Résultats de recherche de titre
Articles 1 à 20 sur 7821
Magill Family Egyptian Adventure
Par John Magill, Judith Ann Magill Cathcard. 2016
The Magill Family Egyptian Adventure tells the story of Canadian, Arthur Napier Magill, who lost his sight as a young…
man, as he and his young family embark on a years’ long adventure to Egypt, where he was seconded by the UN from his role at CNIB in 1953 to head a team of experts to establish a CNIB like demonstration school for the blind to serve that country and to provide training for others to replicate the school in neighbouring Arab states. Using newspaper articles, family photographs, letters home, and written project reports, readers gain insight into expatriate life and the enormous difference this UN mission made to the many blind people in the Middle East who would otherwise have been unable to live productive and independent lives. Arthur Napier Magill later became the second Managing Director of CNIB, succeeding Colonel E. A. Baker.QuickBooks 2024 All-in-One For Dummies
Par Stephen L. Nelson. 2024
The quick way to get started—and get proficient—with QuickBooks QuickBooks 2024 All-in-One For Dummies is the solution small business owners…
and managers are seeking. This high-value reference combines 8 content-rich mini-books into one complete package, providing the answers you need to get the most out of the 2024 version of QuickBooks. You’ll learn the key features of QuickBooks and small business accounting, including setting up the software, understanding double-entry bookkeeping, invoicing customers, paying vendors, tracking inventory, creating reports, and beyond. Plus, you’ll discover how you can use cloud storage to access your information on your smartphone, making running a small business that much more manageable. Sign up for QuickBooks software, set up your accounts, and customize your preferences Learn the basics of accounting and bookkeeping, and make sure you’re doing it right Discover advanced features of QuickBooks that will help you run your business smoothly and efficiently Save money by confidently managing your finances yourself This beginner-friendly Dummies guide makes it a breeze for small business owners, managers, and employees to implement QuickBooks at work.Multimodal Biometric and Machine Learning Technologies: Applications for Computer Vision
Par Sandeep Kumar, Suman Lata Tripathi, Shilpa Rani, Deepika Ghai, Arpit Jain. 2023
MULTIMODAL BIOMETRIC AND MACHINE LEARNING TECHNOLOGIES With an increasing demand for biometric systems in various industries, this book on multimodal…
biometric systems, answers the call for increased resources to help researchers, developers, and practitioners. Multimodal biometric and machine learning technologies have revolutionized the field of security and authentication. These technologies utilize multiple sources of information, such as facial recognition, voice recognition, and fingerprint scanning, to verify an individual???s identity. The need for enhanced security and authentication has become increasingly important, and with the rise of digital technologies, cyber-attacks and identity theft have increased exponentially. Traditional authentication methods, such as passwords and PINs, have become less secure as hackers devise new ways to bypass them. In this context, multimodal biometric and machine learning technologies offer a more secure and reliable approach to authentication. This book provides relevant information on multimodal biometric and machine learning technologies and focuses on how humans and computers interact to ever-increasing levels of complexity and simplicity. The book provides content on the theory of multimodal biometric design, evaluation, and user diversity, and explains the underlying causes of the social and organizational problems that are typically devoted to descriptions of rehabilitation methods for specific processes. Furthermore, the book describes new algorithms for modeling accessible to scientists of all varieties. Audience Researchers in computer science and biometrics, developers who are designing and implementing biometric systems, and practitioners who are using biometric systems in their work, such as law enforcement personnel or healthcare professionals.The History of the Titanic: A History Book for New Readers (The History Of: A Biography Series for New Readers)
Par Kelly Milner Halls. 2021
Discover the history of the Titanic—an exploration of the shipwreck that shook the world for kids ages 6 to 9…
On April 10, 1912, the Titanic sailed away from Southampton, England, on its very first voyage. It was the biggest ship ever built, and many people believed it was unsinkable. Four days later they were proven wrong. The sinking of the Titanic is a tragedy that we still remember today. One of the most comprehensive Titanic books for kids available, this colorfully illustrated story takes you through the ship's construction, its tragic voyage, and the legacy it left behind. This standout among Titanic books for kids features: A visual timeline—Easily understand important details of the Titanic's construction and journey thanks to a timeline marking the major milestones. Core curriculum—Learn the Who, What, Where, When, Why, and How of this fateful voyage, and take a quick quiz to test your knowledge after you finish this top choice in Titanic books for kids. Lasting changes—Explore thought-provoking questions that help you better understand how the sinking of the Titanic affected the world you live in today. Learn about this unforgettable disaster in this fascinating Titanic book for kids.Explore the most important moments of the 19th century in this history book for teens Help teens learn how the…
