Browse Results

Showing 20,601 through 20,625 of 54,425 results

CSS Floating

by Eric A. Meyer

While flowing text around images is certainly nothing new, with CSS you can float any element, from images to paragraphs to lists. In this practical guide, author Eric Meyer reveals some interesting--and surprising--ways to use CSS floats in your web design, including the latest capability to flow content past non-rectangular float shapes.Short and sweet, this book is an excerpt from the upcoming fourth edition of CSS: The Definitive Guide. When you purchase either the print or the ebook edition of CSS Floating, you'll receive a discount on the entire Definitive Guide once it's released. Why wait? Learn how to bring life to your web pages now.Learn the characteristics of floated elements, and CSS rules for using themBe aware of certain rule exceptions when applying floats to your design, including the use of negative marginsUse the clear property to prevent floats from affecting elements in the next section of the documentCreate floating boxes in non-rectangular shapes, including rounded corners, circles, ellipses, and even polygonsDefine float shapes with transparent or opaque images

Cult of Analytics: Data analytics for marketing (Emarketing Essentials Ser.)

by Steve Jackson

Cult of Analytics enables professionals to build an analytics driven culture into their business or organization. Marketers will learn how to turn tried and tested tactics into an actionable plan to change their culture to one that uses web analytics on a day to day basis.Through use of the fictitious ACME PLC case, Steve Jackson provides working examples based on real life situations from the various companies he has worked with, such as Nokia, KONE, Rovio, Amazon, Expert, IKEA, Vodafone, and EMC. These examples will give the reader practical techniques for their own business regardless of size or situation making Cult of Analytics a must have for any would-be digital marketer. This new edition has been thoroughly updated, now including examples out of how to get the best from Google analytics, as well as ways to use social media data, big data, tag management and advanced persona segmentation to drive real value in your organisation. It's also been expanded to include exercises and new cases for students and tutors using the book as a text.

Cultural Robotics: First International Workshop, CR 2015, Held as Part of IEEE RO-MAN 2015, Kobe, Japan, August 31, 2015. Revised Selected Papers (Lecture Notes in Computer Science #9549)

by Jeffrey T.K.V. Koh Belinda J. Dunstan David Silvera-Tawil Mari Velonaki

This LNAI 9549 constitutes the refereed proceedings of the First International Workshop in Cultural Robotics 2015, held as part of the 24th International Symposium on Robot and Human Interactive Communication held in Kobe, Japan, in August/September 2015. A total of 12 full papers and 1 short paper were accepted from a total of 26 initially submitted. The following papers are organized into four categories. These categories are indicative of the extent to which culture has influenced the design or application of the robots involved, and explore a progression in the emersion and overlap between human and robotic generated culture.

Culture, Technology, Communication. Common World, Different Futures: 10th IFIP WG 13.8 International Conference, CaTaC 2016, London, UK, June 15-17, 2016, Revised Selected Papers (IFIP Advances in Information and Communication Technology #490)

by Charles Ess José Abdelnour-Nocera Michele Strano Maja Van der Velden Herbert Hrachovec

This volume constitutes the refereed post-conference proceedings of the 10th IFIP WG 13. 8 International Conference on Culture, Technology, and Communication, CaTaC 2016, held in London, UK, in June 2016. The 9 revised full papers were carefully reviewed and selected from 22 submissions. The papers explore the intersections between culture, technology, and communication, applying different theoretical and methodological perspectives, genres, and styles. They deal with cultural attitudes towards technology and communication, interaction design, and international development.

Curating the Digital: Space for Art and Interaction (Springer Series on Cultural Computing #0)

by David England Thecla Schiphorst Nick Bryan-Kinns

This bookcombines work from curators, digital artists, human computer interactionresearchers and computer scientists to examine the mutual benefits andchallenges posed when working together to support digital art works in theirmany forms. In Curating the Digitalwe explore how we can work together to make space for art and interaction. Welook at the various challenges such as the dynamic nature of our media, theproblems posed in preserving digital art works and the thorny problems of howwe assess and measure audience's reactions to interactive digital work. Curating the Digital is an outcome of a multi-disciplinary workshop that took place atSICHI2014 in Toronto. The participants from the workshop reflected on the themeof Curating the Digital via a series of presentations and rapid prototypingexercises to develop a catalogue for the future digital art gallery. Theresults produce a variety of insights both around the theory and philosophy ofcurating digital works, and also around the practical and technicalpossibilities and challenges. We present these complimentary chapters so thatother researchers and practitioners in related fields will find motivation andimagination for their own work.

