries. WHO THIS BOOK IS FORThis book is ideal for undergraduate and graduate students, researchers, and professionals in computer vision, image processing, and AI. It also serves computer vision engineers, image analysts, data scientists, software engineers, and industry practitioners seeking practical, hands-on expertise using Python.

9 特價1833
立即代訂
下次再買

AI Rookies Labs Learn Text Analytics and NLP using R

2025/08/01 出版

Master text analytics and natural language processing-one lab at a time.This lab-based workbook is your no-fluff, beginner-friendly path to learning text analytics and NLP using real R code. You'll work hands-on with real data and clear examples as you move from tokenization and stopword removal to sentiment analysis, topic modeling, classification, embeddings, and more.Each lab walks you through the entire process-installing packages, running code, understanding output-without assuming any prior programming experience. Whether you're a student, instructor, or data-curious learner, this book helps you build real skills in text mining and natural language processing using R and RStudio.If you want to learn by doing, not just reading, this is your starting point.Extensive resources and supplements are available from the publisher (code, data, slides and more) for teaching and self study.

9 特價1835
立即代訂
下次再買

Mastering Algorithms

2025/08/01 出版

Algorithms are the foundational language of computing, driving everything from efficient search engines to complex machine learning. Acquiring them is essential for any developer or computer scientist seeking to build high-performance, scalable software. The book explores the fundamental data structures like arrays, stacks, queues, linked lists, hashing, and various trees, as well as binomial and Fibonacci heaps. With this foundation, you will explore a wide range of sorting and searching algorithms, from simple methods to more advanced techniques like radix sort and exponential search. You will gain a deep understanding of general methods and applications of divide and conquer, greedy algorithms, dynamic programming, backtracking, and branch and bound, each explained with classic examples.By the end of this book, you will possess the knowledge and skills needed to tackle challenges head-on, whether in academia or the ever-evolving landscape of technology. You will be prepared for the challenges of building robust software in any professional setting. WHAT YOU WILL LEARN● Analyze algorithm and program performance metrics.● Master fundamental data structures for efficiency.● Understand sorting algorithms like quick sort, merge sort.● Explore searching techniques like binary search.● Apply divide and conquer for problem-solving.● Design greedy algorithms for optimization tasks.● Implement graph algorithms for network analysis.WHO THIS BOOK IS FORThis book is for students, programmers, and coders who have a foundational understanding of programming. Readers should be comfortable with basic syntax and logic to fully engage with the algorithmic concepts and their implementations.

9 特價1833
立即代訂
下次再買

Why Machines Learn

2025/08/01 出版

A rich, narrative explanation of the mathematics that has brought us machine learning and the ongoing explosion of artificial intelligence Machine learning systems are making life-altering decisions for us: approving mortgage loans, determining whether a tumor is cancerous, or deciding if someone gets bail. They now influence developments and discoveries in chemistry, biology, and physics--the study of genomes, extrasolar planets, even the intricacies of quantum systems. And all this before large language models such as ChatGPT came on the scene. We are living through a revolution in machine learning-powered AI that shows no signs of slowing down. This technology is based on relatively simple mathematical ideas, some of which go back centuries, including linear algebra and calculus, the stuff of seventeenth- and eighteenth-century mathematics. It took the birth and advancement of computer science and the kindling of 1990s computer chips designed for video games to ignite the explosion of AI that we see today. In this enlightening book, Anil Ananthaswamy explains the fundamental math behind machine learning, while suggesting intriguing links between artificial and natural intelligence. Might the same math underpin them both? As Ananthaswamy resonantly concludes, to make safe and effective use of artificial intelligence, we need to understand its profound capabilities and limitations, the clues to which lie in the math that makes machine learning possible. In a brand-new afterword exclusively in the paperback edition, Ananthaswamy dives into the Transformer architecture that makes large language models like ChatGPT possible and points to groundbreaking future directions enabled by the technology.

