Résultats de recherche de titre
Articles 77321 à 77340 sur 77536
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the…
Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The 105 papers included in these proceedings were carefully reviewed and selected from 500 submissions. They were organized in topical sections as follows: Part I: Awarded papers; symmetric cryptology; public key primitives with advanced functionalities; Part II: Public key primitives with advances functionalities; Part III: AI and blockchain; secure and efficient implementation, cryptographic engineering, and real-world cryptography; theoretical foundations; Part IV: Theoretical foundations; Part V: Multi-party computation and zero-knowledge; Part VI: Multi-party computation and zero-knowledge; classic public key cryptography, Part VII: Classic public key cryptography.This book explores the dynamics of how AI (Artificial Intelligence) technology intersects with cybersecurity challenges and threat intelligence as they…
evolve. Integrating AI into cybersecurity not only offers enhanced defense mechanisms, but this book introduces a paradigm shift illustrating how one conceptualize, detect and mitigate cyber threats. An in-depth exploration of AI-driven solutions is presented, including machine learning algorithms, data science modeling, generative AI modeling, threat intelligence frameworks and Explainable AI (XAI) models. As a roadmap or comprehensive guide to leveraging AI/XAI to defend digital ecosystems against evolving cyber threats, this book provides insights, modeling, real-world applications and research issues. Throughout this journey, the authors discover innovation, challenges, and opportunities. It provides a holistic perspective on the transformative role of AI in securing the digital world.Overall, the useof AI can transform the way one detects, responds and defends against threats, by enabling proactive threat detection, rapid response and adaptive defense mechanisms. AI-driven cybersecurity systems excel at analyzing vast datasets rapidly, identifying patterns that indicate malicious activities, detecting threats in real time as well as conducting predictive analytics for proactive solution. Moreover, AI enhances the ability to detect anomalies, predict potential threats, and respond swiftly, preventing risks from escalated. As cyber threats become increasingly diverse and relentless, incorporating AI/XAI into cybersecurity is not just a choice, but a necessity for improving resilience and staying ahead of ever-changing threats. This book targets advanced-level students in computer science as a secondary textbook. Researchers and industry professionals working in various areas, such as Cyber AI, Explainable and Responsible AI, Human-AI Collaboration, Automation and Intelligent Systems, Adaptive and Robust Security Systems, Cybersecurity Data Science and Data-Driven Decision Making will also find this book useful as reference book.The Secret Lives of Booksellers and Librarians: Their stories are better than the bestsellers
Par James Patterson, Matt Eversmann. 2024
To be a bookseller or librarian… You have to play detective. Be a treasure hunter. A matchmaker. An…
advocate. A visionary. A person who creates “book joy” by pulling a book from a shelf, handing it to someone and saying, “You’ve got to read this. You’re going to love it.” Step inside The Secret Lives of Booksellers and Librarians and enter a world where you can feed your curiosities, discover new voices, find whatever you want or require. This place has the magic of rainbows and unicorns, but it's also a business. The book business. Meet the smart and talented people who live between the pages—and who can’t wait to help you find your next favorite book. New York Times BestsellerIf you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains.…
And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Excel suite of features along with other powerful tools for analytics.George Mount of Stringfest Analytics shows business analysts, data analysts, and business intelligence specialists how to make bigger gains right from your spreadsheets by using Excel's latest features. You'll learn how to build repeatable data cleaning workflows with Power Query, and design relational data models straight from your workbook with Power Pivot. You'll also explore other exciting new features for analytics, such as dynamic array functions, AI-powered insights, and Python integration.Learn how to build reports and analyses that were previously difficult or impossible to do in Excel. This book shows you how to:Build repeatable data cleaning processes for Excel with Power QueryCreate relational data models and analysis measures with Power PivotPull data quickly with dynamic arraysUse AI to uncover patterns and trends from inside ExcelIntegrate Python functionality with Excel for automated analysis and reportingA Writer's Notebook (Vintage International)
Par W. Somerset Maugham. 1976
Filled with keen observations, autobiographical notes, and the seeds of many of Maugham's greatest works,A Writer's Notebookis a unique and…