Curation: The power of selection in a world of excess

by Michael Bhaskar

'A terrific and important book . . . it's a great, fresh take on how the 21st century is transforming the way we select everything from food to music' David Bodanis, author of E=MC2In the past two years humanity has produced more data than the rest of human history combined. We carry a library of data in our pockets, accessible at any second. We have more information and more goods at our disposal than we know what to do with. There is no longer any competitive advantage in creating more information. Today, value lies in curation: selecting, finding and cutting down to show what really matters.Curation reveals how a little-used word from the world of museums became a crucial and at times controversial strategy for the twenty-first century. Today's most successful companies - Apple, Netflix, Amazon - have used curation to power their growth, by offering customers more tailored and appropriate choices.Curation answers the question of how we can live and prosper in an age of information overload. In the context of excess, it is not only a sound business strategy, but a way to make sense of the world.

Current Developments in Web Based Learning: ICWL 2015 International Workshops, KMEL, IWUM, LA, Guangzhou, China, November 5-8, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9584)

by Zhiguo Gong Dickson K. W. Chiu Di Zou

This bookconstitutes the thoroughly revised selected papers of the workshops of the 14thInternational Conference of Web Based Learning, ICWL 2015, held in Guangzhou,China, in November 2015. This volumecomprises papers of three workshops: 1. The 5thInternational Symposium on Knowledge Management and E-Learning, KMEL 2015 2. Thefirst International Workshop on User Modeling for Web Based Learning, IWUM 2015 3. TheInternational Workshop on Learning Analytics

Current Trends in Web Engineering: ICWE 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016. Revised Selected Papers (Lecture Notes in Computer Science #9881)

by Cesare Pautasso Sven Casteleyn Peter Dolog

This book constitutes the thoroughly refereed post-workshop proceedings of the 16th International Conference on Web Engineering, ICWE 2016, held in Lugano, Switzerland, in June 2016. The 15 revised full papers together with 5 short papers were selected form 37 submissions. The workshops complement the main conference, and provide a forum for researchers and practitioners to discuss emerging topics. As a result, the workshop committee accepted six workshops, of which the following four contributed papers to this volume: 2nd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2016) 2nd International Workshop on Mining the Social Web (SoWeMine 2016) 1st International Workshop on Liquid Multi-Device Software for the Web (LiquidWS 2016) 5th Workshop on Distributed User Interfaces: Distributing Interactions (DUI 2016)

Cyber Deception: Building the Scientific Foundation

by Sushil Jajodia Cliff Wang V. S. Subrahmanian Vipin Swarup

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems. This book can be used as a text for a graduate-level survey/seminar course on cutting-edge computer science research relating to cyber-security, or as a supplemental text for a regular graduate-level course on cyber-security.

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

by Mary Aiken

Dr Mary Aiken is the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, criminology and technology to investigate the intersection between technology and human behaviour. In this, her first book, Aiken has created a starting point for all future conversations about how the Internet is shaping our perception of the world, development and behaviour, societal norms and values, children, safety and security.Covering everything from the impact of screens on the developing child to the explosion of teen sexting, and the acceleration of compulsive and addictive online behaviours (gaming, shopping, pornography), The Cyber Effect also examines the escalation in cyberchondria (self-diagnosis online), cyberstalking and organized crime in the Deep Web. Cyberspace is an environment full of surveillance, but who is looking out for us? Full of surprising statistics and incredible-but-true case studies of the hidden trends that are shaping our culture, this book raises troubling questions about where the digital revolution is taking us.Upending your assumptions about your online life and forever changing the way you think about the technology that you, your friends and your family use, The Cyber Effect offers a fascinating and chilling look at a future we can still do something about.

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behaviour Changes Online

by Mary Aiken

From the world's leading expert in forensic cyberpsychology - a discipline that combines psychology, forensics and technology - comes a groundbreaking exploration of the impact of technology on human behaviour. The average person now checks their phone over 200 times a day. That's a serious addiction - but because we're all doing it all the time, it doesn't seem quite so scary. And, like all addicts, we have avoided thinking about the implications of the cyber effect. But now, at last, there is someone who can explain what is happening to us, how it works and what we can do about it. In this, the first book of its kind, Dr Mary Aiken applies her expertise in cyber-behavioural analysis to a range of subjects including criminal activity on the Deep Web and Darknet; deviant behaviour; internet addictions; the impact of technology on the developing child; teenagers and the Web; cyber romance and cyber friendships; cyberchrondria; the future of artificial intelligence; and the positive effects on our digital selves, such as online altruism. Packed with vivid stories, eye-opening insights and surprising statistics, The Cyber Effect offers us a fascinating guide through a new future that it's not too late to do something about.(P) 2016 Penguin Random House Audio

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

by Luis Ayala

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won t suspect it was a hacker until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What you ll learn Possible ways hackers can cause building equipment to fail. How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack. How to restore equipment operation without doing any more damage. Who This Book Is For Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities. "

Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level (Protecting Critical Infrastructure #3)

by Simon Hakim Robert M. Clark

This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U. S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others. Cyber-attacks might include denial of service, theft or manipulation of data. Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens. Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government. Little attention has been paid to cyber-security at the state and local level. However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public. Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists.