United States grew out of the seeds of rebellion. This 100-year journey into American history covers the period following the American Revolution all the way through the Civil War, the Gilded Age, and more. 19th Century American History for Teens offers a compelling look into the United States' formative years and shows how they made the country what it is today. 19th Century American History for Teens features: Event-focused learning—This standout choice among history books makes it easy to understand 19th century American history with chapters that explain what happened during key events and how they impacted the rest of the century. Closer looks—Teens will dive deep into major political and social conflicts, the considerations that went into history-changing decisions, and more. Critical thinking opportunities—Exciting storytelling makes this book fun to read while still providing teens with the info they need to draw their own conclusions about how the 19th century shaped the modern day. Inspire teens to love learning about America's past with 19th Century American History for Teens.Discover the history of the Constitution—an introduction for kids ages 6 to 9 On September 17, 1787, 39 delegates signed…
the Constitution of the United States into law. These four pages of rules would define how the United States government worked and serve as the foundation for all the rights that we enjoy today. This colorfully illustrated story takes kids on a journey through the writing of the Constitution, how it was amended with the Bill of Rights, and the ways it still shapes life in the United States. This exploration of the constitution for kids features: A visual timeline—Kids will easily understand important details of the Constitution's history with a timeline that covers everything from the writing of the first draft to how it has influenced modern Supreme Court rulings. Core curriculum—This book teaches kids about the Who, What, Where, When, Why, and How behind the Constitution, then tests their knowledge with a quick quiz after they finish. Lasting changes—Kids will explore thought-provoking questions that help them better understand how the Constitution protects them and their rights. Introduce kids to the Constitution with this history book for early readers.JavaScript Coding for Teens: A Beginner's Guide to Developing Websites and Games
Par Andrew Yueh. 2021
Everything teens need to get started with JavaScript Have you ever wanted to make your own game? How about an…
awesome website? Then JavaScript Coding for Teens is the book for you! It doesn't matter if you're not sure what a variable is, are stumped about syntax, or don't even know how to use JavaScript on your computer! This simple guide to coding for beginners walks you through every part of the process with easy-to-understand language and straightforward directions. You'll be coding like a pro in no time! JavaScript Coding for Teens includes: Beginner-friendly lessons—This guide to coding for teens starts out with the basics, providing the perfect foundation for coding novices. A variety of uses—Stretch your skills and discover how amazingly flexible and powerful JavaScript is as you learn to use it for programming websites and games. Practical practice—Gain confidence with exercises that test your ability to modify existing programs or create new ones. Build computer skills that will last a lifetime with JavaScript Coding for Teens.Strong Girls in History: 15 Young Achievers You Should Know (Biographies for Kids)
Par Susan B. Katz. 2022
Inspiring stories of unstoppable girls and everything they achieved—for kids ages 8 to 12 Girls are smart, capable, and determined!…
All over the world, young women have made huge strides in pop culture, politics, social justice, and more. This book explores 15 of these girls and the incredible impact they made before they were even 20 years old. Discover how they powered through challenges and stood up to anyone who said they couldn't make a difference. The girl who invented a genre—Read about famous author S. E. Hinton, who wrote the bestselling book The Outsiders as a teenager and helped launch the popularity of Young Adult novels. A protector of natural resources—Learn how Autumn Peltier became the chief water commissioner for the Anishinabek Nation in Ontario, Canada, when she was just 14 years old. A champion for equality—Find out how 11-year-old activist Marley Dias started a campaign to collect books featuring Black girls as the main character and donate them to schools around the world. Show any ambitious girl how much talent and power she has inside her with Strong Girls Change History.A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)
Par G. Tomas Hult, Marko Sarstedt, Christian M. Ringle, Joe Hair. 2022
The third edition of A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) guides readers through learning and mastering the techniques…
of this approach in clear language. Authors Joseph H. Hair, Jr., G. Tomas M. Hult, Christian Ringle, and Marko Sarstedt use their years of conducting and teaching research to communicate the fundamentals of PLS-SEM in straightforward language to explain the details of this method, with limited emphasis on equations and symbols. A running case study on corporate reputation follows the different steps in this technique so readers can better understand the research applications. Learning objectives, review and critical thinking questions, and key terms help readers cement their knowledge. This edition has been thoroughly updated, featuring the latest version of the popular software package SmartPLS 3. New topics have been added throughout the text, including a thoroughly revised and extended chapter on mediation, recent research on the foundations of PLS-SEM, detailed descriptions of research summarizing the advantages as well as limitations of PLS-SEM, and extended coverage of advanced concepts and methods, such as out-of-sample versus in-sample prediction metrics, higher-order constructs, multigroup analysis, necessary condition analysis, and endogeneity.A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM)
