Résultats de recherche de titre
Articles 1 à 20 sur 4183
Guide to Computer Network Security (Texts in Computer Science)
Par Joseph Migga Kizza. 2024
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going…
beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing artificial intelligence models across all computing security systems spheres, blockchain technology, and the metaverse, leading toward security systems virtualizations.Topics and features:Explores the range of risks and vulnerabilities in all connected digital systemsPresents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projectsDescribes the fundamentals of traditional computer network security, and common threats to securityDiscusses the role and challenges of artificial intelligence in advancing the security of computing systems’ algorithms, protocols, and best practicesRaises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and securityOffers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestionsThis important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, USA. He also authored the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.Technologie: Systemdenken und interdisziplinäres Ingenieurwesen
Par Horst Czichos. 2023
Dieses prägnante Lehrbuch führt einen Systemansatz in die Technik ein und beschreibt tribologische, mechatronische und cyber-physikalische Systeme sowie das technologische…
Konzept der Industrie 4.0 für Studierende verschiedener technischer Fachrichtungen. "Technologie" bezieht sich in diesem Buch auf die Gesamtheit der vom Menschen geschaffenen, nutzenorientierten Produkte, die auf technischen Kombinationen von Material, Energie und Information basieren. Dr. Czichos untersucht Technologie in diesem Band im Kontext des Systemdenkens im Hinblick auf die folgenden Haupttechnologiebereiche:Technische Systeme mit "interagierenden Oberflächen in Relativbewegung", insbesondere im Maschinenbau, in der Produktion und im Transportwesen; einschließlich der Analyse von reibungsbedingten Energieverlusten und verschleißbedingter Materialdissipation. Technische Systeme, die eine Kombination aus Mechanik, Elektronik, Steuerung und Computertechnik für die Bedürfnisse von Industrie und Gesellschaft erfordern. Technische Systeme mit einer Kombination aus Mechatronik und Internetkommunikation. Cyber-physikalische Systeme für die Digitalisierung der Industrie im Entwicklungsprojekt Industrie 4.0.Betrachtet Technik als Kombination aus der physischen Welt und der digitalen virtuellen Welt der Information und Kommunikation.Beschreibt den Produktzyklus von technischen Systemen und die Eckpfeiler der Technik: Material, Energie und Information.Stellt eine ganzheitliche Betrachtung von Technik und Engineering dar.This book constitutes the refereed proceedings of the 8th International Conference on Internet on Things, ICIOT 2023, held as part…
of SCF 2023, in Shenzhen, China, during December 17–18, 2023.The 8 full papers presented in this volume were carefully reviewed and selected from 28 submissions. The papers cover topics in the field of sensors and other types of sensing devices, wired and wireless networks, platforms and tools, data processing/visualization/analysis and integration engines.The American Challenge: A New History of the United States
Par Michael Phillips. 2019
Ethik künstlicher Intelligenz: Eine Topographie zur praktischen Orientierung (essentials)
Par Michael Funk. 2023
Künstliche Intelligenz ist zum vielschichtigen Gegenstand ethischer Debatten geworden. Ob Richtlinien fairer Digitalisierung und vertrauenswürdiger Algorithmen, Gestaltung nachhaltiger Geschäftsmodelle, informatische…
Grundbildung in Schulen oder Existenzfragen freiheitlich-demokratischer Gesellschaften – KI-Ethik steht vor komplexen Herausforderungen. Grundsätzlicher Klärungsbedarf entsteht durch die verschiedenen Zugänge, Interessen und Begrifflichkeiten, die aufeinandertreffen. Vorliegendes essential präsentiert auf zugängliche Weise wissenschaftliches Überblickswissen zur KI-Ethik. Als praktische Orientierungshilfe im komplexen Terrain dient eine thematische Topographie, einschließlich zentraler Begriffe. Zusammenhänge zwischen Industrie 5.0, Regulierung, Post- und Transhumanismus, selbstfahrenden Autos, moralischen Maschinen, nachhaltiger Digitalisierung oder dem Anthropozän werden mit Blick auf KI-Ethik systematisch sichtbar gemacht.Data Science and Applications: Proceedings of ICDSA 2023, Volume 3 (Lecture Notes in Networks and Systems #820)
Par Satyasai Jagannath Nanda, Rajendra Prasad Yadav, Amir H. Gandomi, Mukesh Saraswat. 2024
This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2023), organized by Soft…
Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 14 to 15 July 2023. The book is divided into four volumes, and it covers theoretical and empirical developments in various areas of big data analytics, big data technologies, decision tree learning, wireless communication, wireless sensor networking, bioinformatics and systems, artificial neural networks, deep learning, genetic algorithms, data mining, fuzzy logic, optimization algorithms, image processing, computational intelligence in civil engineering, and creative computing.New Developments and Environmental Applications of Drones: Proceedings of FinDrones 2023
Par Tomi Westerlund, Jorge Peña Queralta. 2024
This volume presents the conference proceedings from FinDrones 2023. The book highlights recent drone technology developments by experts and academicians…