Cyber-Physical Systems: A Computational Perspective

by Gaddadevara Matt Siddesh Ganesh Chandra Deka Krishnarajanagar GopalaIyengar Srinivasa Lalit Mohan Patnaik

In cyber-physical systems (CPS), sensors and embedded systems are networked together to monitor and manage a range of physical processes through a continuous feedback system. This allows distributed computing using wireless devices. Cyber-Physical Systems-A Computational Perspective examines various developments of CPS that are impacting our daily

Cyber-Physical Systems of Systems: Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy (Lecture Notes in Computer Science #10099)

by Hermann Kopetz Andrea Bondavalli Sara Bouchenak

This book is open access under a CC BY 4. 0 license. Technical Systems-of-Systems (SoS) - in the form of networked, independent constituent computing systems temporarily collaborating to achieve a well-defined objective - form the backbone of most of today's infrastructure. The energy grid, most transportation systems, the global banking industry, the water-supply system, the military equipment, many embedded systems, and a great number more, strongly depend on systems-of-systems. The correct operation and continuous availability of these underlying systems-of-systems are fundamental for the functioning of our modern society. The 8 papers presented in this book document the main insights on Cyber-Physical System of Systems (CPSoSs) that were gained during the work in the FP7-610535 European Research Project AMADEOS (acronym for Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems). It is the objective of this book to present, in a single consistent body, the foundational concepts and their relationships. These form a conceptual basis for the description and understanding of SoSs and go deeper in what we consider the characterizing and distinguishing elements of SoSs: time, emergence, evolution and dynamicity.

Cyber-Risk Informatics: Engineering Evaluation with Data Science

by Mehmet Sahinoglu

This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to the current and newly innovative approaches to address the maliciously-by-human-created (rather than by-chance-occurring) vulnerability and threat, and related cost-effective management to mitigate such risk. This book is purely statistical data-oriented (not deterministic) and employs computationally intensive techniques, such as Monte Carlo and Discrete Event Simulation. The enriched JAVA ready-to-go applications and solutions to exercises provided by the author at the book's specifically preserved website will enable readers to utilize the course related problems. * Enables the reader to use the book's website's applications to implement and see results, and use them making 'budgetary' sense * Utilizes a data analytical approach and provides clear entry points for readers of varying skill sets and backgrounds * Developed out of necessity from real in-class experience while teaching advanced undergraduate and graduate courses by the author Cyber-Risk Informatics is a resource for undergraduate students, graduate students, and practitioners in the field of Risk Assessment and Management regarding Security and Reliability Modeling. Mehmet Sahinoglu, a Professor (1990) Emeritus (2000), is the founder of the Informatics Institute (2009) and its SACS-accredited (2010) and NSA-certified (2013) flagship Cybersystems and Information Security (CSIS) graduate program (the first such full degree in-class program in Southeastern USA) at AUM, Auburn University's metropolitan campus in Montgomery, Alabama. He is a fellow member of the SDPS Society, a senior member of the IEEE, and an elected member of ISI. Sahinoglu is the recipient of Microsoft's Trustworthy Computing Curriculum (TCC) award and the author of Trustworthy Computing (Wiley, 2007).

Cyber Security: Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers (Communications in Computer and Information Science #589)

by Kristin Haltinner Dilshani Sarathchandra Jim Alves-Foss Kevin Chang Daniel Conte de Leon Jia Song

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security, CSS 2015, held in Coeur d'Alene, ID, USA, in April 2015. The 9 revised full papers presented were carefully reviewed and selected from 20 papers. The papers reflect four areas of scholarly work: permissions and trust evaluation, implementation and management; cloud and device security and privacy; social implications of networked and mobile applications; system and process assessments for improved cybersecurity.

Cyber Security and the Politics of Time

by Tim Stevens

'Cyber security' is a recent addition to the global security agenda, concerned with protecting states and citizens from the misuse of computer networks for war, terrorism, economic espionage and criminal gain. Many argue that the ubiquity of computer networks calls for robust and pervasive countermeasures, not least governments concerned at their potential effects on national and economic security. Drawing on critical literature in international relations, security studies, political theory and social theory, this is the first book that describes how these visions of future cyber security are sustained in the communities that articulate them. Specifically, it shows that conceptions of time and temporality are foundational to the politics of cyber security. It explores how cyber security communities understand the past, present and future, thereby shaping cyber security as a political practice. Integrating a wide range of conceptual and empirical resources, this innovative book provides insight for scholars, practitioners and policymakers.

Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security #66)

by Alexander Kott Edward J. M. Colbert

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats? This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

Cyberbullying: Approaches, Consequences and Interventions (Palgrave Studies in Cyberpsychology)

by Lucy R. Betts

Drawing on research evidence and media coverage, this book explores a number of key debates surrounding cyberbullying. The increasing digitization of society affords many benefits; however, some of these benefits are offset by more adverse consequences. Cyberbullying represents one of the adverse consequences of technology use, which has become a topic of increasing societal concern. Betts adopts a critical stance to exploring issues around the definition of cyberbullying, the unique nature of cyberbullying compared to other forms of bullying, the variation in the reported prevalence rates of cyberbullying, the consequences of involvement in cyberbullying, and the steps that can be taken to tackle cyberbullying.

Cyberbullying Across the Globe: Gender, Family, and Mental Health

by Raúl Navarro Santiago Yubero Elisa Larrañaga

This book provides a much-needed analysis of the current research in the global epidemic of electronic bullying. Scholars and professionals from the Americas, Europe, and Asia offer data, insights, and solutions, acknowledging both the social psychology and technological contexts underlying cyberbullying phenomena. Contributors address questions that are just beginning to emerge as well as longstanding issues concerning family and gender dynamics, and provide evidence-based prevention and intervention strategies for school and home. The global nature of the book reflects not only the scope and severity of cyberbullying, but also the tenacity of efforts to control and eradicate the problem. Included in the coverage: * Gender issues and cyberbullying in children and adolescents: from gender differences to gender identity measures. * Family relationships and cyberbullying. * Examining the incremental impact of cyberbullying on outcomes over and above traditional bullying in North America. * A review of cyberbullying and education issues in Latin America. * Cyberbullying prevention from child and youth literature. * Cyberbullying and restorative justice. Cyberbullying across the Globe is an essential resource for researchers, graduate students, and other professionals in child and school psychology, public health, social work and counseling, educational policy, and family advocacy.

Cybernetics: From Past to Future (Studies in Systems, Decision and Control #47)

by D. A. Novikov

This book is a concise navigator across the history of cybernetics, itsstate-of-the-art and prospects. The evolution of cybernetics (from N. Wiener tothe present day) and the reasons of its ups and downs are presented. Thecorrelation of cybernetics with the philosophy and methodology of control, aswell as with system theory and systems analysis is clearly demonstrated. The book presents a detailed analysis focusing on the modern trends ofresearch in cybernetics. A new development stage of cybernetics (the so-calledcybernetics 2. 0) is discussed as a science on general regularities of systemsorganization and control. The author substantiates the topicality ofelaborating a new branch of cybernetics, i. e. organization theory which studiesan organization as a property, process and system. The book is intended for theoreticians andpractitioners, as well as for students, postgraduates and doctoral candidates. In the first place, the target audience includes tutors and lecturers preparingcourses on cybernetics, control theory and systems science.

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

by Luis Ayala

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine--they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, you can take action now--before your hospital becomes the next victim. What You Will Learn: Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack Identify possible ways hackers can hack hospital and healthcare facility equipment Recognize the cyber-attack vectors--or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcome Detect and prevent man-in-the-middle or denial-of-service cyber-attacks Detect and prevent hacking of the hospital database and hospital web application Who This Book Is For: Hospital administrators, healthcare professionals, hospital & healthcare facility engineers and building managers, hospital & healthcare facility IT professionals, and HIPAA professionals

Cybersecurity in the European Union: Resilience And Adaptability In Governance Policy (New Security Challenges)

by George Christou

Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.

Cybersecurity Investments: Decision Support Under Economic Aspects (Progress in IS)

by Stefan Beissel

This book offersreaders essential orientation on cybersecurity safeguards, and first andforemost helps them find the right balance between financial expenditures andrisk mitigation. This is achieved by pursuing a multi-disciplinary approach thatcombines well-founded methods from economics and the computer sciences. Established decision making techniques are embedded into a walk-through for thecomplete lifecycle of cybersecurity investments. Insights into the economic aspectof the costs and benefits of cybersecurity are supplemented by established andinnovative economic indicators. Readers will find practical tools and techniquesto support reasonable decision making in cybersecurity investments. Further,they will be equipped to encourage a common understanding using economicaspects, and to provide cost transparency for the senior management.

Refine Search

Showing 20,601 through 20,625 of 54,425 results