Par G. Tomas Hult, Marko Sarstedt, Christian M. Ringle, Joe Hair. 2022
The third edition of A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) guides readers through learning and mastering the techniques…
of this approach in clear language. Authors Joseph H. Hair, Jr., G. Tomas M. Hult, Christian Ringle, and Marko Sarstedt use their years of conducting and teaching research to communicate the fundamentals of PLS-SEM in straightforward language to explain the details of this method, with limited emphasis on equations and symbols. A running case study on corporate reputation follows the different steps in this technique so readers can better understand the research applications. Learning objectives, review and critical thinking questions, and key terms help readers cement their knowledge. This edition has been thoroughly updated, featuring the latest version of the popular software package SmartPLS 3. New topics have been added throughout the text, including a thoroughly revised and extended chapter on mediation, recent research on the foundations of PLS-SEM, detailed descriptions of research summarizing the advantages as well as limitations of PLS-SEM, and extended coverage of advanced concepts and methods, such as out-of-sample versus in-sample prediction metrics, higher-order constructs, multigroup analysis, necessary condition analysis, and endogeneity.Introduction to Natural Language Processing (Adaptive Computation and Machine Learning series)
Par Jacob Eisenstein. 2019
A survey of computational methods for understanding, generating, and manipulating human language, which offers a synthesis of classical representations and…
algorithms with contemporary machine learning techniques.This textbook provides a technical perspective on natural language processing—methods for building computer software that understands, generates, and manipulates human language. It emphasizes contemporary data-driven approaches, focusing on techniques from supervised and unsupervised machine learning. The first section establishes a foundation in machine learning by building a set of tools that will be used throughout the book and applying them to word-based textual analysis. The second section introduces structured representations of language, including sequences, trees, and graphs. The third section explores different approaches to the representation and analysis of linguistic meaning, ranging from formal logic to neural word embeddings. The final section offers chapter-length treatments of three transformative applications of natural language processing: information extraction, machine translation, and text generation. End-of-chapter exercises include both paper-and-pencil analysis and software implementation.The text synthesizes and distills a broad and diverse research literature, linking contemporary machine learning techniques with the field's linguistic and computational foundations. It is suitable for use in advanced undergraduate and graduate-level courses and as a reference for software engineers and data scientists. Readers should have a background in computer programming and college-level mathematics. After mastering the material presented, students will have the technical skill to build and analyze novel natural language processing systems and to understand the latest research in the field.CCST Cisco Certified Support Technician Study Guide: Networking Exam
Par Todd Lammle, Donald Robb. 2024
The ideal prep guide for earning your CCST Networking certification CCST Cisco Certified Support Technician Study Guide: Networking Exam is…
the perfect way to study for your certification as you prepare to start or upskill your IT career. Written by industry expert and Cisco networking guru Todd Lammle, this Sybex Study Guide uses the trusted Sybex approach, providing 100% coverage of CCST Networking exam objectives. You’ll find detailed information and examples for must-know Cisco networking topics, as well as practical insights drawn from real-world scenarios. This Study Guide provides authoritative coverage of key exam topics, including standards and concepts, addressing and subnet formats, endpoints and media types, infrastructure, diagnosing problems, and security. You also get one year of FREE access to a robust set of online learning tools, including a test bank with hundreds of questions, a practice exam, a set of flashcards, and a glossary of important terminology. The CCST Networking certification is an entry point into the Cisco certification program, and a pathway to the higher-level CCNA, so it’s a great place to start as you build a rewarding career! Study 100% of the topics covered on the Cisco CCST Networking certification exam Get access to flashcards, practice questions, and more great resources online Master difficult concepts with real-world examples and clear explanations Learn about the career paths you can follow and what comes next after the CCSTThis Sybex study guide is perfect for anyone wanting to earn their CCST Networking certification, including entry-level network technicians, networking students, interns, and IT professionals.Quantum Computing in Cybersecurity
