Browse
Author profile
Load More
TRAINING MAJORS
- Khoa Điện - Tự động hóa (668)
- Khoa Công nghệ thông tin (368)
- Khoa Cơ khí (280)
- Khoa Dệt may và Thời Trang (106)
- Khoa Công nghệ thực phẩm (81)
Load More
Học liệu điện tử
Browsing Học liệu điện tử by Issue Date
Now showing 1 - 24 of 67
Results Per Page
Sort Options
- PublicationPressure Garments : A Manual on Their Design and Fabrication(Butterworth-Heinemann, 1995) Pratt, Joanne; West, GillPressure Garments: A Manual on their Design & Fabrication presents the development and principles of pressure therapy. It discusses the physical description and treatment of burns. It addresses the emotional and physical effect of scars caused by burn injury. Some of the topics covered in the book are the comparison of keloid and hypertrophic scars; management of hypertrophic scarring; methods of pressure application; complications of pressure therapy; pressure therapy treatment regimen; stages in garment design and production; glove measurements; and design considerations. The description of upper limb garments is fully covered. An in-depth account of the measurements, pattern drafting, fabric cutting, and sewing of the garment is provided. The book can provide useful information to therapists, students, and researchers.
- PublicationNetwork Simulation(Springer, 2007) Fujimoto, Richard M.; Perumalla, Kalyan S.; Riley, George F.A detailed introduction to the design, implementation, and use of network simulation tools is presented. The requirements and issues faced in the design of simulators for wired and wireless networks are discussed. Abstractions such as packet- and fluid-level network models are covered. Several existing simulations are given as examples, with details and rationales regarding design decisions presented. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the scale and performance of a simulation environment.
- PublicationSOA in Practice : The Art of Distributed System Design(O'Reilly Media, 2007) Josuttis, Nicolai M.This book demonstrates service-oriented architecture (SOA) as a concrete discipline rather than a hopeful collection of cloud charts. Built upon the author's firsthand experience rolling out a SOA at a major corporation, SOA in Practice explains how SOA can simplify the creation and maintenance of large-scale applications. Whether your project involves a large set of Web Services-based components, or connects legacy applications to modern business processes, this book clarifies how -- and whether -- SOA fits your needs.SOA has been a vision for years. This book brings it down to earth by describing the real-world problems of implementing and running a SOA in practice. After defining SOA's many facets, examining typical use patterns, and exploring how loose coupling helps build stronger applications, SOA in Practice presents a framework to help you determine when to take advantage of SOA.
- PublicationNatural Language Processing with Python : Analyzing Text with the Natural Language Toolkit(O'Reilly Media, 2009) Bird, Steven; Klein, Ewan; Loper, EdwardThis book offers a highly accessible introduction to natural language processing, the field that supports a variety of language technologies, from predictive text and email filtering to automatic summarization and translation. With it, you'll learn how to write Python programs that work with large collections of unstructured text. You'll access richly annotated datasets using a comprehensive range of linguistic data structures, and you'll understand the main algorithms for analyzing the content and structure of written communication.
- PublicationRecommender Systems Handbook(Springer, 2011) Ricci, Francesco; Rokach, Lior; Shapira, Bracha; Kantor, Paul B.The explosive growth of e-commerce and online environments has made the issue of information search and selection increasingly serious; users are overloaded by options to consider and they may not have the time or knowledge to personally evaluate these options. Recommender systems have proven to be a valuable way for online users to cope with the information overload and have become one of the most powerful and popular tools in electronic commerce. Correspondingly, various techniques for recommendation generation have been proposed. During the last decade, many of them have also been successfully deployed in commercial environments.
- PublicationTechniques and Principles in Language Teaching 3rd Edition(Oxford University Press, 2011) Larsen-Freeman, Diane; Anderson, MartiTechniques and Principles in Language Teaching has influenced the way thousands of teachers have taught English. This classic guide to developing the way you teach has been an essential resource to new and experienced teachers worldwide, and is now in its third edition. Each chapter focuses on a different teaching approach, describing it being used in the classroom, analyzing what happened, and helping you think how you could apply it to your own teaching. New features of the third edition include: a new discussion on the political dimensions of language teaching, a new digital technology chapter, and extended coverage of content-based and task-based approaches. On this site you will find additional resources, including author videos in which Diane Larsen-Freeman and Marti Anderson talk about the background to the book and new innovations in language teaching which are discussed in the third edition.
- PublicationIntroduction to Network Simulator NS2(Springer, 2012) Issariyakul, Teerawat; Hossain, EkramIntroduction to Network Simulator NS2 is a primer providing materials for NS2 beginners, whether students, professors, or researchers for understanding the architecture of Network Simulator 2 (NS2) and for incorporating simulation modules into NS2. The authors discuss the simulation architecture and the key components of NS2 including simulation-related objects, network objects, packet-related objects, and helper objects. The NS2 modules included within are nodes, links, SimpleLink objects, packets, agents, and applications. Further, the book covers three helper modules: timers, random number generators, and error models.