exhilarating look into a great writer's mind at work. From nearly five decades, Somerset Maugham recorded an intimate journal. In it we see the budding of his incomparable vision and his remarkable career as a writer. Covering the years from his time as a youthful medical student in London to a seasoned world traveler around the world, it is playful, sharp witted, and always revealing. Undoubtedly one of his most significant works,A Writer's Notebookis a must for Maugham fans and anyone interested in the creative process.Modern Fortran in Practice
Par Arjen Markus. 2012
From its earliest days, the Fortran programming language has been designed with computing efficiency in mind. The latest standard, Fortran…
2008, incorporates a host of modern features, including object-orientation, array operations, user-defined types, and provisions for parallel computing. This tutorial guide shows Fortran programmers how to apply these features in twenty-first-century style: modular, concise, object-oriented, and resource-efficient, using multiple processors. It offers practical real-world examples of interfacing to C, memory management, graphics and GUIs, and parallel computing using MPI, OpenMP, and coarrays. The author also analyzes several numerical algorithms and their implementations and illustrates the use of several open source libraries. Full source code for the examples is available on the book's Web site.Marching with the First Nebraska: A Civil War Diary
Par August Scherneckau. 2007
August Scherneckau’s diary is the most important firsthand account of the Civil War by a Nebraska soldier that has yet…
come to light. A German immigrant, Scherneckau served with the First Nebraska Volunteers from 1862 through 1865. Depicting the unit’s service in Missouri, Arkansas, and Nebraska Territory, he offers detail, insight, and literary quality matched by few other accounts of the Civil War in the West. His observations provide new perspective on campaigns, military strategy, leadership, politics, ethnicity, emancipation, and a host of other topics. Scherneckau takes readers on the march as he and his comrades plod through mud and snow during a grueling winter campaign in the Missouri Ozarks. He served as a provost guard in St. Louis, where he helped save a former slave from kidnappers and observed the construction of Union gunboats. He describes the process of transforming a regiment from infantry to cavalry, and his account of First Nebraska’s pursuit of Freeman’s Partisans in Arkansas is an exciting portrayal of mountain fighting. An annotated edition that brings to bear the editors’ and translator’s respective expertise in both the Civil War and the German language, Scherneckau’s account is an important addition to primary material on the war’s forgotten theater. It will be a valued resource for historian and Civil War enthusiast alike.What Kind of Bird Can't Fly: A Memoir of Resilience and Resurrection
Par Dorsey Nunn. 2024
A decade behind bars spurs fifty powerful years of political and legal battles for freedom and human rights."Whoever wants to…
assuage their doubts that radical change is possible—from the level of the individual to that of law, culture, and society—should make time to read Dorsey Nunn's extraordinary memoir." —Angela Y. Davis, political activist and author of Are Prisons Obsolete?, Abolition Democracy, and Freedom Is a Constant Struggle"Dorsey Nunn is one of the grand love warriors and freedom fighters of his generation! Don't miss his powerful and poignant story of tragedy and triumph!" —Cornel West"So much of what I've come to know and understand over the years about the second-class status imposed upon people labeled 'criminals' or 'felons' I've learned from Dorsey and the people who comprise All of Us or None, an organization he cofounded. Although I have fancy degrees and Dorsey does not, there’s never been a time in our friendship in which he hasn't been schooling me—not so much in theory, but in practice." —From the foreword by Michelle AlexanderWhen Dorsey Nunn shuffled, shackled like a slave, into the California State carceral system at age nineteen, he could barely read. While caged he received an education he never could have anticipated. His first lesson: Prison had a color scheme, and it didn’t match the larger society. On the inside, guards stoked racial warfare among prisoners while on the outside the machinery of the criminal legal system increasingly targeted poor Black and Brown communities with offenses, real or contrived. Nunn emerged from San Quentin after ten years behind bars, radicalized by his experience and emboldened by the militant wisdom of the men he met there. He poured his heart and mind into liberating all those he left behind, building a nationwide movement to restore justice to millions of system-impacted Americans.In this poignant, wry, and powerful memoir, Nunn links the politics of Black Power to the movements for Black lives and dignified reentry today. His story underscores the power of coalition building, persistence in the face of backlash, and the importance of centering the voices of experience in the fight for freedom—and proves, once and for all, that jailbirds can fly.All You Can Ever Know: A Memoir