9 特價752
立即代訂
下次再買

Artificial Art

Caraco Editore 出版
2025/08/01 出版

Artificial Intelligence has learned to paint, write, and compose. But can it truly create?Generative Artificial Intelligence models can create art by drawing from a dataset that humanity has never had access to before.Artificial Art explores the boundary between human inspiration and algorithmic production, between authentic creativity and synthetic imagination.Through examples, techniques, digital tools, and international case studies, the book guides the reader in discovering a landscape where art, technology, and culture meet and redefine each other.AI is incredibly powerful, but is it still far from dreaming of electric sheep?A clear, current, and engaging text for those who create, observe, teach, or wonder what it means to be an artist today in the era of intelligent machines.With original images generated by the author using AI. Carmine Luino is an artist, educator, and consultant in the field of visual and digital communication. For years he has worked with creativity, technology, and emerging languages. Artificial Art is his first work dedicated to the relationship between artificial intelligence and visual imagination.

9 特價465
立即代訂
下次再買

Data Rookies Labs Intro to Analytics with R

2025/08/01 出版

A Hands-On Introduction to Data Analytics using RData Rookies Labs: Intro to Analytics with R is a guided lab workbook designed to help students learn data science by doing. Through 22 structured labs, learners use R and RStudio to explore topics including descriptive statistics, regression, sampling, data visualization, SQL, classification, sentiment analysis, and more. Each lab provides clear instructions, working code examples, and practice exercises focused on real-world tasks. Students learn to manipulate, analyze, and visualize data using base R, the Tidyverse, and common analytics packages.Built for classrooms and independent study alike, this workbook provides a strong foundation in applied analytics using R-no fluff, no shortcuts, just real code and real skills.Full supplementary resources available from the publisher (answers, slides, worksheets) ready to teach or for self-study.

9 特價2202
立即代訂
下次再買

Node.Js Projects

Jon,Wexler  著
O'Reilly Media 出版
2025/08/01 出版

Whether you're a JavaScript beginner ready to build your first backend app or a self-taught developer looking to grow beyond tutorials, Node.js Projects gives you the hands-on experience you need. Through a series of self-contained projects ranging from content aggregators to secure password managers, web scrapers, ML-backed analysis, and an AI-powered learning assistant, you'll apply modern tools like Fastify, MongoDB, Redis, JWT, and Google's Gemini API in practical, job-relevant ways.With each chapter, author Jonathan Wexler challenges you to think like an engineer, emphasizing architectural thinking, clean coding, and iterative design. You'll build confidence solving real-world problems while deepening your understanding of asynchronous programming, API design, security practices, and scalable deployment patterns.Confidently master async programming with async/await and the Node.js event loopEffectively design scalable APIs using Fastify and modular routing patternsReliably manage data with the filesystem, MongoDB, and CSV outputSecurely implement authentication flows with JWTs and environment-based configsSeamlessly integrate third-party APIs like OpenAI and Google GeminiEfficiently build real-time features with Redis, schedulers, and event-driven logicSmoothly transition from prototype to production with modern Node.js workflows

9 特價2052
立即代訂
下次再買

Artificial Intelligence in the Global South

2025/08/01 出版
9 特價2295
立即代訂
下次再買

AI Rookies Labs Beginning NLP with Orange

2025/08/01 出版

Master text analytics and natural language processing-one lab at a time.This lab-based workbook is your beginner-friendly path to learning text analytics and NLP with Orange Data Mining's visual workflows. You'll work hands-on with real data and clear examples as you move from tokenization and stop word removal to sentiment analysis, topic modeling, classification, embeddings, and more.Each lab guides you step by step-building workflows, connecting components, interpreting results-no programming required. Whether you're a student, instructor, or data-curious learner, this book helps you build real skills in text mining and natural language processing using Orange.If you want to learn by doing, this is your starting point.

9 特價2223
立即代訂
下次再買

Data Rookies Labs Data Wrangling with R

2025/08/01 出版

Learn R by Doing. Data Wrangling with R is a hands-on workbook designed for beginners learning R through practical data cleaning and transformation. With over 20 structured labs, you'll tackle real-world tasks like filtering, sorting, formatting, handling missing data, reshaping datasets, and using packages like dplyr. Clear examples, built-in exercises, and both base R and Tidy verse approaches help you build core wrangling skills essential for any data analyst working in R.NOTE extensive teaching resources - code, exercises, slides are available from the publisher for self-study and course use.

