Résultats de recherche de titre
Articles 1 à 20 sur 8118
Magill Family Egyptian Adventure
Par John Magill, Judith Ann Magill Cathcard. 2016
The Magill Family Egyptian Adventure tells the story of Canadian, Arthur Napier Magill, who lost his sight as a young…
man, as he and his young family embark on a years’ long adventure to Egypt, where he was seconded by the UN from his role at CNIB in 1953 to head a team of experts to establish a CNIB like demonstration school for the blind to serve that country and to provide training for others to replicate the school in neighbouring Arab states. Using newspaper articles, family photographs, letters home, and written project reports, readers gain insight into expatriate life and the enormous difference this UN mission made to the many blind people in the Middle East who would otherwise have been unable to live productive and independent lives. Arthur Napier Magill later became the second Managing Director of CNIB, succeeding Colonel E. A. Baker.QuickBooks 2024 All-in-One For Dummies
Par Stephen L. Nelson. 2024
The quick way to get started—and get proficient—with QuickBooks QuickBooks 2024 All-in-One For Dummies is the solution small business owners…
and managers are seeking. This high-value reference combines 8 content-rich mini-books into one complete package, providing the answers you need to get the most out of the 2024 version of QuickBooks. You’ll learn the key features of QuickBooks and small business accounting, including setting up the software, understanding double-entry bookkeeping, invoicing customers, paying vendors, tracking inventory, creating reports, and beyond. Plus, you’ll discover how you can use cloud storage to access your information on your smartphone, making running a small business that much more manageable. Sign up for QuickBooks software, set up your accounts, and customize your preferences Learn the basics of accounting and bookkeeping, and make sure you’re doing it right Discover advanced features of QuickBooks that will help you run your business smoothly and efficiently Save money by confidently managing your finances yourself This beginner-friendly Dummies guide makes it a breeze for small business owners, managers, and employees to implement QuickBooks at work.Multimodal Biometric and Machine Learning Technologies: Applications for Computer Vision
Par Sandeep Kumar, Suman Lata Tripathi, Shilpa Rani, Deepika Ghai, Arpit Jain. 2023
MULTIMODAL BIOMETRIC AND MACHINE LEARNING TECHNOLOGIES With an increasing demand for biometric systems in various industries, this book on multimodal…
biometric systems, answers the call for increased resources to help researchers, developers, and practitioners. Multimodal biometric and machine learning technologies have revolutionized the field of security and authentication. These technologies utilize multiple sources of information, such as facial recognition, voice recognition, and fingerprint scanning, to verify an individual???s identity. The need for enhanced security and authentication has become increasingly important, and with the rise of digital technologies, cyber-attacks and identity theft have increased exponentially. Traditional authentication methods, such as passwords and PINs, have become less secure as hackers devise new ways to bypass them. In this context, multimodal biometric and machine learning technologies offer a more secure and reliable approach to authentication. This book provides relevant information on multimodal biometric and machine learning technologies and focuses on how humans and computers interact to ever-increasing levels of complexity and simplicity. The book provides content on the theory of multimodal biometric design, evaluation, and user diversity, and explains the underlying causes of the social and organizational problems that are typically devoted to descriptions of rehabilitation methods for specific processes. Furthermore, the book describes new algorithms for modeling accessible to scientists of all varieties. Audience Researchers in computer science and biometrics, developers who are designing and implementing biometric systems, and practitioners who are using biometric systems in their work, such as law enforcement personnel or healthcare professionals.Introduction to Natural Language Processing (Adaptive Computation and Machine Learning series)
Par Jacob Eisenstein. 2019
A survey of computational methods for understanding, generating, and manipulating human language, which offers a synthesis of classical representations and…
algorithms with contemporary machine learning techniques.This textbook provides a technical perspective on natural language processing—methods for building computer software that understands, generates, and manipulates human language. It emphasizes contemporary data-driven approaches, focusing on techniques from supervised and unsupervised machine learning. The first section establishes a foundation in machine learning by building a set of tools that will be used throughout the book and applying them to word-based textual analysis. The second section introduces structured representations of language, including sequences, trees, and graphs. The third section explores different approaches to the representation and analysis of linguistic meaning, ranging from formal logic to neural word embeddings. The final section offers chapter-length treatments of three transformative applications of natural language processing: information extraction, machine translation, and text generation. End-of-chapter exercises include both paper-and-pencil analysis and software implementation.The text synthesizes and distills a broad and diverse research literature, linking contemporary machine learning techniques with the field's linguistic and computational foundations. It is suitable for use in advanced undergraduate and graduate-level courses and as a reference for software engineers and data scientists. Readers should have a background in computer programming and college-level mathematics. After mastering the material presented, students will have the technical skill to build and analyze novel natural language processing systems and to understand the latest research in the field.CCST Cisco Certified Support Technician Study Guide: Networking Exam