Par Nicole Chung. 2018
What does it means to lose your roots—within your culture, within your family—and what happens when you find them? …
Nicole Chung was born severely premature, placed for adoption by her Korean parents, and raised by a white family in a sheltered Oregon town. From childhood, she heard the story of her adoption as a comforting, prepackaged myth. She believed that her biological parents had made the ultimate sacrifice in the hope of giving her a better life, that forever feeling slightly out of place was her fate as a transracial adoptee. But as Nicole grew up—facing prejudice her adoptive family couldn’t see, finding her identity as an Asian American and as a writer, becoming ever more curious about where she came from—she wondered if the story she’d been told was the whole truth. With warmth, candor, and startling insight, Nicole Chung tells of her search for the people who gave her up, which coincided with the birth of her own child. All You Can Ever Know is a profound, moving chronicle of surprising connections and the repercussions of unearthing painful family secrets—vital reading for anyone who has ever struggled to figure out where they belong.All the Way: My Life in Four Quarters
Par Joe Namath. 2019
The NFL icon who first brought show business to sports shares his life lessons on fame, fatherhood, and football. Three…
days before the 1969 Super Bowl, Joe Namath promised the nation that he would lead the New York Jets to an 18-point underdog victory against the seemingly invincible Baltimore Colts. When the final whistle blew, that promise had been kept. Namath was instantly heralded as a gridiron god, while his rugged good looks, progressive views on race, and boyish charm quickly transformed him - in an era of raucous rebellion, shifting social norms, and political upheaval - into both a bona fide celebrity and a symbol of the commercialization of pro sports. By 26, with a championship title under his belt, he was quite simply the most famous athlete alive. Although his legacy has long been cemented in the history books, beneath the eccentric yet charismatic personality was a player plagued by injury and addiction, both sex and substance. When failing knees permanently derailed his career, he turned to Hollywood and endorsements, not to mention a tumultuous marriage and fleeting bouts of sobriety, to try and find purpose. Now 74, Namath is ready to open up, brilliantly using the four quarters of Super Bowl III as the narrative backbone to a life that was anything but charmed. As much about football and fame as about addiction, fatherhood, and coming to terms with our own mortality, All the Way finally reveals the man behind the icon.CCSP For Dummies: Book + 2 Practice Tests + 100 Flashcards Online
Par Arthur J. Deane. 2024
Get CCSP certified and elevate your career into the world of cloud security CCSP For Dummies is a valuable resource…
for anyone seeking to gain their Certified Cloud Security Professional (CCSP) certification and advance their cloud security career. This book offers a thorough review of subject knowledge in all six domains, with real-world examples and scenarios, so you can be sure that you’re heading into test day with the most current understanding of cloud security. You’ll also get tips on setting up a study plan and getting ready for exam day, along with digital flashcards and access to two updated online practice tests. . Review all content covered on the CCSP exam with clear explanations Prepare for test day with expert test-taking strategies, practice tests, and digital flashcards Get the certification you need to launch a lucrative career in cloud security Set up a study plan so you can comfortably work your way through all subject matter before test dayThis Dummies study guide is excellent for anyone taking the CCSP exam for the first time, as well as those who need to brush up on their skills to renew their credentials.What Every Engineer Should Know About Digital Accessibility (ISSN)
Par Sarah Horton, David Sloan. 2024
Accessibility is a core quality of digital products to be deliberately addressed throughout the development lifecycle. What Every Engineer Should…
Know About Digital Accessibility will prepare readers to integrate digital accessibility into their engineering practices. Readers will learn how to accurately frame accessibility as an engineering challenge so they are able to address the correct problems in the correct way.Illustrated with diverse perspectives from accessibility practitioners and advocates, this book describes how people with disabilities use technology, the nature of accessibility barriers in the digital world, and the role of engineers in breaking down those barriers. Accessibility competence for current, emerging, and future technologies is addressed through a combination of guiding principles, core attributes and requirements, and accessibility‑informed engineering practices.FEATURES Discusses how