Par Romil Rawat, Anjali Rawat, Rajesh Kumar Chakrawarti, Sanjaya Kumar Sarangi, Vivek Bhardwaj, Jaideep Patel, Hitesh Rawat. 2024
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum…
computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant amount of money is being invested in developing and testing a quantum version of the internet that will eliminate eavesdropping and make communication nearly impenetrable to cyber-attacks. The simultaneous activation of quantum terrorists (organized crime) can lead to significant danger by attackers introducing quantum information into the network, breaking the global quantum state, and preventing the system from returning to its starting state. Without signs of identifying information and real-time communication data, such vulnerabilities are very hard to discover. Terrorists' synchronized and coordinated acts have an impact on security by sparking a cyber assault in a fraction of a second. The encryption is used by cyber-criminal groups with the genuine, nefarious, and terrible motives of killing innocent people or stealing money. In the hands of criminals and codes, cryptography is a dangerous and formidable weapon. Small amounts of digital information are hidden in a code string that translates into an image on the screen, making it impossible for the human eye to identify a coded picture from its uncoded equivalents. To steal the cryptographic key necessary to read people's credit card data or banking information, cyber thieves employ installed encryption techniques, human mistakes, keyboard loggers, and computer malware. This new volume delves into the latest cutting-edge trends and the most up-to-date processes and applications for quantum computing to bolster cybersecurity. Whether for the veteran computer engineer working in the field, other computer scientists and professionals, or for the student, this is a one-stop-shop for quantum computing in cyber security and a must have for any library.This ambitious book provides the only systematic examination of the American abolition movement’s direct impacts on antislavery politics from colonial…
times to the Civil War and after. As opposed to indirect methods such as propaganda, sermons, and speeches at protest meetings, Stanley Harrold focuses on abolitionists’ political tactics—petitioning, lobbying, establishing bonds with sympathetic politicians—and on their disruptions of slavery itself.Harrold begins with the abolition movement’s relationship to politics and government in the northern American colonies and goes on to evaluate its effect in a number of crucial contexts--the U.S. Congress during the 1790s, the Missouri Compromise, the struggle over slavery in Illinois during the 1820s, and abolitionist petitioning of Congress during that same decade. He shows how the rise of "immediate" abolitionism, with its emphasis on moral suasion, did not diminish direct abolitionists’ impact on Congress during the 1830s and 1840s. The book also addresses abolitionists’ direct actions against slavery itself, aiding escaped or kidnapped slaves, which led southern politicians to demand the Fugitive Slave Law of 1850, a major flashpoint of antebellum politics. Finally, Harrold investigates the relationship between abolitionists and the Republican Party through the Civil War and Reconstruction.Tidy First?: A Personal Exercise In Empirical Software Design
Par Kent Beck. 2024
Tidying up messy software is a must. And that means breaking up the code to make it more readable, and…
using guard clauses and helping functions to make it understandable. In this practical guide, author Kent Beck, creator of Extreme Programming and pioneer of software patterns, suggests when and where you might apply tidyings in your code.Instead of trying to master tidying all at once, this book lets you try out a few examples that make sense for your problem. If you have a big function containing many lines of code, you'll learn how to logically divide it into smaller chunks. Along the way, you'll learn the theory behind software design: coupling, cohesion, discounted cash flows, and optionality.Salesforce CRM: The Definitive Admin Handbook
Par Paul Goodey. 2013
A practical guide which will help to discover how to setup and configure the Salesforce CRM application. It offers solutions…
and practical examples on how to further improve and maintain its functionality with clear systematic instructions. Being highly organized and compact, this book contains detailed instructions with screenshots, diagrams, and tips that clearly describe how you can administer and configure complex Salesforce CRM functionality with absolute ease.This book is for administrators who want to develop and strengthen their Salesforce CRM skills in the areas of configuration and system management. Whether you are a novice or a more experienced admin, this book aims to enhance your knowledge and understanding of the Salesforce CRM platform and by the end of the book, you should be ready to administer Salesforce CRM in a real-world environment.History and Legacy of the Suffragette Fellowship provides a biographical account of the scope and depth of the memory work…