Par Todd Lammle, Donald Robb. 2024
The ideal prep guide for earning your CCST Networking certification CCST Cisco Certified Support Technician Study Guide: Networking Exam is…
the perfect way to study for your certification as you prepare to start or upskill your IT career. Written by industry expert and Cisco networking guru Todd Lammle, this Sybex Study Guide uses the trusted Sybex approach, providing 100% coverage of CCST Networking exam objectives. You’ll find detailed information and examples for must-know Cisco networking topics, as well as practical insights drawn from real-world scenarios. This Study Guide provides authoritative coverage of key exam topics, including standards and concepts, addressing and subnet formats, endpoints and media types, infrastructure, diagnosing problems, and security. You also get one year of FREE access to a robust set of online learning tools, including a test bank with hundreds of questions, a practice exam, a set of flashcards, and a glossary of important terminology. The CCST Networking certification is an entry point into the Cisco certification program, and a pathway to the higher-level CCNA, so it’s a great place to start as you build a rewarding career! Study 100% of the topics covered on the Cisco CCST Networking certification exam Get access to flashcards, practice questions, and more great resources online Master difficult concepts with real-world examples and clear explanations Learn about the career paths you can follow and what comes next after the CCSTThis Sybex study guide is perfect for anyone wanting to earn their CCST Networking certification, including entry-level network technicians, networking students, interns, and IT professionals.Quantum Computing in Cybersecurity
Par Romil Rawat, Anjali Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Vivek Bhardwaj, Jaideep Patel, Hitesh Rawat. 2024
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum…
computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library.This ambitious book provides the only systematic examination of the American abolition movement’s direct impacts on antislavery politics from colonial…
times to the Civil War and after. As opposed to indirect methods such as propaganda, sermons, and speeches at protest meetings, Stanley Harrold focuses on abolitionists’ political tactics—petitioning, lobbying, establishing bonds with sympathetic politicians—and on their disruptions of slavery itself.Harrold begins with the abolition movement’s relationship to politics and government in the northern American colonies and goes on to evaluate its effect in a number of crucial contexts--the U.S. Congress during the 1790s, the Missouri Compromise, the struggle over slavery in Illinois during the 1820s, and abolitionist petitioning of Congress during that same decade. He shows how the rise of "immediate" abolitionism, with its emphasis on moral suasion, did not diminish direct abolitionists’ impact on Congress during the 1830s and 1840s. The book also addresses abolitionists’ direct actions against slavery itself, aiding escaped or kidnapped slaves, which led southern politicians to demand the Fugitive Slave Law of 1850, a major flashpoint of antebellum politics. Finally, Harrold investigates the relationship between abolitionists and the Republican Party through the Civil War and Reconstruction.Tidy First?: A Personal Exercise In Empirical Software Design
Par Kent Beck. 2024
Tidying up messy software is a must. And that means breaking up the code to make it more readable, and…
using guard clauses and helping functions to make it understandable. In this practical guide, author Kent Beck, creator of Extreme Programming and pioneer of software patterns, suggests when and where you might apply tidyings in your code.Instead of trying to master tidying all at once, this book lets you try out a few examples that make sense for your problem. If you have a big function containing many lines of code, you'll learn how to logically divide it into smaller chunks. Along the way, you'll learn the theory behind software design: coupling, cohesion, discounted cash flows, and optionality.Salesforce CRM: The Definitive Admin Handbook
Par Paul Goodey. 2013
A practical guide which will help to discover how to setup and configure the Salesforce CRM application. It offers solutions…
and practical examples on how to further improve and maintain its functionality with clear systematic instructions. Being highly organized and compact, this book contains detailed instructions with screenshots, diagrams, and tips that clearly describe how you can administer and configure complex Salesforce CRM functionality with absolute ease.This book is for administrators who want to develop and strengthen their Salesforce CRM skills in the areas of configuration and system management. Whether you are a novice or a more experienced admin, this book aims to enhance your knowledge and understanding of the Salesforce CRM platform and by the end of the book, you should be ready to administer Salesforce CRM in a real-world environment.History and Legacy of the Suffragette Fellowship provides a biographical account of the scope and depth of the memory work…