- PublicationProgramming Computer Vision with Python : Tools and Algorithms for Analyzing Images(Reilly - O'Reilly Media, 2012) Solem, Jan ErikThis book is ideal for students, researchers, and enthusiasts with basic programming and standard mathematical skills.Learn techniques used in robot navigation, medical image analysis, and other computer vision applicationsWork with image mappings and transforms, such as texture warping and panorama creationCompute 3D reconstructions from several images of the same sceneOrganize images based on similarity or content, using clustering methodsBuild efficient image retrieval techniques to search for images based on visual contentUse algorithms to classify image content and recognize objectsAccess the popular OpenCV library through a Python interface.
- PublicationWireless Network Security A Beginner's Guide(McGraw Hill, 2012) Wrightson, TylerSecurity Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away. Wireless Network Security: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience
- PublicationPractical Malware Analysis : The Hands-On Guide to Dissecting Malicious Software(2012) Sikorski, Michael; Honig, AndrewMalware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:–Set up a safe virtual environment to analyze malware–Quickly extract network signatures and host-based indicators–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques–Use your newfound knowledge of Windows internals for malware analysis–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers–Analyze special cases of malware with shellcode, C++, and 64-bit code
- PublicationTextile Processes : Quality Control and Design of Experiments(Momentum Press, 2013) Damyanov, Georgi Borisov; Stoyanova ,Diana; Germanova-KrastevaTextiles are everywhere in the modern world as natural, synthetic, and blended fibers, yarns, and fabrics. They might be woven or non-woven. We use them for cloths of all varieties from disposal wipes to bandages to blankets to clothing. We use them in the upholsteries, carpets, and curtains in our homes and in cars and aircraft. Textiles are now “smart.” They can be embedded with sensors that monitor our life functions, such as heart rate and breathing, and send signals to medical authorities about pending heart attacks. Giving the textiles different forms through cutting and sewing as well as combining different textile and non-textile materials, we can produce products with a wide range of applications. All of them, nevertheless, are produced by similar manufacturing processes.
- PublicationJoining Textiles: Principles and Applications(Woodhead Publishing, 2013) Jones, I.; Stylios, G. K.Understanding the techniques for joining fabrics together in a way that considers durability, strength, leak-tightness, comfort in wear and the aesthetics of the joints is critical to the production of successful, structurally secure fabric products. Joining textiles: Principles and applications is an authoritative guide to the key theories and methods used to join fabrics efficiently.Part one provides a clear overview of sewing technology. The mechanics of stitching, sewing and problems related to sewn textiles are discussed, along with mechanisms of sewing machines and intelligent sewing systems. Part two goes on to explore adhesive bonding of textiles, including principles, methods and applications, along with a review of bonding requirements in coating and laminating of textiles.
- PublicationWireless Networking : Understanding Internetworking Challenges(Wiley-IEEE Press, 2013) Burbank, Jack L.; Andrusenko, Julia; Everett, Jared S.; Kasch, William T. M.This book focuses on providing a detailed and practical explanation of key existing and emerging wireless networking technologies and trends,while minimizing the amount of theoretical background information. The book also goes beyond simply presenting what the technology is, but also examines why the technology is the way it is, the history of its development, standardization, and deployment. The book also describes how each technology is used, what problems it was designed to solve, what problems it was not designed to solve., how it relates to other technologies in the marketplace, and internetworking challenges faced withing the context of the Internet, as well as providing deployment trends and standardization trends. Finally, this book decomposes evolving wireless technologies to identify key technical and usage trends in order to discuss the likely characteristics of future wireless networks.
- PublicationWorld Clothing and Fashion : An Encyclopedia of History, Culture, and Social Influence(Sharpe Reference, 2014) Snodgrass, Mary EllenTaking a global, multicultural, social, and economic perspective, this work explores the diverse and colourful history of human attire. From prehistoric times to the age of globalization, articles cover the evolution of clothing utility, style, production, and commerce, including accessories (shoes, hats, gloves, handbags, and jewellery) for men, women, and children.Dress for different climates, occupations, recreational activities, religious observances, rites of passages, and other human needs and purposes - from hunting and warfare to sports and space exploration - are examined in depth and detail. Fashion and design trends in diverse historical periods, regions and countries, and social and ethnic groups constitute a major area of coverage, as does the evolution of materials (from animal fur to textiles to synthetic fabrics) and production methods (from sewing and weaving to industrial manufacturing and computer-aided design).
- PublicationPenetration Testing : A Hands-On Introduction to Hacking(2014) Weidman, GeorgiaPenetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.Learn how to:–Crack passwords and wireless network keys with brute-forcing and wordlists–Test web applications for vulnerabilities–Use the Metasploit Framework to launch exploits and write your own Metasploit modules–Automate social-engineering attacks–Bypass antivirus software–Turn access to one machine into total control of the enterprise in the post exploitation phase
- PublicationIII-V Integrated Circuit Fabrication Technology(Jenny Stanford Publishing, 2015) Tiku, Shiban; Biswas, DhrubesGaAs processing has reached a mature stage. New semiconductor compounds are emerging that will dominate future materials and device research, although the processing techniques used for GaAs will still remain relevant. This book covers all aspects of the current state of the art of III-V processing, with emphasis on HBTs. It is aimed at practicing.