9 特價2294
立即代訂
下次再買

Mathematical Optimization Algorithms with Python

2025/08/01 出版
9 特價3626
立即代訂
下次再買

112 Solved Exercises with FORTRAN

9 特價3626
立即代訂
下次再買

The CTF Playbook

Manish,Singh  著
2025/08/01 出版
9 特價4176
立即代訂
下次再買

A smart Healthcare System

2025/08/01 出版

The book "Smart Healthcare Systems: Reducing False Predictions of Chronic Diseases Using IoT and Machine Learning" presents an innovative, cost-effective IoT-based Ambulatory Blood Pressure Monitoring (IABPM) system aimed at real-time tracking and early detection of Chronic Heart Disease (CHD). It leverages wearable sensors and cloud integration to record blood pressure and pulse data throughout the day, enhancing patient mobility and care. The system applies ML algorithms like Na簿ve Bayes, KNN, Decision Tree, SVM, and XGBoost to clinical datasets (SMHRCE and Kaggle) to predict Early Warning Scores (EWS). The proposed model shows high accuracy (up to 99.85%) and helps reduce healthcare costs, support proactive intervention, and improve diagnostic precision. The project bridges gaps in traditional ABPM systems by offering continuous monitoring, automated alerts, and cloud accessibility-paving the way for improved chronic disease management through technology integration.

9 特價3213
立即代訂
下次再買

Solved exercises with Python

9 特價3213
立即代訂
下次再買

Recent Advances in Neuromorphic Computing

Intechopen 出版
2025/08/01 出版

Artificial Intelligence (AI) is a transformative technology that reshapes our daily lives. Machine Learning (ML), the engine of such a revolution, empowers computers to learn from data, driving innovation in areas such as medicine, robotics, and smart cities through edge applications. These applications bring AI processing closer to the data source, enabling real-time insights and decisions. This evolution is fueled by advancements in hardware and architecture: (1) neuromorphic computing promises unparalleled efficiency; (2) in-memory computing eliminates data access bottlenecks, while emerging memory materials offer denser, faster, and more energy-efficient storage. Looking ahead, AI promises even more profound changes. For instance, explainable AI will make decision-making more transparent, and truly autonomous systems will adapt to unforeseen circumstances. Last but not least, the convergence of AI with quantum computing could unlock entirely new possibilities. This journey showcases a deep understanding of both the theoretical foundations and practical applications of AI. It also demands careful consideration of ethical implications and a commitment to responsible development, ensuring that AI benefits all of humanity.

9 特價6345
立即代訂
下次再買

Artificial Intelligence Security and Safety

Binxing,Fang  著
Springer 出版
2025/07/31 出版

This book proposes the architecture of artificial intelligence (AI) security and safety, discusses the topics about AI for security, AI security and AI safety, and makes an in-depth study on the ethical code of AI security and safety. Meanwhile, this book makes a detailed analysis of "artificial intelligence actant" (AIA) concept and its possible security problems, proposes the solutions for the AIA safely hoop, and provides the assessment and detection methods for AIA. Finally, this book discusses the AI cutting-edge technologies, as well as the future development trend of AI security and safety. This book is suitable for researchers, practitioners, regulators and enthusiasts in the field of AI, cyberspace security, etc.

9 特價7307
立即代訂
下次再買

Symmetry in Nonlinear Dynamics and Chaos II

Mdpi AG 出版
2025/07/31 出版

This compilation provides a thorough review of recent advancements in nonlinear dynamical systems and chaotic behavior. The contents of this reprint are especially pertinent for graduate students and researchers in a variety of fields, including physics, chemistry, biomedicine, social sciences, economic sciences, engineering, etc.

9 特價8842
立即代訂
下次再買

Tactile Robotics

Qiang,Li  著
Academic Press 出版
2025/07/31 出版

Tactile Robotics structures and unifies the information processing of tactile data--not only for extracting object property but also for controller computation. This book systematically introduces tactile sensors, perception, and control, providing readers with no prior background with a better sense and knowledge of robotics and machine learning and helping users understand the concept of tactile robots and their various applications for use in real-world scenarios.