of the now-forgotten commemorative group the Suffragette Fellowship, active from the 1920s to the 1970s. The Suffragette Fellowship comprised members from the militant suffrage groups known as the Women’s Social and Political Union, the Women’s Freedom League, and the Actress Franchise League. This research provides a comprehensive analysis of the Fellowship’s attempts to form and sustain a collective Suffragette identity across four decades of activity. It considers the legacy of contested histories attached to militant campaigning that pressured Fellowship leaders to take control of the public memory of suffrage history. With close attention given to a neglected piece of feminist history, this book highlights the cultural and political impacts that the Fellowship enacted in their memory of the women’s suffrage movement. Richly illustrated with images of members, artefacts, and publications, this extensive study of the Suffragette Fellowship adds to transnational suffrage histories in the United Kingdom and Australia and will be of interest to scholars in memory studies and women’s history.Learn Ethereum: Build your own decentralized applications with Ethereum and smart contracts
Par Xun Brian Wu, Zhihong Zou, Dongying Song. 2019
Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examples Key Features Explore the Ethereum ecosystem and…
understand the latest research on the platform Build decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examples Learn to make your decentralized applications fast and highly secure Book Description Ethereum is a blockchain-based, decentralized computing platform that allows running smart contracts. This book provides a basic overview of how Ethereum works, its ecosystem, mining process, and the consensus mechanism. It also demonstrates a step-by-step approach for building decentralized applications. This book begins with the very basics of Blockchain technology. Then it dives deep into the Ethereum architecture, framework and tools in its ecosystem. It also provides you an overview of ongoing research on Ethereum, for example, Layer 1 and 2 scaling solution, Stablecoin, ICO/STO/IEO, etc. Next, it explains Solidity language in detail, and provides step-by-step instructions for designing, developing, testing, deploying, and monitoring decentralized applications. In addition, you'll learn how to use Truffle, Remix, Infura, Metamask, and many other Ethereum technologies. It'll also help you develop your own cryptocurrency by creating ERC20, and ERC721 smart contracts from scratch. Finally, we explain private blockchains, and you learn how to interact with smart contracts through wallets. What you will learn Understand the concepts of blockchain and cryptocurrency Master Ethereum development tools such as Truffle, Remix IDE and Infura Delve into smart contract development Develop DApps frontend using Node.js, React.js, and Web3js API Learn Etherscan and other tools to secure and monitor smart contracts Develop and debug smart contracts by working with Remix Apply Truffle suite to compile, migrate, and unit test smart contracts Explore smart contracts such as ERC20 token and decentralized digital market Who this book is for This book is for all developers and architects who want to explore Ethereum blockchain fundamentals and get started with building real-world decentralized applications. Knowledge of an object-oriented programming language such as JavaScript will be useful but not mandatory.Get up and running with industrial cybersecurity monitoring with this hands-on book, and explore ICS cybersecurity monitoring tasks, activities, tools,…
and best practicesKey FeaturesArchitect, design, and build ICS networks with security in mindPerform a variety of security assessments, checks, and verificationsEnsure that your security processes are effective, complete, and relevantBook DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment. You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment. By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.What you will learnMonitor the ICS security posture actively as well as passivelyRespond to incidents in a controlled and standard wayUnderstand what incident response activities are required in your ICS environmentPerform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stackAssess the overall effectiveness of your ICS cybersecurity programDiscover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environmentWho this book is forIf you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.Plínio Salgado: A Brazilian Fascist (1895–1975) (Routledge Studies in Fascism and the Far Right)
Par João Fábio Bertonha. 2024
Plínio Salgado covers the life trajectory of the far-right Brazilian political leader between 1895 and 1975. The book initially follows his…
life from his birth, including political and cultural training and political activities between 1895 and 1930. The focus then shifts to his period as leader of the Brazilian fascist movement between 1932 and 1938, with attention to his performance as a leader, his role within the movement, and in the rise and fall of the Integralist Action. His period of exile in Portugal between 1939 and 1947 is also emphasized, with a special focus on his contacts with the Portuguese radical right and German and Italian agents. The final part addresses his return to Brazil, his efforts to reposition himself politically and his performance as a parliamentarian and supporter of the military coup of 1964. This book will be of interest to researchers of Latin American history, Brazilian history and politics, the transnational far right, and comparative fascism studies.The Flu Pandemic of 1918-1919: A Political and Cultural Approach from a COVID World (Routledge Studies in Modern History)
Par Maximiliano Fuentes Codera. 2024
Within the framework of a global political and sanitarian crisis that broke out in March 2020, this book proposes a…
new contemporary look at the great pandemic of the 20th century, the Spanish flu of 1918-1919. Based on its impact in Spain, the book offers a comparative and transatlantic perspective focused on the political and cultural impact of the pandemic in Europe and Latin America. The book focuses on three aspects: the overwhelming presence of influenza between 1918 and 1920, its oblivion and its political and cultural traces in the interwar decades and even more, and its reappearance in the face of the COVID-19. These three aspects are interconnected through a comparative analysis of the crisis of liberalism and democracy of the 1920s and 1930s and the current populist wave that is affecting the world. As such, this book is of great value to those interested in social and medical history across Europe and Latin America through offering a fresh outlook on the effects of the pandemic of the 20th century in the wake of the COVID pandemic that swept across the world.Enhance DevOps workflows by integrating the functionalities of Docker, Kubernetes, Spinnaker, Ansible, Terraform, Flux CD, CaaS, and more with the…
help of practical examples and expert tipsKey FeaturesGet up and running with containerization-as-a-service and infrastructure automation in the public cloudLearn container security techniques and secret management with Cloud KMS, Anchore Grype, and Grafeas KritisLeverage the combination of DevOps, GitOps, and automation to continuously ship a package of softwareBook DescriptionContainers have entirely changed how developers and end-users see applications as a whole. With this book, you'll learn all about containers, their architecture and benefits, and how to implement them within your development lifecycle.You'll discover how you can transition from the traditional world of virtual machines and adopt modern ways of using DevOps to ship a package of software continuously. Starting with a quick refresher on the core concepts of containers, you'll move on to study the architectural concepts to implement modern ways of application development. You'll cover topics around Docker, Kubernetes, Ansible, Terraform, Packer, and other similar tools that will help you to build a base. As you advance, the book covers the core elements of cloud integration (AWS ECS, GKE, and other CaaS services), continuous integration, and continuous delivery (GitHub actions, Jenkins, and Spinnaker) to help you understand the essence of container management and delivery. The later sections of the book will take you through container pipeline security and GitOps (Flux CD and Terraform).By the end of this DevOps book, you'll have learned best practices for automating your development lifecycle and making the most of containers, infrastructure automation, and CaaS, and be ready to develop applications using modern tools and techniques.What you will learnBecome well-versed with AWS ECS, Google Cloud Run, and KnativeDiscover how to build and manage secure Docker images efficientlyUnderstand continuous integration with Jenkins on Kubernetes and GitHub actionsGet to grips with using Spinnaker for continuous deployment/deliveryManage immutable infrastructure on the cloud with Packer, Terraform, and AnsibleExplore the world of GitOps with GitHub actions, Terraform, and Flux CDWho this book is forIf you are a software engineer, system administrator, or operations engineer looking to step into the world of DevOps within public cloud platforms, this book is for you. Existing DevOps engineers will also find this book useful as it covers best practices, tips, and tricks to implement DevOps with a cloud-native mindset. Although no containerization experience is necessary, a basic understanding of the software development life cycle and delivery will help you get the most out of the book.Explainable Artificial Intelligence for Intelligent Transportation Systems
Par Amina Adadi, Afaf Bouhoute. 2024
Artificial Intelligence (AI) and Machine Learning (ML) are set to revolutionize all industries, and the Intelligent Transportation Systems (ITS) field…
is no exception. While ML, especially deep learning models, achieve great performance in terms of accuracy, the outcomes provided are not amenable to human scrutiny and can hardly be explained. This can be very problematic, especially for systems of a safety-critical nature such as transportation systems. Explainable AI (XAI) methods have been proposed to tackle this issue by producing human interpretable representations of machine learning models while maintaining performance. These methods hold the potential to increase public acceptance and trust in AI-based ITS. FEATURES: Provides the necessary background for newcomers to the field (both academics and interested practitioners) Presents a timely snapshot of explainable and interpretable models in ITS applications Discusses ethical, societal, and legal implications of adopting XAI in the context of ITS Identifies future research directions and open problemsAdvanced Information-Measuring Technologies and Systems I (Studies in Systems, Decision and Control #439)
Par Artur Zaporozhets, Volodymyr Eremenko. 2024
The book presents the main scientific directions and issues of research conducted in the Department of Information and Measurement Technologies…
at the National Technical University of Ukraine "Ihor Sikorskyi Kyiv Polytechnic Institute". The presented results cover almost all scientific directions related to information and measurement technologies—metrological support of measurement channels of information and measurement systems, methods of reproducing units of electric circuit parameters, development of specialized information and measurement systems, mathematical methods of processing measurement information, models of formation of information signals and fields, statistical diagnostic methods, information support of testing, and calibration laboratories.Data Analytics and Computational Intelligence: Novel Models, Algorithms and Applications (Studies in Big Data #132)
Par Bernabé Dorronsoro, Alejandro Rosete, Gilberto Rivera, Laura Cruz-Reyes. 2023
In the age of transformative artificial intelligence (AI), which has the potential to revolutionize our lives, this book provides a…
comprehensive exploration of successful research and applications in AI and data analytics. Covering innovative approaches, advanced algorithms, and data analysis methodologies, this book addresses complex problems across topics such as machine learning, pattern recognition, data mining, optimization, and predictive modeling. With clear explanations, practical examples, and cutting-edge research, this book seeks to expand the understanding of a wide readership, including students, researchers, practitioners, and technology enthusiasts eager to explore these exciting fields. Featuring real-world applications in education, health care, climate modeling, cybersecurity, smart transportation, conversational systems, and material analysis, among others, this book highlights how these technologies can drive innovation and generate competitive advantages.The Forts & Fortifications of Europe 1815-1945: Germany, Austria-Hungry and Czechoslovakia
Par H. W. Kaufmann, J. E. Kaufmann. 1914
&“Extremely well written and presented and gives you every scrap of information you&’ll ever need on cupolas, embrasures and cloches.&”—War…
History Online After the Napoleonic Wars, the borders of Central Europe were redrawn and relative peace endured across the region, but the volatile politics of the late nineteenth century generated an atmosphere of fear and distrust, and it gave rise to a new era of fortress building, and this is the subject of this highly illustrated new study. The authors describe how defensive lines and structures on a massive scale were constructed along national frontiers to deter aggression. The Germans, Austro-Hungarians and Czechs all embarked on ambitious building programs. Artillery positions, barbed-wire networks, casemates, concrete bunkers, trench lines, observation posts all sprang up in a vain attempt to keep the peace and to delay the invader. The strategic thinking that gave rise to these defensive schemes is described in detail in this study, as is the planning, design and construction of the lines themselves. Their operational history in wartime, in particular during the Second World War, is a key element of the account. &“A useful introduction for those wishing to develop a knowledge of fortifications and their impact on the conduct of war.&”—Firetrench &“The maps and plans, especially the plans, are numerous and extremely helpful. They show the arrangement of fortifications in a way that simple text would have found impossible. For those with an interest in European land fortifications of the 19th and 20th centuries, this book is an excellent general survey.&”—The Coast Defense JournalThe Military Life & Times of General Sir Miles Dempsey GBE KCB DSO MC: Monty's Army Commander
Par Peter Rostron. 2010
Miles Dempsey, Commander of the British Second Army in the invasion of Europe 1944-45, is almost unknown to the general…
public. Yet his part in Britains contribution to that campaign was second only to Montgomerys in importance. Dempsey survived two and a half years of bitter fighting as an infantry officer on the Western Front before accompanying his beloved Royal Berkshire Regiment in the little-known North West Persia campaign of 1920-21. In six years he rose from Major to command over half a million men in the largest combined operation in history, and led them to victory a year later.Based on sources which include some of Dempseys previously unpublished work and the views of those who knew him, the book traces his career as a soldier of rare distinction, a talented sportsman and a man of huge charm and shrewd intellect, dedicated to his beloved regiment and ever mindful of the lives of his soldiers. Peter Rostron examines his methods of command and his relationships with Montgomery, his Corps commanders, the Americans and the RAF. It highlights his crucial role in the Dunkirk evacuation, the training of the Canadian Army, and the invasion of Sicily, Italy, and North West Europe, and analyses why his army performed so brilliantly on D Day. Lasly, Rostron examines his contribution to the campaign in Europe, focussing on the controversial operations of EPSOM, GOODWOOD, Arnhem and the Rhine Crossing.