technology can support inclusion for people with disabilities and how rigorous engineering processes help create quality user experiences without introducing accessibility barriers Explains foundational principles and guidelines that build core competency in digital accessibility as they are applied across diverse and emerging technology platforms Highlights practical insights into how engineering teams can effectively address accessibility throughout the technology development lifecycle Uses international standards to define and measure accessibility quality Written to be accessible to non‑experts in the subject area, What Every Engineer Should Know About Digital Accessibility is aimed at students, professionals, and researchers in the field of software engineering.A MOST ANTICIPATED BOOK • The forgotten story of a pioneering group of five Black ballerinas and their fifty-year sisterhood,…
a legacy erased from history—until now.&“This is the kind of history I wish I learned as a child dreaming of the stage!&” —Misty Copeland, author of Black Ballerinas: My Journey to Our Legacy &“Utterly absorbing, flawlessly-researched…Vibrant, propulsive, and inspiring, The Swans of Harlem is a richly drawn portrait of five courageous women whose contributions have been silenced for too long!&” —Tia Williams, author of A Love Song for Ricki WildeAt the height of the Civil Rights movement, Lydia Abarca was a Black prima ballerina with a major international dance company—the Dance Theatre of Harlem, a troupe of women and men who became each other&’s chosen family. She was the first Black company ballerina on the cover of Dance magazine, an Essence cover star; she was cast in The Wiz and in a Bob Fosse production on Broadway. She performed in some of ballet&’s most iconic works with other trailblazing ballerinas, including the young women who became her closest friends—founding Dance Theatre of Harlem members Gayle McKinney-Griffith and Sheila Rohan, as well as first-generation dancers Karlya Shelton and Marcia Sells.These Swans of Harlem performed for the Queen of England, Mick Jagger, and Stevie Wonder, on the same bill as Josephine Baker, at the White House, and beyond. But decades later there was almost no record of their groundbreaking history to be found. Out of a sisterhood that had grown even deeper with the years, these Swans joined forces again—to share their story with the world.Captivating, rich in vivid detail and character, and steeped in the glamour and grit of professional ballet, The Swans of Harlem is a riveting account of five extraordinarily accomplished women, a celebration of both their historic careers and the sustaining, grounding power of female friendship, and a window into the robust history of Black ballet, hidden for too long.The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance.The Internet of…
Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas.The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future.Researchers are concerned about the many application areas and driving forces behind smart cities. The authors aim to provide insights into software-defined networking, artificial intelligence, and machine learning technologies used in IoT and networking. The framework focuses on practical applications and infrastructures. The book includes practical challenges, case studies, innovative concepts, and other factors that impact the development of realistic scenarios for smart surveillance. It also highlights innovative technology, designs, and algorithms that can accelerate the creation of smart city concepts.This resource includes real-world applications and case studies for smart city technology, enormous data management, and machine learning prediction, all with confidentiality and safety problems.This book constitutes the refereed proceedings of the 15th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2024,…
held in Gardanne, France, during April 9–10, 2024. The 14 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Analyses and Tools; Attack Methods; Deep-Learning-Based Side-Channel Attacks; PUF/RNG; and Cryptographic Implementations.Cybercrime and Digital Deviance
Par Roderick S. Graham, 'Shawn K. Smith. 2024
Cybercrime and Digital Deviance, Second Edition, combines insights from sociology, criminology, psychology, and cybersecurity to explore cybercrimes such as hacking,…