9 特價9360
立即代訂
下次再買

Data Privacy and Cybersecurity in Mobile Crowdsensing

Chuan,Zhang  著
Mdpi AG 出版
2025/07/31 出版

Mobile crowdsensing (MCS) has emerged as a pivotal element in contemporary communication technology, witnessing substantial growth recently. The advent of 5G, the Internet of Things (IoT), and edge computing has propelled MCS researchers to achieve enhanced sensing efficiency and broaden its application spectrum across various domains such as environmental monitoring, traffic management, and healthcare. However, despite these advantages, MCS confronts significant security and privacy challenges due to its open and diverse nature. Critical concerns encompass data leakage, unauthorized access, data tampering, and cross-network attacks. These issues can severely compromise the stability, privacy, and security of MCS systems. Furthermore, the dynamic mobility of users and devices within MCS introduces additional complexity to conventional security measures, particularly concerning communication and cross-domain access control. To tackle these challenges, researchers have devised several strategies aimed at bolstering the security and privacy of MCS systems. These novel protection mechanisms offer distinct benefits over traditional approaches. They are capable of securing data even with constrained computational and communication resources, enhancing system flexibility, and effectively thwarting sophisticated cyberattacks. These strategies provide both theoretical and practical underpinnings for fortifying MCS security and lay a robust foundation for the field's future evolution.

9 特價8842
立即代訂
下次再買

Artificial Media

Springer 出版
2025/07/31 出版

A groundbreaking exploration of the evolving relationship between the fields of artificial intelligence and creativity studies, Artificial Media charts the course of a transformative path toward hybrid methodologies involving computing and human-centric approaches. Scholars and practitioners from leading research centers in South America, Asia and Europe delve into theoretical and philosophical frameworks, practical deployments and data-based critical analyses of artificial-media initiatives that reconfigure authorship and collaboration. Co-creation, collective memory, and situated-knowledge practices are featured in multiple hands-on examples of technological design, music, visual-arts, journalistic and educational projects that address the ethical and social implications of generative techniques. Through an interdisciplinary lens, this collection, projects a nuanced panorama of both the remarkable results and the complex challenges of emerging artificial-media methods, offering practical insights for anyone seeking to engage with the future of creativity in the age of autonomous machines.

9 特價10439
立即代訂
下次再買

Edge Intelligence

Yuezhi,Zhou  著
Mdpi AG 出版
2025/07/31 出版

This reprint provides an overview of the state of edge intelligence research and practice, including innovative programming frameworks, intelligent resource orchestration, secure communication protocols, and healthcare applications. It highlights how edge intelligence can revolutionize network infrastructure, enable innovative applications, and address technical challenges facing 5G and the IoT. This reprint aims to provide opportunities for academic researchers and industry practitioners to exchange creative ideas and then inspire further innovation and foster progress in academia and industry.

9 特價5069
立即代訂
下次再買

Mathematical Modeling and Data Science for Biology and Medicine

Mdpi AG 出版
2025/07/31 出版

This reprint contains all of the articles that were accepted and published in the Special Issue of Mathematics titled "Mathematical Modeling and Data Science for Biology and Medicine ". This Special Issue aims to highlight the development and growing application of mathematical models and data science in medicine, as well as their role in enhancing the understanding and clinical management of various diseases. The articles included in this Issue explore a diverse array of topics, such as cell differentiation, blood flow, tumor growth under virotherapy, chemotherapy treatment sequences for triple-negative locally advanced breast cancer, incidence-dependent management strategies against an SEIRS epidemic, important measures for the prevention and control of the COVID-19 epidemic, invadopodia formation in cancer cells, fitting parameters for multi-exponential diffusion-weighted MRI, and oncolytic virotherapy. These studies employ a variety of mathematical tools, including graph theory, transport equation, systems of ordinary differential equations, systems of nonlinear diffusion equations, free boundary problems, center manifold theory, and optimization techniques, to model a wide range of biological processes. In addition, medical applications are presented based on their mathematical analyses and numerical simulations. Through these articles, readers will gain valuable insights into the latest trends and applications of mathematical modeling in medicine.

9 特價5544
立即代訂
下次再買

Artificial Intelligence for Materials Informatics

Springer 出版
2025/07/31 出版
9 特價13049
立即代訂
下次再買

Pattern Recognition and Image Analysis

Springer 出版
2025/07/31 出版

The two volume set LNCS 15937 + 15938 constitutes the proceedings of the 12th Iberian Conference on Pattern Recognition and Image Analysis, IbPRIA 2025, which took place in Coimbra, Portugal, during June 30-July 3, 2025. The 67 full papers included in the proceedings were carefully reviewed and selected from 115 submissions. They were organized in topical sections as follows: Part I: Computer vision; faces, body, fingerprints and biometrics; machine and deep learning; explainability, bias and fairness in DL; Part II: Natural language processing; biomedical applications; and other applications.

