Think DSPIf you understand basic mathematics and know how to program with Python, you're ready to dive into signal processing. While most resources start with theory to teach this complex subject, this practical book introduces techniques by showing you how they're applied in the real world. In the first chapter alone, you'll be able to decompose a sound into its harmonics, modify the harmonics, and generate new sounds.
Author Allen Downey explains techniques such as spectral decomposition, filtering, convolution, and the Fast Fourier Transform. This book also provides exercises and code examples to help you understand the material.
You'll explore: Periodic signals and their spectrums; Harmonic structure of simple waveforms; Chirps and other sounds whose spectrum changes over time; Noise signals and natural sources of noise; The autocorrelation function for estimating pitch; The discrete cosine transform (DCT) for compression; The Fast Fourier Transform for spectral analysis; Relating ope ...
Identity and Data Security for Web DevelopmentDevelopers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.
Authors Jonathan LeBlanc and Tim Messerschmidt provide a deep dive into the concepts, technology, and programming methodologies necessary to build a secure interface for data and identity - without compromising usability. You'll learn how to plug holes in existing systems, protect against viable attack vectors, and work in environments that sometimes are naturally insecure.Understand the state of web and application security today;Design security password encryption, and combat password attack vectors;Create digital fingerprints to identify users through ...
Mastering Bitcoin, 2nd EditionJoin the technological revolution that's taking the financial world by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you're building the next killer app, investing in a startup, or simply curious about the technology, this revised and expanded second edition provides essential detail to get you started.
Bitcoin, the first successful decentralized digital currency, is still in its early stages and yet it's already spawned a multi-billion-dollar global economy open to anyone with the knowledge and passion to participate. Mastering Bitcoin provides the knowledge. You simply supply the passion.
The second edition includes:A broad introduction of bitcoin and its underlying blockchain—ideal for non-technical users, investors, and business executives;An explanation of the technical foundations of bitcoin and cryptographic currencies for developers ...
Social Media Analytics StrategyThis book shows you how to use social media analytics to optimize your business performance. The tools discussed will prepare you to create and implement an effective digital marketing strategy. From understanding the data and its sources to detailed metrics, dashboards, and reports, this book is a robust tool for anyone seeking a tangible return on investment from social media and digital marketing.
Social Media Analytics Strategy speaks to marketers who do not have a technical background and creates a bridge into the digital world. Comparable books are either too technical for marketers (aimed at software developers) or too basic and do not take strategy into account. They also lack an overview of the entire process around using analytics within a company project. They don't go into the everyday details and also don't touch upon common mistakes made by marketers.
This book highlights patterns of common challenges experienced by marketers from entry level to directors and C-leve ...
The Hardware HackerFor over a decade, Andrew "bunnie" Huang, one of the world's most esteemed hackers, has shaped the fields of hacking and hardware, from his cult-classic book Hacking the Xbox to the open-source laptop Novena and his mentorship of various hardware startups and developers. In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.
Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.
Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices b ...
Arduino PlaygroundYou've mastered the basics, conquered the soldering iron, and programmed a robot or two; now you've got a set of skills and tools to take your Arduino exploits further. But what do you do once you've exhausted your to-build list?
Arduino Playground will show you how to keep your hardware hands busy with a variety of intermediate builds, both practical and just-for-fun. Advance your engineering and electronics know-how as you work your way through these 10 complex projects:A reaction-time game that leverages the Arduino's real-time capabilities;A tool for etching your own printed circuit boards;A regulated, variable-voltage power supply;A kinetic wristwatch winder decked out with LEDs;A garage parking assistant that blinks when your vehicle is perfectly parked;A practical and colorful pH meter;A ballistic chronograph that can measure the muzzle velocity of BB, Airsoft, and pellet guns;A battery saver that prevents a ...
Cracking Codes with PythonLearn how to program in Python while making and breaking ciphers - algorithms used to create and send secret messages!
After a crash course in Python programming basics, you'll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You'll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today's online transactions, including digital signatures, email, and Bitcoin.
Each program includes the full code and a line-by-line explanation of how things work. By the end of the book, you'll have learned how to code in Python and you'll have the clever programs to prove it!
You'll also learn how to: Combine loops, variables, and flow control statements into real working programs; Use dictionary files to instantly detect whether decrypted messages are valid English or gibberish; Create test programs to make sur ...
Designing Distributed SystemsIn the race to compete in today's fast-moving markets, large enterprises are busy adopting new technologies for creating new products, processes, and business models. But one obstacle on the road to digital transformation is placing too much emphasis on technology, and not enough on the types of processes technology enables. What if different lines of business could build their own services and applications - and decision-making was distributed rather than centralized?
This report explores the concept of a digital business platform as a way of empowering individual business sectors to act on data in real time. Much innovation in a digital enterprise will increasingly happen at the edge, whether it involves business users (from marketers to data scientists) or IoT devices. To facilitate the process, your core IT team can provide these sectors with the digital tools they need to innovate quickly.
This report explores: Key cultural and organizational changes for developing business ...
UX StrategyUser experience (UX) strategy requires a careful blend of business strategy and UX design, but until now, there hasn't been an easy-to-apply framework for executing it. This hands-on guide introduces lightweight strategy tools and techniques to help you and your team craft innovative multi-device products that people want to use.
Whether you're an entrepreneur, UX/UI designer, product manager, or part of an intrapreneurial team, this book teaches simple-to-advanced strategies that you can use in your work right away. Along with business cases, historical context, and real-world examples throughout, you'll also gain different perspectives on the subject through interviews with top strategists.
Define and validate your target users through provisional personas and customer discovery techniques; Conduct competitive research and analysis to explore a crowded marketplace or an opportunity to create unique value; Focus your team on the primary utility and business model of your product by ...
iPhoto 6: The Missing Manual, 5th EditionIf you used iPhoto when it first came out, you'll remember the way it slowed to a crawl once you loaded it with about 2,000 photos. Compare that to this year's model: iPhoto 6 can handle as many as 250,000 images and still have the power to run a host of suped-up features. Its new software engine lets you make changes with a drag & drop editing tool, find photos with a robust search feature, and manipulate images without affecting the originals in your master library.
Apple makes it all sound so easy: just drag this, click that and you're done. But, as intuitive as these features are, you can still get lost, especially if you're new to iPhoto. Not to worry. iPhoto 6: The Missing Manual gives you plenty of undocumented tips & tricks for taking advantage of the new version and every little feature packed into it.
It's the top-selling iPhoto book for good reason. With wit and objectivity, David Pogue and Derrick Story start you out with a crash course on digital photography, complet ...