of the now-forgotten commemorative group the Suffragette Fellowship, active from the 1920s to the 1970s. The Suffragette Fellowship comprised members from the militant suffrage groups known as the Women’s Social and Political Union, the Women’s Freedom League, and the Actress Franchise League. This research provides a comprehensive analysis of the Fellowship’s attempts to form and sustain a collective Suffragette identity across four decades of activity. It considers the legacy of contested histories attached to militant campaigning that pressured Fellowship leaders to take control of the public memory of suffrage history. With close attention given to a neglected piece of feminist history, this book highlights the cultural and political impacts that the Fellowship enacted in their memory of the women’s suffrage movement. Richly illustrated with images of members, artefacts, and publications, this extensive study of the Suffragette Fellowship adds to transnational suffrage histories in the United Kingdom and Australia and will be of interest to scholars in memory studies and women’s history.Learn Ethereum: Build your own decentralized applications with Ethereum and smart contracts
Par Xun Brian Wu, Zhihong Zou, Dongying Song. 2019
Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examples Key Features Explore the Ethereum ecosystem and…
understand the latest research on the platform Build decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examples Learn to make your decentralized applications fast and highly secure Book Description Ethereum is a blockchain-based, decentralized computing platform that allows running smart contracts. This book provides a basic overview of how Ethereum works, its ecosystem, mining process, and the consensus mechanism. It also demonstrates a step-by-step approach for building decentralized applications. This book begins with the very basics of Blockchain technology. Then it dives deep into the Ethereum architecture, framework and tools in its ecosystem. It also provides you an overview of ongoing research on Ethereum, for example, Layer 1 and 2 scaling solution, Stablecoin, ICO/STO/IEO, etc. Next, it explains Solidity language in detail, and provides step-by-step instructions for designing, developing, testing, deploying, and monitoring decentralized applications. In addition, you'll learn how to use Truffle, Remix, Infura, Metamask, and many other Ethereum technologies. It'll also help you develop your own cryptocurrency by creating ERC20, and ERC721 smart contracts from scratch. Finally, we explain private blockchains, and you learn how to interact with smart contracts through wallets. What you will learn Understand the concepts of blockchain and cryptocurrency Master Ethereum development tools such as Truffle, Remix IDE and Infura Delve into smart contract development Develop DApps frontend using Node.js, React.js, and Web3js API Learn Etherscan and other tools to secure and monitor smart contracts Develop and debug smart contracts by working with Remix Apply Truffle suite to compile, migrate, and unit test smart contracts Explore smart contracts such as ERC20 token and decentralized digital market Who this book is for This book is for all developers and architects who want to explore Ethereum blockchain fundamentals and get started with building real-world decentralized applications. Knowledge of an object-oriented programming language such as JavaScript will be useful but not mandatory.Get up and running with industrial cybersecurity monitoring with this hands-on book, and explore ICS cybersecurity monitoring tasks, activities, tools,…
and best practicesKey FeaturesArchitect, design, and build ICS networks with security in mindPerform a variety of security assessments, checks, and verificationsEnsure that your security processes are effective, complete, and relevantBook DescriptionWith Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment. You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment. By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.What you will learnMonitor the ICS security posture actively as well as passivelyRespond to incidents in a controlled and standard wayUnderstand what incident response activities are required in your ICS environmentPerform threat-hunting exercises using the Elasticsearch, Logstash, and Kibana (ELK) stackAssess the overall effectiveness of your ICS cybersecurity programDiscover tools, techniques, methodologies, and activities to perform risk assessments for your ICS environmentWho this book is forIf you are an ICS security professional or anyone curious about ICS cybersecurity for extending, improving, monitoring, and validating your ICS cybersecurity posture, then this book is for you. IT/OT professionals interested in entering the ICS cybersecurity monitoring domain or searching for additional learning material for different industry-leading cybersecurity certifications will also find this book useful.Plínio Salgado: A Brazilian Fascist (1895–1975) (Routledge Studies in Fascism and the Far Right)
Par João Fábio Bertonha. 2024
Plínio Salgado covers the life trajectory of the far-right Brazilian political leader between 1895 and 1975. The book initially follows his…
life from his birth, including political and cultural training and political activities between 1895 and 1930. The focus then shifts to his period as leader of the Brazilian fascist movement between 1932 and 1938, with attention to his performance as a leader, his role within the movement, and in the rise and fall of the Integralist Action. His period of exile in Portugal between 1939 and 1947 is also emphasized, with a special focus on his contacts with the Portuguese radical right and German and Italian agents. The final part addresses his return to Brazil, his efforts to reposition himself politically and his performance as a parliamentarian and supporter of the military coup of 1964. This book will be of interest to researchers of Latin American history, Brazilian history and politics, the transnational far right, and comparative fascism studies.