9 特價8351
立即代訂
下次再買

Telecommunications and Remote Sensing

Springer 出版
2025/07/31 出版

This book constitutes the revised selected papers of 13th International Conference on Telecommunications and Remote Sensing, ICTRS 2024, held as a virtual event, during December 19-20, 2024. The 7 full papers and one short paper included in this book were carefully reviewed and selected from 19 submissions. They focus on topics such as Wireless Telecommunications and Networking, Electromagnetic Waves and Fields, Electronics and Photonics, Remote Sensing and Data Interpretation, Remote Sensing and Internet-of-Things and Societal Impact.

9 特價3392
立即代訂
下次再買

Performance Evaluation and Benchmarking

Springer 出版
2025/07/31 出版

This book constitutes the refereed proceedings of the 16th TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC 2024, held in Guangzhou, China, during August 30, 2024. The 7 full papers included in this book were carefully reviewed and selected from 12 submissions. The proceedings also include one invited talk and one paper based on a panel discussion with industry and academic leaders. The book focusses on providing vendors with a valuable tool to showcase the performance competitiveness of their current offerings while also aiding in the enhancement and tracking of products still in development.

9 特價2870
立即代訂
下次再買

Internet of Things, Smart Spaces, and Next Generation Networks and Systems

Springer 出版
2025/07/31 出版

This two-volume set LNCS 15554 and LNCS 15555 constitutes the refereed proceedings of the 24th International Conference on Next Generation Wired/Wireless Networking, NEW2AN 2024, and the 17th Conference on Internet of Things and Smart Spaces, ruSMART 2024, held in Marrakesh, Morocco, during December 11-12, 2024.The 48 full papers included in the joint proceedings were carefully reviewed and selected from 354 submissions. They address various aspects of next-generation data networks, with special attention to advanced wireless networking and applications. In particular, novel and innovative approaches to performance and effciency analysis of 5G and beyond systems, advanced queuing theory, and machine learning are demonstrated. Additionally, the papers focus on the Internet of Things, optics, signal processing, as well as digital Economy and business aspects.

9 特價3653
立即代訂
下次再買

Godot 4 for Beginners

Packt 出版
2025/07/31 出版

Kickstart your game development journey with Godot 4 and create your own indie games from scratch in this part-color guideKey Features: - Implement custom scripts to control game logic and interactions- Learn coding, design, and game mechanics tailored for beginners in 2D and 3D- Build and release your own indie games, from concept to publication- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Jumping into Godot 4 as a beginner can be overwhelming. You're wrestling with a new interface, trying to wrap your head around how nodes and scenes work, and learning GDScript all at once. After years of teaching game development and creating YouTube tutorials, Robert Henning knows exactly where you're likely to have those "wait, what?" moments. He's built this guide to systematically address those challenges head-on, breaking down complex concepts into digestible steps.You'll start by setting up Godot 4 and understanding its interface and tools. Then, you'll dive into nodes and scenes, Godot's way of organizing everything, which sounds intimidating but is actually quite intuitive. From there, you'll explore both 2D and 3D game creation, adding key elements such as players, enemies, collectibles, and lighting effects that make your game pop visually. You'll also get hands-on with Godot's scripting language, GDScript, to bring your game ideas to life.By the end of this Godot 4 book, you'll have the skills to build complete 2D and 3D games from scratch, covering everything from level design and game state management to score tracking and more. Whether you're just getting started or are ready to level up, this book will help you turn your ideas into fully playable games.What You Will Learn: - Navigate and master the Godot 4 interface effectively- Utilize nodes and scenes for structured game development- Create dynamic 2D and immersive 3D game environments- Manipulate lighting to enhance game visuals- Script game mechanics using GDScript- Implement key elements such as players, enemies, and collectibles- Design engaging levels and manage game statesWho this book is for: This book is for anyone who is new to game development or wants to explore the powerful Godot engine. Whether you're an aspiring game developer, an indie creator, a student, or an artist, this book will provide you with a solid foundation.Basic computer skills, including installing and running software and navigating the operating system, are required. While a rudimentary understanding of programming concepts such as variables, loops, and conditional statements can be helpful, it is not essential, as all necessary programming basics are thoroughly explained in the book.Table of Contents- Let's Get Godot-ing!- Exploring the Godot Engine Interface- Introduction to 3D- Scripting with GDScript- Understanding Vectors- Creating a 2D Mini-Game in Godot - Part 1- Creating a 2D Mini-Game in Godot - Part 2- Creating a 3D Mini-Game in Godot - Part 1- Creating a 3D Mini-Game in Godot - Part 2- Adding Game Juice- Understanding Game Design- Where to Next?

