You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book discusses the advanced databases for the cloud-based application known as NoSQL. It will explore the recent advancements in NoSQL database technology. Chapters on structured, unstructured and hybrid databases will be included to explore bigdata analytics, bigdata storage and processing. The book is likely to cover a wide range of topics such as cloud computing, social computing, bigdata and advanced databases processing techniques.
http://s19design.wordpress.com Bismillahir Rahmaanir Raheem This book is a collection and compilation of the sayings and sterling words of advice of a master of Shariat and Tasawwuf, Hadhrat-e- Aqdas, Faqeehul Ummat, Hadhrat Mufti Mahmood Hasan Saahib Gangohi (May Allaah Ta'aala fill his grave with noor) in discussions that took place at various gatherings. These issues are of utmost importance, especially in times when it is evident that many efforts are underway to undermine the integrity of the beloved friends of Allah and the true lovers of Rasulullah J. False allegations levelled against them puts the public into doubts and misunderstandings about them. Thus the common man is deprived o...
Cloud computing is rapidly expanding in its applications and capabilities through various parts of society. Utilizing different types of virtualization technologies can push this branch of computing to even greater heights. Design and Use of Virtualization Technology in Cloud Computing is a crucial resource that provides in-depth discussions on the background of virtualization, and the ways it can help shape the future of cloud computing technologies. Highlighting relevant topics including grid computing, mobile computing, open source virtualization, and virtualization in education, this scholarly reference source is ideal for computer engineers, academicians, students, and researchers that are interested in learning more about how to infuse current cloud computing technologies with virtualization advancements.
This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
It expands on numerous aspects of the Quran, all of which point to its magnificence, as signified by the apt title. The author discusses everything from the methodology of studying the Qur'an to its characteristics, qualities and the manners with which one should approach it. It is much like a user's manual that opens up a world of knowledge and facts about the Qur'an. For all audiences, this book is an invaluable companion to the Qur'an and one which serves to remind us of its eminence and its superiority to all other books. By discussing a series of seemingly miscellaneous topics, the author manages to create a whole picture of the Qur'an which surpasses any other guide of this academic nature.
What happens when life throws at you the most terrible moments and you still must smile and live as if your world is perfect? How would one feel when one’s own father disowns the family for love of another woman? Life is a strange thing. It mocks people with their own dreams and desires. Be a part of this beautiful journey where a young boy takes all the difficulties in life as challenges and overcomes them with sheer hard work and passion, all to keep his family happy. Discover the undying love towards parents, the innumerable sacrifices of a father, the humility of a man whose kindness and honesty were remarkable. From being an angry boy to a sober man, Abdul Nabi’s life takes strange turns and turns him into a tough lad. For many, he just remained a common man with common dreams. But for some he remained a hero. A hero who saved their little world.
The Mirage is an expression of His Excellency Dr. Jamal Sanad Al-Suwaidi’s perspective that the struggle in which many Arab and Muslim countries are currently engaged against extremist groups and organizations is not limited to the realm of military and security operations; it is also an extended war of an essentially intellectual nature that requires long-term planning, which is no less important – indeed, perhaps even more so – than planning in military and security terms. Academic scholarship plays a vital role in protecting the security of nations and societies via rigorous analysis of challenges and threats and the subsequent presentation of appropriate solutions. The role of scho...
Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
Papers on neutrosophic and plithogenic sets, logics, probabilities and statistics, on NeutroAlgebra and AntiAlgebra, NeutroGeometry and AntiGeometry, SuperHyperAlgebra and Neutrosophic SuperHyperAlgebra, etc…
In current digital era, information is an important asset for our daily life as well as for small and large-scale businesses. The network technologies are the main enablers that connect the computing devices and resources together to collect, process and share vital information locally as well as globally. The network technologies provide efficient, flexible and seamless communication while maximizing productivity and resources for our day-to-day lives and business operations. For all its importance, this domain has evolved drastically, from the traditional wired networks to Bluetooth, infrared-waves, micro-waves, radio-waves and satellite networks. Nowadays, network technologies are not onl...