identity theft, and romance scams, along with forms of digital deviance such as pornography addiction, trolling, and “canceling” people for perceived violations of norms.Other issues are explored including cybercrime investigations, nation-state cybercrime, the use of algorithms in policing, cybervictimization, and expanded discussion of the theories used to explain cybercrime. Graham and Smith conceptualize the online space as a distinct environment for social interaction, framing their work with assumptions informed by their respective work in urban sociology and spatial criminology, and offering an engaging entry point for understanding what may appear to be a technologically complex course of study. The authors apply a modified version of a typology developed by David Wall: cybertrespass, cyberfraud, cyberviolence, and cyberpornography. This typology is simple enough for students just beginning their inquiry into cybercrime, while its use of legal categories of trespassing, fraud, violent crimes against persons, and moral transgressions provides a solid foundation for deeper study. In this edition each chapter includes a new “Current Events and Critical Thinking” section, using concepts from the chapter to explore a specific event or topic like the effect of disinformation on social cohesion and politics.Taken together, Graham and Smith’s application of a digital environment and Wall’s cybercrime typology makes this an ideal upper-level text for students in sociology and criminal justice. It is also an ideal introductory text for students within the emerging disciplines of cybercrime and cybersecurity.Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
Par James Forshaw. 2024
Power up your Windows security skills with expert guidance, in-depth technical insights, and dozens of real-world vulnerability examples from Google…
Project Zero&’s most renowned researcher! Learn core components of the system in greater depth than ever before, and gain hands-on experience probing advanced Microsoft security systems with the added benefit of PowerShell scripts.Windows Security Internals is a must-have for anyone needing to understand the Windows operating system&’s low-level implementations, whether to discover new vulnerabilities or protect against known ones. Developers, devops, and security researchers will all find unparalleled insight into the operating system&’s key elements and weaknesses, surpassing even Microsoft&’s official documentation.Author James Forshaw teaches through meticulously crafted PowerShell examples that can be experimented with and modified, covering everything from basic resource security analysis to advanced techniques like using network authentication. The examples will help you actively test and manipulate system behaviors, learn how Windows secures files and the registry, re-create from scratch how the system grants access to a resource, learn how Windows implements authentication both locally and over a network, and much more.You&’ll also explore a wide range of topics, such as:Windows security architecture, including both the kernel and user-mode applicationsThe Windows Security Reference Monitor (SRM), including access tokens, querying and setting a resource&’s security descriptor, and access checking and auditingInteractive Windows authentication and credential storage in the Security Account Manager (SAM) and Active DirectoryMechanisms of network authentication protocols, including NTLM and KerberosIn an era of sophisticated cyberattacks on Windows networks, mastering the operating system&’s complex security mechanisms is more crucial than ever. Whether you&’re defending against the latest cyber threats or delving into the intricacies of Windows security architecture, you&’ll find Windows Security Internals indispensable in your efforts to navigate the complexities of today&’s cybersecurity landscape.The Secret Life of Data: Navigating Hype and Uncertainty in the Age of Algorithmic Surveillance (The Information Society Series)
Par Aram Sinnreich, Jesse Gilbert. 2024
How data surveillance, digital forensics, and generative AI pose new long-term threats and opportunities—and how we can use them to…
make better decisions in the face of technological uncertainty.In The Secret Life of Data, Aram Sinnreich and Jesse Gilbert explore the many unpredictable, and often surprising, ways in which data surveillance, AI, and the constant presence of algorithms impact our culture and society in the age of global networks. The authors build on this basic premise: no matter what form data takes, and what purpose we think it&’s being used for, data will always have a secret life. How this data will be used, by other people in other times and places, has profound implications for every aspect of our lives—from our intimate relationships to our professional lives to our political systems.With the secret uses of data in mind, Sinnreich and Gilbert interview dozens of experts to explore a broad range of scenarios and contexts—from the playful to the profound to the problematic. Unlike most books about data and society that focus on the short-term effects of our immense data usage, The Secret Life of Data focuses primarily on the long-term consequences of humanity&’s recent rush toward digitizing, storing, and analyzing every piece of data about ourselves and the world we live in. The authors advocate for &“slow fixes&” regarding our relationship to data, such as creating new laws and regulations, ethics and aesthetics, and models of production for our data-fied society.Cutting through the hype and hopelessness that so often inform discussions of data and society, The Secret Life of Data clearly and straightforwardly demonstrates how readers can play an active part in shaping how digital technology influences their lives and the world at large.