9 特價2294
立即代訂
下次再買

Reverse Engineering Armv8-A Systems

Austin,Kim  著
Packt 出版
2025/07/31 出版

Explore reverse engineering in Armv8-A-based Arm devices, develop the skills to analyze binaries, and leverage cutting-edge security hardening features through hands-on techniques and expert insightsKey Features: - Master key aspects of Armv8-A, including register, exception handling, and TrustZone- Build new reversing skills for kernel binaries, such as *.ko and vmlinux, for firmware analysis- Understand Armv8-A's latest security features- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Unlock the secrets hidden in binary code without needing the source! Written by a Linux kernel engineer and author with over 14 years of industry experience, this book lays a solid foundation in reverse engineering and takes you from curious analyst to expert. You'll master advanced techniques to dissect kernel binaries, including kernel module files, vmlinux, and vmcore, giving you the power to analyze systems at their core.This practical, three-part journey starts with the essentials of reverse engineering, introducing the key features of Armv8-A processors and the ELF file format. The second part walks you through the reverse-engineering process, from Arm environment setup to using static and dynamic analysis tools, including innovative methods for analyzing kernel binaries and the powerful debugging tool uftrace. The final part covers security, exploring TrustZone and the latest security techniques to safeguard Arm devices at the hardware level.By the end of this reverse engineering book, you'll have comprehensive Armv8-A expertise and the practical skills to analyze any binary with confidence while leveraging advanced security features to harden your systems.What You Will Learn: - Understand the organization of Arm assembly instructions- Disassemble assembly code without using C code- Work with reverse engineering tools, such as GDB and binary utility- Apply reversing techniques for both user space and kernel binaries- Get to grips with static and dynamic binary analysis processes- Get a solid understanding of the powerful debugging tool, uftrace- Analyze TrustZone and the advanced security features provided by Armv8-AWho this book is for: This book is for professionals and enthusiasts interested in reverse engineering and debugging on Armv8-A-based devices. It is especially useful for system software engineers, security consultants, and ethical hackers expanding their binary analysis expertise. To get the most out of this book, you should have a basic understanding of the C programming language. Familiarity with computer architecture, Linux systems, and security concepts will be a definite advantage.Table of Contents- Learning Fundamentals of Arm Architecture- Understanding the ELF Binary Format- Manipulating Data with Arm Data Processing Instructions- Reading and Writing with Memory Access Instructions- Controlling Execution with Flow Control Instructions- Introducing Reverse Engineering- Setting Up a Practice Environment with an Arm Device- Unpacking the Kernel with Linux Fundamentals- Understanding Basic Static Analysis- Going Deeper with Advanced Static Analysis- Analyzing Program Behavior with Basic Dynamic Analysis- Expert Techniques in Advanced Dynamic Analysis- Tracing Execution with uftrace- Securing Execution with Armv8-A TrustZone- Building Defenses with Key Security Features of Armv8-A

9 特價2294
立即代訂
下次再買

Red Team Engineering

No Starch Press 出版
2025/07/31 出版
9 特價2736
立即代訂
下次再買

Defeating 802.11 Wireless Networks

2025/07/31 出版

Homeland Security of the United States is constantly under threat of attack from terrorist organizations. A variable and current terrorist threat is the use of unmanned aerial vehicles (UAVs) as weapons of mass destruction. These UAVs can be built simply and cheaply from commercial off the shelf (COTS) parts and are typically controlled using standard radio control (RC) technology. An emerging technology that is being implemented to control and communicate with UAVs is the 802.11 wireless network protocol or Wi-Fi. This project discusses various portions of the Wi-Fi protocol and analyzes the protocol to determine techniques for first detecting and then defeating wireless networks utilizing the protocol through denial or deception. The first set of techniques presented defeats a network through denial. These denial techniques are divided into two categories: broad area denial techniques and specific network denial techniques. After denial techniques are discussed a process for decieving an 802.11 wireless network is presented.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Conceptual Design and Analysis of Service Oriented Architecture for Command And Control of Space Assets