- PublicationUnderstanding Second Language Acquisition 2nd Edition(Oxford University Press, 2015) Ellis, RodIn the 30 years since Rod Ellis first published the award-winning Understanding Second Language Acquisition, it has become a classic text. This new, fully updated edition continues to provide an authoritative and highly readable introduction to key areas of theory and research in second language acquisition. Ellis presents a comprehensive overview of the different theories in this field and examines critical reactions to them. The book reflects recent trends in looking at cognitive and social aspects of second language acquisition, as well as examining the roles played by implicit and explicit instruction in language learning.
- PublicationRecommender Systems : The Textbook(Springer, 2016) Aggarwal, Charu C.This book comprehensively covers the topic of recommender systems, which provide personalized recommendations of products or services to users based on their previous searches or purchases. Recommender system methods have been adapted to diverse applications including query log mining, social networking, news recommendations, and computational advertising. This book synthesizes both fundamental and advanced topics of a research area that has now reached maturity. The chapters of this book are organized into three categories: Algorithms and evaluation: These chapters discuss the fundamental algorithms in recommender systems, including collaborative filtering methods, content-based methods, knowledge-based methods, ensemble-based methods, and evaluation.
- PublicationThe Book of R : A First Course in Programming and Statistics(2016) Davies, Tilman M.The Book of R is a comprehensive, beginner-friendly guide to R, the world's most popular programming language for statistical analysis. Even if you have no programming experience and little more than a grounding in the basics of mathematics, you'll find everything you need to begin using R effectively for statistical analysis.You'll start with the basics, like how to handle data and write simple programs, before moving on to more advanced topics, like producing statistical summaries of your data and performing statistical tests and modeling. You'll even learn how to create impressive data visualizations with R's basic graphics tools and contributed packages, like ggplot2 and ggvis, as well as interactive 3D visualizations using the rgl package.
- PublicationAccounting 101 : From Calculating Revenues and Profits to Determining Assets and Liabilities, an Essential Guide to Accounting Basics(Adams Media, 2017) Cagan, MicheleA quick and easy guide to help you learn the basics of accounting.The ability to negotiate a deal. Confidence to oversee staff. Complete and accurate monitoring of expenses. In today's business climate, these are must-have skills. But all too often, comprehensive business books turn the important details of best practices into tedious reading that would put even a CEO to sleep. This bestselling series is packed with hundreds of entertaining tidbits and concepts that can't be found anywhere else.
- PublicationData Mining : Practical Machine Learning Tools and Techniques(Morgan Kaufmann, 2017) Witten, Ian H.; Frank, Eibe; Hall, Mark A.; Pal, Christopher J.Data Mining: Practical Machine Learning Tools and Techniques, Fourth Edition, offers a thorough grounding in machine learning concepts, along with practical advice on applying these tools and techniques in real-world data mining situations. This highly anticipated fourth edition of the most acclaimed work on data mining and machine learning teaches readers everything they need to know to get going, from preparing inputs, interpreting outputs, evaluating results, to the algorithmic methods at the heart of successful data mining approaches. Extensive updates reflect the technical changes and modernizations that have taken place in the field since the last edition, including substantial new chapters on probabilistic methods and on deep learning.
- PublicationPractical Azure Application Development : A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions(Apress, 2017) Vijayakumar, ThurupathanGet started and learn a step-by-step approach to application development using Microsoft Azure. Select the right services to solve the problem at hand in a cost-effective manner and explore the potential different services and how they can help in building enterprise applications. Azure has an ample amount of resources and tutorials, but most of them focus on specific services and explain those services on their own and in a given context. Practical Azure Application Development focuses on building complete solutions on Azure using different services. This book gives you the holistic approach to Azure as a solutions development platform.
- PublicationBlockchain Basics : A Non-Technical Introduction in 25 Steps(Apress, 2017) Drescher, DanielIn 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You'll LearnWhat the blockchain isWhy it is needed and what problem it solves
- PublicationLearning Web Design : A Beginner's Guide to HTML, CSS, JavaScript, and Web Graphics(O'Reilly Media, 2018) Robbins, JenniferDo you want to build web pages but have no prior experience? This friendly guide is the perfect place to start. You'll begin at square one, learning how the web and web pages work, and then steadily build from there. By the end of the book, you'll have the skills to create a simple site with multicolumn pages that adapt for mobile devices.Each chapter provides exercises to help you learn various techniques and short quizzes to make sure you understand key concepts.This thoroughly revised edition is ideal for students and professionals of all backgrounds and skill levels. It is simple and clear enough for beginners, yet thorough enough to be a useful reference for experienced developers keeping their skills up to date.