These reviews are the most popular with readers.
All Media Types
For the last:
Attribute-based access control
Hu V., Ferraiolo D., Chandramouli R., Kuhn D., Artech House, Inc., Norwood, MA, 2017. 280 pp. Type: Book (978-1-630811-34-1), Reviews: (2 of 2)
In many applications, it becomes a necessity to define who (which user) is allowed to access what (which resource). This is achieved via access control. Several models for access control exist. Attribute-based access control (ABAC) is one of them,...
Digital behaviour change interventions to break and form habits
Pinder C., Vermeulen J., Cowan B., Beale R. ACM Transactions on Computer-Human Interaction 25(3): 1-66, 2018. Type: Article
Whenever research on behavior is in progress, a special category is also under review in terms of habit. In the context of behavior change, it is of interest to find how habit could influence behavior, especially in digital environments. Thus, it ...
The book of PF (3rd ed.): a no-nonsense guide to the OpenBSD firewall
Hansteen P., No Starch Press, San Francisco, CA, 2014. 248 pp. Type: Book (978-1-593275-89-1)
PF is a packet filter developed originally on the OpenBSD operating system, and now also available on NetBSD, FreeBSD, and FreeBSD derivatives such as DragonFly BSD. It can be used to control access to your network, mitigate spam attacks, redirect...
Codes, cryptology and curves with computer algebra
Pellikaan R., Wu X., Bulygin S., Jurrius R., Cambridge University Press, New York, NY, 2018. 606 pp. Type: Book (978-0-521520-36-2)
This volume offers a terse, highly formal exposition of the relation between the four subjects named in the title: codes (transformations of a stream of information), cryptology (transformations that seek to hide the original content), curves (spe...
Once upon an algorithm: how stories explain computing
Erwig M., The MIT Press, Cambridge, MA, 2017. 336 pp. Type: Book (978-0-262036-63-4)
Martin Erwig emphasizes the general nature of computation and the use of computer science (CS) in this book. He uses well-known stories to explain computing concepts to readers not familiar with the field....
Software architecture for big data and the cloud
Mistrik I., Bahsoon R., Ali N., Heisel M., Maxim B., Morgan Kaufmann Publishers Inc., Cambridge, MA, 2017. 470 pp. Type: Book (978-0-128054-67-3)
Systems and software architecture has been a significant engineering endeavor for many years, requiring formal languages and models to document and analyze the structure and functionality of systems. This mature domain of interest has been applied...
Poibeau T., The MIT Press, Cambridge, MA, 2017. 296 pp. Type: Book (978-0-262534-21-5), Reviews: (3 of 3)
Linguistic competence is a specific skill that some exceptionally gifted people possess when learning a foreign language by listening to a native speaker or reading a text written by a native speaker. The comprehension of an utterance comes from a...
Poibeau T., The MIT Press, Cambridge, MA, 2017. 296 pp. Type: Book (978-0-262534-21-5), Reviews: (2 of 3)
This small book (approximately size A5), part of the Massachusetts Institute of Technology (MIT) Press “Essential Knowledge” series, captures the essence of the machine translation (MT) field, from its origins to the present. As opposed...
A systematic approach to learning robot programming with ROS
Newman W., Chapman&Hall/CRC, Boca Raton, FL, 2018. 530 pp. Type: Book (978-1-498777-82-7)
Robots are based on very complex systems that require expertise in many areas. In recent years, robot operating system (ROS) has become the standard for controlling robots. ROS offers a complete set of tools and a basic architecture that allow dev...
VIRTIO-USER: a new versatile channel for kernel-bypass networks
Tan J., Liang C., Xie H., Xu Q., Hu J., Zhu H., Liu Y. KBNets 2017 (Proceedings of the Workshop on Kernel-Bypass Networks, Los Angeles, CA, Aug 21, 2017) 13-18, 2017. Type: Proceedings
VIRTIO-USER is a userspace-based channel to facilitate container applications to benefit from kernel-bypass technologies. The authors explain that container networking or operating system (OS) virtualization technologies have historically not been...
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2018 ThinkLoud, Inc.