A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp t…
This open access book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Graph Structures for Knowledge Representation and Reasoning, GKR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 7 revised full papers presented together with 2 invited contributions were revie…
This open access book constitutes the refereed post-conference proceedings of the First IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 12 full papers presented were carefully reviewed and selected from 24 submissions. Also included in this volume are 4 WCC 2018 pl…
This book describes warehouse-scale computers (WSCs), the computing platforms that power cloud computing and all the great web services we use every day. It discusses how these new systems treat the datacenter itself as one massive computer designed at warehouse scale, with hardware and software working in concert to deliver good levels of internet service performance. The book details the arch…
This book presents computer programming as a key method for solving mathematical problems. There are two versions of the book, one for MATLAB and one for Python. The book was inspired by the Springer book TCSE 6: A Primer on Scientific Programming with Python (by Langtangen), but the style is more accessible and concise, in keeping with the needs of engineering students. The book outlines the s…
It offers comprehensive, self-contained knowledge on Mobile Edge Computing (MEC), which is a very promising technology for achieving intelligence in the next-generation wireless communications and computing networks. The book starts with the basic concepts, key techniques and network architectures of MEC. Then, we present the wide applications of MEC, including edge caching, 6G networks, Inter…
This open access book constitutes the proceedings of the 24th International Conference on Fundamental Approaches to Software Engineering, FASE 2021, which took place during March 27–April 1, 2021, and was held as part of the Joint Conferences on Theory and Practice of Software, ETAPS 2021. The conference was planned to take place in Luxembourg but changed to an online format due to the COVID-…
Buku ini berisi informasi 101 jenis ikan hias air tawar Asli Indonesia yang selanjutnya disebut Ikan Hias Nusantara. Ikan-ikan tersebut tersebar di Papua Barat (Irian), Sulawesi, Kalimantan, Jawa, dan Sumatera. Akan tetapi cenderung didominasi oleh ikan hias yang berasal dari Papua yang berjumlah 49 jenis. Dua jenis di antaranya merupakan hasil rekayasa (hibridisasi) yang dilakukan di Laborator…
Munculnya penyakit pada budidaya ikan menyebabkan kerugian ekonomi yang tidak sedikit. Infeksi Aeromonas sp. (penyakit merah) mengakibatkan kerugian 400 miliar rupiah per tahun. Infeksi parasit Ichthyophthyrius multifiliis (bintik putih) mengakibatkan kematian ikan 25% hingga 100% dalam waktu singkat, dengan kerugian 50 miliar rupiah per tahun. Serangan Streptococcus sp. pada ikan nila mengakib…
Fighting for a Living investigates the circumstances that have produced starkly different systems of recruiting and employing soldiers in different parts of the globe over the last 500 years. It does so on the basis of a wide range of case studies taken from Europe, Africa, America, the Middle East and Asia. The novelty of "Fighting for a Living" is that it is not military history in the tradit…