2025/07/31 出版

The mission-unique model that has dominated the DoD satellite Command and Control community is costly and inefficient. It requires repeatedly reinventing established common C2 components for each program, unnecessarily inflating budgets and delivery schedules. The effective utilization of standards is scarce, and proprietary, non-open solutions are commonplace. IT professionals have trumpeted Service Oriented Architectures (SOAs) as the solution to large enterprise situations where multiple, functionally redundant but non-compatible information systems create large recurring development, test, maintenance, and tech refresh costs. This thesis describes the current state of Service Oriented Architectures as related to satellite operations and presents a functional analysis used to classify a set of generic C2 services. By assessing the candidate services' suitability through a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis, several C2 functionalities are shown to be more ready than others to be presented as services in the short term. Lastly, key enablers are identified, pinpointing the necessary steps for a full and complete transition from the paradigm of costly mission-unique implementations to the common, interoperable, and reusable space C2 SOA called for by DoD senior leaders.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Cyberspace and the New Age of Influence

2025/07/31 出版

The importance of cyberspace and the utility of networked computer systems have grown exponentially over the past 20 years. For this reason, this study advances a theory for operations in cyberspace that uses the cyber domain to strategically influence an adversary in a context prior to armed conflict. It addresses different types of operations by initially examining parallel constructs from classical airpower theory. It goes on to analyze cyber operations in light of recently demonstrated international cyber events as well as analogues from air warfare, counterinsurgency warfare, and information operations. The analysis demonstrates that capabilities developed to exploit the unique nature of the cyber domain can be extremely persuasive if properly integrated into a well-crafted grand strategy. Effects created within the cyber domain can have real-world results that drive an opposing state's leaders to make decisions favorable to the state that is able to weild power in the domain. These operations can focus on the critical infrastructure of another state, its indigenous population, or even the leaders, themselves.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

The Need for Censorship on the Internet Exists at the Air Command and Staff College

2025/07/31 出版

The researcher will survey the untilization characteristics of both faculty and students to support or refute the need for Internet censorship at ACSC. Internet censorship will be approached from the perspective of "according to Air University commander's intent". Not from a pornography or indecent perspective.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Scaling Ant Colony Optimization With Hierarchical Reinforcement Learning Partitioning

Erik,Dries  著
2025/07/31 出版

This research merges the hierarchical reinforcement learning (HRL) domain and the ant colony optimization (ACO) domain. The merger produces a HRL ACO algorithm capable of generating solutions for both domains. This research also provides two specific implementations of the new algorithm: the first a modification to Dietterich's MAXQ-Q HRL algorithm, the second a hierarchical ACO algorithm. These implementations generate faster results, with little to no significant change in the quality of solutions for the tested problem domains. The application of ACO to the MAXQ-Q algorithm replaces the reinforcement learning, Q-learning and SARSA, with the modified ant colony optimization method, Ant-Q. This algorithm, MAXQ-AntQ, converges to solutions not significantly different from MAXQ-Q in 88% of the time. This research then transfers HRL techniques to the ACO domain and traveling salesman problem (TSP). To apply HRL to ACO, a hierarchy must be created for the TSP. A data clustering algorithm creates these subtasks, with an ACO algorithm to solve the individual and complete problems. This research tests two clustering algorithms, k-means and G-means.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Post-Processing Resolution Enhancement of Open Skies Photographic Imagery

2025/07/31 出版

The Treaty on Opens Skies allows any signatory nation to fly a specifically equipped reconnaissance aircraft anywhere over the territory of any other signatory nation. For photographic images, this treaty allows for a maximum ground resolution of 30 cm. The National Air Intelligence Center (NAIC), which manages implementation of the Open Skies Treaty for the US Air Force, wants to determine if post-processing of the photographic images can improve spatial resolution beyond 30 cm, and if so, determine the improvement achievable. Results presented in this thesis show that standard linear filters (edge and sharpening) do not improve resolution significantly and that super-resolution techniques are necessary. Most importantly, this thesis describes a prior-knowledge model fitting technique that improves resolution beyond the 30 cm treaty limit. The capabilities of this technique are demonstrated for a standard 3-Bar target, an optically degraded 2-Bar target, and the USAF airstar emblem.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Speech Recognition Using the Mellin Transform