for applications in agriculture, forestry, and other industries. This iteration of FinDrones presents research using autonomous drones in various fields from environmental monitoring to farm robotics and from photogrammetry to search and rescue missions. Emphasis is placed on contextualizing the conference presentations and content to Finland and the unique challenges typical to the region. The work will interest academicians, entrepreneurs, and professionals involved in remote sensing applications of unmanned aerial vehicles and enthusiasts of drone technological developments.Analytics Engineering with SQL and dbt
Par Rui Pedro Machado, Helder Russa. 2024
With the shift from data warehouses to data lakes, data now lands in repositories before it's been transformed, enabling engineers…
to model raw data into clean, well-defined datasets. dbt (data build tool) helps you take data further. This practical book shows data analysts, data engineers, BI developers, and data scientists how to create a true self-service transformation platform through the use of dynamic SQL.Authors Rui Machado from Monstarlab and Hélder Russa from Jumia show you how to quickly deliver new data products by focusing more on value delivery and less on architectural and engineering aspects. If you know your business well and have the technical skills to model raw data into clean, well-defined datasets, you'll learn how to design and deliver data models without any technical influence.With this book, you'll learn:What dbt is and how a dbt project is structuredHow dbt fits into the data engineering and analytics worldsHow to collaborate on building data modelsThe main tools and architectures for building useful, functional data modelsHow to fit dbt into data warehousing and laking architectureHow to build tests for data transformationsThis four-volume set constitutes the post-conference proceedings of the 9th EAI International Conference on e-Learning, e-Education, and Online Training, eLEOT…
2023, held in Yantai, China, during August 17-18, 2023.The 104 full papers presented were selected from 260 submissions. The papers reflect the evolving landscape of education in the digital age. They were organized in topical sections as follows: IT promoted teaching platforms and systems; AI based educational modes and methods; automatic educational resource processing; educational information evaluation.This four-volume set constitutes the post-conference proceedings of the 9th EAI International Conference on e-Learning, e-Education, and Online Training, eLEOT…
2023, held in Yantai, China, during August 17-18, 2023. The 104 full papers presented were selected from 260 submissions. The papers reflect the evolving landscape of education in the digital age. They were organized in topical sections as follows: IT promoted teaching platforms and systems; AI based educational modes and methods; automatic educational resource processing; educational information evaluation.Information Security Planning: A Practical Approach
Par Susan Lincke. 2024
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the…
technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary book is intended for business and technology audiences, at student or experienced levels.Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation and security standards. This international edition covers Payment Card Industry Data Security Standard (PCI DSS), American security regulation, and European GDPR. Developing a risk profile helps to estimate the potential costs that an organization may be prone to, including how much should be spent on security controls.Security planning then includes designing information security, as well as network and physical security, incident response and metrics. Business continuity considers how a business may respond to the loss of IT service. Optional areas that may be applicable include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics.This book targets professionals in business, IT, security, software development or risk. This text enables computer science, information technology, or business students to implement a case study for an industry of their choosing..Electromagnetic Sources and Electromagnetic Fields (Modern Antenna)
Par Gaobiao Xiao. 2024
This book presents a modified spherical harmonic expansion method in which the electromagnetic fields and their sources are expanded with…
the same set of spherical vector basis functions in a similar procedure. Explicit expressions for the electromagnetic fields, potentials, energies, and the related Green’s functions are derived for the spherical modes in both frequency domain and time domain. Based on the formulation, the relationships between the electromagnetic sources, the electromagnetic far fields, and the electromagnetic near fields are clearly revealed. In particular, a nonuniform transmission line model is developed for intuitively characterizing the total radiation process. The introduction of the cutoff radius and the cutoff mode degree provides a simple reference for determining the numbers of degrees of freedom of the fields associated with sources in a bounded region. Based on the theory, an efficient hybrid method for synthesizing antenna arrays with complex footprints is proposed and demonstrated with several numerical examples. Effective algorithms are also developed for reconstructing the radiating part of the current sources.This book is intended for researchers, engineers, and graduate students who are interested in studying the energy transfer in electromagnetic radiation, synthesis and measurement of antenna arrays, and applications of inverse electromagnetic source problems.Teach Yourself VISUALLY MacBook Pro and MacBook Air (Teach Yourself VISUALLY (Tech))
Par Guy Hart-Davis. 2024
The visual learner's guide to getting up and running with your Apple laptop Teach Yourself VISUALLY MacBook Pro and MacBook…
Air covers all the vital information you need to start working on your MacBook. With this highly illustrated and easy-to-follow guide, you'll learn to navigate the macOS interface like a pro; customize your desktop with the widgets you need; and get your MacBook working with iCloud, your iPhone, and your iPad. This book's graphical, step-by-step instructions walk you through everything from installation to troubleshooting, helping you to get the most out of the investment you've made in your MacBook. This fully updated edition helps you become a power user of the latest MacBook models and exploit the features in macOS Sonoma, Apple's state-of-the-art operating system, and the apps that come with it. If you prefer to learn visually, this is the book you need. Get up to speed with the latest macOS version, Sonoma, and its new features Perform everyday tasks quickly and easily Customize settings to make macOS and its apps work the way you prefer Communicate via audio and video with FaceTime, via instant messaging with Messages, and via email with Mail Organize your life with Calendar, Contacts, Reminders, Notes, and Maps Make the most of your iCloud account Instead of confusing tech-speak and vague instructions, this guide is packed with screenshots, easy-to-follow instructions, and a practical sensibility. Grab Teach Yourself VISUALLY MacBook Pro and MacBook Air and explore all that your MacBook can do.The VES Handbook of Visual Effects: Industry Standard VFX Practices and Procedures
Par Jeffrey A. Okun, Susan Zwerman, Christopher McKittrick, Lisa Sepp-Wilson. 2020
The award-winning VES Handbook of Visual Effects remains the most complete guide to visual effects techniques and best practices available…
today. This new edition has been updated to include the latest, industry-standard techniques, technologies, and workflows for the ever-evolving fast paced world of visual effects. The Visual Effects Society (VES) tasked the original authors to update their areas of expertise, such as AR/VR Moviemaking, Color Management, Cameras, VFX Editorial, Stereoscopic and the Digital Intermediate, as well as provide detailed chapters on interactive games and full animation. Additionally, 56 contributors share their best methods, tips, tricks, and shortcuts developed through decades of trial and error and real-world, hands-on experience.This third edition has been expanded to feature lessons on 2.5D/3D Compositing; 3D Scanning; Digital Cinematography; Editorial Workflow in Animated and Visual Effects Features; Gaming updates; General Geometry Instancing; Lens Mapping for VFX; Native Stereo; Real-Time VFX and Camera Tracking; Shot/Element Pulls and Delivery to VFX; Techvis; VFX Elements and Stereo; Virtual Production; and VR/AR (Virtual Reality / Augmented Reality).A must-have for anyone working in or aspiring to work in visual effects, The VES Handbook of Visual Effects, Third Edition covers essential techniques and solutions for all VFX artists, producers, and supervisors, from pre-production to digital character creation, compositing of both live-action and CG elements, photorealistic techniques, and much more. With subjects and techniques clearly and definitively presented in beautiful four-color, this handbook is a vital resource for any serious VFX artist.Chicago’s Modern Mayors: From Harold Washington to Lori Lightfoot
Par Betty O'Shaughnessy, Xolela Mangeu, Gregory D Squires, Monroe Anderson, Costas Spirou, Dennis Judd, Kari Lydersen, Daniel Bliss, Marco Rosaire Rossi, Dick Simpson, Clinton Stockwell. 2024
Political profiles of five mayors and their lasting impact on the city Chicago’s transformation into a global city began at…
City Hall. Dick Simpson and Betty O’Shaughnessy edit in-depth analyses of the five mayors that guided the city through this transition beginning with Harold Washington’s 1983 election: Washington, Eugene Sawyer, Richard M. Daley, Rahm Emmanuel, and Lori Lightfoot. Though the respected political science, sociologist, and journalist contributors approach their subjects from distinct perspectives, each essay addresses three essential issues: how and why each mayor won the office; whether the City Council of their time acted as a rubber stamp or independent body; and the ways the unique qualities of each mayor’s administration and accomplishments influenced their legacy. Filled with expert analysis and valuable insights, Chicago’s Modern Mayors illuminates a time of transition and change and considers the politicians who--for better and worse--shaped the Chicago of today.Marching Through Georgia: Story of Soldiers and Civilians During Sherman's Campaign
Par Lee B. Kennett. 1995
In this engrossing work of history, Lee Kennett brilliantly brings General Sherman's 1864 invasion of Georgia to life by capturing…
the ground-level experiences of the soldiers and civilians who witnesses the bloody campaign. From the skirmish at Buzzard Roost Gap all the way to Savannah ten months later, Kennet follows the notorious, complex Sherman, who attacked the devastated the heart of the Confederacy's arsenal. Marching Through Georgia describes, in gripping detail, the event that marked the end of the Old South.The Lusitania Story: The Atrocity That Shocked The World
Par Mitch Peeke. 2002
The Lusitania Story is the complete story of this most famous ocean liner, told for the first time in a…
single volume. The Lusitania is today most remembered for controversy surrounding her loss by a German submarine attack in 1915, during the First World War. But this book also tells of her life before that cataclysmic event. It tells of the ground-breaking advances in maritime engineering that she represented, as well as a hitherto unheard of degree of opulence. This book also takes a close look at the disaster which befell her and, with the help of leading experts, the authors examine the circumstances of her loss and try to determine why this magnificent vessel was lost in a mere eighteen minutes.South Yorkshire Pits
Par Warwick Taylor. 2001
The last 150 years has been the most tumultuous in the industrial history of South Yorkshire, and at the heart…
of this has always been mining and its allied industries. South Yorkshire Pits takes us from the beginnings of the industry, where land ownership brought wealth from what lay beneath it. Here, we have a concise record of the sinking, operating and eventual closure of the pits which, in January 1947, were taken over by the National Coal Board. There is also a clear record of the social and employment conditions under which the mines were operated, including child and female labour and the legislation abolishing them. This is an indispensable reference work for all interested in South Yorkshire's mining industry.From the critically acclaimed author of Crazy '08 comes the thrilling true story of the most colorful and notorious law…
firm in American history. Scoundrels in Law offers an inside look at crime and punishment in the nineteenth century, and a whirlwind tour of the Gilded Age.Gangsters and con men. Spurned mistresses and wandering husbands. Strippers and Broadway royalty. Cat killers and spiritualists. These were the friends and clients of Howe & Hummel, the most famous (and famously rotten) law firm in nineteenth-century America.The partners gloried in their reputation and made a rich living from it. William Howe left London a step ahead of the law to find his destiny defending the perpetrators of murder and mayhem in post-Civil War New York, in an age of really good murders. A dramatic, diamond-encrusted presence, Howe was one of the great courtroom orators of his era, winning improbable acquittals time after time.Abraham Hummel enjoyed a quieter but perhaps more fearsome notoriety, shaking down high society so well and so often that receiving an envelope with the law firm's name on it became almost a rite of passage.The partners bestrode Gilded Age New York with wit and brio, and everyone from Theodore Roosevelt to Lola Montez had a part in their story. In Howe & Hummel's prime, it would not have been unusual to see a leading politician, a pickpocket, a Broadway star, a bank robber, and a socialite all crowded together into the waiting room of their offices, located conveniently across the street from the city jail. Howe and Hummel were not particularly good men. They were perfectly ready—even eager—to lie, cheat, and bribe on behalf of their clients. They did stop short of murder, though, a principle that played a critical role when the famous firm imploded in a truly spectacular web of deceit gone wrong.Through the windows of the dingy premises of Howe & Hummel, readers can glimpse the Gilded Age in all its grime and grandeur. Cait Murphy restores this once-famous duo to their rightful place in the pantheon of great American characters.Foul Deeds & Suspicious Deaths in Lewisham & Deptford (Foul Deeds & Suspicious Deaths)
Par Jonathan Oates. 2007
The twin fascinations of death and villainy will always hold us in their grim but thrilling grip. In Foul Deeds…
and Suspicious Deaths in Lewisham and Deptford the chill is brought close to home as each chapter investigates the darker side of humanity in cases of murder, deceit and pure malice committed over the centuries in this area of London. From crimes of passion to opportunistic killings and coldly premeditated acts of murder, the full spectrum of criminality is recounted, bringing to life the more sinister history of Lewisham and Deptford from the sixteenth century onwards. For this journey into the bloody, neglected past, Jonathan Oates has selected over 20 notorious episodes that give a fascinating insight into criminal acts and the criminal mind. The story of one of the most famous unsolved murders in history, of the great playwright Christopher Marlowe in Deptford in 1593. is followed by a catalogue of heinous crimes of every description—political conspiracies, gang killings, murders of policemen, suicide pacts, multiple poisonings, a husband who killed his wife and four children, the suicide of a crooked councillor, a motiveless murder and two unsolved murders that are as intriguing today as they were 80 years ago. The human dramas Jonathan Oates describes are often played out in the most commonplace of circumstances, but others are so odd as to be stranger than fiction. His grisly chronicle of the hidden history of Lewisham and Deptford will be compelling reading for anyone who is interested in the dark side of human nature.