2025/07/31 出版

The purpose of this research was to improve performance in speech recognition. Specifically, a new approach was investigating by applying an integral transform known as the Mellin transform (MT) on the output of an auditory model to improve the recognition rate of phonemes through the scale-invariance property of the Mellin transform. Scale-invariance means that as a time-domain signal is subjected to dilations, the distribution of the signal in the MT domain remains unaffected. An auditory model was used to transform speech waveforms into images representing how the brain "sees" a sound. The MT was applied and features were extracted. The features were used in a speech recognizer based on Hidden Markov Models. The results from speech recognition experiments showed an increase in recognition rates for some phonemes compared to traditional methods.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks

2025/07/31 出版

In this thesis, we analyze various factors that affect quality of service (QoS) communication in high-speed, packet-switching sub-networks. We hypothesize that sub-network-wide bandwidth reservation and guaranteed CPU processing power at endpoint systems for handling data traffic are indispensable to achieving hard end-to-end quality of service. Different bandwidth reservation strategies, traffic characterization schemes, and scheduling algorithms affect the network resources and CPU usage as well as the extent that QoS can be achieved. In order to analyze those factors, we design and implement a communication layer. Our experimental analysis supports our research hypothesis. The Resource ReSerVation Protocol (RSVP) is designed to realize resource reservation. Our analysis of RSVP shows that using RSVP solely is insufficient to provide hard end-to-end quality of service in a high-speed sub-network. Analysis of the IEEE 802.lp protocol also supports the research hypothesis.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價731
立即代訂
下次再買

Secureqemu

2025/07/31 出版

This research presents an original emulation-based software protection scheme providing protection from reverse code engineering (RCE) and software exploitation using encrypted code execution and page-granularity code signing, respectively. Protection mechanisms execute in trusted emulators while remaining out-of-band of untrusted systems being emulated. This protection scheme is called SecureQEMU and is based on a modi ed version of Quick Emulator (QEMU). RCE is a process that uncovers the internal workings of a program. It is used during vulnerability and intellectual property (IP) discovery. To protect from RCE program code may have anti-disassembly, anti-debugging, and obfuscation techniques incorporated. These techniques slow the process of RCE, however, once defeated protected code is still comprehensible.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Automating Security Protocol Analysis

2025/07/31 出版

When Roger Needham and Michael Schroeder first introduced a seemingly secure protocol [24], it took over 18 years to discover that even with the most secure encryption, the conversations using this protocol were still subject to penetration. To date, there is still no one protocol that is accepted for universal use. Because of this, analysis of the protocol outside the encryption is becoming more important. Recent work by Joshua Guttman and others [9] have identified several properties that good protocols often exhibit. Termed "Authentication Tests", these properties have been very useful in examining protocols. The purpose of this research is to automate these tests and thus help expedite the analysis of both existing and future protocols. The success of this research is shown through rapid analysis of numerous protocols for the existence of authentication tests. The result of this is that an analyst is now able to ascertain in near real-time whether or not a proposed protocol is of a sound design or whether an existing protocol may contain previously unknown weaknesses. The other achievement of this research is the generality of the input process involved. Although there exist other protocol analyzers, their use is limited primarily due to their complexity of use. With the tool generated here, an analyst needs only to enter their protocol into a standard text file; and almost immediately, the analyzer determines the existence of the authentication tests.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買

Cobol Reengineering Using the Parameter Based Object Identification Methodology

2025/07/31 出版

This research focuses on how to reengineer Cobol legacy systems into object-oriented systems using Sward's Parameter Based Object Identification (PBOI) methodology. The method is based on relating categories of imperative subprograms to classes written in object-oriented language based on how parameters are handled and shared among them. The input language of PBOI is a canonical form called the generic imperative model (GIM), which is an abstract syntax tree (AST) representation of a simple imperative programming language. The output is another AST, the generic object model (GOM), a generic object oriented language. Conventional languages must be translated into the GIM to use PBOI. The first step in this research is to analyze and classify Cobol constructs. The second step is to develop Refine programs to perform the translation of Cobol programs into the GIM. The third step is to use the PBOI prototype system to transform the imperative model in the GIM into the GOM. The final step is to perform a validation of the objects extracted, analyze the system functionally, and evaluate the PBOI methodology in terms of the case study.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.

9 特價823
立即代訂
下次再買
頁數13/487
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing